Penetration Testing Print Version
Penetration Testing Print Version
Marek Kumpošt
Penetration testing
https://www.kali.org/
Types of penetration testing
> What is the purpose and what is the timeframe for the testing?
> Who is authorized to know about the pentesting (IT, mngmt, ITsec.)?
> What documentation will you have (IP ranges, applications, DB, ...)?
Determining scope of a pentest (2/2)
> What are the conditions for the test to be immediately stopped?
> Are there any legal implications you should be aware of?
> Is social engineering (or physical security) also part of the pentest?
Most important part of any pentest?
www.tcpiputils.com
How do you get info you want?
> -Pn – skip host discovery (if i.e. firewall drops ping)
> -oA/G/X/N – output from nmap scan – good for import to msf
Usage of nmap
scripts
> db_nmap with options you would use with standard nmap
> You can search for CVEs related exploits directly in msf
Pentest reporting – general guidelines
- https://www.owasp.org/images/5/52/OWASP_Testing_Guide_v4.pdf
- https://www.owasp.org/index.php/Reporting
Thx…