Domain 6 Flashcards
__ attack starts with a dictionary attack and then adds characters e.g. camel1, camel2.. Camel99, etc.
Incremental attack
__ box testing is a software testing method that uses internal algorithms and information to conduct the test e.g. source code review.
white box
__ fingerprinting is read-only, inspecting packets passively on the wire or via a pcap file.
Passive e.g. uses TTLs, IPIDs, sequence numbers or even layer 7 packet data to determine system details e.g. p0f -s capture.pcap
__ fingerprinting sends network traffic to determine OS and service version. __ is one of the best fingerprinting tools.
Active, Nmap e.g. nmap -A 10.20.30.2
__ involve intentionally sending end users suspicious, yet harmless, emails with the primary goal of increasing the organization’s security posture rather than shaming or punishing end users.
Phishing campaigns
__ involves overtly looking for potential security weaknesses. In other words you are validating and trying to find faults or break systems, what is this called?
security testing
__ testing begins with no inside knowledge of the application e.g. can be used against compiled code with no access to the source.
black box
A __ analyzes the entire network from the inside and tries to find weaknesses and gives a complete list of risks against critical assets.
security assessment
A __ attack is initiated by the attacker against a listening service. For example in a TCP __ attack the initial SYN is sent by the attacker.
server-side attack aka service-side attack
A __ intercepts web data in real time and is the primary tool in performing dynamic web application penetration testing. This tool can be removed once testing is complete.
HTTP interception proxy
A full knowledge test is a __ test.
white box
A partial knowledge test is a __ test.
gray box
A __ says ‘IIS 7.5 running on port 80’. A __ gives more specific details about libraries, configurations and vulnerabilities that exist on the system eg ‘has XYZ libraries installed which are out-of-date and vulnerable to a buffer overflow attack. It is like a port scanner on steroids.
port scanner, vulnerability scanner
A zero knowledge test is a __ test.
black box
Describe the steps of the Server-side Exploitation Process aka ‘attack or kill chain’
“1 reconnaissance, 2 host discovery, 3 port scan, 4 OS & service fingerprinting, 5 vulnerability scan, 6 exploitation
‘Refer to ‘Server-side Exploitation Process - D6 pg 16’”