253 AI Generated Flashcards

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/168

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 5:18 PM on 4/15/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

169 Terms

1
New cards

What is Penetration Testing (Pentesting)?

A security exercise where a cyber-security expert manually or automatically attempts to find and exploit vulnerabilities in a computer system.

2
New cards

What is the primary purpose of a Penetration Test?

To identify weak spots in a system's defences which attackers could take advantage of.

3
New cards

How does Penetration Testing differ from Vulnerability Assessment?

Pentesting provides assurance in your vulnerability assessment and management processes, similar to an external financial audit.

4
New cards

What is a Bug Bounty?

A reward offered by an organization to external parties to authorize and incentivize them to perform security testing on their assets.

5
New cards

What is Blackbox testing?

Zero Knowledge testing, performing the test as an external attacker.

6
New cards

What is Whitebox testing?

Full Knowledge testing, performing the test as a developer.

7
New cards

What is Greybox testing?

Some Knowledge testing, performing the test as a user with access to some data.

8
New cards

What is a White-Hat Hacker?

An individual who finds vulnerabilities in networks legally, often working for organizations or governments.

9
New cards

What is a Black-Hat Hacker?

A highly skilled criminal who violates computer security illegally for personal gain.

10
New cards

What is a Gray-Hat Hacker?

A hacker who finds issues without the owner's permission and reports them, sometimes requesting a small fee to fix the issue.

11
New cards

How does Pentesting differ from Bug Bounties in terms of time?

Pentesting is time-bounded, whereas Bug Bounties are continuous.

12
New cards

How does Pentesting differ from Bug Bounties in terms of personnel?

Pentesting uses a dedicated team of experts, whereas Bug Bounties are crowd-sourced.

13
New cards

How does Pentesting differ from Bug Bounties in terms of cost?

Pentesting has a set cost regardless of results, whereas Bug Bounties only pay for unique, valid vulnerabilities.

14
New cards

What is the role of a Red Team?

Offensive security focused on evading protection, compromising credentials, escalating privileges, and moving laterally.

15
New cards

What is the role of a Blue Team?

Defensive security focused on protecting systems, threat hunting, digital forensics, and incident response.

16
New cards

What is the role of a Purple Team?

Collaborative security where Red and Blue Teams function together to test and improve detection and defense.

17
New cards

What is the first limitation of penetration testing?

It is not a comprehensive evaluation of security, meaning many issues may not be identified.

18
New cards

What is the second limitation of penetration testing?

Time limitations restrict the amount of information that can be gathered.

19
New cards

What is the third limitation of penetration testing?

Failing to understand its limited nature can give organizations a false sense of security.

20
New cards

What is Stage 1 of Penetration Testing?

Planning.

21
New cards

What is Stage 2 of Penetration Testing?

Discovery.

22
New cards

What is Stage 3 of Penetration Testing?

Attack.

23
New cards

What is Stage 4 of Penetration Testing?

Reporting.

24
New cards

What are the main tasks in the Planning stage of a pentest?

Identify rules, finalize management approval, and set test goals.

25
New cards

What are the main tasks in the Discovery stage of a pentest?

Reconnaissance, Scanning, and Enumeration.

26
New cards

What are the main tasks in the Attack stage of a pentest?

Gain access, escalate privileges, system browsing, and install additional tools.

27
New cards

What are the main tasks in the Reporting stage of a pentest?

List uncovered security issues, risk levels, resolution methods, and advice to improve internal assessments.

28
New cards

What is Scoping in the Planning stage?

Risk owners outline areas of concern, technical staff outline boundaries, and constraints are established.

29
New cards

What are the Rules of Engagement (ROE) in a pentest?

Detailed guidelines established before testing begins that give the test team authority to conduct activities.

30
New cards

What is the Gaining Access step in the Attack phase?

The initial attempt to break in based on data gathered in the discovery phase.

31
New cards

What is the Escalating Privileges step in the Attack phase?

Seeking to gain complete control (administrator-level access) if only user-level access is gained.

