Index
A
- -A command
- Acknowledgment
- active and passive detection techniques
- Active Directory (AD) server
- additional weapons, installation
- Address Resolution Protocol (ARP)
- advanced exploitation toolkit
- advanced exploitation toolkit modules
- Aircrack-ng
- alive6 tool
- Amap
- Android SDK toolset
- anonymous USB attack
- antennas
- apt-get dist-upgrade command
- apt-get upgrade command
- arping tool
- arpspoof tool
- attack methods
- attack process
- audit scope
- automated browser exploitation
- automated vulnerability scanning
B
- backdoor
- backdoor service
- backdoor shell
- BackTrack
- Base64
- Basic Input Output System (BIOS)
- bind shell
- black box testing
- BlindElephant
- blog.g0tmi1k
- Bridged Adapter
- Bruteforce Exploit Detector (BED)
- Bubble View
- Burp Suite
C
- channel
- Cisco analysis
- Cisco auditing tool (CAT)
- Cisco devices
- Cisco global exploiter (CGE)
- Cisco IOS HTTP Auth vulnerability
- Cisco password
- client requisities, target scoping
- command-line interface (CLI)
- Common Internet File System (CIFS)
- Common weakness enumeration
- Community support
- Crunch tool
- curiosity
- Custom Word List (CeWL)
- Custom Word List (CeWL), options
- depth N or -d N / CeWL
- min_word_length N or -m N / CeWL
- verbose or -v / CeWL
- write or -w / CeWL
- CVE
- CVE-2013-0232 MS Windows privilege escalation vulnerability
- cyberwarzone
- Cymothoa
D
- Dark Net sites
- database assessment tools
- database management systems (DBMS)
- Denial of Service (DoS)
- deployment
- detect-new-ip6 tool
- dig
- reference link / dig
- about / dig
- distributed computing environment (DCE) service
- DMitry (Deepmagic Information Gathering Tool)
- dns2tcp
- dns2tcpc
- dns2tcpd
- DNSChef
- DNSChef Version 0.2
- dnsenum
- DNS records
- DNS record types
- DNS spoofing
- dns_spoof plugin
- documentation verification
- Domain Name System (DNS)
- domain registration information
- dsniff tool
- Dynamic Host Configuration Protocol (DHCP)
E
- egress filtering
- Entity List
- ethics, security testing
- Ettercap
- Evil Access Point attack
- Evil AP attack
- executive report
- exploit
- exploitation
- exploit code
- exploit development learning resources
- exploit modules
- exploit repositories
- external mode
F
- FastTrack Schedule
- fast XP table
- Fern Wifi Cracker
- fierce
- file transfer
- File Transfer Protocol (FTP)
- Firefox installation
- firewall/IDS evasion
- fping tool
- FreeS
- Fuzz analysis
G
- general penetration testing framework
- Google Hacking Database (GHDB)
- GParted Live
- GrammaTech
- Graphical Processing Unit-based (GPU) password cracker
- gray box testing
H
- hacking testing
- half-open
- hard disk installation, Kali Linux
- hash-identifier tool
- Hashcat
- Hashcat, attack modes
- Hashcat GPU-based tools
- hashcrack
- HashMyFiles
- host
- hping3 tool
- HP software security
- HTTP
- Human Intelligence (HUMINT)
- Human Interface Devices (HID)
- Human Interface Devices (HID) attacks
- human psychology
- Human Resource (HR)
- Hybrid attack
- Hydra tool
- Hypertext Transport Protocol (HTTP)
I
- ICMP control messages
- ICMPv6 Neighbor Discovery
- IEEE 802.11 standard
- ike-scan tool
- Impacketsamrdump
- impersonation
- index
- influential authority attack
- information gathering
- Information Systems Security Assessment Framework (ISSAF)
- Initialization Vectors (IVs)
- initial sequence number (ISN)
- Institute for Security and Open Methodologies (ISECOM)
- inter-process communication (IPC)
- Internet Assigned Number Authority (IANA)
- Internet Control Message Protocol (ICMP)
- interrogation tactics
- Intersect
- interview tactics
- Intrusion Detection System (IDS)
- Intrusion Prevention System (IPS)
- iodine
- IPsec
- Authentication Headers (AH) / ike-scan
