Penetration Testing

Great Essays
Penetration testing methodology is a document guide for pen-testers on how to successfully complete the Pen-testing process. There are wide range of methodologies and frameworks available. Each has unique characteristics and takes a distinct approach to penetration testing. All factors considered, it is important to apply a methodology that is suitable for each enterprise and institute to achieve the maximum efficiency.
The following table includes comparison between two methodologies-
Open Source Security Testing Methodology Manual (OSSTMM) Information Systems Security Assessment Framework (ISSAF)
OOSTMM as the name implies is a free manual used to conduct security testing in thorough and repeatable manner. This comprehensive document is
…show more content…
Maintaining Access include obtaining rights thorough backdoor.
9. Cover the Tracks includes deletion of penetration tracks and log information.
Phase 3 Reporting, Clean-up and Destroy Artefacts
Phase 3 include producing a report describing the results of the tests as well as reviews and recommendations for improvement.
All information that is created and/or stored on the tested systems should be removed from these systems.
ISSAF is well known to provide a high value position about assessing existing security controls and to connect tasks between themselves. For a beginner pen-tester, it provides a goldmine, however trained pen-testers will probably want to turn themselves to the OSSTMM, another methodology that gives less examples, and more bullet-lists, to keep the content to a smaller volume [1].
Phase 0 Planning and preparation
Planning and preparing is very crucial as it includes understanding the scope and objective as well as the timing and duration in regards to penetration testing. A clear objective is essential prior to conducting the test. The timing is important to ensure that it does not disrupt the normal business and everyday operations of the organisation.

Phase 1 Intelligence
…show more content…
With the aid of internet, there are information’s which can be found to help narrow the scope of activities and provides some insight. By simply visiting the target organisation’s web page, there are lots of information that can be found.
Network enumeration includes identifying the target’s Domain information. Who-is tool is a great way to find target Domain information and network details including IP addresses and points of contact.
DNS interrogation includes interrogating the DNS server of the target organisation to identify the number of server, as well as the server name and mail server. Nslookup is great tool for the job.
Network Reconnaissance includes identifying if the target system is alive. Ping is a great tool for small to medium size network. For larger network, Fping is highly recommended as it is much faster than Ping. Traceroute is another great tool to use. It helps identify access control devices such as application-based firewall or packet-filtering routers.
Port scanning- Scanning is used to identify which ports are open and determine what service are available. Port scanning is like knocking on various doors and windows of house and seeing who answers [5]. One of the best port scanning tool is Nmap. It scans for both the TCP ports and UDP

Related Documents

  • Decent Essays

    Nt1310 Unit 5 Lab 3

    • 441 Words
    • 2 Pages

    From that day, he eventually developed and perfected the Kali Linux distribution. As stated previously, Kali comes bundled with a variety of features and one of the main networking analysis tools included is Wireshark. Wireshark is an open source GUI based packet analyzer with features such as the ability to live capture of packets as…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Introduction The current information technology (IT) infrastructure consists of a mix of 2008 and 2008 R2 servers, with two legacy Windows 2000 servers, and four Windows Server 2012. In addition to the Windows server environment, the network consists of routers, switches, and security appliances, such as firewalls. The environment also consists of important services to ensure the security, and stability of the network.…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    CHALLENGE: Reigning in security management and reducing complexities at remote sites. SOLUTION: Palo Alto Networks PA-3020 and PA500’s, simplifies security at Data Center and advanced security policy deployment for the remote offices RESULTS: Simplify network security with powerful security controls, ease of use and powerful reporting. Visibility into the specific identity of each application helps enforce appropriate usage policies.…

    • 750 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Every business owner should consider the below points before setting up a network and also businesses might get expanded or changed in future. Long term investments should be considered here for future growth as well. So we should have a proper planning before we establish. Number of Users – Number of network users, printers, scanners, servers, data centers and security measures. Types of Equipment – Highly sophisticated equipment that should be capable of handling large networks and flexibility for expanding the networks for future purpose.…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    VPN A virtual private network is used by organisations to help secure data on a network. It’s very hard to access these private networks meaning that the data becomes much more secure and it can be used across a large area of a network, including many computers. This isn’t an expensive thing to do anyone can do it by using simple publicly available infrastructures. VPN also makes use of encryption firewalls and authentications services when sending data across the web.…

    • 767 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 7

    • 1149 Words
    • 5 Pages

    1. Focus on the overall “security assessment” risk rating that appears at the top of your report. Considering what security measures you (or the computer owner) have undertaken for your computer, does the assessment surprise you? Why or why not? What measures should you plan to undertake if the green checkmark did not appear?…

    • 1149 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    1. Policies: Policies like Acceptable Use, Internet Access, and Email and Communications Policies can take the risk out of the user’s hands of doing what is right. Sites that could hold malicious codes and viruses can simply be blocked from access so that it isn’t even in their “hands” to make the decision. 2. Provision Servers: Using software like IPAM, making sure that your servers all have static addresses assigned to them.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Both firewalls and intrusion detection systems are used to monitor network traffic and implement network security policies. Research these technologies and determine how they are similar and how they differ. Are both needed? Explain your answer in a short paper.…

    • 711 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    In the profession of IT a key component in your job will be looking after networks keeping them operational (for the users whom use the network), safe (clean out any corrupt files, check security measures, look for a virus. Etc…) and secure (making sure only authorise users are accessing the network). But first what is a network in a general meaning? A network consists of two or more computers that are connected in order to share resources (such as printers), exchange files, or electronically communicate. The computers on a network can be linked through various ways such as cables, telephone lines, radio waves, satellites, or infrared light beams.…

    • 673 Words
    • 3 Pages
    Decent Essays
  • Superior Essays

    Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Great Essays

    Discipline Investigation: Network System Analyst Introduction Information system is the most popular technology in the past two decades, but I have decided to get into the field is not because of the popularity. I have chosen network analyst as my future path because my mom used to restrict my internet usage. The reason sounds unique but that is why I initiate my interest on this “forbidden thing”. However, I never learn anything about it until I took a class in my high school, call Network Administration. The teacher has explored a new world in the class, and I have realized that my interest can be my future career choice.…

    • 1954 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    1-What factors will help you decide if the existing internetwork is in good enough shape to support new enhancements? keeping a track of round trip response time, regular checkups of major routers, firewalls and switches, identifying sources and destinations of network traffic, analyzing its direction and balancing the data travel between source and destination are the some important factors. Documentation should be done for Data stores and traffic flows, the number of stations, average time a station is idle between sending frames and the time required to transmit a message once the medium access is granted, along with traffic behavior are essential factors to determine whether the existing internetwork is in good shape to support new enhancements. 2-When considering protocol…

    • 670 Words
    • 3 Pages
    Improved Essays

Related Topics