1.8 Explain the techniques used in penetration testing Flashcards

1
Q

Penetration Testing

A

A malicious attack from a outsider that is a simulation. purpose is to test the network/systems for a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Known Environment

A

A pen tester that has full information the targeted system. It is given to them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Unknown Environment

A

A pen tester that has NO information on the targeted system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Partially Known Environment

A

A mix of known and unknown. Some info on a target key system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Rules of Engagement

A

Defines the purpose and scope of the test. Let you know the 5 W’s of the test.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Lateral Movement

A

Gaining access to a system, then MOVING TO OTHER DEVICES on the network. Can be by privilege escalation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Persistence

A

Creating a way back into a system once you have access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Pivoting

A

Gaining access to a system then attacking another system to access that one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

War Driving

A

Gathering wireless network info. while driving around.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

War Flying

A

Combining war driving and a drone. Used to gain physical access to a secured area and gather wireless network info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

OSINT (relating to passive reconnaissance)

A

Gathering Public/Open Source data that a pen tester can use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Passive Reconnaissance

A

Not interacting directly with your target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Active Reconnaissance

A

Interacting directly with your target. May be discovered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Foot printing

A

Using ethical hacking technique to gather as much info on a target.
Ping sweep, tracert analysis, Nmap, Extracting DNS Info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Red Team

A

Offense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Blue team

A

Defense

17
Q

Purple Team

A

Combining both teams to maximize effectiveness.

18
Q

White Teams

A

Oversees a engagement between Red and Blue.

19
Q

Cleanup

A

When done pen testing remove any evidence that you where there. Also used to not be discovered

20
Q

Bug Bounty

A

Receiving a reward for finding a vulnerability and reporting.