Introduction Flashcards
Purpose of Pen Testing
Security tool to validate security measures and identify gaps
Pen Testing Value to Forensic Examiners
see artifacts left behind by attackers
learn techniques
learn what is exploitable on a system (what can and cannot be done)
IS Involvement in Illegal Activities (3 ways)
Used to commit
Target / victim of activities
Witness to the activities
Six States of Penetration Testing
Pre-engagement Activities Information Gathering Scanning and Enumeration Vulnerability Identification Exploitation Report and Recommendations
Pre-engagement Activities
Scope of activities
points of contact
deliverables
Protects tester as well as client
Information Gathering Stage
reconnaissance about the target
Scanning and Enumeration
network is footprinted
active and passive
internal or external
vulnerability identification
identify those that could be exploited
May be from: misconfigurations,
inherent limitations of software
poor practice
exploitation stage
taking advantage of a vulnerability to gain access to the network or compromise the system.
most challenging aspect
Report and Recommendations Stage
Provides documentation to the client: Scan results identification of vulnerabilities how exploits were performed actions for remediation
Tools for Scanning and Enumeration
Nmap
Strobe
Kismet (wireless)
Tools for Vulnerability Scanning
Nessus
Nexpose
Tools for Exploitation
Metasploit CANVAS Cain and Abel John the Ripper Medusa (online password) BackTrack