1.8: Pen Testing Flashcards
Pentest
Simulate an attack
similar to vul scanning, try to actually exploit vulnerabilities to see if access can be gained.
Rules of Engagement
define purpose of Pen test, scope for people performing the test.
Working Knowledge
Unknown environment: pentester knows nothing about the systems under attack, ‘blind’ test.
Known environment: full disclosure.
Exploiting Vulnerabilities
Trying to break into the system
potential for DoS or loss of data.
Buffer overflow can cause instability
Good pen test will try a variety of techniques (brute force, social engineering, database injections, buffer overflows)
Bug Bounty
reward for discovering vulnerabilities and reporting them for cash rewards.
Reconnaissance
Gathering a digital footprint
understanding security posture(firewalls, configs)
minimize the attack area
Create a network map (identify routers, networks, remote sites)
Wardriving
combine wifi monitoring and a gps
search from your car or plane(warflying, searching from drone)
Grabbing SSID’s, encryption type
Security Teams
Red Team: Ethical hackers (pen testers)
Blue Team: Defensive security, day to day security to keep devices/networks safe. Incident response.
Purple Team: Red and blue working on the same team.
White team: manages the interactions between red and blue team. Enforce rules/resolve issues.