|
1 | | -TBD |
| 1 | +### Penetration Test |
| 2 | + |
| 3 | +A penetration test, or pen test, is a simulated attack on systems and applications to identify exploitable vulnerabilities. It involves attempting to breach web and mobile applications, APIs, network devices, workstations, servers, and more, uncovering issues like SQL injection, code injection, XSS, and privilege escalation. |
| 4 | + |
| 5 | +While penetration testers use automated tools for scanning and information gathering, most testing is conducted manually. Manual testing is crucial for detecting vulnerabilities related to business logic and other issues that automated scans might miss. |
| 6 | + |
| 7 | +### Approaches |
| 8 | + |
| 9 | +A penetration test can be approached in three ways: black-box, gray-box, or white-box. |
| 10 | + |
| 11 | +- **Black-box:** Testers have no prior information about the application, except possibly an IP address or domain. |
| 12 | +- **Gray-box:** Testers are given additional information, such as credentials for test accounts. This approach balances cost and effectiveness, providing deeper insights without the high expense of white-box testing. It should be the preferred approach most of the time. |
| 13 | +- **White-box:** Testers have full access to all available information, including the application's source code. |
| 14 | + |
| 15 | +### Methodologies and Checklists |
| 16 | + |
| 17 | +- [OWASP Web Security Testing Guide (WSTG)](https://owasp.org/www-project-web-security-testing-guide/) - a comprehensive guide to testing the security of web applications and web services. |
| 18 | +- [OWASP Mobile Application Security Testing Guide (MASTG)](https://mas.owasp.org/MASTG/) - similar to the OWASP WSTG, it is a comprehensive guide to testing mobile applications. |
| 19 | +- [OWASP Top 10](https://owasp.org/www-project-top-ten/) - ranks the top 10 most common and impactful webb application security vulnerabilities. |
| 20 | +- [OWASP Top 10 API] |
| 21 | +- [OWASP Mobile Top 10](https://owasp.org/www-project-mobile-top-10/) - a list containing the most common and impactful mobile application security vulnerabilities. |
| 22 | + |
| 23 | +### Process Overview |
| 24 | + |
| 25 | +#### Planning |
| 26 | +Planning is crucial in the penetration testing process. A well-planned test maximizes results and minimizes potential failures. Key elements include: |
| 27 | + |
| 28 | +1. **Assembling the team:** the composition of the penetration testing team is very important. It can either consist of internal cybersecurity professionals who understand the organization's systems and policies intimately or an external team hired for their specialized skills and objectivity, which can bring fresh perspectives and expertise in identifying vulnerabilities that internal teams might overlook. |
| 29 | +2. Defining a scope: |
| 30 | +3. Defining an approach: |
| 31 | +4. Requirements: |
| 32 | +5. Dates and deadlines: |
| 33 | + |
| 34 | +#### Execution |
| 35 | + |
| 36 | + |
| 37 | +#### Reporting |
| 38 | + |
| 39 | + |
| 40 | +### Tools |
| 41 | +There are several tools that can help while performing penetration test against applications. The most common are: |
| 42 | +- [BurpSuite](https://portswigger.net/burp) - a comprehensive software tool used for web application security testing. Key features include a proxy for intercepting and modifying web traffic, a scanner for automated vulnerability detection, and tools for performing manual testing, such as repeater, intruder, and so forth. |
| 43 | +- [OWASP ZAP](https://www.zaproxy.org) - an open-source tool similar to BurpSuite. |
| 44 | +- [Postman](https://www.postman.com/) - ests API security by sending various HTTP requests, manipulating headers, and automating tests. It helps identify vulnerabilities like authentication issues and data exposure, integrating with other security tools for comprehensive analysis. |
| 45 | +- [MobSF](https://github.com/MobSF/Mobile-Security-Framework-MobSF) - |
| 46 | + |
| 47 | +### References |
| 48 | +- [OWASP Penetration Testing Methodologies](https://owasp.org/www-project-web-security-testing-guide/latest/3-The_OWASP_Testing_Framework/1-Penetration_Testing_Methodologies) |
| 49 | +- [The Penetration Testing Execution Standard (PTES)](http://www.pentest-standard.org/index.php/Main_Page) |
0 commit comments