The Cyber Source blog

Cyber Security, in plain English

The Life cycle of a Penetration Test

Penetration testing is the safest way of finding out how well your security protocols protect your system. Ethical hackers expose the weaknesses in your security, giving you the heads up on what needs to be done to reduce your level of risk.

[The Ultimate Handbook to Penetration Testing] - Procure, plan and manage the  life cycle of a penetration testing project »

You might think of a penetration test as being necessary during an initial assessment of your security procedures, or as part of industry regulatory requirements, or perhaps with a new business acquisition.

In truth, Penetration Testing is a good, if not crucial tool for any of these circumstances.

The-lifecycle-of-a-penetration-test_1189539349-1

How is a Penetration Test carried out?

Rigorous (and regular) penetration testing helps you assess your existing security strategy, plan future improvements and prove to industry bodies and customers alike that you are doing everything you can to protect your organisation’s cyber security.

If you’re planning a penetration test project, you probably want to know what the process is.

Do you just call someone and ask them to try and hack your system? Not quite.

Penetration testing can be broken down into multiple phases. What happens in each phase will vary depending on the type of organisation and the type of test conducted, but the methodology is basically the same.

The Life Cycle of a Penetration Test

This article, adapted from our eBook, 'The Ultimate Handbook to Penetration Testing', we discuss each of the project stages in detail:

Penetration-testing-Pre-engagement-iconSTEP 1:  Pre-Engagement Analysis

Prior to commencing this cyber assessment, it’s imperative that both you and your chosen security service provider have agreed on the scope of the project, the objectives, budget, etc. Beginning a project without first pinpointing these details will be a waste of time and money. The tester might be looking in the wrong place or the results could be watered down by having too broad a scope.

Penetration-testing-Intelligence-Gathering-IconSTEP 2:  Intelligence Gathering

The penetration tester researches your organisation using all the available means at their disposal, from search engines to the dark web. This phase exposes all the data that is publicly available and how this could be used against you and your organisation. For example, if your CEO has a public Facebook profile and a special relationship with a cat named Wendy, that might give your attackers a little insight as to what his password might be.

Vulnerability-iconSTEP 3:  Vulnerability Analysis

The test moves into a more active phase. The tester scans your system for vulnerabilities, looking at your overall IT infrastructure configuration and searching for any open ports or weaknesses that could be exploited.

Penetration-testing-Exploitation-iconSTEP 4:  Exploitation

The penetration testers begin to exploit those vulnerabilities. This phase identifies which of the vulnerabilities enables the tester to gain ‘unauthorised’ access to your system/information.  The goal of this phase is to confirm the existence of the vulnerability and how exploitable it is.

Penetration-testing-Post-Exploitation-iconSTEP 5:  Post-Exploitation

Getting in might seem like the key point of a penetration test, but in reality customers are most interested in what attackers are able to do once they’ve gained access. The tester will use all available means including misconfigured services, permissions and other techniques to gain the highest privileges on the vulnerable targets. This might include, for example, trying to extract or manipulate data, or – in the case of a physical breach – attempting to remove a laptop or tablet. 

House-Keeping-IconSTEP 6:  Housekeeping

Having successfully completed the test, the tester must then make sure they leave everything as they found it.  Any scripts or files planted on the target must be removed, and any virtual door that has been pried open should be returned to its original state. It should be as though the test never happened.

Final-Report-IconSTEP 7:  Final Report Delivery

The information contained in the penetration test report is highly sensitive. It should therefore only be shared with previously agreed people in hard copy format and only face to face.

[FREE] Penetration Test sample report »

Meeting-Debrief-IconSTEP 8:  Meeting & Debrief

A final meeting with the security service provider gives you the opportunity to discuss the report’s findings in detail. The penetration tester should be able to recommend next steps to improve security, whether that be new protection software or staff security awareness training. Make the most of this meeting by involving the appropriate personnel so that it is easier to build engagement with future cyber security projects.[GET THE FULL INFOGRAPHIC] « THE LIFE CYCLE OF A PENETRATION TEST »


Taking the next step

Penetration testing is a great way to identify the risks and vulnerabilities within your organisation and objectively assess the current state of your cyber security controls. 

Simulating the behaviour of a real cyber criminal, a penetration test will uncover the critical security issues of your systems, how these vulnerabilities were exploited - as well as steps required to fix them (before they are exploited for real).

The-ultimate-handbook-to-penetration-testing

Further reading


About Comtact Ltd.

Comtact Ltd. is a government-approved Cyber Security and IT Managed Service Provider, supporting clients 24/7 from our ISO27001-accredited UK Security Operations Centre (SOC).

Located at the heart of a high security, controlled-access Tier 3 data centre, Comtact's state-of-the-art UK Cyber Defence Centre (SOC) targets, hunts & disrupts hacker behaviour, as part of a multi-layered security defence, to help secure some of the UK's leading organisations.

Explore our 24/7 Security Operations Centre (SOC)

SHARE THIS STORY | |

Sign-up for weekly updates

Recent Posts

Recent Posts