Tools and Techniques
Cycle of a Pentest
Vocabulary
Challenge Questions
Defense
100

This tool is commonly used to brute-force directories on a web server using a wordlist.

What is DirBuster (or gobuster/ffuf)?

100

You search social media and public records to gather information about a target named KB.

What is Reconnaissance (OSINT)?

100

Publicly available information gathered about a target.

What is OSINT?

100

After obtaining a user password, this command shows what commands the user can run with elevated privileges.

What is sudo -l?

100

Using long, complex, and unique passwords helps prevent this type of attack.

What is brute-force attack?

200

This command-line tool is used to securely connect to a remote machine over port 22.

What is SSH?

200

You use tools to discover open ports and enumerate services like SSH and HTTP.

What is Scanning/Enumeration?

200

A file that stores passwords in a hidden 'non reversable' format.

What is a hash?

200

You find a .git directory exposed on a web server—what is the main goal of exploiting this?

What is retrieving source code (and potentially credentials/secrets)?

200

This authentication method is more secure than passwords and uses a key pair.

What are SSH keys?

300

This tool is used to crack password hashes using GPU acceleration.

What is Hashcat? or (John the Ripper but that is CPU based) 

300

You exploit a vulnerable WordPress plugin to gain remote code execution.

What is Exploitation?

300

A vulnerability that allows execution of commands on a remote system.

What is Remote Code Execution (RCE)? or CE


300

A system has a SUID binary using nano. What is the goal of exploiting this misconfiguration?

What is spawning a root shell (or editing privileged files as root)?

300

Removing unnecessary SUID permissions helps prevent this type of attack.

What is privilege escalation?

400

This tool or technique allows you to extract hidden repository data from a misconfigured web server exposing a .git directory.

What is git-dumper (or manually downloading the .git directory)?

400

After gaining access, you escalate privileges using a SUID binary to become root.

What is Post-Exploitation (Privilege Escalation)?

400

A special permission that allows a file to run with the privileges of its owner.

What is SUID?

400

You crack a hash and log in via SSH—what is the next logical step in a pentest?

What is privilege escalation (or post-exploitation enumeration)?

400

Keeping software like WordPress and plugins updated helps prevent this.

What is exploitation of known vulnerabilities?

500

This flag in gobuster allows you to specify the wordlist used for directory brute-forcing.
Answer:

What is -w?

500

You document all findings, vulnerabilities, and steps taken for the client.

What is Reporting?

500

The process of increasing your level of access on a system.

What is privilege escalation?

500

You gain RCE on a web server but it’s unstable. What is a more reliable method to maintain access?

What is establishing a reverse shell or SSH access?

500

Blocking access to .git directories follows this core security principle of limiting access only to what is necessary.

What is the principle of least privilege?

M
e
n
u