Penetration Testing Flashcards
Definition of Pen Testing?
Try to exploit vulnerability and gain access.
Passive reconnaissance
Information gathering phase, from sources that are available. Other ways is dumpster diving, social engineering, cooperate sites, forums, social media.
Active reconnaissance
Done by performing a vulnerability scan. Ping scans, Port scans, DNS Queries. Perform OS Fingerprinting to find out more info about the OS. Perform Service/Version scans to see what type of services are running on the OS identified.
Exploiting the vulnerability by carrying out what types of attacks?
Carry out brute force attack, db injection, buffer overflow.
The Process:
Initial exploitation = attacker gets into the system. Persistance = Attacker sets up a backdoor. The pivot = Foothold point, once an attacker is inside the network, they can move laterally across accessing files and systems within the environment.
Black Box
Pen test team doesn’t know the system, has to figure it out themselves.
White Box
Pen test is given info about OS, network, system
Grey Box
Focus on subset of network or services. Provided little information about systems, have to gather more themselves.
Vulnerability Scanning
VS are not invasive. Port scans to identify services. Vulnerability scanning doesn’t perform exploits.
Scan Types
Non Intrusive Scan, packet capture process. Gather info about what we are seeing on the network.
Intrusive
Checking to see if the vulnerability exists
Non Credential Scan
don’t have username/password, try to get in without any creds. Or, provide scanner creds, tool tries to get around existing security once entered the environment.