Technical Questions Flashcards

1
Q

ROE

A

The Rules of Engagement, or ROE, are meant to list out the specifics of your penetration testing project to ensure that both the client and the engineers working on a project know exactly what is being testing, when its being tested, and how its being tested.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SOW

A

Statement of work
This document is a formal agreement for you as a penetration tester to start your work. The purpose of this document is to define:
The expectations from the client
The scope of work
The schedule of the work
The pricing
The deliverables at the end of all the penetration tests
The payment terms
The legal agreements
Finally, the signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Differences between vulnerability assessment and penetration test

A

A vulnerability assessment just
identifies that there might be something an adversary can exploit, and a pentest shows
that it can be exploited and provides ways to mitigate the impact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Where do you go to research the latest vulnerabilities, and why?

A

Your answer could include following specific security researchers on Twitter, following blogs such as Krebs and Threatpost, podcasts you listen to, and more.
There isn’t usually a wrong answer here, but the interviewer does want to see how you stay current on recent vulnerabilities and the latest cybersecurity news.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Do you have a favorite hacker in history, and why are they your favorite?

A

This question is asked to see how passionate you are about the history of hacking.
This is another question with no wrong answer, and you might not have a favorite,
which is OK. An example of a famous hacker in history is Kevin Mitnick.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some areas you are planning to improve in?

A

This question is being asked to see whether you are a continuous learner and to see how you identify areas of self-improvement. Even as a junior pentester, you should expect to be learning something new continuously, and you need to be able to assess your skill set and know the areas you need to improve in. For example, I’m good at social engineering but not so good at programming. As a pentester, I focused less practice on social engineering since that came naturally and focused instead on becoming better at coding so that I could write my own tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

I need you to perform an internal pentest and I have an ROE document in place.
What do you do next?

A

The interviewer is identifying your methodology for approaching a pentest with
this question. If you’re interviewing for your first pentesting job, you always want to
make sure you review and verify the ROE (scoping) document to know what is off
limits and what you can attack. Clients sometimes list wrong IP addresses, so you
also need to verify that anything listed as available to attack is actually owned by the
client. Otherwise, you can get yourself into legal trouble

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the types of cross-site scripting (XSS), and which is the most
dangerous?

A

There are three types of XSS, which are reflected, stored, and Document Object
Model (DOM)-based. The specific danger of each depends on the situation. Stored
XSS is typically more dangerous because it is stored on the server side and the payload
only has to be stored once to continue infecting anyone connecting to the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Can you explain XSS as though you were talking to a 10-year-old kid?

A

This question is designed to see whether you can break down complex cybersecurity
topics for stakeholders. Here in the US, statistics vary, but most people understand it
at an 8th-grade level or below, which means you have to communicate information
to stakeholders as though they are 10-year-old kids in many situations. I would
explain this one with something like this statement:
With XSS, you can log in to anyone’s account with a username and password. This
is important to fix because an attacker can use attacks such as XSS to perform illegal
transactions, which can lead to the company losing money.
When you’re presenting to corporate stakeholders, you can also mention how
XSS can lead to cookie stealing and be used to perform privilege escalation and in
phishing attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can you perform XSS if tag script or alert tags are blocked?

A

If script tags are blocked, you could use things such as image payloads or
video payloads. Instead of using alert tags, you could use tags such as prompt and confirm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some ways to mitigate XSS attacks?

A

You can use encoding, validate user input properly, sanitize output, and use web
application firewalls (WAFs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What was the last script that you wrote, and what was its purpose?

A

I want to stress here that as a junior pentester, you don’t have to have coding skills,
but if you want to be successful in the long term, it’s important for you to learn at
least one language so that you can write new tools on the fly during an engagement.
This question is used to assess your scripting skills, and you might write something
simple such as a keylogger that you can show off during the interview

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some types of threat actors?

A

This question is usually looking for your broader knowledge of threat actors, so
mentioning nation-state groups, state-sponsored groups, hacktivists, organized
criminal gangs, script kiddies, and insider threats is good for this question. It’s also
a good idea to stay current on cybersecurity breaches and the threat actors behind
them, or at least know a few of the well-known threat actor groups (that is, APT29)
from searching a website such as the MITRE Adversarial Tactics, Techniques, and
Common Knowledge (ATT&CK) website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do you scope out a pentesting engagement?

