Important definitions and terminologies used in Penetration Testing
A
- Abandonware in Penetration Testing
- Account harvesting in Penetration Testing
- Account hijacking in Penetration Testing
- Active directory in Penetration Testing
- Active reconnaissance in Penetration Testing
- Ad blocker in Penetration Testing
- Ad fraud in Penetration Testing
- Ad rotator in Penetration Testing
- Add-in in Penetration Testing
- Address bar in Penetration Testing
- Address bar spoofing in Penetration Testing
- Address Resolution Protocol (ARP) in Penetration Testing
- Advanced Encryption Standard (AES) in Penetration Testing
- Advanced persistent threat (APT) in Penetration Testing
- Adversary emulation in Penetration Testing
- Adware in Penetration Testing
- Air gap in Penetration Testing
- Always-On in Penetration Testing
- Analog in Penetration Testing
- Android app in Penetration Testing
- Android in Penetration Testing
- Annoybot in Penetration Testing
- Annoyware in Penetration Testing
- Anomaly detection in Penetration Testing
- Anonymization in Penetration Testing
- Anonymizer in Penetration Testing
- Anonymous in Penetration Testing
- Anti-ransomware in Penetration Testing
- Anti-virus (AV) killer in Penetration Testing
- Antivirus in Penetration Testing
- API security in Penetration Testing
- Applet in Penetration Testing
- Application in Penetration Testing
- Application programming interface (API) in Penetration Testing
- Application security in Penetration Testing
- Artificial intelligence (AI) in Penetration Testing
- Astroturfing in Penetration Testing
- Asymmetric cryptography in Penetration Testing
- Attack vector in Penetration Testing
- Attribution in Penetration Testing
- Augmented reality (AR) in Penetration Testing
- Authentication in Penetration Testing
- Autonomous system in Penetration Testing
B
- Backdoor in Penetration Testing
- Bad sector in Penetration Testing
- Bait advertising in Penetration Testing
- Banking Trojan in Penetration Testing
- Behavior in Penetration Testing
- Behavioral biometrics in Penetration Testing
- Big data in Penetration Testing
- Big-game hunting (BGH) in Penetration Testing
- Binary analysis in Penetration Testing
- Binary in Penetration Testing
- Biohacking in Penetration Testing
- Biometrics in Penetration Testing
- BIOS in Penetration Testing
- Bitcoin in Penetration Testing
- Black box testing in Penetration Testing
- Black Friday in Penetration Testing
- Blacklist in Penetration Testing
- Blended threat in Penetration Testing
- Bloatware in Penetration Testing
- Block cipher in Penetration Testing
- Blue Screen of Death (BSoD) in Penetration Testing
- Blue team in Penetration Testing
- Bluejacking in Penetration Testing
- Bluesnarfing in Penetration Testing
- Bluetooth in Penetration Testing
- Boot in Penetration Testing
- Boot sector in Penetration Testing
- Boot sector virus in Penetration Testing
- Bootkit in Penetration Testing
- Bot herder in Penetration Testing
- Bot in Penetration Testing
- Botnet in Penetration Testing
- Breadcrumbs in Penetration Testing
- Bricking in Penetration Testing
- Bring your own device (BYOD) in Penetration Testing
- Browlock in Penetration Testing
- Browser helper object (BHO) in Penetration Testing
- Brute force attack in Penetration Testing
- Buffer in Penetration Testing
- Buffer overflow in Penetration Testing
- Bug bounty in Penetration Testing
- Bundler in Penetration Testing
- Bundleware in Penetration Testing
- Burn in Penetration Testing
- Business continuity management (BCM) in Penetration Testing
- Business email compromise (BEC) in Penetration Testing
- Business process compromise (BPC) in Penetration Testing
C
- Cache in Penetration Testing
- Certificate authority (CA) in Penetration Testing
- Cipher in Penetration Testing
- Ciphertext in Penetration Testing
- Click fraud in Penetration Testing
- Clickbait in Penetration Testing
- Clickjacking in Penetration Testing
- Cloud computing in Penetration Testing
- Cloud phishing in Penetration Testing
- Cloud security in Penetration Testing
- Cobalt Strike in Penetration Testing
- Code review in Penetration Testing
- Cold boot in Penetration Testing
- Command & control (C&C) in Penetration Testing
- Command and control (C&C) in Penetration Testing
- Command injection in Penetration Testing
- Common vulnerabilities and exposures (CVE) in Penetration Testing
- Companion virus in Penetration Testing
- Compliance testing in Penetration Testing
- Compromised in Penetration Testing
- Computer ethics in Penetration Testing
- Computer science (CS) in Penetration Testing
- Computer-Aided Design (CAD) in Penetration Testing
- Consumer fraud protection in Penetration Testing
- Container security in Penetration Testing
- Cookie in Penetration Testing
- Crack in Penetration Testing
- Credential stuffing in Penetration Testing
- Crimeware in Penetration Testing
- Cross-site scripting (XSS) in Penetration Testing
- Crypter in Penetration Testing
- Cryptocurrency in Penetration Testing
- Cryptocurrency mining in Penetration Testing
- Cryptography in Penetration Testing
- Cryptojacking in Penetration Testing
- Customer Relationship Management (CRM) in Penetration Testing
- CVE identifier in Penetration Testing
- Cyber espionage in Penetration Testing
- Cyber liability insurance in Penetration Testing
- Cyber Monday in Penetration Testing
- Cyberbullying in Penetration Testing
- Cybercrime in Penetration Testing
- Cybersecurity in Penetration Testing
D
- Dark web in Penetration Testing
- Data breach in Penetration Testing
- Data exfiltration in Penetration Testing
- Data Link in Penetration Testing
- Data loss prevention (DLP) in Penetration Testing
- Data mining in Penetration Testing
- Data Privacy Day (DPD) in Penetration Testing
- Data Protection in Penetration Testing
- Database security in Penetration Testing
- Decompiler in Penetration Testing
- Decryptor in Penetration Testing
- Deepfake in Penetration Testing
- Definition in Penetration Testing
- Defragmentation in Penetration Testing
- Denial-of-service (DoS) in Penetration Testing
- Destruction of service (DeOS) in Penetration Testing
- Device control in Penetration Testing
- Dialer in Penetration Testing
- Dictionary attack in Penetration Testing
- Digital footprint in Penetration Testing
- Digital forensics in Penetration Testing
- Disk optimizer (disk defragmenter) in Penetration Testing
- Distributed Denial of Service (DDoS) in Penetration Testing
- DNS filtering in Penetration Testing
- DNS over HTTPS (DoH) in Penetration Testing
- DNS over TLS (DoT) in Penetration Testing
- DNS spoofing in Penetration Testing
- Domain administrator privileges in Penetration Testing
- Domain in Penetration Testing
- Domain name spoofing in Penetration Testing
- Domain name system (DNS) in Penetration Testing
- Domain Name System Security Extensions (DNSSEC) in Penetration Testing
- Downloader in Penetration Testing
- Dox in Penetration Testing
- Drive-by download in Penetration Testing
- Drive-by mining in Penetration Testing
- Driver Updater in Penetration Testing
- Dropper in Penetration Testing
- Dwell time in Penetration Testing
E
- Eavesdropping in Penetration Testing
- Electronic sports (eSports) in Penetration Testing
- Email security in Penetration Testing
- Encryption in Penetration Testing
- End-user in Penetration Testing
- Endpoint detection and response (EDR) in Penetration Testing
- Endpoint security in Penetration Testing
- Enterprise Resource Planning (ERP) in Penetration Testing
- Enumeration in Penetration Testing
- EternalBlue in Penetration Testing
- EternalChampion in Penetration Testing
- EternalRomance in Penetration Testing
- Ethernet in Penetration Testing
- Ethical hacking in Penetration Testing
- Executable and Link format (ELF) in Penetration Testing
- Exploit in Penetration Testing
- Exploit kit in Penetration Testing
- Extended Validation SSL Certificate (EV SSL) in Penetration Testing
F
- Family in Penetration Testing
- Fear, uncertainty, and doubt (FUD) in Penetration Testing
- File type in Penetration Testing
- File-based attack in Penetration Testing
- Fingerprinting in Penetration Testing
- Firewall in Penetration Testing
- Firewall ruleset review in Penetration Testing
- Firmware in Penetration Testing
- Foothold expansion in Penetration Testing
- Footprinting in Penetration Testing
- Fraud in Penetration Testing
- Fraudulent vanity URLs in Penetration Testing
- Freeware in Penetration Testing
- Frequently asked questions (FAQ) in Penetration Testing
- Fuzz testing in Penetration Testing
G
- GDPR compliance in Penetration Testing
- General Data Protection Regulation (GDPR) in Penetration Testing
- Globally unique identifier (GUID) in Penetration Testing
- Graphical user interface (GUI) in Penetration Testing
- Gray box testing in Penetration Testing
- Graymail in Penetration Testing
- Greyware in Penetration Testing
- Griefing in Penetration Testing
H
- Hacker in Penetration Testing
- Hacking in Penetration Testing
- Hacktivism in Penetration Testing
- Hacktivist in Penetration Testing
- Hash value in Penetration Testing
- Hashing in Penetration Testing
- Heap spray in Penetration Testing
- Heap spraying in Penetration Testing
- Heartbleed in Penetration Testing
- HermeticWiper in Penetration Testing
- Heuristic analysis in Penetration Testing
- Hibernation in Penetration Testing
- Hijacker in Penetration Testing
- Hoax in Penetration Testing
- Homograph attacks in Penetration Testing
- Homograph in Penetration Testing
- Host Intrusion Prevention System (HIPS) in Penetration Testing
- Host-based solution in Penetration Testing
- Hyper-Text Transfer Protocol (HTTP) in Penetration Testing
- Hyper-Text Transfer Protocol Secure (HTTPS) in Penetration Testing
I
- Identity and access management (IAM) in Penetration Testing
- Identity theft in Penetration Testing
- In computer security, a domain can refer to: in Penetration Testing
- Incident handling in Penetration Testing
- Incident response in Penetration Testing
- Incident scope in Penetration Testing
- Indicator of Attack (IOA) in Penetration Testing
- Indicator of compromise (IOC) in Penetration Testing
- Infection vector in Penetration Testing
- Information security in Penetration Testing
- Information Technology (IT) in Penetration Testing
- Infrastructure as code (IaC) security in Penetration Testing
- Initial access brokers (IABs) in Penetration Testing
- Injection attacks in Penetration Testing
- Input/Output (I/O) in Penetration Testing
- Insider threat detection in Penetration Testing
- Insider threat in Penetration Testing
- Intellectual property in Penetration Testing
- Internationalized domain names (IDN) in Penetration Testing
- Internationalized email forging in Penetration Testing
- Internet of things (IoT) in Penetration Testing
- Internet of Things (IoT) security in Penetration Testing
- Internet Service Provider (ISP) in Penetration Testing
- Intranet in Penetration Testing
- Intrusion detection system (IDS) in Penetration Testing
- Intrusion Prevention System (IPS) in Penetration Testing
- IP address in Penetration Testing
J
- Jailbreak in Penetration Testing
- Java security in Penetration Testing
- JavaScript security in Penetration Testing
- Joke programs in Penetration Testing
- Juice jacking in Penetration Testing
- Junk mail in Penetration Testing
- Junk mail is, essentially, email spam. in Penetration Testing
K
- Kerberos in Penetration Testing
- Key generator in Penetration Testing
- Keylogger in Penetration Testing
- Keystream in Penetration Testing
- Keystroke in Penetration Testing
L
- Latency in Penetration Testing
- Lateral movement in Penetration Testing
- Layered Service Provider (LSP) in Penetration Testing
- LDAP injection in Penetration Testing
- Learn more: in Penetration Testing
- Linux in Penetration Testing
- Linux security in Penetration Testing
- Local administrator privilege in Penetration Testing
- Local administrator privileges in Penetration Testing
- Local Area Network (LAN) in Penetration Testing
- Localhost in Penetration Testing
- Log analysis in Penetration Testing
- Logic bomb in Penetration Testing
M
- MAC address in Penetration Testing
- Machine code in Penetration Testing
- Machine learning (ML) in Penetration Testing
- Machine-to-machine (M2M) in Penetration Testing
- Macro in Penetration Testing
- Macro virus in Penetration Testing
- Madware in Penetration Testing
- Magecart in Penetration Testing
- Mail bomb in Penetration Testing
- Malicious insider in Penetration Testing
- Malicious/Destructive payload in Penetration Testing
- Malspam in Penetration Testing
- Malvertising in Penetration Testing
- Malware in Penetration Testing
- Malwarebytes detects these types. in Penetration Testing
- Man-in-the-Browser (MitB) in Penetration Testing
- Man-in-the-middle (MitM) in Penetration Testing
- Managed Detection and Response (MDR) in Penetration Testing
- Managed service provider (MSP) in Penetration Testing
- Master Boot Record (MBR) in Penetration Testing
- Memory corruption in Penetration Testing
- Memory dump in Penetration Testing
- Memory resident in Penetration Testing
- Metadata in Penetration Testing
- Metropolitan area network (MAN) in Penetration Testing
- Middelware in Penetration Testing
- Miner in Penetration Testing
- Mitigation in Penetration Testing
- MITRE ATT&CK Framework in Penetration Testing
- Mixed reality in Penetration Testing
- Mobile application security in Penetration Testing
- Mobile Security in Penetration Testing
- Money mule in Penetration Testing
- Multi-factor authentication (MFA) in Penetration Testing
- Multi-tenancy in Penetration Testing
- Multimedia Messaging Service (MMS) in Penetration Testing
- Multiplatform in Penetration Testing
- Mumblehard malware in Penetration Testing
N
- National Cyber Security Centre (NCSC) in Penetration Testing
- National Security Agency (NSA) in Penetration Testing
- Near-field communication (NFC) in Penetration Testing
- Net neutrality in Penetration Testing
- Network in Penetration Testing
- Network mapping in Penetration Testing
- Network perimeter in Penetration Testing
- Network security in Penetration Testing
- Network segmentation in Penetration Testing
- NewTab in Penetration Testing
- Next Generation Antivirus (NGAV) in Penetration Testing
- Non-repudiation in Penetration Testing
O
- Obfuscation in Penetration Testing
- Open source intelligence (OSINT) in Penetration Testing
- Open Systems Interconnection (OSI) in Penetration Testing
- OpenSSL in Penetration Testing
- Operating system (OS) in Penetration Testing
- Operating system security in Penetration Testing
- Opportunistic attack in Penetration Testing
- Out of character: Homograph attacks explained in Penetration Testing
P
- Packer in Penetration Testing
- Passcode in Penetration Testing
- Passphrase in Penetration Testing
- Password cracking application in Penetration Testing
- Password cracking in Penetration Testing
- Password guessing in Penetration Testing
- Password in Penetration Testing
- Password manager in Penetration Testing
- Password policy assessment in Penetration Testing
- Patch management in Penetration Testing
- Patch management software in Penetration Testing
- Payload in Penetration Testing
- Payload. in Penetration Testing
- Payment Card Industry Data Security Standard (PCI DSS) in Penetration Testing
- Peer-to-peer (P2P) in Penetration Testing
- Penetration testing as a service (PTaaS) in Penetration Testing
- Penetration testing framework (PTF) in Penetration Testing
- Penetration testing in Penetration Testing
- Peopleware in Penetration Testing
- Personal identification number (PIN) in Penetration Testing
- Personally Identifiable Information (PII) in Penetration Testing
- Pharma in Penetration Testing
- Phishing attack in Penetration Testing
- Phishing in Penetration Testing
- Phishing kit in Penetration Testing
- Phreaking in Penetration Testing
- Physical in Penetration Testing
- Physical penetration testing in Penetration Testing
- Physical security in Penetration Testing
- Plaintext in Penetration Testing
- Platform in Penetration Testing
- Point-of-sale (PoS) malware in Penetration Testing
- Polymorphism in Penetration Testing
- Port scanning in Penetration Testing
- Portable device in Penetration Testing
- Portable Executable (PE) file header in Penetration Testing
- Power User in Penetration Testing
- PowerShell in Penetration Testing
- Preinstalled software in Penetration Testing
- Presentation in Penetration Testing
- Privilege escalation in Penetration Testing
- Profanity filter bypassing in Penetration Testing
- Professional Service Automation (PSA) in Penetration Testing
- Proof of concept in Penetration Testing
- Protector in Penetration Testing
- Proxy in Penetration Testing
- Proxy server in Penetration Testing
- Pseudocode in Penetration Testing
- PUM in Penetration Testing
- Punycode in Penetration Testing
- PUP in Penetration Testing
- Python security in Penetration Testing
Q
- QR Code in Penetration Testing
- Quarantine in Penetration Testing
R
- RAM scraping in Penetration Testing
- Random access memory (RAM) in Penetration Testing
- Ransomware in Penetration Testing
- Ransomware-as-a-service in Penetration Testing
- RAR in Penetration Testing
- Recon in Penetration Testing
- Reconnaissance in Penetration Testing
- Red team in Penetration Testing
- Registry cleaner in Penetration Testing
- Related blog post(s): in Penetration Testing
- Remediation in Penetration Testing
- Remote access in Penetration Testing
- Remote access Trojan (RAT) in Penetration Testing
- Remote administration tool (RAT) in Penetration Testing
- Remote code execution (RCE) attack in Penetration Testing
- Remote code execution (RCE) in Penetration Testing
- Remote desktop protocol (RDP) in Penetration Testing
- Remote monitoring and management (RMM) in Penetration Testing
- Remote user in Penetration Testing
- Report system errors in Penetration Testing
- Retrovirus in Penetration Testing
- Revealed: POS malware used in Target attack in Penetration Testing
- Revenge porn in Penetration Testing
- Reverse engineering in Penetration Testing
- Risk assessment in Penetration Testing
- Risk management in Penetration Testing
- Riskware in Penetration Testing
- Robocall in Penetration Testing
- Rootkit in Penetration Testing
- Router security in Penetration Testing
- RunPE Technique in Penetration Testing
S
- Safe Mode in Penetration Testing
- Sandbox solution in Penetration Testing
- Scam in Penetration Testing
- Screen scraper in Penetration Testing
- Screenlocker in Penetration Testing
- Script kiddie in Penetration Testing
- Search neutrality in Penetration Testing
- Secure Sockets Layer (SSL) in Penetration Testing
- Security audit in Penetration Testing
- Security information and event management (SIEM) in Penetration Testing
- Security testing in Penetration Testing
- See botnet. in Penetration Testing
- See: Wearable computer in Penetration Testing
- Seed in Penetration Testing
- SEO in Penetration Testing
- Server in Penetration Testing
- Server Message Block (SMB) in Penetration Testing
- Server security in Penetration Testing
- Service-level agreement (SLA) in Penetration Testing
- Session fixation in Penetration Testing
- Session hijacking in Penetration Testing
- Session in Penetration Testing
- Sextortion in Penetration Testing
- Shareware in Penetration Testing
- Shimming in Penetration Testing
- SIEM in Penetration Testing
- Signature in Penetration Testing
- SIMjacking in Penetration Testing
- Skimming in Penetration Testing
- Smart home in Penetration Testing
- SMS phishing (Smishing) in Penetration Testing
- SOC in Penetration Testing
- Social engineering in Penetration Testing
- Social media security in Penetration Testing
- Software as a service (SaaS) security in Penetration Testing
- Software delivery layer in Penetration Testing
- Software vulnerability in Penetration Testing
- Source code analysis in Penetration Testing
- Spam in Penetration Testing
- Spambot in Penetration Testing
- Spear phishing in Penetration Testing
- Spyware in Penetration Testing
- SQL injection in Penetration Testing
- SSL certificate in Penetration Testing
- SSL/TLS in Penetration Testing
- Stalkerware in Penetration Testing
- Steganography in Penetration Testing
- Stream cipher in Penetration Testing
- Stream in Penetration Testing
- Stuxnet: new light through old windows in Penetration Testing
- Supply-chain attack in Penetration Testing
- Suspicious activity in Penetration Testing
- Symbian malware in Penetration Testing
- Synonym: PG-ing in Penetration Testing
- System hardening in Penetration Testing
- System on a Chip (SoC) in Penetration Testing
- System optimizer in Penetration Testing
T
- Targeted attack in Penetration Testing
- TCP/IP stack fingerprinting in Penetration Testing
- Temp file cleaner in Penetration Testing
- The Unicode Standard in Penetration Testing
- Third party in Penetration Testing
- Third party patch management in Penetration Testing
- Threat actor in Penetration Testing
- Threat Detection and Response in Penetration Testing
- Threat hunting in Penetration Testing
- Threat intelligence in Penetration Testing
- Threat modeling in Penetration Testing
- TLD in Penetration Testing
- Token in Penetration Testing
- Tor in Penetration Testing
- TOR network in Penetration Testing
- Torrent in Penetration Testing
- Trackware in Penetration Testing
- Transport in Penetration Testing
- Transport Layer Security (TLS) in Penetration Testing
- Trojan horse. in Penetration Testing
- Trojan in Penetration Testing
- Trolling in Penetration Testing
- Troubleshooting in Penetration Testing
- Two-factor authentication (2FA) in Penetration Testing
- Typosquatting in Penetration Testing
U
- Ubiquitous computing (ubicomp) in Penetration Testing
- Ubuntu in Penetration Testing
- Unicode in Penetration Testing
- Unicode Transformation Format (UTF) in Penetration Testing
- Universal Authentication in Penetration Testing
- Universal serial bus (USB) in Penetration Testing
- UNIX in Penetration Testing
- Urban legend in Penetration Testing
- URL in Penetration Testing
- USB attack in Penetration Testing
- USB boot in Penetration Testing
- Usenet in Penetration Testing
- User interface and dialog spoofing in Penetration Testing
- User interface in Penetration Testing
- Using ILSpy to analyze a small adware file in Penetration Testing
V
- Vaporware in Penetration Testing
- Variant in Penetration Testing
- Virtual machine in Penetration Testing
- Virtual memory in Penetration Testing
- Virtual private network (VPN) in Penetration Testing
- Virtual reality (VR) in Penetration Testing
- Virus hoax in Penetration Testing
- Virus in Penetration Testing
- Vishing in Penetration Testing
- Visual spoofing in Penetration Testing
- VLAN in Penetration Testing
- VM-aware in Penetration Testing
- Voice authentication in Penetration Testing
- Voice over Internet Protocol (VoIP) in Penetration Testing
- Voice phishing (vishing) in Penetration Testing
- Vulnerabilities in Penetration Testing
- Vulnerability assessment in Penetration Testing
W
- Walled garden in Penetration Testing
- WAP in Penetration Testing
- War driving in Penetration Testing
- Warez in Penetration Testing
- Warm boot in Penetration Testing
- Warm standby in Penetration Testing
- WASP in Penetration Testing
- Watering hole attack in Penetration Testing
- Wayback Machine in Penetration Testing
- Wearable computer in Penetration Testing
- Wearable device in Penetration Testing
- Web application firewall (WAF) in Penetration Testing
- Web application security in Penetration Testing
- Web in Penetration Testing
- Web inject in Penetration Testing
- Web scraping in Penetration Testing
- Web skimmer in Penetration Testing
- Web-enabled in Penetration Testing
- Website defacement in Penetration Testing
- Website spoofing in Penetration Testing
- Wetware in Penetration Testing
- Whack-a-mole in Penetration Testing
- Whaling in Penetration Testing
- What is a password manager? in Penetration Testing
- White box testing in Penetration Testing
- White hat hacker in Penetration Testing
- White screen of death (WSoD) in Penetration Testing
- White space padding in Penetration Testing
- Whitelist in Penetration Testing
- WHOIS in Penetration Testing
- Wi-Fi cracking in Penetration Testing
- Wi-Fi in Penetration Testing
- Wide Area Network (WAN) in Penetration Testing
- Windows Sockets API (Winsock) in Penetration Testing
- Wireless in Penetration Testing
- Wireless network hacking in Penetration Testing
- Wiretap Trojan in Penetration Testing
- WLAN in Penetration Testing
- Worm in Penetration Testing
- WoT in Penetration Testing
- WPA in Penetration Testing
- WPA-PSK in Penetration Testing
- WPA2 in Penetration Testing
- WPAN in Penetration Testing
- Write protection in Penetration Testing
- WYSIWYG in Penetration Testing
X
- XaaS in Penetration Testing
Y
- Y2K in Penetration Testing
Z
- Zbot in Penetration Testing
- Zero-day in Penetration Testing
- Zero-day vulnerability in Penetration Testing
- Zero-trust in Penetration Testing
- Zombie computer. in Penetration Testing
- Zombie in Penetration Testing
- Zombie network in Penetration Testing
- Zombie process in Penetration Testing
- Zone transfer in Penetration Testing
- Zoombombing in Penetration Testing