eSecurity Planet

Penetration Testing Phases & Steps Explained

Ray Fernandez

eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More .

Organizations use penetration testing to strengthen their security. During these tests, simulated attacks are executed to identify gaps and vulnerabilities in the IT environment.

But before hiring penetration testers or starting a pentesting program, any organization should be aware of the phases and steps involved in the process. These tests are critical for obtaining an integrated view of a system, understanding how possible security breaches can occur, getting into the mindset of cyber criminals, and patching flaws.

Penetration testing can use different techniques, tools, and methods. For example, they might simulate an external attack, as in a black box pen test; an internal attack, or a white box pen test; or an external attack that has internal credentials, called a gray box pen test, which cyber criminals usually obtain through phishing. The different variables require all sides to be fully informed for a practical penetration test to be successful.

See the Best Penetration Testing Tools

What are the 7 Penetration Testing Phases?

Some organizations list five penetration phases while others list six or seven. Additionally, organizations may have different names for each phase, despite the processes of the phase being identical.

The discrepancy in the number of test phases is due to two stages that occur before the test and once it is concluded, which some organizations leave out. While they are not technical parts of the test, they have proven vital for security. This report includes all seven stages to give full visibility of the processes required for a penetration test.

The seven phases of penetration testing are:

  • Pre-engagement
  • Reconnaissance or Open Source Intelligence (OSINT) Gathering
  • Scanning or Discovery
  • Vulnerability Assessment: Gaining Access
  • Exploitation: Maintaining access
  • Post-Exploitation, Reporting, and Risk Analysis
  • Remediation

1. Pre-engagement

Pre-engagement is a phase often left out. However, it is fundamental for penetration testers and organizations to be on the same page. Built In explains that it is a bad idea to hire a penetration tester and let them run wild on your network . The pre-engagement phase is where the scope, logistics, rules of engagement, and timeline of the entire pen test are set with clear goals, targets, and objectives.

If there is no understanding of what needs to be tested and what type of tests are required, the results of a penetration test will be incomplete or even irrelevant. Pre-engagement is where the test is planned; therefore, no organization nor pentester should start without going through this first step.

Additionally, to thoroughly test the system, actions are required from pentesters that would be illegal without explicit consent or authorization. This is why organizations should also set clear rules of engagement in contracts with testers. Contracts, signed during pre-engagement, should also list critical assets, the main goals of the test, and other precautions.

2. Reconnaissance or open-source intelligence (OSINT) gathering

EC-Council Cybersecurity Exchange explains that reconnaissance is where testers gather as much information about the system as possible. But it’s not just about collecting random data. The goal is to gather data relevant to the tests that will be executed. This is why the first stage is critical. Planning the penetration test allows the tester to be more precise when determining what type of data they gather to plan an effective attack strategy.

Reconnaissance can be active, when the tester engages directly with the target system, or passive, where publicly available information is obtained. Usually, comprehensive testers use both methods.

Active data gathering might include networks, operating systems and applications, user accounts, domain names, and mail servers. At the same time, passive techniques or open-source intelligence may use social media, websites, tax information, and other public information.

Some tools used to gather network information include Censys or Shodan . Reconnaissance tools scan public-facing IP addresses and index their response headers, giving pentesters a complete idea of the external networks without having to run scans actively.

The OSINT Framework , used in penetration testing data gathering phases, reveals how vast  resources of open-source information are available for this stage. Cipher explains that pentesters use an exhaustive checklist to find open entry points and vulnerabilities within the organization.

3. Scanning or discovery

In this phase, testers look for entry points. Ideally, they seek to identify as many open ports as possible. Several tools are used in this stage to identify the open ports and check network traffic.

The discovery phase consists of scanning and asset analysis using tools such as Nmap , which is a network scanner used to discover hosts and services on a computer network by sending packets and analyzing the responses. In this phase, the tester can gain information on available assets and information, such as operating systems, open ports, and running services.

If the tester runs a white box test, the organization may have already provided the list of IPs to target, assets, and other network information. However, if they are running gray or black box tests, they simulate an actual attack and work without this information. Therefore, this phase is critical when running gray and black box tests.

