Skip to main contentSkip to main content
The Red Raffle banner icon.

The Jr Pentester Path just got rebuilt. Complete rooms, earn tickets, and win a free PT1 cert.

Room Banner
Back to all walkthroughs
Room Icon

Threat Modeling for Pentesters

Premium room

Learn about the different frameworks for threat modeling.

medium

60 min

1

User profile photo.
User profile photo.

To access material, start machines and answer questions login.

It is your first week at a security consultancy, and the team lead drops a 50-page scope document on your desk. The client is Stratford Systems, a mid-sized financial services company. They want a penetration test of their customer-facing payment portal and supporting infrastructure. The engagement window is ten business days. The team lead looks at you and asks: "Where do you start?"

The instinct is to fire up nmap and start scanning. Resist it.

Stratford's network has hundreds of hosts, dozens of services, and multiple application layers. Ten business days is not enough to test everything. If you start scanning blindly, you will spend three days mapping low-priority internal file shares while the payment database with 200,000 customer credit card records sits untouched. The client's CISO does not care that you found a missing patch on a print server. They care about whether an attacker can reach the data that keeps their business alive.

This is the problem that threat modeling solves. Before you run a single scan, you build a structured understanding of what the client needs to protect, what could go wrong, and where to focus your limited testing time. A threat model is not a compliance checkbox or an architect's exercise; for a penetration tester, it is a targeting document. It transforms a vague scope into a prioritized attack plan.

Where Threat Modeling Fits in the Pentest Lifecycle

The Penetration Testing Execution Standard (opens in new tab) (PTES) defines seven phases that structure a professional engagement from start to finish:

  1. Pre-Engagement Interactions
  2. Intelligence Gathering
  3. Threat Modeling
  4. Vulnerability Analysis
  5. Exploitation
  6. Post-Exploitation
  7. Reporting

Threat modeling sits at Phase 3, after you have gathered intelligence about the target but before you begin active vulnerability analysis or exploitation. This placement is deliberate. Intelligence gathering tells you what exists on the network; threat modeling tells you what matters and what to target first. Without it, vulnerability analysis becomes a scattershot exercise, and exploitation lacks strategic direction.

Consider the Stratford engagement. After intelligence gathering, you know the company runs a public-facing web application called StratPay Portal, an internal API gateway, an Active Directory domain (stratford.local), a Server database cluster, and a -accessible admin dashboard. That is a lot of surface area. Threat modeling is where you decide which components represent the highest risk to the business and deserve the most testing time.

Learning Objectives

By the end of this room, you will be able to:

  • Explain why threat modeling is a critical pre-engagement activity for penetration testers
  • Identify where threat modeling sits in the Penetration Testing Execution Standard (PTES) lifecycle
  • Describe the four-question framework that underpins all threat modeling methodologies
  • Recognize the three frameworks covered in this room and their complementary roles

Prerequisites

This room targets users with basic knowledge of cyber security along with familiarity with network architecture concepts. In particular, we recommend:

Answer the questions below

I am ready to learn about threat modeling!