Threat Intelligence • May 21, 2021
An internal Penetration test has four phases:
The first phase involves passive intelligence gathering. This may include analyzing the traffic and “sniffing” networks. It further includes collecting information, such as domain and subdomain names, data leaks, technical information shared on social networks or forums, versions, and types of technologies used. It may also include employee names and – if existent – pwned passwords (a pwned password is a password that has been breached and released to the public). This phase’s main purpose is to identify all the sensitive information.
During the mapping phase, pentesters gain better insight into the most exposed and critical elements of an organization’s infrastructure. This particular phase is essential, especially if you are looking at vulnerabilities within the entire framework, rather than just one particular aspect (such as, say, guest wi-fi).
Is the phase where you will actively search for vulnerabilities. This phase generally uses automated programs that are designed to scan the network (and software) as thoroughly as possible. The goal here is to find as many vulnerabilities as you can.
This last phase tests all the possible exploitation flaws that were identified during the discovery phase. Exploitation allows you to discover just how much of an impact a particular vulnerability can have. For example, a cracked password for an employee who has access to customer and client PII can lead to massive threats of identity theft.
Any potential internal vulnerabilities are identified by carrying out tests on one or more of the following areas:
The internal penetration checklist ensures that your efforts in penetration testing deliver results.
Scheduling (
2-4 months before Penetration Test
)
Communicate your testing methodologies, and follow best-practice standards in the industry.
Testing Preparation (
5 weeks before Penetration Test
)
Testing (
During Penetration Test
)
This is the actual test. During this time, you will run all automated and manual processes, as outlined with the organization beforehand.
Reporting (
0-6 weeks after Penetration Test
)
After completing the test, you will work up a report, detailing vulnerabilities, any exploitations you were able to introduce, as well as projected impact and suggested remediation. You must then give the organization time to review the report. Be patient!
Retesting (
0-3 months after Penetration Test
)
Depending on the company’s budget and resources, they may request you to come back and do a retest. Bear this in mind when you are scheduling your next pentests!
The internal penetration testing tools that are popularly used include:
For Frameworks, you can use the following testing tools:
For Reconnaissance, some of the internal penetration tools you can use include:
For Discovery, the following are the tools that you can use:
The following tools can be used for Enumeration:
Tools you can use for Scanning include:
For Password Cracking, you can use the following tools:
For Sniffing, you can use these tools:
For Exploitation, use the following tools:
The Evolve “Automated Internal Infrastructure Penetration Testing” solution helps organizations orchestrate on-demand penetration testing environments. This means you can run an internal penetration test in any location across corporate networks within on-premise data centers and public clouds, including AWS and Azure.
Evolve orchestrates scalable penetration testing environments specifically for the type of penetration test you want to perform. You choose the level of protection and intensity that is right for your business needs with event-driven or daily, weekly and even monthly periodic penetration testing.
If you want to try automating your security in your own time, start our 7-day free trial. Check how easy and fast it is:
Step 1:
Register an Evolve Account
Step 2: Navigate to the Evolve Marketplace
Step 3: Import the Automated Internal Penetration Test workflow into your account
Step 4: Click to launch a workflow instance to start running a test
Step 5: Done! Evolve does all the work to secure your business!
Related Content