HTML
HyperText Markup Language
80
HTTP
Centralized location for data management commonly associated with tables and indexes
Database Server
Run
Windows + R
The attacker simply tries to guess the login credentials of someone with access to the target system
Brute Force
BIOS
Basic Input/Output System
443
HTTPS
Serves content to an internet browser by loading a file from a disk and serving it across the network to a user’s browser.
Web Server
Cut
CTRL + X
Overwhelming the resources of a system to the point where it is unable to reply to legitimate service requests
Denial of Service
RAID
Redundant Array of Inexpensive Disks or Redundant Array of Independent Disks
88
Kerberos
Assigns IP addresses to network interfaces
DHCP Server
Lock your Computer
Windows + L
Breaches in cybersecurity that make it possible for an attacker to eavesdrop on the data sent back and forth between two people, networks, or computers.
Man-in-the-Middle Attack
STIGs
Security Technical Implementation Guides
161
SNMP
Responds to authentication requests and verifies users
Domain Controller
Cycle through open applications
Alt + Tab
The most damaging Bluetooth attack; gaining the access to a cellular phone’s commands and persisted information
Bluebugging
API
Application Programming Interface
20
FTP
Sits between a client program and an external server to filter requests, improve performance, and share connections
Proxy Server
Task Manager
CTRL + SHIFT + ESC
The attacker transmits malicious scripts using clickable content that gets sent to the target’s browser
Cross-Site Scripting (XSS)