# Network/System PenTest

## **Available Service**

* Search all opening ports and ensure it is operation required.
* Ensure all endpoints implemented authentication and authorization control
* Identify the opening ports service applied latest version & patches
* Outdated components or known vulnerability (CVE) found in the identified service

## **Certification Setting**

* Disable the use of SSL 3.0, TLS 1.0 and TLS 1.1. Instead, leverage a newer version of TLS such as TLS v1.2 and v1.3.
* Correctness of the certification information and signed party
* SSL Certificate strength, at least > 2048 bits
* Not use the weak ciphers

## **Sensitive Data Exposure**

* Any shared files or services that contain sensitive data&#x20;
* Correctness of the certification information


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://calvin-lai.gitbook.io/calvin-lai-security/penetration-testing/network-system-pentest.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