A

The first step is typically determining why the company wants a pentest. Are they
just doing the engagement to fulfill some type of legal or compliance requirement?
Does the organization have an initiative to improve overall organizational security?
Knowing why they want the pentest helps you understand how much buy-in you
will have from their team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some ways you can gather information on a target during a pentest?

A

Some of the common ways to get information on a target include more passive
activities, such as OSINT, and more active techniques, such as running a Network
Mapper (Nmap) scan. Your specific actions will depend on the scope of the pentest.
If you get this question in an interview, I would suggest asking a question back to
the interviewer about the scope of the pentest because that will help guide your
answer to this question.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is social engineering?

A

Social engineering is basically the use of human psychology to influence someone
else’s behavior.
Components of a successful social engineering attack include an evaluation of
the target and their weaknesses, the ability to perform pretexting, the ability to
exploit human psychology for the attacker’s benefit, the ability to build a perceived
relationship with the target, and the ability to get the target to take some sort of
desired action
Here’s a simple example of social engineering. You and I are at a coffee shop, and I
convince you to buy me a cup of coffee. Perhaps I mention I left my wallet at home
because I’m stressed out that my kid is in hospital, and you feel sorry for me and buy
the cup of coffee because you have little kids of your own. In this example, I’m just
getting a cup of coffee, but what if I sent you an email with a malicious GoFundMe
link embedded with a keylogger and used the same story about my kid in the
hospital? You might click the link to donate, be redirected to the real GoFundMe
page, and make a donation to help. Meanwhile, I’ve dropped malware on your system
and now track every keystroke you make as you log in to your bank account to see
whether the GoFundMe donation has registered on your account balance.
One thing to keep in mind is that during an interview, you might be asked to
conduct a social engineering attack and then continue your (simulated) attack
through the organization after gaining initial entry. The next steps after entry
can include things such as enumerating user accounts on the system to identify
administrator accounts, privilege escalation, network enumeration, deploying
ransomware, and enumerating Active Directory with a tool such as BloodHound
(https://github.com/BloodHoundAD/BloodHound)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are some ways to perform physical pentesting?

A

Before answering this question, it’s usually best to start with a short overview of what
could happen if physical security were breached. If you breach the physical security
of a target, you could steal devices, documents, and data, take photographs or videos
of restricted areas or proprietary systems and additional security defenses being used
to protect them, and then plant things such as keyloggers (via a Universal Serial Bus
(USB) drop attack) and set up rogue devices on the target’s network.
Common physical security controls that are put in place to stop attackers include
door locks (physical/electronic), surveillance cameras and security alarms, security
guards, perimeter walls and gates, security lights, motion sensors, and mantraps.
Physical pentesting can include dumpster diving, lock picking, cloning badges,
bypassing motion detectors, jumping fences or walls, bypassing or interrupting
the feeds of surveillance, cameras, and radio-frequency identification (RFID)
replay attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the types of social engineering?

