Domain 1: Planning & Scoping Flashcards
What are the 5 Domains covered in the Pentest+ Exam?
- Planning & Scoping
- Information Gathering & Vulnerability Identification
- Attacks & Exploits
- Penetration Testing Tools
- Reporting and Communication
What is a methodology?
This is a system of Methods used in a particular area of study or activity.
ie. Systematic approach
What are the steps to the pentest methodology?
This has 4 steps:
- Planning & Scoping
- Info Gathering & Vulnerability Identification
- Attacks and Exploits
- Reporting & Communication
Are the steps for the ethical hackers methodology and pentest methodology the same?
No, these two methodologies have different steps.
What is NIST 800-115?
This is a US government recommended methodology on how pentesting should be done.
What are the steps to NIST 800-115?
This includes the steps:
- Planning
- Discovery
- Attack (additional discovery)
- Reporting
What are the three factors that go into planning a penetration test? Or any project?
These three factors go into this:
- Time
- Cost
- Quality
What are good questions to ask about the target?
What does the business do?
What are their objectives?
When planning a penetration test, what are several important considerations? Name 4.
When planning this, important considerations include:
- Who is the target audience?
- Budgeting
- Resources and Requirements
- Communication Paths
- What is the End-state?
- Technical Constraints
- Disclaimers
What are two key disclaimers to include for a pentest?
These are needed during a pentest:
- Point-in-Time Assessment
- Comprehensiveness (How complete, Which parts of the org?).
What are Rules of Engagement (ROE)?
These are the ground rules that both organizations are going to play by.
What are the 5 key areas of ROE?
This is made up of 5 key areas:
- Timeline
- Locations
- Time restrictions
- Transparency
- Test Boundaries
With respect to legal restrictions, what should you always do before conducting a penetration test?
Because of this, you should always consult your attorney before conducting any penetration test.
Under what US code is Hacking covered?
This is covered under US code, Title 18, Chapter 47, Sections 1029 & 1030. (Crimes & Criminal Procedure)
Do black hat hackers obtain written information?
No, these types of hackers do not obtain written information.
If you’re asked to conduct a penetration test on servers in the cloud that a company does not own, what is needed?
To conduct a penetration test on in this scenario, you’ll need third-party authorization.
What does SOW stand for?
This stands for Statement of Work
What does MSA stand for?
This stands for Master Service Agreement
What does NDA stand for?
This stands for Non-Disclosure Agreement
What does the SOW involve?
This is a formal document that includes the scope of what will be performed during the penetration test.