Related Concepts
Vulnerability: Defect or malfunction of an application
Exploit: Program specifically created to attack a vulnerability
Payload: The code behind a script that will be executed on the target
PoC: Proof of Concept, technique, or tool that demonstrates the exploitation of a vulnerability
Capabilities: Way to assign specific privileges to a running process
NFS: Network File Sharing, allows sharing of files and folders between networked devices, working under TCP port 111 and 2049
Risk Management: Identify, evaluate, and mitigate possible risks that could affect the integrity, availability, and confidentiality of a system
Vulnerability assessment: A set of tests and practices that aim to identify a system's possible vulnerabilities. In comparison with Penetration Testing, it is just done with automated tools
Pillaging: The process of collecting sensitive information locally on an already exploited host
Post-Remediation Testing: Reaccess the target to verify that the reported vulnerabilities and vector attacks have been patched properly
Banner Grabbing: Connect to a port hoping to get a response, which could help to identify what service is running
RCE: Remote Command Execution, a critical security vulnerability that allows an attacker to execute arbitrary code on a remote system or server without physical access
Last updated
Was this helpful?