Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
7 Cards in this Set
- Front
- Back
Pen testing backronym |
IGESEPEPER I - Information Got - Gathering Even - Enumeration / So - Scanning Evan - Exploitation Picked - Privilege Emily to - Escalation Post the - Post Exam - Exploitation Report - Reporting |
|
Backronym #2 for Pentesting |
IGESEPEPE Info Gathered - Information Gathering Enormously Since - Enumeration/Scanning Expanding - Exploitation Privileges Escalated - Privilege Escalation Post Exploitation - Post Exploitation |
|
Step 1 |
Information Gathering (I Got) or (Info Gathered) |
|
Step 2 |
Enumeration/Scanning (Even So) or (Enormously Since) |
|
Step 3 |
Exploitation (Evan) or (Expanding) |
|
Step 4 |
Privilege Escalation (Picked Emily) or (Privileges Escalated) |
|
Step 5 |
Post-Exploitation (Post the Exam <report>) or (Post Exploitation) Includes: a) pivoting (what other hosts can be targeted) b) exfiltration (what additional information can we gather from the host now that we are a privileged user) c) covering your tracks (removing traces) d) reporting |