CyberSecC@ptBlackb3ard
  • 🦜Welcome
  • Cyber Security
    • Offensive Security
      • Penetration Testing Methodology
      • Pre-Engagement Interaction
      • Reconnaissance (Information Gathering)
        • Open-Source Intelligence (OSINT)
      • Scanning and Enumeration
        • Domain Enumeration
        • Network Enumeration
          • Network Mapper (nmap)
          • Port/Protocol & Service Enumeration & Attack
            • File Transfer Protocol (FTP): 20, 21
              • Trivial File Transfer Protocol (TFTP): 69
              • FTP over SSL/TLS (FTPS): 989, 990
            • Secure Shell (SSH): 22
            • Telnet: 23
            • Simple Mail Transfer Protocol (SMTP): 25
              • SMTP Secure (SMTPS): 587
            • Domain Name System (DNS):53
            • Dynamic Host Configuration Protocol (DHCP): 67, 68
            • Hyper Text Transfer Protocol (HTTP): 80
              • HTTP over SSL/TLS (HTTPS): 443
            • Kerberos: 88
            • Post Office Protocol version 3 (POP3): 110
            • Network Time Protocol (NTP): 123
            • Remote Procedure Call (RPC): 135
            • NetBIOS: 137, 138, 139
            • Internet Message Access Protocol (IMAP): 143
            • IMAP over SSL/TLS: 933
            • Internet Relay Chat (IRC): 194
            • Light Weight Directory Access Protocol (LDAP): 389
              • LDAP over SSL/TLS (LDAPS): 636
            • Server Message Block (SMB): 445
              • Hostname
              • Shared Folders
            • Network File System (NFS): 2049
            • Microsoft SQL Server: 1433
            • MySQL Server: 3306
            • PostgreSQL Server: 5432
            • Remote Desktop Protocol (RDP): 3389
            • Border Gateway Protocol (BGP): 179
            • Remote Authentication Dial-In User Service (RADIUS): 1812, 1813
        • Web Enumeration
      • Security Assessment Report Writing
      • Tools
        • Cryptography & Encoding
          • Password Recovery
        • Network Tools
  • Networking
    • OSI and TCP/IP Model
      • Common Network Ports & Protocols
  • Cloud
    • Cloud Computing
  • General
    • Cyber Security Theory
      • Information Security
      • Cybersecurity Resilience
      • Cybersecurity Posture
    • Terms and Acronyms
    • Database Cheat Sheets
Powered by GitBook
On this page
  1. Cyber Security
  2. Offensive Security

Penetration Testing Methodology

  1. Pre-Engagement Interaction: Understand the scope of the test and permitted attacks, establish communication protocols, and ensure the necessary permissions are in place.

  2. Scanning & Reconnaissance: Gather as much pertinent information as possible by probing the following:

    1. External Pentest: (everything must be in scope)-

      1. Domain and subdomains

      2. External IP address ranges

      3. Systems - websites, emails, ticketing ERPs, etc

      4. Exposed data breaches

    2. Internal Pentest: (everything must be in scope)-

      1. IP address ranges, systems, devices, etc.

      2. Exposed data breaches

      3. Understand the network structure - gateways, DHCP servers, DNS servers, Gateways, VLANs, etc.

      4. Identify the code operating systems and their respective versions

      5. Identify open ports and the services running on them.

    3. Cloud Pentests: (everything must be in scope)-

      1. Domains and subdomains

      2. IP address ranges

      3. Exposed data bridges

      4. Attempt to 'map' the flow of information between systems.

  3. Gaining Access (Exploitation): Focus on gaining unauthorized access to the target system or network and exploit vulnerabilities discovered during the scanning stage. Tools such as password cracking and exploiting software vulnerabilities may be employed to access the target system.

    1. Post-Compromise Scanning & Exploitation: Rescan the compromised systems for the following:

      1. System information

      2. Network configurations - additional networks, internal services and ports, WiFi passwords, etc.

      3. Terminal history.

      4. Shared folders.

    2. Privilege Escalation: If the initial compromise did not grant system administrator or root access, focus on gaining high-level access within the system.

  4. Maintaining Access (Red Teaming*): After compromising the system (bypassing security measures), set up back doors or remote access tools and establish persistent access. The objective is to mimic the actions of an actual attacker and assess the potential impact of a successful compromise.

  5. Covering Tracks (Red Teaming*): Remove any traces of the compromise from the target system or network. The goal is to ensure that the ethical hacking activity remains undetected, leaving no evidence of the penetration testing activity behind.

  6. Post-Exploit Clean-Up: This includes deleting logs, modifying or removing files, and restoring the system to its original state. The goal is to ensure that the ethical hacking activity remains undetected, leaving no evidence of the activity behind or leaving the system in a weakened state.

  7. Reporting: Generate a report for the above phases - IP addresses, open ports, and services, weak passwords, exposed data breaches, application and network vulnerabilities, privilege escalation, system configurations, etc.

PreviousOffensive SecurityNextPre-Engagement Interaction

Last updated 5 months ago