1.6penetration training concepts Flashcards
Active reconnaissance
Is the use of tools to send data to systems and then understanding their responses. Usually starts with various network and vulnerability scanners. Can be incredibly illegal and should not be engaged in without being prepared and proper authorixation
Passive Reconnaissance
You are not touching any of the target’s equipment. Instead you are going through and gathering that which is already available. Forums and social media are great resources for gathering information about the company and its employees
Pivot
In penetration testing it is using a compromised machine to attack other machines on the same network or system
Persistence
Installing backdoors or methods to keep access to the host or other networks
Escalation of Privilege
Allows for a user to get a higher-level access than what authentication allows for. Can be resolved through patching and updating. Typically related to a bug or vulnerability
Black Box
You know nothing of the network, you have no prior knowledge
White Box
You are given a full network map and you have full knowledge of the configurations allowing you to perform specific tests
Grey box
Knowledge of the network, but not incredibly detailed
Penetration testing vs vulnerability scanning
Penetration testing is an active attack on the network to exploit vulnerabilities, can assess potential damages, and the potential of exploits being found. Is done by a human. Vulnerability scan passively scans and identifies vulnerabilites, is automated