HTB CPTS: Penetration testing process

Penetration testing is not only “cool hacking” actions and stunning results. It’s a process which has many stages.
Penetration testing process
There’s no step by step process in pentesting. There are stages.
Each stage builds on the other
Stages of the Penetration Testing:
Pre-engagement
It’s a stage for educating the client and adjusting the contract
- NDA, Goals, Scope, TIme estimation, Rules of Engagement
Information gathering
Describes how to obtain information about the necessary components in various ways.
Looking for potential security gaps
Vulnerability Assessment
We analyze results from our Information Gathering stage
We look for knows vulnerabilities in the systems
Exploitation
We use the results to test our attacks against the potential vectors.
We try to gain initial access to the systems.
Post-Exploitation
At this stage we have access to the exploited machine.
We may try to escalate our privileges to obtain the highest possible rights.
We may hunt for sensitive data. For example credentials or other data.
Lateral Movement
- It describes movement within the internal network of our target company.
Proof-of-Concept
In this stage we document the steps we took to achieve network compromise.
It is important do document our finding well, because company then can fix those gaps and they see the importance of every vulnerability fix.
We prove that the vulnerabilities exist.
Post-engagement
Detailed documentation is prepared now.
We clean up all traces of our actions on all hosts and servers.
We create the deliverables for our client.
Report walkthrough meeting is set up.
In the next article we’ll look at teach of the stages in detail.




