Chapter 13 - Social Engineering & Pen Test Flashcards
Spear Phishing
Targeting a person or a group with a phishing attack
Whaling
going after CEOs or other C-level Executives
Pharming
use of malicious code that redirects a user’s traffic
Spimming
sending spam over instant message
Netcraft Toolbar
Phishing tool
PhishTank Toolbar
Phishing tool
Fave Antivirus
very prevalent attack; pretends to be anti-virus but is malicious
Mobile-based attack - ZitMo
Zeus in the Mobile - banking malware that was ported to Android
Security Assessment
Test perfromed in order to assess the level of security on a network or system
Security Audit
Policy and procedure focused; tests whether organization is following specific standards and policies
Vulnerability Assessment
Scans and tests for vulnerabilities but does not intentionally exploit them.
Pen Test - External Assessment
Analyzes publicly available information; conducts network scanning, enumeration and testing from the network perimeter.
Pen Test - Internal Assessment
Performed from within the organization, from various network access points.
Red Team vs Blue Team
Red Team - Pen Test team that is doing the attacking. Blue Team - Pen test team that is doing the defending
Purple Team
Pen test team that is doing both attacking and defending
Codenomicon
Utilizaes fuzz testing that learns the tested system automatically; allows for pen testers to enter new domains such as VoIP assessment, etc.
Core Impact Pro
Best known, all-inclusive automated testing framework; tests everything from web applications and individual systems to network devices and wireless.
Metasploit
Framework for developing and executing code against a remote target machine
CANVAS
hundreds of exploits, automated exploitation system and extensive exploit development framework.
What are the phases of a Pen Test?
- Pre-attack phase - reconaissance and data-gathering. 2. Attack Phase - Attempts to penetrate the network and execute attacks. 3. Post-Attack Phase - Cleanup to return a system to pre-attack condition and deliver reports.
Comprehensive Report Parts of Pen Test
- Executive summary or org’s security posture. - Names of all participants and dates of tests. - List of all findings, presented in order of risk. - Analysis of each finding and recommended mitigation steps. - Log files and other evidence
Types of insiders - Pure Insider
Employee with all rights and access associated with being an employee
Types of Insiders - Elevated Pure Insider
Employee who has admin privileges
Tyeps of Insiders - Insider Affiliate
Spouse, friend or client of an employee who uses the employee’s credentials to gain access.
Types of Insiders - Outside Affiliate
Someone outside the organization who uses an open access channel to gain access to an organization’s resources.