{"id":3070,"date":"2021-08-23T20:00:26","date_gmt":"2021-08-23T15:30:26","guid":{"rendered":"http:\/\/rabsana.ir\/tutorials\/?p=3070"},"modified":"2021-08-23T11:40:53","modified_gmt":"2021-08-23T07:10:53","slug":"standardized-penetration-testing-methodologies-and-types","status":"publish","type":"post","link":"https:\/\/rabsana.ir\/tutorials\/standardized-penetration-testing-methodologies-and-types\/","title":{"rendered":"\u0645\u062a\u062f\u0647\u0627\u06cc \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f \u0648 \u0627\u0646\u0648\u0627\u0639 \u062a\u0633\u062a \u0646\u0641\u0648\u0630"},"content":{"rendered":"<p><strong>\u0634\u0631\u06a9\u062a \u0647\u0627 \u0628\u0647 \u0637\u0648\u0631 \u0645\u0639\u0645\u0648\u0644 \u0628\u0647 \u06cc\u06a9\u06cc \u0627\u0632 \u067e\u0646\u062c \u0645\u062a\u062f \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f \u062a\u0633\u062a \u0646\u0641\u0648\u0630 \u062a\u06a9\u06cc\u0647 \u0645\u06cc\u06a9\u0646\u0646\u062f. \u0627\u06cc\u0646 5 \u0645\u062a\u062f \u0639\u0628\u0627\u0631\u062a\u0646\u062f \u0627\u0632:<\/strong><\/p>\n<ul>\n<li><strong>OWASP<\/strong><\/li>\n<li><strong>OSSTMM<\/strong><\/li>\n<li><strong>ISSAF<\/strong><\/li>\n<li><strong>PTES<\/strong><\/li>\n<li><strong>NIST<\/strong><\/li>\n<\/ul>\n<h3><strong>\u0645\u062a\u062f OWASP<\/strong><\/h3>\n<p>OWASP \u0645\u062e\u0641\u0641 \u0639\u0628\u0627\u0631\u062a Open Web Application Security \u0645\u06cc\u0628\u0627\u0634\u062f. OWASP \u062f\u0631 \u0648\u0627\u0642\u0639 \u06cc\u06a9 \u0641\u0631\u06cc\u0645 \u0648\u0631\u06a9 \u0628\u0631\u0627\u06cc \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0647\u0627\u06cc \u0628\u0631\u0646\u0627\u0645\u0647 \u0627\u0633\u062a. \u0627\u06cc\u0646 \u0645\u062a\u062f \u062a\u06cc\u0645 \u0631\u0627 \u0642\u0627\u062f\u0631 \u0628\u0647 \u0627\u0646\u062c\u0627\u0645 \u06a9\u0627\u0631\u0647\u0627\u06cc \u0632\u06cc\u0631 \u0645\u06cc \u06a9\u0646\u062f:<\/p>\n<ul>\n<li>\u062a\u0634\u062e\u06cc\u0635 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0647\u0627\u06cc \u0645\u0648\u062c\u0648\u062f \u062f\u0631 \u0628\u0631\u0646\u0627\u0645\u0647 \u0647\u0627\u06cc \u062a\u062d\u062a \u0648\u0628 \u0648 \u0627\u067e\u0644\u06cc\u06a9\u06cc\u0634\u0646 \u0647\u0627<\/li>\n<li>\u06a9\u0634\u0641 \u0627\u0634\u06a9\u0627\u0644\u0627\u062a \u0645\u0648\u062c\u0648\u062f \u062f\u0631 \u0637\u0631\u06cc\u0642\u0647 \u062a\u0648\u0633\u0639\u0647<\/li>\n<li>\u0631\u062a\u0628\u0647 \u0628\u0646\u062f\u06cc \u0631\u06cc\u0633\u06a9 \u0647\u0627<\/li>\n<li>\u0635\u0631\u0641\u0647 \u062c\u0648\u06cc\u06cc \u062f\u0631 \u0648\u0642\u062a \u0648 \u0627\u0648\u0644\u0648\u06cc\u062a \u0628\u0646\u062f\u06cc \u0645\u0633\u0627\u0626\u0644<\/li>\n<\/ul>\n<p>\u0645\u06cc \u062a\u0648\u0627\u0646 \u06af\u0641\u062a \u0627\u06cc\u0646 \u0641\u0631\u06cc\u0645 \u0648\u0631\u06a9 \u062f\u0627\u0631\u0627\u06cc \u062c\u0627\u0645\u0639\u0647 \u06a9\u0627\u0631\u0628\u0631\u06cc \u0639\u0638\u06cc\u0645\u06cc \u0627\u0633\u062a. \u0628\u0646\u0627\u0628\u0631\u0627\u06cc\u0646 \u0647\u06cc\u0686 \u06a9\u0645\u0628\u0648\u062f\u06cc \u062f\u0631 \u062a\u06a9\u0646\u06cc\u06a9 \u0647\u0627\u060c \u0627\u0628\u0632\u0627\u0631\u0647\u0627 \u0648 \u0641\u0646\u0627\u0648\u0631\u06cc \u0647\u0627\u06cc OWASP \u0648\u062c\u0648\u062f \u0646\u062f\u0627\u0631\u062f.<\/p>\n<h3><strong>\u0645\u062a\u062f OSSTMM<\/strong><\/h3>\n<p>OSSTMM \u0645\u062e\u0641\u0641 \u0639\u0628\u0627\u0631\u062a Open-Source Security Testing Methodology Manual \u0645\u06cc\u0628\u0627\u0634\u062f. \u0627\u06cc\u0646 \u0645\u062a\u062f \u0628\u0647 \u06cc\u06a9 \u0631\u0648\u0634 \u0639\u0644\u0645\u06cc \u0628\u0631\u0627\u06cc \u062a\u0633\u062a \u0646\u0641\u0648\u0630 \u062f\u0631 \u0634\u0628\u06a9\u0647\u060c \u0645\u062a\u06a9\u06cc \u0627\u0633\u062a. \u0627\u06cc\u0646 \u0641\u0631\u06cc\u0645 \u0648\u0631\u06a9 \u0646\u06cc\u0632 \u06cc\u06a9 \u062a\u0648\u0635\u06cc\u0641 \u062f\u0642\u06cc\u0642 \u0627\u0632 \u0627\u0645\u0646\u06cc\u062a \u0639\u0645\u0644\u06cc\u0627\u062a \u0627\u06cc\u062f\u0647 \u0622\u0644 \u0628\u0631\u0627\u06cc \u0647\u06a9 \u0627\u062e\u0644\u0627\u0642\u06cc \u0631\u0627 \u0627\u0631\u0627\u0626\u0647 \u0645\u06cc \u062f\u0647\u062f.<\/p>\n<p>\u0641\u0631\u06cc\u0645 \u0648\u0631\u06a9 OSSTMM \u0628\u0647 \u062a\u0633\u062a \u06a9\u0646\u0646\u062f\u06af\u0627\u0646 \u0627\u0645\u06a9\u0627\u0646 \u0645\u06cc \u062f\u0647\u062f \u062a\u0627 \u062a\u0633\u062a \u0647\u0627\u06cc \u0633\u0641\u0627\u0631\u0634\u06cc \u0631\u0627 \u0645\u062a\u0646\u0627\u0633\u0628 \u0628\u0627 \u0646\u06cc\u0627\u0632 \u0647\u0627\u06cc \u062e\u0627\u0635 \u0648 \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u062a\u06a9\u0646\u0648\u0644\u0648\u0698\u06cc \u0646\u06cc\u0632 \u0627\u0646\u062c\u0627\u0645 \u062f\u0647\u0646\u062f.