1.4 Explain penetration testing concepts. Flashcards
Penetration Testing
Pentest
• Simulate an attack
• Similar to vulnerability scanning
• Except we actually try to exploit the vulnerabilities
• Often a compliance mandate
• Regular penetration testing by a 3rd-party
Verify a threat exists
- Perform regular vulnerability scans
- Update your signatures
- Watch the news - Copycats are prevalent
Passive reconnaissance
- Learn as much as you can from open sources
- There’s a lot of information out there
- Remarkably difficult to protect or identify
- Social media
- Corporate web site, online forums, Reddit
- Social engineering, dumpster diving
- Business organizations
Active reconnaissance
Trying the doors • Maybe one is unlocked • Don’t open it yet • Relatively easy to be seen • Ping scans, port scans • DNS queries • OS scans, OS fingerprinting • Service scans, version scans
Exploiting vulnerabilities
Try to break into the system
You’ll only be sure you’re vulnerable
if you can bypass security
• If you can get through, the bad guys can get through
The process
• Initial exploitation• Persistence• The pivot
• Black box
/ Unknown environment
• The pentester knows nothing
about the systems under attack
• “Blind” test
White box /
known environment
• Full disclosure
Grey box /
Partially known environment
• A mix of black and white
• Focus on certain systems or applications