You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: current-version/2-Process/2-4-Operation/2-4-3-Pentest.md
+33-12Lines changed: 33 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
### Penetration Test
2
2
3
-
A penetration test, or pen test, is a simulated attack on systems and applications to identify exploitable vulnerabilities. It involves attempting to breach web and mobile applications, APIs, network devices, workstations, servers, and more, uncovering issues like SQL injection, code injection, XSS, and privilege escalation.
3
+
A penetration test, or pen test, is a simulated attack on systems and applications to identify exploitable vulnerabilities. It involves attempting to breach web and mobile applications, APIs, network devices, workstations, servers and more, uncovering issues like SQL injection, code injection, XSS and privilege escalation.
4
4
5
5
While penetration testers use automated tools for scanning and information gathering, most testing is conducted manually. Manual testing is crucial for detecting vulnerabilities related to business logic and other issues that automated scans might miss.
6
6
@@ -16,11 +16,11 @@ A penetration test can be approached in three ways: black-box, gray-box, or whit
16
16
17
17
Regardless of the approach, penetration testers will generally follow publicly-available and/or internal checklists and testing guides. The most popular ones are:
18
18
19
-
-[OWASP Web Security Testing Guide (WSTG)](https://owasp.org/www-project-web-security-testing-guide/) - a comprehensive guide to testing the security of web applications and web services.
20
-
-[OWASP Mobile Application Security Testing Guide (MASTG)](https://mas.owasp.org/MASTG/) - similar to the OWASP WSTG, it is a comprehensive guide to testing mobile applications.
21
-
-[OWASP Top 10](https://owasp.org/www-project-top-ten/) - most common and impactful web application security vulnerabilities.
22
-
-[OWASP Top 10 API](https://owasp.org/API-Security/editions/2023/en/0x11-t10/) - most common security risks and vulnerabilities for APIs.
23
-
-[OWASP Mobile Top 10](https://owasp.org/www-project-mobile-top-10/) - a list containing the most common and impactful mobile application security vulnerabilities.
19
+
-[OWASP Web Security Testing Guide (WSTG)](https://owasp.org/www-project-web-security-testing-guide/) - A comprehensive guide to testing the security of web applications and web services.
20
+
-[OWASP Mobile Application Security Testing Guide (MASTG)](https://mas.owasp.org/MASTG/) - Similar to the OWASP WSTG, it is a comprehensive guide to testing mobile applications.
21
+
-[OWASP Top 10](https://owasp.org/www-project-top-ten/) - Most common and impactful web application security vulnerabilities.
22
+
-[OWASP Top 10 API](https://owasp.org/API-Security/editions/2023/en/0x11-t10/) - Most common security risks and vulnerabilities for APIs.
23
+
-[OWASP Mobile Top 10](https://owasp.org/www-project-mobile-top-10/) - A list containing the most common and impactful mobile application security vulnerabilities.
24
24
25
25
### Process Overview
26
26
@@ -38,20 +38,41 @@ After assembling the penetration testing team, the organization must meticulousl
38
38
- Define the requirements - e.g. testing accounts, credentials, documentation, etc.
39
39
40
40
#### Requirements
41
-
Once the scope and dates are defined, the penetration testing team will communicate their requirements to the organization. These may include testing credentials, application documentation, source code access, and other necessary resources. It is crucial for the organization to promptly provide all requested information and access before testing begins to ensure a smooth and effective penetration testing process.
41
+
Once the scope and dates are defined, the penetration testing team will communicate their requirements to the organization. These may include testing credentials, application documentation, source code access and other necessary resources. It is crucial for the organization to promptly provide all requested information and access before testing begins to ensure a smooth and effective penetration testing process.
42
42
43
43
#### Execution
44
+
After receiving the necessary requirements, such as credentials and documentation, the penetration testing team will begin assessing the system or application. It is crucial for the penetration testing team to:
44
45
46
+
- Notify the organization immediately if their tests cause any disruption to a system, especially if it is in production, to mitigate potential impacts on business operations.
47
+
- Report any critical vulnerabilities discovered promptly to the organization, as these could have significant financial and/or reputational consequences, allowing for swift remediation and risk management.
48
+
- If the penetration testing team finds any indicators of compromise (IoC) that an incident may have happened, they must notify the organizatio immediately.
45
49
46
-
#### Reporting
47
50
51
+
#### Reporting
52
+
Upon completing all tests, the penetration testing team will begin compiling a comprehensive report. This report should be structured as follows:
53
+
54
+
- Cover
55
+
- Table of Contents
56
+
- General Information
57
+
- Penetration Testing Team
58
+
- Methodology
59
+
- Scope
60
+
- Executive Summary
61
+
- Vulnerabilities
62
+
- Title
63
+
- Severity
64
+
- Description
65
+
- Impact
66
+
- Mitigation
67
+
- References
68
+
- Conclusion
48
69
49
70
### Tools
50
71
There are several tools that can help while performing penetration test against applications. The most common are:
51
-
-[BurpSuite](https://portswigger.net/burp) - a comprehensive software tool used for web application security testing. Key features include a proxy for intercepting and modifying web traffic, a scanner for automated vulnerability detection, and tools for performing manual testing, such as repeater, intruder, and so forth.
52
-
-[OWASP ZAP](https://www.zaproxy.org) - an open-source tool similar to BurpSuite.
53
-
-[Postman](https://www.postman.com/) - API testing tool that allows sending various HTTP requests, manipulating headers, and automating tests. It helps identify vulnerabilities like authentication issues and data exposure, integrating with other security tools for comprehensive analysis.
54
-
-[MobSF](https://github.com/MobSF/Mobile-Security-Framework-MobSF) - automated, open-source tool for security testing and analyzing mobile applications, supporting both Android and iOS platforms.
72
+
-[BurpSuite](https://portswigger.net/burp) - A comprehensive software tool used for web application security testing. Key features include a proxy for intercepting and modifying web traffic, a scanner for automated vulnerability detection and tools for performing manual testing, such as repeater, intruder and so forth.
73
+
-[OWASP ZAP](https://www.zaproxy.org) - An open-source web proxy similar that has features similar to BurpSuite's.
74
+
-[Postman](https://www.postman.com/) - API testing tool that allows sending various HTTP requests, manipulating headers and automating tests. It helps identify vulnerabilities like authentication issues and data exposure, integrating with other security tools for comprehensive analysis.
75
+
-[MobSF](https://github.com/MobSF/Mobile-Security-Framework-MobSF) - Automated, open-source tool for security testing and analyzing mobile applications, supporting both Android and iOS platforms.
0 commit comments