<\/p>\n<h3><strong>\u0645\u062a\u062f ISSAF<\/strong><\/h3>\n<p>ISSAF \u0645\u062e\u0641\u0641 \u0639\u0628\u0627\u0631\u062a Information System Security Assessment Framework \u0645\u06cc\u0628\u0627\u0634\u062f. \u0627\u06cc\u0646 \u0641\u0631\u06cc\u0645 \u0648\u0631\u06a9 \u06cc\u06a9 \u0631\u0648\u06cc\u06a9\u0631\u062f \u062a\u062e\u0635\u0635\u06cc \u0648 \u0633\u0627\u0632\u0645\u0627\u0646 \u06cc\u0627\u0641\u062a\u0647 \u0631\u0627 \u0628\u0631\u0627\u06cc \u0627\u0646\u062c\u0627\u0645 \u062a\u0633\u062a \u0627\u0631\u0627\u0626\u0647 \u0645\u06cc \u062f\u0647\u062f. \u0645\u06cc \u062a\u0648\u0627\u0646 \u06af\u0641\u062a \u0627\u06cc\u0646 \u0641\u0631\u06cc\u0645 \u0648\u0631\u06a9 \u0628\u0631\u0627\u06cc \u062a\u0633\u062a \u06a9\u0646\u0646\u062f\u0647 \u0647\u0627\u06cc\u06cc \u06a9\u0647 \u0628\u0647 \u062f\u0646\u0628\u0627\u0644 \u0628\u0631\u0646\u0627\u0645\u0647 \u0631\u06cc\u0632\u06cc \u0648 \u0645\u0633\u062a\u0646\u062f \u0633\u0627\u0632\u06cc \u0647\u0631 \u0645\u0631\u062d\u0644\u0647 \u0627\u0632 pen test \u0647\u0633\u062a\u0646\u062f\u060c \u06cc\u06a9 \u0645\u062a\u062f \u0627\u06cc\u062f\u0647 \u0622\u0644 \u0627\u0633\u062a. \u0647\u0645\u0686\u0646\u06cc\u0646 ISSAF \u0628\u0647 \u062a\u0633\u062a \u06a9\u0646\u0646\u062f\u06af\u0627\u0646 \u0627\u0645\u06a9\u0627\u0646 \u0645\u06cc \u062f\u0647\u062f \u062a\u0627 \u0647\u0631 \u0645\u0631\u062d\u0644\u0647 \u0631\u0627 \u0628\u0647 \u06cc\u06a9 \u0627\u0628\u0632\u0627\u0631 \u062e\u0627\u0635 \u0648\u0635\u0644 \u06a9\u0646\u0646\u062f.<\/p>\n<h3><strong>\u0645\u062a\u062f PTES<\/strong><\/h3>\n<p>PTES \u0645\u062e\u0641\u0641 \u0639\u0628\u0627\u0631\u062a Penetration Testing Methodologies and Standards \u0645\u06cc\u0628\u0627\u0634\u062f. \u0627\u06cc\u0646 \u0645\u062a\u062f\u060c \u06cc\u06a9 \u0631\u0648\u0634 \u0647\u0641\u062a \u0645\u0631\u062d\u0644\u0647 \u0627\u06cc \u0633\u0627\u0632\u0645\u0627\u0646 \u06cc\u0627\u0641\u062a\u0647 \u0631\u0627 \u0627\u0631\u0627\u0626\u0647 \u0645\u06cc \u062f\u0647\u062f. \u0647\u0645\u0686\u0646\u06cc\u0646 tester \u0647\u0627 \u06cc\u0627 \u062a\u0633\u062a \u06a9\u0646\u0646\u062f\u06af\u0627\u0646 \u0631\u0627 \u062f\u0631 \u062a\u0645\u0627\u0645 \u0645\u0631\u0627\u062d\u0644 \u062a\u0633\u062a \u0646\u0641\u0648\u0630\u060c \u0627\u0632 \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u0648 \u062c\u0645\u0639 \u0622\u0648\u0631\u06cc \u062f\u0627\u062f\u0647 \u0647\u0627 \u06af\u0631\u0641\u062a\u0647 \u062a\u0627 \u0628\u0647\u0631\u0647 \u0628\u0631\u062f\u0627\u0631\u06cc \u0648 \u06af\u0632\u0627\u0631\u0634 \u062f\u0647\u06cc \u0646\u06cc\u0632 \u0631\u0627\u0647\u0646\u0645\u0627\u06cc\u06cc \u0645\u06cc\u06a9\u0646\u062f.<\/p>\n<p>PTES \u0627\u0632 tester \u0647\u0627 \u0645\u06cc \u062e\u0648\u0627\u0647\u062f \u062a\u0627 \u0641\u0631\u0627\u06cc\u0646\u062f\u0647\u0627\u06cc \u0633\u0627\u0632\u0645\u0627\u0646 \u0631\u0627 \u0628\u0631\u0627\u06cc \u0627\u062c\u0631\u0627\u06cc \u0645\u0648\u0641\u0642\u06cc\u062a \u0622\u0645\u06cc\u0632 \u062a\u0633\u062a \u0648 \u0622\u0632\u0645\u0648\u0646 \u0647\u0627\u060c \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u06a9\u0646\u0646\u062f.<\/p>\n<h3><strong>\u0645\u062a\u062f NIST<\/strong><\/h3>\n<p>NIST \u0645\u062e\u0641\u0641 \u0639\u0628\u0627\u0631\u062a National Institute of Standards and Technology \u0645\u06cc\u0628\u0627\u0634\u062f. \u0641\u0631\u06cc\u0645 \u0648\u0631\u06a9 NIST \u06cc\u06a9 \u0633\u0631\u06cc \u062f\u0633\u062a\u0648\u0631\u0627\u0644\u0639\u0645\u0644 \u0647\u0627\u06cc \u062f\u0642\u06cc\u0642 \u062a\u0633\u062a \u0646\u0641\u0648\u0630\u060c \u062c\u0647\u062a \u0628\u0647\u0628\u0648\u062f \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u0646\u06cc\u0632 \u0627\u0631\u0627\u0626\u0647 \u0645\u06cc \u062f\u0647\u062f. \u062f\u0631 \u06a9\u0633\u0628 \u0648 \u06a9\u0627\u0631 \u0648 \u062a\u062c\u0627\u0631\u062a \u0647\u0627\u06cc \u0622\u0645\u0631\u06cc\u06a9\u0627\u06cc\u06cc\u060c NIST \u0627\u063a\u0644\u0628 \u06cc\u06a9\u06cc \u0627\u0632 \u0627\u0644\u0632\u0627\u0645\u0627\u062a \u0646\u0638\u0627\u0631\u062a\u06cc \u0645\u062d\u0633\u0648\u0628 \u0645\u06cc\u0634\u0648\u062f. \u0628\u0631\u0627\u06cc \u0631\u0639\u0627\u06cc\u062a NIST\u060c \u06cc\u06a9 \u0634\u0631\u06a9\u062a \u0628\u0627\u06cc\u062f \u062f\u0631 \u0628\u0631\u0646\u0627\u0645\u0647 \u0647\u0627 \u0648 \u0634\u0628\u06a9\u0647 \u0647\u0627 \u062a\u0633\u062a \u0646\u0641\u0648\u0630 \u0631\u0627 \u0627\u062c\u0631\u0627 \u06a9\u0646\u062f.<\/p>\n<h2><strong>\u0627\u0646\u0648\u0627\u0639 \u062a\u0633\u062a \u0646\u0641\u0648\u0630<\/strong><\/h2>\n<p>\u062a\u0633\u062a \u0648 \u0622\u0632\u0645\u0648\u0646 \u0647\u0627\u06cc \u0646\u0641\u0648\u0630 \u0627\u0632 \u0646\u0638\u0631 \u0627\u0647\u062f\u0627\u0641\u060c \u0634\u0631\u0627\u06cc\u0637 \u0648 \u0645\u062d\u0627\u0635\u0644 \u0645\u062a\u0641\u0627\u0648\u062a \u0647\u0633\u062a\u0646\u062f. \u0628\u0627 \u062a\u0648\u062c\u0647 \u0628\u0647 \u0646\u062d\u0648\u0647 \u0627\u0646\u062c\u0627\u0645 \u062a\u0633\u062a\u060c \u0634\u0631\u06a9\u062a \u0647\u0627 \u062f\u0631\u062c\u0627\u062a \u0645\u062e\u062a\u0644\u0641\u06cc \u0627\u0632 \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u0631\u0627 \u062f\u0631 \u0645\u0648\u0631\u062f \u0633\u06cc\u0633\u062a\u0645 \u0628\u0647 \u062a\u0633\u062a \u06a9\u0646\u0646\u062f\u06af\u0627\u0646 \u0627\u0631\u0627\u0626\u0647 \u0645\u06cc \u062f\u0647\u062f. \u062f\u0631 \u0627\u062f\u0627\u0645\u0647 \u0627\u0646\u0648\u0627\u0639 \u062a\u0633\u062a \u0646\u0641\u0648\u0630 \u0647\u0627 \u0631\u0627 \u0645\u0639\u0631\u0641\u06cc \u0648 \u0628\u0631\u0631\u0633\u06cc \u062e\u0648\u0627\u0647\u06cc\u0645 \u06a9\u0631\u062f.<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/rabsana.ir\/tutorials\/wp-content\/uploads\/2021\/08\/types-of-penetration-testing.webp\"><img loading=\"lazy\" class=\"alignnone size-full wp-image-3072\" src=\"http:\/\/rabsana.ir\/tutorials\/wp-content\/uploads\/2021\/08\/types-of-penetration-testing.webp\" alt=\"\u0627\u0646\u0648\u0627\u0639 \u062a\u0633\u062a \u0647\u0627\u06cc \u0646\u0641\u0648\u0630\" width=\"500\" height=\"300\" srcset=\"https:\/\/rabsana.ir\/tutorials\/wp-content\/uploads\/2021\/08\/types-of-penetration-testing.webp 500w, https:\/\/rabsana.ir\/tutorials\/wp-content\/uploads\/2021\/08\/types-of-penetration-testing-300x180.webp 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<h3><strong>1. \u062a\u0633\u062a \u0646\u0641\u0648\u0630 Black Box<\/strong><\/h3>\n<p>\u062a\u06cc\u0645 \u0646\u0641\u0648\u0630 \u0647\u06cc\u0686 \u0627\u0637\u0644\u0627\u0639\u0627\u062a\u06cc \u062f\u0631 \u0645\u0648\u0631\u062f \u0633\u06cc\u0633\u062a\u0645 \u0647\u062f\u0641 \u062f\u0631 \u062a\u0633\u062a \u062c\u0639\u0628\u0647 \u0633\u06cc\u0627\u0647 (Black Box Testing) \u0646\u062f\u0627\u0631\u062f. \u0647\u06a9\u0631\u0647\u0627 \u0642\u0628\u0644 \u0627\u0632 \u0646\u0641\u0648\u0630 \u0627\u0628\u062a\u062f\u0627 \u0628\u0627\u06cc\u062f \u06cc\u06a9 \u0631\u0627\u0647 \u0628\u0631\u0627\u06cc \u0648\u0631\u0648\u062f \u0628\u0647 \u0633\u06cc\u0633\u062a\u0645 \u067e\u06cc\u062f\u0627 \u06a9\u0646\u0646\u062f \u0648 \u062f\u0631 \u0645\u0648\u0631\u062f \u0686\u06af\u0648\u0646\u06af\u06cc \u0627\u0646\u062c\u0627\u0645 \u0622\u0646 \u0628\u0631\u0646\u0627\u0645\u0647 \u0631\u06cc\u0632\u06cc \u06a9\u0646\u0646\u062f.<\/p>\n<p>\u0645\u0639\u0645\u0648\u0644\u0627\u060c \u062a\u0633\u062a \u06a9\u0646\u0646\u062f\u06af\u0627\u0646 \u0647\u0646\u06af\u0627\u0645 \u0634\u0631\u0648\u0639 \u0646\u0641\u0648\u0630 Black Box\u060c \u0641\u0642\u0637 \u0627\u0633\u0645 \u0634\u0631\u06a9\u062a \u0631\u0627 \u062f\u0631 \u0627\u062e\u062a\u06cc\u0627\u0631 \u062f\u0627\u0631\u0646\u062f. \u0633\u067e\u0633 \u062a\u06cc\u0645 \u0646\u0641\u0648\u0630 \u0628\u0627\u06cc\u062f \u0622\u0646 \u0634\u0631\u06a9\u062a \u0631\u0627 \u0628\u0647 \u0637\u0648\u0631 \u062f\u0642\u06cc\u0642 \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u06a9\u0646\u0646\u062f. \u0628\u0646\u0627\u0628\u0631\u0627\u06cc\u0646 \u0627\u0646\u062c\u0627\u0645 \u0627\u06cc\u0646 \u0646\u0648\u0639 \u062a\u0633\u062a \u0628\u0647 \u0632\u0645\u0627\u0646 \u0632\u06cc\u0627\u062f\u06cc \u0646\u06cc\u0627\u0632 \u062f\u0627\u0631\u062f.<\/p>\n<h3><strong>2. \u062a\u0633\u062a \u0646\u0641\u0648\u0630 Grey Box<\/strong><\/h3>\n<p>\u062a\u06cc\u0645 \u0647\u0627\u06cc testing\u060c \u062f\u0627\u0631\u0627\u06cc \u0633\u0637\u062d \u0628\u0627\u0644\u0627\u06cc\u06cc \u0627\u0632 \u062f\u0627\u0646\u0634 \u062f\u0631\u0645\u0648\u0631\u062f \u06a9\u0627\u0631\u0628\u0631 \u0647\u0633\u062a\u0646\u062f. \u0647\u06a9\u0631\u0647\u0627 \u0646\u06cc\u0632 \u062f\u0627\u0631\u0627\u06cc \u062f\u0627\u0646\u0634 \u0647\u0627\u06cc \u0632\u06cc\u0631 \u0647\u0633\u062a\u0646\u062f:<\/p>\n<ul>\n<li>\u0637\u0631\u0627\u062d\u06cc \u0648 \u0645\u0639\u0645\u0627\u0631\u06cc \u0645\u0633\u062a\u0646\u062f\u0627\u062a<\/li>\n<li>\u0633\u0627\u062e\u062a\u0627\u0631\u0647\u0627\u06cc \u062f\u0627\u062e\u0644\u06cc<\/li>\n<\/ul>\n<p>\u06cc\u06a9 grey box pen test \u0628\u0647 \u062a\u06cc\u0645 \u0627\u062c\u0627\u0632\u0647 \u0645\u06cc \u062f\u0647\u062f \u062a\u0627 \u0627\u0632 \u0627\u0628\u062a\u062f\u0627 \u0628\u0631 \u0631\u0648\u06cc \u0627\u0647\u062f\u0627\u0641 \u0648 \u0645\u062d\u0627\u0635\u0644\u06cc \u06a9\u0647 \u0628\u06cc\u0634\u062a\u0631\u06cc\u0646 \u0631\u06cc\u0633\u06a9 \u0648 \u0627\u0631\u0632\u0634 \u0631\u0627 \u062f\u0627\u0631\u0646\u062f\u060c \u062a\u0645\u0631\u06a9\u0632 \u06a9\u0646\u0646\u062f. \u0627\u06cc\u0646 \u0646\u0648\u0639 \u062a\u0633\u062a \u0628\u0631\u0627\u06cc \u062a\u0642\u0644\u06cc\u062f \u0627\u0632 \u0645\u0647\u0627\u062c\u0645\u0627\u0646\u06cc \u06a9\u0647 \u0628\u0647 \u0634\u0628\u06a9\u0647 \u062f\u0633\u062a\u0631\u0633\u06cc \u0637\u0648\u0644\u0627\u0646\u06cc \u0645\u062f\u062a \u062f\u0627\u0631\u0646\u062f\u060c \u06cc\u06a9 \u062a\u0633\u062a \u0627\u06cc\u062f\u0647 \u0622\u0644 \u0645\u062d\u0633\u0648\u0628 \u0645\u06cc\u0634\u0648\u062f.<\/p>\n<h3><strong>3. \u062a\u0633\u062a \u0646\u0641\u0648\u0630 White Box<\/strong><\/h3>\n<p>Pen tester \u0647\u0627 \u0642\u0628\u0644 \u0627\u0632 \u0634\u0631\u0648\u0639 \u06a9\u0627\u0631 \u06cc\u06a9 \u0633\u0631\u06cc \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u062f\u0631 \u0645\u0648\u0631\u062f \u0633\u06cc\u0633\u062a\u0645 \u0645\u0648\u0631\u062f \u0646\u0638\u0631\u060c \u062c\u0645\u0639 \u0622\u0648\u0631\u06cc \u0645\u06cc \u06a9\u0646\u0646\u062f. \u0627\u06cc\u0646 \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u0634\u0627\u0645\u0644:<\/p>\n<ul>\n<li>\u0622\u06cc \u067e\u06cc \u0622\u062f\u0631\u0633 \u0647\u0627<\/li>\n<li>\u0637\u0631\u062d \u0647\u0627\u06cc \u06a9\u0644\u06cc \u0627\u0632 \u0632\u06cc\u0631\u0633\u0627\u062e\u062a \u0634\u0628\u06a9\u0647<\/li>\n<li>\u067e\u0631\u0648\u062a\u06a9\u0644 \u0647\u0627\u06cc \u06a9\u0627\u0631\u0628\u0631<\/li>\n<li>\u0633\u06cc\u0633\u062a\u0645 \u0647\u0627\u06cc \u0645\u0635\u0646\u0648\u0639\u06cc (\u0633\u0648\u0631\u0633 \u06a9\u062f\u060c \u0628\u0627\u06cc\u0646\u0631\u06cc \u0647\u0627\u060c \u06a9\u0627\u0646\u062a\u06cc\u0646\u0631 \u0647\u0627 \u0648 &#8230;)<\/li>\n<\/ul>\n<p>\u0628\u0627 \u062a\u0648\u062c\u0647 \u0628\u0647 \u062a\u0646\u0638\u06cc\u0645\u0627\u062a\u060c \u062a\u0633\u062a \u06a9\u0646\u0646\u062f\u06af\u0627\u0646 \u0645\u06cc \u062a\u0648\u0627\u0646\u0646\u062f \u062d\u062a\u06cc \u0628\u0647 \u0633\u0631\u0648\u0631\u0647\u0627\u06cc \u0633\u06cc\u0633\u062a\u0645 \u0646\u06cc\u0632 \u062f\u0633\u062a\u0631\u0633\u06cc \u062f\u0627\u0634\u062a\u0647 \u0628\u0627\u0634\u0646\u062f. \u062f\u0631 \u062d\u0627\u0644\u06cc \u06a9\u0647 \u0628\u0647 \u0627\u0646\u062f\u0627\u0632\u0647 \u062a\u0633\u062a Black Box \u0645\u0639\u062a\u0628\u0631 \u0646\u06cc\u0633\u062a \u0627\u0645\u0627 \u0633\u0627\u0632\u0645\u0627\u0646\u062f\u0647\u06cc White Box \u0633\u0631\u06cc\u0639 \u062a\u0631 \u0648 \u0627\u0631\u0632\u0627\u0646 \u062a\u0631 \u0627\u0633\u062a.