Related Concepts

  • Vulnerability: Defect or malfunction of an application

  • Exploit: A program specifically created to attack a vulnerability

  • Payload: The code behind a script that will be executed on the target

  • PoC: Proof of Concept, technique, or tool that demonstrates the exploitation of a vulnerability

  • Capabilities: A way to assign specific privileges to a running process

  • NFS: Network File Sharing allows sharing of files and folders between networked devices, working under TCP ports 111 and 2049

  • Risk Management: Identify, evaluate, and mitigate possible risks that could affect the integrity, availability, and confidentiality of a system

  • Vulnerability assessment: A set of tests and practices that aim to identify a system's possible vulnerabilities. In comparison with Penetration Testing, it is just done with automated tools

  • Pillaging: The process of collecting sensitive information locally on an already exploited host

  • Post-Remediation Testing: Reaccess the target to verify that the reported vulnerabilities and vector attacks have been patched properly

  • Banner Grabbing: Connect to a port hoping to get a response, which could help identify what service is running

  • RCE: Remote Command Execution, a critical security vulnerability that allows an attacker to execute arbitrary code on a remote system or server without physical access

  • Fingerprinting: Extract technical details about the technologies used in an application

  • Pivoting: A technique used to reach other vulnerable systems on a network in which we have already compromised a system, even bypassing firewall rules

  • Relaying: A technique to access resources present on other systems through an already compromised system on the same network

Last updated