Before starting a penetration test, you must obtain this formal agreement outlining the rules of engagement.
Statement of Work (SOW)
This passive reconnaissance method involves searching for company information on social media and public websites.
Open-Source Intelligence (OSINT)
This attack floods a network with traffic, making resources unavailable to legitimate users.
Denial-of-Service (DoS)
This report is presented to stakeholders after a penetration test, summarizing findings and remediation steps.
Penetration Testing Report
This Linux-based penetration testing distribution comes preloaded with ethical hacking tools.
Kali Linux
This type of penetration test restricts the tester from knowing internal details about the target, simulating a real-world external attack.
Black Box Test
What is the primary tool used for vulnerability scanning in penetration testing?
Nessus
Attackers use this type of code injection to steal session cookies from a user’s browser.
Cross-Site Scripting (XSS)
A penetration tester must classify vulnerabilities using this industry-standard scoring system.
Common Vulnerability Scoring System (CVSS)
This tool is commonly used for packet analysis and network traffic monitoring.
Wireshark
This legal document ensures that penetration testers have permission to test systems without facing legal consequences.
Rules of Engagement (RoE)
The acronym OWASP stands for what?
Open Web Application Security Project
This attack technique exploits memory corruption to execute arbitrary code on a target machine.
Buffer Overflow
This report section explains how a vulnerability was discovered, what impact it has, and how it can be remediated.
Post-Exploitation
A penetration tester can automate reconnaissance using this Python-based tool to scrape open-source data.
theHarvester
During scoping, penetration testers consider the RTO and RPO. What do these abbreviations stand for?
Recovery Time Objective (RTO) and Recovery Point Objective (RPO)
This type of scan identifies live hosts and open ports on a network before an exploit attempt.
Network Enumeration Scan
Attackers use this method to escalate privileges by exploiting weak system configurations or kernel vulnerabilities.
Privilege Escalation
This report section explains how a vulnerability was discovered, what impact it has, and how it can be remediated.
Executive Summary
This scripting language is frequently used in penetration testing to automate tasks and create exploits.
Python
When planning an engagement, testers assess risk, cost, and potential impact. This process is called what?
Business Impact Analysis (BIA)
This technique manipulates DNS queries to gather intelligence on a target’s infrastructure.
DNS Zone Transfer
This advanced post-exploitation attack allows an attacker to execute system commands remotely without direct user interaction.
Pass-the-Hash
This framework standardizes the way cybersecurity professionals share information about threats and vulnerabilities.
MITRE ATT&CK framework
Reverse engineering malware often involves analyzing this type of code, which represents machine instructions.
Assembly Language