<\/p>\n<h3><strong>4. \u062a\u0633\u062a \u0647\u062f\u0641\u0645\u0646\u062f<\/strong><\/h3>\n<p>\u06a9\u0627\u0631\u06a9\u0646\u0627\u0646 \u0634\u0631\u06a9\u062a \u0647\u0627\u06cc IT \u0648 \u062a\u06cc\u0645 \u062a\u0633\u062a \u0628\u0627 \u06cc\u06a9\u062f\u06cc\u06af\u0631 \u0647\u0645\u06a9\u0627\u0631\u06cc \u0645\u06cc \u06a9\u0646\u0646\u062f \u062a\u0627 \u06cc\u06a9 \u062a\u0633\u062a \u0647\u062f\u0641\u0645\u0646\u062f \u0631\u0627 \u0627\u0646\u062c\u0627\u0645 \u062f\u0647\u0646\u062f. Tester \u0647\u0627 \u0648 \u067e\u0631\u0633\u0646\u0644 \u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0646\u06cc\u0632 \u0627\u0632 \u0641\u0639\u0627\u0644\u06cc\u062a \u0647\u0627\u06cc \u06cc\u06a9\u062f\u06cc\u06af\u0631 \u062f\u0631 \u0647\u0645\u0647 \u0645\u0631\u0627\u062d\u0644 \u0622\u06af\u0627\u0647\u06cc \u062f\u0627\u0631\u0646\u062f.<\/p>\n<h3><strong>5. \u062a\u0633\u062a \u062e\u0627\u0631\u062c\u06cc<\/strong><\/h3>\n<p>\u062a\u0633\u062a \u062e\u0627\u0631\u062c\u06cc\u060c \u062d\u0645\u0644\u0647 \u0628\u0647 \u0633\u0631\u0648\u0631\u0647\u0627 \u06cc\u0627 \u062f\u0633\u062a\u06af\u0627\u0647 \u0647\u0627\u06cc\u06cc \u0631\u0627 \u06a9\u0647 \u0642\u0627\u0628\u0644 \u0645\u0634\u0627\u0647\u062f\u0647 \u0648 \u062e\u0627\u0631\u062c\u06cc \u0647\u0633\u062a\u0646\u062f \u0631\u0627 \u0634\u0628\u06cc\u0647 \u0633\u0627\u0632\u06cc \u0645\u06cc \u06a9\u0646\u062f. \u0627\u0647\u062f\u0627\u0641 \u0645\u0634\u062a\u0631\u06a9 \u062f\u0631 \u062a\u0633\u062a \u062e\u0627\u0631\u062c\u06cc \u0628\u0647 \u0635\u0648\u0631\u062a \u0632\u06cc\u0631 \u0647\u0633\u062a\u0646\u062f:<\/p>\n<ul>\n<li>DNS<\/li>\n<li>\u0628\u0631\u0646\u0627\u0645\u0647 \u0647\u0627\u06cc \u062a\u062d\u062a \u0648\u0628<\/li>\n<li>\u0633\u0631\u0648\u0631\u0647\u0627\u06cc \u0627\u06cc\u0645\u06cc\u0644<\/li>\n<li>\u0648\u0628 \u0633\u0627\u06cc\u062a \u0647\u0627<\/li>\n<li>\u0633\u0631\u0648\u0631\u0647\u0627\u06cc \u0628\u0631\u0646\u0627\u0645\u0647 \u0648 \u0648\u0628<\/li>\n<li>\u0641\u0627\u06cc\u0631\u0648\u0627\u0644 \u0647\u0627<\/li>\n<\/ul>\n<p>\u0628\u0647 \u0635\u0648\u0631\u062a \u06a9\u0644\u06cc \u0647\u062f\u0641 \u0627\u0632 \u0627\u0646\u062c\u0627\u0645 \u062a\u0633\u062a \u0647\u0627\u06cc \u062e\u0627\u0631\u062c\u06cc \u0627\u06cc\u0646 \u0627\u0633\u062a \u06a9\u0647 \u0628\u0641\u0647\u0645\u06cc\u0645:<\/p>\n<ul>\n<li><strong>\u0622\u06cc\u0627 \u06cc\u06a9 \u0645\u0647\u0627\u062c\u0645 \u062e\u0627\u0631\u062c\u06cc \u0646\u06cc\u0632 \u0645\u06cc\u062a\u0648\u0627\u0646\u062f \u0628\u0647 \u0633\u06cc\u0633\u062a\u0645 \u0646\u0641\u0648\u0630 \u06a9\u0646\u062f \u06cc\u0627 \u062e\u06cc\u0631\u061f<\/strong><\/li>\n<li><strong>\u0645\u0647\u0627\u062c\u0645 \u067e\u0633 \u0627\u0632 \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u0646\u0642\u0636 \u0633\u06cc\u0633\u062a\u0645\u060c \u062a\u0627 \u0686\u0647 \u062d\u062f \u0645\u06cc \u062a\u0648\u0627\u0646\u062f \u0628\u0647 \u0622\u0646 \u0646\u0641\u0648\u0630 \u06a9\u0646\u062f\u061f<\/strong><\/li>\n<\/ul>\n<h4><strong>6. \u062a\u0633\u062a \u062f\u0627\u062e\u0644\u06cc <\/strong><\/h4>\n<p>\u062f\u0631 \u0648\u0627\u0642\u0639 \u062a\u0633\u062a \u062f\u0627\u062e\u0644\u06cc \u06cc\u06a9 \u062a\u0647\u062f\u06cc\u062f \u062f\u0627\u062e\u0644\u06cc \u06a9\u0647 \u062f\u0631 \u067e\u0634\u062a \u0641\u0627\u06cc\u0631\u0648\u0627\u0644 \u0642\u0631\u0627\u0631 \u062f\u0627\u0631\u062f \u0631\u0627 \u062a\u0642\u0644\u06cc\u062f \u0645\u06cc\u06a9\u0646\u062f. \u0646\u0642\u0637\u0647 \u0634\u0631\u0648\u0639 \u0627\u06cc\u0646 \u062a\u0633\u062a\u060c \u06cc\u06a9 \u06a9\u0627\u0631\u0628\u0631 \u0628\u0627 \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f \u0645\u06cc\u0628\u0627\u0634\u062f. \u0628\u0647 \u0639\u0646\u0648\u0627\u0646 \u0645\u062b\u0627\u0644\u060c \u06a9\u0627\u0631\u0645\u0646\u062f\u06cc \u06a9\u0647 \u0627\u0632 \u0634\u0631\u0627\u06cc\u0637 \u0646\u0627\u0631\u0627\u0636\u06cc \u0627\u0633\u062a \u0648 \u062a\u0635\u0645\u06cc\u0645 \u0628\u0647 \u0622\u0633\u06cc\u0628 \u0631\u0633\u0627\u0646\u062f\u0646 \u0628\u0647 \u0633\u06cc\u0633\u062a\u0645 \u06cc\u06a9 \u0634\u0631\u06a9\u062a \u0631\u0627 \u062f\u0627\u0631\u062f \u0648 \u06cc\u0627 \u0645\u0647\u0627\u062c\u0645\u06cc \u06a9\u0647 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u062d\u0645\u0644\u0647 \u0641\u06cc\u0634\u06cc\u0646\u06af \u0628\u0647 \u0633\u06cc\u0633\u062a\u0645 \u062f\u0633\u062a\u0631\u0633\u06cc \u067e\u06cc\u062f\u0627 \u06a9\u0631\u062f\u0647 \u0627\u0633\u062a.<\/p>\n<p>\u0628\u0647 \u0635\u0648\u0631\u062a \u06a9\u0644\u06cc \u0645\u06cc \u062a\u0648\u0627\u0646 \u06af\u0641\u062a \u06a9\u0647 \u062a\u0633\u062a \u062f\u0627\u062e\u0644\u06cc \u0628\u0631\u0627\u06cc \u062a\u0639\u06cc\u06cc\u0646 \u0645\u06cc\u0632\u0627\u0646 \u0622\u0633\u06cc\u0628 \u06cc\u06a9 \u06a9\u0627\u0631\u0645\u0646\u062f \u0645\u062e\u0631\u0628 \u0628\u0647 \u0633\u06cc\u0633\u062a\u0645\u060c \u06cc\u06a9 \u062a\u0633\u062a \u0627\u06cc\u062f\u0647 \u0622\u0644 \u0627\u0633\u062a.