CompTIA PenTest+
1 Threats, Attacks, and Vulnerabilities
1-1 Common Threat Actors
1-2 Threat Intelligence Sources
1-3 Threat Actors and Motives
1-4 Threat Actor Tactics, Techniques, and Procedures (TTPs)
1-5 Vulnerability Types
1-6 Exploit Types
1-7 Attack Types
1-8 Threat Detection and Monitoring
1-9 Threat Hunting
1-10 Incident Response
2 Architecture and Design
2-1 Security Controls
2-2 Network Architecture
2-3 Cloud and Virtualization
2-4 Web Application Security
2-5 Wireless Security
2-6 Mobile Security
2-7 IoT Security
2-8 Industrial Control Systems (ICS) Security
2-9 Physical Security
2-10 Secure Software Development
3 Tools and Code
3-1 Penetration Testing Tools
3-2 Exploitation Tools
3-3 Post-Exploitation Tools
3-4 Reporting Tools
3-5 Scripting and Automation
3-6 Programming Languages
3-7 Code Analysis
3-8 Open Source Intelligence (OSINT) Tools
4 Planning and Scoping
4-1 Penetration Testing Methodologies
4-2 Legal and Compliance Considerations
4-3 Scope Definition
4-4 Risk Assessment
4-5 Threat Modeling
4-6 Information Gathering
4-7 Asset Identification
4-8 Data Classification
4-9 Business Impact Analysis
4-10 Penetration Testing Objectives
5 Information Gathering and Vulnerability Identification
5-1 Passive Reconnaissance
5-2 Active Reconnaissance
5-3 Vulnerability Scanning
5-4 Network Mapping
5-5 Service Identification
5-6 Web Application Scanning
5-7 Wireless Network Scanning
5-8 Social Engineering Techniques
5-9 OSINT Techniques
5-10 Vulnerability Databases
6 Attacks and Exploits
6-1 Exploit Development
6-2 Buffer Overflows
6-3 SQL Injection
6-4 Cross-Site Scripting (XSS)
6-5 Cross-Site Request Forgery (CSRF)
6-6 Command Injection
6-7 Privilege Escalation
6-8 Lateral Movement
6-9 Evasion Techniques
6-10 Exploit Delivery Methods
7 Penetration Testing Process
7-1 Pre-Engagement Activities
7-2 Reconnaissance
7-3 Scanning and Enumeration
7-4 Exploitation
7-5 Post-Exploitation
7-6 Reporting
7-7 Remediation
7-8 Retesting
7-9 Documentation and Evidence Collection
7-10 Communication and Coordination
8 Reporting and Communication
8-1 Report Structure
8-2 Executive Summary
8-3 Technical Findings
8-4 Risk Assessment
8-5 Remediation Recommendations
8-6 Legal and Compliance Considerations
8-7 Presentation Skills
8-8 Communication with Stakeholders
8-9 Documentation Standards
8-10 Continuous Improvement
9 Security and Compliance
9-1 Regulatory Requirements
9-2 Industry Standards
9-3 Compliance Audits
9-4 Data Protection
9-5 Privacy Laws
9-6 Incident Response Planning
9-7 Disaster Recovery Planning
9-8 Business Continuity Planning
9-9 Risk Management
9-10 Security Awareness Training
Planning and Scoping

Planning and Scoping

Key Concepts

1. Defining Objectives

Defining objectives is the first step in planning and scoping a penetration test. It involves clearly outlining the goals and expectations of the test. Objectives can include identifying vulnerabilities, assessing the effectiveness of security controls, and evaluating the organization's incident response capabilities.

Example: An organization might define objectives such as identifying all critical vulnerabilities in their web applications, assessing the security of their internal network, and evaluating their ability to detect and respond to security incidents.

2. Scope Definition

Scope definition involves identifying the boundaries and limitations of the penetration test. This includes specifying the systems, networks, and applications that will be tested, as well as any restrictions or constraints that must be observed during the test.

Example: The scope of a penetration test might include all web applications hosted on the organization's servers, but exclude third-party applications and cloud services. Additionally, the scope might specify that only non-production environments are to be tested.

3. Risk Assessment

Risk assessment is the process of evaluating the potential risks and impacts associated with the penetration test. This includes identifying the potential for unintended consequences, such as service disruptions or data breaches, and developing strategies to mitigate these risks.

Example: During the risk assessment phase, the penetration testing team might identify the risk of causing a denial-of-service (DoS) attack on the organization's critical systems. To mitigate this risk, the team might decide to limit the intensity of their testing during peak business hours.

4. Resource Allocation

Resource allocation involves determining the personnel, tools, and time required to conduct the penetration test. This includes selecting the appropriate team members, acquiring the necessary tools and licenses, and scheduling the test to ensure it is completed within the specified timeframe.

Example: The resource allocation phase might involve assembling a team of experienced penetration testers, acquiring licenses for advanced scanning and exploitation tools, and scheduling the test to be conducted over a two-week period.

Examples and Analogies

Consider a military operation as an analogy for planning and scoping a penetration test:

1. Defining Objectives: The general defines the mission objectives, such as capturing a specific target or securing a strategic location.

2. Scope Definition: The general outlines the operational boundaries, specifying which areas will be targeted and which will be off-limits.

3. Risk Assessment: The general evaluates the potential risks, such as enemy counter-attacks or environmental hazards, and develops strategies to mitigate these risks.

4. Resource Allocation: The general assigns troops, equipment, and time to the operation, ensuring that all necessary resources are available and the mission is completed within the specified timeframe.

By understanding and effectively applying these key concepts, organizations can ensure that their penetration tests are well-planned, scoped, and executed, providing valuable insights into their security posture.