• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/7

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

7 Cards in this Set

  • Front
  • Back

Pen testing backronym

IGESEPEPER


I - Information


Got - Gathering


Even - Enumeration /


So - Scanning


Evan - Exploitation


Picked - Privilege


Emily to - Escalation


Post the - Post


Exam - Exploitation


Report - Reporting

Backronym #2 for Pentesting

IGESEPEPE


Info Gathered - Information Gathering Enormously Since - Enumeration/Scanning


Expanding - Exploitation


Privileges Escalated - Privilege Escalation


Post Exploitation - Post Exploitation

Step 1

Information Gathering


(I Got) or (Info Gathered)

Step 2

Enumeration/Scanning


(Even So) or (Enormously Since)

Step 3

Exploitation


(Evan) or (Expanding)

Step 4

Privilege Escalation


(Picked Emily) or (Privileges Escalated)

Step 5

Post-Exploitation


(Post the Exam <report>) or (Post Exploitation)



Includes:


a) pivoting (what other hosts can be targeted)


b) exfiltration (what additional information can we gather from the host now that we are a privileged user)


c) covering your tracks (removing traces)


d) reporting