Time
33 hours 23 minutes
Difficulty
Beginner
CEU/CPE
33

Video Transcription

00:00
Hello and welcome back to Sai Berries. 2019 Comp Tier Security Plus Certification Preparation course.
00:08
This is a continuation off marginal one,
00:11
and the topic discussion is domain one. Threats, attacks and vulnerabilities.
00:17
We have a brand new objective, which encompasses this particular main,
00:21
which is titled 1.4 explained Pantries and Testing Concepts.
00:27
Let's not turn a teacher what this pre assessment quiz and the question is as follows active economists was, someone actively tries to gain information about the system.
00:38
Is that true or false?
00:41
If you said that you you're absolutely correct,
00:45
continue on in this particular video, we have again the title or other words. The objective is explained penetration testing concepts here again on the topics which actually encompasses this particular objective, ranging from active reconnaissance,
01:00
passive reconnaissance, pivot,
01:03
initial exportation,
01:04
persistent and escalation of privileges.
01:10
Some of this objectives Black box, white box, gray box as well. It's penetration testing and verses vulnerably scanning
01:18
so we look it active versus passive reconnaissance. Obviously, there are some differences when you look at it, too.
01:25
So would active with Connor, since it's what someone actually tries to gain information about the system.
01:33
Then we have passive reconnaissance
01:34
is a former top of the information data collection that takes place where you in an individual personal data, such as passwords stolen without the target individuals knowledge,
01:48
then we have pivot.
01:49
Basically, this refers to a method used by penetration testers that uses a compromise system to attack other system on the same network to avoid prescriptions. Such a firewall configuration, which may prohibit direct access to all machines,
02:06
now force the terms in terms of the phases of the Pinterest intestine were actually seven phase. At first we have the pre engagement
02:14
number two record is a three threat modelling for exportation.
02:19
Five post exportation.
02:23
Then we have reporting on number six and number seven. We have retesting
02:28
menace brings us to our initial again part where attacker who are cheesed initial
02:34
would give their trying explore again your systems orderly. Six. To establish persistence in the network, they come and do so via what we call privilege escalation,
02:44
finding to run keys or getting into scripts
02:47
in terms of persistent, it says. Still, T computer network attack and with the personal group, gains unauthorised access to your network and remains undetected for an extended period of time
03:00
escalation privileges is, in fact, the act of exploring a book, a design flaw or configuration oversight in operates system or suffer application at your insensitive to gain elevated access to your resource is that our normal protected from an application or user,
03:19
now forced their number different types of tests that we used to run penetrates intestine. We have the black box. Now. This is a software testing method in which the internal structure design implementation of the item being test is not known to the tester.
03:34
Then we have the white box. In this case is a software testing method in which Dean tonal structure, the design implantation of the item being tested, is known to the tester.
03:44
Now the white box pain. Tessa knows everything about the system,
03:49
the white boss testing with interior knowledge of the software and, well, it's internal programming. The test has full knowledge of internal working of the application,
03:58
basically there. In other words, they they're suited for algorithm tested. So again, these are some of things that want to highlight regarding the white box.
04:06
Then we have the good old gray box, which is a strategy for software debugging in this case in which the test I had limit knowledge off the external details of the program.
04:18
This next slide shows the differences or illustrates it differently in the Black Mouse testing,
04:24
as opposed to your great box test and annual white box test. Let's take a look at this so we're not actually look at each and every one of here. That's Mr here in this particular slide, but we're actually going to go over one. Let's take a look at the black box tested. The internal workings of the application are not required to be known. In other words, you tell my black box testing
04:43
we're great box tests and some
04:45
somewhat knowledge of the internal network or no.
04:48
Then we look at a white box, says the test. I have full knowledge of the internal workings of the application
04:56
Now for us, when you look at Pinterest and test and versus vulnerably Skinny may say, is that one in the same type when you're looking from a definition perspective?
05:05
Well, in fact, that's not true. Let's take a look at what exactly what penetration test is all about
05:11
now. Pinterest intestinal intended to export weakness in your architecture off your I T network and determine the degree to which a malicious attacker can gain another unauthorized access to your assets.
05:24
Then we have the vitamins scam, which had gained the text and classified system with Mrs and your computers, your network and communication equipped and predicts the effectiveness of the counter manages.
05:36
And it's boring time. We have our post assessment question
05:40
and the question is follows. And which of the following does the tester have significant knowledge of the system and simulates attack from an insider? Is a gray box
05:51
be
05:53
red box? See white box or D black box?
05:59
If you said you see you're absolutely correct because with a white box testing, the tester has significant not into the system and simulates an attack from an insider. Other words, a rope employees.
06:11
At this point in time, we have our key takeaways for this particular video.
06:15
First of all, we learned that passive reconnaissance, other words is a form of target information data collection that takes place when an individual personal data, such as a password, was stolen without the target individuals knowledge.
06:29
Then we have a pivot attack in which attack against access to your desktop inside a company that they being used to attack another computer or server.
06:39
An advanced, persistent threat is attacking which in an authorized user gangs access to a system or network and remains there for extended period of time without being detected. The words advanced, Persistent Threat or a P T
06:53
ah black box pin test are given no information on the company.
06:59
The white box test that knows everything about the system
07:02
A great box is strategic for software debugging and wishes. Tester has limited knowledge of the internal details of the program.
07:12
Some additional key takeaways.
07:14
We learned that penetration tests, also called pen intestinal ethical hacking, is the practice of testing. Computer system network or Web application defines security vulnerabilities that attacker could perhaps explored.
07:27
When you look at Venables Scam alert, it's an inspection of potential points of export on a computer or network to identify your security holes
07:36
and our upcoming presentations. In particular, look at a brand new learning objective, which is 1.5 Explain Vulnerable is scanning concepts again. I look for to seeing the very next video

Up Next

CompTIA Security+

Interested in the cybersecurity industry? The CompTIA Security+ is the gold standard for those looking to enter the cybersecurity industry. Join thousands of professionals who have gained this certification through this course and launched their careers in information security.

Instructed By

Instructor Profile Image
Jim Hollis
Independent Contractor
Instructor