Pentest Checklist
This skill should be used when the user asks to "plan a penetration test", "create a security assessment checklist", "prepare for penetration testing", "define pentest scope", "follow security testing best practices", or needs a structured methodology for penetration testing engagements.
name:Pentest Checklistdescription:This skill should be used when the user asks to "plan a penetration test", "create a security assessment checklist", "prepare for penetration testing", "define pentest scope", "follow security testing best practices", or needs a structured methodology for penetration testing engagements.metadata:author:zebbernversion:"1.1"
Pentest Checklist
Purpose
Provide a comprehensive checklist for planning, executing, and following up on penetration tests. Ensure thorough preparation, proper scoping, and effective remediation of discovered vulnerabilities.
Inputs/Prerequisites
Outputs/Deliverables
Core Workflow
Phase 1: Scope Definition
Define Objectives
Reference Questions:
Know Your Test Types
| Type | Purpose | Scope |
|---|---|---|
| External Pentest | Assess external attack surface | Public-facing systems |
| Internal Pentest | Assess insider threat risk | Internal network |
| Web Application | Find application vulnerabilities | Specific applications |
| Social Engineering | Test human security | Employees, processes |
| Red Team | Full adversary simulation | Entire organization |
Enumerate Likely Threats
Define Scope
Budget Planning
| Factor | Consideration |
|---|---|
| Asset Value | Higher value = higher investment |
| Complexity | More systems = more time |
| Depth Required | Thorough testing costs more |
| Reputation Value | Brand-name firms cost more |
Budget Reality Check:
Phase 2: Environment Preparation
Prepare Test Environment
Environment Options:
Production - Realistic but risky
Staging - Safer but may differ from production
Clone - Ideal but resource-intensiveRun Preliminary Scans
Common Pre-Scan Tools:
# Network vulnerability scan
nmap -sV --script vuln TARGETWeb vulnerability scan
nikto -h http://TARGETReview Security Policy
Notify Hosting Provider
Cloud Provider Policies:
Freeze Developments
Phase 3: Expertise Selection
Find Qualified Pentesters
Evaluation Criteria:
| Factor | Questions to Ask |
|---|---|
| Experience | Years in field, similar projects |
| Methodology | OWASP, PTES, custom approach |
| Reporting | Sample reports, detail level |
| Communication | Availability, update frequency |
Define Methodology
Testing Approaches:
| Type | Access Level | Simulates |
|---|---|---|
| Black Box | No information | External attacker |
| Gray Box | Partial access | Insider with limited access |
| White Box | Full access | Insider/detailed audit |
Define Report Format
Report Should Include:
Phase 4: Monitoring
Implement Security Monitoring
Monitoring Tools:
# Check security logs
tail -f /var/log/auth.log
tail -f /var/log/apache2/access.logMonitor network
tcpdump -i eth0 -w capture.pcapConfigure Logging
Key Logs to Monitor:
Monitor Exception Tools
Watch Security Tools
Phase 5: Remediation
Ensure Backups
Reserve Remediation Time
Patch During Testing Policy
Cleanup Procedure
Schedule Next Pentest
Testing Frequency Factors:
Quick Reference
Pre-Pentest Checklist
□ Scope defined and documented
□ Authorization obtained
□ Environment prepared
□ Hosting provider notified
□ Team briefed
□ Monitoring enabled
□ Backups verifiedPost-Pentest Checklist
□ Report received and reviewed
□ Findings prioritized
□ Remediation assigned
□ Fixes implemented
□ Verification testing scheduled
□ Environment cleaned up
□ Next test scheduledConstraints
Examples
Example 1: Quick Scope Definition
Target: Corporate web application (app.company.com)
Type: Gray box web application pentest
Duration: 5 business days
Excluded: DoS testing, production database access
Access: Standard user account providedExample 2: Monitoring Setup
# Enable comprehensive logging
sudo systemctl restart rsyslog
sudo systemctl restart auditdStart packet capture
tcpdump -i eth0 -w /tmp/pentest_capture.pcap &Troubleshooting
| Issue | Solution |
|---|---|
| Scope creep | Document and require change approval |
| Testing impacts production | Schedule off-hours, use staging |
| Findings disputed | Provide detailed evidence, retest |
| Remediation delayed | Prioritize by risk, set deadlines |
| Budget exceeded | Define clear scope, fixed-price contracts |