<\/p>\n<h3><strong>7. \u062a\u0633\u062a Blind<\/strong><\/h3>\n<p>\u062a\u0633\u062a Blind \u06cc\u06a9 \u062d\u0645\u0644\u0647 \u0648\u0627\u0642\u0639\u06cc \u0631\u0627 \u0634\u0628\u06cc\u0647 \u0633\u0627\u0632\u06cc \u0645\u06cc\u06a9\u0646\u062f. \u062f\u0631 \u062d\u0627\u0644\u06cc \u06a9\u0647 \u062a\u06cc\u0645 \u0627\u0645\u0646\u06cc\u062a\u06cc \u0627\u0632 \u0622\u0646 \u062a\u0633\u062a \u0645\u0637\u0644\u0639 \u0627\u0633\u062a\u060c \u06a9\u0627\u0631\u06a9\u0646\u0627\u0646 \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u0645\u062d\u062f\u0648\u062f\u06cc \u062f\u0631 \u0645\u0648\u0631\u062f \u0627\u0633\u062a\u0631\u0627\u062a\u0698\u06cc \u062a\u0633\u062a \u0647\u0627 \u0648 \u0646\u0642\u0636 \u0647\u0627 \u0633\u06cc\u0633\u062a\u0645 \u062f\u0627\u0631\u0646\u062f.<\/p>\n<h4><strong>8. \u062a\u0633\u062a Double-Blind<\/strong><\/h4>\n<p>\u062f\u0631 \u062a\u0646\u0638\u06cc\u0645\u0627\u062a \u06cc\u06a9 \u062a\u0633\u062a Double-Blind\u060c \u0641\u0642\u0637 \u06cc\u06a9 \u06cc\u0627 \u062f\u0648 \u0646\u0641\u0631 \u062f\u0631 \u062f\u0627\u062e\u0644 \u0634\u0631\u06a9\u062a \u0627\u0632 \u062a\u0633\u062a \u0647\u0627\u06cc\u06cc \u06a9\u0647 \u0642\u0631\u0627\u0631 \u0627\u0633\u062a \u0627\u0646\u062c\u0627\u0645 \u0634\u0648\u062f\u060c \u0645\u0637\u0644\u0639 \u0647\u0633\u062a\u0646\u062f. \u062a\u0633\u062a \u0647\u0627\u06cc Double-Blind \u0628\u0631\u0627\u06cc \u0645\u0648\u0627\u0631\u062f \u0632\u06cc\u0631 \u06cc\u06a9 \u0627\u0646\u062a\u062e\u0627\u0628 \u0627\u06cc\u062f\u0647 \u0622\u0644 \u0647\u0633\u062a\u0646\u062f:<\/p>\n<ul>\n<li>\u0633\u06cc\u0633\u062a\u0645 \u0647\u0627\u06cc \u0646\u0638\u0627\u0631\u062a \u0627\u0645\u0646\u06cc\u062a\u06cc<\/li>\n<li>\u067e\u0631\u0648\u062a\u06a9\u0644 \u0647\u0627\u06cc \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u062d\u0648\u0627\u062f\u062b<\/li>\n<li>\u0631\u0648\u06cc\u0647 \u0647\u0627\u06cc \u067e\u0627\u0633\u062e\u06af\u0648\u06cc\u06cc<\/li>\n<\/ul>\n<p>\u062a\u0633\u062a Double-Blind \u0628\u0647 \u062a\u06cc\u0645 \u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u062f\u0631 \u062a\u0634\u062e\u06cc\u0635 \u0648 \u067e\u0627\u0633\u062e \u0628\u0647 \u06cc\u06a9 \u062d\u0645\u0644\u0647 \u0648\u0627\u0642\u0639\u06cc\u060c \u06cc\u06a9 \u062f\u06cc\u062f \u0628\u0631\u062a\u0631 \u0648 \u0628\u0627\u0632\u062a\u0631 \u0646\u06cc\u0632 \u0645\u06cc \u062f\u0647\u062f.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u0634\u0631\u06a9\u062a \u0647\u0627 \u0628\u0647 \u0637\u0648\u0631 \u0645\u0639\u0645\u0648\u0644 \u0628\u0647 \u06cc\u06a9\u06cc \u0627\u0632 \u067e\u0646\u062c \u0645\u062a\u062f \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f \u062a\u0633\u062a \u0646\u0641\u0648\u0630 \u062a\u06a9\u06cc\u0647 \u0645\u06cc\u06a9\u0646\u0646\u062f. \u0627\u06cc\u0646 5 \u0645\u062a\u062f \u0639\u0628\u0627\u0631\u062a\u0646\u062f \u0627\u0632: OWASP OSSTMM ISSAF PTES NIST \u0645\u062a\u062f OWASP OWASP \u0645\u062e\u0641\u0641 \u0639\u0628\u0627\u0631\u062a Open Web Application Security \u0645\u06cc\u0628\u0627\u0634\u062f. OWASP \u062f\u0631 \u0648\u0627\u0642\u0639 \u06cc\u06a9 \u0641\u0631\u06cc\u0645 \u0648\u0631\u06a9 \u0628\u0631\u0627\u06cc \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0647\u0627\u06cc \u0628\u0631\u0646\u0627\u0645\u0647 \u0627\u0633\u062a. \u0627\u06cc\u0646 \u0645\u062a\u062f \u062a\u06cc\u0645 \u0631\u0627 \u0642\u0627\u062f\u0631 \u0628\u0647 \u0627\u0646\u062c\u0627\u0645 &hellip;<\/p>\n","protected":false},"author":4,"featured_media":3071,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[73],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v18.4 (Yoast SEO v18.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u0645\u062a\u062f\u0647\u0627\u06cc \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f \u0648 \u0627\u0646\u0648\u0627\u0639 \u062a\u0633\u062a \u0646\u0641\u0648\u0630 - Penetration Testing | \u0622\u0645\u0648\u0632\u0634 \u0631\u0627\u0628\u0633\u0627\u0646\u0627<\/title>\n<meta name=\"description\" content=\"\u0645\u0639\u0631\u0641\u06cc \u0648 \u0628\u0631\u0631\u0633\u06cc \u0645\u062a\u062f\u0647\u0627\u06cc \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f \u062a\u0633\u062a \u0646\u0641\u0648\u0630 \u0645\u062b\u0644 OWASP \u060cOSSTMM\u060c ISSAF\u060c PTES \u0648 NIST \u060c \u0628\u0631\u0631\u0633\u06cc \u0627\u0646\u0648\u0627\u0639 \u062a\u0633\u062a \u0646\u0641\u0648\u0630 Black Box\u060c Grey Box\u060c white box \u0648...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rabsana.ir\/tutorials\/standardized-penetration-testing-methodologies-and-types\/\" \/>\n<meta property=\"og:locale\" content=\"fa_IR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u0645\u062a\u062f\u0647\u0627\u06cc \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f \u0648 \u0627\u0646\u0648\u0627\u0639 \u062a\u0633\u062a \u0646\u0641\u0648\u0630\" \/>\n<meta property=\"og:description\" content=\"\u0645\u0639\u0631\u0641\u06cc \u0648 \u0628\u0631\u0631\u0633\u06cc \u0645\u062a\u062f\u0647\u0627\u06cc \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f \u062a\u0633\u062a \u0646\u0641\u0648\u0630 \u0645\u062b\u0644 OWASP \u060cOSSTMM\u060c ISSAF\u060c PTES \u0648 NIST \u060c \u0628\u0631\u0631\u0633\u06cc \u0627\u0646\u0648\u0627\u0639 \u062a\u0633\u062a \u0646\u0641\u0648\u0630 Black Box\u060c Grey Box\u060c white box \u0648...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rabsana.ir\/tutorials\/standardized-penetration-testing-methodologies-and-types\/\" \/>\n<meta property=\"og:site_name\" content=\"\u0622\u0645\u0648\u0632\u0634 \u0631\u0627\u0628\u0633\u0627\u0646\u0627\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-23T15:30:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-23T07:10:53+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/rabsana.ir\/tutorials\/wp-content\/uploads\/2021\/08\/Standardized-Penetration-Testing-Methodologies.webp\" \/>\n<meta name=\"twitter:label1\" content=\"\u0646\u0648\u0634\u062a\u0647\u200c\u0634\u062f\u0647 \u0628\u062f\u0633\u062a\" \/>\n\t<meta name=\"twitter:data1\" content=\"\u0645\u0647\u0633\u0627 \u0645\u062d\u0645\u062f\u06cc\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0632\u0645\u0627\u0646 \u062a\u0642\u0631\u06cc\u0628\u06cc \u0628\u0631\u0627\u06cc \u062e\u0648\u0627\u0646\u062f\u0646\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 \u062f\u0642\u06cc\u0642\u0647\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/rabsana.ir\/tutorials\/#\/schema\/person\/4ae2a08dbbdf43f1d2e6fe967155aa4b\",\"name\":\"bagher rezvan\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/rabsana.ir\/tutorials\/#personlogo\",\"inLanguage\":\"fa-IR\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/43c698432e5f8e000d945d3945e15b50?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/43c698432e5f8e000d945d3945e15b50?s=96&d=mm&r=g\",\"caption\":\"bagher rezvan\"},\"logo\":{\"@id\":\"https:\/\/rabsana.ir\/tutorials\/#personlogo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/rabsana.ir\/tutorials\/#website\",\"url\":\"https:\/\/rabsana.ir\/tutorials\/\",\"name\":\"\u0622\u0645\u0648\u0632\u0634 \u0631\u0627\u0628\u0633\u0627\u0646\u0627\",\"description\":\"\u0622\u0645\u0648\u0632\u0634 \u0647\u0627\u06cc \u062a\u062e\u0635\u0635\u06cc \u0634\u0631\u06a9\u062a \u0637\u0631\u0627\u062d\u06cc \u0633\u0627\u06cc\u062a \u0631\u0627\u0628\u0633\u0627\u0646\u0627\",\"publisher\":{\"@id\":\"https:\/\/rabsana.ir\/tutorials\/#\/schema\/person\/4ae2a08dbbdf43f1d2e6fe967155aa4b\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/rabsana.ir\/tutorials\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fa-IR\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/rabsana.ir\/tutorials\/standardized-penetration-testing-methodologies-and-types\/#primaryimage\",\"inLanguage\":\"fa-IR\",\"url\":\"https:\/\/rabsana.ir\/tutorials\/wp-content\/uploads\/2021\/08\/Standardized-Penetration-Testing-Methodologies.webp\",\"contentUrl\":\"https:\/\/rabsana.ir\/tutorials\/wp-content\/uploads\/2021\/08\/Standardized-Penetration-Testing-Methodologies.webp\",\"width\":1200,\"height\":360,\"caption\":\"\u0631\u0648\u0634 \u0647\u0627\u06cc \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f \u0648 \u0627\u0646\u0648\u0627\u0639 \u062a\u0633\u062a \u0646\u0641\u0648\u0630\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/rabsana.ir\/tutorials\/standardized-penetration-testing-methodologies-and-types\/#webpage\",\"url\":\"https:\/\/rabsana.ir\/tutorials\/standardized-penetration-testing-methodologies-and-types\/\",\"name\":\"\u0645\u062a\u062f\u0647\u0627\u06cc \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f \u0648 \u0627\u0646\u0648\u0627\u0639 \u062a\u0633\u062a \u0646\u0641\u0648\u0630 - Penetration Testing | \u0622\u0645\u0648\u0632\u0634 \u0631\u0627\u0628\u0633\u0627\u0646\u0627\",\"isPartOf\":{\"@id\":\"https:\/\/rabsana.ir\/tutorials\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/rabsana.ir\/tutorials\/standardized-penetration-testing-methodologies-and-types\/#primaryimage\"},\"datePublished\":\"2021-08-23T15:30:26+00:00\",\"dateModified\":\"2021-08-23T07:10:53+00:00\",\"description\":\"\u0645\u0639\u0631\u0641\u06cc \u0648 \u0628\u0631\u0631\u0633\u06cc \u0645\u062a\u062f\u0647\u0627\u06cc \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f \u062a\u0633\u062a \u0646\u0641\u0648\u0630 \u0645\u062b\u0644 OWASP \u060cOSSTMM\u060c ISSAF\u060c PTES \u0648 NIST \u060c \u0628\u0631\u0631\u0633\u06cc \u0627\u0646\u0648\u0627\u0639 \u062a\u0633\u062a \u0646\u0641\u0648\u0630 Black Box\u060c Grey Box\u060c white box \u0648...\",\"breadcrumb\":{\"@id\":\"https:\/\/rabsana.ir\/tutorials\/standardized-penetration-testing-methodologies-and-types\/#breadcrumb\"},\"inLanguage\":\"fa-IR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/rabsana.ir\/tutorials\/standardized-penetration-testing-methodologies-and-types\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/rabsana.ir\/tutorials\/standardized-penetration-testing-methodologies-and-types\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u062e\u0627\u0646\u0647\",\"item\":\"https:\/\/rabsana.ir\/tutorials\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u0645\u062a\u062f\u0647\u0627\u06cc \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f \u0648 \u0627\u0646\u0648\u0627\u0639 \u062a\u0633\u062a \u0646\u0641\u0648\u0630\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/rabsana.ir\/tutorials\/standardized-penetration-testing-methodologies-and-types\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/rabsana.ir\/tutorials\/standardized-penetration-testing-methodologies-and-types\/#webpage\"},\"author\":{\"@id\":\"https:\/\/rabsana.ir\/tutorials\/#\/schema\/person\/f95a0ac81e3ccf2f7b115822a7a815cd\"},\"headline\":\"\u0645\u062a\u062f\u0647\u0627\u06cc \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f \u0648 \u0627\u0646\u0648\u0627\u0639 \u062a\u0633\u062a \u0646\u0641\u0648\u0630\",\"datePublished\":\"2021-08-23T15:30:26+00:00\",\"dateModified\":\"2021-08-23T07:10:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/rabsana.ir\/tutorials\/standardized-penetration-testing-methodologies-and-types\/#webpage\"},\"wordCount\":83,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/rabsana.ir\/tutorials\/#\/schema\/person\/4ae2a08dbbdf43f1d2e6fe967155aa4b\"},\"image\":{\"@id\":\"https:\/\/rabsana.ir\/tutorials\/standardized-penetration-testing-methodologies-and-types\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/rabsana.ir\/tutorials\/wp-content\/uploads\/2021\/08\/Standardized-Penetration-Testing-Methodologies.webp\",\"articleSection\":[\"\u0622\u062e\u0631\u06cc\u0646 \u062a\u06a9\u0646\u0648\u0644\u0648\u0698\u06cc \u0647\u0627\u06cc \u06a9\u0627\u0645\u067e\u06cc\u0648\u062a\u0631\"],\"inLanguage\":\"fa-IR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/rabsana.ir\/tutorials\/standardized-penetration-testing-methodologies-and-types\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/rabsana.ir\/tutorials\/#\/schema\/person\/f95a0ac81e3ccf2f7b115822a7a815cd\",\"name\":\"\u0645\u0647\u0633\u0627 \u0645\u062d\u0645\u062f\u06cc\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/rabsana.ir\/tutorials\/#personlogo\",\"inLanguage\":\"fa-IR\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0910931d9fb93b2b6b0627aa03c9f1c6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0910931d9fb93b2b6b0627aa03c9f1c6?s=96&d=mm&r=g\",\"caption\":\"\u0645\u0647\u0633\u0627 \u0645\u062d\u0645\u062f\u06cc\"},\"url\":\"https:\/\/rabsana.ir\/tutorials\/author\/mahsa-mhmdi\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u0645\u062a\u062f\u0647\u0627\u06cc \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f \u0648 \u0627\u0646\u0648\u0627\u0639 \u062a\u0633\u062a \u0646\u0641\u0648\u0630 - Penetration Testing | \u0622\u0645\u0648\u0632\u0634 \u0631\u0627\u0628\u0633\u0627\u0646\u0627","description":"\u0645\u0639\u0631\u0641\u06cc \u0648 \u0628\u0631\u0631\u0633\u06cc \u0645\u062a\u062f\u0647\u0627\u06cc \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f \u062a\u0633\u062a \u0646\u0641\u0648\u0630 \u0645\u062b\u0644 OWASP \u060cOSSTMM\u060c ISSAF\u060c PTES \u0648 NIST \u060c \u0628\u0631\u0631\u0633\u06cc \u0627\u0646\u0648\u0627\u0639 \u062a\u0633\u062a \u0646\u0641\u0648\u0630 Black Box\u060c Grey Box\u060c white box \u0648...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rabsana.ir\/tutorials\/standardized-penetration-testing-methodologies-and-types\/","og_locale":"fa_IR","og_type":"article","og_title":"\u0645\u062a\u062f\u0647\u0627\u06cc \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f \u0648 \u0627\u0646\u0648\u0627\u0639 \u062a\u0633\u062a \u0646\u0641\u0648\u0630","og_description":"\u0645\u0639\u0631\u0641\u06cc \u0648 \u0628\u0631\u0631\u0633\u06cc \u0645\u062a\u062f\u0647\u0627\u06cc \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f \u062a\u0633\u062a \u0646\u0641\u0648\u0630 \u0645\u062b\u0644 OWASP \u060cOSSTMM\u060c ISSAF\u060c PTES \u0648 NIST \u060c \u0628\u0631\u0631\u0633\u06cc \u0627\u0646\u0648\u0627\u0639 \u062a\u0633\u062a \u0646\u0641\u0648\u0630 Black Box\u060c Grey Box\u060c white box \u0648...","og_url":"https:\/\/rabsana.ir\/tutorials\/standardized-penetration-testing-methodologies-and-types\/","og_site_name":"\u0622\u0645\u0648\u0632\u0634 \u0631\u0627\u0628\u0633\u0627\u0646\u0627","article_published_time":"2021-08-23T15:30:26+00:00","article_modified_time":"2021-08-23T07:10:53+00:00","twitter_card":"summary_large_image","twitter_image":"https:\/\/rabsana.ir\/tutorials\/wp-content\/uploads\/2021\/08\/Standardized-Penetration-Testing-Methodologies.webp","twitter_misc":{"\u0646\u0648\u0634\u062a\u0647\u200c\u0634\u062f\u0647 \u0628\u062f\u0633\u062a":"\u0645\u0647\u0633\u0627 \u0645\u062d\u0645\u062f\u06cc","\u0632\u0645\u0627\u0646 \u062a\u0642\u0631\u06cc\u0628\u06cc \u0628\u0631\u0627\u06cc \u062e\u0648\u0627\u0646\u062f\u0646":"5 \u062f\u0642\u06cc\u0642\u0647"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Person","Organization"],"@id":"https:\/\/rabsana.ir\/tutorials\/#\/schema\/person\/4ae2a08dbbdf43f1d2e6fe967155aa4b","name":"bagher rezvan","image":{"@type":"ImageObject","@id":"https:\/\/rabsana.ir\/tutorials\/#personlogo","inLanguage":"fa-IR","url":"https:\/\/secure.gravatar.com\/avatar\/43c698432e5f8e000d945d3945e15b50?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/43c698432e5f8e000d945d3945e15b50?s=96&d=mm&r=g","caption":"bagher rezvan"},"logo":{"@id":"https:\/\/rabsana.ir\/tutorials\/#personlogo"}},{"@type":"WebSite","@id":"https:\/\/rabsana.ir\/tutorials\/#website","url":"https:\/\/rabsana.ir\/tutorials\/","name":"\u0622\u0645\u0648\u0632\u0634 \u0631\u0627\u0628\u0633\u0627\u0646\u0627","description":"\u0622\u0645\u0648\u0632\u0634 \u0647\u0627\u06cc \u062a\u062e\u0635\u0635\u06cc \u0634\u0631\u06a9\u062a \u0637\u0631\u0627\u062d\u06cc \u0633\u0627\u06cc\u062a \u0631\u0627\u0628\u0633\u0627\u0646\u0627","publisher":{"@id":"https:\/\/rabsana.ir\/tutorials\/#\/schema\/person\/4ae2a08dbbdf43f1d2e6fe967155aa4b"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rabsana.ir\/tutorials\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fa-IR"},{"@type":"ImageObject","@id":"https:\/\/rabsana.ir\/tutorials\/standardized-penetration-testing-methodologies-and-types\/#primaryimage","inLanguage":"fa-IR","url":"https:\/\/rabsana.ir\/tutorials\/wp-content\/uploads\/2021\/08\/Standardized-Penetration-Testing-Methodologies.webp","contentUrl":"https:\/\/rabsana.ir\/tutorials\/wp-content\/uploads\/2021\/08\/Standardized-Penetration-Testing-Methodologies.webp","width":1200,"height":360,"caption":"\u0631\u0648\u0634 \u0647\u0627\u06cc \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f \u0648 \u0627\u0646\u0648\u0627\u0639 \u062a\u0633\u062a \u0646\u0641\u0648\u0630"},{"@type":"WebPage","@id":"https:\/\/rabsana.ir\/tutorials\/standardized-penetration-testing-methodologies-and-types\/#webpage","url":"https:\/\/rabsana.ir\/tutorials\/standardized-penetration-testing-methodologies-and-types\/","name":"\u0645\u062a\u062f\u0647\u0627\u06cc \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f \u0648 \u0627\u0646\u0648\u0627\u0639 \u062a\u0633\u062a \u0646\u0641\u0648\u0630 - Penetration Testing | \u0622\u0645\u0648\u0632\u0634 \u0631\u0627\u0628\u0633\u0627\u0646\u0627","isPartOf":{"@id":"https:\/\/rabsana.ir\/tutorials\/#website"},"primaryImageOfPage":{"@id":"https:\/\/rabsana.ir\/tutorials\/standardized-penetration-testing-methodologies-and-types\/#primaryimage"},"datePublished":"2021-08-23T15:30:26+00:00","dateModified":"2021-08-23T07:10:53+00:00","description":"\u0645\u0639\u0631\u0641\u06cc \u0648 \u0628\u0631\u0631\u0633\u06cc \u0645\u062a\u062f\u0647\u0627\u06cc \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f \u062a\u0633\u062a \u0646\u0641\u0648\u0630 \u0645\u062b\u0644 OWASP \u060cOSSTMM\u060c ISSAF\u060c PTES \u0648 NIST \u060c \u0628\u0631\u0631\u0633\u06cc \u0627\u0646\u0648\u0627\u0639 \u062a\u0633\u062a \u0646\u0641\u0648\u0630 Black Box\u060c Grey Box\u060c white box \u0648...","breadcrumb":{"@id":"https:\/\/rabsana.ir\/tutorials\/standardized-penetration-testing-methodologies-and-types\/#breadcrumb"},"inLanguage":"fa-IR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rabsana.ir\/tutorials\/standardized-penetration-testing-methodologies-and-types\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/rabsana.ir\/tutorials\/standardized-penetration-testing-methodologies-and-types\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u062e\u0627\u0646\u0647","item":"https:\/\/rabsana.ir\/tutorials\/"},{"@type":"ListItem","position":2,"name":"\u0645\u062a\u062f\u0647\u0627\u06cc \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f \u0648 \u0627\u0646\u0648\u0627\u0639 \u062a\u0633\u062a \u0646\u0641\u0648\u0630"}]},{"@type":"Article","@id":"https:\/\/rabsana.ir\/tutorials\/standardized-penetration-testing-methodologies-and-types\/#article","isPartOf":{"@id":"https:\/\/rabsana.ir\/tutorials\/standardized-penetration-testing-methodologies-and-types\/#webpage"},"author":{"@id":"https:\/\/rabsana.ir\/tutorials\/#\/schema\/person\/f95a0ac81e3ccf2f7b115822a7a815cd"},"headline":"\u0645\u062a\u062f\u0647\u0627\u06cc \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f \u0648 \u0627\u0646\u0648\u0627\u0639 \u062a\u0633\u062a \u0646\u0641\u0648\u0630","datePublished":"2021-08-23T15:30:26+00:00","dateModified":"2021-08-23T07:10:53+00:00","mainEntityOfPage":{"@id":"https:\/\/rabsana.ir\/tutorials\/standardized-penetration-testing-methodologies-and-types\/#webpage"},"wordCount":83,"commentCount":0,"publisher":{"@id":"https:\/\/rabsana.ir\/tutorials\/#\/schema\/person\/4ae2a08dbbdf43f1d2e6fe967155aa4b"},"image":{"@id":"https:\/\/rabsana.ir\/tutorials\/standardized-penetration-testing-methodologies-and-types\/#primaryimage"},"thumbnailUrl":"https:\/\/rabsana.ir\/tutorials\/wp-content\/uploads\/2021\/08\/Standardized-Penetration-Testing-Methodologies.webp","articleSection":["\u0622\u062e\u0631\u06cc\u0646 \u062a\u06a9\u0646\u0648\u0644\u0648\u0698\u06cc \u0647\u0627\u06cc \u06a9\u0627\u0645\u067e\u06cc\u0648\u062a\u0631"],"inLanguage":"fa-IR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/rabsana.ir\/tutorials\/standardized-penetration-testing-methodologies-and-types\/#respond"]}]},{"@type":"Person","@id":"https:\/\/rabsana.ir\/tutorials\/#\/schema\/person\/f95a0ac81e3ccf2f7b115822a7a815cd","name":"\u0645\u0647\u0633\u0627 \u0645\u062d\u0645\u062f\u06cc","image":{"@type":"ImageObject","@id":"https:\/\/rabsana.ir\/tutorials\/#personlogo","inLanguage":"fa-IR","url":"https:\/\/secure.gravatar.com\/avatar\/0910931d9fb93b2b6b0627aa03c9f1c6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0910931d9fb93b2b6b0627aa03c9f1c6?s=96&d=mm&r=g","caption":"\u0645\u0647\u0633\u0627 \u0645\u062d\u0645\u062f\u06cc"},"url":"https:\/\/rabsana.ir\/tutorials\/author\/mahsa-mhmdi\/"}]}},"_links":{"self":[{"href":"https:\/\/rabsana.ir\/tutorials\/wp-json\/wp\/v2\/posts\/3070"}],"collection":[{"href":"https:\/\/rabsana.ir\/tutorials\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rabsana.ir\/tutorials\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rabsana.ir\/tutorials\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/rabsana.ir\/tutorials\/wp-json\/wp\/v2\/comments?post=3070"}],"version-history":[{"count":1,"href":"https:\/\/rabsana.ir\/tutorials\/wp-json\/wp\/v2\/posts\/3070\/revisions"}],"predecessor-version":[{"id":3073,"href":"https:\/\/rabsana.ir\/tutorials\/wp-json\/wp\/v2\/posts\/3070\/revisions\/3073"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/rabsana.ir\/tutorials\/wp-json\/wp\/v2\/media\/3071"}],"wp:attachment":[{"href":"https:\/\/rabsana.ir\/tutorials\/wp-json\/wp\/v2\/media?parent=3070"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rabsana.ir\/tutorials\/wp-json\/wp\/v2\/categories?post=3070"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rabsana.ir\/tutorials\/wp-json\/wp\/v2\/tags?post=3070"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}