Penetration Testing
Penetration Testing
By
(Student’s Name)
Tutor’s Name
Institution Affiliation
City/State
Due Date
Pen Testing 2
In today's modern world, when many organisations function digitally or online, penetration
testing is essential. Many companies have shifted their internal processes and corporate
operations online. It's possible that this was done to boost productivity and effectiveness. As a
result, hackers frequently target these corporations. This is clear from a report by IBM on Data
Breach Security (2021). Accidents now cost more money and are more difficult to contain. The
goal of developing tools and approaches by cybersecurity experts is to lessen the number of
attacks. One way employed is penetration testing procedures, which were developed primarily to
assess the system's overall security and find any holes that hackers could exploit (Das, 2019).
Black Box Testing: This testing blinds the testers to the target. System dynamics are the
major focus of penetration testing. The penetration tester will often create a network map
from their system observations. Because testers and developers work independently, this
testing technique is objective (Hamilton, 2019). Users, not developers, undertake this
type of testing. Test cases might be difficult to create without technical specifications. It
can take a long time to test every input stream, therefore numerous input channels may go
untested.
White Box Testing- This method is also used to test software for errors. The testing team
understands the application's internal structure. It verifies software components and finds
security vulnerabilities. Error detection, input path improvement, and code optimization
are the main benefits. White box testing, albeit vital, takes time. Professional expertise is
Grey Box Testing- This combines white-box and black-box testing. Because of this, the
testing team will only have a partial understanding of the system's structure (Hamilton,
2019). The testing group usually has full system access like other users. The benefits
come from evaluating systems from users' perspectives. It doesn't favour testers or
developers; thus it doesn't cause conflict between them. It's also hard to find bugs in
A penetration test's planning phase involves an in-depth investigation of the system's current
status and the best strategy to address the problem. An effective penetration test begins with
choosing the optimal strategy and methodology (Moradov, 2021). A SOP and Decision/Attack
tree are needed to standardise testing and quality control. During security test preparation, the
This report will outline the effective penetration testing methodologies for external attacks,
analyze them, and rate them on a scale of effectiveness. Given the tester's lack of familiarity with
the system and the fact that all they have been given as a guide is an IP address, black box testing
seems like the best option. It is crucial to determine the type of test to be conducted so that a
corresponding standard operating procedure (SOP) can be written, the proper penetration testing
Penetration Testing
Penetration testing evaluates security from a hacker's perspective (Core Security, 2019).
Penetration testing is used by businesses to prevent system and resource attacks. Also,
penetration testing finds and assesses network security problems before they may be exploited.
system vulnerabilities by simulating a violent assault (Scarfone et al., 2016). Data and
infrastructure protection need a well-defined method. Failure to adopt well-crafted ideas gives
corporations a false sense of security. The report covers OSSTM, OWASP, and Penetration
The Open-Source Security Testing Technique Manual that was developed for black box testing
(Rounsavall, 2017). Today, OSSTMM is frequently utilised for network security. This
methodology uses scientific methods to classify security controls. These strategies will improve
the business's efficiency and cost control. Scope, Channels, Indexes, and Vectors are the
technique's four essential components. Scope describes gathering information about the target's
surroundings. Channel will explain testing environment interactions. Channel will select a
specific set of security characteristics to analyse and specify throughout the evaluation phase.
(Packethub).
OSSTMM reduces false positive and negative values for more accurate security
measurements.
However, this method has drawbacks, though. OSSTMM is limited because it is used for
auditing. It provides no tolls or approaches for competing modules. Security experts may also
security (Agus et al., 2019). It gives numerous tools resources and guidelines, including includes
open-source licenses and OWASP testing guide. OWASP provides a comprehensive list of web
Advantages
Disadvantages
professionals to meet the need for an extensive and current penetration testing standard
Pen Testing 6
(GeeksforGeeks, 2019). It helps security specialists and organisations define and negotiate
successful projects by educating them about penetration tests. The Penetration Testing Execution
Standard provides a complete penetration testing platform and it's meant to streamline testing
and reporting. The PTES standard consists of seven phases: Planning, gathering information,
Advantages
PTES helps testers choose the best penetration testing method for their organisation. It can be
A Standard Operating Procedure (SOP) for a pen test is a formal document that details the steps
a pen tester must take. It entails writing a set of instructions, but in this instance, we'll be
conducting a SOP employing Penetration Testing Execution Standard approaches (Vigzy, 2021).
The PTES standard operating procedure is broken down into the following phases.
Pen Testing 7
An attack tree is a visual depiction of the sequence of events that will take place during an attack,
however we will be creating our own Decision Tree Analysis for a Penetration Test.
The NIST methodology, which aims to offer a pictorial depiction of the processes required for
1. Planning is the procedure of coming up with ideas for the pen testing-related tasks that
2. Discovery - This entails gathering the data that was discovered in order to perform out
3. Attack – Using the strategy and data gathered during the earlier phases, the pen tester
4. Reporting - The method of constructing a test report using data from the NIST Decision
Tree.
The attack tree has been established and subsequently developed using the NIST example, as
It may be claimed that an IP address was given during the planning phase. Utilizes the IP address
subsequent to the Discovery phase to learn more about the victim. If any further flaws are
discovered during the Attack phase, they are logged into the Discovery phase before continuing
with the Attack phase until none are discovered. The last section of the report contains all the
statistics and information acquired during the various stages of the more advanced NIST
References List
Agus, I., Pratama, E., Bagus, A. and Wiradarma, A. (2019). Computer Network and Information
doi:10.5815/ijcnis.2019.07.02.
Core Security (2019). Penetration testing for IT infrastructure. [online] Core Security. Available
at: https://www.coresecurity.com/penetration-testing.
Das, R. (2019). The Types of Penetration Testing [Updated 2019]. [online] Infosec Resources.
testing/.
ptes/.
Hamilton, T. (2019). What is BLACK Box Testing? Techniques, Example & Types. [online]
Moradov, O. (2021). Security Testing: Types, Tools, and Best Practices. [online] Bright Security.
https://www.sciencedirect.com/topics/computer-science/open-source-security-testing-
methodology-manual.
Pen Testing 10
Scarfone, K., Souppaya, M., Cody, A. and Orebaugh, A. (2016). Special Publication 800-115
https://www.govinfo.gov/content/pkg/GOVPUB-C13-
894df23cbad6ad74af7d49c17b081dd1/pdf/GOVPUB-C13-
894df23cbad6ad74af7d49c17b081dd1.pdf.