PTES
an operator-first view of the Penetration Testing Execution Standard
The Penetration Testing Execution Standard (PTES) defines a complete penetration test from pre-engagement through reporting across seven sections. Run PTES-aligned engagements with pre-engagement records, intelligence gathering tracking, threat modelling notes, exploitation evidence, and final reporting from one platform.
No credit card required. Free plan available forever.
PTES: a complete view of a penetration test, not a checklist
The Penetration Testing Execution Standard (PTES) was published by a group of practitioners to give the industry a shared definition of what a penetration test actually is. It covers seven sections, from pre-engagement interactions through reporting, and an accompanying Technical Guidelines document that goes deeper into tooling and technique. PTES is widely cited in commercial penetration test scopes, in service provider methodology statements, and in client-side requests for proposals because it is engagement-shaped: it describes how to run a test, not which test cases to run.
PTES sits comfortably alongside more specific catalogues. The OWASP Top 10 and OWASP Testing Guide cover the web application phase in depth. The MITRE ATT&CK framework is the language to tag what attackers do during the engagement. Compliance frameworks like PCI DSS and ISO 27001 require penetration testing as a control, and PTES is the standard most testers reach for to execute that requirement consistently.
The seven sections at a glance
PTES is unusual in giving pre-engagement, threat modelling, and reporting the same weight as exploitation. That weighting reflects what actually determines whether an engagement is useful: a clean exploitation chain on the wrong target produces a report nobody acts on. The summary below is a working operator's read, not a substitute for the official standard.
Section 1: Pre-engagement interactions
Scope, objectives, time and budget, third-party authorisation, communication plan, escalation paths, status meeting cadence, and the rules of engagement. PTES treats pre-engagement as the determining factor for whether the engagement succeeds, which mirrors operational reality.
Section 2: Intelligence gathering
Passive, semi-passive, and active reconnaissance grouped into Level 1 (compliance-driven snapshot), Level 2 (defined effort, broader corpus), and Level 3 (in-depth, multi-source, including human elements). The level chosen is contractually meaningful, not a stylistic choice.
Section 3: Threat modelling
Business asset analysis, business process analysis, threat agent and community analysis, and threat capability analysis. PTES requires a structured model before exploitation so the report can describe risk in the language the business uses, not a list of CVEs.
Section 4: Vulnerability analysis
Active and passive vulnerability identification, validation, and rating across hosts, applications, networks, and configurations. PTES separates discovery from exploitation so each finding is validated and weighted before any exploit is attempted.
Section 5: Exploitation
Translate validated findings into demonstrated risk. PTES requires precision targeting, countermeasure analysis (AV, DLP, IDS, IPS, HIPS), and adherence to the rules of engagement, with custom exploit development reserved for cases the agreed scope explicitly allows.
Section 6: Post-exploitation
Infrastructure analysis, pillaging of high-value data, business impact analysis, persistence (where authorised), and clean-up. The objective is to evidence what an attacker could actually achieve given the foothold, not to expand the toolkit.
Section 7: Reporting
Executive summary (background, posture review, business risk, recommendation summary, strategic roadmap) and technical report (intelligence, vulnerability analysis, exploitation, post-exploitation, risk per finding, remediation guidance). The report is the deliverable, not an afterthought.
Pre-engagement (Section 1): the part that decides the rest
PTES dedicates an unusually large amount of guidance to pre-engagement interactions because ambiguity here propagates through every later phase. The checklist below is drawn from the standard and refined by the patterns that turn up across real engagements. The matching penetration testing scope of work template gives a drop-in clause set covering most of these in writing, and the free rules of engagement template provides the operational ROE document that PTES Section 1 expects to be signed before any reconnaissance starts.
- Engagement objective stated in business language, not just technical scope (for example, validate cardholder data segmentation, not test the network)
- In-scope assets, IP ranges, applications, domains, accounts, and physical locations enumerated and signed off by an authorised business owner
- Out-of-scope items called out explicitly, including any third-party services that require separate authorisation
- Rules of engagement covering testing windows, allowed techniques, social engineering posture, denial-of-service posture, exploitation depth, and data handling
- Communication plan: primary and secondary technical contacts, escalation paths, and an explicit rule for what happens when something is broken
- Engagement objectives mapped to evidence types so the report can demonstrate the agreed objectives rather than a generic vulnerability list
- Status meeting cadence and reporting milestones agreed in writing before kickoff
- Third-party authorisation captured for any cloud provider, MSP, or hosting partner where their acceptable use policies require it
- Legal documents executed: master agreement, statement of work, non-disclosure, and authorisation letter
Intelligence gathering (Section 2): pick the level on purpose
PTES separates intelligence gathering into three levels of effort. The level chosen is a contractual decision. A Level 1 engagement that is later reported as Level 3 is a scope breach; a Level 3 engagement reported as Level 1 is a value gap. Decide the level during Section 1, and reflect the choice in the rules of engagement.
Level 1: compliance-driven baseline
A defined effort drawing on automated tools and a small set of public sources. Suited to engagements where the buyer wants the box ticked and the budget is tight. PTES is explicit that Level 1 is a snapshot, not a thorough investigation.
Level 2: defined effort, broader corpus
Combines automated and manual research across a wider source set including search engines, certificate transparency, code repositories, archived content, and social media. Most commercial penetration tests sit at Level 2 by default.
Level 3: in-depth, multi-source, human-aware
Adds detailed human intelligence, partner and supplier mapping, and active social engineering preparation. Reserved for red team operations and engagements where the buyer wants to test detection and response, not just controls.
For external recon work, the attack surface management feature produces the asset, subdomain, and exposed service inventory that Section 2 expects. The external scanning capability adds CVE correlation, weak TLS detection, and outdated software identification, all retained per scan window for evidence purposes.
Threat modelling (Section 3): keep it short, keep it written
PTES asks for four small models, not one large one: business asset analysis, business process analysis, threat agent and community analysis, and threat capability analysis. The threat model is the bridge between Section 1 (what we agreed to test) and Section 4 (what we actually test). When the threat model is missing, vulnerability analysis tends to drift toward whatever the scanner finds, and the report ends up describing tools rather than risk.
For deeper background on threat modelling techniques and how they integrate with engagement planning, see the threat modelling guide. For organisations layering threat-led testing requirements on top of PTES (financial entities under DORA TLPT, for example), the threat agent analysis becomes more elaborate and is informed by threat intelligence rather than internal interviews alone.
Vulnerability analysis and exploitation (Sections 4 and 5)
PTES is deliberate about separating vulnerability analysis from exploitation. Section 4 identifies, validates, and rates findings; Section 5 turns the validated findings into demonstrated risk. That separation is what allows the report to distinguish between issues that exist (vulnerability) and issues that an attacker can act on under the agreed constraints (exploited). The standard also covers countermeasure analysis (AV, DLP, IDS, IPS, HIPS) so exploitation evidence acknowledges the defensive context rather than presenting a clean lab result.
The findings management feature carries CVSS 3.1 scoring, 300+ templates, and Nessus or Burp Suite imports so Section 4 output flows in without manual re-entry. Authenticated workflows live in the authenticated scanning capability which covers configuration and patch evidence behind login. For exploitation chains, every validated finding can be linked to the engagement, the threat model entry it evidences, and the post-exploitation result it enables.
Post-exploitation (Section 6): evidence the business impact
Post-exploitation is where PTES becomes operationally distinct from a vulnerability scan. The section covers infrastructure analysis, pillaging, business impact analysis, persistence (where authorised), and clean-up. The objective is to evidence what an attacker could actually achieve once a foothold exists, not to demonstrate every technique a tester knows. Tying post-exploitation evidence back to the assets identified in Section 3 keeps the narrative focused on business impact, which is what executive readers respond to.
Reporting (Section 7): the deliverable, not an afterthought
PTES treats reporting as a structured deliverable, not a wrap-up. The executive section is for an audience that will not read the technical body; the technical section is for the engineers and architects who will fix the findings. Both have to exist, and both have to tie back to the engagement objectives agreed in Section 1.
- Background and engagement scope, restating what was authorised and what was deliberately excluded
- Posture review summarising current strengths and weaknesses, written for an audience who will not read the technical body
- Business risk language tied back to the threat model, not the CVSS score
- Recommendation summary: the three to five strategic actions that change the posture, ordered by impact
- Strategic roadmap covering tactical and strategic remediation with effort and dependency notes
- Intelligence gathered, vulnerability analysis, and exploitation chains in the technical body, with reproduction steps and per-finding risk
- Post-exploitation evidence covering business process and data access, mapped back to the assets identified in Section 3
- Appendices for raw scanner output, screenshots, and supporting artefacts retained alongside the engagement record
For a deeper write-up on report structure including how to balance executive and technical sections, see how to write a pentest report and the matching penetration testing report template. The AI report generation feature composes the Section 7 deliverable from the underlying engagement, intelligence, findings, and exploitation evidence rather than from a blank page.
PTES Technical Guidelines: the operational companion
PTES publishes a Technical Guidelines document alongside the standard. It is more prescriptive than the main standard, includes example tooling per phase, and maps common engagement scenarios onto the seven sections. The guidelines age (tools change), but the scaffolding does not.
- PTES has a companion Technical Guidelines document with concrete tooling and command examples per phase. Treat it as a starter playbook rather than a checklist: tooling changes, but the structure of the phase persists.
- The Technical Guidelines map the most common engagement scenarios (external network, internal network, web application, wireless, social engineering, physical) onto the seven sections so a tester can run any of them inside the same scaffolding.
- For web application engagements, the Technical Guidelines defer to the OWASP Testing Guide for in-depth test cases while keeping the PTES scope, threat model, exploitation, and reporting wrapping intact.
- For network engagements, the Technical Guidelines cover host enumeration, service identification, vulnerability validation, and pivoting in enough detail to keep two testers on the same engagement consistent without prescribing the toolset.
How PTES compares to OWASP, NIST 800-115, OSSTMM, and ATT&CK
PTES is rarely used in isolation. The strongest pentest programmes layer it with at least one technical reference and one threat-informed catalogue. The contrast below is a working view, not a buyer's comparison: the practitioner question is which standard to combine with PTES, not which to pick instead of it. For UK and European buyers commissioning a penetration test, PTES typically sits inside a CREST aligned engagement as the methodology the CREST member firm follows under the CHECK, OVS, or STAR scheme.
PTES vs OWASP Testing Guide
OWASP focuses on web application testing and is prescriptive about test cases by category. PTES is engagement-shaped and covers the full lifecycle from scoping through reporting. They compose well: use PTES as the engagement scaffold and the OWASP Testing Guide as the technical reference for the web application phase.
PTES vs NIST SP 800-115
NIST SP 800-115 is a US government technical guide to security testing and assessment. It overlaps with PTES on the technical phases but is lighter on pre-engagement and reporting. NIST 800-115 is often required by reference in compliance contexts; PTES tends to be the operational standard testers follow internally.
PTES vs OSSTMM
OSSTMM (Open Source Security Testing Methodology Manual) is metrics-driven and centred on measurable security through the RAV (Risk Assessment Values) calculation. PTES is more workflow-shaped and easier to teach to new testers. OSSTMM is useful where the buyer wants reproducible numbers across engagements; the OSSTMM framework page covers the channels, modules, RAV inputs, and STAR delivery in depth.
PTES vs MITRE ATT&CK
ATT&CK is a knowledge base of adversary tactics and techniques, not a methodology. PTES describes how to run an engagement; ATT&CK describes what attackers do during one. The strongest pentest programmes use PTES to structure the engagement and tag findings with the ATT&CK techniques they evidence.
Where SecPortal fits in a PTES-aligned engagement
SecPortal is the operating layer for a PTES-aligned engagement. The platform handles scope, intelligence, threat model notes, vulnerability analysis, exploitation evidence, and the Section 7 deliverable so the engagement runs as a single workflow rather than a long email thread with attachments. For consultancies running PTES engagements on behalf of multiple clients, the security consultants workspace bundles that with branded client portals and findings deduplication across engagements.
