The Pentesting Matrix Decoding Traditional and Modern Approaches
The Pentesting Matrix Decoding Traditional and Modern Approaches
Decoding Traditional
! 12 vulnerability reports
and Modern
C OM P LE T E T E ST
Completed
excom.com – 1 3 2 – 6
api.excom.com 1 1 1 – – 3
payments.excom.com – – – – – 0
Total 1 2 4 2 0 9
Information Disclosure – – 1 – – 1
S ecurity Misconfiguration – – – 1 – 1
P v ri ilege Escalation 1 – – – – 1
Total 1 2 4 2 – 9
# 171872 Reflected XXS on profile page Medium (4.3) Cross-Site Scripting (XSS)
Pentesters # 171873 Reflected XXS in search bar Medium (4.3) Cross-Site Scripting (XSS)
# 171875 Reflected XXS in login form (POST) Medium (4.3) Cross-Site Scripting (XSS)
Pentest Progress
SC O P E See where you’re at in your pentest
Scoping
1 domain, 1 Android, 1 iOS
Contents
Introduction 03
Pentesting Objectives 04
Pentesting Options 05
Effectiveness 09
Efficiency 10
Value 11
Modern pentesting approaches use freelance security researchers and compliance standards, and use diverse tester talent for
advanced software platforms to streamline the process. However, with a well-rounded view.
it’s important to make sure that the pentest offering you choose
provides you both the compliance and verification you need and the Efficiency
do organizations pinpoint the ideal pentest for their needs? This eBook Value
Compliance Meeting customer Mergers and acquisitions Internal governance Supporting software and
requirements product development
Every industry has compliance Security assessments have As businesses grow and mature,
Organizations need more frequent
frameworks dictating security Organizations often partner with become an integral part of the their internal stakeholders
and thorough pentests that
measures. Regulations like entities maintaining high security due diligence process for demand evidence of rigorous
deliver timely information to
FedRAMP, NIST, and CISA mandate standards. Even if auditors don't organizations acquiring others
security practices. Ensuring
support rapid development cycles
annual pentests. E-commerce request pentests, customers may or being acquired. Pentests
regular pentests not only
and allow collaboration between
follows PCI DSS, healthcare abides due to the interconnected risks of are a critical component of
demonstrates a proactive
security and development teams.
by HIPAA, while SaaS vendors use digital networks. Consequently, these audits, both as a point-
stance on security but also
Ideally, organizations choose a
SOC 2 and ISO certifications. All of before finalizing deals, businesses in-time practice and as part
strengthens trust with the
combination of external
these frameworks incorporate increasingly seek recent security of a continuous security
board and audit committees.
pentesting and internal controls
regular security assessments. documentation like SOC 2 or
testing program.
that supports existing
6-month-old pentest reports. development workflows (e.g.,
DevOps or CI/ CD pipelines) and
reliably delivers secure code
to production.
There are many ways to assess software security, especially when it's
Traditional consultancy pentesting refers to pentesting services delivered by
nearing production. To help you navigate these options, we've broken professional service providers, primarily leveraging their in-house salaried pentesters
or long-term contractors.
down four key techniques in the upcoming sections. For each, you'll find
assessments
Ability to provide on-site
real-time insights
No dynamic platform—
resulting in delays in
vulnerability disclosure,
to threats
Traditional PTaaS refers essentially to traditional pentesting with an added user Community-driven PTaaS represents a modern evolution of pentesting, harnessing
interface. the collective expertise of a global community of vetted security researchers.
Unlike traditional, ad-hoc pentesting, it offers continuous, on-demand testing Using a SaaS delivery model, it provides immediate results and fosters enhanced
This model primarily leverages in-house salaried pentesters or long-term contractors. This method not only adheres to regulatory mandates but also cultivates a
Pros: Structured methodology that Cons: May not be as agile or Pros: Seamless access to top-tier Cons: Requires stringent vetting
aligns with certain regulatory adaptive to emerging threats pentester expertise standards to ensure that the
Automated pentesting, including autonomous approaches powered by generative AI (GenAI) algorithms and
advanced machine learning models, uses predefined scripts or tools to systematically scan and assess systems for
This method rapidly identifies “known unknowns” and can be deployed frequently to ensure consistent security checks.
