💾
kurare
  • 🤸Welcome!
  • 🔤Alphabet Soup
  • Training
    • CTFs & Labs
  • Directory Traver
  • Reporting
  • Toolbox
  • Rando Links
  • GRC (The box-checkers)
  • Common Software Repository
  • Social Networking
  • Penetration Testing Frameworks
  • Playbooks
    • Playbook: Figuring out software versions
    • Playbook: web applications
    • Playbook: Finding exploits
    • Playbook: Cloud Environments
  • Testing out credentials
  • Active Directory
  • Checklists
    • Pretest phase
    • Host Discovery
    • Website (external)
    • Black-box External Test
    • Host Enumeration
    • SMB enumeration
    • Page
  • Reporting
  • Services
    • VOIP / SIP
Powered by GitBook
On this page
  1. Checklists

Pretest phase

When someone first asks you to do a pentest.

  • Collect contact information (email and phone) for security exceptions, unlocking accounts, questions, updates, etc.

  • Send an email introducing yourself

  • Rules of engagement

    • Are there any blackout dates for testing (critical dates when nothing should be tested)?

    • Are there any components of the network you want me to focus on?

    • What are your biggest concerns / nightmare scenarios about security (integrity of data, DDoS?

  • Read through scope of test

  • Do initial reconnaissance check to see if any scope was missed that perhaps should be included

    • Subdomain discovery

  • Planning

    • What does this organization do?

    • What data is most important to this organization?

    • What vulnerabilities / exploits might be most likely?

PreviousActive DirectoryNextHost Discovery

Last updated 1 year ago