Penetration Testing Glossary

Important definitions and terminologies used in Penetration Testing

A

  • Abandonware in Penetration Testing
  • Account harvesting in Penetration Testing
  • Account hijacking in Penetration Testing
  • Active directory in Penetration Testing
  • Active reconnaissance in Penetration Testing
  • Ad blocker in Penetration Testing
  • Ad fraud in Penetration Testing
  • Ad rotator in Penetration Testing
  • Add-in in Penetration Testing
  • Address bar in Penetration Testing
  • Address bar spoofing in Penetration Testing
  • Address Resolution Protocol (ARP) in Penetration Testing
  • Advanced Encryption Standard (AES) in Penetration Testing
  • Advanced persistent threat (APT) in Penetration Testing
  • Adversary emulation in Penetration Testing
  • Adware in Penetration Testing
  • Air gap in Penetration Testing
  • Always-On in Penetration Testing
  • Analog in Penetration Testing
  • Android app in Penetration Testing
  • Android in Penetration Testing
  • Annoybot in Penetration Testing
  • Annoyware in Penetration Testing
  • Anomaly detection in Penetration Testing
  • Anonymization in Penetration Testing
  • Anonymizer in Penetration Testing
  • Anonymous in Penetration Testing
  • Anti-ransomware in Penetration Testing
  • Anti-virus (AV) killer in Penetration Testing
  • Antivirus in Penetration Testing
  • API security in Penetration Testing
  • Applet in Penetration Testing
  • Application in Penetration Testing
  • Application programming interface (API) in Penetration Testing
  • Application security in Penetration Testing
  • Artificial intelligence (AI) in Penetration Testing
  • Astroturfing in Penetration Testing
  • Asymmetric cryptography in Penetration Testing
  • Attack vector in Penetration Testing
  • Attribution in Penetration Testing
  • Augmented reality (AR) in Penetration Testing
  • Authentication in Penetration Testing
  • Autonomous system in Penetration Testing

B

  • Backdoor in Penetration Testing
  • Bad sector in Penetration Testing
  • Bait advertising in Penetration Testing
  • Banking Trojan in Penetration Testing
  • Behavior in Penetration Testing
  • Behavioral biometrics in Penetration Testing
  • Big data in Penetration Testing
  • Big-game hunting (BGH) in Penetration Testing
  • Binary analysis in Penetration Testing
  • Binary in Penetration Testing
  • Biohacking in Penetration Testing
  • Biometrics in Penetration Testing
  • BIOS in Penetration Testing
  • Bitcoin in Penetration Testing
  • Black box testing in Penetration Testing
  • Black Friday in Penetration Testing
  • Blacklist in Penetration Testing
  • Blended threat in Penetration Testing
  • Bloatware in Penetration Testing
  • Block cipher in Penetration Testing
  • Blue Screen of Death (BSoD) in Penetration Testing
  • Blue team in Penetration Testing
  • Bluejacking in Penetration Testing
  • Bluesnarfing in Penetration Testing
  • Bluetooth in Penetration Testing
  • Boot in Penetration Testing
  • Boot sector in Penetration Testing
  • Boot sector virus in Penetration Testing
  • Bootkit in Penetration Testing
  • Bot herder in Penetration Testing
  • Bot in Penetration Testing
  • Botnet in Penetration Testing
  • Breadcrumbs in Penetration Testing
  • Bricking in Penetration Testing
  • Bring your own device (BYOD) in Penetration Testing
  • Browlock in Penetration Testing
  • Browser helper object (BHO) in Penetration Testing
  • Brute force attack in Penetration Testing
  • Buffer in Penetration Testing
  • Buffer overflow in Penetration Testing
  • Bug bounty in Penetration Testing
  • Bundler in Penetration Testing
  • Bundleware in Penetration Testing
  • Burn in Penetration Testing
  • Business continuity management (BCM) in Penetration Testing
  • Business email compromise (BEC) in Penetration Testing
  • Business process compromise (BPC) in Penetration Testing

