1.0 Attacks, Threats, and Vulnerabilities
1.8 Techniques used in Pentesting
Penetration Testing
Known Environment - Tester is familiar with environment
Unknown Environment - Tester knows nothing about the environment
Partially Known Environment - Partially known and unknown, tester goes with info they have
Rules of Engagement - Agreed systems tester can target and what is to be tested
Lateral Movement - Moving from device to device within a network.
Privilege Escalation - Administrator access
Persistence - On-going access
Cleanup - Reverting systems back to original setting from before the test
Bug Bounty - System owner offers a reward for finding and reporting bugs in their system.
Pivoting - Using a system as a jump off point or a relay to access other parts of the network.
Passive and Active Reconnaissance
Drones - Surveillance
War Flying - WiFi enabled drone that can pick up networks and collect data about them.
War Driving - Similar to War Flying, but done with a car driving around instead of a flying drone.
Footprinting - Mapping the network, packet captures could see this happening.
OSINT - Open-source/public intel
Exercise Types
Red Team - Attackers
Blue Team - Defenders
White Team - Oversees blue/red team activity on a network
Purple Team - A team that consists of both offense and defense team members