4. Rules of engagement are a set of guidelines that define the scope, objectives, and limitations of the pen testing engagement. They typically specify the systems and applications that are in scope for the test, the types of testing activities that are permitted, and any restrictions or limitations that must be followed.
5. Lateral movement refers to the process of moving from one compromised system to another within a target network to gain access to additional resources.
6. Privilege escalation refers to the process of gaining higher-level privileges on a target system. This can be achieved by exploiting vulnerabilities or misconfigurations in the target system or by using valid credentials obtained through other means.
7. Persistence refers to the ability of an attacker to maintain access to a target system even after a reboot or other actions that would normally disrupt the attacker's access.
8. Cleanup refers to the process of removing any evidence of the pen testing activities from the target system and restoring it to its pre-test state.
9. Bug bounty programs are incentives offered by organizations to reward individuals for reporting security vulnerabilities in their systems and applications.
10. Pivoting refers to the process of using a compromised system as a jumping-off point to reach other systems on the target network. This allows an attacker to move laterally through the target network and gain access to additional resources.
Passive and active reconnaissance
Drones
War flying
War driving
Footprinting
OSINT
Passive and active reconnaissance are two types of information gathering techniques used in security assessments, including penetration testing.
Passive reconnaissance refers to gathering information about a target system or network without interacting directly with it. This can include techniques like open-source intelligence (OSINT) gathering, reviewing public information about the target, and analyzing network or system metadata.
Active reconnaissance, on the other hand, involves actively interacting with the target system or network to gather information. This can include techniques like war flying (flying a drone over the target), war driving (driving around with a wireless-enabled device to gather information about wireless networks), footprinting (gathering information about a target network or system using tools like port scans, whois, and nslookup), and other similar techniques. The goal of active reconnaissance is to gather as much information as possible about the target system or network, including identifying open ports and services, operating systems, and other relevant details.
Exercise types - Red-team - Blue-team - White-team - Purple-team
Exercise types refer to the various simulations that can be conducted to test an organization's security posture.
1. Red-team: This is a simulation of an adversarial attack, where a team of security experts act as attackers and attempt to penetrate the organization's systems, networks, and processes to identify vulnerabilities.
2. Blue-team: This is a simulation of the organization's defense mechanism, where a team of security experts act as defenders and monitor and respond to potential threats.
3. White-team: This is a simulation that is independent and objective, where a team of security experts evaluate the organization's security posture and provide recommendations for improvement.
4. Purple-team: This is a combined simulation of red and blue teams, where both teams work together to test the organization's security posture, identify vulnerabilities, and improve the organization's defense mechanisms.