- Engagement management captures pre-engagement scope, objectives, rules of engagement, and authorisation as a structured record on the engagement, so Section 1 of PTES becomes a single source of truth rather than a contract attachment
- Findings management with CVSS 3.1 scoring, 300+ templates, and Nessus or Burp Suite imports turns Section 4 vulnerability analysis into evidence-backed records with severity, asset scope, and owner
- Attack surface management covers Section 2 intelligence gathering: subdomain enumeration, fingerprinting, exposed services, and cloud exposure are tracked with the engagement so the recon record survives the engagement
- External and authenticated scanning produce the raw data Section 4 depends on; output is retained per scan window and linked to the finding it supports
- AI-generated reports compose the Section 7 deliverable from the underlying engagement, intelligence, threat model, findings, and exploitation evidence, producing executive summary, technical body, and remediation roadmap rather than a thin export
- Compliance tracking lets a single engagement satisfy PTES alongside framework mappings to ISO 27001, SOC 2, NIST SP 800-53, and PCI DSS without rebuilding the bundle
Looking for the engagement workflow itself, end-to-end? The penetration testing use case captures how SecPortal turns a PTES-shaped engagement into a structured record covering scope, methodology, findings, retests, and the deliverable.
Need to position PTES alongside a broader methodology comparison? The penetration testing methodology guide covers PTES, OWASP, OSSTMM, and NIST SP 800-115 side by side, including where each one is the strongest fit and how they tend to be layered in practice.
Key control areas
SecPortal helps you track and manage compliance across these domains.
Section 1: Pre-engagement interactions
Capture scope, objectives, time and budget, communication channels, escalation paths, status meeting cadence, third-party authorisation, and the rules of engagement before a single packet is sent. PTES is unusually thorough here: most failed engagements are pre-engagement failures, not technical failures, and the standard reflects that.
Section 2: Intelligence gathering (OSINT and active recon)
Gather passive intelligence (search engines, social media, certificate transparency, leaked credentials), semi-passive intelligence (DNS, WHOIS, archived content), and active intelligence (port scanning, banner grabbing, service fingerprinting). The standard separates Level 1, Level 2, and Level 3 intelligence by depth so the engagement matches the agreed scope rather than drifting into unauthorised territory.
Section 3: Threat modelling
Treat threat modelling as a structured activity, not a footnote. PTES expects business asset analysis, business process analysis, threat agent analysis, and threat capability analysis before the test moves into vulnerability discovery. Document who would attack the in-scope systems, what they want, and how they would approach the target. The threat model drives test selection in Section 4 and gives the report something for executives to anchor on.
Section 4: Vulnerability analysis
Combine automated vulnerability scanning, manual configuration review, and source code review where in scope. PTES is explicit that vulnerability analysis is a discrete activity: identify, validate, and rate vulnerabilities before exploitation, including weighting by host, by application, by network, and by configuration. The standard also covers active and passive analysis, so testers do not skip the slower but higher-fidelity work.
Section 5: Exploitation
Move from theoretical vulnerability to demonstrated risk: validate findings, bypass countermeasures, gain access, and achieve the engagement objectives agreed in Section 1. PTES requires evidence-driven exploitation that respects the rules of engagement, with countermeasure analysis (AV, DLP, IDS, IPS, HIPS) and a clear chain from vulnerability to impact rather than scattered proofs of concept.
Section 6: Post-exploitation
Establish the value of the compromise: pivot, escalate privileges, identify high-value assets, persist as needed, and demonstrate access to data and business processes the threat model identified as critical. PTES explicitly covers infrastructure analysis, pillaging, business impact analysis, persistence, and clean-up, so the report shows what an attacker could actually do, not just where they could land.
Section 7: Reporting
Produce both an executive summary and a technical report. The executive section covers background, posture review, business risk, recommendation summary, and strategic roadmap. The technical section covers intelligence gathered, vulnerability analysis, exploitation, post-exploitation, risk per finding, and remediation guidance. PTES treats the report as the engagement deliverable, not an afterthought, and structures it so each finding ties back to the threat model and the rules of engagement.
Related features
Orchestrate every security engagement from start to finish
Vulnerability management software that tracks every finding
AI-powered reports in seconds, not days
Map your attack surface before attackers do
Vulnerability scanning tools that map your attack surface
Test web apps behind the login
Compliance tracking without a full GRC platform
Run PTES-aligned engagements without spreadsheet sprawl
Bring scope, intelligence, threat model, findings, exploitation evidence, and reporting into one workflow. Start free.
No credit card required. Free plan available forever.