Pen Testing Flashcards

1
Q

What are six tools available in Kali Linux for pen testing?

A

Nmap (Port Scanner)
OpenVAS
Metasploit
Wireshark (to capture network traffic)
Social Engineering Toolkit (SET), to pen test employees.
Aircraft-ng (assess WiFi network security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is penetration testing and what is required to carry out a pen test?

A

Simulating real attacks to assess risks associated with potential security breaches.

There must be a formal, written agreement/document between client and tester to carry out pen test.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the six stages of pen testing?

A
  1. Pre-engagement with client, talk about goals.
  2. Information gathering using existing software and tools.
  3. Vulnerability analysis (using nmap)
  4. Exploitation (Metasploit)
  5. Covering tracks.
  6. Write report from documented notes.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are four ethics when carrying out a pen test?

A

Don’t do anything to a computer that you don’t own.
Have been hired with written confirmation of permission.
Disconnect from the internet (it’s easy to mistype an IP address)
Connect to other computers using a LAN wire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly