Generating pentest reports with Reconmap - CyberScotland Week
On this presentation, part of the CyberScotland Week, we cover basic pentesting concepts and an introduction to the Reconmap collaboration platform for infosec pros.
Involves scanning tools Produces a report False positives Findings are not exploited, some of them could just be false positives. Generating pentest reports with Reconmap
FISMA/NIST Protects staff, customers and business partners Preserves company reputation Helps sustain business continuity Generating pentest reports with Reconmap
Medium £3000-£5000 Large £5000-£20000 Cost Data breaches costed £2.9M to orgs in 2020 1Source bulletproof.co.uk Generating pentest reports with Reconmap
time Orgs take 280 days on average to detect and respond to an incident.1 1https://www.itgovernance.co.uk/blog/the-cost-of-a-data-breach-in-2020 Generating pentest reports with Reconmap
data breach insurance Before and after corporate milestones After noticing viruses, malware, spyware on the system After noticing unusual system patterns, traffic After system change & new system deployments After new system integrations After the release of new products/features Generating pentest reports with Reconmap
the gap-closure, a time frame is determined by both parties for verification tests Findings in the report are reevaluated in the verification tests Generating pentest reports with Reconmap
other simulations Creates reports and offer recommendations Advises management on security improvements Work with other employees to improve organizational cybersecurity Generating pentest reports with Reconmap
Cybrary PentesterAcademy Bug bounty programs To receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities. Generating pentest reports with Reconmap
reporting tool for pentesters Also... Early-stage project Open-source and SaaS Developed in Dundee1 1with contributions from Argentina and the world Generating pentest reports with Reconmap
become more efficient Other technical minded people1 wanting to Learn about security Perform basic security on their projects 1devs, devops, it admins, sys admins, qa, etc... Generating pentest reports with Reconmap
by the user No upload integration Rmap commands Container based Dependencies included Portable to Windows/Macos/Linux Tighter integration with dashboard Generating pentest reports with Reconmap
3. Complete tasks 4. Some tasks require running commands 5. Reconmap (rmap) runs the command, upload results, and analyses them 6. User annotates and triage vulnerabilities 7. Generate and share the report Generating pentest reports with Reconmap
of pentesting The pentesting methodology The role of the pentester 2 Reconmap’s introduction Reconmap’s mission Features Technical overview Typical workflow 3 Reconmap’s interactive demo Present and future 4 Q&A Generating pentest reports with Reconmap