VAPT Methodology Report
VAPT Methodology Report
Preparation
In this phase, a formal contract is signed which also contains a Non-Disclosure Agreement. The contract also
outlines infrastructure perimeter, evaluation activities, time schedules and resources available to a tester.
Scanning
After gathering the preliminary information we will identify systems that are alive and reachable via the
Network/Internet, and what services they offer. We define the Scan policy for each target, we perform
followings activities based on the architecture and complexity of the network.
Enumeration
Enumeration involves active connections to systems and directed queries,
Type of information enumerated by tester:
Vulnerability Analysis
Vulnerability Analysis is the act of determining which security holes and vulnerabilities may be applicable to the
target network or host.
Step 2: Classify the vulnerabilities discovered within the environment spanning – Technical, Organizational and
Process issues; into categories of High, Medium, and Low risk.
Step 3: Perform impact analysis of the vulnerabilities discovered and threats arising thereof, per se the client’s
IT architecture.
Submission of Reports
Step1: Detailed explanations of the implications of findings, impacts, and risks for each of the identified
vulnerabilities.
Step 2: Recommended Action Items including immediate fixes, policy recommendations and product
recommendations for improving the overall network security.
Step 3: An executive summary highlighting key findings and recommendations from a security perspective.
Planning
Step 1: Identify key vulnerabilities to be exploited
Step 2: Prepare a list of acceptable testing techniques (Ex: Password cracking, Denial of service, etc.) and
research exploits to be launched
Step 3: Ascertain the times when the testing is to be conducted (Ex: During business hours, after business
hours, etc.)
Step 5: Determine IP addresses of the machines from which penetration testing will be conducted so that the
client can differentiate the legitimate penetration testing attacks from actual malicious attacks
Exploitation
Our approach is to review the list of vulnerabilities collected in the VA stage and sort them by likelihood of
success and potential harm to the target network to see which may be helpful in our exploitation efforts.
We examine the list of known vulnerabilities and potential security holes on the various target hosts and
determine which are most likely to be fruitful.
Next we pursue exploiting those vulnerabilities to gain access on the target system. Primary targets are open
ports and potentially vulnerable applications.
Nmap
Nessus
GFI LanGuard
Retina
Metasploit
Cleaning Up
Remove all testing traces of compromised systems based on the detailed and exact list of all actions
performed during the penetration test; returning the system and any compromised systems to the exact
configurations that they had prior to the penetration test.
Reporting
Step 1: Detailed explanations of the implications of findings, impacts and risks for each of the
identified vulnerabilities.
Step 2: Recommended Action Items including immediate fixes, policy Recommendations and
product recommendations for improving the overall network security.
Step 3: An executive summary highlighting key findings and recommendations from a security
perspective