Domain 1.4 - Explain penetration testing concepts. Flashcards

1
Q

Pivot

A

an attacker targets a lower security host, where less security is in place, which in turn enables him or her use the access to the lower security host to exploit the access privileges granted to that host to attack a higher security host with better probability of success

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Passive Reconnaissance

A

Acquiring information without directly interacting with the target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This is the point when a particular exploit is successfully applied

A

Initial Exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Involves a user gaining more privileges than they should have.

A

Escalation of Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Black Box

A

The tester has absolutely no knowledge of the system and is functioning in the same manner as an outside attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

White Box

A

The tester has significant knowledge of the system. This simulates an attack from an insider—a rogue employee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Gray Box

A

This is a middle ground between the first two types of testing. In gray box testing, the tester has some limited knowledge of the target system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Difference between pen testing and vulnerability scanning

A

Vulnerability Scanning is passive.

Pen Testing is you actively trying to brake into a system (within the RoE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RoE

A

Rules of engagement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Rules of Engagement

A

Contains a scope document outlining the extent of the testing that is to be done, an permission from an administrator who can authorize such testing—in writing—to be conducted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Reconnaissance is also called?

A

Footprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

______ is nothing more that the steps taken to gather evidence and information about your target.

A

Reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

take the information you have gathered in recon and actively apply tools and techniques to gather more in depth information. such as what ports are open.

A

Scanning and enumeration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Banner grabbing

A

if footprinting fails you can do foot printing to get IP addresses and OS information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In this phase true attacks are leveled against the target.

A

Gaining access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Maintaining Access

A

Hackers attempt to ensure they have access back into the system they have compromised.

17
Q

Covering your Tracks

A

The final phase when attackers attempt to conceal their success and avoid detection. includes deleting logs etc.

18
Q

WHOIS

A

can tell you IP addresses, CEOs name, operating systems in a business.

19
Q

You are conducting a penetration test on a software application for a client. The client provides you with details around some of the source code and development process. What type of test will you likely be conducting?

A. Black box
B. Vulnerability
C. White box
D. Answer A & C

A

C. White box