C

  • Cache in Penetration Testing
  • Certificate authority (CA) in Penetration Testing
  • Cipher in Penetration Testing
  • Ciphertext in Penetration Testing
  • Click fraud in Penetration Testing
  • Clickbait in Penetration Testing
  • Clickjacking in Penetration Testing
  • Cloud computing in Penetration Testing
  • Cloud phishing in Penetration Testing
  • Cloud security in Penetration Testing
  • Cobalt Strike in Penetration Testing
  • Code review in Penetration Testing
  • Cold boot in Penetration Testing
  • Command & control (C&C) in Penetration Testing
  • Command and control (C&C) in Penetration Testing
  • Command injection in Penetration Testing
  • Common vulnerabilities and exposures (CVE) in Penetration Testing
  • Companion virus in Penetration Testing
  • Compliance testing in Penetration Testing
  • Compromised in Penetration Testing
  • Computer ethics in Penetration Testing
  • Computer science (CS) in Penetration Testing
  • Computer-Aided Design (CAD) in Penetration Testing
  • Consumer fraud protection in Penetration Testing
  • Container security in Penetration Testing
  • Cookie in Penetration Testing
  • Crack in Penetration Testing
  • Credential stuffing in Penetration Testing
  • Crimeware in Penetration Testing
  • Cross-site scripting (XSS) in Penetration Testing
  • Crypter in Penetration Testing
  • Cryptocurrency in Penetration Testing
  • Cryptocurrency mining in Penetration Testing
  • Cryptography in Penetration Testing
  • Cryptojacking in Penetration Testing
  • Customer Relationship Management (CRM) in Penetration Testing
  • CVE identifier in Penetration Testing
  • Cyber espionage in Penetration Testing
  • Cyber liability insurance in Penetration Testing
  • Cyber Monday in Penetration Testing
  • Cyberbullying in Penetration Testing
  • Cybercrime in Penetration Testing
  • Cybersecurity in Penetration Testing

D

  • Dark web in Penetration Testing
  • Data breach in Penetration Testing
  • Data exfiltration in Penetration Testing
  • Data Link in Penetration Testing
  • Data loss prevention (DLP) in Penetration Testing
  • Data mining in Penetration Testing
  • Data Privacy Day (DPD) in Penetration Testing
  • Data Protection in Penetration Testing
  • Database security in Penetration Testing
  • Decompiler in Penetration Testing
  • Decryptor in Penetration Testing
  • Deepfake in Penetration Testing
  • Definition in Penetration Testing
  • Defragmentation in Penetration Testing
  • Denial-of-service (DoS) in Penetration Testing
  • Destruction of service (DeOS) in Penetration Testing
  • Device control in Penetration Testing
  • Dialer in Penetration Testing
  • Dictionary attack in Penetration Testing
  • Digital footprint in Penetration Testing
  • Digital forensics in Penetration Testing
  • Disk optimizer (disk defragmenter) in Penetration Testing
  • Distributed Denial of Service (DDoS) in Penetration Testing
  • DNS filtering in Penetration Testing
  • DNS over HTTPS (DoH) in Penetration Testing
  • DNS over TLS (DoT) in Penetration Testing
  • DNS spoofing in Penetration Testing
  • Domain administrator privileges in Penetration Testing
  • Domain in Penetration Testing
  • Domain name spoofing in Penetration Testing
  • Domain name system (DNS) in Penetration Testing
  • Domain Name System Security Extensions (DNSSEC) in Penetration Testing
  • Downloader in Penetration Testing
  • Dox in Penetration Testing
  • Drive-by download in Penetration Testing
  • Drive-by mining in Penetration Testing
  • Driver Updater in Penetration Testing
  • Dropper in Penetration Testing
  • Dwell time in Penetration Testing

E

  • Eavesdropping in Penetration Testing
  • Electronic sports (eSports) in Penetration Testing
  • Email security in Penetration Testing
  • Encryption in Penetration Testing
  • End-user in Penetration Testing
  • Endpoint detection and response (EDR) in Penetration Testing
  • Endpoint security in Penetration Testing
  • Enterprise Resource Planning (ERP) in Penetration Testing
  • Enumeration in Penetration Testing
  • EternalBlue in Penetration Testing
  • EternalChampion in Penetration Testing
  • EternalRomance in Penetration Testing
  • Ethernet in Penetration Testing
  • Ethical hacking in Penetration Testing
  • Executable and Link format (ELF) in Penetration Testing
  • Exploit in Penetration Testing
  • Exploit kit in Penetration Testing
  • Extended Validation SSL Certificate (EV SSL) in Penetration Testing

