What are the 4 common steps of a Penetration Test?
Reconnaissance, Vulnerability Identification, Vulnerability Exploitation, Reporting
Which of the following techniques/tools are used during the Vulnerability Exploitation phase?
SQL Injection
XSS Payload
Webshell
Default
Why is Port Scanning so important when performing reconnaissance on a target?
Port Scanning allows to discover services (e.g. FTP, SMTP, HTTP, etc) running on the target machine which could potentially be misconfigured or vulnerable.
Which parameter would you use to perform a UDP scan with nmap?
-sU
Which of the following ports are open on the machine?
21/TCP
80/TCP
445/TCP
443/TCP
137/UDP
What is running on port TCP/21?
Xlight ftpd 3.9
After looking at the nmap documentation, explain why the usage of the -A option should be carefully considered before being run in a client network.
Because it enables a set of intrusive and aggressive tests that require permission from the customer.