Chapter 1.5 Flashcards

1
Q

passive scanning

A

Passive scanning techniques passively test security controls and operates by sniffing network traffic to identify assets communicating on the network, service ports used, and potentially some types of vulnerabilities. Passive scanning is less likely to detect a wide range of vulnerabilities in host systems and can result in false positives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

active scanning

A

Active scanning techniques involve making a connection to the target host. This might mean authenticating and establishing a session with the host or running an agent on a host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

pivot point

A

A pivot point is a system and/or set of privileges that allow the tester to compromise other network systems (lateral spread). The initial exploit might give the tester local administrator privileges and use these to obtain privileges on other machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly