CompTIA PenTest Master Cheat Sheet
CompTIA PenTest Master Cheat Sheet
CompTIA PenTest Master Cheat Sheet
Target audience may be management, technical teams, etc. Usually pentest report
has several groups to target, each of them having different:
Rules of engagement
Rules describe expectations for client and limitations or rights for testers.
when active portions of testing are performed? during business hours, after business
hours, on the weekends, etc.
which hosts, networks, domains & other resources are being tested, and which are
not
black box, white box or grey box
will client's security team and/or other employees know about the engagement
are there appliances which may impact the effectiveness of attacks, such as firewall,
IPS, WAF, load balancer, etc.
what are the acceptable social engineering pretexts
is it allowed to DoS-test clients infrastructure and other relevant rules.
pg. 1
SKILLCERTPRO
Without communication incident handling is delayed, customer does not know what
the pentest team is doing and sometimes feels insecure, other problems arise.
Confidentiality of findings
Budget
pg. 2
SKILLCERTPRO
Of course, for the client hiring a pentest firm is also an investment, which is aimed at
increased revenue/trust/etc. or decreased number of vulnerabilities, risk, financial
losses due to incidents, etc.
A win-win between pentesting firm and client has to exist in order for the pentest to
be successful.
Disclaimers
Point-in-time assessment
Client has to understand that pentest report is not a "certificate" which guarantees
security in good times and in bad, in sickness and in health. One simple configuration
change one hour after pentest is over and boom, you're scr*wed. Pentests should be
regular and ideally from different, qualified vendors.
Comprehensiveness
Usually clients are interested in making the scope as broad as possible while paying
minimum, and they also expect results as fast as possible (something between 1
week and 1 month).
In such a case it is important to understand that the broader the scope, the bigger is
the complexity of it and the time required for testing. It is most likely insane to
demand the whole linux kernel project to be audited for security in a day for just 5
bucks.
Pentesting firms should aim at narrowing the scope and increasing revenue for
engagement at the same time. It is also not possible to find all vulnerabilities during
an engagement.
pg. 3
SKILLCERTPRO
Technical constraints
Pentesters do not have superpower. Sometimes there are technical constraints which
affect the effectiveness of an engagement. For example, it is hard to penetrate air
gapped networks remotely.
Support resources
WSDL/WADL
SDK documentation
SDK usually uses API and is written for particular programming language.
Swagger document
As a modern alternative to WSDL, WADL, SOAP & other, Swagger provides possibility
to document web applications.
pg. 4
SKILLCERTPRO
XSD
<?xml version="1.0"?>
<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema">
<xs:element name="note">
<xs:complexType>
<xs:sequence>
<xs:element name="to" type="xs:string"/>
<xs:element name="from" type="xs:string"/>
<xs:element name="heading" type="xs:string"/>
<xs:element name="body" type="xs:string"/>
</xs:sequence>
</xs:complexType>
</xs:element>
</xs:schema>
Sample application requests, as well as test code, may serve as documentation for
pentesters.
Architectural diagrams
SOW
MSA
pg. 5
SKILLCERTPRO
agreements. A master service agreement allows the involved parties to more quickly
negotiate future transactions or agreements, because they can rely on the strong
foundation of the master agreement for future business, so that the same terms
need not be repetitively negotiated, and you only need to negotiate terms specific to
the latest deal.
NDA
Environmental differences
Export restrictions
In the early days of the Cold War, the U.S. and its allies developed an elaborate series
of export control regulations designed to prevent a wide range of Western
technology from falling into the hands of others, particularly the Eastern bloc. All
export of technology classed as 'critical' required a license. CoCom was organized to
coordinate Western export controls.
In US (national) for example, some states have their own (local) laws.
Corporate policies
pg. 6
SKILLCERTPRO
Written authorization
Client might use third party resources for their operation (APIs, SaaS, IaaS, PaaS, etc.).
Is such cases, they should be excluded from scope if no permission has been given
for pentesting from those third-parties.
pg. 7