Penetration Testing Methodology
Our proven approach to Penetration Testing is based on industry best practice and project management standards and is crucial in performing a thorough and accurate assessment.
SecurePortal allows you to access all your live Vulnerability Data in a secure single platform.
Interact with your Security Report via the SecurePortal rather than an outdated paper report.
Rest assured that your assessments are performed by qualified Security Consultants.
Our proven approach to Penetration Testing is based on industry best practice and project management standards. The methodology is broken down into five distinct phases: Initial Scoping, Reconnaissance, Assessment, Reporting and Presentation.
Pentest People believe that these five steps are crucial in performing a thorough and accurate assessment, providing value for the client and ultimately improving the security of the target network.This methodology is cyclical in that the results of the assessment presented to the client, and provided as a report,
This methodology is cyclical in that the results of the assessment presented to the client, and provided as a report, feedback into the scope of additional tests. As security is a process rather than a solution, this methodology is designed to work alongside the ongoing process.
The 5 steps are broad categories and can generally be applied to multiple types of infrastructure assessment, regardless of whether it is internal, external or some other combination.
The first phase in the methodology is an initial scoping discussion to set the parameters for the project. This ensures that all the critical parts of the network that need to be included in ther assessment are identified at the outset, avoiding potential problems later in the process.
Pentest People utilise their SecurePortal as a communication channel to ensure that all of the required scoping documents are presented and securely transmitted between the client and the company.
The Reconnaissance step will utilise both Passive and Active Information Gathering. Our consultants will utilise public domain information to collect information about your organisation and the network. Search engines will be interrogated as well as public records to try to collect information, which will help in the assessment of the target network.
In the case of an internal assessment, passive information gathering will also include sniffing wired and wireless networks in an attempt to collect network protocol information, addressing details, and user credentials.
Information discovered during the passive information-gathering phase is used to start probing the network map the network and identify the active hosts. Once the active hosts are identified, further probes are used to detect any open ports together with what services they are running, before using fingerprinting techniques to identify the operating system running on the host.
The assessment phase aims to check known vulnerabilities against the operating systems and services that have been identified as present in the network. Any medium level vulnerabilities and higher that are identified are manually confirmed, preventing false positives being reported. Attempts are also made to exploit common operating system vulnerabilities to check the level of privileged access that can be achieved.
It is important to note that Pentest People will not carry out any checks, which are considered by the tools that are used to be ‘unsafe’. This also includes any Denial of Service DoS attacks. These service affecting checks are disabled by default in all the tools that we use but they can be can be included by request.
For services that require username and password authentication, our consultants will attempt to access these resources both with the default password, and also commonly used username and password combinations.
In practical terms the assessment phase typically comprises of an internal, ‘White Box’ and ‘Black Box’ tests.
At the end of the discovery and assessment phase clients are presented with an executive summary as well as a more detailed report. The summary lists the key findings along with the top ten recommendations for remedial action. A table of hosts is provided together with the total number of vulnerabilities identified at each severity level.
The full assessment report goes into greater detail for each host including the open ports identified, services available on those ports, identified vulnerabilities and remediation advice. Separate sections are included for any additional advanced assessments that were carried out and cross-referenced where applicable to the host assessment data.
Finally, once the executive summary and full assessment report are created they are uploaded to the secure document area of the Pentest People SecurePortal for review prior to scheduling a de-brief call or if required a face to face meeting. The de-brief call or meeting is an opportunity for you to discuss any major issues arising from the assessment with the lead consultant who will formally present the findings of the report.