16.1 Introduction to Pen Testing and Open Source Intelligence Flashcards

1
Q

What is Pen Testing?

A

Penetration testing, often referred to **pen testing** or **ethical hacking**, is the offensive security practice of attacking a network using the same techniques that a hacker would use, in an effort to identify security holes and raise awareness in an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why do organizations hire pentesters?

A

While network administrators and security personnel do their best to harden their networks, it often takes an external entity to identify misconfigurations and subtle security holes.

Organizations hire pentesters to assess their security controls. Pentesters find flaws in those controls, help the organization understand their flaws, and provide recommendations about which vulnerabilities to prioritize and how to fix them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A penetration test is often referred to as an __________ by practitioners

A

A penetration test is often referred to as an **engagement** by practitioners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the five stages of engagement?

A
  1. Active and passive reconnaissance
  2. Scanning and enumeration
  3. Gaining access
  4. Maintaining your access
  5. Covering your tracks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What types of tools do pentesters use? (General)

A
  • Vulnerability scanners) a
  • Manual tools to research vulnerabilities
  • Craft phishing emails,
  • Manually exploit hosts
  • Write shell code.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three primary types of penetration testing?

A

There are three primary types of penetration tests:

  1. No view (aka Black Box)
  2. Full view (aka White Box
  3. Partial view (Grey Box)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain no view testing:

A

**No view** testing, also known as black box, simulates a hacker who has no prior knowledge of the target system and network. They are paid to learn and exploit as much as they can about the network using only the tools available to an attacker on the public internet.

For example, they may only know the company name and be forced to find various key resources, like IP ranges and access credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain full view pentesting:

A

**Full view** testing, also known as white box, is given full knowledge of the system or network. This knowledge allows them to tear apart subtle security issues on behalf of their clients. Full view pen testing is most appropriate when the client wants a detailed analysis of all potential security flaws, rather than all exposed and visible vulnerabilities.

For example, they may only know the company name and be forced to find various key resources, like IP ranges and access credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain partial view pentesting

A

**Partial view** testing, also known as grey box, is performed by the in-house system or network administrator.

Regardless of the scenario, the main deliverable for pentesters is a report that summarizes their findings and recommendations for improvements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Regardless of the scenario, the main deliverable for pentesters is a ___________and _____________.

A

Regardless of the scenario, the main deliverable for pentesters is a report that summarizes their findings and recommendations for improvements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do business or upper management care most about when it comes to pentesting?

A

Businesses are not primarily interested in how attackers might gain access to their networks. Instead, they are more concerned with how an exploited vulnerability might have major consequences on their reputation, operations, or bottom line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does OSINT stand for and what does it aim to do?

A

**open source intelligence (OSINT)**

OSINT aims to gather publicly available information about a target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Since no view pentesters begin their engagement with very limited knowledge, they must use _____ to gain as much information about a target as possible.

A

OSINT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

OSINT intelligence includes: (4)

A
  • Usernames
  • Email addresses
  • Phone numbers
  • Domain names
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Performing any of the following acts without the specific, written permission of the system’s owner would be considered a felony: (3)

A
  • Port scans
  • Brute force attacks
  • Social engineering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

________, also known as Google dorking, is a technique that uses Google for OSINT and to discover security holes in a website’s code.

A

Google hacking

17
Q

Another useful OSINT tool is ______, a search engine that searches specifically for computers and machines connected to the internet. It scans the entire web and reports back all of its findings in the browser window.

A

Another useful OSINT tool is **Shodan**, a search engine that searches specifically for computers and machines connected to the internet. It scans the entire web and reports back all of its findings in the browser window.

18
Q

Certificate issuers publish logs of the SSL/TLS certificates that they issue to organizations. This _________ can be exploited by attackers and used to search for subdomains.

A

*certificate transparency**

19
Q

An attacker can use certificate transparency to perform ______, ______, and ______.

A

An attacker can use this information to perform domain hijacking, DNS flooding, and DRDoS (Distributed Reflection Denial of Service attack).

20
Q

What is Recon-ng?

A

Recon-ng provides a powerful, open source, web-based reconnaissance framework that can be conducted thoroughly and quickly.

21
Q

Recon-ng is a web reconnaissance framework written in _____.

A

Recon-ng is a web reconnaissance framework written in Python

22
Q

Recon-ng includes the following features: (5)

A
  • Independent modules
  • Database interaction
  • Built-in convenience functions
  • Interactive help
  • Command completion