What an Penetration Tester Might Do To Your System on a Pentest

Make sure you specify what you do and do not what a penetration tester to do in your rules of engagement

Teri Radichel
Cloud Security
Published in
13 min readAug 20, 2024

--

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

⚙️ Check out my series on Automating Cybersecurity Metrics. The Code.

🔒 Related Stories: AppSec | Secure Code | Data Breaches | Pentesting

💻 Free Content on Jobs in Cybersecurity | ✉️ Sign up for the Email List

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Random web shell from https://gist.github.com/joswr1ght/22f40787de19d80d110b37fb79ac3985

I just performed a penetration test for a client and they were surprised when I tripped some alerts that I had uploaded some malware to their system, so I thought I would explain a bit more about the penetration testing process and what is considered “malware.”

This is a quick post probably with typos due to lack of time. More penetration test reports to deliver!

Penetration test versus vulnerability scan

When you get a penetration test, unlike a security assessment, the tester is trying to prove that exploits work on your system and demonstrate the impact. When you get a vulnerability scan or security assessment

--

--

Teri Radichel
Teri Radichel

Written by Teri Radichel

CEO 2nd Sight Lab | Pentesting | Research | AWS Security Hero | Masters of Infosec & Masters Software Engineering | GSE | IANS | SANS Difference Makers Award