penetration test

Pre-penetration test checklist

Technical assessment checklist

  • Use tools like Nmap to scan for live hosts and open ports
  • Create a network map detailing all devices and connections
  • Look for weak passwords on services like SSH or RDP
  • Check for misconfigured services that may allow unauthorized access
  • Use tools like Nessus or OpenVAS to scan for known vulnerabilities
  • Check for missing patches on servers and applications
  • Attempt to exploit identified vulnerabilities using tools like Metasploit
  • Gain access to a system or application with known security flaws
  • Attempt to escalate privileges on compromised systems
  • Check for misconfigured permissions that may allow privilege escalation
  • Attempt to move laterally across network segments
  • Check for weaknesses in network segmentation that may allow lateral movement
  • Attempt to exfiltrate sensitive data from the network
  • Check for insecure protocols or misconfigured access controls that may allow data exfiltration

Social engineering assessment checklist

Post-penetration test checklist