Penetration Testing & Malware Flashcards

(48 cards)

1
Q

What is penetration testing in payments?

A

Penetration testing is a simulated cyberattack performed by qualified security professionals to test the security of payment-related systems and ensure attackers cannot access:

  • Cardholder data
  • payment tokens
  • authentication credentials
  • Payment APIs
  • Payment routing logic
  • POS environments
  • Merchant/platform infrastructure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the goal of penetration testing?

A

To discover vulnerabilities before real attackers exploit them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does pen testing cover in payments?

A
  • Payment pages & checkout flows
  • Payment APIs & SDKs
  • Tokenization systems
  • Mobile payments & wallets
  • Card-present systems
  • Cloud infrastructure for payment systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Regarding PCI DSS, which organization levels are required to conduct penetration testing?

A
  • Level 1 merchants
  • All service-providers
  • Any entity completing SAQ D
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In payments, what environments should pen testing be conducted in?

A
  • Internal environments
  • External environments
  • Application-level
  • Network-level

All testing must simulate real-world attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In payments, who performs pen testing?

A
  • Qualified internal teams
  • external penetration testers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In payments, what are the requirements that penetration testers must have in order to be considered acceptable to conduct the penetration testing?

A
  • Testers must be independent of the systems tested
  • Certified testers preferred
  • Experienced with payment security

Some companies use ASVs (Approved Scanning Vendors) for vulnerability scans and separate pen testers for full penetration testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List out the steps taken to complete penetration testing on a payments platform.

A
  1. Scope & plan the effort
  2. Gather as much information as possible
  3. Conduct threat modeling
  4. Conduct a vulnerability analysis
  5. Exploit the system
  6. Escalate privilege and conduct lateral movement
  7. Create exploitation analysis
  8. Conduct a cleanup of the testing effort
  9. Create a formal report
  10. Conduct remediation and retesting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In payments, explain the scoping and planning process of penetration testing.

A
  • Identify systems in PCI scope
  • Define testing boundaries
  • Confirm in-scope payment flows
  • Establish rules of engagement
  • Set testing windows and communication protocols
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In payments, what is the goal of the scoping and planning process of penetration testing?

A

Create a clear testing roadmap and avoid operational disruptions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In penetration testing for payments, what is involved in the information gathering process?

A
  • Enumerating APIs (identifying valid & accessible endpoints)
  • Reviewing payment forms and JavaScript
  • mapping tokenization flows
  • Discovering network ranges
  • Identifying 3rd party services
  • Understanding authentication models
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In the information gathering stage of penetration testing for payments, what is the goal of this step?

A

Understand the architecture from an attacker’s perspective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In payment penetration testing, what is threat modeling?

A

Threat modeling is identifying the most relevant attack vectors based on payment flows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In payment penetration testing, what is the goal of threat modeling?

A

Prioritize realistic attacks against payment systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In payment penetration testing, what is a vulnerability analysis?

A

This analysis involves testers using automated and manual techniques to identify weaknesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In payment penetration testing, what is the goal of vulnerability analysis?

A

To build a vulnerability list to exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In payment penetration testing, what is exploitation?

A

This is actively attempting to break into systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In payment penetration testing, what is the goal of exploitation?

A

To demonstrate what an attacker could do, especially with payment data or tokens.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In payment penetration testing, what is privilege escalation and lateral movement?

A

If an exploitation succeeds, testers will try to move deeper within the system. They will attempt to:

  • Access the token vaults
  • Access administrative payment APIs
  • Access logs containing sensitive data
  • Access payment processor credentials
  • Access the cardholder data environment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In payment penetration testing, what is the goal of privilege escalation and lateral movement?

A

To identify the blast radius of a breach

21
Q

In payment penetration testing, what is the post-exploitation analysis?

A

This is when the tester collects evidence of what was accessed or what could have been accessed.

22
Q

In payment penetration testing, what is the goal of post-exploitation analysis?

A

To understand the business impact of a compromise.

23
Q

In payment penetration testing, what is the cleanup process?

A

The cleanup process is when the tester removes any sign they were in the environment such as:
- test accounts
- payloads
- scripts
- injected data
- temporary credentials

24
Q

In payment penetration testing, what is the goal of the cleanup process?

