Security+ Penetration Testing Steps and Life Cycle

Beschreibung

CompTIA Information Technology (Security+ ) Karteikarten am Security+ Penetration Testing Steps and Life Cycle, erstellt von Lyndsay Badding am 26/04/2023.
Lyndsay Badding
Karteikarten von Lyndsay Badding, aktualisiert more than 1 year ago
Lyndsay Badding
Erstellt von Lyndsay Badding vor etwa ein Jahr
2
0

Zusammenfassung der Ressource

Frage Antworten
Pen Test Step 1 Verify a threat exists done through research, social engineering, scanning, vuln assess tools, or OSINT
Pen Test Step 2 Bypass security controls test all weaknesses previously discovered
Pen Test Step 3 Actively testing security controls check for config vulnerabilities such as weak passwords
Pen Test Step 4 Exploit vulnerabilities prove the vuln exists and the risk is high
Pen Test Life Cycle #1 Persistence the ability to reconnect to a compromised system at will
Pen Test Life Cycle #2 Privilege Escalation horizontal or vertical
Pen Test Life Cycle #3 Lateral Movement gaining control over endpoints and devices not initially exploited
Pen Test Life Cycle #4 Pivoting gaining access to another device using remote access or tunneling protocols
Pen Test Life Cycle #5 Actions on Objectives the pen tester is showing that it's possible to exfiltrate data, deface a website, or more
Pen Test Life Cycle #6 Cleanup remove any backdoors, tools, software, files, etc that was used for the pen test
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

CCNA Security 210-260 IINS - Exam 3
Mike M
Application of technology in learning
Jeff Wall
Innovative Uses of Technology
John Marttila
Ch1 - The nature of IT Projects
mauricio5509
The Internet
Gee_0599
SQL Quiz
R M
CCNA Answers – CCNA Exam
Abdul Demir
Professional, Legal, and Ethical Issues in Information Security
mfundo.falteni
System Analysis
R A
Flash Cards Networks
JJ Pro Wrestler
EDUC260- Multimodal Literacies for a Digital Age
angelwoo2002