Sie sind auf Seite 1von 12

ECSA/LPT

EC Council
EC-Council

Mod le XXXXIV
Module
Penetration Testing
R
Report
t Analysis
A l i

Penetration Testing Report


Analysis
Your pen-test team has completed the onsite technical evaluation
of your client, and now its time to review all the information you
gathered.
Conduct a team meeting with your peers and analyze the output
from the tests you conducted.

EC-Council

Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited

Report on Penetration Testing


Divide the reports into sessions as
f ll
follows:
Network test reports.
Client-side
Client side test reports.
reports
Web application test reports.

Common structure for


f penetration
i
report includes:
E
Executive
ti summary.
Management summary.
Technical summary.

EC-Council

Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited

Pen-Test Team Meeting


Set up the agenda for the meeting

Bring up questions about your findings


Assign work on the sections of the findings
to individual members
Create an action plan and deadlines
C
Consult
anyy additional expertise
p
that
might be needed
EC-Council

Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited

Research Analysis
Research the vulnerabilities you have
found and discover the latest fix or patch
for each vulnerability.
Extensive research must be conducted
for each vulnerability.

Simply saying "vulnerability found in X


module" is not enough
module
enough.

EC-Council

Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited

Pen-Test Findings
Findings are security issues that you
uncovered during your penetration testing.

Findings are categorized as:


High.
Medium.
Low.

EC-Council

Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited

Rating Findings
High criticality findings:
Loss could result in the unauthorized release of information that
could have a significant impact on the organizations mission or
financial assets or result in loss of life

Medium criticality findings:


Loss could result in the unauthorized release of information that
could have an impact on the organizations mission or financial
assets or result in harm to an individual

Low criticality findings:


Loss could result in the unauthorized release of information that
g
of impact
p
on the organizations
g
mission or
could have some degree
financial assets or result in harm to an individual
EC-Council

Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited

Example of Finding- I
Finding: SNMP set public community
Finding ID #: 1
CVE/CAN: CAN-19990517
Category: Identification and Authentication (External Exposure)
Location: 10.0.0.4
Severity: High
Discussion:
The SNMP default p
public communityy name is specified,
p
allowing
g anyone
y
to change
g the
computers system information if they use this default value. An attacker can use SNMP to
obtain valuable information about the system, such as information on network devices
and current open connections. In this case, the ability exists to actually change
information, because the SNMP Set p
password is set to Public
Recommendations:
Option 1: If the SNMP Service is not necessary, disable or remove it.
p
2: If yyour organization
g
requires
q
the use of the SNMP Service,, you
y should take
Option
steps to secure the SNMP community names and the community strings
EC-Council

Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited

Example of Finding- II
Finding: Telnet default account accessible
Finding ID #: 2
CVE/CAN: No common corresponding vulnerability
Category: Technical Finding (System Boundary)
Location: 10.0.0.4
Severity: High

Discussion:
An accessible default account was detected through Telnet. Default accounts through
Telnet allow attackers easy access to remote systems by providing a network-accessible
service on the server or printer

R
Recommendations:
d i
Option 1: Disable the Telnet account/service on each network.
Option 2: Change the password for the account to something difficult to guess

EC-Council

Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited

Analyze
Repeatedly
p
y analyze
y yyour findings.
g
This will be critical in preparing your final report.

EC-Council

Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited

EC-Council

Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited

EC-Council

Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited

Das könnte Ihnen auch gefallen