.07 RG Vocab offensive security Flashcards
Penetration test and ethical hacking
A simulated series of tests performed by a team or
individual behaving in the same manner and using the same tactics, techniques, and
procedures (TTPs) as an advanced adversary while taking care not to do any harm to assets
or data
Vulnerability assessment
A review of possible system weaknesses against a list of known
vulnerabilities, often with recommendations for update or correction
This type of assessment is nowhere near as comprehensive as a penetration test, but it can
provide a quick look into an organization’s points of weakness.
Service Organization Control 2 (SOC 2) compliance
Used by businesses that deal in
finance and accounting, SOC 2 compliance requires ongoing security evaluations, including
periodic penetration testing.
Payment Card Industry Data Security Standard (PCI DSS)
Businesses who maintain
customer payment card data must adhere to these standards to combat payment card
fraud. The PCI standards on penetration testing are among the most detailed of all regulatory
requirements, specifying differences between penetration tests and vulnerability scans.
ISO 27001
This is largely a voluntary standard. Organizations that wish to establish the
depth of their internal process controls will seek this certification, which requires penetration
tests as part of the risk management portion.
General Data Protection Regulation (GDPR)
The GDPR encompasses all businesses in
the European Union, particularly those that deal with the personally identifiable information
of European citizens. The GDPR guidelines require regular penetration tests to strengthen
data protection and privacy.
Gray Hat Hacking
Often tied to bug bounties, this refers to the gray area between legal and
illegal, where practitioners may conduct pentest activities without explicit permission to
discover (and possibly profit from) vulnerabilities.
ATT&CK
is an acronym that stands for “adversarial tactics, techniques, and common
knowledge.” The framework focuses on the offensive side of an attack rather than the
defensive.
“Initial Access
consists of techniques that use various entry vectors to gain their initial
foothold within a network.” —MITRE (2019)
● Phishing
● Supply chain compromise
“Lateral Movement
consists of techniques that adversaries use to enter and control
remote systems on a network.” —MITRE (2019)
● Access token manipulation
● Domain policy modification
“Discovery
consists of techniques an adversary may use to gain knowledge about the
system and internal network.” —MITRE (2019)
● Account discovery
● Network sniffing
Reconnaissance phase
The process of gathering information about a target
Weaponization phase
Creating or sourcing the correct tools to exploit the target system
Delivery phase
Getting the malicious payload to the target’s machine or system
Exploitation phase
Implemented after successful delivery; a vulnerability is exploited to
gain access to the system.