Pentest Checklist

Pentest Checklist

Here we can see, “Pentest Checklist”

Network Penetration Testing Checklist

What is Penetration Testing?

Penetration testing is the procedure of analyzing a network because of its safety vulnerabilities by trained safety specialists (e.g. penetration evaluations or malicious hackers). The purpose of this type of test is to fortify the security vulnerabilities that the system might comprise, so the hacking system does not readily exploit (or take advantage of). It assists in detecting Open vents, Troubleshooting live programs, services and catching system banner ads.

List of top Network Pentest checklist

1. Host Discovery
2. Port Scanning
3. Banner Grabbing/OS Fingerprinting
4. Scan for Vulnerabilities
5. Draw Network Diagrams
6. Prepare Proxies
7. Document all Findings

Let us explain in short.

1. Host Discovery

Footprinting is your very initial and essential stage where data on your target process is accumulated.

DNS footprinting helps record DNS records, for example (A, MX, NS, SRV, PTR, SOA, CNAME) from the target domain name.

A— An album can be used to stage the domain, such as, to its own hosting host’s IP address.

MX— Mail exchange documents accountable.

NS— NS documents identify the DNS servers in control of the domain name.

SRV— Distinguish documents for the support hosted on specific servers. PTR– Reverse DNS search; you may use the IP to connect the domain name with it.

Also See:  Yubico Security C NFC is a cheap USB-C security key for phones and PCs

SOA— Record beginning; it is nothing but info regarding the DNS Zone and other DNS records from the DNS program.

CNAME– Cname maps a domain to another domain.

Live hosts, reachable hosts from the target network could be discovered using system scanning tools such as Advanced IP Scanner, NMAP, HPING3, NESSUS.

Ping & Ping Sweep:

root@kali:~# nmap -sn
root@kali:~# nmap -sn To ScanRange of IP
root@kali:~# nmap -sn 192.168.169.* Wildcard
root@kali:~# nmap -sn Entire Subnet

Whois data

To acquire Whois name and information host of a Site.

root@kali:~# whois


Network Diagnostic tool which shows route transit and path delay in programs

root@kali:~# traceroute

Online Tools

2. Port Scanning

Conduct port scanning tools like Nmap, Hping3, Netscan, Network monitor. These tools enable us to examine a host or server for open ports around the target system.

The open vents would be the gateway to allow attackers to install and enter malicious backdoor software.

root@kali:~# nmap –open To find all open ports
root@kali:~# nmap -p 80 Specific Port
root@kali:~# nmap -p 80 Range of ports
root@kali:~# nmap -p “*” To scan all ports

Online Tools

3. Banner Grabbing/OS Fingerprinting

Banner Grabbing / OS fingerprinting such as Telnet, IDServe, NMAP decides the target audience and operating platform.

Also See:  Access Uh Login

When you understand the target model and operating platform, we will need to recognize and exploit the vulnerabilities. Attempt to acquire the system controller.

root@kali:~# nmap -A
root@kali:~# nmap -v -A with high verbosity level

Online Tools

4. Vulnerabilities scanning

Scan the system with GIFLanguard, Nessus, Retina CS, SAINT vulnerabilities.

These tools enable people to recognize vulnerabilities in the target system and functioning systems. You’re able to discover loopholes in the target system with these measures.


It functions as a security adviser and provides patch management, vulnerability appraisal, and community auditing services.


Nessus is a vulnerability scanner tool that seems like a bug in the program and finds a particular method to violate application safety.

  • Data collection
  • Identification of the server
  • Port scan
  • Choice of the plugin
  • Data reporting

5. Draw Network Diagrams

Draw a company network diagram that makes it possible to comprehend the network server’s logical system link route. LAN manager, LANstate, Favorable pinger, community perspective can draw on the network diagram.

6. Prepare Proxies

Train acts as a connection between two media devices. A proxy could shield the LAN from outside access.

We could anonymize web surfing with proxy servers and filter unwanted articles such as advertisements and lots more.

Also See:  error 0x800f081f windows update

To conceal you from becoming captured, proxies such as Proxifier, SSL Proxy, Proxy Finder, etc.

7. Document all results

The final and most crucial step would be to record all of the Penetration test customs.

This document gives you the capacity to recognize possible vulnerabilities inside your system. After the vulnerabilities are decided, you can program counteractions accordingly.

You can download the principles and range of the worksheet here rules and extent sheet. Consequently, Pentest Checklist will help evaluate your system until it gets into actual issues that may result in severe declines in finance and value.

Important Tools used for Network Pen-testing


Kali Linux, Backtrack5 R3, Security Onion


Smartwhois, MxToolbox, CentralOps, dnsstuff, nslookup, DIG, netcraft


Angry IP scanner, Colasoft ping tool, nmap, Maltego, NetResident,LanSurveyor, OpManager

Port Scanning

Nmap, Megaping, Hping3, Netscan tools pro, Advanced port scannerService Fingerprinting Xprobe, nmap, zenmap


Superscan, Netbios enumerator, Snmpcheck, onesixtyone, Jxplorer, Hyena,DumpSec, WinFingerprint, Ps Tools, NsAuditor, Enum4Linux, nslookup, Netscan


Nessus, GFI Languard, Retina,SAINT, Nexpose

Password Cracking

Ncrack, Cain & Abel, LC5, Ophcrack, pwdump7, fgdump, John The Ripper,Rainbow Crack


Wireshark, Ettercap, Capsa Network Analyzer

MiTM Attacks

Cain & Abel, Ettercap


Metasploit, Core Impact

These are the absolute most crucial checklist you ought to center on networking testing.