What are the restrictions on invasive pentest attacks


Assignment: Penetration Testing Plan

A Penetration Tester evaluates the security of an information infrastructure by intentionally (and safely) exploiting vulnerabilities.

Take on the role of Penetration Tester for the organization you chose in Week 1.

Use the attached Penetration Testing Plan Template to create a 3-4 page Penetration Testing Plan for your chosen organization.

Research and include the following points in the assignment:

Pentest Pre-Planning

Engagement timeline: Tasks, who performs them, and due dates

Team location: Where will the penetration team execute their tests?

Organization locations tested: multiple locations, countries (be aware of any export or other government restrictions)

Which pentest technologies will be used? Consider the following tools as you research options:

Scanning Tools: Nmap, Nikto

Credential Testing Tools: Hashcat, Medussa, John the Ripper, Cain and Abel

OSINT Tools: Whois, TheHarvester
Wireless Tools: Aircrack-ng, Kismet
Networking Tools: Wireshark, Hping

What client personal are aware of the testing?

What resources provided to pentest team?

Test Boundaries:

What is tested?

Social engineering test boundaries? What is acceptable?
What are the boundaries of physical security tests?
What are the restrictions on invasive pentest attacks?
What types of corporate policy affect your test?
Gain Appropriate authorization (Including third-party authorization)

Pentest Execution Planning: Given the scope and constraints you developed in your Pentest Pre-Plan, plan the following pentest execution activities:

Reconnaissance
Scanning
Gaining Access
Maintaining Access
Covering Tracks

Pentest Analysis and Report Planning:

Analyze pentest results
Report pentest results

Format your assignment according to the following formatting requirements:

1. The answer should be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

2. The response also include a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.

3. Also Include a reference page. The Citations and references should follow APA format. The reference page is not included in the required page length.

Attachment:- Mzon-Threats-and-Vulnerabilities.rar

Solution Preview :

Prepared by a verified Expert
Computer Engineering: What are the restrictions on invasive pentest attacks
Reference No:- TGS02964857

Now Priced at $40 (50% Discount)

Recommended (95%)

Rated (4.7/5)