Lesson 5 - Preparing the Vulnerability Scan Flashcards
The points at which a network or application receives external connections or I/O that are potential vectors to be exploited by a threat actor
Attack Surface
Name the stages of the lifecycle of a vulnerability
- Discover - vuln exists
- Coordinate - CVE & CWE
- Mitigate - patch released
- Manage - patch applied
- Document -
What is the time when a system is most at risk of a vulnerability, generally between patch release and patch applied is referred to as ________
Risk Gap
What is one of initial active reconnaissance techniques to gather information about network hosts and services running on open ports
Banner Grabbing
Common Tools are Wget, Nmap, Curl and netcat (nc)
examples are
wget <target IP?> -S - Print HTTP Headers
nmap -sV <target> -p <port></port></target>
What is the essential first step in active reconnaissance phase of the PenTest
Mapping the Network
What do most mapping tools use for additional enumeration from hosts
Windows Management Instrumentation (WMI) and Simple Networking Monitoring Protocol (SNMP)
Name some of the popular free and commercial network mapping tools
SolarWinds, Intermapper, WhatsUp Gold, PRTG, Spiceworks, Nmap and Zenmap
Name a popular tool that can import results of a vulnerability scan and then attempt to exploit it
Metasploit
this tool is primarily used to exploit and not necessary a good choice for scanning
What are some ways that a PenTester can identify if a Web App Firewall is in place
A WAF can give away their existence by adding a personal cookie in the HTTP packet
some WAF products such as Citrix Netscaler use a technique called Header alternation which changes the original response to confuse the attacker.
Other WAF will identify themselves by their response such as you have been blocked.
T or F if a Firewall permits port 80 it is possible to attach a payload in a HTTP Header?
True
You can set any malicious packet to port 80.
What is the technique that uses traceroute and port scanning to discover details of the internal network
Firewalking
How can a PenTester avoid Anti-Virus during a test and what specific tools would they use.
Use a Metamorphic Virus which transforms as they propagate
Obfsucate a known signature using a tool such as ObfuscatedEmpire
Use specialized tools or payloads such as fileless malware that uses OS embedded functions.
Using SET with Metasploit would be the ticket
What is a popular Attack Surface analyzer
Censys
What is the method to test firewall rules, evade intrusion detection or cause a denial of service
Crafting Packets
What are the 4 stages of Packet Crafting
- Assemble - create
- Edit - modify contents
- Pay - send/resend
- Decode - capture and analyze