Chapter 10: Protecting the Pen Tester
Pen testers must be concerned about the security of their own machines, especially those machines that contain sensitive client information, passwords, reports, and things along those lines. Pen testers are a prime target for adversaries. I know multiple pen testers that have been targeted and compromised by real-world adversaries, and that is not fun.
Hence, be aware of the importance of protecting pen test assets. Depending on what you are working on, the stakes could be high.
This and the following chapters will highlight a few custom and off-the-shelf tools and techniques that you can employ to gain better insights and protection, or at least hopefully steer some discussions to implement improvements. In this chapter, we will look at the importance of locking down and securing pen test assets. We will then improve the documentation by customizing shells to ensure that screenshots and screen recordings contain additional information by...