Testing approaches
Intelligence Gathering Techniques
Exploitation Techniques
PTES Phases
Security Concepts & Tools
100

This testing approach simulates an attack from an uninformed external hacker's perspective, with no prior knowledge of the system.

What is black box testing?

100

This technique involves collecting publicly available information from sources like social media, forums, and search engines.

What is OSINT (Open-Source Intelligence)?

100

This malicious individual or entity attempts to breach computer systems to steal data or cause damage.

Who is a hacker?

100

In this phase, potential threats and vulnerabilities are identified, and strategies to mitigate them are developed.

What is threat modelling?

100

This malicious software is designed to disrupt, damage, or gain unauthorized access to computer systems.

What is malware?

200

This testing method provides the team with full knowledge of the hospital's IT infrastructure, including network diagrams and system configurations.

What is white box testing?

200

This reconnaissance technique uses advanced tools to identify network topologies, including internal and external servers, firewalls, and other devices.

What is network mapping?

200

This attack involves injecting malicious code into a database query to manipulate or extract unauthorized data.

What is SQL injection?

200

In this is phase, data is collected from external sources like social media and analyzed to identify potential vulnerabilities.

What is intelligence gathering?

200

This is the analysis and examination of digital evidence after a security breach, including examining system logs and detecting malware implants.

What is system forensics?

300

This hybrid approach combines elements of both black box and white box testing, simulating an insider threat or external hacker with partial information.

What is grey box testing?

300

This activity involves identifying active devices on a network and includes port scanning and OS detection.

What is network scanning?

300

This web security vulnerability allows attackers to inject malicious scripts into web pages viewed by other users.

What is cross-site scripting (X-SS)?

300

In this phase, the team assesses consequences of exploited vulnerabilities, investigates data access, and examines privilege escalation possibilities.

What is post-exploitation?

300

This social engineering technique involves creating a fabricated scenario to trick someone into divulging confidential information.

What is pretexting?

400

This comprehensive framework consists of seven phases and provides a structured approach to performing tests and reporting results.

What is PTES (Penetration Testing Execution Standard)?

400

This social engineering technique involves manipulating someone's voice to impersonate another person and gather sensitive information.

What is vishing (voice phishing)?

400

This type of attack occurs when more data is written to a buffer than it can hold, potentially allowing hackers to execute arbitrary code.

What is a buffer overflow attack?

400

This is Phase of PTES, where the team secures document approvals and assembles necessary tools before testing begins.

What is pre-engagement interactions?

400

This comprehensive evaluation examines an organization's cybersecurity from an external perspective to understand how to approach penetration testing.

What is a security posture assessment?

500

This is the overall process of attempting to breach a system to uncover vulnerabilities, which CyberHealth Security will conduct at MedTechPro Hospital.

What is penetration testing?

500

This technique uses advanced search operators to find exposed sensitive files or login portals that shouldn't be publicly accessible.

What is search engine dorking?

500

These are tools that hackers use to gain unauthorized access by systematically testing different character combinations.

What are password cracking tools?

500

In this phase, the team attempts to breach the system using previously identified and confirmed vulnerabilities.

What is exploitation?

500

This strategic document includes incident detection, response strategies, and recovery processes to guide a hospital's cybersecurity efforts after testing.

What is a response plan?

M
e
n
u