Chapter 1.8 - Penetration Testing Flashcards

Explain techniques in penetration testing

1
Q

Penetration Testing (Pentest)

A

Authorized simulated cyberattack on a computer system, performed to evaluate the security of the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Pentest - Known Environment

A

Performed by a security expert trained to identify and document issues that are present in an environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Pentest - Unknown Environment

A

Performed by a security expert that knows nothing about the systems under attack
“Blind” test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Pentest - Partially Known Environment

A

Performed by a security expert that has partial knowledge or access to an internal network or web application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Pentest - Rules of Engagement

A

Meant to list out the specifics of your penetration testing project to ensure that both the client and the engineers working on a project know exactly what is being testing, when its being tested, and how its being tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Pentest - Lateral Movement

A

Once in the network, can move from system to system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Pentest - Persistence

A

Once in a system, you need to make sure there is a way back in
Examples: backdoor, change passwords, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Pentest - Cleanup

A

Removing all malicious activity from the pentest attack, leave the network in its original state
Examples: remove backdoors, change passwords back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Bug Bounty

A

A reward offered to a person who identifies an error or vulnerability in a computer program or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Pivoting

A

Using a compromised system to spread between different computer systems once inside the network, simulating the behavior of a real attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Passive Reconnaissance

A

Attempt to gain information about targeted computers and networks without actively engaging with the systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Active Reconnaissance

A

Attempt to gain information about targeted computers and networks by actively engaging with the systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

War Flying

A

Used with a drone and a wireless network detector to find wifi wireless network locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Active Footprinting

A

Process of using tools and techniques, like using the traceroute commands or a ping sweep – Internet Control Message Protocol sweep – to collect data about a specific target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Passive Footprinting

A

Collecting data without actively engaging with the target system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Open Source Intelligence (OSINT)

A

The collection and analysis of information from many open sources

17
Q

War Driving

A

Drive around with a wireless network detector to find wifi wireless network locations

18
Q

Red Team

A

The offensive security team
Hired ethical hackers

19
Q

Blue Team

A

The defensive security team

20
Q

White Team

A

Not on a team
Manages the interactions between the red teams and blue teams
Referees

21
Q

Purple Team

A

Red and blue teams working together
Both share their findings to see how it can benefit the organization