HOD402_Pentesting_Reference-v1
HOD402_Pentesting_Reference-v1
1. Objectives
2. Scope:
o Known-environment testing
o Unknown-environment testing
o Out of scope
3. Methodology
o Local Restrictions
o Contract
o Disclaimers
o Costs
1
HOD402
1. Manual Analysis: using some frameworks and standards, such as OWASP Top 10, SANS Top
25, Misconfiguration Checks, Session Management Checks, Authentication and
Authorization Checks, Input Validation Checks, Source Code Review (if White Box), API
Testing (if applicable) …
2. Severity Assessment: Using a scoring system like CVSS (Common Vulnerability Scoring
System) to determine the severity of each vulnerability (Critical, High, Medium, Low).
Phase 4: Exploitation
Phase 5: Post-Exploitation
1. Creating a Foothold
2. Maintaining Persistence After Compromising a System
Phase 6: Reporting
1. Executive Summary
2. Scope Details
3. Methodology
4. Findings
5. Remediation
6. Conclusion
7. Appendix