Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Please type answer. Thanks A Penetration Tester evaluates the security of an information infrastructure by intentionally, and safely, exploiting vulnerabilities. Take on the role of

Please type answer. Thanks

A Penetration Tester evaluates the security of an information infrastructure by intentionally, and safely, exploiting vulnerabilities.

Take on the role of Penetration Tester for GOOGLE

Use the Penetration Testing Plan Template to create a 3- to 4-page Penetration Testing Plan for GOOGLE

image text in transcribedHere's the template

image text in transcribedimage text in transcribedimage text in transcribed

Assignment Content A Penetration Tester evaluates the security of an information infrastructure by intentionally, and safely, exploiting vulnerabilities. Take on the role of Penetration Tester for the organization you chose in Week 1. Use the Penetration Testing Plan Template to create a 3- to 4-page Penetration Testing Plan for the organization you chose. Research and include the following: Pentest Pre-Planning Engagement timeline: Tasks and who performs them Team location: Where will the penetration team execute their tests? Organization locations tested: multiple locations, countries (Export restrictions and government restrictions) Which pentest technologies will be used? Consider the following as you research options: Scanning Tools: Nmap, Nikto . Credential Testing Tools: Hashcat, Medussa, John the Ripper, Cain and Abel . OSINT Tools: Whois, The Harvester Wireless Tools: Aircrack-ng, Kismet Networking Tools: Wireshark, Hping What client personal are aware of the testing? What resources provided to pentest team? Test Boundaries: What is tested? Social engineering test boundaries? What is acceptable? What are the boundaries of physical security tests? . What are the restrictions on invasive pentest attacks? What types of corporate policy affect your test? . Gain Appropriate authorization (Including third-party authorization) Pentest Execution Planning: Given the scope and constraints you developed in your Pentest Pre-Plan, plan the following pentest execution activities Reconnaissance Scanning . Gaining Access Maintaining Access . Covering Tracks Pentest Analysis and Report Planning: Analyze pentest results Report pentest results - High-Level Work Schedule: Project Scope Description of Work/Pentest Boundaries Assumptions and Constraints Penetration Testing Plan Template [Response] Instructions: Replace the information in brackets [ ] with information relevant to your penetration testing project. Fill out each of the sections below with information relevant to your project. What is tested? Social engineering test boundaries? What is acceptable? What are the boundaries of physical security tests? What are the restriction on invasive Rentest attacks? What type of corporate policy affect your test? [Response] A Penetration Tester evaluates the security of an information infrastructure by intentionally, and safely, exploiting vulnerabilities. Take on the role of Penetration Tester for the approved organization you chose in Week 1. Research the following information about the organization you chose. Use this template to create a Penetration Testing Plan. Milestones Due Dates [Response) [Response) [GOOGLE] Penetration Testing Scope Statement Criteria Response Project Title: [Response] Project Sponsor(s): [Response) Business Context for [Response] the Penetration Test: Project Scope [Response] Description: Date Prepared: [Response] Prepared By: [Response] ID Activity Resource Labor Rate Material Cost Total Cost Hours Total Units Total Penetration Test Pre-Planning Team Location(s) Organization Location(s) Client Personnel Aware of Testing Resources Provided to Pentest Team Pentest Technologies Used Appropriate Authorization (Including Third-Party Authorization) [Response) [Response] [Response] [Response] [Response] [Response] [Response) [Response] [Response] [Response) [Response] [Response] [Response] [Response] [Response] [Response] [Response) [Response) [Response] [Response] Name Title/Organization Description of Authorization and Consent (Identify reference documents) [Response] [Response] [Response) [Response] [Response] [Response] [Response] [Response] [Response] LIVIG 1/400 V LIVG1/400 V Page 3 of 5 Page 4 of 5 Gaining Access Activities [Response) [Response] [Response] [Response) [Response) [Response] [Response] [Response) [Response] Gaining Access Activity Description Reconnaissance Pentest Activities Gaining Access Activity Name [Response] [Response] [Response) [Response] [Response) [Response] Reconnaissance Deliverable Name [Response] [Response] [Response] [Response] [Response) [Response) Reconnaissance Deliverable Description [Response) [Response] [Response) [Response] [Response] [Response] [Response] [Response] [Response) [Response] [Response] [Response] Maintaining Access Activities Maintaining access Activity Description Scanning Pentest Activities Maintaining Access Activity Name [Response] [Response] [Response] [Response] [Response) [Response] Scanning Test Deliverable Name [Response] [Response) [Response) [Response] [Response) [Response] Scanning Test Deliverable Description [Response] [Response] [Response] [Response) [Response] [Response] [Response] [Response) [Response) [Response] [Response] Covering Tracks Activities Covering Tracks Activity Description [Response] Covering Tracks Activity Name [Response] [Response] [Response] [Response) [Response] [Response] [Response] [Response] [Response) [Response] [Response) [Response) Penetration Testing Plan Template CMGT/400 v7 Page 5 of 5 Pentest Analysis