Pentesting Flashcards

1
Q

Name the three different categories of pentesting

A
  • blackbox pentesting: no knowledge of the system
  • greybox pentesting: partial knowledge of the system
  • white box pentesting: full knowledge of the system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the steps of the typical pentesting process?

A
1. Reconnaissance
Gather information about the SUT, find vulnerabilities
2. Create a threat model
- identify assets
- use STRIDE
- visualize using attack/defense trees
3. Build an attack plan: designed in the form of test cases
4. Execute attack plan / test cases
5. Report found problems
Comprises:
- Executive Summary
- Technical details: source, probability of exploitation, impact of exposure, remediation suggestions
6. Postmortems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name 3 non-obvious parts of pentesting

A
  • testing physical security
  • wireless pentesting
  • social engineering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the objective of red-teaming?

A

Test the preparedness of the organization’s security and its ability to detect and respond to an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the objective of blue-teaming?

A

Withstand attacks, proving the organization’s readiness agains security threats, or lack thereof -> more training/investment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name and describe the three different approaches to blue-teaming

A
  • preventive: ensure security of applications and infrastructure
  • reactive: detect and respond to cyber threats
  • proactive: research cutting-edge threats and prepare for them
How well did you know this?
1
Not at all
2
3
4
5
Perfectly