Introduction to Penetration Testing

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/9

flashcard set

Earn XP

Description and Tags

These flashcards cover the key concepts and phases of penetration testing as outlined in the lecture notes.

Last updated 10:47 AM on 3/7/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

10 Terms

1
New cards

What is penetration testing (pentesting)?

Pentesting involves simulating real attacks to assess the risk associated with potential security breaches.

2
New cards

What are the phases of penetration testing?

  1. Pre-engagement phase 2. Information-gathering phase 3. Threat-modelling phase 4. Vulnerability analysis phase 5. Exploitation phase 6. Post-exploitation phase 7. Reporting phase.
3
New cards

What is the main goal of the information-gathering phase?

To analyze freely/publicly available sources of information to identify potential ways to connect to a client’s systems.

4
New cards

What is Open Source Intelligence (OSINT)?

OSINT involves gathering information from legal sources rather than covert means.

5
New cards

What is the purpose of the pre-engagement phase?

To ensure that everyone is on the same page about the penetration testing and to understand the client's goals.

6
New cards

What is vulnerability analysis in pentesting?

The phase where pentesters actively discover vulnerabilities and determine how successful exploit strategies might be.

7
New cards

What tools are commonly used in the exploitation phase?

Tools such as Metasploit are commonly used to attempt to access a client's systems.

8
New cards

What is the significance of the reporting phase in pentesting?

It is crucial for conveying findings to the customer in a meaningful way, including what needs improvement and how to fix issues.

9
New cards

What can be included in an executive summary of a pentesting report?

Background, overall posture, risk profile, general findings, recommendation summary, and strategic road map.

10
New cards

What is a SYN scan in Nmap?

A SYN scan is a TCP scan that does not complete the TCP handshake and detects open ports without connecting fully.

Explore top notes

note
Chapter 21: Contractual Harm
Updated 1279d ago
0.0(0)
note
Notes on Solubility and Ksp
Updated 341d ago
0.0(0)
note
PERDEV "Powers of Mind"
Updated 1266d ago
0.0(0)
note
chapter 3 notes
Updated 1245d ago
0.0(0)
note
leerdoelen
Updated 64d ago
0.0(0)
note
Chapter 28: Forensic Psychiatry
Updated 1080d ago
0.0(0)
note
Chapter 21: Contractual Harm
Updated 1279d ago
0.0(0)
note
Notes on Solubility and Ksp
Updated 341d ago
0.0(0)
note
PERDEV "Powers of Mind"
Updated 1266d ago
0.0(0)
note
chapter 3 notes
Updated 1245d ago
0.0(0)
note
leerdoelen
Updated 64d ago
0.0(0)
note
Chapter 28: Forensic Psychiatry
Updated 1080d ago
0.0(0)

Explore top flashcards

flashcards
FINAL ABBREVIATIONS
80
Updated 476d ago
0.0(0)
flashcards
YR 9 Physics
38
Updated 213d ago
0.0(0)
flashcards
SS chapters 10 & 11 vocab
29
Updated 31d ago
0.0(0)
flashcards
Glycolysis and Redox Rxns Quiz
38
Updated 1155d ago
0.0(0)
flashcards
Spanish II HA 12-2 Vocab
59
Updated 62d ago
0.0(0)
flashcards
Biosci 221 - Fungi
21
Updated 1118d ago
0.0(0)
flashcards
FINAL ABBREVIATIONS
80
Updated 476d ago
0.0(0)
flashcards
YR 9 Physics
38
Updated 213d ago
0.0(0)
flashcards
SS chapters 10 & 11 vocab
29
Updated 31d ago
0.0(0)
flashcards
Glycolysis and Redox Rxns Quiz
38
Updated 1155d ago
0.0(0)
flashcards
Spanish II HA 12-2 Vocab
59
Updated 62d ago
0.0(0)
flashcards
Biosci 221 - Fungi
21
Updated 1118d ago
0.0(0)