CPENT Module 13 Binary Analysis and Exploitation
CPENT Module 13 Binary Analysis and Exploitation
Penetration Tester:
Organization:
Date: Location:
Target Organization
URL
Application/Program
Tested
Commands Used
Any Other 1.
Information
2.
Collected
3.
4.
5.
Tools/Services Used 1.
2.
3.
4.
5.
Results Analysis:
Target Organization
URL
Application/Program
Tested
Commands Used
List of Discovered 1.
Binaries
2.
3.
4.
5.
Tools/Services Used 1.
2.
3.
4.
5.
Results Analysis:
Target Organization
URL
Application/Program
Tested
Commands Used
Are there any noticeable strings containing sensitive data such as Yes No
hardcoded passwords?
Specify sensitive data 1.
stored in strings
2.
3.
4.
5.
Information Collected
Type of Data Headers Compositions Strings Entry Points
1.
2.
3.
4.
5.
6.
Data Format
Tools/Services Used 1.
2.
3.
4.
5.
Results Analysis:
Target Organization
URL
Commands Used
Tools/Services Used 1.
2.
3.
4.
5.
Results Analysis:
Target Organization
URL
Commands Used
Tools/Services Used 1.
2.
3.
4.
5.
Results Analysis:
Target Organization
URL
Commands Used
External Location
Address of the
Environment
Variable
Tools/Services Used 1.
2.
3.
4.
5.
Results Analysis:
Target Organization
URL
Commands Used
Tools/Services Used 1.
2.
3.
4.
5.
Results Analysis: