Skip to content

Services, Wiki-Artikel, Blog-Beiträge und Glossar-Einträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen

Penetration test methodology: PTES, OWASP, OSSTMM, BSI guidelines and TIBER-EU

Comparison of leading penetration testing methodologies: PTES, OWASP Testing Guide, OSSTMM, BSI Guidelines (BSI-CS 115), and TIBER-EU for the financial sector. Including phase models, scope templates, test types, reporting standards, and penetration testing certifications for German companies.

Table of Contents (9 sections)

A penetration test without a methodology is not a penetration test—it is simply a scan performed by a human. Professional penetration tests follow structured methodologies with defined phases, clear scope boundaries, and reproducible results. The choice of method depends on the objective: compliance pentests, adversarial red team exercises, or application-specific web testing require different approaches. This guide explains the leading methodologies and shows which one is suitable for which type of test.

Overview: The Five Main Methodologies

PTES (Penetration Testing Execution Standard):
  → Complete lifecycle methodology (pre-engagement through reporting)
  → Coverage: Network, Web, Social Engineering, Physical
  → Strength: Practice-oriented, developed by penetration testers
  → URL: pentest-standard.org

OWASP Testing Guide (OTG):
  → Focus: Web applications (and APIs)
  → Very detailed: 91+ test cases in 11+ categories
  → Current version: OTG v4.2 (2020), continuously updated
  → URL: owasp.org/www-project-web-security-testing-guide

OSSTMM (Open Source Security Testing Methodology Manual):
  → Focus: All channels (network, human, physical, telecommunications)
  → Scientific approach, measurable security (RAVs)
  → Version: OSSTMM 3 (Institute for Security and Open Methodologies)
  → Strengths: Comprehensiveness, measurability

BSI Penetration Testing Guide:
  → German BSI document (BSI-CS 115 / BSI Study Implementation Concept)
  → Good guide for German clients and KRITIS operators
  → Defines: Test categories, classes, procedures, contractual aspects
  → URL: bsi.bund.de → Publications → BSI-CS 115

TIBER-EU (Threat Intelligence-Based Ethical Red Teaming):
  → ECB framework for systemically important financial institutions
  → Advanced Red Team Assessment with real APT simulation
  → Mandatory for large EU banks, coordinated by national central banks

PTES - The 7 Phases

PTES is the most frequently referenced methodology for general penetration testing:

Phase 1: Pre-Engagement Interactions
  → Scope definition: What is being tested?
  → Testing period: When? How long?
  → Letter of Authorization (Rules of Engagement)
  → Agree on emergency contacts
  → Communication channels (encrypted? Signal, PGP?)
  → Define test objectives (business objectives, not just technical objectives)
  → Escalation rule: immediate reporting for CVSSv3 9.0+, no exploitation

  Scope Template:
  □ Target IP Ranges: 10.0.0.0/8 (INCL.) / 10.99.0.0/24 (EXCL.)
  □ Domains: *.example.com (INCL.) / mail.example.com (EXCL.)
  □ Testing hours: weekdays 08:00–18:00 / 24/7 / only outside business hours
  □ Permitted techniques: Social engineering / Phishing YES/NO
  □ Physical access: YES/NO
  □ Denial of Service: NO (unless explicitly agreed)
  □ Data handling: captured data used only for verification, immediate deletion after testing

Phase 2: Intelligence Gathering (Reconnaissance)
  Passive OSINT (without direct contact):
  → DNS enumeration (dnsx, subfinder, amass)
  → WHOIS, Certificate Transparency
  → Google Dorking, Shodan, Censys
  → LinkedIn, OSINT Framework, HUMINT
  → Job Postings: Which technologies are used?
  → theHarvester, Maltego

  Active Reconnaissance (direct interaction):
  → Port Scanning (nmap)
  → Service Versions and Banner Grabbing
  → WAF Fingerprinting

Phase 3: Threat Modeling
  → Analyze the attack surface
  → What are the most valuable assets?
  → Which attack vectors are promising?
  → Create a threat model (STRIDE or ad hoc)
  → Prioritization: where is the risk greatest? What would a real attacker do first?

Phase 4: Vulnerability Analysis / Research
  → Identify vulnerabilities (automated + manual)
  → Vulnerability scanning: Nessus, OpenVAS, Nuclei
  → Manual verification (no false-positive noise!)
  → CVE research for identified versions
  → Check for configuration weaknesses
  → Manual testing for logic errors and business logic

Phase 5: Exploitation
  → Exploit vulnerabilities (within scope, with permission!)
  → Goal: Demonstrate exploitability (not just "exists")
  → Proof of Concept: How far can access be escalated?
  → Pivoting and lateral movement within the permitted scope
  → Data exfiltration as proof (using test data, not real data!)
  → Demonstrate persistence (without leaving a real backdoor!)
  → Tools: Metasploit, custom exploits, Burp Repeater

Phase 6: Post-Exploitation
  → After a successful exploit: What can the attacker do?
  → Privilege escalation to the maximum escalation level
  → Proof of domain compromise (e.g., secretsdump)
  → Lateral movement: further penetration into the network
  → Evidence collection: screenshots, logs, hashes
  → Assess the business impact of the access
  → Persistence test: how long would the attacker remain undetected?
  → Data extraction (simulated, no real data!)

Phase 7: Reporting
  → Executive Summary (for management, business impact—non-technical)
  → Technical Report (for IT, with reproduction instructions)
  → Finding Cards: Vulnerability + CVSS + PoC + Recommendation
  → Risk Ratings: CVSS + Business Context
  → Remediation Guide: concrete and prioritized
  → Attestation: formal confirmation of test status
  → Retest Recommendation

OWASP Testing Guide - For Web Applications

OWASP Testing Guide v4 - Web Application Focus:
https://owasp.org/www-project-web-security-testing-guide/

Specific to web applications, very detailed (91+ test cases):

OTG-INFO: Information Gathering (10 tests)
  → INFO-001/01: Fingerprint Web Server
  → INFO-002/02: Fingerprint Application Framework
  → INFO-005: Review Web Content for Information Leakage
  → INFO-007/07: Map Application Architecture
  → INFO-009/09: Fingerprint Web Application Framework

OTG-CONFIG/CONF: Configuration and Deployment Management (12 tests)
  → CONFIG-001/01: Test Network Infrastructure Configuration
  → CONFIG-002/02: Test Application Platform Configuration
  → CONFIG-006/06: Test HTTP Methods
  → CONFIG-007/07: Test HTTP Strict Transport Security
  → CONF-08: Test File Extensions Handling

OTG-IDENT: Identity Management (5 Tests)
  → Tests: Account Enumeration, Username Policy, etc.

OTG-AUTHN/AUTH: Authentication Testing (10 Tests)
  → AUTH-001/01: Testing for Credentials Transported over Encrypted Channel
  → AUTH-002/02: Testing for Default Credentials
  → AUTH-004/04: Testing for Bypassing Authentication Schema
  → AUTH-006/06: Testing for Browser Cache Weakness (JWT in LocalStorage!)
  → AUTH-007: Testing for Weak Password Policy
  → AUTH-010: Testing Multi-Factor Authentication

OTG-AUTHZ: Authorization Testing (5 Tests)
  → AUTHZ-001: Testing Directory Traversal (Path Traversal)
  → AUTHZ-002: Testing for Bypassing Authorization Schema
  → AUTHZ-004: Testing for Insecure Direct Object References (IDOR)

OTG-SESS: Session Management Testing (8 Tests)
  → SESS-001/01: Testing for Bypassing Session Management Schema
  → SESS-002/02: Testing for Cookie Attributes
  → SESS-005/05: Testing for CSRF
  → SESS-006/06: Testing for Logout Functionality
  → SESS-009: Testing for Session Token Entropy

OTG-INPVAL/INPV: Input Validation Testing (19 Tests)
  → INPVAL-001/INPV-01: Testing for Reflected XSS
  → INPVAL-002/INPV-02: Testing for Stored XSS
  → INPVAL-005/INPV-05: Testing for SQL Injection
  → INPVAL-007/INPV-07: Testing for XML Injection
  → INPVAL-018: Testing for Server-Side Request Forgery (SSRF)
  → INPV-10: Testing for IMAP/SMTP Injection
  → INPV-11: Testing for Code Injection
  → INPV-17: Testing for HTTP Splitting/Smuggling

OTG-ERR: Error Handling (2 Tests)
OTG-CRYPST: Weak Cryptography (4 Tests)
OTG-BUSLOGIC: Business Logic Testing (9 Tests)
OTG-CLIENT: Client-Side Testing (11 tests)

OTG-APIT: API Testing (new in v4)
  → APIT-01: Testing GraphQL
  → APIT-02: Testing REST APIs
  → JWT Validation, IDOR in APIs, Rate Limiting

OWASP Methodology per Test Case:
  Summary:    What is being tested + why?
  Test Goals: Specific goal of this test
  How to Test: Step-by-step instructions
  Test Tools: Which tools are helpful?
  Remediation: How to fix it?
  References:  CVEs, sources

WSTG Tools:
  OWASP ZAP:   Automated + Manual Testing
  Burp Suite:  De facto standard for manual web testing
  sqlmap:      SQL injection automation
  ffuf:        Fuzzing, directory enumeration
  nikto:       Web server scanner
  JWT_Tool:    JWT testing
  Postman:     API testing

BSI Penetration Testing Guide - German Perspective

BSI IT-Grundschutz + Penetration Testing Guide:
BSI Study: Implementation Concept for Penetration Tests (BSI-CS 115)

Penetration Test Classes According to BSI (Level of Information):

  Class A: Testing based on publicly available information
    → Black-box approach: OSINT information (website, DNS, Shodan)
    → Known vulnerabilities in published components
    → Lowest effort, suitable for initial external assessment

  Class B: Testing after familiarization (Basic knowledge)
    → System documentation is provided
    → General system architecture known (Grey-Box)
    → Standard penetration test for regular security reviews

  Class C: Detailed testing after intensive familiarization
    → Complete documentation, source code, configuration
    → Most comprehensive testing (White-Box)
    → Highest effort and test depth, for KRITIS and the financial sector

  Aggressiveness:
    Cautious:  No interruption of operations
    Medium:      Acceptable risk of operational interruption
    Aggressive:   Maximum exploitation (only with preparation and maintenance windows!)

---

Test categories according to BSI:

  Category A: Security Layer
    → Firewall, IDS/IPS, VPN concentrators
    → Security of infrastructure boundaries

  Category B: System Level
    → Operating system hardening
    → Patch status, configuration

  Category C: Application Level
    → Web apps, APIs
    → OWASP Top 10

  Category D: Network Level
    → Segmentation, switch/router configuration

  Category E: Social Engineering
    → Phishing, vishing (if within scope)

---

BSI-specific requirements:
  □ Written authorization for ALL testing activities
  □ Penetration test report according to BSI reporting standard
  □ Assessment according to BSI threat catalog
  □ Recommendations based on IT-Grundschutz modules
  □ For KRITIS operators: BSI coordination may be required

TIBER-EU - Red Teaming for the Financial Sector

TIBER-EU Framework:
(Threat Intelligence-Based Ethical Red Teaming)
Developed by the European Central Bank (ECB)

Target group: Systemically important financial institutions
  → Banks, insurance companies, payment service providers
  → Regulatory requirement in the EU/EEA (banking supervision)
  → Mandatory for large EU banks

TIBER-EU Specifics:
  → Simulate real threat actors (nation-states, APTs)
  → Threat intelligence MUST be purchased (from a certified TI provider)
  → Very long timeframe: 3–6+ months
  → Full complexity: social engineering, physical access, technical
  → Only senior management (board level) is aware of the test—no advance information for IT/SOC
  → Regulatory authority is actively involved

TIBER-EU Phases:

