Tuesday, July 26, 2022

Security+ 008 - 1.8 Techniques used in Pentesting

1.0 Attacks, Threats, and Vulnerabilities

1.8 Techniques used in Pentesting



Penetration Testing
Known Environment - Tester is familiar with environment

Unknown Environment - Tester knows nothing about the environment

Partially Known Environment - Partially known and unknown, tester goes with info they have

Rules of Engagement - Agreed systems tester can target and what is to be tested

Lateral Movement - Moving from device to device within a network.

Privilege Escalation - Administrator access

Persistence - On-going access

Cleanup - Reverting systems back to original setting from before the test

Bug Bounty - System owner offers a reward for finding and reporting bugs in their system.

Pivoting - Using a system as a jump off point or a relay to access other parts of the network.


Passive and Active Reconnaissance

Drones - Surveillance

War Flying - WiFi enabled drone that can pick up networks and collect data about them.

War Driving - Similar to War Flying, but done with a car driving around instead of a flying drone.

Footprinting - Mapping the network, packet captures could see this happening.

OSINT - Open-source/public intel


Exercise Types
Red Team
- Attackers

Blue Team - Defenders

White Team - Oversees blue/red team activity on a network

Purple Team - A team that consists of both offense and defense team members