Threat Management and Cybersecurity Resources Flashcards
Red Team
Attacker of the penetration test
Blue Team
Security workers that are defending attacks from red team
Penetration test
Tries to exploit vulnerabilities like a threat actor would to find deep vulnerabilities
White Team
“Referee” of test
Enforces rules of the test
Purple Team
Provides real-time feedback between red and blue team to better the testing
Bug Bounty
Rewards for uncovering a software vulnerability
Gray Box
Limited knowledge of system
White box
Full knowledge of system
Black box
No knowledge of system
Might not assess all vulnerabilities
Rules of engagement
Limitation / parameters of a penetration test
Cleanup
Returning system back to original state after pen test is done
Footprinting
Gathering info from outside the organization
War Driving
Looking for wireless signals from a car while using a portable computing device
Persistence
Load balancer makes a link between endpoint and a network server for the length of session
War Flying
Finding Wi-Fi signals by drones
Drones
Unmanned Aerial Vehicle (UAV)
Passive Reconnaissance
Using public online information to gather knowledge on target
Open Source Intelligence (OSINT)
Public accessible information on a individual or organization to make actionable intelligence
Privilege Escalation
Getting advanced resources that isn’t available to regular users
Lateral movement
Moving through network looking for more systems that threat actors can access after privilege escalation
Pivot
Turning to other systems to be compromised
Vulnerability scan
Ongoing process, automated, continuously finds vulnerabilities
Reduce attack surface
Non-credential scan
Vulnerability scan that gives no authentication info to tester
Credential scan
Scan which authentication credentials are supplied to vulnerability scanner to mimic a threat actor that would have valid credentials