Podcast
Questions and Answers
Which of the following best describes the primary goal of the Ethical Hacking and Penetration Testing module?
Which of the following best describes the primary goal of the Ethical Hacking and Penetration Testing module?
The module leader's office is permanently located in MAE 329.
The module leader's office is permanently located in MAE 329.
False
Name one of the two lecturers who teach the Ethical Hacking and Penetration Testing module.
Name one of the two lecturers who teach the Ethical Hacking and Penetration Testing module.
Nemitari Ajienka or Kwame Assa-Agyei
Module specifications can be found in the Learning Room on ______.
Module specifications can be found in the Learning Room on ______.
Signup and view all the answers
Match the learning outcomes with their respective categories:
Match the learning outcomes with their respective categories:
Signup and view all the answers
What accreditation does the Module Leader, Dr Nemitari Ajienka hold?
What accreditation does the Module Leader, Dr Nemitari Ajienka hold?
Signup and view all the answers
The module focuses solely on the theoretical aspects of penetration testing, excluding practical skills.
The module focuses solely on the theoretical aspects of penetration testing, excluding practical skills.
Signup and view all the answers
According to the description, what is one aspect of penetration testing that students will assess in this module?
According to the description, what is one aspect of penetration testing that students will assess in this module?
Signup and view all the answers
Proper pre-engagement activities are essential to mitigate risks like unsatisfied customers, scope creep, and potential legal issues.
Proper pre-engagement activities are essential to mitigate risks like unsatisfied customers, scope creep, and potential legal issues.
Signup and view all the answers
What is the primary purpose of defining the scope in a penetration test?
What is the primary purpose of defining the scope in a penetration test?
Signup and view all the answers
What is the difference between a network penetration test and a web penetration test?
What is the difference between a network penetration test and a web penetration test?
Signup and view all the answers
During a penetration test, if a system is compromised, the testing team should determine how to proceed based on the ______ guidelines.
During a penetration test, if a system is compromised, the testing team should determine how to proceed based on the ______ guidelines.
Signup and view all the answers
Match the type of penetration test with its relevant questions:
Match the type of penetration test with its relevant questions:
Signup and view all the answers
Which of the following factors would be considered during a physical penetration test?
Which of the following factors would be considered during a physical penetration test?
Signup and view all the answers
When assessing a guest wireless network, it is not necessary to determine if authentication is required.
When assessing a guest wireless network, it is not necessary to determine if authentication is required.
Signup and view all the answers
What is the significance of understanding the square footage of coverage for a wireless network during a wireless penetration test?
What is the significance of understanding the square footage of coverage for a wireless network during a wireless penetration test?
Signup and view all the answers
What should you do after validating the country in penetration testing?
What should you do after validating the country in penetration testing?
Signup and view all the answers
You should register on Immersive Labs using any email address.
You should register on Immersive Labs using any email address.
Signup and view all the answers
What is the code used to register on Immersive Labs?
What is the code used to register on Immersive Labs?
Signup and view all the answers
The section on information gathering and footprinting will cover __________ techniques.
The section on information gathering and footprinting will cover __________ techniques.
Signup and view all the answers
Match the following resources with their purpose:
Match the following resources with their purpose:
Signup and view all the answers
What is a primary motivation for black hat hackers?
What is a primary motivation for black hat hackers?
Signup and view all the answers
Grey hats are typically engaged in illegal hacking without any professional responsibilities.
Grey hats are typically engaged in illegal hacking without any professional responsibilities.
Signup and view all the answers
What type of hacker is motivated by political and ideological concerns?
What type of hacker is motivated by political and ideological concerns?
Signup and view all the answers
Black hats break into systems and share ___________ to exploit vulnerabilities.
Black hats break into systems and share ___________ to exploit vulnerabilities.
Signup and view all the answers
Match the types of hackers with their descriptions:
Match the types of hackers with their descriptions:
Signup and view all the answers
Which of the following is NOT a motivation for hackers?
Which of the following is NOT a motivation for hackers?
Signup and view all the answers
Ethical hackers do not require permission to test systems.
Ethical hackers do not require permission to test systems.
Signup and view all the answers
What can result from operating outside the parameters of permitted activity in ethical hacking?
What can result from operating outside the parameters of permitted activity in ethical hacking?
Signup and view all the answers
What is the primary purpose of ethical hacking?
What is the primary purpose of ethical hacking?
Signup and view all the answers
A 'blackhat hacker' is known for their ethical intentions.
A 'blackhat hacker' is known for their ethical intentions.
Signup and view all the answers
What role do 'script kiddies' play in the hacking community?
What role do 'script kiddies' play in the hacking community?
Signup and view all the answers
A _____ is a hacker who uses skills for unlawful acts or mischief.
A _____ is a hacker who uses skills for unlawful acts or mischief.
Signup and view all the answers
Which of the following is NOT a tool required for penetration testing?
Which of the following is NOT a tool required for penetration testing?
Signup and view all the answers
Match the following hacker types with their descriptions:
Match the following hacker types with their descriptions:
Signup and view all the answers
The Internet provides an advantage to hackers by allowing them to attack from anywhere.
