1.8 Flashcards
The penetration tester has complete knowledge of the target environment, including its network, systems, applications, and configurations. This allows for more targeted and efficient testing.
Known Environment
The penetration tester has no prior knowledge of the target environment and must perform reconnaissance and information gathering to gain insights into the target systems. This approach simulates a real-world attack scenario where the attacker has no prior knowledge of the target.
Unknown Environment
This technique outlines the scope, rules, and limitations of the penetration testing engagement. It helps ensure that the testing is conducted ethically, legally, and within the agreed-upon boundaries.
Rules of Engagement
The penetration tester has some information about the target environment, such as a list of IP addresses or a limited understanding of the network topology. This approach simulates a scenario where an attacker has some prior knowledge but not complete information.
Partially Known Environment
This technique involves gaining access to one system and then using that access to pivot to other systems within the network. It helps simulate a real-world attack scenario where an attacker may move laterally through a network to reach their objective.
Lateral Movement
This technique involves exploiting vulnerabilities to elevate the privileges of the attacker on the target system. It allows the attacker to gain access to additional resources and information within the target environment.
Privilege Escalation
This technique involves establishing a persistent presence within the target environment, even after the penetration tester has completed their testing. It allows the attacker to maintain access to the target environment and continue to gather information or launch further attacks.
Persistence
This technique involves removing any traces of the penetration testing activities from the target environment to avoid detection by security personnel. It helps ensure that the testing is conducted ethically and does not cause any harm to the target systems.
Cleanup
This technique involves offering rewards or incentives to external researchers who find and report security vulnerabilities in a company’s systems or applications. It helps companies identify and address security issues before they can be exploited by attackers.
Bug Bounty
This technique involves using a compromised system as a platform to launch further attacks on other systems within the target environment. It allows the attacker to move laterally through the network and gain access to additional resources and information.
Pivoting
This technique involves using unmanned aerial vehicles (UAVs) to gather information about a target environment, such as taking pictures of a building or its surrounding area. It can provide valuable insights into physical security measures and potential vulnerabilities.
Drones
This technique involves using wireless-enabled devices, such as laptops or smartphones, to search for wireless access points (WAPs) and gather information about the target network. It can help identify potential vulnerabilities in the wireless network and determine the strength of its security measures.
War Flying
This technique is similar to war flying but involves driving a vehicle equipped with a wireless-enabled device to search for WAPs. It can provide a broader view of the target network and identify potential vulnerabilities in the wireless network.
War Driving
This technique involves gathering information about the target environment, such as its network architecture, systems, applications, and personnel, to identify potential vulnerabilities. It can be done through publicly available sources, such as social media or company websites, or through more advanced techniques, such as port scanning or network mapping.
Footprinting
OSINT (Open-Source Intelligence) is a technique of collecting information about the target environment from publicly available sources, such as social media, news articles, and government records. It can provide valuable insights into the target organization’s operations, personnel, and security posture, and help identify potential vulnerabilities.
OSINT