1. Penetration Testing Overview

What are the 4 common steps of a Penetration Test?

Reconnaissance, Vulnerability Identification, Vulnerability Exploitation, Reporting

Which of the following techniques/tools are used during the Vulnerability Exploitation phase?

SQL Injection
XSS Payload
Webshell
Default 
  1. Port Scanning

Why is Port Scanning so important when performing reconnaissance on a target?

Port Scanning allows to discover services (e.g. FTP, SMTP, HTTP, etc) running on the target machine which could potentially be misconfigured or vulnerable.

Which parameter would you use to perform a UDP scan with nmap?

-sU

Which of the following ports are open on the machine?

21/TCP
80/TCP
445/TCP
443/TCP
137/UDP
  1. Service Fingerprinting

What is running on port TCP/21?

Xlight ftpd 3.9

After looking at the nmap documentation, explain why the usage of the -A option should be carefully considered before being run in a client network.

Because it enables a set of intrusive and aggressive tests that require permission from the customer.