Penetration Testing Flashcards

1
Q

Definition of Pen Testing?

A

Try to exploit vulnerability and gain access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Passive reconnaissance

A

Information gathering phase, from sources that are available. Other ways is dumpster diving, social engineering, cooperate sites, forums, social media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Active reconnaissance

A

Done by performing a vulnerability scan. Ping scans, Port scans, DNS Queries. Perform OS Fingerprinting to find out more info about the OS. Perform Service/Version scans to see what type of services are running on the OS identified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Exploiting the vulnerability by carrying out what types of attacks?

A

Carry out brute force attack, db injection, buffer overflow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The Process:

A

Initial exploitation = attacker gets into the system. Persistance = Attacker sets up a backdoor. The pivot = Foothold point, once an attacker is inside the network, they can move laterally across accessing files and systems within the environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Black Box

A

Pen test team doesn’t know the system, has to figure it out themselves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

White Box

A

Pen test is given info about OS, network, system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Grey Box

A

Focus on subset of network or services. Provided little information about systems, have to gather more themselves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Vulnerability Scanning

A

VS are not invasive. Port scans to identify services. Vulnerability scanning doesn’t perform exploits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Scan Types

A

Non Intrusive Scan, packet capture process. Gather info about what we are seeing on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Intrusive

A

Checking to see if the vulnerability exists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Non Credential Scan

A

don’t have username/password, try to get in without any creds. Or, provide scanner creds, tool tries to get around existing security once entered the environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly