General Questions Flashcards

1
Q

What is penetration testing and why is it important?

A

A penetration test is an authorized, targeted attack that evaluates an organization’s security posture, systems, and controls to identify and address vulnerabilities that could be exploited by attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain the term “vulnerability” and how it relates to penetration testing.

A

A “vulnerability” refers to a weakness or flaw in a system, application, or network that can be exploited by attackers to gain unauthorized access, disrupt operations, or compromise data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 5 different phases of a penetration test?

A

In general the 5 phases of a pentest include:
1. Planning and Recon
2. Scanning and Enumeration
3. Exploitation
4. Post Exploitation
5. Reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the concept of “privilege escalation” and how attackers might utilize it.

A

Privilege escalation refers to the process of gaining higher levels of access or control within a system than initially granted. Attackers exploit vulnerabilities to move laterally or vertically in a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is social engineering and how can it be used in a penetration test?

A

Social engineering is the manipulation of individuals into divulging confidential information or performing actions that compromise security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain the difference between a black box, white box, and grey box penetration test

A

Black box: testing with zero previous knowledge of the environment
Grey box: testing with partial knowledge of the environment
White box: testing with complete prior knowledge of the environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are 3 common web application vulnerabilities you might look for during a penetration test?

A
  1. SQL Injections
  2. Cross Site Scripting
  3. Default credentials
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How would you approach a reconnaissance phase in a penetration test?

A

The reconnaissance phase of a penetration test is focused on gathering as much information as possible about the target without directly interacting with it using passive and active recon.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an SQL injection attack and how can you detect it?

A

SQL Injection (SQLi) is a type of attack that exploits vulnerabilities in a web application’s database query functionality. It is detectable by inputting random characters into search fields, urls, or parameters and looking for output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain the concept of a buffer overflow vulnerability.

A

A buffer overflow vulnerability occurs in an application when more data is written to a block of memory, or “buffer,” than it is allocated to hold. Attackers abuse this flaw to input payloads or shellcode to gain a foothold, or escalate privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do you handle a situation where you discover a critical vulnerability during a penetration test?

A

If a critical vulnerability is discovered during testing, it should be disclosed to the client immediately so they may start their remediation process. The tester should also discuss whether or not they would like the vulnerability to be exploited as a proof of concept.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What tools and techniques do you typically use for vulnerability scanning?

A

Nessus, OpenVAS, Qualys, Nikto, BurpSuite, Nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How would you document and report the findings of a penetration test?

A

Reporting should be taking place throughout testing to ensure it’s as accurate as possible to be beneficial for the client. Screenshots, timestamps, successes and failures, and client alerts should all be included not only to find vulnerabilities but also to help clients validate that their current controls are working as intended.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe information security.

A

Information security is how companies protect their systems and information from threats. It can include the processes an organization follows to ensure security, the technology infrastructure and the roles that govern this area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the difference between encryption and hashing?

A

Encryption is the process of converting plaintext data into ciphertext using a cryptographic algorithm and a key.
Hashing is a one way process where data of any size is converted into a fixed-length output (often called a “digest”) using a hash function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the two main types of encryption?

A

Symmetric and asymmetric encryption are the two main types.

17
Q

Describe symmetric encryption and where it is typically used.

A

Using keys, symmetric encryption means users and information owners can use the same key to encrypt or decrypt information. It is ideal for applications like secure communication, file encryption, database encryption, cloud storage security, and protecting sensitive data within applications.

18
Q

Describe asymmetric encryption and where it is typically used.

A

Asymetric means there’s a private and public key to increase data protection for more sensitive information. It is typically used in secure web browsing, digital signatures, authentication and VPNs.

19
Q

Name three common Asymmetric encryption types.

A

RSA, Diffie-Hellman, and ECC

20
Q

Name three common Symmetric encryption types.

A

AES, DES, Blowfish

21
Q

What is a CVE?

A

CVE stands for Common Vulnerabilities and Exposures. It’s a publicly accessible database that lists and identifies known cybersecurity vulnerabilities in software, hardware, and other digital systems.

22
Q

What is a CVSS Score?

A

The Common Vulnerability Scoring System (CVSS) is a standardized system that assigns a numerical value to a software vulnerability to indicate its severity. CVSS scores help cybersecurity professionals prioritize which vulnerabilities to address first.

23
Q

Name 3 types of hashes commonly obtained during a pentest.

A
  1. NTLM
  2. NTLMv2
  3. Kerberos
24
Q

How do you stay up-to-date with the latest security vulnerabilities and attack techniques?

A

I use a mixture of passive and active learning to stay updated. Passively I’m on social media sites like LinkedIn, Twitter and YouTube where I follow people who post IT and cybersecurity-focused content. Actively, I regularly utilize training sites like Hack the box and Try Hack Me, while also regularly completing industry certifications.

25
Q

What are your top 3 must-have tools for an AD-centric pentest and why?

A

My top three tools would be the impacket suite, netexec and Bloodhound.

26
Q

What types of attacks is the Diffie-Hellman (DH) exchange potentially vulnerable to?

A

If not implemented and configured correctly, the Diffie-Helmman key exchange can be vulnerable to several types of attacks, the most common being a Man-in-the-Middle (MitM) attack, Logjam attack, brute-force attack, and side-channel attacks.

27
Q

What is union-based SQL Injection?

A

In a Union-based SQL injection attack, an attacker appends a crafted UNION SELECT statement to the original query to force the application to return additional data that was not intended to be disclosed.

28
Q

What is XXE and what can it be used for?

A

(XML External Entity) Injection is a type of attack that exploits vulnerabilities in applications that parse XML input. The attacker manipulates the XML data to include a reference to an external entity (which could be a file or URL), leading to various malicious outcomes like reading sensitive files, causing denial of service, or even executing remote code