- BackTrack 4: Assuring Security by Penetration Testing
- Shakeel Ali Tedi Heriyanto
- 7字
- 2021-04-09 21:21:00
Part II. Penetration Testers Armory
Chapter 3. Target Scoping
Target Scoping is defined as an empirical process for gathering target assessment requirements and characterizing each of its parameters to generate a test plan, limitations, business objectives, and time schedule. This process plays an important role in defining clear objectives towards any kind of security assessment. By determining these key objectives one can easily draw a practical roadmap of what will be tested, how it should be tested, what resources will be allocated, what limitations will be applied, what business objectives will be achieved, and how the test project will be planned and scheduled. Thus, we have combined all of these elements and presented them in a formalized scope process to achieve the required goal. Following are the key concepts which will be discussed in this chapter:
- Gathering client requirements deals with accumulating information about the target environment through verbal or written communication.
- Preparing test plan depends on different sets of variables. These may include shaping the actual requirements into structured testing process, legal agreements, cost analysis, and resource allocation.
- Profiling test boundaries determines the limitations associated with the penetration testing assignment. These can be a limitation of technology, knowledge, or a formal restriction on the client's IT environment.
- Defining business objectives is a process of aligning business view with technical objectives of the penetration testing program.
- Project management and scheduling directs every other step of the penetration testing process with a proper timeline for test execution. This can be achieved by using a number of advanced project management tools.
It is highly recommended to follow the scope process in order to ensure test consistency and greater probability of success. Additionally, this process can also be adjusted according to the given situation and test factors. Without using any such process, there will be a greater chance of failure, as the requirements gathered will have no proper definitions and procedures to follow. This can lead the whole penetration testing project into danger and may result in unexpected business interruption. Paying special attention at this stage to the penetration testing process would make an excellent contribution towards the rest of the test phases and clear the perspectives of both technical and management areas. The key is to acquire as much information beforehand as possible from the client to formulate a strategic path that reflects multiple aspects of penetration testing. These may include negotiable legal terms, contractual agreement, resource allocation, test limitations, core competencies, infrastructure information, timescales, and rules of engagement. As a part of best practices, the scope process addresses each of the attributes necessary to kickstart our penetration testing project in a professional manner.

As we can see in the preceding screenshot, each step constitutes unique information that is aligned in a logical order to pursue the test execution successfully. Remember, the more information that is gathered and managed properly, the easier it will be for both the client and the penetration testing consultant to further understand the process of testing. This also governs any legal matters to be resolved at an early stage. Hence, we will explain each of these steps in more detail in the following section.
- Learning SQL Server 2008 Reporting Services
- 中文版After Effects CC 2020完全自學(xué)一本通
- Irrlicht 1.7 Realtime 3D Engine Beginner's Guide
- EJB 3.0 Database Persistence with Oracle Fusion Middleware 11g
- Core Data iOS Essentials
- 魔法詞典:AI繪畫關(guān)鍵詞圖鑒(Stable Diffusion版)
- 會聲會影視頻編輯實戰(zhàn)秘技250招
- 修片有道:PHOTOSHOP攝影后期專業(yè)技法
- 構(gòu)筑敏捷的開發(fā)團隊:微軟Visual Studio 2010實戰(zhàn)兵法
- 企業(yè)微信公眾平臺開發(fā)實戰(zhàn):再小的個體也有自己的品牌
- 剪輯師寶典:視頻剪輯思維與案例實戰(zhàn)
- Kubernetes快速入門(第2版)
- 中文版After Effects 2020基礎(chǔ)教程
- CAXA軟件應(yīng)用技術(shù)基礎(chǔ)
- 基于深度學(xué)習(xí)的自然語言處理