Pros: Provides always-on coverage at a very Cons: Limited acceptance of test results by auditors
attack surfaces
ROI Focus
Performance/Value Value
Risk Reduction
Due to scheduling constraints and Structured reports highlight Relies on the individual skills and Comprehensive security assessment
In pentesting, effectiveness measures the varying expertise, pentest outcomes vulnerabilities and recommend fixes.
expertise of the pentester.
through established methodologies.
5
can fluctuate.
impact of the testing process and outcomes, Ensures alignment with regulatory Varying availability of highly The 9-to- employee structure
Traditional
Depth and relevance depend on and governance standards. experienced or seasoned pentesters.
results in a slower response to
guaranteeing that the tests yield meaningful,
Pentest whether a highly skilled or less emerging threats.
technologies.
threats.
precision, and thorough nature of a modern
organization's security posture. Due to scheduling constraints and Dynamic reports with actionable Relies on the individual skills and Comprehensive security assessment
5
can fluctuate.
Ensures deep analysis and up-to- Varying availability of highly The 9-to- employee structure
Traditional
Depth and relevance depend on date compliance adherence. experienced or seasoned pentesters.
results in a slower response to
significance of vulnerabilities discovered emerging, niche threats and testing scenarios and emerging
technologies. threats.
and the potential impact, emphasizing
on the clarity and actionability of the final Methodology-driven nature and Dynamic reports with actionable Through a rotational approach, each Expansive security coverage,
scenarios
Talent Diversity: Reflects the diverse
the capability to rotate across tests Continuously scans for known Reporting tends to be generic W hile some human oversight and Heavily relies on advanced
O
Coverage & Versatility: Demonstrates
analysis.
primary focus is on automation. scanning and vulnerability
Au
ften misses novel or intricate issues
q
identification.
the thoroughness of the pentest across tomated that re uire human intuition. Effectively identifies known
Lw
o Lw
o Lw
o Moderate
Time-intensive and project- Establishing the severity of No collaboration or Real-time platform During initial scoping, it s'
In the context of pentesting, efficiency is not just based, initiating can take vulns can become a communication until the integrations are often challenging to predict
Faster setup and systematic Real-time results and O ffers a structured O ffers a set of predefined The platform facilitates the
approach compared to analytics delivered via the communication flow through integrations with S C
DL tools.
process.
q
combination of human
ease and speed with which pentesting Traditional
Platform capabilities and Direct communication with newer technologies, re uiring delays.
expertise and platform
PTaaS expert insights enhance the project manager might manual workarounds.
capabilities.
services can be procured, set up, and
understanding and taking be limited.
-
Leveraging a community
S C
combination of human and development teams.
timely decisions Community Platform capabilities and Promotes seamless DL makes it typically faster to
v S
expertise and platform
dri en PTaaS expert insights enhance upported by chat workflows to accelerate validate fixes.
S
capabilities.
Communication: Ensures proactive and understanding and taking capabilities and lack remediation.
Platform Integrations: Highlights the Very rapid and continuous Provides real-time While some human Can be integrated with Automation allows swift re-
focus is on automation.
Automated
workflows from detection human insights.
technologies, ensuring a unified find-to-
Pentest to action.
fix workflow
Involves thorough, in-depth Long-term costs are higher because Meets compliance mandates In-house insured pentesters.
Activated on demand, providing Provides a balanced cost-to-value Primarily aligns with compliance and In-house insured pentesters.
the testing process to different scales, Traditional Scalability challenges due to a Platform delivers detailed metrics, security needs. coverage being exceptional.
the incurred costs scalable options tailored to an ratio through predictable SaaS mandates and proactive security
Pentesters are background checked,
organization's depth requirements.
pricing and continuous insights.
needs.
driven PTaaS assessments. trend analytics, and benchmarks, capabilities for holistic risk reduction. company.
both
of security breaches and how the Easy to set up, scale, and automate Heavily automated, these platforms Limitations in meeting compliance Does not offer liability coverage for
Auto mated False positives from automated proactive security needs, due to
The Power of Community- of HackerOne Pentest customers value HackerOne pentesters’ ability
driven PTaaS
18%
of HackerOne Pentest findings are high or critical severity—
which is nearly double the industry standard.
approach tailored to meet an organization's unique requirements, and HackerOne Pentest Efficiency
is competitively priced. Community-driven PTaaS is the premier choice
for comprehensive testing combined with in-depth analysis, all while 4 New customers can initiate a new pentest in 4 business days.
days
ensuring a swift setup and completion of the assessment.
