ClickCease ..... ..... .....
..... ..... .....
...... ......

Penetration TestingMethodology

Pentest People are the fastest-growing independent security provider in the United Kingdom.

Enquire

What is a Penetration 
Testing Methdology?

A Penetration Testing methodology is the organisation and execution of an assessment – in basic terms it is the process of testing.

Methodologies exist to identify security vulnerabilities. Vulnerabilities can be present on many different platforms, so different assessment types exist to assess the different environments. Assessment can range from, security audits, dynamic analysis, web application assessment, infrastructure assessment, cloud assessment and many more.

There Are Several Methodologies Used For Penetrating Testing.

green tick

OSSTMM – Open Source Security Testing Methodology Manual

OSSTM is a recognised testing methodology, peer-reviewed by ISECOM – The Institute of Security and Open Methodologies that provide many different resources to the security industry.

green tick

OWASP – Open Web Application Security Project

Owasp is an open-source non-profit organisation focused on web application security, with thousands of members working to secure the web.

green tick

NIST – National Institute of Standards and Project

NIST provides frameworks and information intending to enhance economic security and improve quality of life focused on perseverance, integrity, inclusivity and excellence.

Our Penetration Testing Methodology

Our proven approach to Penetration Testing is based on industry best practices and project management standards.

Our Penetration Testing methodology is broken down into six distinct phases:

Initial Scoping, Reconnaissance, Assessment, Reporting, Presentation and Remediation.

Pentest People believe that these six steps are crucial in performing a thorough and accurate assessment, providing value for the client and ultimately improving the security of the target network. This methodology is cyclical in that the results of the assessment are presented to the client, and provided as a report.

Learn More

Our Six-Step Penetration Testing Methodology

This methodology is cyclical in that the results of the Penetration Testing assessment are presented to the client, and provided as a report, feedback into the scope of additional tests. As security is a process rather than a solution, this methodology is designed to work alongside the ongoing process.

The 6 steps are broad categories and can generally be applied to multiple types of infrastructure assessment, regardless of whether it is internal, external or some other combination.To find out more about our Penetration Testing services, click here.

Step 1 – Initial Scoping

The first phase in the methodology is an initial scoping discussion to set the parameters for the project. This ensures that all the critical parts of the network that need to be included in their assessment are identified at the outset, avoiding potential problems later in the process. Pentest People utilise their SecurePortal as a communication channel to ensure that all of the required scoping documents are presented and securely transmitted between the client and the company.

Step 2 – Reconnaissance

The Reconnaissance step will utilise both Passive and Active Information Gathering. Our consultants will utilise public domain information to collect information about your organisation and the network. Search engines will be interrogated as well as public records to try to collect information, which will help in the assessment of the target network. In the case of an internal assessment, passive information gathering will also include sniffing wired and wireless networks in an attempt to collect network protocol information, addressing details, and user credentials. Information discovered during the passive information-gathering phase is used to start probing the network map the network and identify the active hosts. Once the active hosts are identified, further probes are used to detect any open ports together with what services they are running, before using fingerprinting techniques to identify the operating system running on the host.

Step 3 – Assessments

The assessment phase aims to check known vulnerabilities against the operating systems and services that have been identified as present in the network. Any medium level vulnerabilities and higher that are identified are manually confirmed, preventing false positives being reported. Attempts are also made to exploit common operating system vulnerabilities to check the level of privileged access that can be achieved. It is important to note that Pentest People will not carry out any checks, which are considered by the tools that are used to be ‘unsafe’. This also includes any Denial of Service DoS attacks.

These service affecting checks are disabled by default in all the tools that we use but they can be can be included by request. For services that require username and password authentication, our consultants will attempt to access these resources both with the default password, and also commonly used username and password combinations. In practical terms the assessment phase typically comprises of an internal, ‘White Box’ and ‘Black Box’ tests

Step 4 – Reporting

At the end of the discovery and assessment phase clients are presented with an executive summary as well as a more detailed report. The summary lists the key findings along with the top ten recommendations for remedial action. A table of hosts is provided together with the total number of vulnerabilities identified at each severity level. The full assessment report goes into greater detail for each host including the open ports identified, services available on those ports, identified vulnerabilities and remediation advice. Separate sections are included for any additional advanced assessments that were carried out and cross-referenced where applicable to the host assessment data.

Step 5 – Presentation

Once the executive summary and full assessment report are created they are uploaded to the secure document area of the Pentest People SecurePortal for review prior to scheduling a de-brief call or if required a face to face meeting. The de-brief call or meeting is an opportunity for you to discuss any major issues arising from the assessment with the lead consultant who will formally present the findings of the report.

Step 6 – Remediation

Finally, Pentest People can offer an additional Remediation Consultancy Service as part of their PTaaS offering. This service offering completes the Penetration Testing process by providing a prioritised approach to remediating any security issues identified as part of the engagement. This remediation service is a two-stage process. The initial phase involves one of our specialised consultants reviewing the findings of the Penetration Test report and aligning this with your business requirements to create a prioritised approach document that contains remediation advice for all of the identified issues ranked in order of risk. Once this report is created, it is provided and can then be implemented either by your own internal IT staff, your incumbent IT provider or Pentest People as part of the engagement, therefore, taking away the time pressures of ensuring your infrastructure is secure and free from security issues.

See What Our Clients Have to Say About our Professional Services

Pentest People stand out in the field of penetration testing due to the skillset of people they have working there. We undertook a complex bespoke pentest with them which required a lot of pre-work in order to make sure it was scoped correctly and they took the time to come onsite to make sure all was correct prior to commencing. From my experience with them, they are very intelligent people with a deep understanding of the security landscape and we will continue to use them for future testing requirements”.

Interactive Investors
Information Security Manager

"Pentest People has been a trusted partner in our Information Security audits, helping us achieve ISO27001:2013 and Cyber Essentials certifications. Their expertise, professionalism, and
customer-focused solutions have greatly improved our ICT infrastructure.

I highly recommend Pentest People to any potential client."

Linbrooke
Group Head of IT

“Pentest People were efficient, knowledgeable and very supportive of our organisation making the jump from Cyber Essentials to accreditation to the ‘Plus’ upgrade. They were great to communicate with, delivered as promised and we will certainly use again when re-certification comes round."

Goodform
Head of IT

“The SecureGateway allowed Pentest People to perform a quality penetration test while the tester worked remotely. The results and data collected by the consultant were at the level we would expect from a standard test, showing no real difference other than allowing us to proceed as normal”

Fuelcard Services
Information Security Manager

Pentest People have provided us with a very streamlined testing service, that can be easily reviewed using their SecurePortal. I’m pleased with the quality of the testing report and it has enabled us to feel more confident in our network security”.

Warwickshire City Council
Group head of IT

“We used Pentest People to assist us with our security testing. They truly understand this area extremely well and gave us great reassurance on areas that we needed to improve.

Pentest People are truly experts in the security field and we would highly recommend them. They have great depth of knowledge and breadth of experience”

Waverton Investment Management
Head of IT

"Pentest People perform Web Application and Infrastructure Penetration Testing for Pharmacy2U. They are always professional to engage with, provide an excellent level of service and the addition of the SecurePortal makes receiving and interrogating the results of the service very easy indeed.We look forward to working with them in the future and trust the work they deliver."

Pharmacy2U
Managing Director