The Internet provides an advantage to hackers by allowing them to attack from anywhere.
Signup and view all the answers
Name one strategy included in defensive security tools.
Name one strategy included in defensive security tools.
Signup and view all the answers
Which of the following is NOT a primary focus of ethical hacking?
Which of the following is NOT a primary focus of ethical hacking?
Signup and view all the answers
Penetration testing is solely concerned with identifying vulnerabilities and not with documenting findings.
Penetration testing is solely concerned with identifying vulnerabilities and not with documenting findings.
Signup and view all the answers
What is the purpose of using OSINT in the context of penetration testing?
What is the purpose of using OSINT in the context of penetration testing?
Signup and view all the answers
The process of gathering information about a target before conducting penetration testing is known as __________.
The process of gathering information about a target before conducting penetration testing is known as __________.
Signup and view all the answers
Which tool is commonly used for exploitation in penetration testing?
Which tool is commonly used for exploitation in penetration testing?
Signup and view all the answers
Match the following aspects of penetration testing with their respective descriptions:
Match the following aspects of penetration testing with their respective descriptions:
Signup and view all the answers
Social engineering techniques are not relevant to penetration testing.
Social engineering techniques are not relevant to penetration testing.
Signup and view all the answers
Mention one method used in vulnerability assessment to identify weaknesses in systems.
Mention one method used in vulnerability assessment to identify weaknesses in systems.
Signup and view all the answers
Study Notes
Ethical Hacking and Penetration Testing - Module Overview
- The module is COMP40741
- Module Leader: Dr. Nemitari Ajienka, Senior Lecturer, Certified Security Testing Associate (7Safe, GCHQ Accredited)
- Module Team: Dr. Kwame Assa-Agyei, Lecturer
- Module aims to equip students with knowledge, skills, and ethical considerations to identify and address vulnerabilities in computer systems
- The module aims to introduce students to ethical hacking and penetration testing principles, methodologies, and tools
- The module will develop practical skills to identify and exploit vulnerabilities in computer systems
- The module will evaluate ethical and legal considerations surrounding penetration testing
- The module will cover the importance of risk assessment and mitigation in cybersecurity
Module Specification
- Module information is available online in the NOW learning room
- It covers overview and aims, module content, delivery methods and schedule, indicative reading, learning outcomes, and assessment
Learning Outcomes
-
Knowledge and understanding:
- Demonstrate understanding of penetration testing methodologies
- Demonstrate understanding of ethical hacking principles and methodologies
- Evaluate legal and ethical implications of penetration testing
- Identify, analyse and assess vulnerabilities and threats in computer systems
-
Skills, qualities, and attributes:
- Apply penetration testing techniques to identify and exploit vulnerabilities
- Develop effective strategies for securing computer systems and networks
- Communicate security findings and recommendations through comprehensive reports
- Demonstrate critical thinking in risk assessment and mitigation
Assessment
- 30%: Online in-class test (Individual, K1-K3) - assesses theoretical aspects of penetration testing, ethical hacking, and legal/ethical considerations
- 70%: Report (Individual, K1, K4, S1-S4) - assesses practical hands-on penetration testing project, demonstrating ability to identify and exploit vulnerabilities, mitigate risks, provide actionable recommendations, and communicate findings
Provisional Module Content
- Weeks 1-3: Introduction to Ethical Hacking and Pentesting, Overview of penetration testing methodologies, Information Gathering and Footprinting, Scanning and Enumeration
- Weeks 4-5: Vulnerability Assessment
- Weeks 6-8: Exploitation Techniques and tools, Windows and Linux machines, Password Cracking, Post-exploitation strategies and privilege escalation
- Week 9: Legal and Ethical considerations, Reporting and documentation standards, Risk Assessment and Mitigation
- Week 10: Social engineering techniques/tactics and Support Sessions
Resources/Reference Texts
- Graham, D. G. (2021). Ethical hacking: a hands-on introduction to break in
- Oriyano, S-P. (2017). Penetration testing essentials
- Khawaja, G. (2021). Kali Linux penetration testing bible
- Sabih, Z. (2018). Learn ethical hacking from scratch.
- Baloch, R. (2015). Ethical Hacking and Penetration Testing Guide
Web-based Resources and Tools
- Immersive Labs, Digital Cyber Academy, VMware/Virtual Box, Kali Linux, Metasploitable, Seedubuntu, Ubuntu
Best Security Strategy
- Defensive: Controls, Auditing, Policies, Standards, Guidelines, Designing and Implementing Secure Network Architecture
- Offensive:Pen Testing, Ethical Hacking, Security Assessment, Risk Assessments, Stress Testing
Unfair Security Challenge
- The internet allows attackers to target systems from anywhere worldwide.
- Security needs to address every vulnerability
Who is the Enemy?
- In the 1960s and 1970s, "hacker" referred to a computer expert
- By the 1970s onwards, the term "hacker" became associated with those gaining unauthorized access or engaging in computer-related criminal activities.