- Encapsulating Security Payloads (ESP) / ike-scan
- Internet Key Exchange (IKE) / ike-scan
- ISO images
- iwlist
J
- JBroFuzz
- Johnny tool
- John tool
- John tool, password cracking modes
- wordlist mode / John
- single crack mode / John
- incremental mode / John
- external mode / John
K
- Kali Linux
- Kali Linux Live USB
- Kali Linux Nethunter
- Kali Linux Nethunter icons
- Kali Linux Nethunter tools
- Kali Linux VM image
- Karma exploit
- Kismet
- Klocwork
L
- LAN Manager (LM) hash
- leaked information
- Linux Live USB Creator
- Live DVD
- Local Area Network (LAN)
- Local Area Networks (LANs)
- local vulnerability
- Lua programming language
M
- -M command
- MAC changer
- MAC spoofing
- Main View
- Maltego
- Maltego, layout algorithms
- man-in-the-middle (MITM)
- management information bases (MIBs)
- management report
- Mask attack
- Maximum Transmission Unit (MTU)
- Media Access Control (MAC)
- Medusa
- Medusa, options
- Message Integrity Check (MIC)
- Metagoofil
- Metasploit
- Metasploitable 2
- Metasploit framework
- Metasploit Meterpreter
- meterpreter
- Meterpreter backdoor
- Microsoft Office Project Professional
- Mimikatz tool
- Mitre's Common Attack Pattern Enumeration and Classification (CAPEC)
- Mitre's Common Weakness Enumeration (CWE)
- MS08-067 MS Windows Server Service vulnerability
- MSFCLI
- MSFConsole
- MSFConsole commands
- MySQL
- MySQL injection vulnerability
N
- Name Servers (NS)
- nbtscan
- nbtscan tool
- Ncat
- Ncat tool
- Nessus
- Nessus package
- Nessus Version 6
- NetBIOS
- NetBIOS Suffixes
- Netcat
- Nethunter images
- Network Address Translation (NAT)
- Network Basic Input Output System (NetBIOS)
- networking, virtual machine
- network penetration testing report
- network ports
- network routing information
- network scanner
- network services
- network sniffer
- network spoofing tools
- network tool
- network vulnerability scanning
- NeXpose Community Edition
- NeXpose Community Edition (NeXpose CE)
- Nigerian 419 Scam
- Nikto2
- Ninja 101 drills
- Nmap
- Nmap, port states
- Nmap-Parser
- Nmap manual
- Nmap NSE Vulscan
- Nmap options
- Nmap output options
- Nmap port specification
- Nmap scripting engine (NSE)
- Nmap target specification
- Nmap TCP scan options
- Nmap timing options
- Nmap UDP scan options
- nping tool
- NSE command-line arguments
- NSE scripts
- NT LAN Manager (NTLM) hash
O
- object identifier (OID)
- offline attack tools
- onesixtyone tool
- online attack tools
- online web application
- open connection
- Open Source Intelligence (OSINT)
- Open Source Security Testing Methodology Manual (OSSTMM)
- OpenSwan
- Open System Interconnection (OSI)
- Open Systems Interconnection (OSI) model
- Open Web Application Security Project (OWASP)
- Operating System (OS) fingerprinting
- operating system backdoors
- Ophcrack
- OSVDB
- OWASP Top 10
- OWASP ZAP (Zed Attack Proxy)
P
- -P command
- p0f
- p0f tool
- packets per second (PPS)
- packetstormsecurity
- paid incentive programs
- Palette window
- Paros proxy
- passive_discovery6 tool
- password attack tools
- password attack tools, factors
- password attack tools, types
- penetration testing
- penetration testing, types
- Penetration Testing Execution Standard (PTES)
- penetration testing learning resources
- penetration testing tools
- persistence
- PHP Meterpreter
- ping tool
- PixieWPS
- PoC exploit code
- Portable Kali Linux method
- ports
- port scanning
- portscanning
- post-testing procedures
- post cracking
- PostgreSQL login
- PowerShell
- privilege escalation
- Process Identifier (PID)
- Project KickStart Pro
- ProjectLibre
- proof-of-concept (PoC)
- proof of concept (PoC) code
- protocols
- proxychains
- psk-crack tool
- ptunnel tool
- public resources
- Putty
- pwdump
- python-Nmap
R
- RainbowCrack tool
- rainbow tables
- RAV score
- rcracki_mt
- reciprocation
- recon-ng
- recon-ng version 4.7.2
- reconnaissance tool
- remote procedure calls (RPC) service
- remote vulnerability
- report presentation
- reports
- repositories
- results verification
- reverse code engineering tools
- reverse engineering resources
- reverse shell
- RFC 793
- RFC 3168
- RFC 3912
- Risk Assessment Values (RAV)
- rooting toolkit
- router passwords
- Ruby Nmap
- Rufus
- Rule-based attack
S
- samdump2
- SANS-CWE
- scanflags
- scarcity
- scenario 2
- scenario 3
- scenario 4
- scip VulDB
- scope
- search engine
- Secure Shell (SSH)
- security account manager (SAM)
- Security Accounts Manager (SAM) file
- security analysis
- Security Association (SA)
- SecurityFocus
- Security Test Audit Report (STAR)
- security testing
- SecurityTracker
- segment
- sequence number field
- Server Message Block (SMB)
- Server Message Block (SMB) analysis
- service banner grabbing
- Service Set Identifier (SSID)
- SET section
- Seven pernicious kingdoms
- SHA-1 type hash
- SHA1 hash value
- shell commands
- Signals Intelligence (SIGINT)
- simple chat server
- Simple Network Management Protocol (SNMP)
- Simple Network Management Protocol (SNMP) analysis
- Simple Network Monitoring Protocol (SNMP)
- SimplyEmail
- skullsecurity
- small XP table
- SMB (Server Message Block)
- SMB enumeration
- SMB usernames
- snmpcheck
- SNMP enumeration
- SNMP protocol
- SNMP Walk
- socat tool
- Social Engineering Framework
- social engineering toolkit (SET)
- social relationship
- SQL injection attacks
- SQLMap
- SQLMap examples
- SQL Ninja
- sslh
- strongSwan
- stunnel4
- Swiss Army Knife
- SYN stealth
- System Key (SysKey)
- SystemRescueCD
T
- table-lookup
- TARBALL file
- target discovery
- target machine
- target scoping
- TaskJuggler
- TaskMerlin
- Tcl
- TCP
- TCP/IP protocol
- tcpdump
- TCP header
- TCP message format
- TCP Window field
- TCP Window value
- technical report
- test boundaries, profiling
- test plan, preparing
- test process validation
- third-party applications
- time-memory tradeoff technique
- TimeControl
- Time To Live (TTL)
- Time to Live (TTL)
- tools, Kali Linux
- top 10 security tools
- TOR browser
- transform attributes
- Transmission Control Protocol (TCP)
- TrustedSec
- tunneling tools
- TWRP Recovery Image
U
- UDP
- UDP header
- UDP message format
- Unicornscan
- Uniform Resource Locator (URL)
- Universal USB Installer
- Urgent Pointer
- user-defined function (UDF)
- User Account Control (UAC)
- User Datagram Protocol (UDP)
V
- vector
- Vega
- VirtualBox
- VirtualBox Extension Pack
- VirtualBox guest additions
- virtual machine
- virtual machine, configuring
- virtual machines
- Virtual Network Computing (VNC)
- Virtual Private Network (VPN) systems
- Vista table
- VNC blank authentication scanner
- VPN enumeration
- VPN method
- vulnerabilities
- vulnerability
- vulnerability assessment
- vulnerability disclosure
- vulnerability research
- vulnerability scanner
- vulnerability taxonomy
- vulnerability tracking
W
- W3AF
- WAIDPS
- WAIDPS.py
- WAN
- WASC-TC
- WASC threat classification
- web application analysis
- web application firewall (WAF)
- Web Application Security Consortium (WASC)
- web application security threats
- web application tools
- Web Backdoor Cookie (WeBaCoo)
- web backdoors
- WebScarab
- white box testing
- whois client
- Wifite
- Win32DiskImager
- Winrtgen
- Wired Equivalent Privacy Standard
- wireless antennas and chipsets
- wireless attacks
- Wireless Local Area Networks (WLANs)
- wireless networking
- wireless network recon
- wireless scanning
- wireless testing tools
- wireless traffic
- Wireshark
- wordlist mode
- WPA-Personal implementation
- WPA/WPA2 cracking
- WPA2
- WPS cracking
Z