Domain 6 Β· Lesson 2 of 5
Penetration Testing Methodology
Kiα»m thα» XΓ’m nhαΊp
Test Types by Knowledge Level
| Type | Knowledge Given | Realism | Thoroughness | BSP Suitability |
|---|---|---|---|---|
| Black Box | None | Most realistic | Least thorough | Limited β misses code-level issues |
| Gray Box β | Partial (architecture, some creds) | Balanced | Balanced | Most common for compliance; best ROI |
| White Box | Full (source code, DB schema) | Least realistic | Most thorough | Best for audit/compliance; code-level coverage |
7 Penetration Test Phases
Planning & Scoping
Obtain WRITTEN AUTHORIZATION β legally required before any testing. Define scope, Rules of Engagement, prohibited actions (no DoS, no data destruction), time window, emergency stop contacts.
Reconnaissance
Passive: OSINT, WHOIS, LinkedIn, Shodan β no direct contact with target. Active: Nmap port scan, DNS enumeration, banner grabbing β direct contact.
Scanning & Enumeration
Nmap (ports/services), Nessus (vulnerabilities), Nikto (web), dirsearch (web directories), Enum4linux (SMB).
Exploitation
Metasploit, manual exploits, custom payloads. Goal: confirm exploitability and demonstrate initial access or impact.
Post-Exploitation
Lateral movement, privilege escalation, persistence, data exfiltration proof. Shows true blast radius β not just "can we get in" but "what can we do after."
Reporting
Executive summary (risk + business impact) + technical findings (CVSS scores, proof-of-exploit, remediation steps). Dual-audience: CISO and engineers.
Remediation + Retesting
Fix all findings. Retest to confirm closure. BSP requires closure evidence (written confirmation from pen test firm) for regulatory sign-off.
Rules of Engagement (RoE)
Formal document signed BEFORE testing begins. Defines what is and isn't allowed during the engagement.
RoE Must Cover
- β’ Scope definition: exact IPs, domains, APIs in-scope vs out-of-scope
- β’ Prohibited actions: no DoS, no data destruction, no SE without authorization
- β’ Testing time window: avoid peak hours for production systems
- β’ Emergency stop contacts: who to call if something breaks
- β’ Data handling: how captured data is stored and destroyed post-engagement
Red / Blue / Purple Teams
- Red: Offensive. Simulates a full adversary campaign (weeks/months). Tests stealth, persistence, all kill chain phases.
- Blue: Defensive. Detects and responds. Operates SOC, SIEM, incident response.
- Purple: Red and Blue work together β Red attacks, Blue observes. Knowledge transfer improves both sides.
Key Terms
- WRITTEN AUTHORIZATION required before any pen test β without it, testing is illegal (Computer Fraud and Abuse Act). Verbal okay is not sufficient.
- Gray box = most common in real world β balances realism and thoroughness; best ROI for time invested.
- Red team β pen test β red team simulates full adversary campaign (weeks/months); pen test is time-boxed (days/weeks, specific scope).
- Rules of Engagement must be signed BEFORE testing starts β no exceptions.
- Post-exploitation shows TRUE impact β not just "can we get in" but "what can we do after initial access" (lateral movement, data exfiltration).
Recommended test type: Gray box β provide architecture docs, API specs, and test credentials. Testers can be more efficient while remaining realistic. BSP doesn't prescribe the box type, so gray box maximizes coverage per testing hour.
Pre-test checklist:
- Written authorization signed by CISO/CTO before tester touches anything
- Scope defined: Partner E APIs, mobile app, Card Processor integration β explicitly exclude Bank A systems (out of scope)
- RoE: no DoS attacks, no accessing real customer data, testing window 9amβ5pm PHT only
- NPC compliance: no actual customer PII to be captured by pen test firm β use synthetic test accounts only
- Retesting explicitly included in scope after remediation β get written closure attestation
Practice Quiz
Q1. A penetration tester receives verbal approval from the CISO over a phone call and begins port scanning production servers. What is the legal status of this activity?
βΌ Reveal Answer
Q2. For BSP regulatory compliance in the Philippines, which pen test type (black/gray/white box) provides the best coverage for an audit requirement?
βΌ Reveal Answer
Q3. How long does a red team engagement typically run compared to a penetration test, and what does a red team test that a pen test typically doesn't?
βΌ Reveal Answer
Q4. What must be defined in Rules of Engagement before a pen test of Partner E begins?
βΌ Reveal Answer
Q5. During post-exploitation of Platform C, a tester achieves initial access via a compromised engineer's credentials, then escalates to an admin role and accesses loan records from all lenders. What does this phase demonstrate beyond the initial access?