Time
13 hours 9 minutes
Difficulty
Intermediate
CEU/CPE
13

Video Transcription

00:01
Hello and welcome to another penetration testing execution Standard discussion. Today we're going to be going over questionnaires within the pre engagement interaction section. So before we jump in, let's start off with a quick disclaimer.
00:17
Pee Test videos do cover tools that could be used for system hacking.
00:22
Any tools discussed or used during demonstrations should be researched and understood by the user. Please research your laws and regulations regarding the use of such tools. As always, while we're learning and having fun, we want to ensure that we don't get into any trouble with the law. So
00:40
before we jump into our subject matter, let's go ahead and briefly look at our objectives.
00:45
So we want to walk away and understand some of the benefits of questionnaires and why they're important. And then each of the following is a category of questionnaire that will review a few questions from these are all directly from the pee test standard, but they should be used as maybe a reference or a way to get your list started.
01:04
So by the end will have reviewed each of these question areas and gone over some reasons why the questions would be important So before we jump in, let's talk about questionnaire benefits. So this is a pretty slim list, but the benefits far exceed the few points that we have here. So the great thing about questionnaires
01:23
is as we were discussing about scope, we have to have a clear understanding of what it is the client
01:30
is hoping to achieve or gain from testing. Now we will do further discussions on things like goals. We talked about how to do scope, meetings and things of that nature. But questionnaires are one of the key areas that we can help ourselves to better understand what it is someone is trying to achieve.
01:48
It is also very important to understand why a client is looking for a test to be performed. We discussed earlier where looking to just check a box or to just be compliant with a standard may dictate some factors in the test. That may not be something that you would want to do.
02:07
So being able to ferret out what it is that the client is trying to achieve, or what you're wanting to achieve is a huge part of using these questionnaires
02:15
now. It's also important to understand what they want to do or not to do during the test. Again, we talked about assumptions. We can't make any assumptions when we're determining what would be in the best interest of the client or the person that's, you know, being tested.
02:35
And for that reason we have to help them to understand what it is we're going to be doing. And because of that, it allows us to provide a clear understanding for scoping purposes. And so by taking these questions and expanding upon them and really digging in
02:53
and getting a clear understanding of what the test should achieve and how it should look and what it will be against
02:58
will ensure that we'll design a scope
03:00
and provide an outcome that will be overall beneficial for the client as well as you know, not cause any issues for the organization that we're working with or for.
03:12
So let's go ahead and jump into the first questionnaire now. This is just a few of the questions from the network penetration testing area.
03:22
So the number one question that was there is why is the customer having the test performed? And it may seem self explanatory again. Why would you want to get them to maybe reiterate something they've already said? Well, it's good to hear wants twice three times
03:38
so that you can ensure that the response is consistent
03:43
and that you've recorded what it is that they're trying to achieve on paper. So this is almost, you know, a critical question for any questionnaire. And when we get in the weather application in some other areas, it would be prudent to do so as well.
03:58
Now again, we do want to understand if the test is for specific compliance requirement and the reason for that is is things like a P C I. D s s or n'est
04:12
any number of other areas. If they're wanting to do it against Ms requirements or PCR requirements, there are very specific things that we have to be aware of within that requirement. So that could dictate
04:23
the way that we would need to conduct the test, or it may alter the methodology that we would need to follow. So this is a key question to ask in any scope or in any engagement that you're looking to fill out now
04:36
total i p addresses being tested again. This could be an approximate at first, but it would need to be nailed down. This is going to be critical in determining kind of time estimates and overall, how the project will need to be tasked out.
04:51
This could be external eyepiece. This could be internal, I piece. It just depends on what type of network penetration testing we're doing. If we're doing a mix of both internal and external testing, then it would need to be the total number of internal and external separately listed for your notes. Now,
05:10
