Lecture 2b Flashcards
(90 cards)
What is penetration testing?
Penetration testing attempts to exploit vulnerabilities to uncover new vulnerabilities
Why is planning the most important step in a penetration test?
Planning prevents test creep and avoids unnecessary legal issues.
Why conduct a penetration test instead of just a network scan?
Network scans find only surface problems and are often automated
Who can perform penetration tests internally?
Internal security personnel.
What are advantages of internal penetration testers?
Little or no additional cost
What are disadvantages of internal penetration testers?
Inside knowledge may bias results
Who are external penetration testers?
Contracted pen testing consultants.
What are advantages of external pen testing consultants?
Expertise
What is a disadvantage of external pen testing consultants?
Risk that sensitive information could be sold to competitors.
What is crowdsourced penetration testing?
Using many testers via the internet with bug bounty programs rewarding vulnerability discovery.
What are advantages of crowdsourced penetration testers?
Faster testing
What do rules of engagement in penetration testing define?
The limitations or parameters of the test.
Name three categories of rules of engagement.
Timing
What does timing in rules of engagement specify?
When testing will occur including start/stop dates and if during business hours.
What does scope in rules of engagement include?
Test boundaries like environment
What is required before starting a penetration test under authorization rules?
Prior written approval signed by all parties.
What does exploitation mean in rules of engagement?
The level of vulnerability exploitation allowed during the test.
When should pen testers communicate with the organization?
At initiation
What does cleanup involve after a penetration test?
Removing all test-related software
What should a penetration test report include?
Objectives
What are the two main phases of performing a penetration test?
Reconnaissance and penetration.
What is footprinting in reconnaissance?
Gathering preliminary information from outside the organization.
What is active reconnaissance?
Directly probing for vulnerabilities that may alert security.