LPTv4 Module 15 Pre Penetration Testing Checklist NoRestriction PDF
LPTv4 Module 15 Pre Penetration Testing Checklist NoRestriction PDF
LPTv4 Module 15 Pre Penetration Testing Checklist NoRestriction PDF
EC Council
EC-Council
Module XV
Pre-Penetration Testing
Checklist
List of Steps
1
2
3
4
5
6
7
8
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Request from the client organization for previous penetration testing report/ vulnerability
assessment reports (if possible)
10
Prepare rules of engagement that lists the companys Core competencies/ limitations/
timescales
11
Hire a lawyer who understands information technology and can handle your penetration testing
legal documents
12
13
14
4
15
16
EC-Council
Prepare penetration testing legal document and get it vetted with your lawyer
Prepare Non-disclosure Agreement (NDA) and have the client sign them
Obtain (if possible) liability insurance from a local insurance firm
Identify your core competencies/limitations
Allocate
All
a budget
b d
ffor the
h penetration
i testing
i project
j
(X amount off dollars)
d ll )
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
18
List the security tools that you will be using for the penetration testing project
19
List the hardware and software requirements for the penetration testing project
20
21
List the servers, workstations, desktops, and network devices that need to be tested
22
Identify the type of testing that would be carried out - Black Box or White Box testing
23
Identify
de t y tthee type o
of test
testing
g tthat
at wou
would
d be ca
carried
ed out - a
announced/
ou ced/ u
unannounced
a ou ced
24
25
Identify
Id tif local
l l manpower required
i d ffor pen ttestt
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
List the contact details of key personnel of the client organization who will be in charge of the
penetration testing project
Obtain the contact details of the key person at the client company during an emergency
Points of contacts during an emergency
List the tests that WILL NOT BE carried out at the client network
Identify the purpose of the test you are carrying out at the client organization
Identify the network topology in which the test would be carried out
Obtain special permission if required from local law enforcement agency
List
Li k
known waivers/exemptions
i
/
i
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
35
36
3
37
Negotiate per day per hour fee that you will be charging for the penetration testing project
38
39
Draft a quotation for the services that you be providing to the client organization
40
Identify how the final penetration testing report will be delivered to the client organization
41
42
Identify the information security administrator of the client organization who will be helping you
in the penetration testing assignment (if possible)
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Make yourself comfortable with all the facilities so that you will
not face difficulty while checking for the physical security of the
client organization as a part of your assignment (in case the
client wants you to do it).
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Inspect the area where the testing team carries out its work.
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Internal/external
/
testing
g
Whitebox/Blackbox testing
Announced/unannounced testing
Testing according to the number of IPs
Physical/security policy testing
Testing a particular server/service
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Employees.
Customers
Customers.
Shareholders.
Investors.
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Use this identity card as access card to get into the company.
Make sure that all the testers who are involved in the penetration testing
at the clients
client s organization contains an unique identity or access card.
card
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Your lawyer should vet the NDA form before you ask the client to sign.
Include clauses which will highlight the fact that you and your team will
not disclose any information divulged by the client during the course of
penetration test.
The NDA should also be aimed at protecting your interests.
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Network Management
Program Management
Data Administration
Risk Management
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Traveling
T
li expenses for
f official
ffi i l purposes.
Lodging expenses.
Food expenses.
Stationaryy expenses.
p
Expenses spent for entire team.
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
IIS server.
Application servers.
Ms-Office 2007.
Operating systems: Windows 2003 Server
Server, Vista
Vista, Linux and
Macintosh.
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Administrative procedures.
procedures
Physical safeguards.
Technical security services.
Technical
ec ca secu
securityy
mechanism.
Standards.
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Windows servers.
servers
Unix/Linux servers.
EC-Council
Routers.
Hubs.
Switches.
Modems.
d
Network load balancers.
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Whit box
White
b ttesting:
ti
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Application administrator.
Database administrator.
Network administrator.
Operating system administrator.
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Risk manager
Database administrator
Local security officer
System administrator
Networking administrator
I t
Internet
t Service
S i Provider
P id (ISP)
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
The
h main purpose off the
h test is to:
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Sign-in
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Identify
d if the
h reporting
i timescales
i
l ffrom the
h client
li
organization.
i i
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Discuss with the client organization about the report format that they
expect you to give at the end of your penetration test.
Reports can be given in any of the below listed formats:
PDF
HTML
Hard copy
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
During the assignment of penetration testing, take the help of the information
security administrator .
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited