Pen testing guide: Types, steps, methodologies and frameworks (original) (raw)

Article 1 of 3

Part of: Introduction to penetration testing

Penetration testing helps organizations find security vulnerabilities before hackers do. Uncover details about pen testing steps, methodologies, frameworks and standards.

Penetration testing is a cybersecurity forensics technique used to assess an organization's network perimeter and internal cybersecurity defenses. It involves pen testers hacking into systems and determining where vulnerabilities and weaknesses exist.

The pen testing process not only identifies cybersecurity issues, but also offers recommendations to remediate those issues and verifies the fixes work. Pen tests can save companies thousands or even millions of dollars in lost revenue, ransomware payments and damage to their reputation.

6 steps in a pen test

Pen testing providers may have varying approaches to their tests. In general, the following six activities are involved in conducting a pen test:

  1. Prepare for the test. Use this phase to gather relevant information, secure approval from management and outline steps for the test.
  2. Construct a plan. Determine the tools needed to examine the state of the testing candidate. This includes evaluating how security is implemented and where vulnerabilities or alternate access methods may exist.
  3. Build a team. Gather the appropriate pen testers to conduct the test. In-house and third-party experts may be needed.
  4. Find the target. Decide what data and systems are being targeted.
  5. Perform penetration. Use a variety of techniques to bypass the target system's existing security measures, such as firewalls and intrusion detection systems. Establish a foothold position over designated systems and resources, all while trying to remain undetected. Extract data and other evidence for reports.
  6. Conduct data analysis and reporting. Examine and analyze the data collected during the pen test, and identify remediation steps. Summarize the results of the tests, including what vulnerabilities were detected and exploited and how to fix them, in a report for company management.

Graphic with pen testing steps

In general, pen tests include at least these six steps.

Types of pen tests and methodologies

There are three general levels of conducting a pen test:

  1. Black box testing simulates how an experienced threat actor would perform a hack. It starts with no knowledge or understanding of the target's technology infrastructure and security provisions. The goal of this test is to quickly identify easy-to-exploit vulnerabilities.
  2. Gray box testing takes a black box test a step further. Pen testers typically have some knowledge of the target's systems and security measures. The goal of a gray box test is to learn details about vulnerabilities that can be exploited to a greater level than black box assessments.
  3. White box testing is the most advanced. This pen test assumes the hacker has detailed knowledge of all aspects of an organization's technology and security infrastructure. White box testers are typically the most experienced pen testing experts. They are tasked with uncovering the tiniest flaws in the security infrastructure. When partnered with system developers and engineers, white box testers can jointly improve an organization's security.

Pen testing results can vary depending on what is tested, as well as whether or not the tester knows anything about the company and if the company knows the test is being conducted. Different kinds of tests include the following:

Pen testing frameworks and standards

Pen testing frameworks and standards provide a blueprint for planning, executing and reporting on cybersecurity vulnerability testing, in addition to activities that collectively provide methodologies for ensuring maximum security. The following are some popular pen testing frameworks and standards:

Pulling it all together in a pen test report

One of the most important aspects of a pen test is the report. It should be informative and actionable and include the following key points:

Next Steps

Intro: How to use BlackArch Linux for pen testing

Dig Deeper on Threat detection and response

Part of: Introduction to penetration testing

Article 1 of 3