Pentesting Flashcards
1
Q
Name the three different categories of pentesting
A
- blackbox pentesting: no knowledge of the system
- greybox pentesting: partial knowledge of the system
- white box pentesting: full knowledge of the system
2
Q
What are the steps of the typical pentesting process?
A
1. Reconnaissance Gather information about the SUT, find vulnerabilities 2. Create a threat model - identify assets - use STRIDE - visualize using attack/defense trees 3. Build an attack plan: designed in the form of test cases 4. Execute attack plan / test cases 5. Report found problems Comprises: - Executive Summary - Technical details: source, probability of exploitation, impact of exposure, remediation suggestions 6. Postmortems
3
Q
Name 3 non-obvious parts of pentesting
A
- testing physical security
- wireless pentesting
- social engineering
4
Q
What is the objective of red-teaming?
A
Test the preparedness of the organization’s security and its ability to detect and respond to an attack
5
Q
What is the objective of blue-teaming?
A
Withstand attacks, proving the organization’s readiness agains security threats, or lack thereof -> more training/investment
6
Q
Name and describe the three different approaches to blue-teaming
A
- preventive: ensure security of applications and infrastructure
- reactive: detect and respond to cyber threats
- proactive: research cutting-edge threats and prepare for them