<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ethical hacking Archives - Christian Espinosa</title>
	<atom:link href="https://christianespinosa.com/blog/tag/ethical-hacking/feed/" rel="self" type="application/rss+xml" />
	<link>https://christianespinosa.com/blog/tag/ethical-hacking/</link>
	<description>Bestselling Author &#124; Keynote Speaker &#124; Cybersecurity Expert</description>
	<lastBuildDate>Sat, 04 Sep 2021 06:28:59 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.1</generator>

<image>
	<url>https://christianespinosa.com/wp-content/uploads/2021/09/cropped-Christian-Espinosa-Blue-White-Logo-32x32.png</url>
	<title>ethical hacking Archives - Christian Espinosa</title>
	<link>https://christianespinosa.com/blog/tag/ethical-hacking/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Top 10 Penetration Testing Decision Factors</title>
		<link>https://christianespinosa.com/blog/top-10-penetration-testing-decision-factors/</link>
					<comments>https://christianespinosa.com/blog/top-10-penetration-testing-decision-factors/#respond</comments>
		
		<dc:creator><![CDATA[Christian Espinosa]]></dc:creator>
		<pubDate>Sat, 04 Sep 2021 06:28:59 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[ethical hacking]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[top 10]]></category>
		<guid isPermaLink="false">https://christianespinosa.com/?p=2630</guid>

					<description><![CDATA[<p>55% OF ALL SMALL AND MID-SIZED BUSINESSES HAVE SUFFERED A CYBERATTACK How secure is your network? When is the last time you tested your cybersecurity defenses? Nearly $50k is the average cost for a small business to overcome a data breach—why not take steps now to protect your systems, your employees, and your clients from [&#8230;]</p>
<p>The post <a href="https://christianespinosa.com/blog/top-10-penetration-testing-decision-factors/">Top 10 Penetration Testing Decision Factors</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Top 10 Penetration Testing Decision Factors' data-link='https://christianespinosa.com/blog/top-10-penetration-testing-decision-factors/' data-app-id-name='category_above_content'></div><p style="white-space: pre-wrap;"><strong>55% OF ALL SMALL AND MID-SIZED BUSINESSES HAVE SUFFERED A CYBERATTACK</strong></p>
<p><img fetchpriority="high" decoding="async" class="alignright" src="https://alpinesecurity.com/wp-content/uploads/2020/02/cybersecurity-penetration-testing-st-louis.jpg" alt=" Top 10 for Choosing a Penetration Testing Company " width="387" height="289" /></p>
<p class="" style="white-space: pre-wrap;">How secure is your network? When is the last time you tested your cybersecurity defenses? Nearly $50k is the average cost for a small business to overcome a data breach—why not take steps now to protect your systems, your employees, and your clients from a cyberattack? You cannot fix what you do not know. A penetration test strengthens your defenses by revealing your weaknesses and recommending prioritized fix actions.</p>
<p class="" style="white-space: pre-wrap;">This article contains ten items you should consider when selecting an organization to perform a penetration test against your environment.</p>
<h3 style="white-space: pre-wrap;"><span style="color: #000080;">1. Use Certified and Experienced Personnel</span></h3>
<p class="" style="white-space: pre-wrap;">The penetration testing team should have appropriate penetration testing credentials, such as the EC-Council Certified Security Analyst (ECSA), Licensed Penetration Tester (LPT), Offensive Security Certified Professional (OSCP), or Certified Ethical Hacker (CEH). The team should also have penetration experience with multiple industries and different environments. Make sure the penetration testing team has experience and knows what they are doing.</p>
<h3 style="white-space: pre-wrap;"><span style="color: #000080;">2. Deliver Clear Reports with Risk-Based Prioritized Recommendations</span></h3>
<p class="" style="white-space: pre-wrap;">Reports should be easy to understand and include summary data for executives and detailed data for technical personnel. The penetration test report should contain a prioritized risk-based list of findings with detailed step-by-step recommendations. Any steps taken to exploit systems should include screenshots, where applicable. Your team should be able to reproduce the findings, given the steps in the report. The vendor should be able to provide a sample and redacted reports. If you can&#8217;t understand the report or take action on the findings, what&#8217;s the point of the penetration test?</p>
<h3 style="white-space: pre-wrap;"><span style="color: #000080;">3. Perform Both Manual and Automated Testing</span></h3>
<p class="" style="white-space: pre-wrap;">Automated tools do not detect all vulnerabilities and are prone to false positives. Manual methods must be used as part of the penetration test to fill in gaps left by the automated tools, eliminate false positives, and ensure test completeness. Both manual and automated methods should be used for every penetration test. Many penetration testing organizations run automated tools, such as an automated Vulnerability Scanning tool, then try to pass those results off as a penetration test. A penetration test should involve many tools and many manual techniques.</p>
<h3 style="white-space: pre-wrap;"><span style="color: #000080;">4. Follow a Documented Process</span></h3>
<p class="" style="white-space: pre-wrap;">A well-defined documented process should be followed before, during, and after the penetration test engagement. Documented processes ensure completeness, accuracy, and test repeatability. The documented process is also often referred to as a penetration testing methodology. A methodology is often very high-level though and should include detailed steps.</p>
<h3 style="white-space: pre-wrap;"><span style="color: #000080;">5. Use a Rules of Engagement (ROE) Document for Clear Expectations</span></h3>
<p class="" style="white-space: pre-wrap;">Rules of Engagement are designed to ensure everyone is &#8220;on the same page&#8221; and there are no surprises during the test. The ROE ensures clarity on test expectations by documenting agreed-upon test parameters, such as times for the test, escalation procedures, targets in scope, targets out of scope, and limitations. The ROE document should be signed by you and the penetration testing vendor. It removes ambiguity from the test.</p>
<h3 style="white-space: pre-wrap;"><span style="color: #000080;">6. Communicate Clearly and Frequently</span></h3>
<p class="" style="white-space: pre-wrap;">Routine communications during the penetration test should include when penetration testing begins and ends, what is being tested, whether any critical findings were discovered, any problems, etc. The communication frequency and medium should follow the agreed-upon terms in the ROE. Clear communications are vital during the penetration test.</p>
<h3 style="white-space: pre-wrap;"><span style="color: #000080;">7. Demonstrate Professionalism and Respect</span></h3>
<p class="" style="white-space: pre-wrap;">This should be an obvious one, but it is important to emphasize. The penetration testing team should remember the focus of the test is to help you secure your environment; not provide an environment for them to practice skills or try out new exploits. Continuing exploitation beyond what is necessary is bad practice. The vendor should be able to provide references from previous clients.</p>
<h3 style="white-space: pre-wrap;"><span style="color: #000080;">8. Identify and Eliminates False Positives</span></h3>
<p class="" style="white-space: pre-wrap;">A false positive is when the penetration testing team tells you there is a vulnerability or a problem when there really isn&#8217;t one. The penetration testing team should make every effort to eliminate false positives and label questionable findings. This is why manual analysis is critical. A report riddled with false positives wastes your time.</p>
<h3><span style="color: #000080; white-space: pre-wrap;">9. Offer &#8220;Retest&#8221; Options</span></h3>
<p class="" style="white-space: pre-wrap;">Once you fix the penetration test report findings, it is critical to validate your remediation steps actually took care of the problem. Many organizations have taken steps to fix problems identified by penetration testers but never validated the steps worked. The penetration testing team should offer an option to rerun the test after you remediate the findings.  The last thing you want is to pay for a penetration test, take time fixing items, and then be hacked later on because you did not validate your fix actions.</p>
<h3 style="white-space: pre-wrap;"><span style="color: #000080;">10. Protect Your Data During and After the Test</span></h3>
<p class="" style="white-space: pre-wrap;">The penetration testing team should follow a documented process to ensure your data remains secure. Penetration test reports often contain identified vulnerabilities, steps to exploit the vulnerabilities, cracked passwords, and other sensitive information. Reports should be labeled appropriately, handled with care, and distributed only to authorized personnel.</p>
<p>Interested in a penetration test? <a href="https://christianespinosa.com/connect/">Connect with me.</a></p>
<div style='display:none;' class='shareaholic-canvas' data-app='share_buttons' data-title='Top 10 Penetration Testing Decision Factors' data-link='https://christianespinosa.com/blog/top-10-penetration-testing-decision-factors/' data-app-id-name='category_below_content'></div><div style='display:none;' class='shareaholic-canvas' data-app='recommendations' data-title='Top 10 Penetration Testing Decision Factors' data-link='https://christianespinosa.com/blog/top-10-penetration-testing-decision-factors/' data-app-id-name='category_below_content'></div><p>The post <a href="https://christianespinosa.com/blog/top-10-penetration-testing-decision-factors/">Top 10 Penetration Testing Decision Factors</a> appeared first on <a href="https://christianespinosa.com">Christian Espinosa</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://christianespinosa.com/blog/top-10-penetration-testing-decision-factors/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