See the Best Vulnerability Scanning Tools

4. Vulnerability assessment: Gaining access

Using the data gathered during the previous phases, the tester will begin building a threat model and assess vulnerabilities . Targets are identified, and the tester maps the attack vectors.

Pentesters will map and identify areas and high-value assets, such as:

  • Employee data
  • Customer data
  • Partners and supply chain data
  • Technical data
  • Internal and external threats from management

Penetration testers can use resources like the National Vulnerability Database (NVD), a repository of vulnerability management data that analyzes software vulnerabilities published in the Common Vulnerabilities and Exposures (CVE) database, EC-Council explains. While manual vulnerability scanning can be done, testers usually use tools like Tenable, Rapid7, Qualys, and Nmap.

Some security organizations refer to this stage as “gaining access.” Imperva explains that testers use web application attacks, such as cross-site scripting , SQL injection , and backdoors, to find vulnerabilities and exploit them by escalating privileges, stealing data, intercepting traffic, and other techniques.

5. Exploitation: Maintaining access

In this stage, testers prove whether the vulnerabilities identified can be exploited. Also known as maintaining access, exploitation is one of the most critical stages because the tester is attempting to breach and access the target system.

In this penetration testing phase, the tester attempts to access the target system and exploit the identified vulnerabilities, typically using a tool like Metasploit , which simulates real-world attacks. Penetration testers are responsible for an organization’s assets, and in this stage, they must ensure the system isn’t compromised or damaged due to their simulations.

Real cyberattacks can range from a couple of minutes to hours, so the vulnerabilities identified in the previous phases must be persistent for them to be exploitable by bad actors. Generally, testers will go after the root or administrator privileges of a device or system.

Metasploit is used due to its streamlined process capabilities for finding and executing publicly available exploits for vulnerabilities. Besides ensuring that vulnerabilities are stable, this phase also measures the consequences of the breach. For example, if the tester could encrypt or exfiltrate data or simulate zero-day attacks or ransomware hacks and to what extent.

Also read: Getting Started With the Metasploit Framework: A Pentesting Tutorial

What are the Next Steps After a Penetration Test?

The final stages of a penetration test are reporting and remediation. These phases reveal the next steps for an organization and pentesters as they wrap up the discovery of vulnerabilities and the consequences that arise from their exploitation of them. In these stages, the foundations to strengthen security posture are put forward and later implemented.

6. Post-exploitation, reporting, and risk analysis

While most organizations list this step as strictly a reporting stage, other post-exploitation components like clean-up activities need to be included in this stage of the penetration test.

Cipher explains that once the testing is complete and the reports and recommendations are presented, the tester needs to clean up the environment. This implies leaving the system exactly as they found it, reconfiguring access used to breach the IT environment, and restoring other modifications they might have made. Clean-up activities also pave the way to remediation and the final phase of penetration testing.

Typical cleanup activities:

  • Removing any executables, scripts, and temporary files from compromised systems
  • Reconfiguring settings back to the original parameters before the pentest
  • Eliminating any rootkits installed in the environment
  • Removing any user accounts created to connect to the compromised system

The report is considered the most critical document generated by the test. It is the final presentation to the organization which hired the pentester. With the report, organizations can take action, fix vulnerabilities, and strengthen their systems and staff if needed.

Reports need to be clear and transparent. Testers must document all phases, the assets targeted, the type of test and technique, and the vulnerabilities and ramifications discovered. Additionally, guides to fix or patch the vulnerabilities can be included.

Pentesting reports include:

  • Specific vulnerabilities that were exploited
  • Sensitive data that was accessed
  • The amount of time the pen tester was able to remain in the system undetected

It is normal practice for an organization to request sanitized example reports from pentesters before they hire their services. This allows them to view the standards and details used by the vendor. Good penetration test reports have findings well-organized and prioritized by risk level.

See also: Testing & Evaluating SIEM Systems: A Review of Rapid7 InsightIDR

7. Remediation

Remediation is the final phase of a penetration test, and it falls within the organization’s responsibilities. Using the report and findings and the information they have from interacting with the pentester, especially if a white box pentest was done, organizations can begin to make changes to their systems to fix the vulnerabilities that have been revealed.

