Pentest Workplan: Information Gathering and Vulnerability Analysis
Pentest Workplan: Information Gathering and Vulnerability Analysis
Pentest Workplan: Information Gathering and Vulnerability Analysis
IT DEPARTMENT
We have been tasked with checking for vulnerabilities on servers
BACKGROUND
Penetration testing execution standard consists of seven (7)
main sections. These cover everything related to a penetration
test - from the initial communication and reasoning behind a
pentest, through the intelligence gathering and threat modeling
phases where testers are working behind the scenes in order to
get a better understanding of the tested organization, through
vulnerability research, exploitation and post exploitation,
where the technical security expertise of the testers come to
play and combine with the business understanding of the
engagement, and finally to the reporting, which captures the
entire process, in a manner that makes sense and provides the
most value to it.
Pre-engagement Interactions
Intelligence Gathering
Threat Modeling
Vulnerability Analysis
Exploitation
Post Exploitation
Reporting
SCOPE OF PENTEST
TYPE OF PENTESTS
We will run tools and technology that will allow us to execute
the following, but not limited to, types of attacks.
Kali Linux:
Kali Linux is a Debian-derived Linux distribution designed for
digital forensics and penetration testing. It is maintained and
funded by Offensive Security Ltd.
PentestBox:
Is a tool that allows security software packages to be run
natively from windows without using virtual machine or dualboot
environments in windows.
Blackarch:
BlackArch Linux is an Arch-derived Linux distribution designed
for penetration testing and security research. It may be used as
a standalone live CD or live USB, run from a virtual machine, or
be installed to a computer's hard disk.
OS TOOLS
TESTING STRATEGY
GSS IT team does not have a security protocol or best practices
for penetration testing so we will use open source tools that
automate the process.
HARDWARE
Testing will be done with company assigned hardware.
TEAM
To be assigned by IT Director