term used to refer to exploiting system vulnerabilities and compromising security controls
What is Hacking?
Process of generating a graphical representation of the target environment
What is Network Mapping
a flaw that could compromise the confidentiality, integrity, or availability of an information system
What is a vulnerability?
Advanced, dynamically extensible payload that uses in-memory DLL injection stagers and is extended over the network at runtime
What is Meterpreter?
a sequence of words or other text used to control access to a computer system, program or data. It is similar to a password in usage, but a passphrase is generally longer for added security
What is a A passphrase?
performs unauthorized Hacking, usually for personal profits
Black Hat Hacker
It is a purpose-built operating system focused on and optimized for pentesting and exploitation
What is Kali Linux?
a systematic review of security weaknesses in an information system.
What is a Vulnerability Assessment
tools embedded in compromised web pages that automatically scan a visitor's machine for vulnerabilities and attempt to exploit them
What are Exploit Kits?
the overwhelming feeling of stress and exhaustion resulting from the excessive number of passwords users are required to maintain for their various accounts
What is Password fatigue?
a person who uses existing computer scripts or code to hack into computers, lacking the expertise to write their own.
What are Script Kiddies?
This is a modular information gathering and exploitation tool coded in Ruby
What is Metasploit?
Software testing technique that involves providing invalid, unexpected, or random data as inputs to a computer program.
Who is Fuzzing
a series of steps that trace a cyberattacks stages from the early reconnaissance stages to the exfiltration of data
What is The cyber kill Chain
Authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism.
What is Multi-Factor Authentication?
those who use Hacking to bring about political and social change
What are Hacktivists
a tool for automating customized attacks against web applications. It is extremely powerful and configurable, and can be used to perform a huge range of tasks,
What is Burp Intruder?
looks for system-level vulnerabilities like insecure file permissions, application-level bugs, backdoor, and computer virus installations
What is a Host Assessment?
provides a list of methods by which enterprise IT environments can be compromised, and the information is detailed and highly specific
What is The MITRE ATT&CK Framework?
This is the process of recovering the plain text password from a password hash.
What is Password Cracking?
They hack into the system for fun or no reason, but they will gain consent before exploiting the system.
What is a Grey Hat Hacker?
This phase of a scan involves navigating around the application, following links, submitting forms, and logging in where necessary, to catalog the content of the application and the navigational paths within it.
What is crawl/spidering?
a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications
What is The OWASP Top 10?
This allows remote computers (for example, computers on the Internet) to connect to a specific computer or service within a private local-area network (LAN)
What is Port forwarding?
when hackers execute malicious code within a victim's browser. The bad actor attaches their code on top of a legitimate website. This tricks browsers into loading malware whenever the site loads.
What is Cross-Site Scripting?