1. Why is the customer having the penetration test performed against their environment?



Similar documents
Cybersecurity Health Check At A Glance

GFI White Paper PCI-DSS compliance and GFI Software products

Client Security Risk Assessment Questionnaire

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Pension Benefit Guaranty Corporation. Office of Inspector General. Evaluation Report. Penetration Testing An Update

Penetration Testing Report Client: Business Solutions June 15 th 2015

Payment Card Industry Self-Assessment Questionnaire

Hong Kong Baptist University

Goals. Understanding security testing

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Secondary DMZ: DMZ (2)

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Introduction to Computing Facilities

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7.

Chapter 4 Application, Data and Host Security

National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement Exit Conference...

Useful Tips for Reducing the Risk of Unauthorized Access for Network Cameras Important

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

Penetration Testing Report. Client: xxxxxx Date: 19 th April 2014

Corporate Account Takeover (CATO) Risk Assessment

PCI DSS Requirements - Security Controls and Processes

System Security Policy Management: Advanced Audit Tasks

New Systems and Services Security Guidance

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

Section 12 MUST BE COMPLETED BY: 4/22

FileCloud Security FAQ

Q&A ADDENDUM FOR INFORMATION SECURITY VULNERABILITY ASSESSMENT PUBLISHED 10/20/2015

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

U06 IT Infrastructure Policy

Defence Cyber Protection Partnership Cyber Risks Profile Requirements

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

Server Security Checklist (2009 Standard)

FIREWALL POLICY November 2006 TNS POL - 008

Internal Penetration Test

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

Common Cyber Threats. Common cyber threats include:

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Locking down a Hitachi ID Suite server

My FreeScan Vulnerabilities Report

Network and Host-based Vulnerability Assessment

Teleran PCI Customer Case Study

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:

Penetration testing. A step beyond missing patches and weak passwords

Web Security School Entrance Exam

Securing the Service Desk in the Cloud

Achieving PCI-Compliance through Cyberoam

1 Purpose Scope Roles and Responsibilities Physical & Environmental Security Access Control to the Network...

Penetration testing & Ethical Hacking. Security Week 2014

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

AeroLab Wireless Network Code of Conduct. Connecting to the AeroLab Wireless Network

by New Media Solutions 37 Walnut Street Wellesley, MA p f Avitage IT Infrastructure Security Document

Penetration Testing. I.T. Security Specialists. Penetration Testing 1

SonicWALL PCI 1.1 Implementation Guide

Passing PCI Compliance How to Address the Application Security Mandates

Brazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005

Information Security Assessment and Testing Services RFQ # Questions and Answers September 8, 2014

Network Security. Mike Trice, Network Engineer Richard Trice, Systems Specialist Alabama Supercomputer Authority

Network Detective. HIPAA Compliance Module RapidFire Tools, Inc. All rights reserved V

IBM Global Technology Services Statement of Work. for. IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing

SANS Top 20 Critical Controls for Effective Cyber Defense

Summary of Technical Information Security for Information Systems and Services Managed by NUIT (Newcastle University IT Service)

Internet threats: steps to security for your small business

Xerox Mobile Print Cloud

Figure 9-1: General Application Security Issues. Application Security: Electronic Commerce and . Chapter 9

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

SECURITY IN A HOSTED EXCHANGE ENVIRONMENT

Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire

SCADA Security Example

SANS Institute First Five Quick Wins

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Name: Position held: Company Name: Is your organisation ISO27001 accredited:

Network Incident Report

Topics in Network Security

United States Trustee Program s Wireless LAN Security Checklist

A GUIDE TO SECURITY AND PRIVACY IN A HOSTED EXCHANGE ENVIRONMENT TECHNICAL DOCUMENT

Windows Remote Access

Concierge SIEM Reporting Overview

Transcription:

General Questions 1. Why is the customer having the penetration test performed against their environment? Assess vulnerabilities in order to improve security and protect client information. 2. Is the penetration test required for compliance requirements? 3. Are we allowed to attempt to gain the highest privileges (root on Unix machines, SYSTEM or Administrator on Windows machines) on the compromised machine? 4. Are we allowed to perform password attacks against local password hashes obtained (for example, etc / shadow on Unix machines)? 5. When does the customer want the active portions (scanning, enumeration, exploitation, etc.) of the penetration test conducted? a. During business hours? b. On the weekends? Weekends preferred but depends on potential interruption of services 6. How many physical locations will be tested, and what country or countries are these systems operated in? Four United States (Florida) 7. Will this penetration test be done from all angles, or just outside points of entry? Example, malicious users may work for you, as a w-2 employee, 1099 contractor, or a vendor installing a new HVAC system that connects to your network. Outside & socially-engineered internal access. 8. In the case that a system is penetrated, what is our next step? Page 1 of 6

Document & report. Avoid interruption of services. 9. Can you identify your fragile systems? These would be systems that have a tendency to crash, or run outdated and unstable applications. Windows 2000 Advanced Server running IIS 5.0, printers & other devices with possible default root/administrator access, possible passwords stored in plain text, 10. Do you have any systems monitoring software in place? Minimal perimeter and client-based anti-virus monitoring, egress monitoring of email with personally identifying information (PII) included, web-filtering and bandwidth usage monitoring at the perimeter. 11. What are your most critical servers and applications? Microsoft Exchange 2010, Content Central (custom document imaging software), Domain Controllers & file shares. 12. Do you test backups on a regular basis? No 13. When was the last time you ve restored from backup? 12/14/2015 Granular file/folder restore from file share Page 2 of 6

Network Penetration Test 1. How many total IP addresses are being tested? We have 1000+ 2. How many internal IP addresses, if applicable? We have 1000+ 30 3. How many external IP addresses, if applicable? 4. Are there any devices in place that may impact the results of a penetration test such as a firewall, intrusion detection/prevention system, web application firewall, or load balancer? Firewall with intrusion detection, web filter, email spam filter/rate control Web Application Test 1. How many web applications are being assessed? 2. How many login systems are being assessed? 3. How many static pages are being assessed? (approximately) Page 3 of 6

4. How many dynamic pages are being assessed? (approximately) 5. Will the source code be readily for viewing? In some cases. 6. Will there be any kind of documentation, and if yes what kind of documentation? 7. Will we be performing static analysis on this application? 8. Does the client want us to perform fuzzing against this application? No 9. What credentials does the application support and level of access is granted for each type of account. For example, many applications support manager, administrator and user-level accounts Wordpress Administrators, Authors, Contributors, Editors, Event Contributors, Subscribers 10. If the application supports multiple levels of accounts will it be possible for the testers to have test accounts created for authenticated testing. Wireless Network Penetration Test 1. How many wireless networks are in place, and how many different locations? Eight, in four locations 2. Is a guest wireless network used? If so: Page 4 of 6

a. Does the guest network require authentication? No b. What type of encryption is used on the wireless networks? WPA2-PSK combination of TKIP and AES 3. Will we be enumerating rogue devices? 4. Will we be assessing wireless attacks against clients? 5. Approximately how many clients will be using the wireless network? 250-300 Social Engineering 1. Will the client provide e-mail addresses of personnel that we can attempt to social engineer? Would prefer testing agent uses and documents methods for obtaining email addresses 2. Will the client provide phone numbers of personnel that we can attempt to social engineer? Would prefer testing agent uses and documents methods for obtaining phone numbers 5. Will we be attempting to social engineer physical access, if so: Page 5 of 6

a. How many people will be targeted? Two from each location Physical Penetration Test None 1. How many locations are being assessed? Page 6 of 6