You are a security consultant who is required to perform penetration testing on a client’s network. During
penetration testing, you are required to use a compromised system to attack other systems on the network to
avoid network restrictions like firewalls.Which method would you use in this scenario:
A.
Black box Method
B.
Pivoting method
C.
White Box Method.
D.
Grey Box Method
Explanation:
Pivoting is a method that makes use of the compromised system to attack other systems on the same network
to avoid restrictions that might prohibit direct access to all machines.
Incorrect Answers:
A: Black box testing examines the functionality of an application without peering into its internal structures or
workings.
C: With white box testing, the testers are provided with complete knowledge of the infrastructure being tested.
D: With gray-box pen testing, the tester is provided with partial knowledge of the infrastructure being tested.https://en.wikipedia.org/wiki/Exploit_(computer_security)#Pivoting
https://en.wikipedia.org/wiki/Black-box_testing
http://www.redsphereglobal.com/content/penetration-testing