32
New cards

What is Intelligence Gathering?

The phase where an attacker gathers information, maps networks, and probes for exploitable vulnerabilities.

33
New cards

What is Passive Reconnaissance?

Gathering information on a target without their knowledge of your actions.

34
New cards

What is Active Reconnaissance?

Gathering information where the potential exists that your actions will be seen by the target (e.g., port scanning).

35
New cards

What is Open Source Intelligence (OSINT)?

Intelligence produced from publicly available information collected and exploited in a timely manner.

36
New cards

What is Network Sniffing?

The act of capturing network traffic for analysis or replay using software or hardware.

37
New cards

What is Promiscuous Mode?

A network card mode where the host listens to all traffic on the network, not just traffic addressed to itself.

38
New cards

What is Stage 1 of the Cyber Kill Chain?

Reconnaissance.

39
New cards

What is Stage 2 of the Cyber Kill Chain?

Weaponization.

40
New cards

What is Stage 3 of the Cyber Kill Chain?

Delivery.

41
New cards

What is Stage 4 of the Cyber Kill Chain?

Exploitation.

42
New cards

What is Stage 5 of the Cyber Kill Chain?

Installation.

43
New cards

What is Stage 6 of the Cyber Kill Chain?

Command & Control (C2).

44
New cards

What is Stage 7 of the Cyber Kill Chain?

Actions on Objectives.

45
New cards

What is Shared Ethernet?

A network where all systems connect to the same bus, packets are broadcast, and it is highly vulnerable to passive sniffing.

46
New cards

What is Switched Ethernet?

A network where machines connect to a switch that tracks MAC addresses, sending packets specifically to intended machines.

47
New cards

What does an Open TCP Port state mean?

The port is ready to establish a session.

48
New cards

What does a Closed TCP Port state mean?

The port is rejecting connections.

49
New cards

What does a Filtered TCP Port state mean?

Packets are being dropped or blocked, typically by a firewall.

50
New cards

How do you trace the origin of an email?

Explore email headers to find the IP address of the sender, date and time, and the Mail server routing path.

51
New cards

What happens in a TCP Scan Positive Inference?

Client sends SYN, Server replies SYN/ACK, Client replies ACK (Port is OPEN).

52
New cards

What happens in a TCP Scan Negative Inference?

Client sends SYN, Server replies RST (Port is CLOSED).

53
New cards

What happens in a TCP Scan Filtered Inference?

Client sends SYN, Connection times out (Port is FILTERED).

54
New cards

What is a TCP SYN (Stealth) Scan?

Client sends SYN, Server replies SYN/ACK, Client immediately sends RST to terminate (Port is OPEN).

55
New cards

What is a TCP XMAS Scan?

Client sends FIN/PSH/URG. Server replies RST if closed, or times out if open/filtered.

56
New cards

How do UDP scans detect closed ports?

They rely on detecting ICMP Port Unreachable responses.

57
New cards

What is a Protocol-specific UDP Scan?

Using a known application protocol (like SNMP) to see if a specific port responds with a protocol reply.

58
New cards

What is a Password?

A shared secret used to gain access to a system, known only to a user of the system and the system itself.

59
New cards

What is Authentication?

The process of verifying an actor's identity.

60
New cards

What are the three Classes of Secrets for authentication?

Something you know, Something you have, Something you are.

61
New cards

What is Password Entropy?

A mathematical measure of uncertainty that represents a password's strength and resistance to guessing.

62
New cards

What is a Cryptographic Hash Function?

A deterministic function that transforms input data into scrambled output data and is collision-resistant.

63
New cards

Why is obtaining passwords important for an attacker?

It allows for initial access, privilege escalation, and lateral movement.

64
New cards

Name three good Cryptographic Hashing Algorithms.

sha256, sha512, sha3 (or shake).

65
New cards

Name three bad Cryptographic Hashing Algorithms.

md5, crc, sha1.

66
New cards

Why must passwords never be stored in plain text?

If a system is compromised, an attacker could read plain text passwords and log in as root/admin.

