Planning and Scoping Flashcards
steps in pentest methodology
planning scoping, info gathering and vuln id, attacks and exploits, reporting and comms
NIST 800-15
plan, discover, attack, report with a loop on attack and discover
Project triangle
cost, time, money
planning doc considerations
who is target (objectives), budget, resources, Communication path, end state (deliverable), Technical constraints, Disclaimers (Point-in-time, comprehensiveness)
SOW
Formal document stating scope of what will be performed during a penetration test
Master Service Agreement (MSA
Contract where parties agree to most of the terms that will govern future actions. If you do service over and over.
Non-Disclosure Agreement (NDA)
Legal contract outlining confidential material or information that will be shared during the assessment and what restrictions are placed on it
Rules of Engagement
Timeline ▪ Locations ▪ Time restrictions ▪ Transparency ▪ Test boundaries
Wassenaar Agreement
precludes the transfer of technologies considered
“dual-use”
▪ Strong encryption falls under this restriction
▪ Penetration testing tools could be considered surveillance tools and fall
under these rules