1.4 Pen testing concepts Flashcards
Active Recon
Involves making a connection to the target host.
Passive Recon
Sniffing network traffic to identify assets communicating on the network, service ports used, and potentially some vulnerabilities.
Black box assessment
The consultant is given no privileged information about the network/security system. Simulates an external threat.
White box assessment
The consultant is given complete access to the network. Tester skips recon phase. Simulates a privileged insider threat.
Gray box assessment
The consultant is given some information. Simulates an unprivileged insider threat.
Pivot
System and/or set of privileges that allow the tester to compromise network systems.
Pen testing vs. vulnerability scanning
Vulnerability scanning is more passive than pen testing.