Questions tagged [penetration-test]

An attempt to penetrate a system's security in an effort to evaluate the protections in place.

Penetration testing simulates an attack by a malicious party. It involves a scan and assessment of vulnerabilities, followed by exploitation of found vulnerabilities to gain further access. Using this approach will result in an understanding of the ability of an attacker to gain access to confidential information, affect data integrity or availability of a service and the respective impact. Each test should be approached using a consistent and complete methodology in a way that allows the tester to use their problem-solving abilities, the output from a range of tools and their own knowledge of networking and systems to find vulnerabilities that would/ could not be identified by automated tools. This approach looks at the depth of attack as compared to the Security Assessment approach that looks at the broader coverage.

Useful Resources:

1272 questions
50
votes
7 answers

What is a satisfactory result of penetration testing assessment?

I'd like to ask you what should be satisfactory result of pen-testing job? My main concern is that pen-testing is hard and it won't always result in gaining remote shells or roots. However, it is much easier to list potential vulnerabilities. For…
Aria
  • 2,731
  • 1
  • 12
  • 19
39
votes
4 answers

What person should I write a penetration test report as?

When you're writing a report, what person do you write it as? First person singular: I discovered a vulnerability in HP Power Manager... First person plural: We discovered a vulnerability in HP Power Manager... Third person singular, by name: Bob…
just some user
  • 1,297
  • 10
  • 22
35
votes
6 answers

As a company, how can we prevent penetration testers from compromising our system?

What tools or techniques can companies use to prevent penetration testers from behaving maliciously and exfiltrating data or compromising the system? I cannot imagine that the only protections companies use are contractual ones.
Pippo Pluto
  • 477
  • 1
  • 4
  • 5
28
votes
3 answers

How to know when a pen test is complete?

Specifically considering client websites where we have been asked to execute a pen test; at what point do we stop and say we're done? We have access to various tools (some automated, some manual); but if we say "we tried all our tools, and couldn't…
PeteCon
  • 415
  • 4
  • 8
20
votes
3 answers

How can we safely allow a client to perform penetration testing?

A potential client is planning to do penetration testing on our SaaS. Is it standard or fair for us to request things like the following? An NDA from the pen tester Details on who is performing the test (e.g., verifying they are…
bendytree
  • 303
  • 2
  • 6
15
votes
1 answer

Are there free online penetration testing labs that I can safely hack with my computer?

I have seen the offensive security penetration testing labs; they are amazing but costly. Is there any other online virtual penetration testing lab I can SAFELY conduct penetration testing and exploitation against? I do not mean machines I can…
Dark Eagle
  • 153
  • 1
  • 1
  • 5
15
votes
3 answers

Best way to test my home network from the outside

I want to check that my router is working like it should. For example that certain ports which should be open on the LAN side and closed on the WAN side really work that way. So I would like to run a few simple tools like nmap and netcat, from the…
snowape
  • 275
  • 1
  • 2
  • 5
14
votes
5 answers

pros and cons of a bootable BackTrack instance vs installed

I've been wanting to mess around some with BackTrack to get a better understanding of some of the tools out there for penetration testing. I have a Linux box that isn't doing much right now that I was planning to install BackTrack 5.0 on. Recently…
Justin C
  • 882
  • 1
  • 9
  • 15
13
votes
3 answers

How can I find websites owned by a particular company?

I wanted to know how can I get info on what sites are owned by a certain company. I need it for bug bounty programs. For example, how can I find what sites are owned by PayPal, like what sites have PayPal in it's web address etc...
Daniel
  • 1,452
  • 4
  • 22
  • 32
13
votes
1 answer

Penetration testing methodologies

There are several methodologies for penetration testing like OSSTMM, NIST and other frameworks. What are the differences among them? Who is the intended audience and where is the intended place/sector for these methodologies? I read their…
etooo
  • 131
  • 1
  • 4
12
votes
2 answers

In the RoE for a pentest, do you include a list of all tools?

As the title says, in the rules of engagement I have my scope, used method, etc. but I've been wondering if I should also include a list of tools (such as NMAP, Dirb/Ffuf, etc.) that might be used. And if not, how should I be transparent with the…
Bronur
  • 123
  • 1
  • 5
11
votes
4 answers

How does this test prove my application is vulnerable to clickjacking attacks?

I want to know more about clickjacking. I have been reading an article about clickjacking, where the HTML code to test for clickjacking vulnerability was provided. I tried the same as described in that article, and I got the message “You’ve been…
lakshmi Prudhvi
  • 213
  • 1
  • 2
  • 7
11
votes
3 answers

Why are there different pentest phases/stages/methodologies?

Why are there different pentest phases/stages/methodologies? Which one should be used? Why don't we come out with standard one? E.g. Wikipedia / Cybrary.it Reconnaissance Scanning Gaining Access Maintaining Access Covering…
Wolf
  • 367
  • 2
  • 5
  • 17
9
votes
5 answers

Is it practical and worthwhile to alternate penetration test vendors?

Is it considered a best practice to alternate the vendor used to perform penetration tests? For example if it is your policy to conduct a third-party penetration test semi-annually you would have vendor A conduct the penetration test in the first…
sdanelson
  • 1,287
  • 10
  • 21
8
votes
6 answers

Penetration test limitations with a virtual machine

What are the limitations when performing a penetration test with a virtual machine instead of a physical one?
Klingerrrrrr
  • 81
  • 1
  • 2
1
2 3
8 9