Chapter 13 - Social Engineering & Pen Test Flashcards

1
Q

Spear Phishing

A

Targeting a person or a group with a phishing attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Whaling

A

going after CEOs or other C-level Executives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Pharming

A

use of malicious code that redirects a user’s traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Spimming

A

sending spam over instant message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Netcraft Toolbar

A

Phishing tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

PhishTank Toolbar

A

Phishing tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fave Antivirus

A

very prevalent attack; pretends to be anti-virus but is malicious

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Mobile-based attack - ZitMo

A

Zeus in the Mobile - banking malware that was ported to Android

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security Assessment

A

Test perfromed in order to assess the level of security on a network or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security Audit

A

Policy and procedure focused; tests whether organization is following specific standards and policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Vulnerability Assessment

A

Scans and tests for vulnerabilities but does not intentionally exploit them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Pen Test - External Assessment

A

Analyzes publicly available information; conducts network scanning, enumeration and testing from the network perimeter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Pen Test - Internal Assessment

A

Performed from within the organization, from various network access points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Red Team vs Blue Team

A

Red Team - Pen Test team that is doing the attacking. Blue Team - Pen test team that is doing the defending

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Purple Team

A

Pen test team that is doing both attacking and defending

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Codenomicon

A

Utilizaes fuzz testing that learns the tested system automatically; allows for pen testers to enter new domains such as VoIP assessment, etc.

17
Q

Core Impact Pro

A

Best known, all-inclusive automated testing framework; tests everything from web applications and individual systems to network devices and wireless.

18
Q

Metasploit

A

Framework for developing and executing code against a remote target machine

19
Q

CANVAS

A

hundreds of exploits, automated exploitation system and extensive exploit development framework.

20
Q

What are the phases of a Pen Test?

A
  1. Pre-attack phase - reconaissance and data-gathering. 2. Attack Phase - Attempts to penetrate the network and execute attacks. 3. Post-Attack Phase - Cleanup to return a system to pre-attack condition and deliver reports.
21
Q

Comprehensive Report Parts of Pen Test

A
  • Executive summary or org’s security posture. - Names of all participants and dates of tests. - List of all findings, presented in order of risk. - Analysis of each finding and recommended mitigation steps. - Log files and other evidence
22
Q

Types of insiders - Pure Insider

A

Employee with all rights and access associated with being an employee

23
Q

Types of Insiders - Elevated Pure Insider

A

Employee who has admin privileges

24
Q

Tyeps of Insiders - Insider Affiliate

A

Spouse, friend or client of an employee who uses the employee’s credentials to gain access.

25
Q

Types of Insiders - Outside Affiliate

A

Someone outside the organization who uses an open access channel to gain access to an organization’s resources.