in the case that a system is penetrated or compromised, how should the team proceed now? There were some sub options or items to the question it included. Should you know the team attempt to gain privileged access should the team attempt to move laterally? Should the team attempt to do password cracking on the system,
05:30
Determining limitations is going to be critical for proper rules of engagement and proper scoping. If a system is compromised and then that's it, you don't do anything further.
05:43
That can also be an option. So helping the client to understand what it is that you can do once you get into a system is going to again be critical in building out rules of engagement and understanding what it is that you'll be doing there in the test, which ultimately
06:00
will dictate things like time estimate, labor estimate and whether or not
06:03
you have to have different subject matter experts involved in the test. Now
06:09
let's talk about some Web application testing questions. So
06:14
the first thing kind of like with I p addresses is we have to understand how many applications air being assessed. And this is important because that's going to dictate overall how much time it could take to go through the process. And then, if a page is being statically assessed, where we're reviewing information
06:33
piece by piece, we're doing Cem Cem Fuzzing may be looking at the back into that application
06:40
and doing some static inputs that's going to take a lot longer
06:46
in the process and the pages, because they're not getting re sources and information from other areas like a dynamic page may lo differently. It may acquire Resource is from different areas that can change the way in which the testing is performed in conducted, and so we ask about dynamic pages and static pages separately
07:04
because that is going to overall dictate how we're going to approach application testing.
07:11
And then again, we did hint at static analysis being performed.
07:15
That is a very manual process versus doing dynamic analysis. And so you've got static Web pages,
07:23
dynamic Web pages, those both load content differently.
07:27
Static analysis, dynamic analysis, static being kind of manual in the process dynamic, using maybe more tools and things of that nature too quickly test pages.
07:36
So all of those things have to be taken into consideration when we're doing Web application testing, and you would definitely want to use thes is maybe some core questions and then expand upon this based upon the type of testing that you do and that you offer with your organization.
07:51
Now, wireless penetration testing shouldn't be lumped into a network testing with respect to scoping it, because the tools, techniques and skill set do differ from network penetration, testing versus wireless penetration testing.
08:07
So, like every other question, and it is important to know how many networks air in place, we do want to identify the SS ID's for the networks. The reason for that is, is that if we have a co tenant environment.
08:22
And there's one wireless device, but four different SS ID's, and only two of those belong to
08:28
the client. Then we don't want to accidentally compromise or test
08:35
the devices, or I'm sorry, the SS ideas that would not be owned by the client.
08:39
It also is important to understand if a guest network is in use because that convict ate the approach if the guest network is open. So you know we're looking at authentication within the guest network or asking if it does or does not require it. That's going to be important in the other side. To that, to that, people make up. Not consider
08:58
is that if our customer or client
09:01
has other employees, or if they have business partners that come in if it is a guest wireless, that is for personal use for employees. What are the ramifications for us sniffing traffic on that
09:18
particular segment or that particular S s I D?
09:22
Could we potentially pull information that would be out of scope? Could we accidentally gain confidential information, health information, bank information for parties that have nothing to do with the test and may not even know what's going on.
09:37
So it's important
09:37
to understand how not just if a guest network is used, but how that guest network is used, what is on it and whether or not it would be within scope based on how that network is set up and what employees or clients or anyone is able to do on that. So take that into account
09:56
when you're scoping a wireless test and whether or not it would be high risk for, you know, potential
10:01
exposure of private information.
10:05
Oh, right, everybody. So today we discussed the benefits of questionnaires. We discuss questions for network penetration testing. We discuss questions for weather application testing, and we discussed questions for wireless network penetration testing. So with that in mind, I want to thank you for your time today, and I look forward to seeing you again soon.

Up Next

Penetration Testing Execution Standard (PTES)

In this course we will lay out the Penetration Testing Execution Standard (PTES) in all its phases and their application for business leaders and Security Professionals alike.

Instructed By

Instructor Profile Image
Robert Smith
Director of Security Services at Corsica
Instructor