Time
10 hours 32 minutes
Difficulty
Beginner
CEU/CPE
11

Video Transcription

00:01
Welcome to Cyber Aires Video. Siri's in the Company of Security Plus 5 +01 Certification and Exam.
00:07
I'm your instructor Round Warner.
00:10
In this video, we'll be discussing different penetration testing techniques and concepts.
00:16
This is Section one died for in domain one threats, attacks and vulnerabilities.
00:24
In section 1.4. I'll be explaining penetration testing concepts, including the difference between penetration, testing, vulnerability assessments and risk assessments.
00:34
Also talk about active versus passive reconnaissance,
00:38
pivoting,
00:39
initial exploitation,
00:41
persistence, escalation of privilege
00:44
and the use of different systems, such as a black box, white box or gray box. To conduct the penetration test.
00:52
I'll begin by defining what a penetration test ISS.
00:56
A pen test is an authorized or simulated attack on a computer system performed to evaluate the security of the system or application by actively exploited, exploiting found vulnerabilities. The concept is you find vulnerabilities, then you exploit them.
01:14
This may also be known as ethical hacking
01:17
on your screen. You see the process, associate it with penetration testing
01:22
Step one information gathering step to threaten modeling,
01:26
Step three vulnerability analysis for exploitation
01:32
five post exploitation
01:34
privilege escalation
01:36
and then six reporting reporting what you find is the ultimate objective of a pen test is to fix the problems and secure the information systems.
01:49
Before you begin a penetration test,
01:51
you need to be aware of the requirements.
01:53
First, you need to scope what you're going to be attacking.
01:57
Is it a single system, a single application, a network, a sub network?
02:02
Your scope net document needs to list everything that you will be addressing. Then you stay within that scope within your pen test.
02:12
You also need to have permission to test call this your get out of jail free card.
02:16
So if anyone accuses you of exploiting the computer systems, you can show them that you're validated by some type of authority.
02:24
You should also have the skills and to attack. The resource is make sure you're not causing inadvertent harm or collateral damage.
02:34
Also, as part of a pen test is your plan of attack and your steps. It's like a project plan, if you will. How will you go about your testing? You should be listing out those steps and to make sure you're not causing inadvertent damage.
02:50
Lastly, you need make sure you have re sources and access to conduct the test.
02:54
If you don't have the network access, that won't even begin to be successful and you have the systems and application resource is the tools.
03:04
Complete your penetration testing.
03:07
Review these testing requirements and make sure you go through each of them before you actually begin any hacking.
03:15
Earlier, I mentioned the different steps associated with the pen test.
03:19
After you've established your scope, you want to then do your information gathering, discovery and reconnaissance gaining information about thes systems, network or applications you will be attacking and trying to exploit. This could be through the Internet using open source
03:36
intelligence like I talked about in the last video
03:38
were performing some type of a reconnaissance. There's passive reconnaissance, which is an attempt to gain information about targeted computers and networks without actively engaging with the systems. For example, I can check on Google and see what's in the Google cash on that particular system, network or website
03:58
could also go to other types of public databases,
04:00
talkto employees or partners or even dumpster diving.
04:04
Then there's active reconnaissance, which is gaining information about the targeted systems by actively engaging
04:12
with them. So when I actively get my hands on the systems to gain information was the operating system and use. What is their patch level or application version? Ing
04:23
that's directly focuses on the system using port scans, trace route information network mapping and vulnerability scanning toe. Identify weaknesses that could be used to launch an attack.
04:35
When you're conducting your penetration test, you may use one of these three types of boxes, if you will,
04:43
with a black box scenario. The tester has absolutely no knowledge of the system and is functioning in the same manner as an outside attacker. So I'm going after an entity, and I don't know anything about them.
04:56
White box approach is where the tester has significant knowledge of the system. The simulates an attack, say from an insider, a rogue employee.
05:05
Gray boxes Somewhere in between, it's that middle ground in gray box testing, the tester has some limited knowledge of the targeted system.
05:15
You'll use black box testing when you want to simulate complete attack from an outside
05:20
white box would be more from an insider type of impact.
05:25
Also, be aware of the different types of testing, whether their truce, it or non intrusive
05:31
nonintrusive tests are passively testing for security controls, performing vulnerability scans and probing for weaknesses but not exploiting them. So Vulnerability Scan is a form of non intrusive, test
05:46
intrusive tests involved actively trying to exploit vulnerabilities to break into the network or the application I'm intruding into the network or into that application.
05:58
Once you've conducted your initial reconnaissance,
06:01
we'll begin planning your actual pen test activities. Determining howto have that initial exploitation gaining foothold on a system or a network?
06:12
This is often with lesser privileges or access. I'll find some type of vulnerability based level on an application
06:18
and exploited or use fishing against a employee to gain internal access to a network.
06:26
Once I have access at some level, I will then try to pivot.
06:30
It's attacking one system, using another system or one account, using a different account, taking the compromise system and attacking another that's been trusted.
06:43
This is often done on the same network through island hopping.
06:47
Persistence is maintaining access for a period of time. Basically hiding.
06:53
I might gain my initial access, but then want to kind of hide in plain sight to make sure I'm not triggering any intrusion detection system.
07:01
Lastly, is that escalation or elevation of privilege,
07:05
gaining elevated, privileged access to resources that are normally protected from an application or user.
07:13
This could also be a form of pivoting. We'll start out with a base level, access as a normal user and try to gain route or administrator access in order to conduct even more damage and exploit the system
07:27
all in an effort to understand the security atmosphere within that system. Tau offer controls to better protect it.
07:35
It's important you understand the different between penetration, testing, vulnerability assessments and risk assessments.
07:43
See the definition above for penetration test. It's actively exploiting gaining hands on internal systems and applications.
07:51
Vulnerability scan is a little more passive. Allows the tester to identify specific vulnerabilities and network system or application.
08:01
Most pen tester. Start with this procedures that can identify likely targets to attack.
08:07
Last is a risk assessment just a lot higher level? This allows an organization to understand the cyber security risk to the organizational operations, including mission functions, images, reputation,
08:20
the risk to the organizational assets systems were individuals.
08:24
I talked more about risk assessments in risk management. In another video.
08:30
In this video, I discussed section 1.4 explained Penetration testing concepts.
08:35
Let's practice on a few of sample quiz questions.
08:39
Question one
08:41
of the following types of testing steps, which focuses on directly scanning a system using techniques such as port scans, network mapping, ICMP scans all toe identify potential weaknesses.
08:54
The answer is
08:56
be active reconnaissance.
08:58
This is the definition for active reconnaissance
09:03
question, too,
09:03
and initially conducting a penetration test, you find vulnerabilities on a separate, less secure server on the same network as the one you're investigating.
09:13
You use access to that server to then attack the target servers.
09:18
This type of exploit is known as
09:20
be
09:22
pivoting. We start on one system and you pivot the others that you really want to attack.
09:30
This concludes the video for section 1.4 explained Penetration Testing Concepts.
09:35
Please refer to your study notes for more information on this topic.

Up Next

CompTIA Security+

CompTIA Security Plus certification is a great place to start learning IT or cybersecurity. Take advantage of Cybrary's free Security+ training.

Instructed By

Instructor Profile Image
Ron Woerner
CEO, President, Chief Consultant at RWX Security Solutions LLC
Instructor