HackerOne Pentest combines the convenience of a centralized platform 4.4
HackerOne Pentest customers receive their first vulnerability report
within 4.4 days on average.
days
with the expertise of our pentester community to excel in all three
“Through 120 dedicated hours with 3 testers from HackerOne 8,500+ vulnerabilities have been found via HackerOne Pentest in three years.
effectively.”
Toan Ha achieve compliance for multiple frameworks through one streamlined platform.
Katalon Inc.
HackerOne Attack
! 12 vulnerability reports
COMPLETE
Best-in-Class PTaaS
May 18, 2023
api.excom.com 1 1 1 – – 3
payments.excom.com
Total
–
1
–
2
–
4
–
2
–
0
0
9
Pentest Progress
Table 1: Severity of findings by asset
Security Misconfiguration – – – 1 – 1
Privilege Escalation 1 – – – – 1
Total 1 2 4 2 – 9
support from experienced technical engagement managers Report ID Title Severity (CVSS) Weakness (CWE)
Lead Pentester #171870 Stored wormable XXS in share widget High (8.0) Cross-Site Scripting (XSS)
#171872 Reflected XXS on profile page Medium (4.3) Cross-Site Scripting (XSS)
Pentesters #171873 Reflected XXS in search bar Medium (4.3) Cross-Site Scripting (XSS)
SCOPE
Prepared By
and coverage.
testing needs.
returning customers enjoying a faster, tailored process. Initial “HackerOne’s pentest capability has helped us identify ways to
reports are typically ready in under a week, and final reports follow strengthen our products by uncovering inconsistencies we may
within 3-5 business days, highlighting HackerOne's commitment to not have been alerted to previously.”
Dallan Wagner
The expansive network of security experts ensures swift
Senior Product Security Engineer
responsiveness to new technologies and emerging threats, such as
CUSTOMER LED
set p on ac er ne
u H k O , platfor . m phase. notified. v lnera ilities.
u b sec rit testing progra s.
u y m
with o r tea
y u m
questions. Expect consistent Yo can then
u Locate the relevant Utili e the cloning feat re
z u
m e ers.
mb Slac pdates fro
k u m sec rel do nload
u y w tic et in o r
k y u to d plicate pentests
u ;
Tailor o r pentest
y u testers regardless of
, yo r co prehensive
u m H ac er ne in ox and
k O b m ini i e an al entries.
m z m u
w or flo s sing
k w u v lnera ilit detection.
u b y report via the initiate a retest
platfor integrations
m , H ac er ne platfor .
k O m thro gh the action ar.
u b
Exa ine res lts on o r
m u y u
triggers and AP s.
, I
dash oards to strategicall
b y
hackerone led
W e eval ate o r
u y u W ith prepped assets A technical An detected
y Y o r dedicated T M offers a de rief call post testing.
u E b - T Ms assist c sto ers
E u m
Receive a ote qu
environ ent set p.
m u
tailored to o r y u
re ire ents.
qu m pentest tea is staffed
m
and a to aticall
u m y
start.
48 hours to 7 business days 30-MINUTE CALL 2 weeks testing Final report in 3–5 business days after testing Ongoing
UP TO 3 DAYS STAFFING Slack updates every 3–5 days 30–90 days for retesting
HackerOne’s Trusted
8500+ 11 valid
Pentester Team vulnerabilities uncovered by the vulnerabilities are reported
are available at all times and introduce a dynamic rotation of skill sets with each
+70%
test. Owing to this structure, the HackerOne platform delivers insights of
of our customers value pentesters’
consistently superior quality compared to other pentesting methods and vendors.
abilities in finding elusive vulnerabilities.
community. Only those displaying exceptional skill, outstanding productivity,
Pentesting and Industry Experience
and impeccable conduct move forward to levels qualified for participation in
HackerOne's PTaaS programs. This elite group comprises less than 10% of
those registered on the platform, representing the pinnacle of global security 3 years
3-5 years
5-10 years
Leandro
Miguel Regala
Trev
22.3%
(none_of_the_above) (fisher) (SoWhatSec)
Leonel
Joel
Rodrigo
Bug bounty programs yield superior results over time due to a These programs allow organizations to access the ethical
stochastic model, making them an optimal choice for organizations hacking and security researcher community to continuously
striving for comprehensive, ongoing testing that encompasses a improve their systems' security posture. Bounties complement
diverse set of security researchers. The long-term value of this existing security controls and pentesting by exposing
approach is evident in the lower average cost per discovered vulnerabilities that automated scanners might miss and
vulnerability, as well as leading global companies’ commitment incentivizing security researchers to emulate potential bad-
bounty programs.
In contrast, pentests deliver immediate results through a select continuous, proactive vulnerability discovery and in-depth,
group of security researchers. These experts, compensated for their time-bound testing.
assurance is required.
HackerOne
Comprehensive,
Targeted, often-immediate need to
Purpose
Whether you start with a pentest or implement ongoing testing to ensure ensure compliance and proactive
both. Both methods utilize HackerOne's Attack Results Superior over time Predictable and
contact you.
Mar 5, 2023 – Mar 20, 2023
Quality of How deep does the analysis go? Does it uncover both surface-level and deep-
Pentesting Findings
rooted vulnerabilities?
Evaluation Matrix Beyond identifying vulnerabilities, does the approach offer insights on potential
business impact?
Human-centric vs.
How well does the approach balance human expertise and platform
security testing options presented in this
capabilities?
Platform-centric
eBook: traditional pentesting, traditional
How intuitive is the platform or interface for managing pentests?
determine whether their focus is on Is there a capability for continuous testing or periodic checks?
Talent How does the approach ensure the expertise and qualifications of its pentesters?
decide on the most suitable path for their
Does the approach incorporate a diversified set of skills and experiences from its
talent pool?
Performance How long does it take to scope and launch a pentest? l bility
Sca a Is there a capability for continuous testing or periodic checks?
How quickly after initiation is the first set of findings received? Can the frequency of these checks be adjusted based on organizational
Pentestin g
How does the cost of the service compare with the perceived value and
How easy is it to adjust or expand the scope of testing?
ROI results delivered?
’
Are metrics and benchmarks provided to quantify the pentest s impact?
How many years of experience does the TEM have in overseeing pentests?
Risk
-
How effectively does the solution mitigate compliance driven risks?
How quickly does the support team respond to queries or concerns? Reduction Is there a balance between meeting compliance mandates and
- ,
Are post engagement support services offered such as guidance on
proactively addressing technical vulnerabilities?
vulnerability remediation?
What channels are available for support communication (e g . ., Slack, Liability Does the solution offer any guarantees or assurances against
, ,
email chat phone)?
Assurance breaches?
How experienced is the support team in handling unique or How is liability distributed between the service provider and the
Feedback &
How seamlessly does the method integrate with existing systems tools , ,
Integrations and workflows?
-
Is there real time collaboration and reporting between teams and
pentesters?
Retesting ,
How easy is it to initiate a retest especially after remediation?
Challenge:
Appendix B: Unlocking PTaaS Value and More Slow, traditional pentesting with insufficient reports led to gaps in testing
Pentests
As a world leader in digital products, solutions, and software, with over 10,000 Security was not included early enough in development, leading to
(including 86% of the Fortune 500) with a broad portfolio offering and regularly No formal process was in place for reporting vulnerabilities, exposing the
With a business transformation in full swing, Zebra needed to double down on SOLUTION: A collaborative partner that works closely with Zebra to keep its attack
its security approach. Each new product or acquisition increased the potential HackerOne surface covered
for unknown assets that could cause gaps, making them more vulnerable to Pentest
The ability to spin up rapid pentests with findings that go beyond .
via PTaaS
breaches and security risks. Traditional pentesting provided some coverage, but traditional scanners
the tests took time to spin up and were costly. Seeking a better solution, Zebra On-demand reports and feedback that help Zebra drive root causes back
A Scalable,
combined with PTaaS.
Pentests give them visibility into findings in real time, allowing them to fix
Security-First
and retest while the test is ongoing.
Mindset
Read the full Zebra + HackerOne story.
Teams can immediately plan efforts to remediate any weak spots.
Speed and security of delivery practices support revenue and lower risk.
all these benefits have lead to accolades from the “HackerOne can stand up our pentests three to five times faster than
executive team, developers, and customers.” traditional firms.”
Dr. Jasyn Voshell, Dir. of Product and Solution Security, Zebra Dr. Jasyn Voshell, Dir. of Product and Solution Security, Zebra
Trusted by
Contact Us