Preview

Penetration Test plan

Better Essays
Open Document
Open Document
869 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Penetration Test plan
Unit 1 Lab 1
1. A table of contents:
The scope of this Penetration test will include a fully intrusive without compromise attack and penetration test on the e-commerce web-based application server and cisco core backbone network that will be during the hours of 2:00am – 6:00am on Saturday and Sunday only. There will be no compromise on the extraction of information. A compromise can be involved only with Written Client Authorization Only. We will apply a full system backup prior to attack and penetration attack in the event of system malfunction or loss of data. This is subject to change at the Clients’ discretion.
2. Authorization letter:
We at E-Commerce Emporia authorize Darren Flory, Jason Olea, and James Williams of Hackers United to administer an Intrusive attack and penetration test during the hours of 2:00am to 6:00am every Saturday and Sunday until all weaknesses and vulnerabilities are established, limited or eliminated. A full system backup will be initiated pre-test each week. Any system failure as a result of testing will be handled by E-Commerce Emporia with Hackers United assisting in the fixing of the potential problems that arose.
3. A list of client questions that you need to answer:
When will this test take place?
How much will this affect my production processing?
Can the test avoid certain systems?
How does web penetration test different from network penetration test?
Should we advise the IT staff of the test.
4. A test plan scope defining what is in scope and what is out of scope and why:
The scope of this project is to perform a penetration test on the web-based application server, Cisco Core Backbone Network, and post penetration test assessment. All other aspects are considered out of scope.
5. Goals & objectives:
To find as many known vulnerabilities that can be located in the NIST vulnerability database. A successful test will be to find and document vulnerabilities and provide solutions to correct these issues.

You May Also Find These Documents Helpful

  • Good Essays

    Penetration testing, on Web applications and Web servers is a critical step in ensuring the confidentiality, integrity, and availability (CIA) of the Web application or service. If e-commerce or privacy data is entered into the Web application, the company is bound by compliance laws and standards to ensure the confidentiality of customer data. It is especially critical when the Web application requires customers to input private data.…

    • 575 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Itt 255 IT255 Instructor Lab Manual LABORATORY Instructor Lab Manual IT255 Fundamentals of Information Systems Security Copyright © 2012 Jones & Bartlett Learning, LLC www.jblearning.com All Rights Reserved. Current Version Date: 12/06/2010 -1- IT255 Instructor Lab Manual LABORATORY ISS Curriculum Overview............................................................................................................................. 5 Ethics and Code of Conduct.......................................................................................................................... 6 ISS Mock IT Infrastructure ...........................................................................................................................…

    • 33056 Words
    • 133 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The explosive growth and popularity of the Internet have resulted in thousands of structured query able information sources. Most organizations are familiar with Penetration Testing and other ethical hacking techniques as a means to understanding the current security status of their information system assets. Consequently, much of the focus of research, discussion, and practice, has traditionally been placed upon active probing and exploitation of security vulnerabilities. Since this type of active probing involves interacting with the target, it is often easily identifiable with the analysis of firewall and intrusion detection/prevention device (IDS or IPS) log files.…

    • 501 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    As a security professional, you have been asked to perform an intrusive penetration test which involves cracking into the organization’s WLAN for a company. While performing this task, you are able to retrieve the authentication key. Should you use this and continue testing, or stop here and report your findings to the client.…

    • 283 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab #2

    • 402 Words
    • 2 Pages

    This lab demonstrated the first three steps in the hacking process that is typically performed when conducting ethical hacking or penetration testing. The first step in the hacking process is to perform an IP host discovery and port/services scan (Step 1: Reconnaissance and Probing) on a targeted IP subnetwork using Zenmap GUI (Nmap) security scanning software. The second step in the hacking process is to perform a vulnerability assessment scan (Step 2: Scanning) on the targeted IP subnetwork using Nessus vulnerability assessment scanning software. Finally, the third step in the hacking process (Step 3: Enumeration) is to identify information pertinent to the vulnerabilities found to exploit the vulnerability.…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 567 Words
    • 3 Pages

    You should follow the plan that was laid out in the planning stage of the penetration test…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    IS4560 Graded Assingments

    • 5563 Words
    • 23 Pages

    This particular report provides information on cutting edge and growing threats to Internet security. Using the background provided by the class so far, as well as your own critical thinking skill, you need to write a summary of the top threats described in the whitepaper. Explain why the threats are important issues and how these threats have changed or are changing.…

    • 5563 Words
    • 23 Pages
    Powerful Essays
  • Better Essays

    References: Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuéllar, J., ... & Vigneron, L. (2005, January). The AVISPA tool for the automated validation of internet security protocols and applications. In Computer Aided Verification (pp. 281-285). Springer Berlin Heidelberg.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Aup Definition

    • 554 Words
    • 3 Pages

    Refer to the handout Testing and Monitoring Security Controls. It contains information on security events or breaches and baseline anomalies.…

    • 554 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Over the past three years Context has gathered statistics from a range of IT security activities and consultancy engagements. One of the most common activities performed during this period has been web application penetration testing. This whitepaper will provide a unique insight into the state of web application security, presenting penetration test analysis drawn from a dataset containing nearly 12,000 confirmed vulnerabilities, found in almost 900 prerelease and production web applications during the period between January 2010 and December 2012. This dataset has been generated using the output from manually-guided penetration tests, not automated vulnerability scanners. The fact that all vulnerabilities have been identified and confirmed manually means the dataset provides a credible and high-quality resource that can be used to review the current state of web application security. In this whitepaper we present analysis…

    • 8987 Words
    • 36 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The first lab task is to align your identified threats and vulnerabilities from Lab #1 – How to Identify Threats and Vulnerabilities in Your IT Infrastructure.…

    • 1165 Words
    • 6 Pages
    Satisfactory Essays
  • Powerful Essays

    Test Plan

    • 2415 Words
    • 10 Pages

    6. PASS / FAIL CRITERIA 6.1 Suspension Criteria 6.2 Resumption Criteria 6.3 Approval Criteria 8 8 8 8…

    • 2415 Words
    • 10 Pages
    Powerful Essays
  • Best Essays

    Intrusion Detection Systems

    • 2701 Words
    • 11 Pages

    References: This article incorporates public domain material from the National Institute of Standards and Technology document "Guide to Intrusion Detection and Prevention Systems, SP800-94" by Karen Scarfone, Peter Mell (retrieved on 1 January 2010).…

    • 2701 Words
    • 11 Pages
    Best Essays
  • Good Essays

    Any site investigations should be carried out following code of practice for site investigation ‘BS 5930’ according to the British Standards. The building standards provide us with the best practice and provide a good guide on how to proceed and complete a building project.…

    • 4426 Words
    • 18 Pages
    Good Essays

Related Topics