A

There are several types of social engineering attacks, including the following:
- Phishing attacks are typically done via email whereby the attacker is looking to
obtain sensitive information or get the recipient to perform a specific action (such
as transfer money to a bank account controlled by the attacker). There are several
forms of phishing attacks, such as these:
- Phishing emails are the most common form of phishing attacks, and you will
typically see them done against a broad range of targets—in the case of spam—
or more narrowly focused—in the case of business email compromise (BEC)
attacks. BEC attacks usually involve spear-phishing and whaling. Phishing attacks
are the most common entry point of attacks, including ransomware attacks.
- Spear-phishing attacks are targeted phishing attacks against a specific person
or group. The attacker would need to gain information about the target and
craft a message, across any medium, that would entice the victim to take some
sort of action. An example would be the attacker knowing you love drinking
coffee from Starbucks. Through social media posts, the attacker identifies two
locations you typically go to and then sends you a coupon link through social
media for a free cup of coffee at one of those locations. In one of my training
programs, a student was able to get an instructor to click a fake link with a
similar type of attack for a free donut. Fortunately for the instructor, this was
done in a controlled setting and the link was not really malicious.
- Another example of a spear-phishing attack is the threat actor noticing
employees at a company order from the same restaurant at lunch each day
and then compromising the restaurant’s website with malware so that each
employee visiting the website gets their system infected. This is known as a
watering-hole attack.
- Whaling attacks are another form of a targeted phishing attack. The main
difference between whaling attacks and spear-phishing attacks is that a whaling
attack focuses on a powerful or wealthy individual, such as the chief executive
officer (CEO) of a major company. A whaling attack is often harder to pull off
successfully, but the financial reward for the attacker could be in the millions.
- Tailgating is another social engineering attack where the adversary gains access
to a secure area by following an authorized employee in. In this case, the employee
does not know the attacker has followed them in, and this can happen if the
employee opens the door wide or if it takes time for the door to close after the
authorized employee. This attack is hard to pull off if there are security guards or if
the authorized employee is situationally aware.
- Piggybacking is an attack whereby the victim is tricked into letting the attacker in.
This can happen a lot at larger companies, where the attacker mentions they work
in a different department and just forgot their badge at home. Forgetting a badge
or other employee ID happens a lot in companies, and many employees would
empathize with the attacker and let them in the door.
I worked at a healthcare organization where every day, someone would forget their
badge to scan in and wait at the door for someone else to let them in. Even back
then, I implemented zero trust and would decline to let the person in, even if they
worked in my department. My argument was that I didn’t know whether HR had
fired them last night and they were unauthorized to be in the building. Needless
to say, that didn’t make me popular with some coworkers, but they did understand
my point of view a few months later when a man with a gun was able to gain entry
into the building because someone else thought he worked there and had just
forgotten his badge.
Some other attacks you might see referenced in certification study material
are hoaxes, elicitation, spam, and impersonation. In my experience, these are
normally coupled with the previous ones mentioned. For example, a hoax is
simply where the attacker presents a fictitious situation. An example of this is
when you receive a phishing email from your bank stating there is an issue with
your account, and you need to verify your identity by logging in to your account
from a link in the email. If you click the link, you are taken to a fake login page
that will capture your username and password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How can a company protect against social engineering attacks?

A

Some ways to help protect against social engineering attacks are two-factor
authentication (2FA), security awareness training, granular access control, logical
controls (such as blocking USB ports on hosts), and proper security policies.
When I did security awareness training for healthcare companies, I would always
relate each recommendation to how it impacted the employees’ day. For example, I
would ask the nursing staff what would happen to their license if they shared their
login credentials with me and I went in and altered 90% of their nursing notes
on patients. How would they know which notes I had altered? What would local,
state, and federal agencies do to them and their license? How would it impact their
patients and the care that they received? When you put training into context for
people, they are more likely to follow best practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the content of a well-written pentest report?

A

A pentest report is important and should contain the following items:
‚ A cover page.
‚ An executive summary should be one page or less and should highlight exciting
pieces of the report’s findings. Think of this part as marketing, and you need to get
the stakeholder to buy what you are selling so that they finish reading the full report.
‚ A summary of vulnerabilities that you found. A simple pie-chart graphic works
well for this if you categorize the vulnerabilities.
‚ Details of the testing team and tools that were used in the engagement.
‚ A copy of the original scope of work that was signed as part of the contract. It’s
helpful to have this in the report as a reference for the client.
‚ The main body content of the report that goes into detail in terms of your findings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How can you identify whether a web application that you came across might be
vulnerable to a blind Structured Query Language (SQL) injection attack?

A

You can use the sleep command, and if the web app sleeps for a period of time, it
could indicate it is vulnerable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a MITM attack?

A

In a man-in-the-middle (MITM) attack, the attacker acts as a relay between the
client and the server. You can use things such as HyperText Transfer Protocol
(HTTP) Strict Transport Security (HSTS) and digital signatures of packets to
protect against MITM attacks. Some popular tools for performing MITM attacks
are Wireshark, Ettercap, Nmap, Metasploit, and Netcat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is CSRF?

A

Cross-Site Request Forgery (CSRF) attacks take advantage of the trust
relationship that is established between the user and a website. The attacker uses
stored authentication in browser cookies on the user’s side to authenticate to the
website. An example is you have a login to a shopping website and you store the
authentication in cookies in your web browser so that each time you visit the
shopping website, it authenticates you and takes you into your account. An attacker
could craft a Uniform Resource Locator (URL) with a parameter to increase the
number of items added to your shopping cart when you are purchasing an item. You
might not notice this and end up purchasing the additional items

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is an open redirect attack?

