Infrastructure Scoping
Infrastructure
Details
What are the objectives of the assessment?
Who will act as a secondary contact?
Are there any constraints?
Is the test going to be executed from unauthenticated blackbox or authenticated perspective whitebox?
Is active exploitation of vulnerabilities permitted?
What are the IP addresses and host names of the systems in scope?
What are the operating system/s?
Are there any sensitive systems that require a different a less aggressive approach?
Standard user credentials and admin/root level credentials are needed
Are the systems reachable from Vodafone UK Corporate network? If not can the project set up a jumphost or kali within the network?
Any HLD? (High Level Design)
Last updated