Remediation can be very challenging for organizations that do not have the resources. Therefore, reports that include guides for remediation are the most valued. After remediation, the phases will often restart to test updates or other systems or run different types of penetration testing.

Understanding the phases of penetration testing is vital for the industry to continue to build resilience in the face of increased cyberattacks. Cyber criminals use techniques to bypass automated and traditional cybersecurity solutions. Simulating real attacks with penetration tests is proving to be one of the most effective tools the security industry has today.

Read next: Penetration Testing vs. Vulnerability Testing: An Important Difference

Get the Free Cybersecurity Newsletter

Strengthen your organization’s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Previous article

Next article

Ray Fernandez Avatar

Subscribe to Cybersecurity Insider

Strengthen your organization’s IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices.

IT Security Resources

What is cloud data security definition, benefits & best practices.

Cloud icon on the right in an abstract world above a polygon with a dark blue background.

6 Best LastPass Alternatives for 2024

Woman using Lastpass application, close-up.

US Imposes Ban on Russia’s Kaspersky; Sanctions 12 Executives

Stamp on white sheet of paper with red inscription SANCTIONS, on background of the USA flag.

What Is a Secure Web Gateway? Features, Benefits & Challenges

Flat vector illustration of a blue lock icon at the end of a virtual tunnel in cyberspace.

Top Cybersecurity Companies

Top 10 cybersecurity companies.

  • 1 Uniqkey – Business Password Manager

See full list

Get the Free Newsletter!

Subscribe to Cybersecurity Insider for top news, trends & analysis

Related Articles

Glowing digital shield on abstract technology background.

What Are Network Firewalls? Benefits, Types & Best Practices

Virtual shield and globe surrounded by a network related icons.

Secure Web Gateway vs Firewall: Learn the Difference

Bright Security

Bright is now integrated with GitHub Copilot

See how dev-centric DAST for the enterprise secures your business.

Continuous security testing for web applications at high-scale.

Safeguard your APIs no matter how often you deploy.

Future-proof your security testing with green-flow exploitation testing.

Next-gen security testing for LLM & Gen AI powered applications and add-ons.

Security testing throughout the SDLC - in your team’s native stack.

Connecting your security stack & resolution processes seamlessly.

Getting started with Bright and implementing it in your enterprise stack.

We’ll show you how Bright’s DAST can secure your security posture.

Using a Multi-Layered Approach to Maximize Effectiveness in AppSec Testing

How SAST + DAST combats alert fatigue

Check out or insights & deep dives into the world of security testing.

Upcoming & on-demand events and webinars from security experts.

Dive into DAST success stories from Bright customers.

Download whitepapers & research on hot topics in the security field.

IASTless IAST – The SAST to DAST Bridge

LLM prompt injection using genetic algorithms

Who we are, where we came from, and our Bright vision for the future.

Bright news hot off the press.

Want to join the Bright team? See our open possitions.

Found a security issue or vulnerability we should hear about? Let us know!

Need some help getting started? Looking to collaborate? Talk to us.

Bright & G2: Check out G2’s DAST winter report

Get Bright on the AWS Marketplace

Penetration Testing Report: 6 Key Sections and 4 Best Practices

homework penetration test engagementNameName
38 Commits

Repository files navigation

Week17-pen-test-report, homework: penetration test engagement.

In this activity, you will play the role of an independent penetration tester hired by GoodCorp Inc. to perform security tests against their CEO’s workstation.

A penetration tester's job is not just to gain access and find a file. Pentesters need to find all vulnerabilities, and document and report them to the client. It's quite possible that the CEO's workstation has multiple vulnerabilities.

If a specific exploit doesn't work, that doesn't necessarily mean that the target service isn't vulnerable. It's possible that something could be wrong with the exploit script itself. Remember, not all exploit scripts are right for every situation.

The scope of this engagement is limited to the CEO's workstation only. You are not permitted to scan any other IP addresses or exploit anything other than the CEO's IP address.

The CEO has a busy schedule and cannot have the computer offline for an extended period of time. Therefore, denial of service and brute force attacks are prohibited.