A

In an open redirect attack, the parameter values of the HTTP GET request allow
information to be entered that can redirect the user to a different website. The
redirect could happen once on the loading of the website page or after the user has
taken an action such as logging in to the site.
In this example, the RelayState parameter is not being validated by the website,
so an attacker could replace the legitimate website with their malicious one and the
user would be redirected to the malicious site.
Correct URL: https://www.microsoft.com/login.
html?RelayState=http%3A%2F%2FMicrosoftGear.com%2Fnext
Attacker URL: https://www.microsoft.com/login.
html?RelayState=http%3A%2F%2FBadGuyWebsite.com
This type of attack is commonly used in phishing emails, where the victim is
redirected to a fake login page (for their bank, PayPal, and so on) after clicking
a link in the email. After they enter their login credentials, the victim is then
redirected to the real website and asked to enter their login credentials again

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which cookie security flags exist?

A

The HttpOnly flag can be used to block access to the cookie from the client side,
which can mitigate XSS attacks.
The Secure flag forces cookies to be transported over HTTP Secure (HTTPS)
instead of HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

How do you bypass common file upload restrictions in web applications?

A

One way to bypass restrictions is using Burp Suite to intercept and alter the request
parameters to bypass the restriction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the last pentest tool that you’ve improved, fixed, and/or contributed to?

A

This question is targeted toward experienced pentesters, and it’s designed to help
the hiring manager identify how you are giving back to the community

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is a Boolean blind SQL injection attack?

A

In a Boolean blind SQL injection attack, the attacker sends a SQL query to the
database to identify a true or false response. If the database is vulnerable to a
SQL injection attack, it will not return any information, and the attacker can then
send a query with a true condition, such as 1=1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

If you were able to successfully carry out the preceding blind SQL injection attack
and gained access to the company network, where would you go from there?

A

This question is designed to test your methodology. After gaining initial access and
establishing a shell, I would enumerate the domain controllers (DCs) and domain
using something such as BloodHound. Next, I would dump local password hashes
and do a password spray attack (using something such as Mimikatz) to gain access
to a machine with a domain admin token. I would then establish a session with a
DC and dump credentials to gain domain account admin access and then continue
causing chaos from there. A domain admin account allows me to control virtually
anything that is integrated with or controlled by Active Directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Can you identify the most common HTTP methods and how they can be used in
attacks against web applications?

A

Common HTTP methods include GET, POST, PUT, DELETE, and TRACE. GET
and POST are used in attacks by modifying the parameters. An attacker could use
PUT to upload arbitrary files on the web server. DELETE could be used in a denialof-service (DoS) attack. TRACE could be used to return the entire HTTP request,
which would include cookies. An attacker could leverage TRACE to perform a
cross-site tracing (XST) attack where the attacker uses XSS to retrieve HttpOnly
cookies and authorization headers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What are the differences between attacking a web application and an application
programming interface (API)?

A

Web applications have traditionally been one request to one server, so you just
needed to protect one application. With APIs, you have hundreds of requests to
hundreds of microservices, which means you now have to protect hundreds of small
applications. The main API security flaws being exploited are around authentication
and authorization, and each microservice needs to verify identity and permissions
before granting access. A challenge in API security is visibility into your APIs
because shadow APIs might exist (those that developers have forgotten about), and
if they are public-facing, they can be exploited.

32
Q

Describe the last business logic vulnerability that you found.

A

Business logic vulnerabilities are weaknesses in the design and/or implementation
of an application. An example of a business logic vulnerability is an application that
cannot handle unexpected input from a user properly, such as a banking application
that allowed a negative value when transferring money between accounts. An attacker
might then leverage this vulnerability to remove money from the victim’s account.

33
Q

How do you measure the results of a pentest?

A

It depends on what the organization is looking to measure. Common things to track
are the criticality of findings, how many issues that surfaced in the pentest actually
get fixed, what types of vulnerabilities and exploits are being discovered, and which
new issues have been identified since the last pentest.

34
Q

What are the phases of pentesting?

A

This question could have different answers, depending on the hiring manager
having real pentesting experience or just passing a few knowledge-based
certification exams.
If you go by the penetration testing execution standard (PTES), there are seven
phases of pentesting, which are pre-engagement, intelligence gathering, threat
modeling, vulnerability analysis, exploitation, post-exploitation, and reporting.
If you take a popular knowledge-based certification exam, the phases are
reconnaissance, scanning and enumeration, gaining access, maintaining access, and
covering tracks

35
Q

How can you leverage threat modeling in a pentest?

A

Threat modeling helps the pentester identify critical business assets and the impact
on the organization if those assets are compromised by an attacker. It also helps you
identify threat actors most likely to target the organization. This helps the pentester
better prioritize vulnerabilities found during the engagement.

36
Q

Compare bug bounty programs and a pentest

A

Bug bounty programs can typically find more vulnerabilities over time than a
pentest because they involve continuous testing. You will also get a more diverse
group of skill sets, and the payouts of many bug bounty programs are far less than
the cost of a single pentest

37
Q

What is an HTTP Desync attack?

A

HTTP Desync attacks abuse the method in which a chain of HTTP servers interpret
consecutive requests, especially around the boundaries of requests. As an example,
an attacker could send a request with a transfer-encoding header that doesn’t meet
values specified in Request for Comments (RFC) 7230. This can help the attacker
hide the encoding of their payload from the WAF

38
Q

What is the difference between vertical and horizontal privilege escalation?

A

Horizontal privilege escalation refers to bypassing the authentication mechanism for
users that have the same level of privilege and taking over their accounts. Vertical
privilege escalation refers to escalating privilege to a higher level of access, such as a
standard user now having the same level of access as the administrator account.

39
Q

How often should organizations have an external pentest performed?

A

This answer depends on their compliance requirements, but generally, this should
happen at least once a year and preferably on a quarterly basis. One thing you
will notice when you’re working as a pentester is that many companies will not fix
any of the issues you report, so you might come back a year later and identify the
same issues.

40
Q

What are the legal considerations for pentests?

A

For pentests, you need to have a contract in place before starting the engagement.
The contract is often referred to as your get-out-of-jail-free card, but keep in mind
that you could still be arrested for performing a pentest even if it’s authorized.
Some other key legal considerations are outlined here:
‚ Does the client really own the systems and/or applications they want you to test?
‚ Will the client assume liability for any interruptions or damage that occur as a
result of the pentest, or are you responsible?
‚ What happens when third-party data or services are damaged as a result of the
pentest? Who is responsible?
‚ Do you need a private investigator license to perform a pentest?
‚ Which jurisdiction will be recognized for the pentest? For example, if you are testing
offices in Alabama and Virginia, which state’s laws will apply to the engagement?
‚ Who owns any new methods or tools that are developed as a result of the
pentest engagement?
‚ Is there a duty to warn third parties about pentest results based on the findings?
For example, you discover a high-severity zero-day exploit as a result of a pentest.
Do you report it?

41
Q

Which common vulnerabilities can you exploit in pentests?

A

This can include things such as default or weak credentials, credential reuse
(credential stuffing attacks), security misconfigurations (this happens a lot with
cloud environments), poor patch management practices, and social engineering
of the organization’s staff. When I worked as a pentester, I found that I had greater
success in engagements by targeting the human element (layer 8) than focusing on
the technical side

42
Q

What is a buffer overflow attack?

A

Buffers are memory storage regions that temporarily hold data while it is being
transferred from one location to another. A buffer overflow occurs when the volume
of data exceeds the storage capacity of the memory buffer. As a result, the program
attempting to write the data to the buffer overwrites adjacent memory locations.
For example, a buffer for login credentials may be designed to expect username
and password inputs of 8 bytes, so if a transaction involves an input of 10 bytes
(that is, 2 bytes more than expected), the program may write the excess data past
the buffer boundary.

43
Q

How does tracerout or tracert work?

A

Traceroute and tracert work to determine the route that goes from the host computer to a remote machine. It’s used to identify if packets are redirected, take too long, or the number of hops used to send traffic to a host.

44
Q

How can you encrypt email messages?

A

You can use PGP to encrypt email messages or some other form of a public private key pair system where only the sender and the recipient can read the messages.

45
Q

What kind of penetration can be done with the Diffie Hellman exchange?

A

A hacker can use the man in the middle attack with the Diffie Hellman exchange since neither side of the exchange is authenticated. Users can use SSL or encryption between messages to add some kind of security and authentication.

