Guest Lectures Flashcards

1
Q

What are the steps for protector side

A

Reconnaissance
Scanning & Enumeration
Exploitation &Escalation
Get interactive
Documentation & demo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe Reconnaissance (both)

A

Information gathering from public sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe Scanning & Enumeration

A

Scanning for open services on servers
& Enumerate useful information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe Exploitation & Escalation

A

Find vulnerabilities on hosts
& Escalate privileges to gain additional access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DescribeGet interactive

A

Try to get ‘Interactive’ on hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe Documentation & demonstration

A

Resulting in a report of all the tests done

Findings of potential vulnerabilities are ranked based on severity

Potential mitigations are presented

Recommendations

Demonstrate example of exploits
Delivery of report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the steps for Attackers side

A

Reconnaissance
Weaponize & Delivery
Exploitation & Installation
Command & Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly