Skip to content

Commit 1137421

Browse files
authored
Update 2-4-3-Pentest.md
1 parent dfc4fe2 commit 1137421

File tree

1 file changed

+13
-10
lines changed

1 file changed

+13
-10
lines changed

current-version/2-Process/2-4-Operation/2-4-3-Pentest.md

Lines changed: 13 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -4,32 +4,35 @@ A penetration test, or pen test, is a simulated attack on systems and applicatio
44

55
While penetration testers use automated tools for scanning and information gathering, most testing is conducted manually. Manual testing is crucial for detecting vulnerabilities related to business logic and other issues that automated scans might miss.
66

7-
### Approaches
7+
### Methodologies and Checklists
88

99
A penetration test can be approached in three ways: black-box, gray-box, or white-box.
1010

1111
- **Black-box:** Testers have no prior information about the application, except possibly an IP address or domain.
1212
- **Gray-box:** Testers are given additional information, such as credentials for test accounts. This approach balances cost and effectiveness, providing deeper insights without the high expense of white-box testing. It should be the preferred approach most of the time.
1313
- **White-box:** Testers have full access to all available information, including the application's source code.
1414

15-
### Methodologies and Checklists
15+
Regardless of the approach, penetration testers will generally follow publicly-available and/or internal checklists and testing guides. The most popular ones are:
1616

1717
- [OWASP Web Security Testing Guide (WSTG)](https://owasp.org/www-project-web-security-testing-guide/) - a comprehensive guide to testing the security of web applications and web services.
1818
- [OWASP Mobile Application Security Testing Guide (MASTG)](https://mas.owasp.org/MASTG/) - similar to the OWASP WSTG, it is a comprehensive guide to testing mobile applications.
1919
- [OWASP Top 10](https://owasp.org/www-project-top-ten/) - ranks the top 10 most common and impactful webb application security vulnerabilities.
20-
- [OWASP Top 10 API]
20+
- [OWASP Top 10 API](https://owasp.org/API-Security/editions/2023/en/0x11-t10/) - 10 most common security risks and vulnerabilities for APIs.
2121
- [OWASP Mobile Top 10](https://owasp.org/www-project-mobile-top-10/) - a list containing the most common and impactful mobile application security vulnerabilities.
2222

2323
### Process Overview
2424

25-
#### Planning
26-
Planning is crucial in the penetration testing process. A well-planned test maximizes results and minimizes potential failures. Key elements include:
25+
#### Assembling the team
26+
The composition of the penetration testing team is very important. It can either consist of internal cybersecurity professionals who understand the organization's systems and policies intimately or an external team hired for their specialized skills and objectivity, which can bring fresh perspectives and expertise in identifying vulnerabilities that internal teams might overlook.
27+
28+
#### Defining a scope
29+
After assembling the penetration testing team, the organization must meticulously define the scope of the test. This step is critical to avoid deviations from the planned objectives or unintended testing of additional assets and endpoints. Scope definition also entails selecting the appropriate penetration testing approach: black-box, gray-box, or white-box.
30+
31+
#### Dates and deadlines
32+
As part of the scope, dates for the testing must be selected
2733

28-
1. **Assembling the team:** the composition of the penetration testing team is very important. It can either consist of internal cybersecurity professionals who understand the organization's systems and policies intimately or an external team hired for their specialized skills and objectivity, which can bring fresh perspectives and expertise in identifying vulnerabilities that internal teams might overlook.
29-
2. Defining a scope:
30-
3. Defining an approach:
31-
4. Requirements:
32-
5. Dates and deadlines:
34+
#### Requirements
35+
Once the scope and dates are defined, the penetration testing team will inform the organization of requirements - e.g., testing credentials, application documentation, source-code access, and so forth. It is imperative that the organization provide the penetration testing
3336

3437
#### Execution
3538

0 commit comments

Comments
 (0)