1.8 - Explain the techniques used in penetration testing. Flashcards
Explain the techniques used in penetration testing.
Penetration testing
Known environment (Penetration testing)
-white box
-tests performed with full knowledge of underlying tech, configs, settings
-testers typically have net. diagrams, lists of sys, IP net. ranges, even creds to sys.
-test is often more complete since testers can get to every sys.
-may not provide accurate view of what external perp would see
Unknown environment (Penetration testing)
-black box
-intended to replicate what perp would encounter
-testers not provided with access to or info about environ. > must gather info, discover vulns, make their own way thru infra/sys. like a perp would
-approach can be time consuming BUT can help provide reasonably accurate assessment of how secure target is against a perp
-quality + skillset of ur pen test team = v important
Partially known environment - Rules of engagement (Penetration testing)
-gray box
-blend of white + black box
-may provide some info about environ. to testers wthout giving full access, creds, configs
-can help focus testers time + effort while providing more accurate view of what perp would actually encounter
Lateral movement (Penetration testing)
-occurs as perp uses initial sys. compromise to gain access to other sys. on target net.
Privilege escalation (Penetration testing)
-using hacking techniques to shift from initial access gained by perp to more advanced privileges (root access)
Persistence (Penetration testing)
Cleanup (Penetration testing)
Bug bounty (Penetration testing)
-
Pivoting (Penetration testing)
-occurs as perp uses initial sys. compromise to gain access to other sys. on target net.
Passive and active reconnaissance
Drones (Passive and active reconnaissance)
War flying (Passive and active reconnaissance)
-use of drones/UAVs (unmanned aerial vehicles)
War driving (Passive and active reconnaissance)
-drive by facilities in car equipped wth high end antennas
-attempt to eavesdrops on/connect to wireless nets.
Footprinting (Passive and active reconnaissance)
-identify OS + apps in use