Explanation should include the following:
- Active reconnaissance
- Passive reconnaissance
- Pivot
- Initial exploitation
- Persistence
- Escalation of privilege
- Black box
- White box
- Gray box
- Pen testing vs. vulnerability scanning
Process/Skill Questions:
- What is the difference between active and passive reconnaissance?
- What are the differences among black box, white box, and gray box?
- What is a method by which one could escalate privileges?