Cybersecurity Penetration Testing and Web Basics and Vulnerabilities

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

Penetration Testing

test the effectiveness of security

controls OR find vulnerabilities in a web application or other software.

Also known as: ethical hacking or security auditing

At completion, a pentester must deliver a detailed report of the pentest

results and recommendations for improving security

2
New cards

Why Pen test?

Check to see if there are holes in security configurations.

Compliance - industries like healthcare and finance require regular

pentesting.

Validate expense of security controls – “do I really need this?”

3
New cards

Red Team

•Offensive Security

•“We Break Things”

‒Penetration Tests

‒Vulnerability Assessments

‒Social Engineering

4
New cards

Blue Team

•Defensive Security

•“We Protect Things”

‒Monitoring

‒Incident Response

‒Setting up Controls

5
New cards

Penetration Testing vs Vulnerability Assessment

Goal - identify where defenses need strengthening.

Vulnerability Assessment method: check for known

vulnerabilities and identify the highest threat risks.

Penetration Testing method: identify weaknesses by trying to

break through the defenses.

6
New cards

Pen testing vs attacking

Same Goal: find vulnerabilities in systems or software that can

be exploited to bypass security controls.

Q: To do their job a pentester must think and act like a hacker. So, what

is the difference between pentesting (good) and attacking (bad)?

A: Permission! A Pentester will get a signed “scope of work” contract

from the organization giving detailed list of what they can try to test and

what is off limits

7
New cards

White hat

Authorized hacker. good intentions, have

explicit permission to look for vulnerabilities, actions are legal.

8
New cards

Black hat

Unauthorized hacker. intends mal-actions,

NO permission to access system, actions are illegal.

9
New cards

Grey hat

Semi-Authorized Hacker = (Formerly Grey Hat) - often has

good intentions, but they don’t have permission. Need caution

as can easily step over line into legal issues.

Example: an independent researcher finds a vulnerability OR a user

finds one accidentally.

Responsible disclosure is KEY → contact the organization, provide

documentation, don’t share publicly.

In some cases, the discovery is eligible for a bug bounty =

organizations offer a monetary reward for discoveries of a bug, error or

vulnerability.

10
New cards

Exploit

Pentesters or hackers look for a way into places they don’t belong. To do

this, they need an exploit.

Definition: Exploit - software, code, or commands used to take advantage

of a vulnerability (glitch in code) on a computer system.

Exploits can be used to:

Get access to the system to remotely perform actions on the target PC

Disable the system by creating an OS or system crash for a DoS.

Change attacker’s permissions to root or administrator.

Steal data like passwords or valuable documents.

Install a method to easily gain future access (backdoor).

11
New cards

Metasploit Framework

The Metasploit Framework is an exploit toolkit = an application

that has a bundle of exploits that will work on multiple

vulnerabilities.

• Open-source tool that works as a pentesting code repository.

• New exploits are added regularly through contributions from the cyber

community.

• Used by security professionals globally, it

is taught in cybersecurity courses and is

part of certification exams.

12
New cards

Metasploit payload

An exploit is the way into a system to deliver a payload.

The payload is the attack code to execute after you are in the

system.

Examples:

command line access (aka reverse shell)

upload and execute a file

start a screen capture

look for passwords

keylogging

install a backdoor

Metasploit is modular which means you can mix and match the

exploit and payload.

13
New cards
<p>Exploring Metasploit lab</p>

Exploring Metasploit lab

knowt flashcard image
14
New cards
<p>Threat hunting</p>

Threat hunting

Threst hunting lab

<p>Threst hunting lab</p>
15
New cards
<p>Threat hunting lab</p>

Threat hunting lab

knowt flashcard image
16
New cards
<p>Web basics</p>

Web basics

knowt flashcard image
17
New cards
<p>Web basics lab</p>

Web basics lab

knowt flashcard image
18
New cards
<p>Web vulnerabilities and cookies</p>

Web vulnerabilities and cookies

knowt flashcard image
19
New cards
<p>Web vulnerabilities and cookies lab</p>

Web vulnerabilities and cookies lab

knowt flashcard image
20
New cards
<p>User input threats</p>

User input threats