logo

PTES


Summary

The Penetration Testing Execution Standard (PTES) is a penetration testing method and a standard that provides a baseline for what is required of a penetration test. Developed by a team of information security practitioners with the aim of addressing the need for a complete and up-to-date standard in penetration testing. The version used in this section is PTES 1.1, 2014.


Definitions

DefinitionRequirements
PTES-2_17_1. Pre-engagement interactions - Emergency contact information
PTES-3_4_1_4_1. Corporate - Electronic (document metadata)
PTES-3_4_1_5_2. Corporate - Infrastructure assets (email addresses)
PTES-3_4_1_5_7. Corporate - Infrastructure assets (application usage)
PTES-3_4_1_5_8. Corporate - Infrastructure assets (defense technologies)
PTES-3_6_1_3_2. External footprinting - Active footprinting (banner grabbing)
PTES-3_6_1_3_8. External footprinting - Active footprinting (DNS bruteforce)
PTES-3_7_1. Identify protection mechanisms - Network based protections
PTES-4_2_1_5. Business asset analysis - Organizational data (technical information)
PTES-4_3_4. Business process analysis - Third party integration
PTES-4_5_3. Threat capability analysis - Communication mechanisms
PTES-5_2_2_1. Vulnerability analysis - Network vulnerability scanners (port based)
PTES-5_2_2_2. Vulnerability analysis - Network vulnerability scanners (service based)
PTES-5_2_3_1. Vulnerability analysis - Web application scanners (application flaw scanners)
PTES-5_2_3_2. Vulnerability analysis - Web application scanners (directory listing or brute forcing)
PTES-5_2_3_3. Vulnerability analysis - Web application scanners (web server version)
PTES-5_3_1. Vulnerability analysis - Metadata
PTES-5_3_2. Vulnerability analysis - Traffic monitoring
PTES-5_4_2_3. Vulnerability analysis - Manual validation specific protocol (DNS)
PTES-5_4_2_5. Vulnerability analysis - Manual validation specific protocol (mail)
PTES-5_5_3. Vulnerability analysis - Common/default passwords
PTES-5_5_7. Vulnerability analysis - Disassembly and code analysis
PTES-6_2_1. Exploitation - Countermeasures (anti-virus)
PTES-6_2_1_1. Exploitation - Countermeasures (anti-virus encoding)
PTES-6_2_1_3. Exploitation - Countermeasures (anti-virus encrypting)
PTES-6_2_3. Exploitation - Countermeasures (data execution prevention)
PTES-6_2_5. Exploitation - Countermeasures (web application firewall)
PTES-6_7. Exploitation - Zero day angle
PTES-6_7_1_1. Exploitation - Zero day angle (buffer overflows)
PTES-6_7_4. Exploitation - Zero day angle (traffic analysis)
PTES-6_7_6_1. Exploitation - Proximity access (wifi attacks)
PTES-6_7_6_2. Exploitation - Proximity access (attacking the user)
PTES-7_2_1. Post exploitation - Rules of engagement (protect the client)
PTES-7_3_1. Post exploitation - Infrastructure analysis (network configuration)
PTES-7_3_1_3. Post exploitation - Network infrastructure analysis (DNS servers)
PTES-7_3_1_5. Post exploitation - Network infrastructure analysis (proxy servers)
PTES-7_3_1_6. Post exploitation - Network infrastructure analysis (ARP entries)
PTES-7_4_2_3. Post exploitation - Pillaging (database servers)
PTES-7_4_2_7. Post exploitation - Pillaging (certificate authority)
PTES-7_4_2_12. Post exploitation - Pillaging (monitoring and management)
PTES-7_4_4_1. Post Exploitation - Pillaging (user information on system)
PTES-7_4_4_2. Post Exploitation - Pillaging (user information on web browsers)
PTES-7_4_5_1. Post Exploitation - Pillaging (system configuration password policy)
PTES-7_4_5_2. Post Exploitation - Pillaging (system configuration - configured wireless networks and keys)
PTES-7_7. Post Exploitation - Persistence

Last updated

2023/09/18