Penetration Testing Guide & Checklist

Digubah dari: https://github.com/iAnonymous3000/awesome-pentest-checklistarrow-up-right

Overview

A comprehensive guide for ethical penetration testing, meticulously designed to cover all phases of a penetration test. This step-by-step checklist ensures thorough coverage from preparation to reporting, ideal for both novice and experienced testers.

Step


1. Pre-Engagement

  • Secure a Non-Disclosure Agreement (NDA): Example NDA Template: NDA Template by LegalTemplatesarrow-up-right

  • Obtain formal, written authorization for testing.

  • Ensure legal compliance with all relevant laws and regulations (e.g., GDPR, HIPAA).

  • Obtain appropriate insurance coverage (e.g., professional liability insurance).

  • Establish additional confidentiality agreements if necessary.

Scope Definition

  • Collect comprehensive client and system information.

  • Define the scope and rules of engagement clearly:

    • Identify in-scope and out-of-scope systems and applications.

    • Confirm any limitations or constraints (e.g., testing windows, sensitive systems).

  • Agree on acceptable testing methodologies and tools.

  • Establish safe testing periods to minimize business impact.

  • Identify third-party systems and obtain necessary permissions.

Communication and Planning

  • Set specific, measurable success criteria.

  • Establish emergency contact and response protocols.

  • Define data handling and storage protocols:

    • Agree on how sensitive data will be stored, transmitted, and destroyed.

  • Agree on communication channels and reporting frequency with the client:

    • Set up regular check-ins and progress updates.

  • Clarify testing schedule and time frame.

  • Ensure the penetration testing team has the necessary skills and certifications.


2. Information Gathering

Passive Reconnaissance

Active Reconnaissance

Social Engineering Opportunities


3. Vulnerability Analysis

Automated Scanning

Manual Testing

Network and Infrastructure

IoT Device Testing

Container Security

CI/CD Pipeline Security

Cloud Infrastructure

OWASP Testing Guide

A comprehensive guide to testing the security of web applications. OWASP Testing Guidearrow-up-right

NIST SP 800-115

Technical Guide to Information Security Testing and Assessment. NIST SP 800-115arrow-up-right

Cloud Penetration Testing Resources

Mobile Security Testing

  • OWASP Mobile Security Testing Guide A detailed guide for testing mobile applications' security. OWASP MSTGarrow-up-right

Compliance and Standards


4. Exploitation

Initial Access

Privilege Escalation

Lateral Movement

Security Evasion

Documentation

  • Document each step of the exploitation process meticulously.

  • Maintain detailed logs of all actions for accountability and analysis.

  • Ensure all exploitation steps are reproducible and verifiable.


5. Post-Exploitation

Impact Analysis

  • Identify and access critical data stores.

  • Analyze the potential business and technical impacts of exploited vulnerabilities.

  • Evaluate the likelihood of real-world exploitation based on findings.

Persistence and Cleanup

  • Implement strategies for maintaining access, if necessary and authorized. Tool: Empirearrow-up-right

  • Remove all tools, scripts, and artifacts used during testing.

  • Ensure no backdoors, test accounts, or persistence mechanisms remain.

  • Verify that systems are restored to their pre-testing state.

  • Confirm that no sensitive data was altered or left exposed.

Data Handling

  • Adhere to secure data handling and processing procedures.

  • Check for clear-text credentials and sensitive data in memory. Tool: Mimikatzarrow-up-right

  • Simulate data exfiltration, if within the agreed scope. Tool: Dnscat2arrow-up-right

Documentation

  • Document all system alterations comprehensively.


6. Reporting

Report Preparation

  • Create a detailed technical report documenting tools, techniques, and procedures used.

  • Include evidence such as screenshots and logs.

  • Provide clear, actionable remediation recommendations.

  • Assign risk ratings to all identified vulnerabilities.

  • Follow industry-standard reporting formats (e.g., PTES, NIST guidelines). Reference: PTES Reportingarrow-up-right

  • Include a detailed methodology section explaining the testing approach.

  • Provide references to relevant industry standards and best practices.

Executive Summary

  • Prepare an executive summary for stakeholder review.

  • Include both technical details and high-level overviews for different audiences.

Classification and Security

  • Ensure the report is classified appropriately and sensitive data is secured.

  • Offer a prioritized action plan with clear timelines for remediation.

Client Communication

  • Conduct a read-out meeting with the client to discuss key findings.

  • Suggest a timeline for follow-up assessments or retesting.


7. Remediation Verification

Retesting

  • Allow a designated period for the client to remediate identified issues.

  • Conduct retests to verify the effectiveness of fixes.

  • Update the report with verification results and any new findings.

  • Validate that security controls are now functioning as intended.

Unresolved Issues

  • Document any unresolved security issues.

  • Recommend strategies for ongoing monitoring and improvement.

Continuous Improvement

  • Assist in identifying root causes to prevent future vulnerabilities.

  • Recommend improvements to policies, procedures, and security practices.

  • Propose integrating security into the software development lifecycle.

  • Advise on the need for security awareness and training programs.

  • Propose a schedule for regular future security audits.

  • Provide guidance on implementing a vulnerability management program.

Last updated