Now that we know how to classify a penetration test, the question remains how meaningful a simulation of such an attack really is if total security is nothing more than wishful thinking. To answer this question, we must first take a look at the word ’security’. The public at large views security as a fixed state. For example, how many times have you been asked whether an IT system is secure? There can only be one answer: not secure. But argumentum a contrario, this doesn’t mean that the IT is wide open to attack. It only means that the question in and of itself is poorly devised. Instead of asking whether or not, the question should be how secure an IT system is, as there is no absolute security. As you probably already noticed, this formulation reveals that security is not a condition but a process. This means the guiding principle is that the more effort invested, the more securely an IT system can be developed or tested within the scope of what we are talking about. The meaningfulness of the penetration tests therefore correlates with the amount of time invested by the penetration tester.
When juxtaposing meaningfulness and the time spent, total security cannot be exceeded, only approximated. In mathematical terms, this is subject to limited growth, which is illustrated in the following diagram.
The diagram reveals another important fact: the curve increases as fast as it decreases. From a pentester’s perspective, we can quickly make a statement as to whether a system is catastrophically vulnerable or not when examining an IT system. This requires little more than searching for known vulnerabilities of the installed services on the internet. A more in-depth analysis requires significantly more time though. We may endeavour to autonomously find unpublished vulnerabilities and create corresponding programs for their exploitation. In theory, we could spend an entire lifetime carrying out a single penetration test. But under normal circumstances, we will estimate the effort so that we can make at least one statement on as to whether our target system is built and developed upon a professional level of security or not. This relationship is indicated by the green star in our diagram, which is based on the Pareto principle. It states that 80% of the results can be achieved with 20% of the overall effort.
It is thus part of the job of each penetration tester to provide an estimate as part of the tendering process. The rule is, of course: the more information available, the more accurate the estimate. Consequently, fixed efforts generally do not exist in penetration testing. This must be agreed with the client.
To summarise, penetration testing at a minimum identifies all easy-to-discover vulnerabilities (low-hanging fruits), thus rendering all attacks on the level of a script kiddie harmless. Because of this, the effort exerted by the attacker would increase in line with the effort made by the pentester. A poignant penetration test offers a clear and meaningful statement as to whether a target system or a target application has been principally built or developed on a professional security level.
Write down the amount of time that you have spent in training to perform penetration tests for Dubius Payment Ltd. These may be useful as reference values for comparable estimates. An estimation can possibly be provided through a network description and a brief look at the DMZ network of Dubius-Payment Ltd.
Last modified: Dec. 15, 2022
Take a look at the pentest training chapters and learn penetration testing:
Discover the world of penetration testing. Learn how to infiltrate networks and successfully penetrate systems and applications. Acquire the necessary hacking skills and use them when conducting professional penetration tests. Become a real penetration tester. Here you will find the free documents for the Pentest Training of binsec academy GmbH. The binsec academy GmbH offers the corresponding security training lab environments and certifications. However, the knowledge and wiki articles on hacking and penetration testing is universal.
binsec academy GmbH is the European provider of online security training with virtual laboratory environments. The core component of all security training is the focus on practice, practice and more practice. In the wiki here you will find the public and freely available course materials. You can put the theory into practice at binsec-academy.com.