46
Q

What are some ways to avoid brute force hacks?

A

You can stop authentication after a certain amount of attempts and lock the account. You can also block IP addresses that flood the network. You can use IP restrictions on the firewall or server.

47
Q

What is the difference between asymmetric and symmetric encryption?

A

Symmetric and asymmetric encryption are the two main types. Using keys, symmetric encryption means users and information owners can use the same key to encrypt or decrypt information. Assymetric means there’s a private and public key to increase data protection for more sensitive information.

48
Q

What is pentesting in your own words?

A

First, I evaluate the software that requires testing to decide which technique to use. In my previous role, I primarily performed web application testing, where I would spend a lot of time with reconnaissance and scanning to identify any vulnerabilities. Once complete, I’d investigate what data was vulnerable and try to hack as much as possible. With this information, we could decide on the risk level and implement security measures

49
Q

What’s most important in data protection?

A

I think strong network security protections are important to guard against malicious attacks against our databases. Even more important might be intrusion detection systems, as sometimes threats are inevitable. These systems can help companies respond to threats quickly and monitor safety regularly.

50
Q

What is XPath Injection in penetration testing?

A

XPath injection is a type of vulnerability in which malicious input is used to inject unintended commands into an XML document. This can be done by injecting any user-supplied string directly into an XPath expression, or even by using specially crafted elements and attributes. Injection attacks are one of the most common methods used to exploit software vulnerabilities because they allow attackers to run arbitrary code as part of the attack payload.

51
Q

Explain Web Application Scanning with w3af in pen-testing?

A

w3af is versatile and can be used for a number of purposes in pen-testing. For example, it can be used to identify vulnerabilities in web applications before conducting a full attack, to check for signs of malware and phishing attacks, and to monitor for security issues. In addition, w3af can be used to identify vulnerabilities in outdated or insecure web applications.

52
Q

What is Hijacking Execution in pen-testing?

A

Hijacking execution in penetration testing is a technique that attackers use to gain access to systems or networks. Hijacking execution takes advantage of the privileges and permissions granted to an intruder by default on compromised machines, which can then be used for malicious purposes. Attackers may also leverage user accounts created specifically for reconnaissance or attack tasks, as well as preexisting administrative rights on target machines. By taking advantage of these vulnerabilities, hijackers can bypass common security controls and compromise systems without being detected.

53
Q

Write a few points about SEH Overwrite Exploits?

A

SEH Overwrite Exploits are a type of security exploit that allows an attacker to execute code on a target system in memory, even if the target process has normal read, write, and execute permissions.
These exploits take advantage of security vulnerabilities in the operating system or application.
They can be used to run malicious code on a targeted system, steal data, or implant malware.
A lot of remote code execution (RCE) exploits are available for the Server Executable Hypervisor, or SEH.

54
Q

What is POP POP RET in penetration testing?

A

POP POP RET is a tool that can be used to detect and exploit vulnerable applications. To use this tool, you will first need to scan the target network for vulnerable applications. Once you have identified the vulnerable applications, you can use POP POP RET to exploit them. By exploiting the vulnerabilities, you can gain access to the systems and data that are protected by the vulnerable applications.

55
Q

What is meant by DNS Reconnaissance in penetration testing?

A

When we conduct a penetration test, the most important task is understanding the internal network structure and DNS configuration. This is done through various forms of DNS reconnaissance, also known as DNS sniffing. DNS reconnaissance can be used to gather information about hosts and name servers, as well as their associated configuration. This can include things such as the type of DNS server used, the name server addresses, the primary and secondary name servers, and the A, AAAA, and CNAME records.

56
Q

What is John the ripper tool and how penetration testers are using it?

A

John the Ripper is a computer security tool used by penetration testers to test the security of a computer system. It is a command-line tool that can be used to test the security of various file formats. It can also be used to extract data from a target computer.

57
Q

What is Pass the Hash in penetration testing?

A

Pass the Hash is a popular cyber security testing practice used to find vulnerable systems and test whether they can be exploited by attackers. It works like an attacker tries different passwords on a target system in order to see if any of them are valid – or, more accurately, triggers the authentication process required for access to that system. By doing this, the tester can then gain access to the account without having to actually break into the system.

