Lesson 3: Performing Security Assessments

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
GameKnowt Play
New
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/56

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards covering key terms and concepts from Lesson 3 on performing security assessments, focusing on network reconnaissance, vulnerability scanning, and penetration testing concepts.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

57 Terms

1
New cards

Network reconnaissance

The process of mapping the attack surface by identifying network hosts, connections, and routes to identify potential vulnerabilities.

2
New cards

Topology discovery

Scanning for hosts, IP ranges, and routes to map the target network and its structure.

3
New cards

Footprinting

Another term for topology discovery; building an asset database and identifying non-authorized hosts.

4
New cards

IPconfig

Windows command that shows IP configuration, including MAC, IPv4/IPv6, DHCP status, and default gateway.

5
New cards

Ifconfig

Linux command that displays the network interface configuration.

6
New cards

Ping

ICMP echo request used to verify reachability of a host; can be used to sweep a subnet.

7
New cards

ARP

Command to display the local ARP cache, showing IP-to-MAC mappings for hosts recently communicated with.

8
New cards

Route

Command to view and configure the host’s local routing table and default gateway.

9
New cards

Traceroute

Tool (Windows: tracert) that traces the path to a remote host and reports RTT for each hop.

10
New cards

Tracert

Windows implementation of traceroute for route discovery.

11
New cards

Pathping

Tool that provides statistics on latency and packet loss along a route over time.

12
New cards

Nmap

Open-source network scanner used for host discovery, port scanning, OS fingerprinting, and service identification.

13
New cards

Nmap host discovery sweep

Using Nmap to identify which hosts are up on a network, often with -sn to skip port scans.

14
New cards

TCP SYN scan (-sS)

Fast half-open scan that requests connections without completing them to determine port state.

15
New cards

UDP scan (-sU)

Port scan that probes UDP ports, waiting for responses or timeouts to determine state.

16
New cards

Version detection (-sV)

Nmap feature that determines service version and protocol information.

17
New cards

Aggressive scan (-A)

Nmap option enabling OS detection, version detection, script scanning, and more.

18
New cards

OS fingerprinting

Identifying the target’s operating system type and version from probe responses.

19
New cards

Banner grabbing

Collecting service banners from responses to identify software name and version.

20
New cards

Service discovery

Determining what services and applications are running on discovered hosts.

21
New cards

Netstat

Tool to show active TCP/UDP ports and listening services; helps detect malware or misconfig.

22
New cards

ss

Linux utility that replaces netstat for checking sockets and connections.

23
New cards

nslookup

DNS lookup tool (Windows) used to query DNS servers for domain information.

24
New cards

dig

DNS lookup tool (Linux) used to query DNS servers and gather records.

25
New cards

dnsenum

Tool that stacks tests to enumerate DNS information, including hosts, ranges, and records.

26
New cards

theHarvester

OSINT tool that gathers publicly available data (emails, subdomains, IPs, URLs) for a domain.

27
New cards

scanless

Tool that disguises probes by using third-party sites to perform port/service scans.

28
New cards

Nessus

Commercial vulnerability scanner that identifies patches, misconfigurations, and exposure.

29
New cards

OpenVAS

Open-source vulnerability scanner that uses NVTs and feeds to detect vulnerabilities.

30
New cards

SCAP

Security Content Automation Protocol; standard for automated vulnerability management and configuration assessment.

31
New cards

OVAL

Open Vulnerability and Assessment Language; XML schema for describing system state.

32
New cards

XCCDF

Extensible Configuration Checklist Description Format; XML standard for security checklists and baselines.

33
New cards

CVE

Common Vulnerabilities and Exposures; a dictionary of publicly known vulnerabilities with IDs.

34
New cards

CVSS

Common Vulnerability Scoring System; standard for rating vulnerability severity (0–10).

35
New cards

Vulnerability feed

Up-to-date database of known vulnerabilities and exploits used by scanners.

36
New cards

Credentialed scanning

Vulnerability scanning that uses valid login credentials to access systems for deeper results.

37
New cards

Non-credentialed scanning

Scanning that does not login to systems, simulating external attackers.

38
New cards

Intrusive scanning

Active tests that may exploit or probe deeply, with higher risk of disruption.

39
New cards

Passive scanning

Non-intrusive method that analyzes indirect evidence (e.g., traffic) with minimal impact.

40
New cards

Threat hunting

Proactive security assessment using threat intelligence to uncover evidence of threats.

41
New cards

Kill chain

Sequential stages of an attacker’s actions: reconnaissance, exploitation, persistence, privilege escalation, lateral movement, pivoting, actions on objectives, and cleanup.

42
New cards

Red team

Offensive security team that simulates attackers to test defenses.

43
New cards

Blue team

Defensive security team that monitors and defends against attacks.

44
New cards

Purple team

Collaborative exercise combining red and blue teams to improve detection and response.

45
New cards

Rules of engagement

Explicit scope and permissions for a security assessment or pen test.

46
New cards

Penetration testing

Authorized hacking activity designed to actively exploit vulnerabilities to prove risk.

47
New cards

Metasploit

Open-source exploitation framework used to develop and run exploits.

48
New cards

Sn1per

Framework for penetration testing reporting and evidence gathering; integrates with other tools.

49
New cards

Netcat

Network utility for reading/writing data across connections; can be used for backdoors or banner grabbing.

50
New cards

hping

Packet crafting tool for testing firewalls, performing traces, and DoS-style probes.

51
New cards

tcpreplay

Tool to replay previously captured traffic from a pcap file for testing IDS/IPS.

52
New cards

Wireshark

Open-source protocol analyzer for deep inspection of network traffic with a graphical interface.

53
New cards

tcpdump

Command-line packet capture tool for Linux/Unix; supports complex filters and pcap output.

54
New cards

PCAP / PCAPNG

Packet capture file formats used to store network traffic data.

55
New cards

OSINT

Open-source intelligence gathering from public sources for a domain or organization.

56
New cards

war driving

Mapping and cataloging wireless networks by moving through an area, often with gear.

57
New cards

Drones / Wi-Fi Pineapple

Aerial or portable reconnaissance tools used to locate and probe wireless networks.