External Penetration Test
What is External Penetration Testing ?
Hence, the main aim of an external pentest is to determine ways to compromise the accessible (external) systems and services, gain access to sensitive information, and discover methods an attacker can use the users or clients. They will also test the extent of any weaknesses discovered to see how far a malicious attacker could burrow into a network and what the business impact of a successful attack would be.
Asset Discovery
- Find the primary company's acquisitions, this is important to fall inside the predetermined scope.
- Find each firm's Autonomous System Number (ASN) if any, it will provide the IP ranges owned by the company.
- Find further entries, via reverse lookups.
- Utilize other methods, like shodan that scans the internet, to look for more assets.
After recognizing all the assets within the scope, the penetration tester will start scanning the network for vulnerabilities. The most popular tool to do it are Nessus and OpenVas. Simultaneous port scans should also be done to look for open ports. The type of open ports and the services running on them may help a tester in identifying a running operating system and create an image on what to anticipate next.
Domain Discovery
Numerous useful details, like an organization's name, address, email address, and phone number, may be found inside a whois. However, if a tester conducts a reverse whois lookup by any of those data, he might discover other assets connected to the company.
On the contrary, there are many ways to discover subdomains. One of them is using dnsrecon and check if a zone transfer is possible. The other techniques include, scraping, brute-force, dns cache, snooping, etc.
Comments
Post a Comment