F

  • Family in Penetration Testing
  • Fear, uncertainty, and doubt (FUD) in Penetration Testing
  • File type in Penetration Testing
  • File-based attack in Penetration Testing
  • Fingerprinting in Penetration Testing
  • Firewall in Penetration Testing
  • Firewall ruleset review in Penetration Testing
  • Firmware in Penetration Testing
  • Foothold expansion in Penetration Testing
  • Footprinting in Penetration Testing
  • Fraud in Penetration Testing
  • Fraudulent vanity URLs in Penetration Testing
  • Freeware in Penetration Testing
  • Frequently asked questions (FAQ) in Penetration Testing
  • Fuzz testing in Penetration Testing

G

  • GDPR compliance in Penetration Testing
  • General Data Protection Regulation (GDPR) in Penetration Testing
  • Globally unique identifier (GUID) in Penetration Testing
  • Graphical user interface (GUI) in Penetration Testing
  • Gray box testing in Penetration Testing
  • Graymail in Penetration Testing
  • Greyware in Penetration Testing
  • Griefing in Penetration Testing

H

  • Hacker in Penetration Testing
  • Hacking in Penetration Testing
  • Hacktivism in Penetration Testing
  • Hacktivist in Penetration Testing
  • Hash value in Penetration Testing
  • Hashing in Penetration Testing
  • Heap spray in Penetration Testing
  • Heap spraying in Penetration Testing
  • Heartbleed in Penetration Testing
  • HermeticWiper in Penetration Testing
  • Heuristic analysis in Penetration Testing
  • Hibernation in Penetration Testing
  • Hijacker in Penetration Testing
  • Hoax in Penetration Testing
  • Homograph attacks in Penetration Testing
  • Homograph in Penetration Testing
  • Host Intrusion Prevention System (HIPS) in Penetration Testing
  • Host-based solution in Penetration Testing
  • Hyper-Text Transfer Protocol (HTTP) in Penetration Testing
  • Hyper-Text Transfer Protocol Secure (HTTPS) in Penetration Testing

I

  • Identity and access management (IAM) in Penetration Testing
  • Identity theft in Penetration Testing
  • In computer security, a domain can refer to: in Penetration Testing
  • Incident handling in Penetration Testing
  • Incident response in Penetration Testing
  • Incident scope in Penetration Testing
  • Indicator of Attack (IOA) in Penetration Testing
  • Indicator of compromise (IOC) in Penetration Testing
  • Infection vector in Penetration Testing
  • Information security in Penetration Testing
  • Information Technology (IT) in Penetration Testing
  • Infrastructure as code (IaC) security in Penetration Testing
  • Initial access brokers (IABs) in Penetration Testing
  • Injection attacks in Penetration Testing
  • Input/Output (I/O) in Penetration Testing
  • Insider threat detection in Penetration Testing
  • Insider threat in Penetration Testing
  • Intellectual property in Penetration Testing
  • Internationalized domain names (IDN) in Penetration Testing
  • Internationalized email forging in Penetration Testing
  • Internet of things (IoT) in Penetration Testing
  • Internet of Things (IoT) security in Penetration Testing
  • Internet Service Provider (ISP) in Penetration Testing
  • Intranet in Penetration Testing
  • Intrusion detection system (IDS) in Penetration Testing
  • Intrusion Prevention System (IPS) in Penetration Testing
  • IP address in Penetration Testing

J

  • Jailbreak in Penetration Testing
  • Java security in Penetration Testing
  • JavaScript security in Penetration Testing
  • Joke programs in Penetration Testing
  • Juice jacking in Penetration Testing
  • Junk mail in Penetration Testing
  • Junk mail is, essentially, email spam. in Penetration Testing

K

  • Kerberos in Penetration Testing
  • Key generator in Penetration Testing
  • Keylogger in Penetration Testing
  • Keystream in Penetration Testing
  • Keystroke in Penetration Testing

L

  • Latency in Penetration Testing
  • Lateral movement in Penetration Testing
  • Layered Service Provider (LSP) in Penetration Testing
  • LDAP injection in Penetration Testing
  • Learn more: in Penetration Testing
  • Linux in Penetration Testing
  • Linux security in Penetration Testing
  • Local administrator privilege in Penetration Testing
  • Local administrator privileges in Penetration Testing
  • Local Area Network (LAN) in Penetration Testing
  • Localhost in Penetration Testing
  • Log analysis in Penetration Testing
  • Logic bomb in Penetration Testing

M

  • MAC address in Penetration Testing
  • Machine code in Penetration Testing
  • Machine learning (ML) in Penetration Testing
  • Machine-to-machine (M2M) in Penetration Testing
  • Macro in Penetration Testing
  • Macro virus in Penetration Testing
  • Madware in Penetration Testing
  • Magecart in Penetration Testing
  • Mail bomb in Penetration Testing
  • Malicious insider in Penetration Testing
  • Malicious/Destructive payload in Penetration Testing
  • Malspam in Penetration Testing
  • Malvertising in Penetration Testing
  • Malware in Penetration Testing
  • Malwarebytes detects these types. in Penetration Testing
  • Man-in-the-Browser (MitB) in Penetration Testing
  • Man-in-the-middle (MitM) in Penetration Testing
  • Managed Detection and Response (MDR) in Penetration Testing
  • Managed service provider (MSP) in Penetration Testing
  • Master Boot Record (MBR) in Penetration Testing
  • Memory corruption in Penetration Testing
  • Memory dump in Penetration Testing
  • Memory resident in Penetration Testing
  • Metadata in Penetration Testing
  • Metropolitan area network (MAN) in Penetration Testing
  • Middelware in Penetration Testing
  • Miner in Penetration Testing
  • Mitigation in Penetration Testing
  • MITRE ATT&CK Framework in Penetration Testing
  • Mixed reality in Penetration Testing
  • Mobile application security in Penetration Testing
  • Mobile Security in Penetration Testing
  • Money mule in Penetration Testing
  • Multi-factor authentication (MFA) in Penetration Testing
  • Multi-tenancy in Penetration Testing
  • Multimedia Messaging Service (MMS) in Penetration Testing
  • Multiplatform in Penetration Testing
  • Mumblehard malware in Penetration Testing

N

  • National Cyber Security Centre (NCSC) in Penetration Testing
  • National Security Agency (NSA) in Penetration Testing
  • Near-field communication (NFC) in Penetration Testing
  • Net neutrality in Penetration Testing
  • Network in Penetration Testing
  • Network mapping in Penetration Testing
  • Network perimeter in Penetration Testing
  • Network security in Penetration Testing
  • Network segmentation in Penetration Testing
  • NewTab in Penetration Testing
  • Next Generation Antivirus (NGAV) in Penetration Testing
  • Non-repudiation in Penetration Testing

O

  • Obfuscation in Penetration Testing
  • Open source intelligence (OSINT) in Penetration Testing
  • Open Systems Interconnection (OSI) in Penetration Testing
  • OpenSSL in Penetration Testing
  • Operating system (OS) in Penetration Testing
  • Operating system security in Penetration Testing
  • Opportunistic attack in Penetration Testing
  • Out of character: Homograph attacks explained in Penetration Testing

P

  • Packer in Penetration Testing
  • Passcode in Penetration Testing
  • Passphrase in Penetration Testing
  • Password cracking application in Penetration Testing
  • Password cracking in Penetration Testing
  • Password guessing in Penetration Testing
  • Password in Penetration Testing
  • Password manager in Penetration Testing
  • Password policy assessment in Penetration Testing
  • Patch management in Penetration Testing
  • Patch management software in Penetration Testing
  • Payload in Penetration Testing
  • Payload. in Penetration Testing
  • Payment Card Industry Data Security Standard (PCI DSS) in Penetration Testing
  • Peer-to-peer (P2P) in Penetration Testing
  • Penetration testing as a service (PTaaS) in Penetration Testing
  • Penetration testing framework (PTF) in Penetration Testing
  • Penetration testing in Penetration Testing
  • Peopleware in Penetration Testing
  • Personal identification number (PIN) in Penetration Testing
  • Personally Identifiable Information (PII) in Penetration Testing
  • Pharma in Penetration Testing
  • Phishing attack in Penetration Testing
  • Phishing in Penetration Testing
  • Phishing kit in Penetration Testing
  • Phreaking in Penetration Testing
  • Physical in Penetration Testing
  • Physical penetration testing in Penetration Testing
  • Physical security in Penetration Testing
  • Plaintext in Penetration Testing
  • Platform in Penetration Testing
  • Point-of-sale (PoS) malware in Penetration Testing
  • Polymorphism in Penetration Testing
  • Port scanning in Penetration Testing
  • Portable device in Penetration Testing
  • Portable Executable (PE) file header in Penetration Testing
  • Power User in Penetration Testing
  • PowerShell in Penetration Testing
  • Preinstalled software in Penetration Testing
  • Presentation in Penetration Testing
  • Privilege escalation in Penetration Testing
  • Profanity filter bypassing in Penetration Testing
  • Professional Service Automation (PSA) in Penetration Testing
  • Proof of concept in Penetration Testing
  • Protector in Penetration Testing
  • Proxy in Penetration Testing
  • Proxy server in Penetration Testing
  • Pseudocode in Penetration Testing
  • PUM in Penetration Testing
  • Punycode in Penetration Testing
  • PUP in Penetration Testing
  • Python security in Penetration Testing

Q

  • QR Code in Penetration Testing
  • Quarantine in Penetration Testing

R

  • RAM scraping in Penetration Testing
  • Random access memory (RAM) in Penetration Testing
  • Ransomware in Penetration Testing
  • Ransomware-as-a-service in Penetration Testing
  • RAR in Penetration Testing
  • Recon in Penetration Testing
  • Reconnaissance in Penetration Testing
  • Red team in Penetration Testing
  • Registry cleaner in Penetration Testing
  • Related blog post(s): in Penetration Testing
  • Remediation in Penetration Testing
  • Remote access in Penetration Testing
  • Remote access Trojan (RAT) in Penetration Testing
  • Remote administration tool (RAT) in Penetration Testing
  • Remote code execution (RCE) attack in Penetration Testing
  • Remote code execution (RCE) in Penetration Testing
  • Remote desktop protocol (RDP) in Penetration Testing
  • Remote monitoring and management (RMM) in Penetration Testing
  • Remote user in Penetration Testing
  • Report system errors in Penetration Testing
  • Retrovirus in Penetration Testing
  • Revealed: POS malware used in Target attack in Penetration Testing
  • Revenge porn in Penetration Testing
  • Reverse engineering in Penetration Testing
  • Risk assessment in Penetration Testing
  • Risk management in Penetration Testing
  • Riskware in Penetration Testing
  • Robocall in Penetration Testing
  • Rootkit in Penetration Testing
  • Router security in Penetration Testing
  • RunPE Technique in Penetration Testing

S

  • Safe Mode in Penetration Testing
  • Sandbox solution in Penetration Testing
  • Scam in Penetration Testing
  • Screen scraper in Penetration Testing
  • Screenlocker in Penetration Testing
  • Script kiddie in Penetration Testing
  • Search neutrality in Penetration Testing
  • Secure Sockets Layer (SSL) in Penetration Testing
  • Security audit in Penetration Testing
  • Security information and event management (SIEM) in Penetration Testing
  • Security testing in Penetration Testing
  • See botnet. in Penetration Testing
  • See: Wearable computer in Penetration Testing
  • Seed in Penetration Testing
  • SEO in Penetration Testing
  • Server in Penetration Testing
  • Server Message Block (SMB) in Penetration Testing
  • Server security in Penetration Testing
  • Service-level agreement (SLA) in Penetration Testing
  • Session fixation in Penetration Testing
  • Session hijacking in Penetration Testing
  • Session in Penetration Testing
  • Sextortion in Penetration Testing
  • Shareware in Penetration Testing
  • Shimming in Penetration Testing
  • SIEM in Penetration Testing
  • Signature in Penetration Testing
  • SIMjacking in Penetration Testing
  • Skimming in Penetration Testing
  • Smart home in Penetration Testing
  • SMS phishing (Smishing) in Penetration Testing
  • SOC in Penetration Testing
  • Social engineering in Penetration Testing
  • Social media security in Penetration Testing
  • Software as a service (SaaS) security in Penetration Testing
  • Software delivery layer in Penetration Testing
  • Software vulnerability in Penetration Testing
  • Source code analysis in Penetration Testing
  • Spam in Penetration Testing
  • Spambot in Penetration Testing
  • Spear phishing in Penetration Testing
  • Spyware in Penetration Testing
  • SQL injection in Penetration Testing
  • SSL certificate in Penetration Testing
  • SSL/TLS in Penetration Testing
  • Stalkerware in Penetration Testing
  • Steganography in Penetration Testing
  • Stream cipher in Penetration Testing
  • Stream in Penetration Testing
  • Stuxnet: new light through old windows in Penetration Testing
  • Supply-chain attack in Penetration Testing
  • Suspicious activity in Penetration Testing
  • Symbian malware in Penetration Testing
  • Synonym: PG-ing in Penetration Testing
  • System hardening in Penetration Testing
  • System on a Chip (SoC) in Penetration Testing
  • System optimizer in Penetration Testing

