Skip to content

Commit c676278

Browse files
authored
Update 2-4-3-Pentest.md
1 parent ccc26a8 commit c676278

1 file changed

Lines changed: 33 additions & 12 deletions

File tree

current-version/2-Process/2-4-Operation/2-4-3-Pentest.md

Lines changed: 33 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
### Penetration Test
22

3-
A penetration test, or pen test, is a simulated attack on systems and applications to identify exploitable vulnerabilities. It involves attempting to breach web and mobile applications, APIs, network devices, workstations, servers, and more, uncovering issues like SQL injection, code injection, XSS, and privilege escalation.
3+
A penetration test, or pen test, is a simulated attack on systems and applications to identify exploitable vulnerabilities. It involves attempting to breach web and mobile applications, APIs, network devices, workstations, servers and more, uncovering issues like SQL injection, code injection, XSS and privilege escalation.
44

55
While penetration testers use automated tools for scanning and information gathering, most testing is conducted manually. Manual testing is crucial for detecting vulnerabilities related to business logic and other issues that automated scans might miss.
66

@@ -16,11 +16,11 @@ A penetration test can be approached in three ways: black-box, gray-box, or whit
1616

1717
Regardless of the approach, penetration testers will generally follow publicly-available and/or internal checklists and testing guides. The most popular ones are:
1818

19-
- [OWASP Web Security Testing Guide (WSTG)](https://owasp.org/www-project-web-security-testing-guide/) - a comprehensive guide to testing the security of web applications and web services.
20-
- [OWASP Mobile Application Security Testing Guide (MASTG)](https://mas.owasp.org/MASTG/) - similar to the OWASP WSTG, it is a comprehensive guide to testing mobile applications.
21-
- [OWASP Top 10](https://owasp.org/www-project-top-ten/) - most common and impactful web application security vulnerabilities.
22-
- [OWASP Top 10 API](https://owasp.org/API-Security/editions/2023/en/0x11-t10/) - most common security risks and vulnerabilities for APIs.
23-
- [OWASP Mobile Top 10](https://owasp.org/www-project-mobile-top-10/) - a list containing the most common and impactful mobile application security vulnerabilities.
19+
- [OWASP Web Security Testing Guide (WSTG)](https://owasp.org/www-project-web-security-testing-guide/) - A comprehensive guide to testing the security of web applications and web services.
20+
- [OWASP Mobile Application Security Testing Guide (MASTG)](https://mas.owasp.org/MASTG/) - Similar to the OWASP WSTG, it is a comprehensive guide to testing mobile applications.
21+
- [OWASP Top 10](https://owasp.org/www-project-top-ten/) - Most common and impactful web application security vulnerabilities.
22+
- [OWASP Top 10 API](https://owasp.org/API-Security/editions/2023/en/0x11-t10/) - Most common security risks and vulnerabilities for APIs.
23+
- [OWASP Mobile Top 10](https://owasp.org/www-project-mobile-top-10/) - A list containing the most common and impactful mobile application security vulnerabilities.
2424

2525
### Process Overview
2626

@@ -38,20 +38,41 @@ After assembling the penetration testing team, the organization must meticulousl
3838
- Define the requirements - e.g. testing accounts, credentials, documentation, etc.
3939

4040
#### Requirements
41-
Once the scope and dates are defined, the penetration testing team will communicate their requirements to the organization. These may include testing credentials, application documentation, source code access, and other necessary resources. It is crucial for the organization to promptly provide all requested information and access before testing begins to ensure a smooth and effective penetration testing process.
41+
Once the scope and dates are defined, the penetration testing team will communicate their requirements to the organization. These may include testing credentials, application documentation, source code access and other necessary resources. It is crucial for the organization to promptly provide all requested information and access before testing begins to ensure a smooth and effective penetration testing process.
4242

4343
#### Execution
44+
After receiving the necessary requirements, such as credentials and documentation, the penetration testing team will begin assessing the system or application. It is crucial for the penetration testing team to:
4445

46+
- Notify the organization immediately if their tests cause any disruption to a system, especially if it is in production, to mitigate potential impacts on business operations.
47+
- Report any critical vulnerabilities discovered promptly to the organization, as these could have significant financial and/or reputational consequences, allowing for swift remediation and risk management.
48+
- If the penetration testing team finds any indicators of compromise (IoC) that an incident may have happened, they must notify the organizatio immediately.
4549

46-
#### Reporting
4750

51+
#### Reporting
52+
Upon completing all tests, the penetration testing team will begin compiling a comprehensive report. This report should be structured as follows:
53+
54+
- Cover
55+
- Table of Contents
56+
- General Information
57+
- Penetration Testing Team
58+
- Methodology
59+
- Scope
60+
- Executive Summary
61+
- Vulnerabilities
62+
- Title
63+
- Severity
64+
- Description
65+
- Impact
66+
- Mitigation
67+
- References
68+
- Conclusion
4869

4970
### Tools
5071
There are several tools that can help while performing penetration test against applications. The most common are:
51-
- [BurpSuite](https://portswigger.net/burp) - a comprehensive software tool used for web application security testing. Key features include a proxy for intercepting and modifying web traffic, a scanner for automated vulnerability detection, and tools for performing manual testing, such as repeater, intruder, and so forth.
52-
- [OWASP ZAP](https://www.zaproxy.org) - an open-source tool similar to BurpSuite.
53-
- [Postman](https://www.postman.com/) - API testing tool that allows sending various HTTP requests, manipulating headers, and automating tests. It helps identify vulnerabilities like authentication issues and data exposure, integrating with other security tools for comprehensive analysis.
54-
- [MobSF](https://github.com/MobSF/Mobile-Security-Framework-MobSF) - automated, open-source tool for security testing and analyzing mobile applications, supporting both Android and iOS platforms.
72+
- [BurpSuite](https://portswigger.net/burp) - A comprehensive software tool used for web application security testing. Key features include a proxy for intercepting and modifying web traffic, a scanner for automated vulnerability detection and tools for performing manual testing, such as repeater, intruder and so forth.
73+
- [OWASP ZAP](https://www.zaproxy.org) - An open-source web proxy similar that has features similar to BurpSuite's.
74+
- [Postman](https://www.postman.com/) - API testing tool that allows sending various HTTP requests, manipulating headers and automating tests. It helps identify vulnerabilities like authentication issues and data exposure, integrating with other security tools for comprehensive analysis.
75+
- [MobSF](https://github.com/MobSF/Mobile-Security-Framework-MobSF) - Automated, open-source tool for security testing and analyzing mobile applications, supporting both Android and iOS platforms.
5576

5677
### References
5778
- [OWASP Penetration Testing Methodologies](https://owasp.org/www-project-web-security-testing-guide/latest/3-The_OWASP_Testing_Framework/1-Penetration_Testing_Methodologies)

0 commit comments

Comments
 (0)