2.1 Information Gathering and Vulnerability Scanning Flashcards

Given a scenario, perform passive reconnaissance.

1
Q

How can a PenTest team test the security posture of an organization?

A

The team can do this by searching for key contacts, information and technical data such as online articles, news items, social media and press releases in order to provide a better understanding of the business operations and reputation of the target organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the Common Vulnerabilities & Exposures (CVE)?

A

This is a listing of all publicly disclosed vulnerabilities. Each entry refers to a specific vulnerability of a particular product.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the Common Weakness Enumeration (CWE)?

A

This is a database of software-related vulnerabilities maintained by MITRE Corporation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Public Source-Code Repositories?

A

Public Source-Code Repositories, such as GitHub, Bitbucket, CloudForge and SourceForge promote code sharing and collaboration, speeding up development times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Google Hacking?

A

Google Hacking is a method used by PenTest teams to optimize search results. This process uses the Google search engine to identify potential security weaknesses in publicly available sources, such as an organizations website. Google Hacking queries almost always include one or multiple special search operators in order to cut down on irrelevant results and focus on specific types of desired information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a web cache viewer?

A

A web cache viewer allows you to search for older versions of websites which is a snapshot of the raw HTML and some of the page contents. This can trace back to old press releases, directories and even information on the source code that contains comments or sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How would you evaluate a website?

A

You could evaluate a website, by using tools like browsers, Nmap, Metasploit and DirBuster. Forced browsing is also an option, which is used to identify unlinked URLs or IPs from a website to gain access to unprotected resources. Lastly, OSINT tools such as Maltego, along with standard or Google hacking searches, can reveal the technologies in use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of a robots.txt file?

A

The robots.txt file is a simple, yet essential file that directs bots to the Extensible Markup Language (XML) sitemap file, telling the bots where to search, and more importantly, where NOT to search.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly