Chapter 5: Penetration Testing Concepts Flashcards
is an intrusive test where a third party has been authorized to attack a company’s network to identify weakness. The intrusive tests used by them can cause damage to your systems
Penetration Test
work in an unknown environment and are given zero information on the company. They will carry out initial exploitation looking for vulnerabilities.
Black Box
work in a partially known environment as they are given limited information
Gray Box
work in a known environment. One of the purposes of white box pen testers is to test applications in a sandbox so that when they are released they do not have any vulnerabilities. They know everything about a system or application as they have access to an applications source code.
White Box
random information is inserted into an application to find out if the application crashes or gives out coding errors.
Fuzzing
type of attack is when an attacker gains access to a desktop computer inside a company, which they then use to launch an attack on another computer or server.
pivoting
this is where attackers move around your network looking for resources to exploit to avoid detection.
Lateral Movement
this is an attack over an extended period of time.
Peristence
where an attacker exploits a weakness in a system so that they can gain a higher level of privileges on it.
Escalation of Privilege
where someone actively tries to gain information about the system. For example, an attacker finds a username left on one of the corporate desktops; they then ring up the active directory team, pretending to be that person and requests a password reset.
Active Reconnaissance
where an attacker is constantly gathering information, without the victim’s knowledge.
Passive Reconnaissance
this could also use a drone with a laptop or Personal Digital Assistant so that they can map out wireless networks
War Flying
where someone drives around in a car mapping out wireless access points, including those that could be vulnerable.
War Driving
the process hackers would use to map out the entire network, including employees, computers, IP addresses, versions of operating systems, etc
Footprinting
this is intelligence collected legally from the public domain, such as social media or websites on the internet. It is used in law enforcement and business intelligence to help identify the source of attacks. It is only used for non-sensitive data.
Open Source Intelligence (OSINT)