1.8 techniques used in penetration testing Flashcards

1
Q

Known environment

A

Also known as white box tests, are tests performed with full knowledge of the underlying tech, configs and settings that make up the target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Unknown environment

A

Also known as black box tests, tests intended to replicate what an attacker would encounter. Testers are not provided much info on what they are testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Partially known environment

A

This is a blend of black and white boxes. They provide some information on the environment but not full access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

rules of engagement

A

These are scoping agreements that define what will be tested as well as problem handling and resolution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

lateral movement

A

This is also considered pivoting, this occurs as the attacker uses the initial system compromise to gain access to other systems on the target network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

privilege escalation

A

This uses hacking techniques to shift from the initial access gained by the attacker to more advanced privileges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

persistence

A

This allows attackers to regain access to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

cleanup

A

This is restoring systems to normal working order and removing traces of their activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

bug bounty

A

These are programs put in place by organizations to use outside talent to conduct security testing of an organizations public services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

pivoting

A

Same as lateral movement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

drones

A

Testers use drones to eavesdrop on facilities and connect to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

war flying

A

Testers using drones and unmanned aerial vehicles to access networks at facilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

war driving

A

Testers driving by facilities in a car equipped with high-end antennas and attempt to eavesdrop or connect wireless networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

footprinting

A

This identifies the operating systems and applications in use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

OSINT

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Red team

A

attackers that attempt to gain access to systems

17
Q

blue team

A

The defenders who must secure systems and networks from an attack

18
Q

white team

A

These are the observers and judges

19
Q

purple team

A

The combination of knowledge from the red and blue teams.