// CRITICAL — READ BEFORE YOU TEST ANYTHINGNever test any system without explicit written authorization. Unauthorized testing is illegal under CFAA (USA), Computer Misuse Act (UK), IT Act 2000 (India), and equivalent laws globally. A signed document is your legal shield.
What to Clarify Before Day 1 — Complete Checklist
| Question to Ask Client | Why It's Critical |
| What domains, IPs, subdomains are in scope? | Testing out-of-scope = illegal. Get a written list with exact hostnames. |
| Is production or staging being tested? | Production crashes = real business impact + your liability |
| Are automated scanners (Nikto, Nuclei) allowed? | Scanners can trigger IDS/WAF alerts and cause partial outages |
| Is social engineering in scope? | Phishing employees needs separate explicit authorization |
| Are denial-of-service tests allowed? | Race conditions and resource exhaustion can crash production services |
| Are third-party services in scope? | Stripe, Cloudflare, AWS — usually NOT in scope — test = ToS violation |
| What are emergency contact details? | If you accidentally cause an outage — who do you call immediately? |
| What is the reporting format and deadline? | Corporate clients expect CVSS-scored findings in DOCX/PDF within agreed SLA |
| What test accounts will be provided? | You need accounts at different privilege levels — don't use real users |
Key Documents You Need (Never Start Without These)
- Statement of Work (SoW) — Defines deliverables, timeline, and cost. This is your main contract. Both parties sign.
- Rules of Engagement (RoE) — Technical boundaries: exact scope, allowed/disallowed techniques, testing time windows (e.g., "no scanning 9am–5pm"), specific exclusions.
- Non-Disclosure Agreement (NDA) — Protects confidential information you encounter during testing. Standard for all corporate work.
- Permission to Test (PtT) Letter — One-page letter signed by client's CISO or CTO. Carry a physical copy if doing on-site testing. This is what you show if anyone questions you.
Typical Corporate Engagement Timeline (7–10 Days)
| Day | Activity |
| Day 0 | Kickoff call — confirm scope, exchange emergency contacts, receive test accounts and RoE |
| Day 1–2 | Passive recon, active recon, surface mapping, technology fingerprinting |
| Day 3–5 | Vulnerability testing — auth, injection, access control, API, business logic |
| Day 6 | Exploitation of confirmed findings — PoC development, impact demonstration |
| Day 7 | Report writing — executive summary, detailed findings, remediation roadmap |
| Day 8 | Report delivery + debrief call with dev and security teams |
| Day 8+30 | Optional retest — verify critical findings were remediated correctly |
// PRO TIP — CYBER INSURANCEBefore doing professional pentesting commercially, ensure you have Professional Indemnity / Cyber Liability insurance. Even the best testers make mistakes that can cause unexpected outages. Insurance protects you if that happens.
What "Black Box", "Grey Box" and "White Box" Mean
| Test Type | Access Given | Best For |
| Black Box | No credentials, no source code — just the URL. Simulates a real external attacker. | External attacker simulation, bug bounty practice |
| Grey Box | Standard user credentials + some documentation. Most common in corporate pentests. | Realistic insider/authenticated attacker scenario |
| White Box | Full source code access, admin credentials, architecture docs, DB schemas. | Most thorough — finds deepest logic flaws |