  Phase 1 (Preparation):
  → Generic Threat Landscape Report (prepared by the TI provider)
  → Targeted Threat Intelligence Report (institution-specific)
  → Red Team is briefed specifically on the institution

  Phase 2 (Testing):
  → Reconnaissance (no restrictions except legal)
  → Initial Access: Phishing, Physical, Technical
  → Post-Exploitation: up to defined Critical Functions
  → Persistence, Lateral Movement, Privilege Escalation

  Phase 3 (Closure):
  → Replay: Red Team explains attack paths to Blue Team
  → Remediation: what needs to be fixed immediately?
  → TIBER Report: Formal document for the regulatory authority

TIBER-DE (Germany Configuration):
  → Coordination: Deutsche Bundesbank
  → Recognized providers must be certified
  → Reporting: to BaFin and the Bundesbank

TIBER vs. Standard Penetration Test:
  Penetration Test:   3–10 days, known systems, written authorization
  TIBER:     3–6 months, no advance warning to IT, real APT simulation
  → Significantly higher effort and costs (typically €100,000+)
  → But: most realistic assessment of the actual security situation

Certification:
  TIBER-EU: Recognized certificate in the EU
  CREST:    Regulatory requirement in the UK (PCI DSS, FCA), highly regarded in Europe

Scope Definition - What Must Be Included in the Contract

Essential Contract Components:

1. Systems to be tested (scope):
   → Explicit: IP ranges, domains, applications
   → In-scope:  192.168.1.0/24, app.company.com, api.company.com
   → Out-of-scope: 192.168.2.0/24, infrastructure-partner.com
   → For Cloud/SaaS: Provider approval required (AWS, Azure, GCP have their own policies!)

2. Permitted testing methods:
   → Black Box / Grey Box / White Box?
   → Social engineering: yes/no?
   → Physical access: yes/no?
   → Denial of Service: NO (unless explicitly agreed upon)

3. Time frame:
   → Business hours? Weekends?
   → Production systems: only during maintenance windows?
   → Maximum test intensity (rate limiting?)

4. Emergency contacts:
   → IT manager: Name, cell phone (not just email!)
   → Management: for escalation
   → Pentester → Client: encrypted (Signal, PGP)

5. Data protection:
   → What data may the pentester document?
   → Retention periods for test data
   → NDA/Confidentiality agreement
   → Right to erasure upon completion

6. Disclaimer:
   → The penetration tester is not liable for outages if the test is conducted correctly
   → Client confirms legality (ownership or authorization)

7. Deliverables:
   → Executive Summary (1–2 pages)
   → Technical Report (with findings, CVSS, PoC, recommendations)
   → Retest (included or subject to a fee?)
   → Delivery: within 10 business days after the test ends

Test Types and When to Use Them

Black Box Test:
  → No prior information (like a real external attacker)
  → Scope: often only domain names or IP ranges
  → Advantage: realistic simulation
  → Disadvantage: significant time required for reconnaissance, less depth
  → BSI Equivalent: Class A

Grey Box Test (recommended):
  → Partial information (e.g., standard user account, API documentation)
  → Simulates: compromised employee, insider attacker
  → Advantage: efficient, greater depth than Black Box
  → Best balance for most companies
  → BSI equivalent: Class B

White Box Test:
  → Full information: source code, architecture, admin access
  → Simulates: insider attacker with maximum knowledge
  → Advantage: highest test coverage
  → Disadvantage: less "realistic," but maximum security
  → BSI equivalent: Class C

External Test:
  → From the outside (without network access): Web, APIs, remote access
  → Simulates: Internet-based attacker
  → Most common test type

Internal Test:
  → With network access (physical or VPN)
  → Simulates: Insider, compromised device
  → Tests: Active Directory, network segmentation, lateral movement

Targeted / Assumed Breach:
  → Start: Attacker has already gained a foothold (compromised user)
  → Tests: What can the attacker achieve from here?
  → Focus: Lateral movement, privilege escalation

Penetration Testing Documentation and Reporting

Professional Penetration Testing Report (PTES-compliant):

1. Executive Summary (1–3 pages):
   → Scope and testing period
   → Overall result: e.g., "critical vulnerabilities found"
   → Top 3 risks (described in non-technical terms)
   → Recommendation: immediate actions

2. Methodology:
   → Which framework? (PTES, OWASP, BSI)
   → Test type: Black box/Grey box/White box
   → Scope limits: what was NOT tested

3. Findings (per vulnerability):
   □ Title: clear, descriptive name
   □ CVSSv3.1 Score: Base Score + Vector
   □ Business Risk: What happens if exploited?
   □ Technical Description: What is the problem?
   □ Proof of Concept: How was it demonstrated?
   □ Screenshots/Logs as evidence
   □ Affected Systems: Which URLs/IPs are affected?
   □ Remediation: Specific steps for remediation
   □ References: CVEs, OWASP, CWE

4. Remediation Summary:
   → Prioritized list: Critical → High → Medium → Low → Info
   → Dependencies: What needs to be fixed first?

5. Conclusion:
   → Overall security level assessment
   → Comparison to industry average (if possible)
   → Recommendation for next steps (e.g., retest after remediation)

---

Risk-Rating Framework:

  CVSS v3.1 Base Score:   objective technical score
  Environmental Score:    adjusted for the specific environment
  Temporal Score:         are known exploits available?
  Business Impact:        subjective + context-dependent

  Combination for the report:
  Critical:       CVSS 9.0–10.0 + high business impact
  High:           CVSS 7.0–8.9 or CVSS < 7.0 + critical context
  Medium:         CVSS 4.0–6.9 + medium impact
  Low:         CVSS 0.1–3.9 + low impact
  Informational:  no direct risk, but best practice

---

Retesting / Remediation Verification:

  After remediation by the client:
  □ Retest of reported vulnerabilities
  □ Confirmation: Is the patch correct and complete?
  □ No regression: Are other functions still intact?
  □ Attestation Letter: Formal confirmation of remediation

Penetration Testing Certifications - What the Most Important Ones Mean

OSCP (Offensive Security Certified Professional):
  → Practical exam: 24-hour lab + 24-hour report
  → Globally recognized industry standard
  → Demonstrates: ability to compromise real systems

OSCE3 (= OSCP + OSEP + OSED):
  → Three exams: Exploitation, Evasion, Development
  → Highest Offensive Security certification
  → Rare → particularly valuable

PNPT (Practical Network Penetration Tester):
  → TCM Security: Junior-friendly, practical
  → Focus: Active Directory, reporting
  → Good for: Beginners

CEH (Certified Ethical Hacker):
  → EC-Council: Multiple-choice exam
  → Lots of theory, little practice
  → Well-known in compliance circles, less so among practitioners

CREST (UK/EU):
  → Regulatory requirement in the UK (PCI DSS, FCA)
  → Highly regarded in Europe

TIBER-EU:
  → ECB framework for financial institutions
  → Advanced Red Team Assessment
  → Mandatory for large EU banks

Questions about this topic?

Our experts advise you free of charge and without obligation.

Free Consultation

About the Author

Vincent Heinen
Vincent Heinen

Abteilungsleiter Offensive Services

E-Mail

M.Sc. IT-Sicherheit mit über 5 Jahren Erfahrung in offensiver Sicherheitsanalyse. Leitet die Durchführung von Penetrationstests mit Spezialisierung auf Web-Applikationen, Netzwerk-Infrastruktur, Reverse Engineering und Hardware-Sicherheit. Verantwortlich für mehrere Responsible Disclosures.

OSCP+ OSCP OSWP OSWA
This article was last edited on 08.03.2026. Responsible: Vincent Heinen, Abteilungsleiter Offensive Services at AWARE7 GmbH. License: CC BY 4.0 - free use with attribution: "AWARE7 GmbH, https://a7.de"

Cookielose Analyse via Matomo (selbst gehostet, kein Tracking-Cookie). Datenschutzerklärung