1.8 Explain the techniques used in penetrating testing Flashcards
A form of security evaluation that involves the same tools, techniques, and skills of real-world criminal hackers as a methodology to test the deployed security infrastructure of an organization. Understand announced vs. unannounced test. An announced test means
Penetration Testing
Means everyone in the organization knows the penetration assessment is taking place and when.
Announced Pentest
Performed without the IT or security staff being aware of it.
Unannounced Pentest
The process of capturing the initial response or welcome message from a network service that may directly or indirectly reveal its identity.
Banner Grabbing
Makes use of knowledge about how an organization is structured, what kinds of hardware and software it uses, and its security policies, processes, and procedures.
Known Environment Testing
Proceeds without using any initial knowledge of an organization. It provides a realistic external criminal hacker perspective on the security stance of an organization.
Unkown Environment Testing
Combines the two other approaches to perform an evaluation based on partial knowledge of the target environment.
Partially Known Environment Testing
A penetration testing document that defines the means and manner in which the testing is to be performed and conducted.
Rules of Engagement (RoE)
When pivoted attacks are successful and the attacker gains some level of remote control over another system.
Lateral Movement
Any attack or exploit that grants the attacker greater privileges, permissions, or access.
Privilege Escalation
The characteristic of an attack that maintains long-term remote access to and control over a compromised target.
Persistence
The process of removing any lingering hacking tools, sensors, or devices left behind during the various stages of the penetration test.
Pentest Cleanup
Payment to programmers, developers, and ethical hackers to discover a flaw in a service, site, product, system, device, etc., and they responsibly and privately report it to the vendor.
Bug Bounty
The action or ability to compromise a system and then using the privileges or access gained through the attack to focus attention on another target that may not have been visible or exploitable initially.
Pivoting
The activity of gathering information about a target without interacting with the target.
Passive Reconnaissance