1.8 Explain the techniques used in penetration testing Flashcards

1
Q

Known Environment (Penetration testing )

A

White-box A.K.A known environment, are tests performed with full knowledge of the underlying technology, configurations, and settings that make up the target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Unknown Environment (Penetration testing)

A

Black-box tests A.K.A unknown environment tests, are intended to replicate what an attacker would encounter. Tester are not provided with access to information about an environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Partially known environment (Penetration testing)

A

Gray-box a.k.a partially known environment tests, are a blend of black-box and white-box testing. A gray-box test may provide some information about the environment to the pen testers without giving full access, credentials, or configuration details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Rules of Engagement (Penetration testing)

A

Detailed guidelines and constraints regarding the execution of information security testing. The ROE is established before the start of a security test, and gives the test team authority to conduct defined activities without the need for additional permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Lateral movement (Penetration testing)

A

Lateral movement refers to the techniques that a cyberattacker uses, after gaining initial access, to move deeper into a network in search of sensitive data and other high-value assets. After entering the network, the attacker maintains ongoing access by moving through the compromised environment and obtaining increased privileges using various tools.

Lateral movement allows a threat actor to avoid detection and retain access, even if discovered on the machine that was first infected. And with a protracted dwell time, data theft might not occur until weeks or even months after the original breach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Privilege escalation (Penetration testing)

A

Privilege escalation uses hacking techniques to shift from the initial access gained by the attacker to more advanced privileges, such as root access on the same system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Persistence (Penetration testing)

A

Attackers establish persistence on compromised networks by installing backdoors and using other mechanisms that will allow them to regain access to the network, even if the initial vulnerability is patched.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cleanup (Penetration testing)

A

After the pen testing

Typical cleanup activities include:

Removing any executables, scripts, and temporary files from compromised systems
Reconfiguring settings back to the original parameters prior to the pentest
Eliminating any rootkits installed in the environment
Removing any user accounts created to connect to the compromised system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Bug Bounty (Penetration testing)

A

Bug bounty programs provide organizations with an opportunity to benefit from the wisdom and talent of cybersecurity professionals outside their own teams.

These programs allow outsiders to conduct security testing of an organization’s public services and normally incentivize that research by offering financial rewards to testers who successfully discover vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Pivoting (Penetration testing)

A

The act of an attacker moving from one compromised system to one or more other systems within the same or other organizations. Pivoting is fundamental to the success of advanced persistent threat (APT) attacks. SSH trust relationships may more readily allow an attacker to pivot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

War flying (Passive and active reconnaissance)

A

Similar to war driving but with drones and Unmanned aerial vehicles (UAV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

War driving (Passive and active reconnaissance)

A

Where they drive by facilities in a car equipped with high end antennas and attempt to eavesdrop on or connect to wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Footprinting (Passive and active reconnaissance)

A

Footprinting is an ethical hacking technique used to gather as much data as possible about a specific targeted computer system, an infrastructure and networks to identify opportunities to penetrate them. It is one of the best methods of finding vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Exercise types (team colors)

A

*Red-team
*Blue-team
*White-team
*Purple-team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly