当前位置:网站首页>Some penetration test terms I collected

Some penetration test terms I collected

2022-06-22 09:36:00 Xia ~ Chen

During the test, I saw some professional terms of my friends , So I do a collection to facilitate future query ( Of course, there may be more , I will also update slowly in the later study )

The collection is as follows :

FUZZ( Fuzzy testing ):

Is to use a large amount of data to test one by one , Now there are many senior friends who have written fuzz Tools

POC( Proof of concept ): Script to verify the existence of the vulnerability

Is the code used to verify whether the vulnerability exists

EXP( utilize ): Code that exploits vulnerabilities

Use the system to attack

payload( Payload ):

After successfully exploiting the vulnerability , Code or instructions that are actually executed on the target system

shell:

Establish channels of interaction with the system

shellcode(shell Code ):

payload A kind of , Due to the forward and reverse of its establishment shell And get the name

reverse :

From victim to attacker

positive :

From the attacker to the victim

webshell:

web Under the shell web back door

getsgell:

obtain webshell The process of

0day:

A gaping hole

Nday:

A vulnerability that has been open for a long time but can still be exploited

DDOS:

Denial of service attacks , Send a large number of requests to the server , Consume the performance or bandwidth of the target server

cc attack :

web Layer of ddos, Attackers with proxy server Generate a legitimate request to the victim host , Realization DDOS And camouflage

Generic vulnerabilities :

universality Large scale use scope

The springboard ( agent ):

Used to disguise oneself The agent enters the intranet

Tunnel :

Network channel Usually private stability

cdn( Content distribution network ):

Intelligent virtual network built on the basis of existing network

IDC:

Data center room

ips:

Intrusion prevention system

ids:

Intrusion detection

Situational awareness :

Monitoring traffic services, etc Used to detect intrusions

Honeypot :

It is used to lure the attacker in

Spear fishing :

Target fishing through your internal relationships

AV:

Anti virus software

ICMP:

Network Diagnostics protocol

bypass:

Bypas seeing the name of a thing one thinks of its function , Bypass function , That is to say, it can be triggered by a specific state ( Power failure or crash ) A system that prevents two networks from passing through network security devices , And direct physical conduction . So there is Bypass after , When the network security equipment fails , You can also connect the networks connected to this device to each other , Of course, at this time, the network device will no longer process the packets in the network

cs

CS yes Cobalt Strike For short , It's a penetration test artifact , It's often called CS Artifact .

Code Execution Vulnerability :

The commands entered by the user are executed as back-end code

Command Execution Vulnerability :

The commands entered by the user are executed as system commands

原网站

版权声明
本文为[Xia ~ Chen]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/02/202202220522574049.html