Other names for the enemy
- Crackers: Hackers who use their skills for unlawful acts or mischief
- Script Kiddies: Use scripts to perform unauthorized acts without full understanding
- Blackhat hackers: Engage in cybercrimes for profit, espionage, vandalism, or ideological purposes
Their motivations
- Profit (ransomware, scareware, financial data or intellectual property theft)
- Fun/Challenge (e.g., hacking a NASA system)
- Information Systems Criminals (Espionage, fraud, abuse to gain a competitive edge)
- Vandals (Motivated by Anger)
- Political and Ideological (e.g., hacktivism)
- Power/Anger/Sadistic
Goodies or Baddies?
-
Black Hats: Break into systems, develop tools
-
Grey Hats: Work as security professionals during the day and hackers at night
-
White Hats: Part of the security community, help find flaws and make security improvements
-
Ethical hacking is for educational purposes only, not real-world attacks.
Permission/Privacy
- Obtain permission and understand what's allowed in ethical hacking
- Permission doesn't grant a free license to do anything
- Sensitive information must remain confidential
Responsible Disclosure
- Informing companies of security vulnerabilities to help prioritize patching
- Negotiate a period of time for patching before public disclosure to minimize potential exploitation
Legislations
- Laws exist globally regarding computer misuse and unauthorized access. (e.g., Computer Misuse Act 1990 (UK), Computer Fraud and Abuse Act 1986 (USA))
What is Ethical Hacking / Penetration Testing?
- It's a legal and authorized attempt to exploit computer systems to improve security
- Probing vulnerabilities, "Proof of Concept" attacks. Finding weaknesses
- Recommendations for addressing issues
- The idea is that security professionals use the same tools as malicious hackers to find and exploit vulnerabilities, but ethically
Importance of Studying Ethical Hacking/Penetration Testing
- Career prospects, EC-Council Cyber Career Paths list
- Vulnerability Assessment and Penetration Testing (VAPT) Career Paths
- Penetration Testing Framework: Information gathering, Target Scanning, Vulnerability Assessment, Exploitation of Weaknesses, Privilege Escalation, Retaining Access, Covering Tracks
Types of Penetration Testing
- Network / Infrastructure pentest
- Database pentest
- Web pentest
- Wireless pentest
- Social Engineering pentest
- Physical pentest
Types of Penetration Tests
- Black box - No prior information given
- White box - Penetration testers have all details of the network/application
- Grey box - Penetration testers have some details about the target
Pre-Engagement
- Conversations with the client (target) to determine the exact requirements
- Different levels of penetration tests
- Simple IP addressing tests
- Single physical location
- Simulate complete attack by a real attacker
- Requires written permission to perform tests
Topics for Pre-engagement
- Scope, Documentation, Rules of Engagement, Third-Party-Hosted/Cloud Environments, Success Criteria, Review of Past Threats/Vulnerabilities, Avoiding scan interference on security appliances
Defining Scope
- Important part in penetration testing, but easily overlooked
- Pre-engagement helps avoid issues like scope creep, unsatisfied customers, and legal problems, by specifying what will be tested
Questions - Network Penetration Test
- Customer reasons for penetration testing
- Timing for various aspects of the test
- Number and range of IP addresses to be tested
- Existing devices (firewall, IDS/IPS, WAF, load balancers) which influence the test
- How the test team should proceed if a system is penetrated
Questions - Web Penetration Test
- Number of web applications/login/static/dynamic pages
- Availability of source code
- Documentation requirements
- Role-based/credentialed scans
Questions - Wireless Penetration Test
- Number of wireless networks
- Guest network requirements
- Encryption types and Coverage
- Rogue device enumeration
- Assessment of wireless client and network attacks
Questions - Physical Penetration Test
- Number of locations, shared facilities
- Which floors and areas are in scope
- Bypassing security guards
- Entry points
- Use of tools (lock picks, bump keys)
- Compliance with policies/procedures, audit purposes
- Security measures, video cameras
- Access to video camera data storage
- Alarm systems
Questions - Social Engineering Testing
- Email/phone lists
- Social Engineering attack focus
- Unauthorized physical access approval
Scope Creep
- Scope creep is a common issue in penetration testing
- Defining start/end dates, IPs/domains
- Dealing with third-party involvement is key
- Security between different data domains
ISP (Internet Service Provider)
- Verify ISP terms of service
- Involving MSSPs (Managed Security Service Providers) for systems/services they manage
- If testing response times is part of the test, MSSP notification might not be the best approach
- Validate hosting server locations, reviewing local laws
This Week's Lab
- Complete introductory material on Immersive Labs, with the code CYBER-MILLION for registration
- Utilize VM software to practice
Reading List
- Penetration Testing Cheat Sheet
Next Week
- Information Gathering and Footprinting: Passive/Active info gathering, Open-source intelligence (OSINT) techniques
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your understanding of the Ethical Hacking and Penetration Testing module. This quiz covers key aspects such as learning outcomes, accreditation, and the practical applications of penetration testing. Dive into the differences and importance of various penetration testing approaches.