1.6penetration training concepts Flashcards

1
Q

Active reconnaissance

A

Is the use of tools to send data to systems and then understanding their responses. Usually starts with various network and vulnerability scanners. Can be incredibly illegal and should not be engaged in without being prepared and proper authorixation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Passive Reconnaissance

A

You are not touching any of the target’s equipment. Instead you are going through and gathering that which is already available. Forums and social media are great resources for gathering information about the company and its employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Pivot

A

In penetration testing it is using a compromised machine to attack other machines on the same network or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Persistence

A

Installing backdoors or methods to keep access to the host or other networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Escalation of Privilege

A

Allows for a user to get a higher-level access than what authentication allows for. Can be resolved through patching and updating. Typically related to a bug or vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Black Box

A

You know nothing of the network, you have no prior knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

White Box

A

You are given a full network map and you have full knowledge of the configurations allowing you to perform specific tests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Grey box

A

Knowledge of the network, but not incredibly detailed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Penetration testing vs vulnerability scanning

A

Penetration testing is an active attack on the network to exploit vulnerabilities, can assess potential damages, and the potential of exploits being found. Is done by a human. Vulnerability scan passively scans and identifies vulnerabilites, is automated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly