1.4 Flashcards

1
Q

active reconnaissance.

A

Active reconnaissance is the idea of collecting information about a target through interactive means. By interacting with a target, accurate and detailed information can be collected quickly but at the expense of potentially being identified as an attacker rather than just an innocent, benign, random visitor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

port scanners

A

A port scanner is a vulnerability assessment tool that sends probe or test packets to a target system’s ports in order to learn about the status of those ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

passive reconnaissance.

A

Passive reconnaissance is the activity of gathering information about a target without interacting with the target. Instead, information is collected from sources not owned and controlled by the target (other websites and services) as well as by eavesdropping on communications from the target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

pivoting

A

In penetration testing (or hacking in general), a pivot is the action or ability to compromise a system, and then using the privileges or access gained through the attack to focus attention on another target that may not have been visible or exploitable initially.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

initial exploitation

A

The initial exploitation in a penetration test or a real-world malicious attack is the event that grants the attacker/ tester access to the system. It is the first successful breach of the organization’s security infrastructure that grants the attacker/ tester some level of command control or remote access to the target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

persistence

A

Persistence is the concept of an attack that maintains remote access to and control over a compromised target. A persistent attack grants the attacker ongoing prolonged access to and control over a victim system and/ or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Understand escalation of privilege.

A

Escalation of privilege is any attack or exploit that grants the attacker greater privileges, permissions, or access than what may have been achieved by the initial exploitation. Privilege escalation can be either horizontal or vertical.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Understand black-box testing.

A

Black-box penetration testing proceeds without using any initial knowledge of how an organization is structured; what kinds of hardware and software it uses; or its security policies, processes, and procedures. It provides a realistic external criminal hacker perspective on the security stance of an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Understand white-box testing.

A

White-box testing makes use of knowledge about how an organization is structured, what kinds of hardware and software it uses, and its security policies, processes, and procedures. The result is that it gives a rogue administrator a lot of information about the organization’s security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Understand gray-box testing.

A

Gray-box testing combines the two other approaches to perform an evaluation based on partial knowledge of the target environment. The results are a security evaluation from the perspective of a disgruntled employee.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

penetration testing.

A

A penetration test is a form of vulnerability scan that is performed by a special team of trained white-hat security specialists rather than by an internal security administrator using an automated tool. Penetration testing (also known as ethical hacking) uses the same tools, techniques, and skills of real-world criminal hackers as a methodology to test the deployed security infrastructure of an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly