CompTIA PenTest+
1 Threats, Attacks, and Vulnerabilities
1-1 Common Threat Actors
1-2 Threat Intelligence Sources
1-3 Threat Actors and Motives
1-4 Threat Actor Tactics, Techniques, and Procedures (TTPs)
1-5 Vulnerability Types
1-6 Exploit Types
1-7 Attack Types
1-8 Threat Detection and Monitoring
1-9 Threat Hunting
1-10 Incident Response
2 Architecture and Design
2-1 Security Controls
2-2 Network Architecture
2-3 Cloud and Virtualization
2-4 Web Application Security
2-5 Wireless Security
2-6 Mobile Security
2-7 IoT Security
2-8 Industrial Control Systems (ICS) Security
2-9 Physical Security
2-10 Secure Software Development
3 Tools and Code
3-1 Penetration Testing Tools
3-2 Exploitation Tools
3-3 Post-Exploitation Tools
3-4 Reporting Tools
3-5 Scripting and Automation
3-6 Programming Languages
3-7 Code Analysis
3-8 Open Source Intelligence (OSINT) Tools
4 Planning and Scoping
4-1 Penetration Testing Methodologies
4-2 Legal and Compliance Considerations
4-3 Scope Definition
4-4 Risk Assessment
4-5 Threat Modeling
4-6 Information Gathering
4-7 Asset Identification
4-8 Data Classification
4-9 Business Impact Analysis
4-10 Penetration Testing Objectives
5 Information Gathering and Vulnerability Identification
5-1 Passive Reconnaissance
5-2 Active Reconnaissance
5-3 Vulnerability Scanning
5-4 Network Mapping
5-5 Service Identification
5-6 Web Application Scanning
5-7 Wireless Network Scanning
5-8 Social Engineering Techniques
5-9 OSINT Techniques
5-10 Vulnerability Databases
6 Attacks and Exploits
6-1 Exploit Development
6-2 Buffer Overflows
6-3 SQL Injection
6-4 Cross-Site Scripting (XSS)
6-5 Cross-Site Request Forgery (CSRF)
6-6 Command Injection
6-7 Privilege Escalation
6-8 Lateral Movement
6-9 Evasion Techniques
6-10 Exploit Delivery Methods
7 Penetration Testing Process
7-1 Pre-Engagement Activities
7-2 Reconnaissance
7-3 Scanning and Enumeration
7-4 Exploitation
7-5 Post-Exploitation
7-6 Reporting
7-7 Remediation
7-8 Retesting
7-9 Documentation and Evidence Collection
7-10 Communication and Coordination
8 Reporting and Communication
8-1 Report Structure
8-2 Executive Summary
8-3 Technical Findings
8-4 Risk Assessment
8-5 Remediation Recommendations
8-6 Legal and Compliance Considerations
8-7 Presentation Skills
8-8 Communication with Stakeholders
8-9 Documentation Standards
8-10 Continuous Improvement
9 Security and Compliance
9-1 Regulatory Requirements
9-2 Industry Standards
9-3 Compliance Audits
9-4 Data Protection
9-5 Privacy Laws
9-6 Incident Response Planning
9-7 Disaster Recovery Planning
9-8 Business Continuity Planning
9-9 Risk Management
9-10 Security Awareness Training
2.2 Network Architecture

2.2 Network Architecture

Network architecture refers to the design and structure of a computer network, including the layout, protocols, and technologies used. Understanding network architecture is crucial for effective penetration testing, as it provides insight into how data flows and where potential vulnerabilities may exist.

Key Concepts

1. Network Topology

Network topology defines the physical or logical arrangement of devices in a network. Common topologies include bus, star, ring, and mesh. Each topology has its own advantages and disadvantages in terms of scalability, reliability, and performance.

Example: A star topology connects all devices to a central hub or switch. This configuration is easy to manage but can be a single point of failure if the central hub fails.

2. Network Protocols

Network protocols are a set of rules and conventions that govern how data is transmitted across a network. Key protocols include TCP/IP, HTTP, FTP, and DNS. Understanding these protocols is essential for identifying and exploiting vulnerabilities during penetration testing.

Example: TCP/IP is the foundational protocol suite for the internet. It ensures reliable data transmission by breaking data into packets, assigning sequence numbers, and reassembling them at the destination.

3. Network Layers

Network layers refer to the different levels of abstraction in a network, as defined by the OSI model or the TCP/IP model. Each layer has specific functions, such as data encapsulation, routing, and error detection. Penetration testers must understand these layers to effectively target and exploit vulnerabilities.

Example: The OSI model has seven layers, from physical (Layer 1) to application (Layer 7). A penetration tester might focus on the application layer to identify vulnerabilities in web applications.

4. Network Devices

Network devices include routers, switches, firewalls, and access points. Each device plays a specific role in managing and securing network traffic. Understanding the function of these devices is crucial for identifying potential attack vectors during penetration testing.

Example: A firewall acts as a barrier between a trusted internal network and untrusted external networks, filtering traffic based on predefined security rules.

5. Network Segmentation

Network segmentation involves dividing a network into smaller, isolated segments to enhance security and performance. This practice limits the spread of attacks and facilitates better traffic management.

Example: A company might segment its network by department, with each department having its own subnet. This prevents a breach in one department from affecting the entire network.

Analogies and Examples

Consider a city's transportation system as an analogy for network architecture. The roads and highways represent network topology, with different layouts affecting traffic flow. Traffic signals and rules represent network protocols, ensuring safe and orderly movement. The different modes of transportation, such as cars, buses, and trains, represent network layers, each serving a specific purpose. The various transportation hubs, like bus stations and train terminals, represent network devices, managing traffic and ensuring connectivity. Finally, zoning laws that divide the city into districts represent network segmentation, enhancing security and efficiency.

By understanding these key concepts, penetration testers can better analyze and exploit network vulnerabilities, ensuring a more secure and resilient network architecture.