Term
|
Definition
| A type of computer attack in which an intruder engages with the targeted system to gather information about vulnerabilities |
|
|
Term
|
Definition
| An attempt to gain information about targeted computers and networks without actively engaging with the systems. Using Open Source Intelligence, Wayback machine, Social Engineering to learn details about target company. |
|
|
Term
|
Definition
A technique that allows lateral movement from a compromised host -Gain foothold on target system -Target sustem is leveraged to compromise other normally inaccessible systems. |
|
|
Term
|
Definition
Rules of Engagement Physical Security Tech Admin COntrols, Monitoring: Law enforcement Network Layout Number internal external devices, routers/switches, OS fingerprints, Wireless networks, Mobile Devices -Map of Internet Presence |
|
|
Term
|
Definition
| Installing backdoors or methods to maintain access to a host or network |
|
|
Term
|
Definition
Primary goal when accessing a host -Enables installation of persistence mechanisms -Scan for additional exploits, vulnerabilities and misconfigurations |
|
|
Term
|
Definition
| Penetration Testing which is real world. No prior knowledge of network. Takes longer to do and is more expensive. |
|
|
Term
|
Definition
| Tester has full knowledge of the target. Network config, hosts, source code, protocols, diagrams. This speeds up the penetration testing. |
|
|
Term
|
Definition
| Combination of Black and White box. Some knowledge about the target but not detailed. It speeds up the testing process |
|
|
Term
| Penetration Testing vs Vulnerability Scanning |
|
Definition
| Penetration Testing is an active attack to exploit vulnerabilities. It also assesses potential damages that can result and the likelihood the vulnerabilities can be exploited. Vulnerability scans just passively identify vulnerabilities. |
|
|
Term
| Methods of Priv Escalation |
|
Definition
Hack Local Account Exploit Vulnerability Dump SAM and Brute Force Social Engineering |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Windows based packet sniffer |
|
|
Term
|
Definition
| Network mapping tool. Makes a graphical representation of the network. |
|
|
Term
|
Definition
| Monitors windows performance |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Unix based packet sniffer |
|
|