Pentesting
  • 🏑Pentest 127.0.0.1
    • πŸ”’Enumeration
      • DNS
      • FTP
      • IMAP/POP3
      • IPMI
      • MSSQL
      • MySQL
      • SMTP
      • SNMP
    • πŸ†™Privilege Escalation
    • πŸ•³οΈVulnerability Assessment
      • Vulnerability Scanning
      • CVE/CVSS/OVAL
    • 🐚Shells & Payloads
      • πŸ•΅οΈDetection & Prevention
    • 🐧Linux
      • Exa
      • Vim
      • Kernel Exploit
      • NFS
      • Rsync
      • Rservices
      • SSH
      • ⬇️Transfering Files - Linux
        • Protected File Transfers (Linux)
    • πŸͺŸWindows
      • RDP
      • SMB
      • WMI
      • WinRM
      • ⬇️Transfering Files - Win
        • Protected File Transfers (Win)
    • πŸ•ΈοΈWeb Apps
      • Exploits
      • Web Enumeration
      • OWASP TOP 10
      • ASPX
      • PHP
      • SQL Injection
    • πŸ› οΈTools
      • BusyBox
      • Browser extensions
      • Dirb
      • EyeWitness
      • FFuF
      • Hashcat
      • Hydra
      • Laudanum
      • Metasploit
      • Netcat
      • Nishang
      • nmap
      • Online tools
      • OpenVAS
      • Tmux
    • ZAP
    • πŸ“šCheat Sheets
    • Resources
    • πŸ“„Reporting
    • Living off the Land
  • πŸ“€HackTheBox
    • HTB Resources
    • 🐾Walkthroughs
      • Nibbles
  • πŸ₯«TryHackMe
    • 🐾Walkthroughs
      • Blue (E)
      • Mr. Robot (M)
      • Blaster (H)
      • Ice Task 7 (H)
Powered by GitBook
On this page

Pentest 127.0.0.1

All-in-one guide for pentesters

NextEnumeration

Last updated 2 years ago

Hi and welcome to my page!

Pages do not follow any specific order.

Penetration Testing Standards

Penetration tests should not be performed without any rules or guidelines. There must always be a specifically defined scope for a pentest, and the owner of a network must have a signed legal contract with pentesters outlining what they're allowed to do and what they're not allowed to do. Pentesting should also be conducted in such a way that minimal harm is done to a company's computers and networks. Penetration testers should avoid making changes wherever possible (such as changing an account password) and limit the amount of data removed from a client's network. For example, instead of removing sensitive documents from a file share, a screenshot of the folder names should suffice to prove the risk.

In addition to scope and legalities, there are also various pentesting standards, depending on what kind of computer system is being assessed. Here are some of the more common standards you may use as a pentester.

PTES

The (PTES) can be applied to all types of penetration tests. It outlines the phases of a penetration test and how they should be conducted. These are the sections in the PTES:

  • Pre-engagement Interactions

  • Intelligence Gathering

  • Threat Modeling

  • Vulnerability Analysis

  • Exploitation

  • Post Exploitation

  • Reporting

OSSTMM

OSSTMM is the Open Source Security Testing Methodology Manual, another set of guidelines pentesters can use to ensure they're doing their jobs properly. It can be used alongside other pentest standards.

is divided into five different channels for five different areas of pentesting:

  1. Human Security (human beings are subject to social engineering exploits)

  2. Physical Security

  3. Wireless Communications (including but not limited to technologies like WiFi and Bluetooth)

  4. Telecommunications

  5. Data Networks

NIST

  • Planning

  • Discovery

  • Attack

  • Reporting

OWASP

OWASP maintains a few different standards and helpful guides for assessment various technologies:

The NIST (National Institute of Standards and Technology) is well known for their , a system for designing incident response policies and procedures. NIST also has a Penetration Testing Framework. The phases of the NIST framework include:

OWASP stands for the . They're typically the go-to organization for defining testing standards and classifying risks to web applications.

🏑
Penetration Testing Execution Standard
OSSTMM
NIST Cybersecurity Framework
Open Web Application Security Project
Web Security Testing Guide (WSTG)
Mobile Security Testing Guide (MSTG)
Firmware Security Testing Methodology