In-Depth Guide to Pentests: Types, Deliverables, and Scope

slide1 n.w
1 / 23
Embed
Share

Dive into the world of pentesting with this comprehensive guide covering what pentests are, types of pentests, defining deliverables, checklist importance, and understanding ethical boundaries. Explore various pentesting types like network, web, mobile, and more to enhance your cybersecurity knowledge.

  • Pentesting
  • Cybersecurity
  • Scope
  • Deliverables
  • Ethical

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. AGENDA DEFINING WHAT A PENTEST IS DEFINING THE TYPES OF PENTESTS OUT THERE DEFINING THE DELIVERABLES CHECKLISTS

  2. DEFINING WHAT A PENTEST IS I GET PAID TO HACK?

  3. DEFINING WHAT A PENTEST IS ASSIGNED A CERTAIN SCOPE IN SCOPE OUT OF SCOPE WE ARE EXPECTED TO BE ETHICAL SIGN AN NDA PROTECT OUR CUSTOMER AS #1 PRIORITY

  4. DEFINING WHAT A PENTEST IS DELIVER A SOLID TEST PLAN INCLUDING METHODOLOGY DELIVER A PROPER REPORT GUARANTEE A CERTAIN LEVEL OF COVERAGE OFTEN OWASP TOP 10 IS NAMED OTHER WAYS EXIST DEPENDS ON THE TYPE OF TEST

  5. THE TYPES OF PENTESTS WHAT CAN IHACK?

  6. THE TYPES OF PENTESTS NETWORK PENTEST ORGANISATION PENTEST WEB PENTEST MOBILE PENTEST API PENTESTING CLOUD-HYBRID INFRASTRUCTURE TESTING

  7. THE TYPES OF PENTESTS IOTPENTEST WEB 3.0 PENTEST METAVERSEPENTSEST SOCIALENGINEERING AUTOMOTIVE PENTEST PHYSICALPENTEST

  8. THE TYPES OF PENTESTS -NETWORK OFTEN EXTERNAL AND INTERNAL HEAVY RELIANCE ON TOOLS REQUIRES NETWORKING KNOWLEDGE OFTEN THE GOAL IS TO GET FOOTHOLD GET INFORMATION THAT IS CONFIDENTIAL FIND A WAY TO DISABLE ACCESS TO THE NETWORK SUCH AS DOS

  9. THE TYPES OF PENTESTS -ORGANISATION OFTEN EXTERNAL AND INTERNAL SOMETIMES COVERS MULTIPLE NETWORKS REQUIRES NETWORKING KNOWLEDGE OFTEN THE GOAL IS TO GET FOOTHOLD GET INFORMATION THAT IS CONFIDENTIAL FIND A WAY TO DISABLE ACCESS TO THE NETWORK SUCH AS DOS

  10. THE TYPES OF PENTESTS -WEB OFTEN EXTERNAL ORINTERNAL 50/50 MIX OF TOOLS ANDMANUAL HACKING REQUIRES KNOWLEDGE OF WEB APPLICATIONS OFTEN THE GOAL IS TO GET A REVERSE SHELL FIND A WEB EXPLOIT DENY ACCESS TO THE SITE BY MEANS OF DOS FOR EXAMPLE

  11. THE TYPES OF PENTESTS -API OFTEN EXTERNAL ORINTERNAL 50/50 MIX OF TOOLS ANDMANUAL HACKING REQUIRES KNOWLEDGE OF INTEGRATION TESTING AND DOCUMENTATION OFTEN THE GOAL IS TO EXPLOIT LOGIC EXPLOIT WEAK ARCHITECTURE OR SHADOW APIS DENY ACCESS TO THE SITE BY MEANS OF DOS FOR EXAMPLE

  12. THE DELIVERABLES NO PROOF? YOUDIDNOTWORK!

  13. THE DELIVERABLES NDA TEST PLAN TEST REPORT NOTICEOF ENGAGEMENT SIGNOFFSLIP TEST DEBRIEFING

  14. THE DELIVERABLES NDA ENSURES NO COMPANY DATA IS LEAKED OFFERED AND DRAFTED BY TARGET OFTEN SIGNED BEFORE ACTUAL ENGAGEMENT READ CAREFULLY BEFORE YOU SIGN

  15. THE DELIVERABLES TEST PLAN OFFERED AND DRAFTED BY PENTESTING COMPANY OFTEN SIGNED BEFORE ACTUAL ENGAGEMENT CONTAINS SEE EXAMPLES

  16. THE DELIVERABLES TEST REPORT OFFERED AND DRAFTED BY PENTESTING COMPANY OFTEN SIGNED AFTER ACTUAL ENGAGEMENT CONTAINS (MVP) VULNERABILITIES FOUND STEPS TO REPRODUCE ACTUAL RESULT EXPECTED RESULT SUMMARY CVSS SCORE

  17. THE DELIVERABLES TEST REPORT STEPS FOR REMIDIATION ARE RECOMMENDED TO ADD ADD WHAT YOU DID TO CLEAN UP AFTER YOURSELF CONLUSION

  18. THE DELIVERABLES NOTICEOF ENGAGEMENT CONFIRMS TIMING OF ATTACKS CONFIRMS IP ADDRESSES OF ATTACKER AND ANY VPS USED CONTAINS SPECIAL HEADERS USED IS TO MONITOR LOGGING ON THE CUSTOMERS SIDE

  19. THE DELIVERABLES SIGNOFF SLIP CONFIRMS EVERYTHING IS DELIVERED AS EXPECTED NOT REQUIRED BUT RECOMMENDED SIGNED BY BOTH CUSTOMER AND PENTESTER

  20. THE DELIVERABLES DEBRIEFING A VIDEO OR AUDIO FILE EXPLAINING ISSUES FOUND CAN BE USED IN MEETINGS CAN BE A LIVE DEBRIEFING NICE EXTRA

  21. CHECKLISTS DONE, DONE, DONE, TODO,

  22. CHECKLISTS VERY IMPORTANT IN PENTESTING HELP ENSURE COVERAGE AND TRANSPARENCY ARE LIVING DOCUMENTS THAT EVER GROW PENTESTING CHECKLIST, DELIVERABLE CHECKLIST, LOGGING CHECKLIST ETC

Related


More Related Content