Guest Lectures Flashcards
What are the steps for protector side
Reconnaissance
Scanning & Enumeration
Exploitation &Escalation
Get interactive
Documentation & demo
Describe Reconnaissance (both)
Information gathering from public sources
Describe Scanning & Enumeration
Scanning for open services on servers
& Enumerate useful information
Describe Exploitation & Escalation
Find vulnerabilities on hosts
& Escalate privileges to gain additional access
DescribeGet interactive
Try to get ‘Interactive’ on hosts
Describe Documentation & demonstration
Resulting in a report of all the tests done
Findings of potential vulnerabilities are ranked based on severity
Potential mitigations are presented
Recommendations
Demonstrate example of exploits
Delivery of report
What are the steps for Attackers side
Reconnaissance
Weaponize & Delivery
Exploitation & Installation
Command & Control