19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Timing<br />

Chapter 3: Developing Your Ethical Hacking Plan<br />

They say that it’s “all in the timing.” This is especially true when performing<br />

ethical hacking tests. Make sure that the tests you perform minimize disruption<br />

to business processes, information systems, and people. You want to<br />

avoid harmful situations such as miscommunicating the timing of tests and<br />

causing a DoS attack against a high-traffic e-commerce site in the middle of<br />

the day or performing password-cracking tests in the middle of the night.<br />

It’s amazing what a 12-hour time difference (2 p.m. during major production<br />

versus 2 a.m. during down time) can make when testing your systems! Even<br />

having people in different time zones can create issues. Everyone on the<br />

project needs to agree on a detailed timeline before you begin. Having the<br />

team members’ agreement puts everyone on the same page and sets correct<br />

expectations.<br />

If possible and practical, notify your Internet service providers (ISPs) or hosting<br />

collocation (colo) providers. These providers have firewalls or intrusion<br />

detection systems (IDS) or intrusion prevention systems (IPS) in place to<br />

detect malicious behavior. If your provider knows you’re conducting tests, it’s<br />

less likely to block your traffic.<br />

Your testing timeline should include specific short-term dates and times of<br />

each test, the start and end dates, and any specific milestones in between.<br />

You can develop and enter your timeline into a simple spreadsheet or Gantt<br />

chart, or you can include the timeline as part of your initial client proposal<br />

and contract. Your timeline may also be work breakdown structures in a<br />

larger project plan. A timeline such as the following keeps things simple and<br />

provides a reference during testing:<br />

Test Performed Tester Start Time Projected End Time<br />

Web application<br />

vulnerability<br />

scanning<br />

Tommy Tinker July 1, 06:00 July 1, 10:00<br />

OS vulnerability<br />

exploitation<br />

Amy Trusty July 2, 12:00 July 2, 17:00<br />

Running specific tests<br />

You might have been charged with performing a general penetration test, or<br />

you may want to perform specific tests, such as cracking passwords or trying<br />

to gain access to a web application. Or you might be performing a social engineering<br />

test or assessing Windows on the network. However you test, you<br />

might not want to reveal the specifics of the testing. Even when your manager<br />

41

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!