58
Q

What is SSHExec?

A

SSHExec is a remote shell interface implemented in the SSH protocol. It allows an attacker to run commands on the target machine over SSH without having to be physically present on that system. SSHExec works by establishing a connection between the attacker’s system and the target system. Once the connection is established, the attacker can run commands or scripts on the target system.

59
Q

What are Socks4a and Proxy Chains?

A

A socks4a and proxy chains are two types of network analysis tools that are used for penetration testing. socks4a works as a proxy and can intercept packets leaving and entering your targeted systems. It can be used to map the flows of traffic and can be used to examine protocols and handshake data. On the other hand, proxy chains can be used to combine socks4a with various command-line tools to perform various actions on the proxy such as injecting packets, capturing packets, and mangling packets.

60
Q

What is Local File Inclusion (LFI)?

A

Local file inclusion (LFI) is a technique used by attackers to include malicious files in the request packets sent to vulnerable systems. This can allow an attacker to access privileged information, or even execute arbitrary code on the target system. LFI vulnerabilities are particularly prevalent in web applications and can be exploited remotely by attacking users who visit affected websites. By including specially crafted requests within HTTP requests, an attacker can inject scripts into pages served up by the application, giving them full control over those pages and any data stored within them.

61
Q

What is Remote File Inclusion (RFI)?

A

Remote File Inclusion (RFI) is an exploit technique used in penetration testing whereby a malicious user includes files on the target server that are not actually part of the web application or system being tested. These files can be stored anywhere, but they must exist outside of the document root. This allows attackers to inject arbitrary script code into pages served up by vulnerable servers – potentially allowing them to steal data, execute commands as privileged users or even take over entirely compromised systems.

62
Q

What is War-FTP?

A

War-FTP is a program used in penetration testing which allows users to FTP through an insecure network. FTP is an application used to transfer files between computers. War-FTP is a command-line tool and can be used for emulators such as Wireshark, Carrier Grade NAT (CGNAT), or TAP devices.

63
Q

What is USSD Remote Control?

A

USSD Remote Control is an amazing tool that can be used during penetration testing. USSD Remote Control uses the unique signaling protocol of USSD over GPRS. This can be used to communicate with various devices over GPRS. The benefits of using USSD Remote Control in penetration testing are manifold. USSD Remote Control allows the penetration tester to control various devices remotely. This includes devices that are not always connected to the internet. USSD Remote Control is a very efficient tool and can be used to control a large number of devices. It also allows the penetration tester to perform various tasks remotely. For example, the penetration tester can use USSD Remote Control to scan devices for vulnerabilities.

64
Q

What is EternalBlue SMB Remote Windows Kernel Pool Corruption?

A

EternalBlue is a Windows remote code execution vulnerability that was published by Microsoft in March of 2017. EternalBlue exploits an SMB protocol memory corruption issue and allows attackers to gain control of vulnerable systems. This exploit can be used against both Server 2008 R2 SP1 and later versions, as well as Windows 10 Anniversary Update and earlier releases. EternalBlue has been exploited in attacks on Linux machines, macOS devices, Android phones/tablets, iOS devices (including the Apple Watch), routers, car drivers’ computers running firmware from Juniper Networks Inc., smart TVs from Sony Corp.

65
Q

Explain Incognito attacks with Meterpreter?

A

An Incognito attack is an effective way to test the security of a system without the fear of being detected. By using Meterpreter to execute an Incognito attack, you can test the security of a system without the victim knowing about it.

66
Q

What is Broken Access Control Vulnerability?

A

Broken access control is an attack vector used in penetration testing. It refers to the situation when an intruder gains unauthorized access to a system or network by exploiting a vulnerability that has been identified and fixed, but where some entry point remains unpatched. Broken Access Control (BAC) attacks can be carried out through exploit kits, phishing emails with embedded malicious attachments, weak passwords on systems and websites, social engineering tricks such as getting users to reveal their password on-demand or via chatbots, or even simple bypass of employee self-protection measures like two-factor authentication.

67
Q

What is Software and Data Integrity Failures vulnerability?

A

Software and data integrity failures vulnerability (SDF) is a type of security vulnerability that can occur when software or data are not properly protected from unauthorized access. SDFs arise when an attacker gains access to sensitive information, such as passwords or user account details, by exploiting one of the vulnerabilities in the system. When these confidential records are compromised, it could lead to serious consequences for the users involved. A breach involving personal data can have devastating effects on individuals’ careers and social lives.

