Introduction Flashcards

1
Q

Purpose of Pen Testing

A

Security tool to validate security measures and identify gaps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Pen Testing Value to Forensic Examiners

A

see artifacts left behind by attackers
learn techniques
learn what is exploitable on a system (what can and cannot be done)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IS Involvement in Illegal Activities (3 ways)

A

Used to commit
Target / victim of activities
Witness to the activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Six States of Penetration Testing

A
Pre-engagement Activities
Information Gathering
Scanning and Enumeration
Vulnerability Identification
Exploitation
Report and Recommendations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Pre-engagement Activities

A

Scope of activities
points of contact
deliverables
Protects tester as well as client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Information Gathering Stage

A

reconnaissance about the target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Scanning and Enumeration

A

network is footprinted
active and passive
internal or external

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

vulnerability identification

A

identify those that could be exploited
May be from: misconfigurations,
inherent limitations of software
poor practice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

exploitation stage

A

taking advantage of a vulnerability to gain access to the network or compromise the system.
most challenging aspect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Report and Recommendations Stage

A
Provides documentation to the client:
Scan results
identification of vulnerabilities
how exploits were performed
actions for remediation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Tools for Scanning and Enumeration

A

Nmap
Strobe
Kismet (wireless)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Tools for Vulnerability Scanning

A

Nessus

Nexpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Tools for Exploitation

A
Metasploit
CANVAS
Cain and Abel
John the Ripper
Medusa (online password)
BackTrack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly