Pentesting Fundamentals
Task 2 Penetration Testing Ethics
You are given permission to perform a security audit on an organisation; what type of hacker would you be?
Ans: White Hat
You attack an organisation and steal their data, what type of hacker would you be?
Ans: black hat
What document defines how a penetration testing engagement should be carried out?
Ans: Rules of Engagement
Task 3 Penetration Testing Methodologies
What stage of penetration testing involves using publicly available information?
Ans: Information Gathering
If you wanted to use a framework for pentesting telecommunications, what framework would you use? Note: We’re looking for the acronym here and not the full name.
Ans: OSSTMM
What framework focuses on the testing of web applications?
Ans: OWASP
Task 4 Black box, White box, Grey box Penetration Testing
You are asked to test an application but are not given access to its source code — what testing process is this?
Ans: Black Box
You are asked to test a website, and you are given access to the source code — what testing process is this?
Ans: White Box
Practical: ACME Penetration Test
Ans: THM{PENTEST_COMPLETE}