CompTIA PenTest+ Certification Exam Objectives Planning and Scoping 1.0 Flashcards
What are rules of engagement when discussing penetration test?
Rules of engagement (RoE) is a document that deals with the manner in which the pentest is to be conducted.
This includes:
- Type and scope of testing
- Client contact details
- Client IT notifications
- Sensitive data handling (This may be part of the NDA as well)
- Status meeting and reports
What is a WSDL?
Web Services Description Language (WSDL)
WSDL is a XML-based interface description (XML-File Format) language that is used for describing the functionality offered by a web service.
WSDL describes services as collections of network endpoints or ports.
The goal of a WSDL is to provide a simple way for service providers to describe the basic format of request to their systems regardless of the underlying run-time implementation
What is a WADL?
Web Application Description Language
A WADL is a machine readable XML description of HTTP-based web services
WADL models the resources provided by a service and the relationships between them
WADL is intended to simplify the reuse of web services that are based on the existing HTTP architecture of the web
Often used with Representation State Transfer (REST) Web Services
It is platform and language independent and aims to promote reuse of applications beyond the basic use in a web browser
This is often used to integrate a complex enterprise system with several other other complex enterprise systems maintained by several companies
What is a SOAP File?
Simple Object Access Protocol
API Standard that relies on XML and related schemas.
Governed by XSD documents
Soap file/projects can be created from a WSDL file or single service call.
You can use these files/projects to test every aspect of your SOAP services, verify the services support commonly;y used standards, create functional and load tests
Why the fuck is the part of this certification?
What is a SDK document?
Software Development Kit
An SDK is a collection of software development tools in one install-able package
This can be utilized by a pentester by assisting with understanding when/where objects are in use which can assist with testing applications and services
This provides a set of tools, libraries, relevant documentation, code samples, processes and or guides that allow developers to create software applications on a specific platform
What is a swagger document?
This is basically API documentation that is in a technical content deliverable format.
This contains instructions about how to effectively use and integrate with APIs.
It is a concise reference manual containing all the information required to work with the API, with details about functions, classes, return types, arguments and more
Specifies the list of resources that are available on the REST API and the operations that can be called on those resources.
It also specifies the list of parameters to an operation, including the name and type of parameters, whether the parameters are required or optional, and information about acceptable values for those parameters
What is an XSD?
XML Schema Definition
This is a World Wide Web Consortium (W3C) recommendation that specifies how to formally describe the elements in an Extensible Markup Language document
This specifies how to define elements within an XML document adheres to the description of the element in which the content is to be placed.
May also be used for generating XML documents that can be treated as programming objtects.
What is an architectural diagram and how may it be used by pentesters?
This is a diagram of a system that is used to abstract the overall outline of the software systems and the relationships, constraints and boundaries between components.
It is an important tool as it provides an overall view of the physical development of the software system and its evolution roadmap
This would be provided to pentesters with a whitebox pentest.
This would assist the pentester with an overall view of the systems within an organization, the systems purpose and how they communicate
What is a SOW?
Statement of work
This is a key document that includes the scope, deliverables, price, completion date, location of work, payment schedule etc.
What is a MSA?
Master Service Agreement
This is similar to an SOW, but encompasses larger details.
This would be a contract between two or more paties that establish what terms and condition will govern all current and future activities rather than one project/test like an SOW
What is a NDA?
Non-Disclosure Agreement
This is important legal framework used to protect sensitive and confidential information from being made available by the recipient of that important
This is utilized in pentests to ensure no findings are shared publicly, fucking duh
What are export restrictions and how do they relate to pentesting?
Export restrictions are federal laws that prohibit the unlicensed export of information for reasons of national security of protections of trade
This must be confirmed when working with companies internationally
What is written authorization and why is it vital for penetration testing?
Written authorization is essentially documented permission from the stakeholders, this can be provided by executives and an organizations legal department.
This is vital as hacking is considered illegal so once written authorization is provided, get it fucking poppin
What is third-party authorization and why does it matter?
This is when an organization that requests a penetration test uses third party services and those third party services have been included in the scope of the pentest.
This primarily refers to cloud service providers as it is their infrastructure so they must be aware AND approve pentesting activity prior to commencing .
What is a goal based assessment?
This is NOT a compliance based assessment.
A goal based pentest assessment simulate real-world, covert, multi-phase attacks the same as would be performed by actual persistent hackers.
This is requested because an organization wants it, not because of compliance/government regulations.
This is utilized by organizations to test their teams/controls on their ability to detect and respond to the attack in hopes of identifying weaknesses and potential damages a real attack would cause