and Report Planning Describe plan for analyzing and reporting Rentest results. [Response] Assignment Content A Penetration Tester evaluates the security of an information infrastructure by intentionally, and safely, exploiting vulnerabilities. Take on the role of Penetration Tester for the organization you chose in Week 1. Use the Penetration Testing Plan Template to create a 3- to 4-page Penetration Testing Plan for the organization you chose. Research and include the following: Pentest Pre-Planning Engagement timeline: Tasks and who performs them Team location: Where will the penetration team execute their tests? Organization locations tested: multiple locations, countries (Export restrictions and government restrictions) Which pentest technologies will be used? Consider the following as you research options: Scanning Tools: Nmap, Nikto . Credential Testing Tools: Hashcat, Medussa, John the Ripper, Cain and Abel . OSINT Tools: Whois, The Harvester Wireless Tools: Aircrack-ng, Kismet Networking Tools: Wireshark, Hping What client personal are aware of the testing? What resources provided to pentest team? Test Boundaries: What is tested? Social engineering test boundaries? What is acceptable? What are the boundaries of physical security tests? . What are the restrictions on invasive pentest attacks? What types of corporate policy affect your test? . Gain Appropriate authorization (Including third-party authorization) Pentest Execution Planning: Given the scope and constraints you developed in your Pentest Pre-Plan, plan the following pentest execution activities Reconnaissance Scanning . Gaining Access Maintaining Access . Covering Tracks Pentest Analysis and Report Planning: Analyze pentest results Report pentest results - High-Level Work Schedule: Project Scope Description of Work/Pentest Boundaries Assumptions and Constraints Penetration Testing Plan Template [Response] Instructions: Replace the information in brackets [ ] with information relevant to your penetration testing project. Fill out each of the sections below with information relevant to your project. What is tested? Social engineering test boundaries? What is acceptable? What are the boundaries of physical security tests? What are the restriction on invasive Rentest attacks? What type of corporate policy affect your test? [Response] A Penetration Tester evaluates the security of an information infrastructure by intentionally, and safely, exploiting vulnerabilities. Take on the role of Penetration Tester for the approved organization you chose in Week 1. Research the following information about the organization you chose. Use this template to create a Penetration Testing Plan. Milestones Due Dates [Response) [Response) [GOOGLE] Penetration Testing Scope Statement Criteria Response Project Title: [Response] Project Sponsor(s): [Response) Business Context for [Response] the Penetration Test: Project Scope [Response] Description: Date Prepared: [Response] Prepared By: [Response] ID Activity Resource Labor Rate Material Cost Total Cost Hours Total Units Total Penetration Test Pre-Planning Team Location(s) Organization Location(s) Client Personnel Aware of Testing Resources Provided to Pentest Team Pentest Technologies Used Appropriate Authorization (Including Third-Party Authorization) [Response) [Response] [Response] [Response] [Response] [Response] [Response) [Response] [Response] [Response) [Response] [Response] [Response] [Response] [Response] [Response] [Response) [Response) [Response] [Response] Name Title/Organization Description of Authorization and Consent (Identify reference documents) [Response] [Response] [Response) [Response] [Response] [Response] [Response] [Response] [Response] LIVIG 1/400 V LIVG1/400 V Page 3 of 5 Page 4 of 5 Gaining Access Activities [Response) [Response] [Response] [Response) [Response) [Response] [Response] [Response) [Response] Gaining Access Activity Description Reconnaissance Pentest Activities Gaining Access Activity Name [Response] [Response] [Response) [Response] [Response) [Response] Reconnaissance Deliverable Name [Response] [Response] [Response] [Response] [Response) [Response) Reconnaissance Deliverable Description [Response) [Response] [Response) [Response] [Response] [Response] [Response] [Response] [Response) [Response] [Response] [Response] Maintaining Access Activities Maintaining access Activity Description Scanning Pentest Activities Maintaining Access Activity Name [Response] [Response] [Response] [Response] [Response) [Response] Scanning Test Deliverable Name [Response] [Response) [Response) [Response] [Response) [Response] Scanning Test Deliverable Description [Response] [Response] [Response] [Response) [Response] [Response] [Response] [Response) [Response) [Response] [Response] Covering Tracks Activities Covering Tracks Activity Description [Response] Covering Tracks Activity Name [Response] [Response] [Response] [Response) [Response] [Response] [Response] [Response] [Response) [Response] [Response) [Response) Penetration Testing Plan Template CMGT/400 v7 Page 5 of 5 Pentest Analysis and Report Planning Describe plan for analyzing and reporting Rentest results. [Response]

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Advances In Databases And Information Systems Uropean Conference Adbis 2020 Lyon France August 25 27 2020 Proceedings Lncs 12245

Authors: Jerome Darmont ,Boris Novikov ,Robert Wrembel

1st Edition

3030548317, 978-3030548315

More Books

Students also viewed these Databases questions

Question

Discuss five types of employee training.

Answered: 1 week ago

Question

Identify the four federally mandated employee benefits.

Answered: 1 week ago