T

  • Targeted attack in Penetration Testing
  • TCP/IP stack fingerprinting in Penetration Testing
  • Temp file cleaner in Penetration Testing
  • The Unicode Standard in Penetration Testing
  • Third party in Penetration Testing
  • Third party patch management in Penetration Testing
  • Threat actor in Penetration Testing
  • Threat Detection and Response in Penetration Testing
  • Threat hunting in Penetration Testing
  • Threat intelligence in Penetration Testing
  • Threat modeling in Penetration Testing
  • TLD in Penetration Testing
  • Token in Penetration Testing
  • Tor in Penetration Testing
  • TOR network in Penetration Testing
  • Torrent in Penetration Testing
  • Trackware in Penetration Testing
  • Transport in Penetration Testing
  • Transport Layer Security (TLS) in Penetration Testing
  • Trojan horse. in Penetration Testing
  • Trojan in Penetration Testing
  • Trolling in Penetration Testing
  • Troubleshooting in Penetration Testing
  • Two-factor authentication (2FA) in Penetration Testing
  • Typosquatting in Penetration Testing

U

  • Ubiquitous computing (ubicomp) in Penetration Testing
  • Ubuntu in Penetration Testing
  • Unicode in Penetration Testing
  • Unicode Transformation Format (UTF) in Penetration Testing
  • Universal Authentication in Penetration Testing
  • Universal serial bus (USB) in Penetration Testing
  • UNIX in Penetration Testing
  • Urban legend in Penetration Testing
  • URL in Penetration Testing
  • USB attack in Penetration Testing
  • USB boot in Penetration Testing
  • Usenet in Penetration Testing
  • User interface and dialog spoofing in Penetration Testing
  • User interface in Penetration Testing
  • Using ILSpy to analyze a small adware file in Penetration Testing

V

  • Vaporware in Penetration Testing
  • Variant in Penetration Testing
  • Virtual machine in Penetration Testing
  • Virtual memory in Penetration Testing
  • Virtual private network (VPN) in Penetration Testing
  • Virtual reality (VR) in Penetration Testing
  • Virus hoax in Penetration Testing
  • Virus in Penetration Testing
  • Vishing in Penetration Testing
  • Visual spoofing in Penetration Testing
  • VLAN in Penetration Testing
  • VM-aware in Penetration Testing
  • Voice authentication in Penetration Testing
  • Voice over Internet Protocol (VoIP) in Penetration Testing
  • Voice phishing (vishing) in Penetration Testing
  • Vulnerabilities in Penetration Testing
  • Vulnerability assessment in Penetration Testing

W

  • Walled garden in Penetration Testing
  • WAP in Penetration Testing
  • War driving in Penetration Testing
  • Warez in Penetration Testing
  • Warm boot in Penetration Testing
  • Warm standby in Penetration Testing
  • WASP in Penetration Testing
  • Watering hole attack in Penetration Testing
  • Wayback Machine in Penetration Testing
  • Wearable computer in Penetration Testing
  • Wearable device in Penetration Testing
  • Web application firewall (WAF) in Penetration Testing
  • Web application security in Penetration Testing
  • Web in Penetration Testing
  • Web inject in Penetration Testing
  • Web scraping in Penetration Testing
  • Web skimmer in Penetration Testing
  • Web-enabled in Penetration Testing
  • Website defacement in Penetration Testing
  • Website spoofing in Penetration Testing
  • Wetware in Penetration Testing
  • Whack-a-mole in Penetration Testing
  • Whaling in Penetration Testing
  • What is a password manager? in Penetration Testing
  • White box testing in Penetration Testing
  • White hat hacker in Penetration Testing
  • White screen of death (WSoD) in Penetration Testing
  • White space padding in Penetration Testing
  • Whitelist in Penetration Testing
  • WHOIS in Penetration Testing
  • