Related Concepts

  • Vulnerability: Defect or malfunction of an application

  • Exploit: Program specifically created to attack a vulnerability

  • Payload: The code behind a script that will be executed on the target

  • PoC: Proof of Concept, technique, or tool that demonstrates the exploitation of a vulnerability

  • Capabilities: Way to assign specific privileges to a running process

  • NFS: Network File Sharing, allows sharing of files and folders between networked devices, working under TCP port 111 and 2049

  • Risk Management: Identify, evaluate, and mitigate possible risks that could affect the integrity, availability, and confidentiality of a system

  • Vulnerability assessment: A set of tests and practices that aim to identify a system's possible vulnerabilities. In comparison with Penetration Testing, it is just done with automated tools

  • Pillaging: The process of collecting sensitive information locally on an already exploited host

  • Post-Remediation Testing: Reaccess the target to verify that the reported vulnerabilities and vector attacks have been patched properly

  • Banner Grabbing: Connect to a port hoping to get a response, which could help to identify what service is running

  • RCE: Remote Command Execution, a critical security vulnerability that allows an attacker to execute arbitrary code on a remote system or server without physical access

  • Fingerprinting: Extract technical details about the technologies used in an application

Last updated