PenTera Flashcards

1
Q

What is the main value of PenTera?

A

It provides real security validation that supports cost effective validation/remediation. It is the best of both validation techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some of it’s main features/benefits? (7)

A
  1. It is automated software.
  2. Performed with in house staff and increases their expertise and knowledge of normal security profile.
  3. Discovers unknown and exploitable exposures.
  4. PRovides business impact analysis of vulnerabilities on the actual network.
  5. Does exactly what a human pentester would do.
  6. Can cover large networks very very fast.
  7. Agentless, all thats needed is network access. Very basic memory needs. NVIDIA GPU. No deployment!
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are PenTera’s 4 operation modes?

A

Advanced Penetration Testing (Black Box)
What If Scenarios (Grey Box)
Single Action
Vulnerability Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What vulnerability scanners does PenTera use?

A

OpenVAS, which is open source. There are also two others that are looking for exploitable vulnerabilites only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Tell the European Bank story.

A

There was a bank in Europe that did pentesting, cost several hundred thousand Euros. Then they went into a remediation period of several months. PenTera came in a week after and did a POC and it took only 15 minutes to get a domain password.

Reason is because in that 4 month remediation , they hired 20 new employees, new credentials, implemented 3rd party sofware. It cause each one of those mistakes. So thats the value of being continuous.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is PenTera’s #1 rule?

A

Do no harm. Providesa safe and controlled process, constant revalidation. System can request that a user approve an exploitation or not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the MITRE framework?

A

A framework that describes the entire hacking cycle from inital penetration through internal cycle and all the way to extracting data from the orgazniation. All attacks are described by MITRE framework. Our reporting shows integration into this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does PenTera work?

A

Automated Pentesting wheel, the algorythm of the attack pursuit.

  1. Network Recon, gathering info and intelligence. Who are the active players, what are the IPs, OS, devices, whatever informaiton. Just to understand who or what are we attacking.
  2. Vulnerability Assessment, low hanging fruit, the things that get you instant code execution. Also Unauthenticated information disclosure.
  3. Sniffing Credentials.
  4. Cracking passwords
  5. Relay, trying attacking across different hosts with same information, user privilages etc, all without ever knowing an original password.
  6. Malware injection.
  7. Lateral Movement, once you get ahold of a host or server, you can then get a whole bunch of stuff. To leverage it, you want to move laterally. Maybe then get to a domain controller.
  8. Privilage escallation.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly