Penetration Tests

Steps and tools used during penetration testing.

Pre-engagement

Prerequisites

  • Contract (client) or form:
    • Project name
    • Project code for timesheet
    • Architecture / Network diagram
    • Components in Scope: environment (dev/QA/prod), server name, IP address, URL, connection string
    • Approval to do the tests
    • Test accounts : 2 users per user profiles, 2 admin users, 1 user for infrastructure scans
    • Test type: Black-box, Gray-box, White-box
  • Threat Modeling (optional)
  • Machine setup: Kali Linux

Methodologies & Frameworks

Reconnaissance / Passive Information Gathering / OSINT

Gather information about a target without directly interacting with it. Third parties can be used for information gathering. Other definitions include a more permissive approach, like interacting as a normal user would.

Active Info Gathering / Scanning / Enumeration

Active information gathering techniques are used to collect information about a target system or network. These techniques involve actively engaging with the target to elicit information, as opposed to passive techniques that involve observing network traffic or publicly available information. Some examples of active information gathering techniques are port scanning, banner grabbing, network mapping, DNS enumeration, vulnerability scanning.

* Investigate each open/filtered port. See details for each ports.

Identify the OS remotely

Ping the target machine.

ping $IP
  • TTL ~128 => the OS is likely Windows
  • TTL ~ 64, the OS could be Linux, Unix, or MacOS

Forensics Tools

Database enumeration

SSL Certificates

Exploits / Attacks / Vulnerabilities

ALWAYS inspect exploit code.

Multiple exploits may exist for a vulnerability, for different target OS versions and architectures.

Network Attacks

Post-Exploitation

Privilege Escalation

Post-Exploitation

Lateral Movement Techniques

Phases of lateral movement: reconnaissance, credential/privilege gathering, and gaining access to other computers in the network.

Cleanup

  • Remove all uploaded files and exploits after a pentest.

Reporting

Bug Bounty Platforms

### NOT VERIFIED ###
List of Bug Bounty/Crowdsourced Security Platforms:
Detectify - cs.detectify.com
Cobalt - cobalt.io
Zerocopter - www.zerocopter.com
HackenProof - hackenproof.com
Vulnerability Lab - www.vulnerability-lab.com
FireBounty - firebounty.com
BugBounty.jp - bugbounty.jp
AntiHACK - www.antihack.me
Intigriti - www.intigriti.com
SafeHats - safehats.com
RedStorm - www.redstorm.io
Cyber Army ID - www.cyberarmy.id
Yogosha - yogosha.com

Reporting 0-Day

Severity Scoring

CVSS

DREAD

Missing Security Controls

Reporting Tools

Report Templates

Examples