Quick note: This is intended for authorized, lawful security testing only. Always obtain written permission (scope, rules of engagement) and follow local laws and organizational policies. This document emphasizes methodology and common techniques — it intentionally avoids fully worked exploit scripts or unsafe step-by-step attack recipes.
At-a-glance checklist
☐ Scope & authorization confirmed (in writing)
☐ Reconnaissance (passive → active) complete
☐ Network/service discovery and port/service fingerprinting complete
☐ Enumeration of accounts, services, and content complete
☐ Vulnerability identification mapped to assets
☐ Exploitation (if in scope) — proof-of-concept only, no destructive actions
☐ Post-exploitation: persistence, lateral movement (in scope?)
☐ Privilege escalation checks (no destructive actions)
☐ Evidence collection (safe, for reporting)
☐ Cleanup & remediation recommendations delivered
☐ Final report + executive summary prepared
1. Preparation (Rules of engagement)
Goal: Define legal/technical boundaries so testing is safe and permitted.
Checklist:
☐ Written authorization (scope, dates, excluded systems, point(s) of contact).
☐ Scope inventory: IP ranges, domains, applications, cloud resources, user accounts.
☐ Time windows and emergency contacts.
☐ Testing classification: black / grey / white box.
☐ Data handling rules (sensitive data, exfiltration limits).
☐ Tools allowed/forbidden.
☐ Reporting format and timeline.
Why it matters: prevents legal exposure, avoids accidental disruptions.
2. Reconnaissance (Passive → Active)
Goal: Collect publicly available information and map attack surface.
Passive reconnaissance (low/no interaction):
OSINT on domains, personnel, org structure.
Search engines, public code repos, paste sites.
Certificate transparency logs, DNS records (public).
WHOIS, public S3 buckets, cloud metadata exposures (public).
Subdomain enumeration (passive lists).
Active reconnaissance (interacts with target):
DNS probing and zone transfers (if allowed).
Passive vs active decision: prefer passive where required by scope.
Checklist (recon attacks & checks):
☐ Subdomain discovery — find subdomains; look for forgotten services.
☐ Public code & config leaks — search for credentials, API keys.
☐ Email harvesting — build target user list for social engineering (if in-scope).
☐ Certificate and CDN discovery — map hosts behind aliases.
Tools/notes: reconnaissance tools are many; choose according to scope and ethics. Record timestamps and sources.
Defensive note: public exposure of secrets and forgotten subdomains are common low-effort wins for defenders.
3. Discovery & Scanning
Goal: Identify live hosts, open ports, and running services.
Prioritize: give a short remediation checklist that ops can act on immediately (change creds, apply patch, firewall rule, disable public management interface).
Medium: outdated components with known fixes, info leakage.
Low: discovery of non-sensitive files, single-user minor misconfigs.
Use CVSS for technical severity mapping, but map to business impact for executives.
Ethics & legal reminder
Get written authorization before testing.
Respect data privacy: do not exfiltrate or expose real private data in reports. Redact as needed.
If you accidentally access production data or cause outages — notify the client immediately.
Never sell or publish exploit code or private data from an engagement.
Quick reproducible examples (safe, illustrative)
Example: simple, non-destructive service version check (conceptual)
# Conceptual example only — adapt to your environment and scopenmap -sV --version-all --top-ports 1000 10.0.0.0/24
Use results to search vendor advisories and CVEs for the identified version numbers.
Closing notes
This cheat sheet is a compact methodology + checklist. For each finding, include evidence, suggested remediation, and a timeline for patching. Keep communication clear with stakeholders — a prioritized remediation roadmap is the most valuable outcome of any pentest.