Pen Testing Flashcards
What are six tools available in Kali Linux for pen testing?
Nmap (Port Scanner)
OpenVAS
Metasploit
Wireshark (to capture network traffic)
Social Engineering Toolkit (SET), to pen test employees.
Aircraft-ng (assess WiFi network security)
What is penetration testing and what is required to carry out a pen test?
Simulating real attacks to assess risks associated with potential security breaches.
There must be a formal, written agreement/document between client and tester to carry out pen test.
What are the six stages of pen testing?
- Pre-engagement with client, talk about goals.
- Information gathering using existing software and tools.
- Vulnerability analysis (using nmap)
- Exploitation (Metasploit)
- Covering tracks.
- Write report from documented notes.
What are four ethics when carrying out a pen test?
Don’t do anything to a computer that you don’t own.
Have been hired with written confirmation of permission.
Disconnect from the internet (it’s easy to mistype an IP address)
Connect to other computers using a LAN wire