Section 5: Monitoring, Scanning and Penetration Testing Flashcards
Which pen tester would be given source code?
White box.
Why would a shared account pose a problem to monitoring?
Prevents you from monitoring or auditing an individual.
Which pen tester would be given no access before the test but, at the last minute, is given a diagram of the desktops?
Gray box testers are given at least one piece of information.
What needs to be established prior to a pen test commencing?
Rules of engagement.
While carrying out an unannounced pen test, how does the tester know if the internal security team is on to him?
He would have regular meetings with the client, who would tell him.
What is the scope of rules of engagement?
Determines whether the pen test is black, gray or white.
If the pen test has been announced to the IT team, what information should they give regarding the test before the test start?
Pen tester would provide their IP address so that they can establish whether or not it is the pen tester or an attacker.
What is the main difference between a credentialed an a non-credentialed vulnerability scan?
Credentialed: more permissions than a non-credentialed, has ability to audit, scan documents, check account information, check certificates, provide more accurate information.
At what phase of a pen test does the tester return the systems to the original state or inform the IT team of vulnerabilities that need patching?
Cleanup phase.
What is OSINT? Is it legal?
Open-source intelligence is legal intelligence collected from the public domain.
What is the purpose of the red team?
Fulfill the role of the attacker.
What is the purpose of the blue team?
Fulfill the role of the defender.
What is the purpose of the white team?
Organize and judge the cybersecurity events, ensuring reports are accurate, correct countermeasures are recommended.
What is the purpose of the purple team?
Carry out the rules of both red and blue teams, external consultants/auditors.
When evaluating CVSS scores, which vulnerabilities should you deal with first?
Critical vulnerabilities.