Penetrating Networks For CompTIA PenTest+
Penetrating Networks For CompTIA PenTest+
Michael Govinda
NetCom Learning
Vulnerability Assessment
Penetration Testing
Planning
Reconnaissance Reconnaissance
Scanning Scanning
Reporting
Planning Can include project scope, logistics, and other preliminary activities.
MSA
Master service agreement An agreement that establishes precedence and guidelines for any business documents that are
executed between two parties.
NDA
Non-disclosure agreement A business document that stipulates the parties will not share confidential information,
knowledge, or materials with unauthorized third parties.
SOW
Statement of work A business document that defines the highest level of expectations for a contractual
arrangement.
• Export restrictions.
• Local and national governmental restrictions.
• Corporate or organizational policies.
• What is to be tested?
• What is not to be tested?
• What cannot be tested?
• Budgetary considerations. Headquarters
• Examples:
• Fragile legacy server
• Third-party hosted website
• Offshore data center
Satellite Office
• Point-in-time assessment
• Comprehensiveness
• Others?
Scope: In a pen test engagement, the boundaries that describe the extent of the
engagement, including what specific systems are to be tested, to what degree the
systems should be tested, and how the pen testers should spend their time.
In Scope
Out of Scope
• Goal- or objective-based:
• What needs protection?
• Compliance-based:
• Industry or governmental mandate.
• Red team
• Threat actor: An entity partially or wholly responsible for an incident that affects or
can affect an organization’s security.
• Script kiddies: Novice or inexperienced hackers with limited technical knowledge
who rely on automated tools to hack into targets.
• Hacktivists: Hackers who gain unauthorized access to and cause disruption in a
computer system in an attempt to achieve political or social change.
• APT: A threat that uses multiple attack vectors to gain unauthorized access to
sensitive resources.
• Insider threats: Present and past employees, contractors, partners, and any entities
that have access to proprietary or confidential information and whose actions result
in compromised security.
Tier Description
Those who invest a relatively small amount of money to use off-the-shelf tools to exploit known
I
vulnerabilities.
Those who invest a relatively small amount of money to develop their own tools to exploit
II
known vulnerabilities.
Those who invest millions of dollars to discover unknown vulnerabilities that enable them to
III
steal personal and corporate data that they can sell to other criminal elements.
Organized, highly technical, proficient, well-funded professionals who work in teams to discover
IV
new vulnerabilities and develop new exploits.
Nation states that invest billions to create vulnerabilities by influencing commercial products
V
and services.
Nation states that invest billions to carry out a combination of cyber, military, and intelligence
VI
operations to achieve a political, military, or economic goal.
32
33
Scope creep: The condition that occurs when a client requests additional services after a
SOW has been signed and the project scope has been documented and agreed upon.
• Any type of project, not just pen testing.
• Takes resources and effort away from the items documented in the SOW.
• Less time unless you add more testers.
• Less diligent testing is possible.
• Testing organization can be forced to take a financial loss.
• Legal protection might be affected.
• Try to get another agreement to cover the additional work.
• Extra time.
• Extra money.
• Possible reduction in costs for client.
37
38
39
40
41
• Alleviates the need for pen testers to make risky or possibly damaging decisions
without input from other stakeholders.
• A clear chain of command provides the starting point for escalating issues.
• Team members report issues only to those who are above them in the chain of
command.
• Encourage the client organization to appoint a point person who is the counterpart
of the pen test project supervisor.
• Always have a supervisor on duty.
• Train team members:
• Check in with the lead, especially at the start and end of a specific task.
• Notify the lead when anomalies are discovered.
• Notify the lead if out-of-scope issues arise.
• Refrain from action on out-of-scope issues until authorized to act.
42
43
To watch the recorded webinar video for live demos, please access the link:
http://tiny.cc/3ogdpz
© 1998-2019
1998-2020NetCom
NetCom Learning
Learning www.netcomlearning.com
www.netcomlearning.com || [email protected] || 1-888-563-8266
RECOMMENDED COURSES
CISSP
MILE2
» MILE2 CERTIFIED PENETRATION TESTING ENGINEER (C)PTE) - SPECIALIZED – Class Scheduled on June 15
» MILE2 CERTIFIED INCIDENT HANDLING ENGINEER (C)IHE) - SPECIALIZED – Class Scheduled on June 15
» MILE2 CERTIFIED INFORMATION SYSTEMS SECURITY OFFICER (C)ISSO) - FOUNDATIONAL – Class Scheduled on June 22
» MILE2 CERTIFIED VULNERABILITY ASSESSOR (C)VA) - FUNDAMENTAL – Class Scheduled on July 13
© 1998-2019
1998-2020NetCom
NetCom Learning
Learning www.netcomlearning.com
www.netcomlearning.com || [email protected] || 1-888-563-8266
RECOMMENDED MARKETING ASSETS
© 1998-2019
1998-2020NetCom
NetCom Learning
Learning www.netcomlearning.com
www.netcomlearning.com || [email protected] || 1-888-563-8266
UPCOMING WEBINARS
& More
© 1998-2019
1998-2020NetCom
NetCom Learning
Learning www.netcomlearning.com
www.netcomlearning.com || [email protected] || 1-888-563-8266
PROMOTIONS
© 1998-2019
1998-2020NetCom
NetCom Learning
Learning www.netcomlearning.com
www.netcomlearning.com || [email protected] || 1-888-563-8266
PROMOTIONS
© 1998-2019
1998-2020NetCom
NetCom Learning
Learning www.netcomlearning.com
www.netcomlearning.com || [email protected] || 1-888-563-8266
PROMOTIONS
© 1998-2019
1998-2020NetCom
NetCom Learning
Learning www.netcomlearning.com
www.netcomlearning.com || [email protected] || 1-888-563-8266
FOLLOW US ON
© 1998-2019
1998-2020NetCom
NetCom Learning
Learning www.netcomlearning.com
www.netcomlearning.com || [email protected] || 1-888-563-8266
BUILDING AN INNOVATIVE LEARNING ORG.
DOWNLOAD e-book
© 1998-2019
1998-2020NetCom
NetCom Learning
Learning www.netcomlearning.com
www.netcomlearning.com || [email protected] || 1-888-563-8266
Thank you