Assignment Content
A Penetration Tester evaluates the security of an information infrastructure by intentionally, and safely, exploiting vulnerabilities.
Take on the role of Penetration Tester for the organization you chose in Week 1.
Use the Penetration Testing Plan Template to create a 3- to 4-page Penetration Testing Plan for the organization you chose.
Research and include the following:
Pentest Pre-Planning
Engagement timeline: Tasks and who performs them
Team location: Where will the penetration team execute their tests?
Organization locations tested: multiple locations, countries (Export restrictions and government restrictions)
Which pentest technologies will be used? Consider the following as you research options:
Scanning Tools: Nmap, Nikto
Credential Testing Tools: Hashcat, Medussa, John the Ripper, Cain and Abel
OSINT Tools: Whois, TheHarvester
Wireless Tools: Aircrack-ng, Kismet
Networking Tools: Wireshark, Hping
What client personal are aware of the testing?
What resources provided to pentest team?
Test Boundaries:
What is tested?
Social engineering test boundaries? What is acceptable?
What are the boundaries of physical security tests?
What are the restrictions on invasive pentest attacks?
What types of corporate policy affect your test?
Gain Appropriate authorization (Including third-party authorization)
Pentest Execution Planning: Given the scope and constraints you developed in your Pentest Pre-Plan, plan the following pentest execution activities
Reconnaissance
Scanning
Gaining Access
Maintaining Access
Covering Tracks
Pentest Analysis and Report Planning:
Analyze pentest results
Report pentest results
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more