Fact Pen Testing Final
Fact Pen Testing Final
The “pen-tester” is hired to think like a hacker, determine what types of attacks
DID YOU the system may be susceptible to, and then implement them to see if they
work. Once the technical work is complete, the pen-tester compiles a report for
KNOW…
the organization. The report usually provides a step-by-step explanation of the
types of attacks tried; which attacks were blocked and which were successful;
and which actions are needed to correct, in priority order. At a minimum, the
test will identify insecure configurations, software patches that weren’t applied,
ü The Open Web Application open ports, software or systems not supported by manufacturers. The test may
Security Project (OWASP) also include a phishing scam to determine if employees fall victim to this type
lists the top ten most critical of attack.
web application security risks.
OWASP 17 was recently
released. FACT 1: TYPES OF PEN TESTS
ü Pen testers typically refer to There are three different types of pen tests that an organization can perform. A
OWASP to conduct pen tests. “white-box” pen test provides testers with full knowledge of the information
system and all system documentation, such as vulnerability assessments and
ü Remember – start with a risk system diagrams. A “black-box” pen test occurs when the tester takes on the
based approach – determine role of an attacker and has no prior knowledge of the information system. The
the likelihood of an event and pen tester in a black-box scenario must conduct their own reconnaissance to
the requisite impact. Rank the determine how to best “exploit” the weaknesses in the system. A “gray-box”
risk and correct! test is when the testers are provided partial knowledge of the system and
limited documentation. The type of test conducted is likely to be determined by
ü Back up important data often the organization and what they are trying to learn from the test.
to reduce overall vulnerability
and mitigate potential impacts FACT 2: COMPLIANCE
of an attack.
If you are an organization that accepts payment for goods and services via
ü Employee training is an
credit card, you may be required to have annual pen tests completed, under
essential prevention strategy
to keep your systems safe.
One of the most important aspects of a penetration test is it must be approved by management. A signed
agreement between management and the IT security firm must be in place before the test begins, or there
could be legal ramifications should something go wrong. While not everyone in the organization needs to be
aware of the test, upper management should know when it is occurring. The agreement between the
managers and the testers may include information such as what type of tests will be performed; what if any
systems are off limits/excluded from the test; where and when will the test be performed; and under what
circumstances would the test be stopped and the organization notified immediately. These are just some of
the elements in a penetration test agreement.
FACT 5: RESOURCES
The General Services Administration (GSA) has developed standardized IT security penetration
services for federal, state and local governments. These services referred to as Highly Adaptive
Cybersecurity Services (HACS) are listed at the U.S. GSA Advantage website. While these are
resources for the public sector, they do have a list of approved vendors and examples of statements of
work and items to consider for pen testing.
HACS 132-45A Penetration Testing, lists services to consider including: Network Mapping,
Vulnerability Scanning, Phishing Assessment, Wireless Assessment, Web Application Assessment,
Operating System Security Assessment (OSSA), and Database Assessment.
https://www.gsaelibrary.gsa.gov/ElibMain/sinDetails.do?executeQuery=YES&scheduleNumber=70&flag=&fi
lter=&specialItemNumber=132+45D
OWASP Top 10 - 2017 – Open Web Application Security Project, The Ten Most Critical Web Application
Security Risks:
https://www.owasp.org/images/7/72/OWASP_Top_10-2017_%28en%29.pdf.pdf