1.8: Pen Testing Flashcards

1
Q

Pentest

A

Simulate an attack
similar to vul scanning, try to actually exploit vulnerabilities to see if access can be gained.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Rules of Engagement

A

define purpose of Pen test, scope for people performing the test.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Working Knowledge

A

Unknown environment: pentester knows nothing about the systems under attack, ‘blind’ test.
Known environment: full disclosure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Exploiting Vulnerabilities

A

Trying to break into the system
potential for DoS or loss of data.
Buffer overflow can cause instability
Good pen test will try a variety of techniques (brute force, social engineering, database injections, buffer overflows)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Bug Bounty

A

reward for discovering vulnerabilities and reporting them for cash rewards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Reconnaissance

A

Gathering a digital footprint
understanding security posture(firewalls, configs)
minimize the attack area
Create a network map (identify routers, networks, remote sites)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Wardriving

A

combine wifi monitoring and a gps
search from your car or plane(warflying, searching from drone)
Grabbing SSID’s, encryption type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security Teams

A

Red Team: Ethical hackers (pen testers)
Blue Team: Defensive security, day to day security to keep devices/networks safe. Incident response.
Purple Team: Red and blue working on the same team.
White team: manages the interactions between red and blue team. Enforce rules/resolve issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly