Database Penetration Test Process/Checklist * [ ] Scan for defaults ports used by the database * [ ] Scan for nondefault ports
Router Penetration Test Process/Checklist * [ ] Identify the router hostname * [ ] Port scan the router * [ ] Identify the router operating
Penetration Test Internal Penetration Test Process/Checklist * [ ] Map the Internal Network * [ ] Scan the Network for Live Hosts * [ ] Port-scan individual
Penetration Test External Penetration Test Process/Checklist Some of these items are only used for Web Application Penetration Testing
Penetration Test Firewall Penetration Test Process/Checklist * [ ] Locate the Firewall * [ ] Conduct a traceroute to identify the network range * [ ] Port
Ubuntu Session Lock After a 15-Minute Period of Inactivity The Ubuntu operating system must initiate a session lock after a 15-minute
System Library Files Must Be Owned By Root The Ubuntu operating system library files must be owned by root. Rationale:
Enforcement of Minimum Password Lifetime The Ubuntu operating system must enforce 24 hours/1 day as the
Linux Enforcement of Password Complexity The Ubuntu operating system must enforce password complexity by requiring that at
Linux User Needs Security Function Must Be Part of Sudo Group The Ubuntu operating system must be configured so that only users who
Linux Prevent Direct Login Into the Root Account The Ubuntu operating system must prevent direct login into the root account.
Linux Lock Out After Three Consecutive Invalid Logon Attempts The Ubuntu operating system must be configured so that three consecutive invalid