Define what systems, networks, or data are off-limits.
Example: Exclude the production environment to avoid disruptions.
Test Cases
Specify the scenarios and conditions under which the testing will occur.
Example: Testing for SQL injection vulnerabilities in the login module.
Escalation Process
Establish a protocol for addressing critical issues discovered during testing.
Example: Immediate notification to the security team if a critical vulnerability is found.
Testing Window
Determine the timeframe for when testing will occur.
Example: Conduct tests during off-peak hours to minimize business impact.
Key Points:
The timeline for the engagement and when testing can be conducted.
What locations, systems, applications, or other potential targets are in scope.
Types of tests that are allowed or disallowed.
Data handling requirements for information gathered during the penetration test.
What behaviors to expect from the target.
What resources are committed to the test.
Legal concerns.
When and how communications will occur.
Who to contact in case of particular events.
Who is permitted to engage the pentest team.
Agreement Types
Non-Disclosure Agreement (NDA) → Legal documents that help enforce confiden- tial relationships between two parties.
NDAs protect one or more parties in the relationship and typically outline the parties, what information should be considered confidential, how long the agreement lasts, when and how disclosure is acceptable, and how confidential information should be handled.
Master Service Agreement (MSA) → Defines the terms that the organizations will use for future work.
This makes ongoing engagements and SOWs much easier to work through, as the overall MSA is referred to in the SOW, prevent- ing the need to renegotiate terms.
MSAs are common when organizations anticipate working together over a period of time or when a support contract is created.
Statement of Work (SoW) → A document that defines the purpose of the work, what work will be done, what deliverables will be created, the timeline for the work to be completed, the price for the work, and any additional terms and conditions that cover the work.
Alternatives to statements of work include statements of objectives (SOOs) and performance work statements (PWSs), both of which are used by the U.S. government.
Terms of Service (ToS) → Defines the rules that users must agree to abide by to use a service.
Ex. Conditions under which the penetration testing services will be rendered, including acceptable use policies.
Target Selection
Classless Inter-Domain Routing (CIDR) Ranges → Defines a range of IP addresses for network targeting.
Example: The CIDR range 192.168.1.0/24 includes all IP addresses from 192.168.1.0 to 192.168.1.255.
Domains
Specifies domain names to be tested.
Example: Testing example.com and its subdomains (sub.example.com).
Internet Protocol (IP) Addresses
Individual IP addresses selected for penetration testing.
Example: Testing specific servers at 192.168.1.10 and 192.168.1.20.
Uniform Resource Locator (URL)
Specific web addresses within domains targeted for testing.
Example: Testing the URL http://example.com/login for vulnerabilities.
Focuses on identifying vulnerabilities in web applications and websites.
Example: Testing for cross-site scripting (XSS) and SQL injection.
Comparison: Web assessments often involve different tools and techniques than network assessments due to the nature of web technologies.
Network
Examines network infrastructure, including routers, switches, and firewalls, for security weaknesses.
Example: Scanning for open ports, weak configurations, and vulnerabilities in network devices.
Comparison: Network assessments are more focused on connectivity and data flow between systems, unlike web or mobile assessments.
Mobile
Targets vulnerabilities in mobile applications and devices.
Example: Testing for insecure data storage, insufficient encryption, and insecure communication in a mobile app.
Comparison: Mobile assessments require different skill sets and tools compared to web and network assessments due to the unique operating systems and application environments.
Cloud
Assesses security of cloud-based infrastructure, platforms, and services.
Example: Evaluating the security of AWS, Azure, or Google Cloud configurations.
Comparison: Cloud assessments involve understanding cloud-specific security practices and compliance requirements, different from on-premises assessments.
Application Programming Interface (API)
Examines the security of APIs, which facilitate communication between different software components.
Example: Testing for insecure authentication, authorization, and input validation in APIs.
Comparison: API assessments are specialized and focus on data exchange mechanisms, unlike general application assessments.
Application
Broad category encompassing the assessment of software applications, including desktop and enterprise applications.
Example: Testing for buffer overflows, improper error handling, and insecure code practices.
Comparison: Application assessments are broader and can include aspects of web, mobile, and API assessments.
Wireless
Focuses on the security of wireless networks, including Wi-Fi and Bluetooth.
Example: Testing for weak encryption protocols (e.g., WEP), unauthorized access points, and insecure wireless configurations.
Comparison: Wireless assessments require specific tools and techniques, such as Wi-Fi sniffers and signal analyzers, differing from wired network assessments.
Open Source Security Testing Methodology Manual (OSSTMM)#
Purpose: Provides a comprehensive methodology for security testing and analysis.
A broad penetration testing methodology guide with information about analysis, metrics, workflows, human security, physical security, and wireless security. Unfortunately, it has not been updated since 2010, resulting in more modern techniques and technologies not being included in the manual.
Council of Registered Ethical Security Testers (CREST)#
Purpose: Offers accreditation and certification for organizations and individuals in the security testing industry.
Key Features: Sets professional standards for security testing and provides guidelines and certifications.
It ranges from pre-engagement interactions like scoping and questions to ask clients, to details such as how to deal with third parties.
It also includes a full range of penetration testing techniques and concepts, making it one of the most complete and modern openly available penetration testing standards.
Purpose: A reference model for industrial control systems (ICS) security.
Key Features: Divides ICS networks into different levels, each with specific security considerations.
The Purdue Model, also known as the Purdue Enterprise Reference Architecture (PERA), is a widely accepted framework used to segment and secure Industrial Control Systems (ICS) environments.
It organizes the ICS architecture into multiple layers, each with specific roles and security requirements.
This model helps in understanding how to effectively secure and manage different components of an ICS network.
Description: The actual physical processes and machinery, including sensors, actuators, and other devices that interact directly with the physical environment.
Examples:
Sensors measuring temperature, pressure, or flow rates.
Actuators controlling valves, motors, or pumps.
Level 1: Basic Control
Description: The control devices that directly manage Level 0 equipment, often referred to as programmable logic controllers (PLCs) or remote terminal units (RTUs).
Examples:
PLCs and RTUs executing control logic to automate processes.
Human-Machine Interfaces (HMIs) at the local control level.
Level 2: Supervisory Control
Description: Systems that provide supervisory control and data acquisition (SCADA) functions, aggregating data from Level 1 and providing oversight and control.
Examples:
SCADA systems for real-time monitoring and control.
HMIs at the supervisory control level.
Level 3: Operations Management
Description: Systems used for production control, including batch management, production scheduling, and other operational functions.
Examples:
Manufacturing Execution Systems (MES) managing production workflows.
Systems for coordinating production processes and ensuring quality control.
Level 4: Enterprise Systems
Description: Enterprise-level systems that manage business logistics, planning, and enterprise resource management.
Examples:
Enterprise Resource Planning (ERP) systems.
Customer Relationship Management (CRM) systems.
Level 5: External Networks
Description: Connections to external networks, including business partners, suppliers, and the internet.
Secure Software Development Life Cycle (SDLC): Integrates security into the software development process to produce secure software.
Minimum Password Requirements: Sets baseline standards for password creation to enhance account security.
Policies and Procedures: Establishes a framework for organizational security practices and employee behavior, supported by training and awareness programs.