Preview

Penetration Test Ecommerce Company

Satisfactory Essays
Open Document
Open Document
542 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Penetration Test Ecommerce Company
LAB 1 ITN.261
PENETRATION TEST PLAN ECOMMERCE COMPANY
Table of Contents
SCOPE…………………………………………………………………………………………………..2
GOALS AND OBJECTIVES………………………………………………………………………2
TASKS…………………………………………………………………………………………………..3
REPORTING…………………………………………………………………………………………..3
SCHEDULES…………………………………………………………………………………………..3
UNANSWERED QUESTIONS………………………………………………………………….3
AUTHORIZATION LETTER………………………………………………………………………4

SCOPE: The scope of this penetration test will be as follows:
We are running a penetration test from Jan. 1 to Jan. 15th, 2014 on the client’s ecommerce production environment.
We will test the Production Web Application server and Cisco Network located on ASA_Instrw
The application server is an external point of entry
The server is an Apache Server acting as an ecommerce web application server
Company’s uses the machine as a web portal
Credit card transactions are initiated here

GOAL and OBJECTIVES:
This test will verify whether Client Security checkpoints are effective in eliminating security breaches to client’s Cisco Network
We will utilize Black box testing to simulate hacker intrusions into the environment to steal customer data.
We will utilize gray box testing techniques to simulate internal breaches of from insider threats

TASKS:
Three step process 1. Explore the system. 2. Test for Vulnerability 3. Test for Exploitability.
We will use Ethereal (Ethereal.com) To intercept a sample network packages to explore possible vulnerabilities.
Will use NMap an open source utility for network exploration and security auditing. NMAPP utilizes raw IP packets to determine what hosts are available on the network, what services (ports) they are running, what operating systems they are using, and what firewalls are in place.
Will Use HOLDADECK WEB to test for vulnerabilities in web based applications. Uses a spider to discover Web Page vulnerabilities including buffer overflows, cross site scripting and SQL injections.
We

You May Also Find These Documents Helpful

  • Satisfactory Essays

    To provide the quality that has customers returning for our service, we design the project by doing a penetration test at the end. This is because we assure all our jobs to be secured and free from exploitable vulnerabilities at the end. So, with the penetration test we will simulate a hacker and try everything to break into the network and steal information. If we are able to breach the network we will fix the vulnerability. This will continue until there is no more way for us to get in. The idea behind our strategy is that if we cannot get in, then hacker will not be able to get in either. This signifies a high standard of quality.…

    • 408 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    a. Vulnerability scans performed from external hosted servers give the same perspective as an attacker. Two types of hacking are White hats which are individuals that used their abilities to find vulnerabilities in systems and networks and then report them to the owner of the system so that they can be fixed. Black Hats are individuals that break into systems or networks that are not authorized to.…

    • 486 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Penetration testing, on Web applications and Web servers is a critical step in ensuring the confidentiality, integrity, and availability (CIA) of the Web application or service. If e-commerce or privacy data is entered into the Web application, the company is bound by compliance laws and standards to ensure the confidentiality of customer data. It is especially critical when the Web application requires customers to input private data.…

    • 575 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Itt 255 IT255 Instructor Lab Manual LABORATORY Instructor Lab Manual IT255 Fundamentals of Information Systems Security Copyright © 2012 Jones & Bartlett Learning, LLC www.jblearning.com All Rights Reserved. Current Version Date: 12/06/2010 -1- IT255 Instructor Lab Manual LABORATORY ISS Curriculum Overview............................................................................................................................. 5 Ethics and Code of Conduct.......................................................................................................................... 6 ISS Mock IT Infrastructure ...........................................................................................................................…

    • 33056 Words
    • 133 Pages
    Satisfactory Essays
  • Satisfactory Essays

    BIS Week 3 Assignment

    • 446 Words
    • 2 Pages

    References: Horton, T. (2014, May 1). The Right Technology Fix Can Help Prevent Breaches. Retrieved April 29, 2015, from ProQuest: http://search.proquest.com/docview/1548709638?accountid=458…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 4

    • 342 Words
    • 2 Pages

    9. The most important step in the five-step hacking process is step 5, where the security practitioner must remediate the vulnerability and eliminate the exploit. What is the name and number of the…

    • 342 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Unit 4

    • 1878 Words
    • 8 Pages

    Organizations invest a large portion of their information technology budgets on security applications and services, such as antivirus software, firewalls, and encryption. But no matter how much security hardware or software you deploy, how tightly you control the rights of users, or carefully you configure security permissions on your data, you should not consider the job complete unless you have a well-defined, timely auditing strategy to track the effectiveness of your defenses and identify attempts to circumvent them.…

    • 1878 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Week 4 Assignment

    • 815 Words
    • 3 Pages

    Cybercriminals will never stop trying to compromise systems to obtain data. Organizations need to be aware of where they may be open to attacks, how attackers can enter their environment and what to do if (and when) an attack occurs. This test should be done as a surprise attack, since a hacker…

    • 815 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Cmgt Week 4

    • 345 Words
    • 2 Pages

    Submit your site in a compressed .ZIP file or folder. Include all runtime executable and source files. Identify what file should be loaded (.INDEX or .DEFAULT) or run (.EXE) first.…

    • 345 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3445 Lab 7

    • 371 Words
    • 2 Pages

    Firefox is a popular web application penetration testing tool with many plugins. It’s designed for web application security assessment or penetration testing.…

    • 371 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS4560

    • 486 Words
    • 2 Pages

    1. Why is it critical to perform a penetration test on a web application prior to production Implementation?…

    • 486 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Firewalls aim to provide organisations with reliable security at the network perimeter; however each firewall must be properly configured in order to allow and disallow network traffic accordingly, in a manner sensitive to business needs. Poorly configured firewalls can be overwhelmingly damaging to the security of an organisation – lax ingress rules may provide multiple vectors to attackers on the Internet, while lax egress rules may provide avenues for unauthorised command and control connections from the Internet and exfiltration of intellectual property and confidential data. Other factors must also be considered as part of a firewall configuration review, i.e. The software/firmware versions need to be identified in order to correlate with any publicly known issues or exploits with the specific device and version The network services available on the firewall also demand investigation and review against documented business requirements, including the number of registered users on the firewall and the password policies governing access to the device. IRM’s firewall configuration review provides an unbiased assessment of an organisation’s firewall deployments and the traffic that is currently permitted and denied through the organisation’s networks. The firewall configuration is validated against best practices in order to identify any misconfiguration that could lead to unauthorised and undesired access.…

    • 839 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    1. rather than guess what users are doing, the test plan is using real traffic data…

    • 442 Words
    • 2 Pages
    Powerful Essays

Related Topics