What is penetration testing?
A process where we simulate an attack on our own systems.
How does penetration testing differ from vulnerability scanning?
Penetration testing involves performing actual exploits to see if access can be gained.
Why do some organizations perform standardized penetration testing?
It is a good security best practice and may be mandated by the type of business.
What document does NIST provide for an overview of the pen testing process?
The Technical Guide to Information Security Testing and Assessment.
What are the rules of engagement in penetration testing?
A formal list of rules that defines the scope and purpose of the testing.
What might the rules of engagement specify regarding penetration testing timing?
They may define appropriate hours for testing, such as after 6:00 PM local time.
What types of penetration tests can be performed?
On-site physical breaches, internal penetration tests, and external tests.
What is the significance of documenting sensitive information handling in penetration testing?
It ensures proper management of sensitive data uncovered during testing.
What should be defined in the rules of engagement regarding systems?
Which systems are in scope for testing and which are out of scope.
What is the primary objective of performing a penetration test?
To exploit known vulnerabilities to gain access to a system.
What risks are associated with exploiting vulnerabilities during penetration testing?
The process could cause the system or service to fail.
What are some common methods used during penetration testing?
What is a backdoor in the context of penetration testing?
A method to gain access to a system again without using the same vulnerability.
What role does a pivot point play after gaining initial access during a penetration test?
It allows lateral movement to gain access to other systems within the network.
What is the common practice after identifying a vulnerability?
Reporting it to the software developer for a patch to be created.
What is a CVE?
A list of publicly disclosed vulnerabilities.
What is the purpose of bug bounties?
To reward individuals for finding vulnerabilities in software.
What happens after a researcher identifies a vulnerability?
The software developer creates a fix and makes it public.
Fill in the blank: The process of identifying a vulnerability to the time a patch is available can take _______.
weeks or even months.
True or False: Penetration testing should always be conducted during business hours.
False.