A

To leave no residual impact on production systems

25
In payment penetration testing, what is the reporting process?
It is a formal penetration testing report that is produced. It includes: - Executive summary - Identified vulnerabilities - Risk ratings - Proof of exploitation - Detailed remediation guidance - Evidence of PCI requirement
26
True or False, PCI QSAs do not review penetration testing reports during their annual audit.
False, PCI QSA auditors review the penetration report during their annual audits.
27
In payment penetration testing, what is the remediation and retesting process?
This is when the entity must resolve the vulnerability and may undergo: - retesting - verifying controls are corrected - updating documentation
28
In payment penetration testing, how soon should critical vulnerabilities be remediated?
30 days
29
For payment platforms, how often should penetration testing be conducted?
- Annually for Level 1 merchants - Annually for service providers - Annually for any entity completing a SAQ D. - After any significant change - Every 6 months for segmented environments that isolate cardholder data.
30
In payment platform penetration testing, PCI DSS states that new penetration tests must be conducted when a significant change was made. What qualifies as a significant change?
- Launching a new payment flow - Deploying new payment APIs - Major code releases - Changes to tokenization logic - Updates to infrastructure or cloud environments - Introducing new payment connectors or gateways - Firewall or network architecture changes - Adding or modifying cardholder data environments
31
What is the purpose of segmentation penetration testing for PCI DSS?
The penetration test validates the segmentation controls actually work and prevent access to the cardholder data environment (CDE)
32
How are penetration testing and vulnerability assessments different from each other?
- Vulnerability Assessment = Find Weaknesses - Penetration Testing = Exploit Weaknesses (ethical hacking)
33
What is the purpose of a vulnerability assessment scan?
- Detect missing patches - Identify misconfigurations - Find known exploitable CVSs (common vulnerabilities & exposures) - Provide a security baseline
34
What is a vulnerability assessment?
A non-intrusive scan performed with automated tools to identify known security weaknesses.
35
Who performs vulnerability assessment scans?
- ASVs (approved scanning vendors) for external scans - Internal security teams for internal scans
36
How does a vulnerability assessment scan work?
- It does not exploit the application or platform - Uses automated tools (Qualys, Rapid7, Nessus) - Produces a list of vulnerabilities with severity ratings
37
What is an objective method in penetration testing?
The objective method is a structured approach where the penetration test is guided by specific security objectives and not by random or purely exploratory hacking.
38
What is OS fingerprinting?
The process of identifying the operating system running on a remote device or server by analyzing how it responds to network traffic. It is a standard technique used in penetration testing and vulnerability assessment scans.
39
What is banner grabbing?
A reconnaissance technique used in cybersecurity and penetration testing to gather information about a system or service by retrieving the "banner". The banner is a small text message or metadata that servers often send when you connect to them.
40
In banner grabbing, what does the banner reveal?
- software name - version number - operating system - service type - supported protocols - configuration details These clues help attackers identify potential vulnerabilities.
41
What is white-box testing?
A method where the tester has full access to internal code, logic, and architecture. It enables the tester to deeply evaluate the software behavior, logic flaws, and security vulnerabilities.
42
What is grey-box testing?
Grey-box testing is a hybrid method where testers have partial internal knowledge (like APIs docs or architecture info) to simulate a privileged attacker and uncover vulnerabilities more effectively than black-box testing.
43
What is black-box testing?
Black-box testing evaluates a system from the outside with no internal knowledge, simulating a real attacker to find vulnerabilities in external-facing applications and systems.
44
What are the 3 penetration testing strategies?
1. White-box testing 2. Grey-box testing 3. Black-box testing
45
True or False? PCI DSS requires all 3 forms of testing strategies? (White-box, Grey-box, Black-box)
False, PCI DSS does not dictate what type of testing should be conducted by entities. The most common type of testing is: - Black-box testing for external penetration testers. - Grey-box testing for internal penetration testers.
46
True or False? PCI DSS requires two independent methods of PCI scanning (Internal & External scanning)
True
47
True or False? The average cost of a data breach is $4.88 million as of 2024.
True
48
True or False? Every minute, approximately 4 companies fall victim to ransomware attacks.
True