Pen Testing Flashcards
(7 cards)
Name 6 methods of attacking a network
Malware
Insecure Cloud
Unpatched software with known vulnerabilities
Web attack
Phishing
Supply Chain
How do most attacks on a companies network start?
phishing
What is the ARP protocol?
Controls who has what IP address on a network. Works by a host broadcasting an IP address and the host with that address responds with their MAC address.
What is ARP spoofing?
Hosts on a network will accepts ARP replies even if they did not request them. Therefore a device on a the network can tell all the other devices they are the router, causing the other devices to send their packets to the spoofing device.
Why is WPA2 insecure?
The key is based on the wifi password, a nonce generated by the client and a nonce generated by the access point. The nonces are shared unencrypted and so if an attacker knows the password they can decrypt the traffic.
What is PCI-DSS?
Payment Card Industry Data Security Standard. A data standard for companies handling credit card information.
What are the requirements laid out in PCI-DSS?
Log, monitor and restrict access to cardholder data
Protect data from malware
Test security regularly
Protect stored data and data in transit with cryptography