Cyber Security

NameDescription
AssetThe information or resources of a system
VulnerabilityA weakness in a system that can be used by an attacker
ExploitThe methodology or attack used to take advantage of a vulnerability
AttackerA malicious entity from the perspective of the system
WhitehatA hacker that conducts attacks with permission from the target with the intention of improving security (AKA Penetration Tester)
BlackhatA hacker that conducts unauthorized attacks with malicious intent
Hashing AlgorithmA non-reversible algorithm that creates 1-1 mappings of inputs to outputs.
Encryption AlgorithmA reversible algorithm used to encrypt data. encrypted data must be decrypted before being read.
Reverse EngineeringFiguring out how a program works without access to it’s source code. Generally used to describe the exploitation of binary files.

Penetration Testing Methodology

flowchart
A[Reconnaissance]-->B[Enumeration]
B-->C[Privilege Escalation]
C-->D{Reached the Goal?}
D-- Yes --> E[Done]
D-- No --> B

1. Reconnaissance

Survey and investigate potential attack vectors.

2. Enumeration

Exhaust each possible option.

3. Privilege Escalation

Craft and execute the exploit to reach higher levels of privilege.

4. Repeat until Goal is reached.

The “goal” can be anything from obtaining complete control over the machine (typically getting Admin or Root user access), or stealing a specific piece of information such financial data of a company or the passwords of all users.

Common Vulnerabilities & Exploits

todo organize this

  • Cross Site Scripting
  • Cross Site Request Forgery
  • Remote/Local File Inclusion
  • Remote Code Execution
  • Path Traversal
  • No/SQL Injection
  • Buffer Overflow