Chapter 12 - The Pen Test, Putting it all Together Flashcards

1
Q

Security Assessment

A

any test performed to assess the level of security on an network or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3 categories of security assessments

A

security audit

vulnerability assessment

penetration test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security Audit

A

policy and procedure focused

tests whether the organization is following specific standards and policies they have in place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Vulnerability assessment

A

scans and tests a system or network for existing vulnerabilities but doesn’t exploit them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Penetration test

A

searches for vulnerabilities and actively seeks to exploit them

must have an agreement in place before testing begins

agreement should spell out limitations, constraints, liabilities, between organization and the pen test team. A separate indemnity form releasing you from financial liability is also necessary (ie what if port scanner accidentally takes down server)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Exam Tip, know Shellshock vulnerability

aka Bashdoor, Bash Bug, CVE-2014-6271

A

affected Bash shell found in most versions of Linux, Unix and Mac OS X. Also some linux-based routers with CGI-enabled web interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

External assessment

A

analyzes publicly available information, performs network scanning, enumeration and testing from the network perimeter. Usually the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Internal assessment

A

performed from inside the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

define black, white, gray box testing

A

black - no knowledge of infrastructure. simulates outside hacker

white - complete knowledge of infrastructure. simulates insider

gray - soem information on infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

red team

A

offense, hacking group, black box style with no knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

blue team

A

defensive team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

automated testing

codenomicon
core impact pro
metasploit (with Autopwn module)
CANVAS

A

point and shoot with all inclusive tool set like Core Impact

can save time and money, but prone to false positives and negatives, doesn’t necessarily care about your scope agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

3 phases of a pen test

A

pre-attack

attack

post-attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

pre-attack phase

A

reconnaissance and data gathering

ID network ranges, DNS enumeration, IP ranges, nmap network scanning, test proxy servers, checking for firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

attack phase

A

attempt to penetrate network perimeter, acquire targets, execute attacks, elevate privileges

verify ACL’s by crafting packets, seeing if you can use covert tunnels, trying XSS, buffer overflows, SQL injections, password cracking,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

post attack

A

cleanup anything uploaded to the network. Remove tools, malware, backdoors, attack software

provide deliverables: reports, etc

17
Q

5 basics of a pen test report

A

executive summary (if using FISMA, DIACAP, RMF, HIPAA, etc, this summary will be tailored to that)

names of participants and dates of tests

list of findings, usually ordered by risk

analysis of each finding and recommended mitigation steps

log files and evidence from your toolset. customers seem to want screenshots

18
Q

Open Source Security Testing Methodology Manual (OSSTM)

A

created by Institute for Security and Open Methodologies (ISECOM) in 2001

effort to improve how security is tested

peer reviewed manual of security testing and analysis.

results in fact based actions that improve security

downloadable as a PDF file

constantly updated

19
Q

Testing Guidelines and Methodologies

OSSTM

SANS

OWASP

A

OSSTM and SANS have their own methodologies

OWASP focuses on web servers and appliations

20
Q

ECC 4 categories of insider threats

A

pure insider

insider associate

insider affiliate

outside affiliate

21
Q

pure insider

A

an employee with all rights and access an employee has (physical and network access, badge, etc)

common problem is that their privileges are often higher than they need to be

22
Q

insider associate

A

someone with limited access like a contractor, janitor, guard.

have physical access, not network. Not employees

23
Q

insider affiliate

A

friend, spouse or client of the employee who uses the employees credentials to gain access.

Key thing is not the persons so much as the credentials

24
Q

outsider affiliate

A

someone outside the organization who is untrusted, unknown but uses and open access channel to gain access

example - someone using an unsecured wireless access point