0% found this document useful (0 votes)
13 views

Simple Project

This document outlines a simple project with 27 tasks scheduled from May 2023 to August 2023. The project involves three phases: pre-engagement testing, external testing, and internal testing. Key tasks include defining the project scope with the client, reconnaissance of the client's infrastructure, scanning for vulnerabilities, exploiting systems to gain access, testing attack scenarios, and documenting findings. The internal testing phase will include developing and testing a phishing campaign and analyzing the results.

Uploaded by

Tafadzwa Songore
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

Simple Project

This document outlines a simple project with 27 tasks scheduled from May 2023 to August 2023. The project involves three phases: pre-engagement testing, external testing, and internal testing. Key tasks include defining the project scope with the client, reconnaissance of the client's infrastructure, scanning for vulnerabilities, exploiting systems to gain access, testing attack scenarios, and documenting findings. The internal testing phase will include developing and testing a phishing campaign and analyzing the results.

Uploaded by

Tafadzwa Songore
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Simple Project

Name Assigned to Start Finish % Complete

1 Pre--‐EngneaeEmtP gEElEn 5/2/2023 5/16/2023 0

2 Scope definition and agreement with the client 5/2/2023 5/2/2023 0

Gathering of initial information about the client's infrastructure


3 5/2/2023 5/9/2023 0
and network

4 Signing of authorisations and agreements 5/2/2023 5/5/2023 0

5 CAB approvals, project timelines, deliverables, and milestones 5/2/2023 5/16/2023 0

6 -‐imerEg tPeExeTm 5/22/2023 7/21/2023 0

7 Reconnaisance and information gathering 5/22/2023 5/29/2023 0

8 Scanning and mapping of the websites and applications 5/26/2023 5/30/2023 0

9 Identification of potential attack vectors 6/1/2023 6/6/2023 0

Exploitation of discovered vulnerabilities to gain access to sys-


10 6/7/2023 6/28/2023 0
tems and data

11 -‐esting of identified attack scenarios and vectors 6/14/2023 7/3/2023 0

12 Tocumentation of all findings, exploits, and recommendations 7/3/2023 7/21/2023 0

13 sEmerEg tPeExeTmtI1t:CroCrgme 6/12/2023 8/11/2023 0

14 Scanning and mapping of the client's network and systems 6/12/2023 6/26/2023 0

15 Identification of potential attack vectors 6/27/2023 6/30/2023 0

Exploitation of discovered vulnerabilities to gain access to sys-


16 7/3/2023 7/17/2023 0
tems and data

17 -‐esting of identified attack scenarios and vectors 7/18/2023 7/25/2023 0

18 Tocumentation of all findings, exploits, and recommendations 7/24/2023 8/11/2023 0

19 sEmerEg tPeEmeTmtp1t2rCgBdgTmlEn 6/19/2023 8/18/2023 0

20 Scanning and mapping of the client's network and systems 6/19/2023 7/4/2023 0

21 Identification of potential attack vectors 7/4/2023 7/21/2023 0

22 Tocumentation of all findings, exploits, and recommendations 7/25/2023 8/18/2023 0

23 PclTclEnt-‐ierdlTe 8/1/2023 8/25/2023 0

24 Plan and Prepare Environment inclD scope, exclusions, whitelists 8/1/2023 8/3/2023 0

25 Tevelop and -‐est Phishing Email 8/3/2023 8/7/2023 0

Exported from .icrosoft Project on 5/12/2023 Page 1 of 4


Simple Project
Name

1 Pre--‐EngneaeEmtP gEElEn

2 Scope definition and agreement with the client

Gathering of initial information about the client's infrastructure


3
and network

4 Signing of authorisations and agreements

5 CAB approvals, project timelines, deliverables, and milestones

6 -‐imerEg tPeExeTm

7 Reconnaisance and information gathering

8 Scanning and mapping of the websites and applications

9 Identification of potential attack vectors

Exploitation of discovered vulnerabilities to gain access to sys-


10
tems and data

11 -‐esting of identified attack scenarios and vectors

12 Tocumentation of all findings, exploits, and recommendations

13 sEmerEg tPeExeTmtI1t:CroCrgme

14 Scanning and mapping of the client's network and systems

15 Identification of potential attack vectors

Exploitation of discovered vulnerabilities to gain access to sys-


16
tems and data

17 -‐esting of identified attack scenarios and vectors

18 Tocumentation of all findings, exploits, and recommendations

19 sEmerEg tPeEmeTmtp1t2rCgBdgTmlEn

20 Scanning and mapping of the client's network and systems

21 Identification of potential attack vectors

22 Tocumentation of all findings, exploits, and recommendations

23 PclTclEnt-‐ierdlTe

24 Plan and Prepare Environment inclD scope, exclusions, whitelists

25 Tevelop and -‐est Phishing Email

Exported from .icrosoft Project on 5/12/2023 Page 2 of 4


Simple Project
Name Assigned to Start Finish % Complete

26 Mickoff Campaign 8/8/2023 8/15/2023 0

27 Analyse and Tocument Results 8/17/2023 8/25/2023 0

Exported from .icrosoft Project on 5/12/2023 Page 3 of 4


Simple Project
Name

26 Mickoff Campaign

27 Analyse and Tocument Results

Exported from .icrosoft Project on 5/12/2023 Page 4 of 4

You might also like