Application Security Penetration Testing Pre-Engagement
Application Security Penetration
Testing Pre-Engagement
Conducting a regular
penetration test is a helpful way to identify serious vulnerabilities
within your IT
environment. A trusted ethical hacker performs the
penetration test using a methodical and thorough
approach.
The Six Phases of a Penetration Test:

These six phases are critical to the successful planning and execution
of a penetration test.
Learn more about each of the phases of
penetration testing in the points below.
1. Pre-Engagement Interactions
One over-looked step to penetration testing is pre-engagement
interactions or scoping. During this pre-
phase, a penetration testing
company will outline the logistics of the test, expectations, legal
implications,
objectives and goals the customer would like to achieve.
During the Pre-Engagement phase, the penetration testers should work
with your company to fully
understand any risks, your organizational
culture, and the best pentesting strategy for your organization. You
may want to perform a white box, black box, or gray box penetration test. It’s at this stage when the planning
occurs along with aligning your goals to specific pentesting outcomes.
2. Reconnaissance or Open Source Intelligence (OSINT) Gathering
Reconnaissance or Open Source Intelligence (OSINT) gathering is an important first step in penetration
testing. A pentester works on gathering as much intelligence on your organization and the potential targets
for exploit.
Depending on which type of pentest you agree upon, your penetration tester may have varying degrees of
information about your organization or may need to identify critical information on their own to uncover
vulnerabilities and entry points in your environment.
Common intelligence gathering techniques include:Search engine queries
- Domain name searches/WHOIS lookups
- Social Engineering
- Tax Records
- Internet Footprinting – email addresses, usernames, social networks,
- Internal Footprinting –Ping sweeps, port scanning, reverse DNS, packet sniffing
- Dumpster Diving
- Tailgating
A pentester uses an exhaustive checklist for finding open entry points and vulnerabilities within the
organization. The OSINT Framework provides a plethora of details for open information sources.
3. Threat Modeling & Vulnerability Identification
During the threat modeling and vulnerability identification phase, the tester identifies targets and maps theattack vectors. Any information gathered during the Reconnaissance phase is used to inform the method of
attack during the penetration test.
The most common areas a pentester will map and identify include:
- Business assets – identify and categorize high-value assets
- Employee data
- Customer data
- Technical data
- Threats – identify and categorize internal and external threats
- Internal threats – Management, employees, vendors, etc.
- External threats – Ports, Network Protocols, Web Applications, Network Traffic, etc.
A pentester will often use a vulnerability scanner to complete a discovery and inventory on the security risks
posed by identified vulnerabilities. Then the pentester will validate if
the vulnerability is exploitable. The list
of vulnerabilities is shared
at the end of the pentest exercise during the reporting phase.
4. Exploitation
With a map of all possible vulnerabilities and entry points, the pentester begins to test the exploits found
within your network,
applications, and data. The goal is for the ethical hacker is to see
exactly how far they
can get into your environment, identify high-value
targets, and avoid any detection.
If you established a scope initially, then the pentester will only go as far as determined by the guidelines you
agreed upon during the initial scoping. For example, you
may define in your scope to not pentest cloud
services or avoid a
zero-day attack simulation.
Some of the standard exploit tactics include:
- Web Application Attacks
- Network Attacks
- Memory-based attacks
- Wi-Fi attacks
- Zero-Day Angle
- Physical Attacks
- Social engineering
The ethical hacker will also review and document how vulnerabilities are
exploited as well as explain the
techniques and tactics used to obtain
access to high-value targets. Lastly, during the exploitation phase, the
ethical hacker should explain with clarity what the results were from
the exploit on high-value targets.
5. Post-Exploitation, Risk Analysis & Recommendations
After the exploitation phase is complete, the goal is to document the methods used to gain access to your
organization’s valuable information. The penetration tester should be able to determine the value of the
compromised systems and any value associated with the sensitive data captured.
Some pentesters are unable to quantify the impact of accessing data or
are unable to provide
recommendations on how to remediate the
vulnerabilities within the environment. Make sure you ask to see
a sanitized penetration testing report that clearly shows recommendations for fixing security holes and
vulnerabilities.
Once the penetration testing recommendations are complete, the tester should clean up the environment,
reconfigure any access he/she obtained to penetrate the environment, and
prevent future unauthorized
access into the system through whatever
means necessary.
Typical cleanup activities include:
- Removing any executables, scripts, and temporary files from compromised systems
- Reconfiguring settings back to the original parameters prior to the pentest
- Eliminating any rootkits installed in the environment
- Removing any user accounts created to connect to the compromised system
6. Reporting
Reporting is often regarded as the most critical aspect of a pentest. It’s where you will obtain writtenrecommendations from the penetration testing company and have an opportunity to review the findingsfrom the report with the ethical hacker(s).
The findings and detailed explanations from the report will offer you insights and opportunities to
significantly improve your security posture. The report should show you exactly how entry points were
discovered from the OSINT and Threat Modeling phase as well as how you can remediate the security issues
found during the Exploitation phase.
Your penetration report will also include a helpful overall security risk score. It may be inspired by ITIL, FAIR, or DREAD methods and look something like this:

Your next penetration test
can be an eye-opening exercise to improve your overall security posture.
Imagine
having the peace-of-mind knowing exactly where your
vulnerabilities are and how to remediate them over
the course of the
next few months. Across each stage of the penetration test, your final
report will glean
many informative results for your organization.
Did you enjoy this blog article? Comment below with your feedback.
No comments