After you gain access to the CEO’s computer, you may read and access any file, but you cannot delete them. Nor are you allowed to make any configurations changes to the computer.

Since you've already been provided access to the network, OSINT won't be necessary.

IMAGES

  1. GitHub

    homework penetration test engagement

  2. 564 lab A.1 text.pdf

    homework penetration test engagement

  3. Homework Week 17.docx

    homework penetration test engagement

  4. What is External Pentest and How to Do It?

    homework penetration test engagement

  5. Course Preview: Penetration Testing: Setting the Scope and Rules of Engagement

    homework penetration test engagement

  6. UNIT 17 Homework Penetration Test Engagement

    homework penetration test engagement

VIDEO

  1. Standard Penetration Test

  2. PENETRATION TESTING WORKSHOP IN REAL TIME

  3. Dynamic Penetration Test. Lab cable testing Instrument

  4. How I Passed CompTIA PenTest+

  5. Standards Penetration Test with background foggy

  6. 281 Examining the Link Between Pre service EFL Teachers' Digital Homework Engagement and Online Cour

COMMENTS

  1. Wba-01/Week-17-Homework-Penetration-Test-Engagement

    Homework: Penetration Test Engagement. In this activity, you will play the role of an independent penetration tester hired by GoodCorp Inc. to perform security tests against their CEO's workstation. The CEO claims to have passwords that are long and complex and therefore unhackable. You are tasked with gaining access to the CEO's computer and ...

  2. Homework: Penetration Test Engagement

    Homework: Penetration Test Engagement \n. In this activity, you will play the role of an independent penetration tester hired by GoodCorp Inc. to perform security tests against their CEO's workstation. \n \n \n. The CEO claims to have passwords that are long and complex and therefore unhackable. \n \n \n

  3. Homework Penetration Test Engagement 1.20.25

    Homework Penetration Test Engagement 1.20.25. Course: C# Programming (CSCI 1109) University: University of Minnesota, Twin Cities. AI Chat. Info More info. Download. AI Quiz. Save. Homework: Penetration T est Engagement. Y ou've been provided full access to the network and are getting ping responses from.

  4. UNIT 17 Homework Penetration Test Engagement

    GoodSecurity was tasked with performing an internal penetration test on GoodCorp' s CEO, systems. The focus of this test is to perform attacks, similar to those of a hacker and attempt to. exploit any vulnerable software and find the secret recipe file on Hans' computer, while reporting. When performing the internal penetration test, there ...

  5. Penetration Test Engagement.docx

    Homework: Penetration Test Engagement In this activity, you will play the role of an independent penetration tester hired by GoodCorp Inc. to perform security tests against their CEO's workstation. The CEO claims to have passwords that are long and complex and therefore unhackable. You are tasked with gaining access to the CEO's computer and using a Meterpreter session to search for two ...

  6. Colin Clark Week 17 Pen Testing Homework.pdf

    1.0 High-Level Summary GoodSecurity was tasked with performing an internal penetration test on GoodCorp's CEO, Hans Gruber. An internal penetration test is a dedicated attack against internally connected systems. The focus of this test is to perform attacks, similar to those of a hacker and attempt to infiltrate Hans' computer and determine if it is at risk.

  7. Penetration Test Engagement Part for Communication

    Penetration Test Engagement Part for Communication shows how to engage in penetration testing. penetration test engagement instructions been provided full. Skip to document. ... Week 6 Homework Submission File Advanced Bash - Owning the System; Week 14 Web Development HTTP Requests and Responses;

  8. Penetration Testing Phases & Steps Explained

    The seven phases of penetration testing are: 1. Pre-engagement. Pre-engagement is a phase often left out. However, it is fundamental for penetration testers and organizations to be on the same ...

  9. GitHub

    Homework: Penetration Test Engagement. In this activity, you will play the role of an independent penetration tester hired by GoodCorp Inc. to perform security tests against their CEO's workstation. The CEO claims to have passwords that are long and complex and therefore unhackable.

  10. GitHub

    GoodSecurity was tasked with performing an internal penetration test on GoodCorp's CEO, Hans Gruber. An internal penetration test is a dedicated attack against internally connected systems. The focus of this test is to perform attacks, similar to those of a hacker and attempt to infiltrate Hans' computer and determine if it is at risk.

  11. Homework Week 17.docx

    GoodSecurity Penetration Test Report [email protected] 06/18/2022 1. High-Level Summary GoodSecurity was tasked with performing an ... Penetration Test Engagement.docx. Solutions Available. Point Park University. CMPS 161. ... Colin Clark Week 17 Pen Testing Homework.pdf. University Of Denver. COMP SCI UDEN201811. Attack. attack. Exploit.

  12. Why are Rules of Engagement Important to my Penetration Test?

    The Rules of Engagement, or ROE, are meant to list out the specifics of your penetration testing project to ensure that both the client and the engineers working on a project know exactly what is being testing, when its being tested, and how its being tested. At Triaxiom, our engineers are engaged from Day 1 and are familiar with the project ...

  13. Penetration Testing Report: 6 Key Sections and 4 Best Practices

    A penetration test report provides a detailed overview of the weaknesses of the system being tested. It also outlines how to solve problems, including recommendations for patching, hardening, and restricting the functionality of systems when needed. The goal is to identify problem areas that need attention and to fix the issue.

  14. Homework: Penetration Testing.md

    Play the role of an independent penetration tester hired by GoodCorp Inc. to perform security tests against their CEO's workstation. - Week-17-Penetration-Testing-2/Homework: Penetration Testing.md at main · loevans/Week-17-Penetration-Testing-2

  15. Hammond

    1.0 High-Level Summary GoodSecurity was tasked with performing an internal penetration test on GoodCorp's CEO, Hans Gruber. An internal penetration test is a dedicated attack against internally connected systems. The focus of this test is to perform attacks, similar to those of a hacker and attempt to infiltrate Hans' computer and determine if it is at risk.

  16. Solved In a cybersecurity firm, the IT department is

    In a cybersecurity firm, the IT department is preparing for a penetration testing engagement to assess the organization's security posture. The team has decided to conduct an external penetration test on the company's public-facing web applications and networks. The primary goal is to identify vulnerabilities and potential entry points for attackers.

  17. GitHub

    Homework: Penetration Test Report. In this activity, you will record your activities and form a report that will be turned in as a deliverable to the CISO of MegaCorpOne. Remember that the report is the most important part of an engagement, as it is a story of what findings you discovered and how you discovered them.

  18. Week 17 Pen Testing Report.docx

    Colin Clark Week 17 Pen Testing Homework.pdf. ... Penetration Test Engagement.docx. Solutions Available. Point Park University. CMPS 161. View More. GoodSecurity Penetration Test Report [email protected] 7/18/20 1. Nmap -sV 192.168..20 -We started by running an nmap scan to see what ports are running. We found that icecast is running on the ...

  19. Solved What is the purpose of the Rules of Engagement in a

    What is the purpose of the Rules of Engagement in a penetration testing plan? To define the scope, testing hours, and limitations of the test. To escalate identified vulnerabilities to senior management. To celebrate the successful completion of testing. To obtain legal and regulatory approvals. Here's the best way to solve it.

  20. Penetration Test Assignment

    For this assignment, consider that your team is a group of consultants that offers cybersecurity penetration testing and risk assessment services. You have been retained by Humbleify. Humbleify is a place for people who enjoy humbling to connect. Find local humbling events or just share your favorite tips and stories with others who love to humble.

  21. GitHub

    Homework: Penetration Test Engagement In this activity, you will play the role of an independent penetration tester hired by GoodCorp Inc. to perform security tests against their CEO's workstation. The CEO claims to have passwords that are long and complex and therefore unhackable.

  22. LaPlant

    View LaPlant - Homework 17.docx from CS 103 at University of Kansas. GoodSecurity Penetration Test Report [email protected] 4/26/2021 192.168..20 1.0 High-Level Summary GoodSecurity ... Penetration Test Engagement.docx. Solutions Available. Point Park University. CMPS 161. ReportHW17.docx. Solutions Available. San Diego State ...