0% found this document useful (0 votes)
67 views7 pages

Comptia Security+ Domain 1

This document discusses penetration testing concepts for the CompTIA Security+ exam. It defines penetration testing as an authorized simulated attack on a system to evaluate security. There are different types of penetration tests including black box, white box, and gray box. The steps of a penetration test include information gathering, initial exploitation, pivoting to other systems, persistence, and privilege escalation. Penetration testing is compared to vulnerability scanning and risk assessment. Sample exam questions are provided about active reconnaissance and pivoting.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views7 pages

Comptia Security+ Domain 1

This document discusses penetration testing concepts for the CompTIA Security+ exam. It defines penetration testing as an authorized simulated attack on a system to evaluate security. There are different types of penetration tests including black box, white box, and gray box. The steps of a penetration test include information gathering, initial exploitation, pivoting to other systems, persistence, and privilege escalation. Penetration testing is compared to vulnerability scanning and risk assessment. Sample exam questions are provided about active reconnaissance and pivoting.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

CompTIA Security+ 501

CompTIA Security+
SY0-501

Instructor: Ron Woerner, CISSP, CISM

CompTIA Security+
Domain 1 –
Threats, Attacks and Vulnerabilities

1.4 Explain penetration


testing concepts

Cybrary Instructor: Ron Woerner 1


CompTIA Security+ 501

1.4 Explain penetration testing concepts


Penetration Testing vs. Vulnerability Scanning vs. Risk Assessment

● Active reconnaissance ● Black box


● Passive reconnaissance ● White box
● Pivot ● Gray box
● Initial exploitation
● Persistence
● Escalation of privilege

Penetration Testing
A penetration test, or a pen test, is an authorized,
simulated attack on a computer system, performed to
evaluate the security of the system by actively
exploiting found vulnerabilities.
aka Ethical Hacking

Process

Cybrary Instructor: Ron Woerner 2


CompTIA Security+ 501

Penetration Testing Requirements


● Scope document of what will be tested
● Permission to test (get-out-of-jail-free card)
● Skills to attack resources limiting harm or collateral damage
● Plan of attack / steps
● Resources & access to conduct the test

Information Gathering /
Discovery / Reconnaissance

● Passive reconnaissance: an attempt to gain information about targeted


computers and networks without actively engaging with the systems.
(examples: collecting information from public databases, talking to
employees/partners, dumpster diving)

● Active reconnaissance: Gathering formation about targeted systems by


actively engaging with the targeted system.
Directly focuses on the system (port scans, traceroute information, network
mapping, vulnerability scanning) to identify weaknesses that could be used to
launch an attack.

Cybrary Instructor: Ron Woerner 3


CompTIA Security+ 501

Types of testing
● Black Box: The tester has absolutely no knowledge of the
system and is functioning in the same manner as an outside
attacker.
● White Box: The tester has significant knowledge of the
system. This simulates an attack from an insider—a rogue
employee.
● Gray Box: This is a middle ground between the first two types
of testing. In gray box testing, the tester has some limited
knowledge of the target system.

Types of testing

● Nonintrusive tests involve passively testing of security


controls—performing vulnerability scans and probing for
weaknesses but not exploiting them.

● Intrusive tests involve actually trying to exploit vulnerabilities to


break into the network.

Cybrary Instructor: Ron Woerner 4


CompTIA Security+ 501

Penetration Testing Activities


● Initial exploitation: Gain a foothold on a system / network.
This is often with lesser privileges or access.
● Pivot: attacking a system using another, compromised system
that’s trusted to the one you are attacking.
Often done on the same network through island hopping.
● Persistence: Maintaining access for a period of time / hiding
● Escalation of privilege: Gaining elevated privileged access to
resources that are normally protected from an application or user.

Penetration Testing vs.


Vulnerability Scanning vs.
Risk Assessment
● Penetration Test: see definition above
A penetration test is essentially an attempt to exploit these vulnerabilities
● Vulnerability Scanning: Allows tester to identify specific vulnerabilities in a
network, system or application.
Most penetration testers will start with this procedure so that they can identify
likely targets to attack.
● Risk Assessment: Allows an organization to understand the cybersecurity
risk to organizational operations (including mission, functions, image, or
reputation), organizational assets, systems or individuals

Cybrary Instructor: Ron Woerner 5


CompTIA Security+ 501

Sample question
Of the following types of testing steps, which
focuses on directly scanning a system, using
techniques such as port scans, network mapping,
ICMP scans to identify potential weaknesses?

A. Operational reconnaissance
B. Active reconnaissance
C. Passive reconnaissance
D. Initial exploitation

Sample question
In initially conducting a penetration test, you find
vulnerabilities on a separate, less secure server on
the same network as the one you’re investigating.
You use access to that server to then attack the
target servers. This type of exploit is know as:

A. Escalation of privileges
B. Pivoting
C. Active reconnaissance
D. Persistence

Cybrary Instructor: Ron Woerner 6


CompTIA Security+ 501

CompTIA Security+
Domain 1 –
Threats, Attacks and Vulnerabilities
1.4 Explain penetration testing concepts

Cybrary Instructor: Ron Woerner 7

You might also like