Penetration Testing - CompTIA Security+ SY0-701 - 4.3

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/4

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 5:02 AM on 4/1/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

5 Terms

1
New cards

Pentest

Simulate an attack

Similar to vulnerability scanning, but performing actual exploits

Often a compliance mandate

- Regular pen testing done by 3rd party

NIST Technical Guide to Information Security

https://professormesser.link/800115

2
New cards

Rules of Engagement

• An important document

- Defines purpose and scope

- Makes everyone aware of the test parameters

• Type of testing and schedule

- On-site physical breach, internal test, external test

- Normal working hours, after 6 PM only, etc.

• The rules

- IP address ranges

- Emergency contacts

- How to handle sensitive information

- In-scope and out-of-scope devices or applications

3
New cards

Exploiting Vulnerabilities

• Try to break into the system

• Be careful; this can cause

a denial of service or loss of data

• Buffer overflows can cause instability

• Gain privilege escalation

• You may need to try many

different vulnerability types

• Password brute-force

• Social engineering

• Database injections

• Buffer overflows

• You'll only be sure you're vulnerable

if you can bypass security

• If you can get through, the bad guys can get through

4
New cards

The process

Initial exploitation

- Get into the network

Lateral movement

- Move from system to system

- The inside of the network is relatively unprotected

Persistence

- Once you're there, you need to make sure theres a way back in]

- Set up a backdoor, build user accounts, change or verify default passwords

The pivot

- Gain access to systems that would normally not be accessible

- Use a vulnerable system as a proxy or relay

5
New cards

Responsible disclosure program

• It takes time to fix a vulnerability

- Software changes, testing, deployment, etc.

• Bug bounty programs

- A reward for discovering vulnerabilities

- Earn money for hacking a system

- Document the vulnerability to earn cash

• A controlled information release

- Researcher reports the vulnerability

- Manufacturer creates a fix

- The vulnerability is announced publicly

Explore top notes

note
historical globalization figures
Updated 1082d ago
0.0(0)
note
~The Phagocytic System~
Updated 536d ago
0.0(0)
note
4.8-4.10 Presentation
Updated 113d ago
0.0(0)
note
States of matter
Updated 1246d ago
0.0(0)
note
Chapter 6: Learning
Updated 1090d ago
0.0(0)
note
GEC1-LESSON 3
Updated 569d ago
0.0(0)
note
historical globalization figures
Updated 1082d ago
0.0(0)
note
~The Phagocytic System~
Updated 536d ago
0.0(0)
note
4.8-4.10 Presentation
Updated 113d ago
0.0(0)
note
States of matter
Updated 1246d ago
0.0(0)
note
Chapter 6: Learning
Updated 1090d ago
0.0(0)
note
GEC1-LESSON 3
Updated 569d ago
0.0(0)

Explore top flashcards

flashcards
Wat een taal zeg
91
Updated 1221d ago
0.0(0)
flashcards
Sp4 Un1A (23-24) | El arte
30
Updated 952d ago
0.0(0)
flashcards
Linear Algebra Final Review
47
Updated 471d ago
0.0(0)
flashcards
Odyssey Terms
35
Updated 1240d ago
0.0(0)
flashcards
is 117 final quiz review
44
Updated 1204d ago
0.0(0)
flashcards
Passe Compose
54
Updated 1147d ago
0.0(0)
flashcards
Wat een taal zeg
91
Updated 1221d ago
0.0(0)
flashcards
Sp4 Un1A (23-24) | El arte
30
Updated 952d ago
0.0(0)
flashcards
Linear Algebra Final Review
47
Updated 471d ago
0.0(0)
flashcards
Odyssey Terms
35
Updated 1240d ago
0.0(0)
flashcards
is 117 final quiz review
44
Updated 1204d ago
0.0(0)
flashcards
Passe Compose
54
Updated 1147d ago
0.0(0)