5A: Plan the Vulnerability Scan Flashcards

2.2 Given a scenario, perform active reconnaissance. 2.4 Given a scenario, perform vulnerability scanning. 3.2 Given a scenario, research attack vectors and perform wireless attacks. 3.7 Given a scenario, perform post-exploitation techniques.

1
Q

The points at which a network or application receive external connections or inputs/outputs that are potential vectors to be exploited by a threat actor.

A

Attack Vectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A process that moves from initial discovery of a vulnerability, through mitigation, management, awareness, and documentation.

A

Vulnerability Lifecycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A technique used during reconnaissance to gather information about network hosts and the services running on open ports.

A

Banner Grabbing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A command line utility to download files via HTTP from a web site.

A

wget or curl

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Utility for reading and writing raw data over a network connection.

A

netcat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IP and port scanner used for topology, host, service, and OS discovery and enumeration.

A

nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Open source vulnerability scanner, originally developed from the Nessus codebase at the point where Nessus became commercial software.

A

OpenVAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly