You are given permission to perform a security audit on an organisation; what type of hacker would you be?
HINT: Look at the hat categories in this task.
You attack an organisation and steal their data, what type of hacker would you be?
What document defines how a penetration testing engagement should be carried out?
Task 3 Penetration Testing Methodologies
What stage of penetration testing involves using publicly available information?
If you wanted to use a framework for pentesting telecommunications, what framework would you use? Note: We're looking for the acronym here and not the full name.
What framework focuses on the testing of web applications?
Task 4 Black box, White box, Grey box Penetration Testing
You are asked to test an application but are not given access to its source code - what testing process is this?
You are asked to test a website, and you are given access to the source code - what testing process is this?
Task 5 Practical: ACME Penetration Test
Complete the penetration test engagement against ACME's infrastructure.