Command that searches for lines that contain strings that match a pattern
Grep
Command line tool that displays open ports on host
Nmap
Non profit organization to help web developers secure their apps
OWASP Open Web App Security Project
Uses cyber weapons to promote a political agenda
Hacktivist
Web app vulnerabilty scanning tool from OWASP
ZAP (Zed App Proxy)
Command that prints the first 10 lines of the specified file
Head
GUI tool that displays open ports on a host
Zenmap
Collection and analysis of data gathered from open sources to produce actionable intelligence
OSINT Open Source Intelligence
Threat actors whose activities lead to increased risk as a result of their privileged access or employment
Insider threat
Collects, stores, analyzes, and dispatches log messages from devices such as routers, switches, firewalls, Linux/Unix hosts, and Windows machines
Syslog
3 basic Linux permissions
Read, write, and execute
Industry-standard method for assessing the severity of vulnerabilities
CVSS Common Vulnerability Score System
Facility that houses an information security team responsible for monitoring and analyzing an organization’s security posture on an ongoing basis
SOC Security Operations Center
Goals are primarily espionage, strategic advantage, and commercial gains. APT
Nation states
Ecommerce security standard
PCI-DSS
Command that reads data from the file and gives their content as output.
Cat
An open-source network vulnerability scanner that uses the Common Vulnerabilities and Exposures architecture for easy cross-linking between compliant security tools. George likes it
Nessus
Data that indicates a system may have been infiltrated by a cyber threat
IoC Indicators of Compromise
Uses scripts obtained on dark web
Script Kiddie
Command-line packet capture utility for Linux
Tcpdump
Command to change permissions on Linux
Chmod
Open source vulnerability scanner maintained by Greenbone Networks. George hates it
OpenVAS
A solution that helps organizations detect, analyze, and respond to security threats before they harm business operations
SIEM Security Information and Event Management
Criminal profit, but typical activities are financial fraud (both against individuals and companies) and blackmail
Organized crime
GUI packet capture tool
Wireshark