Professional Documents
Culture Documents
Penetration Testing Plans and Scope
Penetration Testing Plans and Scope
17 December 2018
OVERVIEW
2. Password Policies
Policies against Improper storage of passwords in plain documents, sharing of passwords on unsafe media, phishing
attacks, use of default passwords and use of two-factor authentication and public/private keys. Making sure no
usernames are used that can be easily guessed from social media accounts.
4. Network Scans
Using Nmap scans with all ports and vuln scripts, finding unnecessary open ports and services.
Disabling ICMP and services like ftp, telnet, smb, vnc etc.
Exploiting the vulnerabilities with Metasploit and manual scripts from ExploitDB.
Running Aircrack-ng on local office environments to scan for rogue Access points.
Using Ettercap to utilize ARP poisoning and try to redirect traffic between hosts to mitigate man-in-the-
middle attack.
1
5. Web Scans
Scanning web services with Nikto,
Running scans on web servers using Zap to ensure the results from Burp Suite.