1.8 - Penetration Testing Techniques Flashcards
1
Q
Pentest
A
- Penetration test
- Actively trying to gain access to a system
- simulate an attack
- One step further than a vulnerability scan b/c you’re trying to exploit the vulnerabilities you find
- Often pentest are part of a compliance mandate (often partner with a third party)
2
Q
NIST
A
- National Institute of Standards and Technology
- their Technical Guide to Information Security Testing Assessment
- Excellent document that can help you design and plan for a penetration test
3
Q
Rules of Engagement
A
- Pentation tests can be very invasive
- Important document defines the purpose and scope, makes everyone aware of the test parameters
- means everyone will be aware of systems considered, maybe time of day
- Type of testing (internal or external)
- List of IP address ranges that are in scope (and those that are out of scope)
- Want to make sure you have emergency contacts listed in the Rules of Engagement
- Probably some sensitive information discovered (need to define in scope / out of scope applications)
4
Q
Working Knowlege
A
- What information are you going to provide to the penetration tester?
- Many approaches
- Ex: unknown environment, you tell them nothing (they have to build out from the dark)
- Ex: Known environment - full disclosure (common if you’re running the penetration test internally)
- Partially Known environment - a mix of unknown and unknown - focus on certain systems or applications
5
Q
Pentation Test - Possible outcomes
A
- Potential data loss
- Potential DoS (Denial of Service)
- Buffer overflows can cause instability
- ## Gain privilege escalation
6
Q
Penetration Test - Approaches
A
- A good penetration test will try many different tactics
- Ex: password, brute-force
- Social engineering
- Database injections
- buffer overflows
7
Q
Penetration Test - Process
A
- Getting Access to system (only first step)
- Lateral movement - move from system to system (inside of the network is relatively unprotected)
- Persistence - once you’re there, you want to be able to come back.
- The Pivot - gain access to systems that would not normally be accessible, use a vulnerable system as a proxy or relay
8
Q
Lateral Movement
A
- Move from device to device within a system
- (inside of the network is relatively unprotected)
- usually a little easier than initial exploit
9
Q
Persistence
A
- Once an attacker is in the system, they want to be able to come back (even if exploit is fixed)
- (ex: set up a backdoor, build user accounts, change or verify default passwords)
10
Q
Pivot
A
- Attackers gain access to one system and they use this as jumping off point to get access to other systems
- Central point from which attackers will start their efforts
11
Q
Penetration test - Aftermath
A
- Cleanup
- Leave the network in its original state (ex: network configurations reverted)
- Remove any binaries or temporary files
- Remove any backdoors or pivot points
- Delete user accounts created during the test
12
Q
Bug Bounty
A
- A reward for discovering vulnerabilities offered by the owner of the system
- Earn money for hacking a system
- Document the vulnerability for cash
- Usually collected by researchers
13
Q
Reconnaissance
A
- Need to gain information about the systems someone will attack
- Gathering a digital footprint (all devices in an organization)
- Understand security posture (firewalls, security configurations)
- Minimize or focus the attack area, focus on key systems
- Create a network map (identify routers, networks, remote sites)
14
Q
Passive Footprint
A
- Learn as much as you can from open sources
- Don’t want to alert victim early
- Ex: social media pages, corporate website, online forums, reddit, social engineering (calling directly into organization)
- Ex: dumpster diving, business organizations
15
Q
OSINT
A
- Open Source Intelligence
- Gathering information from many open sources
- Find information or anyone / anything
- Data you can gather is extnesive
- https://osintframework.com will give you an idea of what kind of information you can gather
- Many tools can gather information automatically