当前位置:网站首页>Some penetration test terms I collected
Some penetration test terms I collected
2022-06-22 09:36:00 【Xia ~ Chen】
During the test, I saw some professional terms of my friends , So I do a collection to facilitate future query ( Of course, there may be more , I will also update slowly in the later study )
The collection is as follows :
FUZZ( Fuzzy testing ):
Is to use a large amount of data to test one by one , Now there are many senior friends who have written fuzz Tools
POC( Proof of concept ): Script to verify the existence of the vulnerability
Is the code used to verify whether the vulnerability exists
EXP( utilize ): Code that exploits vulnerabilities
Use the system to attack
payload( Payload ):
After successfully exploiting the vulnerability , Code or instructions that are actually executed on the target system
shell:
Establish channels of interaction with the system
shellcode(shell Code ):
payload A kind of , Due to the forward and reverse of its establishment shell And get the name
reverse :
From victim to attacker
positive :
From the attacker to the victim
webshell:
web Under the shell web back door
getsgell:
obtain webshell The process of
0day:
A gaping hole
Nday:
A vulnerability that has been open for a long time but can still be exploited
DDOS:
Denial of service attacks , Send a large number of requests to the server , Consume the performance or bandwidth of the target server
cc attack :
web Layer of ddos, Attackers with proxy server Generate a legitimate request to the victim host , Realization DDOS And camouflage
Generic vulnerabilities :
universality Large scale use scope
The springboard ( agent ):
Used to disguise oneself The agent enters the intranet
Tunnel :
Network channel Usually private stability
cdn( Content distribution network ):
Intelligent virtual network built on the basis of existing network
IDC:
Data center room
ips:
Intrusion prevention system
ids:
Intrusion detection
Situational awareness :
Monitoring traffic services, etc Used to detect intrusions
Honeypot :
It is used to lure the attacker in
Spear fishing :
Target fishing through your internal relationships
AV:
Anti virus software
ICMP:
Network Diagnostics protocol
bypass:
Bypas seeing the name of a thing one thinks of its function , Bypass function , That is to say, it can be triggered by a specific state ( Power failure or crash ) A system that prevents two networks from passing through network security devices , And direct physical conduction . So there is Bypass after , When the network security equipment fails , You can also connect the networks connected to this device to each other , Of course, at this time, the network device will no longer process the packets in the network
cs
CS yes Cobalt Strike For short , It's a penetration test artifact , It's often called CS Artifact .
Code Execution Vulnerability :
The commands entered by the user are executed as back-end code
Command Execution Vulnerability :
The commands entered by the user are executed as system commands
边栏推荐
- Performance optimization topics
- Traifik ingress practice
- day500:键盘行
- copy_ from_ User and copy_ to_ user
- [模板] kmp
- Apprentissage automatique | nltk Erreur de téléchargement des données | solution d'erreur de téléchargement du corpus stopwords pour nltk
- Centos7安装PostgreSQL12
- Machine learning | nltk_ Data download error |nltk's stopwords corpus download error solution
- SQL编程task04作业-集合运算
- 秋招秘籍A
猜你喜欢

5 interview questions, grasp the underlying principle of string!

Record a time when Kali encounters vmtools button gray install vmtools

Byte/byte? Don't get dizzy!

Mapping multiple exit servers on ENSP

使用ELK保存Syslog、Netflow日志和审计网络接口流量

值(址)传递,看清名字,别掉沟里

Machine learning | nltk_ Data download error |nltk's stopwords corpus download error solution

Debian10 LVM逻辑卷

Network security Kali penetration learning how to conduct Nessus vulnerability detection

How C processes use non static methods
随机推荐
Variable things
Solutions to prompt non standard import in go language
集合中的类--->你关注过那些是线程安全的吗?
Yiwen approaches ZMQ
Comparison of interface abstract classes
When golang operates mongodb, vscode prompts primitive E composite literal uses unlocked fields
Kali uses the command ifconfig to query the solution that the IP address is always 127.0.0.1
Up the Strip
6-45 calculating the number of leaves of a binary tree
PAT甲级 1016 Phone Bills(时间差)
Mapping Multi - export Server on ENSP
6-35 constructing an ordered linked list
Shengdun technology joined dragon lizard community to build a new open source ecosystem
The time difference between IIS7 log and system time is 8 hours. Use logparser to solve the problem
Lexical Sign Sequence
Lifecycle of Servlet
Final典型案例
求余弦的大小
[cmake命令笔记]target_compile_options
rewrite? Reload? Are you dizzy?