Name the three different categories of pentesting
What are the steps of the typical pentesting process?
1. Reconnaissance Gather information about the SUT, find vulnerabilities 2. Create a threat model - identify assets - use STRIDE - visualize using attack/defense trees 3. Build an attack plan: designed in the form of test cases 4. Execute attack plan / test cases 5. Report found problems Comprises: - Executive Summary - Technical details: source, probability of exploitation, impact of exposure, remediation suggestions 6. Postmortems
Name 3 non-obvious parts of pentesting
What is the objective of red-teaming?
Test the preparedness of the organization’s security and its ability to detect and respond to an attack
What is the objective of blue-teaming?
Withstand attacks, proving the organization’s readiness agains security threats, or lack thereof -> more training/investment
Name and describe the three different approaches to blue-teaming