Network PenTest Cheatsheet

@fkclai

Available Service

  • Search all opening ports and ensure it is operation required.

  • Ensure all endpoints implemented authentication and authorization control

  • Identify the opening ports service applied the latest version & patches

  • Outdated components or known vulnerabilities (CVE) found in the identified service

Certification Setting

  • Disable the use of SSL 3.0, TLS 1.0, and TLS 1.1. Instead, leverage a newer version of TLS such as TLS v1.2 and v1.3.

  • Correctness of the certification information and signed party

  • SSL Certificate strength, at least > 2048 bits

  • Do not use the weak ciphers

Sensitive Data Exposure

  • Any shared files or services that contain sensitive data

  • Correctness of the certification information

Source: https://calvin-lai.gitbook.io/calvin-lai-security/penetration-testing-checklists/network-system-pentest

Last updated