penetration testing plan 6

Would you like us to handle your paper? Use our company for better grades and meet your deadlines.

Order a Similar Paper Order a Different Paper

Ford Motor Company as the primary firm to address throughout the course from week 1

  1. Penetration Tester evaluates the security of an information infrastructure by intentionally, and safely, exploiting vulnerabilities.

    Take on the role of Penetration Tester for the organization you chose in Week 1.

    Use the
    Penetration Testing Plan Template to create a 3- to 4-page Penetration Testing Plan for the organization you chose (16-points) plus a compilation of all of the (3-points) listed below you included in your report.

    There are 28 items listed below; each item is worth (3-points) and will be awarded if listed in the plan, or omitted if not listed.

    Research and include the following:

    • Pentest Pre-Planning
    • Engagement timeline: Tasks and who performs them
    • Team location: Where will the penetration team execute their tests?
    • Organization locations tested: multiple locations, countries (Export restrictions and government restrictions)
    • Which pentest technologies will be used? Consider the following as you research options:
    • Scanning Tools: Nmap, Nikto
    • Credential Testing Tools: Hashcat, Medussa, John the Ripper, Cain and Abel
    • OSINT Tools: Whois, TheHarvester
    • Wireless Tools: Aircrack-ng, Kismet
    • Networking Tools: Wireshark, Hping
    • What client personal are aware of the testing?
    • What resources provided to pentest team?
    • Test Boundaries:
    • What is tested?
    • Social engineering test boundaries? What is acceptable?
    • What are the boundaries of physical security tests?
    • What are the restrictions on invasive pentest attacks?
    • What types of corporate policy affect your test?
    • Gain Appropriate authorization (Including third-party authorization)
    • Pentest Execution Planning: Given the scope and constraints you developed in your Pentest Pre-Plan, plan the following pentest execution activities
    • Reconnaissance
    • Scanning
    • Gaining Access
    • Maintaining Access
    • Covering Tracks
    • Pentest Analysis and Report Planning:
    • Analyze pentest results
    • Report pentest results

    Submit the assignment.


Do you need help with this or a different assignment? We offer CONFIDENTIAL, ORIGINAL (Turnitin/LopesWrite/SafeAssign checks), and PRIVATE services using latest (within 5 years) peer-reviewed articles. Kindly click on ORDER NOW to receive an A++ paper from our masters- and PhD writers.

Get a 15% discount on your order using the following coupon code SAVE15

Order a Similar Paper Order a Different Paper