5A: Plan the Vulnerability Scan Flashcards
2.2 Given a scenario, perform active reconnaissance. 2.4 Given a scenario, perform vulnerability scanning. 3.2 Given a scenario, research attack vectors and perform wireless attacks. 3.7 Given a scenario, perform post-exploitation techniques.
The points at which a network or application receive external connections or inputs/outputs that are potential vectors to be exploited by a threat actor.
Attack Vectors
A process that moves from initial discovery of a vulnerability, through mitigation, management, awareness, and documentation.
Vulnerability Lifecycle
A technique used during reconnaissance to gather information about network hosts and the services running on open ports.
Banner Grabbing
A command line utility to download files via HTTP from a web site.
wget or curl
Utility for reading and writing raw data over a network connection.
netcat
IP and port scanner used for topology, host, service, and OS discovery and enumeration.
nmap
Open source vulnerability scanner, originally developed from the Nessus codebase at the point where Nessus became commercial software.
OpenVAS