Pen Test 101: A handy checklist for network penetration tests

<span id="hs_cos_wrapper_name" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="text" >Pen Test 101: A handy checklist for network penetration tests</span>

Apr 24

Apr 24

Security

shutterstock_540164989.jpgSo, you need to run a penetration test (or “pen test”) on a client’s network? No problem. Here’s a checklist that should help you discover potential security loopholes in your customers’ networks.

The basic steps to follow are:

  • Footprinting
  • Vulnerability scanning
  • Vulnerability analysis to determine best attack vectors
  • Vulnerability exploit attempts
  • Remediation recommendations
  • Final report

Footprinting

The goal of footprinting is to gain information that can potentially be used to successfully exploit vulnerabilities. Since hackers typically only have an IP address or a URL initially, perform an ARIN (American Registry for Internet Numbers) or “WhoIS” domain search to determine who owns the IP address or URL.

Go to the owner’s website and check for any email addresses listed that can provide guidance as to how user IDs are defined. 

Find any executives mentioned on the website and perform both a Google search and LinkedIn profile review. Use the results to develop a custom attack database for any logins identified during the pen test.

Vulnerability scan

Next, perform a vulnerability scan of the intended target IP address or URL. The results of the scan, performed by either commercial software or toolkits provided with the Certified Ethical Hacker (CEH) certification, will also list all open ports and services, as well as the operating system (OS) of the target platform. 

This is critical because hackers use these open ports to enter the network and install backdoor code. 

The OS of the target IP address or URL is also important, as there are always vulnerabilities attributed to the OS.

Analyze vulnerability scan results

Review the results of the vulnerability scan to determine the most appropriate attack vectors for the vulnerabilities identified.

Attempt exploit

Now, you’ll need to attempt to exploit those vulnerabilities. If you’re successful in gaining access, stop. Don’t read or write any data on the target system. Document your successful exploit via a screenshot.

Create final report

Take the results of these steps and develop a final report that includes your remediation recommendations. Be sure to include links to appropriate download sites if software downloads or patch installations are required for remediation. 

It’s also important to include a summary of all vulnerability statistics and screenshots of exploit attempts.

For added impact, we recommend developing a companion PowerPoint presentation that highlights work performed, vulnerability results, critical areas to address and all recommendations for remediation.

NEED HELP?

Ingram Micro can help you perform network assessments like this one, as well as web security assessments, wireless network assessments, network threat assessments, social engineering test assessments and many more. 

Those who perform security assessments with Ingram Micro are all CEHs, and your entire project—including the final report and companion PowerPoint presentation—can be white labeled if desired.

For a complete list of what’s available, contact your Ingram Micro Professional Services team or go to https://ingrammicrolink.com/services-portfolio.

Topics: Security, Network Security

New Call-to-action
New Call-to-action

Trending Security Articles

New Call-to-action
Technology Categories