CS6262 - Penetration testing exam with |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
correct answers |||\\\
Pentesting Methodology - correct answersFootprinting, Scanning, Enumeration, Gaining Access,
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
Escalating Privileges, Pilfering, Covering Tracks, Creating Back Doors
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
Footprinting - correct answersRecon and Information gathering; Target IP discovery; Namespace|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
acquisition; Network topology |||\\\ |||\\\
Scanning - correct answersFind target machine, ports, services (versions & configs); ID related
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
vulnerabilities and focus on most promising |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
Enumeration - correct answersID valid user accounts or poorly protected resources shares; More |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
intrusive probing than scanning |||\\\ |||\\\ |||\\\
Gaining Access - correct answersID a vulnerability of the target from scannning; Exploit the vuln.
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
Escalating privileges - correct answersIf only user-level access was obtained in the last step, seek to
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
gain complete control of the system
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
Pilfering - correct answersGather info to allow access of trusted systems
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
Covering Tracks - correct answersOnce total ownership of the target is secured, hiding this fact
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
from sysadmins becomes paramount
|||\\\ |||\\\ |||\\\
Creating backdoors - correct answersTrap door will be laid in various parts of the system to ensure
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
that privilege access is easily regained whenever the intruder decides
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
Events that trigger a pentest - correct answersAdded or modified infrastructure
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
Added or modified applications
|||\\\ |||\\\ |||\\\
correct answers |||\\\
Pentesting Methodology - correct answersFootprinting, Scanning, Enumeration, Gaining Access,
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
Escalating Privileges, Pilfering, Covering Tracks, Creating Back Doors
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
Footprinting - correct answersRecon and Information gathering; Target IP discovery; Namespace|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
acquisition; Network topology |||\\\ |||\\\
Scanning - correct answersFind target machine, ports, services (versions & configs); ID related
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
vulnerabilities and focus on most promising |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
Enumeration - correct answersID valid user accounts or poorly protected resources shares; More |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
intrusive probing than scanning |||\\\ |||\\\ |||\\\
Gaining Access - correct answersID a vulnerability of the target from scannning; Exploit the vuln.
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
Escalating privileges - correct answersIf only user-level access was obtained in the last step, seek to
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
gain complete control of the system
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
Pilfering - correct answersGather info to allow access of trusted systems
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
Covering Tracks - correct answersOnce total ownership of the target is secured, hiding this fact
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
from sysadmins becomes paramount
|||\\\ |||\\\ |||\\\
Creating backdoors - correct answersTrap door will be laid in various parts of the system to ensure
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
that privilege access is easily regained whenever the intruder decides
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
Events that trigger a pentest - correct answersAdded or modified infrastructure
|||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\ |||\\\
Added or modified applications
|||\\\ |||\\\ |||\\\