CompTIA PenTest+
1 Threats, Attacks, and Vulnerabilities
1-1 Common Threat Actors
1-2 Threat Intelligence Sources
1-3 Threat Actors and Motives
1-4 Threat Actor Tactics, Techniques, and Procedures (TTPs)
1-5 Vulnerability Types
1-6 Exploit Types
1-7 Attack Types
1-8 Threat Detection and Monitoring
1-9 Threat Hunting
1-10 Incident Response
2 Architecture and Design
2-1 Security Controls
2-2 Network Architecture
2-3 Cloud and Virtualization
2-4 Web Application Security
2-5 Wireless Security
2-6 Mobile Security
2-7 IoT Security
2-8 Industrial Control Systems (ICS) Security
2-9 Physical Security
2-10 Secure Software Development
3 Tools and Code
3-1 Penetration Testing Tools
3-2 Exploitation Tools
3-3 Post-Exploitation Tools
3-4 Reporting Tools
3-5 Scripting and Automation
3-6 Programming Languages
3-7 Code Analysis
3-8 Open Source Intelligence (OSINT) Tools
4 Planning and Scoping
4-1 Penetration Testing Methodologies
4-2 Legal and Compliance Considerations
4-3 Scope Definition
4-4 Risk Assessment
4-5 Threat Modeling
4-6 Information Gathering
4-7 Asset Identification
4-8 Data Classification
4-9 Business Impact Analysis
4-10 Penetration Testing Objectives
5 Information Gathering and Vulnerability Identification
5-1 Passive Reconnaissance
5-2 Active Reconnaissance
5-3 Vulnerability Scanning
5-4 Network Mapping
5-5 Service Identification
5-6 Web Application Scanning
5-7 Wireless Network Scanning
5-8 Social Engineering Techniques
5-9 OSINT Techniques
5-10 Vulnerability Databases
6 Attacks and Exploits
6-1 Exploit Development
6-2 Buffer Overflows
6-3 SQL Injection
6-4 Cross-Site Scripting (XSS)
6-5 Cross-Site Request Forgery (CSRF)
6-6 Command Injection
6-7 Privilege Escalation
6-8 Lateral Movement
6-9 Evasion Techniques
6-10 Exploit Delivery Methods
7 Penetration Testing Process
7-1 Pre-Engagement Activities
7-2 Reconnaissance
7-3 Scanning and Enumeration
7-4 Exploitation
7-5 Post-Exploitation
7-6 Reporting
7-7 Remediation
7-8 Retesting
7-9 Documentation and Evidence Collection
7-10 Communication and Coordination
8 Reporting and Communication
8-1 Report Structure
8-2 Executive Summary
8-3 Technical Findings
8-4 Risk Assessment
8-5 Remediation Recommendations
8-6 Legal and Compliance Considerations
8-7 Presentation Skills
8-8 Communication with Stakeholders
8-9 Documentation Standards
8-10 Continuous Improvement
9 Security and Compliance
9-1 Regulatory Requirements
9-2 Industry Standards
9-3 Compliance Audits
9-4 Data Protection
9-5 Privacy Laws
9-6 Incident Response Planning
9-7 Disaster Recovery Planning
9-8 Business Continuity Planning
9-9 Risk Management
9-10 Security Awareness Training
6.10 Exploit Delivery Methods Explained

6.10 Exploit Delivery Methods Explained

Key Concepts

1. Phishing

Phishing is a method of exploit delivery where attackers send fraudulent communications that appear to come from a reputable source. These communications often include malicious links or attachments that, when clicked or opened, deliver the exploit to the target system.

2. Watering Hole Attack

A Watering Hole Attack involves compromising a website frequently visited by the target group. The attacker injects malicious code into the website, which is then executed by the target's browser when they visit the site, delivering the exploit.

3. Drive-By Download

Drive-By Download is a method where the exploit is automatically downloaded and executed on the target's system when they visit a compromised website. The exploit is often embedded in the website's code, and the user does not need to take any action for the exploit to be delivered.

4. Social Engineering

Social Engineering involves manipulating individuals into performing actions or divulging confidential information. This method can be used to trick users into downloading and executing malicious files, thereby delivering the exploit.

5. Supply Chain Attack

A Supply Chain Attack targets the software supply chain to deliver exploits. This can involve compromising third-party software or updates that are trusted by the target organization, allowing the exploit to be delivered through seemingly legitimate channels.

6. Exploit Kits

Exploit Kits are automated tools that scan for vulnerabilities in the target's system and deliver the appropriate exploit. These kits are often used in conjunction with other delivery methods, such as compromised websites or phishing emails, to increase the likelihood of successful exploitation.

Explanation of Concepts

Phishing

Phishing attacks often involve emails that appear to be from a trusted source, such as a bank or a colleague. The email may contain a link to a malicious website or an attachment that, when clicked or opened, delivers the exploit to the target's system.

Watering Hole Attack

In a Watering Hole Attack, the attacker identifies a website frequently visited by the target group, such as a company's internal portal or a popular industry forum. The attacker then compromises the website and injects malicious code that delivers the exploit when the target visits the site.

Drive-By Download

Drive-By Download attacks occur when a user visits a compromised website. The website's code contains malicious scripts that exploit vulnerabilities in the user's browser or plugins. The exploit is automatically downloaded and executed without the user's knowledge or interaction.

Social Engineering

Social Engineering attacks often involve convincing the target to perform an action that delivers the exploit. For example, an attacker might call an employee and impersonate a technical support representative, asking them to download and run a "fix" that actually contains the exploit.

Supply Chain Attack

In a Supply Chain Attack, the attacker compromises a third-party software provider or distributor. The compromised software or updates are then delivered to the target organization, allowing the exploit to be installed on the target's systems through trusted channels.

Exploit Kits

Exploit Kits are automated tools that scan the target's system for vulnerabilities and deliver the appropriate exploit. These kits are often used in conjunction with other delivery methods, such as compromised websites or phishing emails, to increase the likelihood of successful exploitation.

Examples and Analogies

Phishing

Consider a phishing email that appears to be from a bank, asking the user to click a link to verify their account. The link leads to a malicious website that delivers the exploit when the user enters their credentials.

Watering Hole Attack

Think of a Watering Hole Attack as a hunter setting a trap near a watering hole frequented by a specific animal. The animal (target) is likely to fall into the trap (exploit) when it visits the watering hole.

Drive-By Download

Imagine visiting a website that automatically downloads a file to your computer without your knowledge. This file contains the exploit, which is executed as soon as it is downloaded.

Social Engineering

Consider a scenario where an attacker calls an employee and convinces them to download a "security update" that actually contains the exploit. The employee, believing the call is legitimate, installs the malicious software.

Supply Chain Attack

Think of a Supply Chain Attack as a manufacturer unknowingly using compromised parts in their products. When the products are delivered to customers, the compromised parts deliver the exploit.

Exploit Kits

Consider an Exploit Kit as a tool that automatically scans a house for unlocked doors and windows. Once it finds an entry point, it delivers the exploit, much like a burglar entering through an unlocked door.