Search for topics or resources
Enter your search below and hit enter or click the search icon.
June 16th, 2021
2 min read
By Shawn Meade
Cybersecurity penetration testing (pen testing) is a process often performed by groups engaged in ethical hacking. Acting in an authorized manner, they attempt to breach a company's defenses within the boundaries of set criteria. The simulation exposes the vulnerable paths that a cyberattack could exploit and therefore helps companies validate their security posture.
The trouble with a definition is that it can be too narrow. In truth, cybersecurity pen tests vary widely in scope and depth. For example, one company may only target a handful of Internet-facing web addresses. For another, internal addresses (LAN and wireless) may be in scope.
Beyond addresses, pen tests can go deep enough to encompass a complete physical and social engineering campaign. In this intense simulation, ethical hackers examine all IP addresses (internal and external). They try to physically enter facilities by badge cloning, piggybacking, or tailgating employees. They're also authorized to test overall security-mindedness through social interactions such as:
Although scope varies, there are six steps common to almost every pen test:
1. Planning and Reconnaissance 2. Scanning 3. Gaining Access 4. Maintaining Access (optional) 5. Analyzing and Configuring Modifications 6. Rescanning (optional) |
Step one can be summarized largely as data gathering. The data types and quantity depend entirely on the pen test parameters. A company might provide the required knowledge upfront. Or, the pen tester may attempt to gather information by mirroring a bad actor (hacker) if the project calls for it.
Next, the pen tester uses the company information to scan for system vulnerabilities. They move from a general to a specific format. In other words, they check for obvious vulnerabilities first, then go deeper to uncover obscure entry points.
With insight gleaned in the first two steps, the pen tester is ready to try to hack into one or more systems. The scope and depth of the project dictate their level of intrusiveness. Does the company simply want proof it can be done? Or, do they want the pen tester to present copies of the sensitive data they're able to retrieve?
Maintaining Access is an optional step. Some companies want to know how long a pen tester can stay connected as part of the evidence of the breach path.
Learning how a hacker might get into your system is nearly useless without action. In step five, the tester helps their customer analyze each successful attack vector and implement configuration and design modifications to mitigate the risk.
Though not required, a second scan is highly recommended to validate the effectiveness of step five solutions against a future attack.
Many compliance and certification requirements call for an IT penetration test. These may dictate your frequency, but we recommend a minimum of one per year. Understanding how drastically different your needs may be, determine your goals to define the appropriate criteria before engaging with an ethical hacking partner.
Would your system withstand an attack? ERP Suites offers cybersecurity penetration testing and managed security services to help you maintain a strong security posture.
Shawn Meade leads the Information Security team at ERP Suites. He has been in the IT industry for over 20 years and dealt with Information Security throughout his career including work with PCI, HIPPA, and HITRUST.
Topics: