.07 RG Vocab offensive security Flashcards

1
Q

Penetration test and ethical hacking

A

A simulated series of tests performed by a team or
individual behaving in the same manner and using the same tactics, techniques, and
procedures (TTPs) as an advanced adversary while taking care not to do any harm to assets
or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Vulnerability assessment

A

A review of possible system weaknesses against a list of known
vulnerabilities, often with recommendations for update or correction
This type of assessment is nowhere near as comprehensive as a penetration test, but it can
provide a quick look into an organization’s points of weakness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Service Organization Control 2 (SOC 2) compliance

A

Used by businesses that deal in
finance and accounting, SOC 2 compliance requires ongoing security evaluations, including
periodic penetration testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Payment Card Industry Data Security Standard (PCI DSS)

A

Businesses who maintain
customer payment card data must adhere to these standards to combat payment card
fraud. The PCI standards on penetration testing are among the most detailed of all regulatory
requirements, specifying differences between penetration tests and vulnerability scans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ISO 27001

A

This is largely a voluntary standard. Organizations that wish to establish the
depth of their internal process controls will seek this certification, which requires penetration
tests as part of the risk management portion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

General Data Protection Regulation (GDPR)

A

The GDPR encompasses all businesses in
the European Union, particularly those that deal with the personally identifiable information
of European citizens. The GDPR guidelines require regular penetration tests to strengthen
data protection and privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Gray Hat Hacking

A

Often tied to bug bounties, this refers to the gray area between legal and
illegal, where practitioners may conduct pentest activities without explicit permission to
discover (and possibly profit from) vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ATT&CK

A

is an acronym that stands for “adversarial tactics, techniques, and common
knowledge.” The framework focuses on the offensive side of an attack rather than the
defensive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

“Initial Access

A

consists of techniques that use various entry vectors to gain their initial
foothold within a network.” —MITRE (2019)
● Phishing
● Supply chain compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

“Lateral Movement

A

consists of techniques that adversaries use to enter and control
remote systems on a network.” —MITRE (2019)
● Access token manipulation
● Domain policy modification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

“Discovery

A

consists of techniques an adversary may use to gain knowledge about the
system and internal network.” —MITRE (2019)
● Account discovery
● Network sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Reconnaissance phase

A

The process of gathering information about a target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Weaponization phase

A

Creating or sourcing the correct tools to exploit the target system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Delivery phase

A

Getting the malicious payload to the target’s machine or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Exploitation phase

A

Implemented after successful delivery; a vulnerability is exploited to
gain access to the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Installation phase

A

Installation of a backdoor or other system of persistence on the target
system often includes modifying or “time-stomping” logs to avoid detection.

16
Q

Installation phase

A

Installation of a backdoor or other system of persistence on the target
system often includes modifying or “time-stomping” logs to avoid detection.

17
Q

Command and Control (C2) phase

A

Opening and maintaining communication channels
between the target system and the attacker’s

18
Q

Action on Objects phase

A

The hacker achieves their goal or continues escalating and
pivoting through the system to establish more persistence or access more resources.
Exfiltration of data and destruction of systems can be aspects of this phase.

19
Q

Phishing

A

The most common social engineering technique whereby an attacker sends a
fraudulent email from a seemingly reputable and trusted source

20
Q

Vishing and smishing

A

Forms of phishing performed via phone calls or text messages

21
Q

Pretexting

A

Occurs when the attacker impersonates someone powerful or meaningful to
the target to get them to comply with demands

22
Q

Baiting

A

The attacker provides the victim with something enticing to lure them into a social
engineering trap.

23
Q

Tailgating and piggybacking

A

Occur when the attacker follows an individual into an
organization unnoticed

24
Q

Spear phishing

A

Researched, targeted attacks against specific individuals within an
organization

25
Q

Whaling

A

Highly targeted attacks against specific individuals within an organization—often
C-Suite executives, HR directors, or other managers with significant access to company
resources

26
Q

Nmap

A

An open-source tool that lets you perform scans on remote networks
It can discover protocols, open ports, and operating system information on remote
machines

27
Q

Nessus

A

Typically used as a vulnerability assessment tool but contains the same features as
Nmap; slower than Nmap but provides the ability to output clean reports and also suggests
mitigation measures

28
Q

Hydra

A

Commonly used to crack passwords to online services such as SSH, FTP, or IMAP
Tools such as this are the primary reason that enterprises rate-limit password attempts.

29
Q

Hashcat

A

The self-proclaimed “fastest and most advanced password recovery utility,”
Hashcat is the “go-to pentesting tool to crack hashes,” supporting various kinds of password
attacks.

30
Q

Metasploit

A

Allows the pentester to pick an exploit, select a payload, and fire it at a remote
target; touted as the “world’s most used penetration testing framework”

31
Q

Burp Suite

A

An effective web vulnerability scanner that offers many of the same features as
Nessus

32
Q

Kali Linux

A

Developed by the group Offensive Security (known as OffSec), Kali Linux is
prepackaged with most of the tools commonly used by penetration testers. It is free to
download and optimized for offense (not defense), meaning that it is easily exploited. Kali
Linux is used extensively in the extended program

33
Q

Denial of Service (DoS) / Distributed Denial of Service (DDoS)

A

“A malicious, targeted
attack that floods a network with false requests in order to disrupt business operations”
—CrowdStrike (2021)
The main difference between DoS and DDoS is the origin of the attack. A DOS attack
originates from a single system, whereas DDoS attacks originate from multiple systems.

34
Q

On-Path attack

A

An adversary places their system between a user and an external
connection endpoint (typically a web application) to collect personal data, passwords, and
banking details to impersonate an individual to gain access or additional information.