67
New cards

Why must passwords never be stored using encryption?

Encryption is a two-way function (reversible if keys are stolen), whereas hashing is a secure one-way function.

68
New cards

What is Salting in password storage?

Adding a unique random string to each password before hashing it to defeat pre-computed dictionary attacks.

69
New cards

How does Slow Hashing defeat hardware acceleration?

Algorithms like bcrypt and scrypt use a configurable work factor to increase calculation time, making GPU brute-forcing impractical.

70
New cards

What is Code Injection?

An attack where malicious code is injected into an application, which is then interpreted or executed.

71
New cards

What is Code Execution?

Attacks that typically allow arbitrary code to be executed, possibly remotely.

72
New cards

What is SQL Injection (SQLi)?

Injecting malicious SQL statements into an input field to manipulate the database.

73
New cards

What type of loss occurs when SQLi is used to extract unauthorized data?

Confidentiality Loss.

74
New cards

What type of loss occurs when SQLi is used to alter the database with UPDATE or INSERT statements?

Integrity Loss.

75
New cards

What is the outcome of the injected input "Bob' OR 1=1

--" in SQLi?

76
New cards

What is OS Command Injection (Shell Injection)?

Injecting commands into the shell, often when an app passes unsanitized user input to a system shell.

77
New cards

List four command separators used in OS Command Injection.

&, &&,

78
New cards

What is Taint Analysis?

A security feature in some languages that marks variables as tainted (untrusted) if they come from external input until sanitized.

79
New cards

What is Persistent XSS?

The adversary provides malicious input which the server stores and displays to all other users.

80
New cards

What is Reflected XSS?

The user clicks a malicious link containing a payload, and the visited website reflects it back into the browser.

81
New cards

What is DOM-based XSS?

The adversary injects an attack directly into the running application's Document Object Model using scripts like document.write.

82
New cards

What is the general mitigation rule for code injection?

Assume any input provided is potentially malicious

83
New cards

What is the absolute best defense against SQL Injection?

Parameterized Queries, which separate SQL logic from data inputs.

84
New cards

What is a Buffer Overflow?

A vulnerability occurring when a program writes data past the end of a designated memory buffer, overwriting adjacent memory locations.

85
New cards

What is the Memory Stack?

A Last-In First-Out (LIFO) data structure used to store local variables, function arguments, and return addresses.

86
New cards

What direction does the Memory Stack grow?

Downwards, from High memory addresses to Low memory addresses.

87
New cards

What is the EIP (Instruction Pointer) register?

Holds the address of the next memory location to execute once the current function finishes (the Return Address).

88
New cards

What is the EBP (Base Pointer) register?

Used as a static reference point for the rest of the current stack frame.

89
New cards

What is the first item pushed onto the Memory Stack from high to low address?

Function Arguments.

90
New cards

What is the second item pushed onto the Memory Stack from high to low address?

Return Address.

91
New cards

What is the third item pushed onto the Memory Stack from high to low address?

Previous Frame Pointer (EBP).

92
New cards

What is the fourth item pushed onto the Memory Stack from high to low address?

Local Variables (the buffer).

93
New cards

How does an attacker exploit a Buffer Overflow?

By inputting a string larger than the buffer that spills upwards to overwrite the EIP (Return Address) to point to injected malicious code.

94
New cards

What does the Text segment of program memory store?

Executable code (read-only).

95
New cards

What does the Data segment of program memory store?

Initialized static and global variables.

96
New cards

What does the BSS segment of program memory store?

Uninitialized static and global variables.

97
New cards

What does the Heap segment of program memory store?

Dynamic memory allocation (managed by malloc/free).

98
New cards

Why is strncpy considered safer than strcpy?

strncpy explicitly checks the length of the input, helping to prevent buffer overflows.

99
New cards

What is Address Space Layout Randomization (ASLR)?

An OS countermeasure that randomizes the start location of the stack every time code is loaded.

100
New cards

What is a Stack Canary?

A compiler countermeasure that places a random secret value before the Return Address to detect stack smashing.