Difference between revisions of "SANS 560 Notes"

From SkullSecurity
Jump to navigation Jump to search
(New page: '''Sans 560: Network Penetration and Ethical Hacking''' ==Definitions== * Threat: Agent That can Cause harm * Vulnerability: A flaw that can be exploited * Risk: Overlap of Vulnerability a...)
 
Line 4: Line 4:
* Vulnerability: A flaw that can be exploited
* Vulnerability: A flaw that can be exploited
* Risk: Overlap of Vulnerability and threat
* Risk: Overlap of Vulnerability and threat
* Exploit: Code/Technique used by a threat on a vulnerability
* Active attack: manipulates target
* Passive Attack: Does not manipulate target
* Ethical Hacking: Using attack techniques to find flaws with permission, to improve security ( aka white hat hacker )
* Penetration testing: An attempt to gain entry to a network
* Security Assessments/Vulnerability Assessment: Finding vulnerabilities
* Security Audit: Comparing findings against a set of standards
* Phases of an attack
** Recon
** Scanning
** Exploitation
* Pentesting limitations:
** Scope
** Time
** Methods

Revision as of 16:21, 30 July 2008

Sans 560: Network Penetration and Ethical Hacking

Definitions

  • Threat: Agent That can Cause harm
  • Vulnerability: A flaw that can be exploited
  • Risk: Overlap of Vulnerability and threat
  • Exploit: Code/Technique used by a threat on a vulnerability
  • Active attack: manipulates target
  • Passive Attack: Does not manipulate target
  • Ethical Hacking: Using attack techniques to find flaws with permission, to improve security ( aka white hat hacker )
  • Penetration testing: An attempt to gain entry to a network
  • Security Assessments/Vulnerability Assessment: Finding vulnerabilities
  • Security Audit: Comparing findings against a set of standards
  • Phases of an attack
    • Recon
    • Scanning
    • Exploitation
  • Pentesting limitations:
    • Scope
    • Time
    • Methods