68
Q

What is Server-Side Request Forgery vulnerability?

A

Server-Side Request Forgery (SSRF) is a vulnerability in web applications that allows an attacker to inject illegitimate requests into the application, resulting in unauthorized access or modification of data. An attacker can exploit this vulnerability by tricking the user into submitting a specially crafted request to the server. SSRF attacks are typically used as part of cross-site scripting (XSS) attacks and can be very successful if executed against privileged accounts with admin rights on target websites.

69
Q

What is Frame Injection vulnerability?

A

Frame injection vulnerability is a type of security flaw that allows an attacker to inject arbitrary frames into the flow of traffic passing through a website or application. This can be accomplished by injecting frames into the response sent from the server to the browser, or by manipulating elements in an HTTP request header. Frames are small pieces of HTML or XML that make up document content and are displayed within a web page as if they were part of the document itself. By inserting malicious frames into these responses, attackers may be able to inject code directly onto websites and applications users’ screens-causing them serious personal loss of injury, data theft, and even loss of revenue for businesses online.

70
Q

What is URL Redirection vulnerability?

A

URL Redirection vulnerability is a type of security vulnerability that allows an attacker to redirect the user’s browser to a different website than was intended. This attack can be performed by tricking the victim into clicking on a malicious link or opening an illegitimate file. Redirections may also occur when users attempt to access pages that have been moved from their original location, due not only to human error but also to intentional manipulation by hackers and/or cybercriminals. URL redirection vulnerabilities are often used in malware attacks because they allow attackers to install infected files on targeted machines without the user ever knowing about it.

71
Q

Explain How Data is Protected During and after Penetration Testing?

A

Security professionals refer to data protection as its own discipline unto itself – protecting confidential personal information, sensitive company files, and secure network communications. Protecting data involves ensuring confidentiality, integrity, and accessibility. Confidentiality ensures that data is kept secret from unauthorized parties who might try to steal or otherwise misappropriate the information, either personally or via the organization. Information security specialists have traditionally protected systems using access controls, firewalls, passwords, encryption/decryption techniques, intrusion detection software, etc.

72
Q

Explain How Risk Analysis and Penetration Testing Are Different from Each Other?

A

Risk Analysis and Penetration Testing are both important aspects of information security, however, they have some key differences. Risk Analysis is the process of identifying, quantifying, and assessing the potential risks associated with a security vulnerability, system, or process. Penetration Testing is the process of testing a system’s vulnerability to attack by trying to exploit discovered vulnerabilities. Penetration Testing can be used to find vulnerabilities that could be harmful if exploited.

73
Q

What are the commonly targeted ports during penetration testing?

A

FTP (port 20, 21)
SSH (port 22)
Telnet (port 23)
SMTP (port 25)
HTTP (port 80)
NTP (port 123)
HTTPS (port 443)

74
Q

What are the Methods of detecting and defending against Rootkits?

A

How do you detect a rootkit: There is no single detection method that is guaranteed to work for every rootkit. However, some common methods used to detect a rootkit include scans with anti-malware programs, looking for unusual program behavior, and checking for modified files.
How do you protect yourself from a rootkit attack: There is no foolproof way to prevent a rootkit attack, but there are several steps that can be taken to protect oneself. These steps include ensuring that the computer is installed with up-to-date antivirus software, not downloading unknown software, and using caution when using unknown or unverified applications.

75
Q

What is Hail Mary function (Armitage) in penetration Testing?

A

The hail Mary function can be used in penetration testing to move files or streams to and from servers. The hail Mary function can be used to perform a variety of tasks, such as copying files, transferring files over a network, authenticating to a server, moving files to and from a target, and performing other tasks.

76
Q

What are the functions of the Java applet popup in penetration testing?

A

The process of creating a Java applet popup is simple. First, the tester must create a Java program that will be used as the popup. Next, the tester must create a file with the .html extension and place it in the same directory as the Java program. The file must have the same name as the Java program, but with the .html extension. The file should be divided into two parts. The first part contains the code that will be used to create the Java applet popup, and the second part contains the HTML code that will be used to display the Java applet popup.