06/07 Penetration testing Flashcards

(20 cards)

1
Q

What is the primary goal of penetration testing?

A

To simulate an adversary and uncover real-world risks in a system before actual attackers do.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which standard is commonly followed for ethical pentesting processes?

A

The Penetration Testing Execution Standard (PTES).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What must be defined in the “Rules of Engagement”?

A

Scope, allowed tools, data handling procedures, testing windows, communication and escalation paths, and legal sign-off.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name two key deliverables in the scoping & planning phase.

A

List of in-scope assets (networks, apps, endpoints) and agreed testing windows and communication channels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which legal/regulatory frameworks often need consideration before testing?

A

GDPR, PCI DSS, and any industry-specific privacy or security regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is OSINT in passive reconnaissance?

A

Open-Source Intelligence—gathering publicly available info (e.g., WHOIS, DNS, web archives, GitHub).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Give two examples of active reconnaissance techniques.

A

Network mapping with ping sweeps/traceroute and port/service enumeration using Nmap or masscan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is banner grabbing used for?

A

To identify service versions and software banners (using tools like netcat or curl).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can LinkedIn be used in recon?

A

To gather employee data for crafting spear-phishing lures in social-engineering studies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose of vulnerability triage?

A

To weed out false positives and validate scanner findings through manual proof-of-concept testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What scoring system helps prioritize vulnerabilities?

A

CVSS (Common Vulnerability Scoring System), combined with business impact and exploitability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name two common exploitation techniques.

A

Buffer overflows (payload crafting) and injection flaws (SQL, OS/command injection).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What framework is popular for rapid exploit development?

A

Metasploit Framework.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Mention one Windows and one Linux privilege-escalation method.

A

Windows: Misconfigured services or Juicy Potato; Linux: SUID binaries enumeration (e.g., LinPEAS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are two lateral-movement techniques?

A

Pass-the-Hash and Pass-the-Ticket; RDP/SMB pivoting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name three post-exploitation activities.

A

Persistence (e.g., scheduled tasks), data exfiltration (compression/encryption), and cleanup (log removal).

17
Q

What is the top-level section in a pentest report called?

A

Executive Summary.

18
Q

What should the “Technical Findings” section include?

A

Detailed PoCs, screenshots, CVSS scores, and step-by-step exploitation paths.

19
Q

What belongs in the “Remediation Roadmap”?

A

Prioritized action items with clear owners and ETAs.

20
Q

How should pentest findings be delivered?

A

Through presentations tailored to both technical teams (deep dive) and management (high-level risks).