Chapter 11 - penetration testing

studied byStudied by 2 people
5.0(1)
Get a hint
Hint

what is penetration testing?

1 / 21

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

22 Terms

1

what is penetration testing?

pen test is the process of identifying security vulnerabilities in an application by evaluating the system with various malicious techniques

weak points are exploited

New cards
2

purpose of pen test

to secure important data from outsiders who have unauthorized access

New cards
3

what is a penetration tester referred to as?

ethical hacker

New cards
4

causes of vulnerabilities (5)

  1. design and dev errors

  2. poor system configuration

  3. human error

  4. connectivity

  5. complexity

New cards
5

what is the biggest cause of vulnerability?

human error

New cards
6

why should we do penetration testing

to prevent major attacks like Wannacry

New cards
7

why is it unavoidable to do pen testing?

due to the recent scale and danger of cyber-attacks these days

New cards
8

what is pen testing mainly required for? (4)

  1. financial or critical data

  2. for software release cycles

  3. secure user data

  4. find vulnerabilities

New cards
9

why do big organizations look for PCI compliance before doing business with third parties?

to avoid loop holes left in a software system

New cards
10

what should be tested? (5)

  1. software

  2. hardward

  3. network

  4. processes

  5. end-user behaviour

New cards
11

social engineering test

attempts to make a person reveal sensitive information

mostly done over the phone, internet, help-desks etc

New cards
12

network service test

** One of the most commonly performed pen test

openings in the network are identified and entry is made, this can be done locally or remotely

New cards
13

what are the three categories pen tests can be organized to?

  1. black box

  2. white box

  3. grey box

New cards
14

black box pen test

tester assesses the target system, network or process without knowledge of its details

they have a high level of inputs

NO CODE IS EXAMINED

New cards
15

white box pen test

tester is equipped with complete details

examines code, design and dev errors - simulation of an INTERNAL attack

New cards
16

grey box pen test

tester has limited details about the target environment

  • simulation of EXTERNAL environment

New cards
17

three techniques to pen testing

  1. Manual - social engineering, check design, logic and code

  2. automated

  3. combination - most common to get all vulnerabilities

New cards
18

penetration testing tools

  • automated tools identify standard vulnerabilities

  • tools can scan to check for malicious code

  • can verify security loopholes by examining data encryption and figuring out hard-coded values like passwords and usernames

New cards
19

criteria for selecting best penetration tool

  1. easy to deploy

  2. can system easily

  3. categorize vulnerabilities

  4. automate verification of vulnerabilities

  5. re-verify the exploits

  6. generated documentation

  7. train test resources

New cards
20

Acunetix

pen testing tool that offers security professionals and software engineers alike a range of stunning features in an easy, robust package

New cards
21

Intruder

pen testing tool is a vulnerability scanner that finds cybersecurity weaknesses in a digital estate while explaining risks

New cards
22

Astra Pentest

pen testing tool that is compatible with any business across industries. They have scanners and teams of experts (pen testers)

New cards

Explore top notes

note Note
studied byStudied by 88 people
... ago
5.0(1)
note Note
studied byStudied by 33 people
... ago
5.0(1)
note Note
studied byStudied by 15 people
... ago
5.0(1)
note Note
studied byStudied by 319 people
... ago
5.0(1)
note Note
studied byStudied by 93 people
... ago
5.0(1)
note Note
studied byStudied by 20 people
... ago
5.0(2)
note Note
studied byStudied by 9 people
... ago
5.0(1)
note Note
studied byStudied by 122360 people
... ago
4.8(560)

Explore top flashcards

flashcards Flashcard (21)
studied byStudied by 5 people
... ago
5.0(1)
flashcards Flashcard (32)
studied byStudied by 5 people
... ago
5.0(1)
flashcards Flashcard (55)
studied byStudied by 24 people
... ago
5.0(1)
flashcards Flashcard (26)
studied byStudied by 39 people
... ago
5.0(1)
flashcards Flashcard (25)
studied byStudied by 7 people
... ago
5.0(2)
flashcards Flashcard (36)
studied byStudied by 23 people
... ago
5.0(1)
flashcards Flashcard (160)
studied byStudied by 5 people
... ago
5.0(1)
flashcards Flashcard (63)
studied byStudied by 37 people
... ago
5.0(1)
robot