20. Lesson Recap
Lesson Recap
ND545 C3 L2 A11 Lesson Conclusion
Now that we've completed the lesson, you should be able to:
- Leverage the MITRE ATT&CK framework to understand attack methods
- Configure and launch scans to find vulnerabilities
- Explain the steps required to conduct a penetration test
Glossary
Term | Definition |
---|---|
Scope | Determine, conceptually what you want to test. For example, you can target a certain data center looking for a specific set of issues, a specific application, or other reasons. |
Identify | Pinpoint the specific host, network, application, or other resource targets. Here you may identify specific IP addresses or URLs for example. |
Scan | Configure and run the scan or test against the identified target. Here you are using various tools and methods, such as vulnerability scanning software, to find the issues. |
Host and network vulnerability scans | Used to find vulnerabilities on servers, desktop, mobile devices, etc. within a network. Active vulnerability scanning used to traffic and actions to identify vulnerabilities. Passive scanning listens on the system and identifies issues in server and client software. |
Application vulnerability scans | Target security within code and its operation. The dynamic application scans test functionality while the program is executing operations, while static scans test functionality without running any code. |
Penetration testing | Another level of actively trying to see if you can essentially break security. Penetration tests can target networks, hosts, people, and physical assets. |
White box testing | A test methodology that assumes explicit and substantial knowledge of the internal structure and implementation detail of the assessment object. |
Black box testing | A test methodology that assumes no knowledge of the internal structure and implementation detail of the assessment object. |
Gray box testing | A test methodology that assumes some knowledge of the internal structure and implementation detail of the assessment object. |
Brute Force Attack | The attacker tries every possible password combination until one works. |
Dictionary password attack | The attacker uses a dictionary list of common user passwords in a hashed format, and compares it to a password hash list "stolen" from a system. |
Social engineering password | Attackers who pretend to be employees try to get access to systems information by asking other employees for their usernames and passwords. Once they successfully get the credentials from the employees, they'll try to use the information to gain access to the company's systems. |
As a side note, this course is a foundational course that is meant to help build the knowledge to become job-ready, but you will likely need additional training and/or coursework in order to obtain a job in this field. These foundations will set you up for success going forward and are vital to your success in this field.