White Hats - Nepal

Security research, bug bounty writeups, pentest notes

Pentest Checklist: A Pro's Guide to Systematic Security Testing

An effective pentest checklist is a structured framework that guides security researchers through the systematic identification, exploitation, and reporting of vulnerabilities within a target environment. By following a rigorous methodology, you ensure that no critical attack surface—from misconfigured S3 buckets to obscure logic flaws in an OAuth flow—is overlooked during an engagement. This guide provides a battle-tested roadmap used by senior testers to maintain consistency and depth in their technical assessments.

Pre-Engagement and Scoping Checklist

Before you send a single SYN packet, you need to define the boundaries. I’ve seen engagements go south because the "Rules of Engagement" (ROE) were vague. You don't want to accidentally take down a production database or scan an out-of-scope third-party API. Clear scoping protects both the consultant and the client.

Testing Type Knowledge Level Primary Goal
Black Box None Simulate an external adversary with no prior access.
Gray Box Limited Assess impact of a "standard" user or insider threat.
White Box Full Comprehensive audit including source code and architecture.
Key Takeaway: Never start testing without a technical point of contact (POC) who can verify if a system goes offline. A checklist is useless if you're legally exposed.

Reconnaissance and Information Gathering

Recon is where 90% of bugs are found. If you find an asset the company forgot they owned, you’ve likely found an unpatched entry point. I start by mapping the external perimeter to understand the organization's footprint. This includes finding hidden subdomains and identifying the technologies running on every open port.

Passive Reconnaissance

Active Reconnaissance

# Example Nmap scan for a quick overview
nmap -sC -sV -p- -oN initial_scan.txt target.com

# Ffuf command for hidden directory discovery
ffuf -u https://target.com/FUZZ -w /usr/share/seclists/Discovery/Web-Content/raft-medium-directories.txt -mc 200,301

Web Application Penetration Testing Checklist

Web apps are the most common entry point for modern breaches. When I test an application, I follow the OWASP Top 10 but also look for complex business logic flaws that automated scanners miss. You need to understand how the application handles state, identity, and data input.

Authentication and Session Management

Injection and Input Validation

For a more detailed breakdown of these web-specific vulnerabilities, you should refer to our web application security testing guide which covers these vectors in much higher granularity.

Business Logic and Authorization

Network and Infrastructure Assessment

Once you've moved past the web layer, you need to look at the underlying infrastructure. Network pentesting focuses on services like SMB, SSH, RDP, and database listeners. In internal environments, this often involves attacking Active Directory (AD) to gain Domain Admin privileges.

External Network Checks

Internal Network and Active Directory

Pro Tip: Use BloodHound to visualize attack paths in Active Directory. It often reveals that a low-level user has "GenericAll" rights over a group that contains a Domain Admin.

Exploitation and Post-Exploitation

Exploitation is the "sexy" part of pentesting, but it must be done carefully. Your goal isn't just to get a shell; it's to demonstrate the risk. Once you have access, you need to see how far an attacker could go. This often involves pivoting to other systems or escalating your privileges from a standard user to root or SYSTEM.

Gaining Access

Privilege Escalation

Post-Exploitation Checklist

Reporting and Remediation Tracking

The report is the only tangible product the client receives. If you found a critical bug but can't explain it, you haven't provided value. A good report should be readable by both a CTO and a Lead Developer. I structure my reports to emphasize the "so what?" factor—what is the actual business risk?

Reporting Essentials

Severity Impact Required Action
Critical Immediate full system compromise. Patch within 24-48 hours.
High Sensitive data exposure or partial control. Patch within 1 week.
Medium Information leak or difficult exploitation. Patch during next sprint.
Low Best practice deviations. Address as time permits.

Frequently Asked Questions

What is the most important part of a pentest checklist?

The "Scoping" and "Rules of Engagement" phase is the most critical. Without a clearly defined scope and legal authorization, you risk legal consequences or causing unintended downtime in a production environment.

How often should I update my pentest checklist?

You should treat your checklist as a living document, updating it after every engagement. New vulnerabilities (like Log4Shell or MoveIT) and new bypass techniques emerge weekly, so your methodology must evolve to stay relevant.

Can I use automated tools for my entire checklist?

No, automated tools are excellent for catching "low-hanging fruit" like missing headers or old versions, but they fail at detecting complex business logic flaws, IDORs, and multi-step pivoting chains that a human tester can find.

What is the difference between a vulnerability assessment and a pentest?

A vulnerability assessment is a list of potential security holes found via scanning, whereas a pentest involves actively exploiting those holes to prove the real-world impact and see how deep an attacker can get into the network.

Final Thoughts on Systematic Testing

A pentest checklist isn't a replacement for creativity; it's a safety net. It ensures that while you're busy chasing a complex exploit chain, you don't forget to check if the /admin panel is protected by a default password. Consistency is what separates professional pentesters from hobbyists. By following a structured approach—from the first DNS query to the final report—you provide the most value to your clients and help build a more secure internet.

For more hands-on tutorials and deep dives into specific exploitation techniques, keep exploring the White Hats Nepal blog. Whether you are prepping for the OSCP or hunting on Bugcrowd, having a solid methodology is your greatest asset.