Chapter 5: Penetration Testing Concepts Flashcards

1
Q

is an intrusive test where a third party has been authorized to attack a company’s network to identify weakness. The intrusive tests used by them can cause damage to your systems

A

Penetration Test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

work in an unknown environment and are given zero information on the company. They will carry out initial exploitation looking for vulnerabilities.

A

Black Box

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

work in a partially known environment as they are given limited information

A

Gray Box

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

work in a known environment. One of the purposes of white box pen testers is to test applications in a sandbox so that when they are released they do not have any vulnerabilities. They know everything about a system or application as they have access to an applications source code.

A

White Box

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

random information is inserted into an application to find out if the application crashes or gives out coding errors.

A

Fuzzing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

type of attack is when an attacker gains access to a desktop computer inside a company, which they then use to launch an attack on another computer or server.

A

pivoting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

this is where attackers move around your network looking for resources to exploit to avoid detection.

A

Lateral Movement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

this is an attack over an extended period of time.

A

Peristence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

where an attacker exploits a weakness in a system so that they can gain a higher level of privileges on it.

A

Escalation of Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

where someone actively tries to gain information about the system. For example, an attacker finds a username left on one of the corporate desktops; they then ring up the active directory team, pretending to be that person and requests a password reset.

A

Active Reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

where an attacker is constantly gathering information, without the victim’s knowledge.

A

Passive Reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

this could also use a drone with a laptop or Personal Digital Assistant so that they can map out wireless networks

A

War Flying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

where someone drives around in a car mapping out wireless access points, including those that could be vulnerable.

A

War Driving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the process hackers would use to map out the entire network, including employees, computers, IP addresses, versions of operating systems, etc

A

Footprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

this is intelligence collected legally from the public domain, such as social media or websites on the internet. It is used in law enforcement and business intelligence to help identify the source of attacks. It is only used for non-sensitive data.

A

Open Source Intelligence (OSINT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

mimics an attackers, and they try to find vulnerabilities within your company. They quite often use social engineering and phishing as a part of their attacks

A

Red Team

17
Q

team that looks to discover security vulnerabilities within the company and take action to mitigate them so the company is secure.

A

Blue Team

18
Q

organizes and adjudicates cybersecurity exercises based on the information given. They set the rules of engagement and details of the exercise.

A

White Team

19
Q

is trained to be an attacker but has a defensive posture, and their focus is on repairing vulnerabilities as quickly as possible.

A

Green Team

20
Q

can carry out the role of both blue and red teams. By combining these teams, they can discover the threat actors tactics. These guys could be auditors or external consultants.

A

Purple Team

21
Q

passive scanner that identifies the vulnerabilities or weaknesses in a system. For example, there could be a missing update for the operating system, anti virus solutions, or account vulnerabilities.

A

Vulnerability Scanner

22
Q

non profit organization that looks at different attack vectors—looks at computer flaws and can identify the platforms affected

A

Common Vulnerabilities and Exposure (CVE)

23
Q

is built into many vulnerability scanners and indicates the severity of the vulnerabilities. Always deal with critical events first.
-False positive: scan believe there is a vulnerability but when you physically check it it not there
-False Negative: scanner does not detect actual vulnerability that exists. (Zero-day)
-True positive: results of the system scan agree wit manual inspection
-Log reviews: review logs after a vulnerability scan. Log files will list any potential vulnerabilities.

A

Common Vulnerabilities Scoring System (CVSS)

24
Q

much more powerful version of a vulnerability scanner. It has higher privileges than a non-credentialed scan. It provides more accurate information and it can scan documents audit files check certificates and account information.

A

Credentialed Scan

25
Q

lower privileges than a credentialed scan. It will identify vulnerabilities that an attacker would easily find.

A

Non-Credentialed Scan

26
Q

passive and merely report vulnerabilities. They do not cause damage to your system

A

Non-Intrusive Scan

27
Q

can cause damage as they try to exploit the vulnerability and should be used in a sandbox and not on your live production system

A

Intrusive Scan

28
Q

automated tool that integrates all of your security processes and tools in a central location. An automated process that uses machine learning and artificial intelligence that makes it faster than humans searching for evidence of attacks.
-helps reduce the Mean Time to Detect (MTTD)
-uses playbooks that define an incident and the action taken

A

Security Orchestration Automation and Response (SOAR)

29
Q

dynamic process of seeking out cybersecurity threats inside your network from attackers and malware threats

A

threat hunting