Planning test activities means deciding how the penetration test will be conducted. This includes the type of test to perform, evaluating risks, and ensuring the right tools and people are available for the job.
Penetration testing can be performed in different ways depending on how much information the tester has about the target system. Here are the main types of testing:
Black-box Testing:
White-box Testing:
Gray-box Testing:
Before starting the test, assess potential risks to avoid unexpected problems.
Production Environment Risks:
Data Risks:
To run a successful test, you need the right people and tools.
Define Team Size and Required Skillsets:
Identify Hardware and Software Tools Needed:
This step determines what will be tested and what will not be tested. It sets clear boundaries to ensure the test is focused and avoids unnecessary risks.
List all the systems and components that will be included in the test:
Define exactly what areas of the system are in scope and what areas are out of scope:
These ensure the penetration test is conducted legally and meets relevant industry standards.
Before starting any test, obtain proper authorization to avoid legal consequences:
Certain industries require compliance with specific security standards:
Before the test begins, it’s critical to communicate the plan to all stakeholders and get their approval.
Share the test plan with stakeholders to ensure alignment:
Once the plan is shared, follow up to address any concerns:
Planning and scoping lay the foundation for a successful penetration test by:
In penetration testing, possessing the correct ethical mindset is not optional—it's foundational. Testers are given special privileges to simulate malicious behavior, but must operate with integrity, caution, and full respect for legal and ethical boundaries.
A penetration tester should never conduct any activity that is not explicitly authorized by the client.
Even if a system looks vulnerable or interesting, if it's outside the agreed-upon scope, it must be avoided.
Always act with the principle of “do no harm”—use the least intrusive methods first.
For example, use safe scans before attempting high-impact exploits.
If the tester inadvertently gains access to out-of-scope systems or sensitive data (e.g., personal medical records, financial credentials), they must halt further action and notify the client.
The goal is to protect, not expose, the organization.
Do not retain any sensitive data post-engagement.
Follow nondisclosure agreements (NDAs) and respect all legal boundaries.
Ethical behavior is not just a checkbox—it will affect client trust, legal liability, and the success of your career. The PT0-002 exam expects you to demonstrate this mindset when answering scenario-based questions.
Penetration testing, especially against production systems, introduces real risk. Even simple scans can cause unexpected slowdowns or crashes. Therefore, detailed environmental planning is essential.
Low-Traffic Hours: Schedule testing during off-peak periods, such as weekends or midnight maintenance windows.
Why: Reduces risk of business disruption.
Staging/Test Environments: For high-risk tests (e.g., DoS simulation, privilege escalation), clients should ideally provide a mirrored test system.
Why: Protects live data and operations.
What to Do:
Evaluate which tests might have high-impact outcomes.
Plan contingencies: For example, what happens if the firewall crashes during the scan?
Mechanisms: Use impact analysis matrices or simulate certain scans internally before hitting client systems.
Let the client know in advance:
“This action could cause a 2–3 minute service delay.”
“We recommend monitoring CPU/memory/network during this time.”
The Rules of Engagement (RoE) is the legal and procedural backbone of any penetration test. It defines what is allowed, what is not, and who is responsible.
Systems/IP ranges/Applications to be tested.
Goals of the engagement: e.g., test external-facing web apps for OWASP Top 10.
Exact dates and times when testing is allowed.
Whether testing is permitted outside business hours.
Whether social engineering, DoS, or physical testing is allowed.
Whether the tester may use custom scripts or only commercial tools.
What should be done if sensitive data is found?
Where logs, payloads, or evidence will be stored and for how long.
Who to contact in case of emergency (e.g., system outage).
How often progress updates will be delivered (e.g., daily briefings, weekly summaries).
Expected format and delivery date of the final report.
Whether an executive summary is required.
Authorized client representative signature.
Tester/team lead signature.
Date and time of agreement.
Before testing begins, a kick-off meeting should clarify:
Final scope approval.
Any last-minute exclusions or technical limitations.
Point-of-contact confirmations.
| Area Enhanced | Key Additions |
|---|---|
| Ethical Hacking Mindset | Operate legally, minimize harm, report sensitive findings |
| Environmental Considerations | Testing during low-traffic hours, use of test environments, risk planning |
| RoE Document Details | Specific structure: scope, timeline, methods, communication, and signatures |
During a penetration test engagement, a tester identifies a potential vulnerability outside the defined target network range. What is the most appropriate action?
The tester should stop testing the out-of-scope system and report the discovery to the client for clarification before proceeding.
Penetration tests are governed by the rules of engagement and scope defined during planning. Testing systems outside the authorized scope can create legal liability and violate contractual agreements. Even if a vulnerability is discovered accidentally, continuing to probe the system without approval may be considered unauthorized access. The correct approach is to document the finding, notify the client, and request authorization if further testing is necessary. This maintains professional integrity and ensures the engagement remains compliant with legal and contractual requirements.
Demand Score: 64
Exam Relevance Score: 78
A penetration tester is beginning a new engagement. Which document defines testing boundaries, communication channels, and approved testing techniques?
The Rules of Engagement (RoE).
The Rules of Engagement specify how the penetration test will be conducted and establish operational boundaries. This document defines the permitted testing techniques, escalation procedures, contact information, and time windows for testing activities. It also clarifies responsibilities between the testing team and the organization being assessed. Without a clear RoE, testing activities could disrupt business operations or unintentionally violate legal requirements. The RoE ensures both parties understand expectations and helps prevent misunderstandings during active testing phases.
Demand Score: 62
Exam Relevance Score: 82
Why must penetration testers obtain written authorization before conducting testing activities?
Written authorization provides legal permission to perform security testing on the target systems.
Penetration testing often involves activities that mimic real cyberattacks, such as scanning, exploitation attempts, and privilege escalation. Without explicit authorization, these actions may violate computer crime laws. Written authorization protects both the tester and the organization by clearly documenting consent. It also establishes accountability and confirms the scope, duration, and nature of the engagement. In practice, this authorization is typically included in the penetration testing contract or statement of work. Proper authorization ensures the testing process is legitimate and legally defensible.
Demand Score: 58
Exam Relevance Score: 76