We will be testing your systems at the networks, authentication including user and system passwords.
Goals and Objectives
Our goal for your organization is to find and make you aware of any vulnerability in your Information system. Upon finding these we will give you suggestions on making your systems safer.
Tasks
We will be trying to break into the servers and SANS by using several methods.
We will be trying to break passwords and find user ID information to gain access to shared drives and secure information.
Schedule
We will begin testing on Saturday morning at 2:00 AM and will be done by 6:00 AM. Then testing will resume Sunday Morning 2:00 AM to 6:00 AM.
Reporting
We will be delivering your report as a document that will show graphs and our finding with our suggestions on fixing anything we find.
Unanswered Questions
Do all users have access to the system?
What is your Password expiration policy?
Do your servers have backups?
How often do you do updates?
Authorization Letter
John Smith, CEO of E-commerce Sales has given us permission to do a penetration test on his Information systems. He has given us a green light to run our applications to try to penetrate all levels of his systems. Our findings will be confidential and we will give the organization the findings and all the recordings of our