Key Phases of a Penetration Test

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/3

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

4 Terms

1
New cards

Initial access

occurs when the attacker exploits a vulnerability to gain access to the organization’s network

2
New cards

Privilege escalation

uses hacking techniques to shift from the initial access gained by the attacker to more advanced privileges, such as root access on the same system

3
New cards

Pivoting, or lateral movement

occurs as the attacker uses the initial system compromise to gain access to other systems on the target network

4
New cards

Attackers establish persistence

on compromised networks by installing backdoors and using other mechanisms that will allow them to regain access to the network, even if the initial vulnerability is patched