- Home
- Cyber Security
- Methodology
- Test procedure
Test procedure
Our sophisticated and standardized
approach leads to precise results
Efficient processes. Reliable results.
Goal
The aim of a penetration test is to identify security-relevant vulnerabilities in IT systems or processes of the customer organization that endanger the protection goals of confidentiality, integrity or availability of data or systems.
Work result
As a result of the analyses carried out, the customer receives a detailed final report in which the vulnerabilities are described in detail and concrete countermeasures for their elimination are set out. The report also contains a management summary of the results, which also includes recommendations for action. The final report is presented to the client at the end of the project in order to obtain a common understanding of the work result. We have summarized further details of the results report for you in the following article. Please contact us via the contact form or by email if you are interested in a sample report from SmartTECS Cyber Security GmbH!
The following describes the process of conducting penetration tests by security consultants from SmartTECS Cyber Security GmbH.
Phases
The process of a project is divided into different phases that are completed sequentially. The procedure is based on the recommendations of the Federal Office for Information Security (BSI) and has been adapted and improved to the real project situation over several years based on the project experience of the security consultants at SmartTECS Cyber Security GmbH.
Phase 1: Preparation
The systems and applications to be tested within the scope of the investigation are documented, and the systems and functions that are explicitly excluded from the test are determined.
Depending on the complexity of the test object, the client will present the system. To reduce the risk of delays in the project, a so-called smoke test takes place a few days before the start of the test, in which the access and test requirements are checked together with the client.
Phase 2: Information gathering and evaluation
Passive information gathering involves no direct interaction with the target system(s). For example, Internet search engines are used or additional targets are identified via the enumeration of DNS subdomains in order to obtain additional information about the test object.
In the active phase of information gathering, interaction with the systems under investigation takes place with the aim of obtaining information such as operating systems used or services offered in the network. Port scanning techniques (TCP, UDP, ICMP, ARP) are used here, for example.
Phase 3: Identification of vulnerabilities
Phase 4: Exploiting vulnerabilities
Phase 5: Documentation of results and cleanup work
Finally, the results are presented to the client's contacts and recommendations are given on how to proceed to eliminate the weak points.
Our work result
As a result of the analyses carried out, the customer receives a detailed final report in which the vulnerabilities are described in detail and concrete countermeasures for their elimination are set out. The structure and content of the final documentation of a penetration test differs depending on the selected test category or type (e.g. source code analysis, network and infrastructure test or web application test). However, the final documents of SmartTECS Cyber Security GmbH in the area of penetration testing adhere to the following overarching structure:
Executive Summary
Results overview
General information about the analysis
Test result
Attachment
Test results
The documentation of the results identified during the analysis period at SmartTECS Cyber Security GmbH is based on the following scheme. Deviations only occur if the type of test or documentation requires it.