Pre-Attack Reconnaissance and Exploitation Planning Introduction Flashcards

(48 cards)

1
Q

What do attackers do before launching an attack?

A

They invest time in reconnaissance and exploitation planning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is pre-attack reconnaissance important to attackers?

A

It helps them choose effective attack vectors and plan how exploitation will be carried out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why should defenders understand pre-attack preparation?

A

It helps them recognise early warning signs and reduce the chance of successful exploitation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is reconnaissance in cybersecurity?

A

The process of gathering information about a target before launching an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is OSINT in the context of attacker reconnaissance?

A

Open Source Intelligence gathered from publicly available sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What sources do attackers use for OSINT?

A

Public websites, social media, job postings, and code repositories.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why do attackers use social media during reconnaissance?

A

To gather information about employees, roles, and organisational behaviour.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why are job postings useful to attackers?

A

They can reveal technologies, tools, and security platforms used by an organisation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why are code repositories useful to attackers?

A

They may expose development details, technologies, or accidental leaks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is technology fingerprinting?

A

Identifying the operating systems, applications, frameworks, and platforms used by a target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why do attackers perform technology fingerprinting?

A

To find suitable weaknesses and tailor attack methods to the environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What kinds of technologies do attackers try to identify?

A

Operating systems, applications, frameworks, and email platforms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is organisational mapping?

A

Learning reporting structures, employee roles, and communication patterns within an organisation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why do attackers perform organisational mapping?

A

To identify valuable targets and craft more convincing attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What can attackers learn from employee roles and reporting structures?

A

Who has access, influence, or privileged permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is external exposure review?

A

Enumerating public-facing services, domains, and authentication portals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Why do attackers review external exposure?

A

To identify reachable systems and possible entry points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does enumerating public-facing services mean?

A

Discovering internet-accessible systems, services, and portals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Why are authentication portals valuable to attackers?

A

Because they may be targeted for credential theft or brute-force attempts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is credential intelligence?

A

Searching for leaked usernames, passwords, or reused credentials from previous breaches.

21
Q

Why is credential intelligence useful to attackers?

A

It may give them valid access without needing to exploit software.

22
Q

What kinds of credentials do attackers look for?

A

Leaked usernames, passwords, and reused login details.

23
Q

What is vector selection in exploitation planning?

A

Choosing the method of attack, such as phishing, credential abuse, vulnerability exploitation, or social engineering.

24
Q

What are common attack vectors chosen during planning?

A

Phishing, credential abuse, vulnerability exploitation, and social engineering.

25
Why do attackers choose one vector over another?
They select the method most likely to succeed against the target.
26
What is target prioritisation?
Focusing on users or systems with higher privileges or weaker security controls.
27
Why do attackers prioritise certain targets?
Because they offer greater access or are easier to compromise.
28
What kinds of users are often prioritised by attackers?
Users with high privileges or weak security protections.
29
What is payload customisation?
Tailoring malicious links, attachments, or scripts to fit the target environment.
30
Why do attackers customise payloads?
To increase the chance that the target will trust, open, or execute them.
31
What kinds of payloads might attackers customise?
Malicious links, attachments, and scripts.
32
What is timing strategy in attack planning?
Choosing when to launch an attack to reduce detection or increase success.
33
Why do attackers launch attacks during busy periods or off-hours?
Because defenders may be distracted or monitoring may be weaker.
34
What is fallback planning?
Preparing alternate attack methods if the initial attempt fails.
35
Why is fallback planning important to attackers?
It allows them to continue the attack even if the first vector is blocked.
36
Why are attack vectors rarely chosen at random?
Because attackers usually base them on gathered intelligence and planning.
37
How does understanding reconnaissance help defenders?
It supports earlier detection and stronger preventive controls.
38
How can defenders benefit from spotting reconnaissance activity?
They can disrupt attacks before exploitation begins.
39
What suspicious behaviour may indicate reconnaissance?
Scanning, information harvesting, and unusual probing of public-facing assets.
40
How does understanding reconnaissance strengthen security awareness training?
It makes training more realistic and aligned with real attacker behaviour.
41
Why should organisations reduce exposed information?
Because public information can help attackers plan more effective attacks.
42
How does understanding reconnaissance support attack surface management?
It helps organisations identify and reduce exposed systems and information.
43
What is attack surface management?
The process of identifying, monitoring, and reducing exposed assets and weaknesses.
44
How does understanding attacker planning support proactive risk reduction?
It helps organisations act before exploitation happens.
45
What is the main defensive value of understanding pre-attack planning?
It helps reduce exposure, improve detection, and strengthen prevention.
46
What is exploitation planning?
The process attackers use to decide how they will gain access and execute an attack.
47
What is the relationship between reconnaissance and exploitation?
Reconnaissance gathers the information needed to choose and plan exploitation pathways.
48
How can organisations disrupt attacks earlier?
By detecting reconnaissance, reducing exposed information, and strengthening preventive controls.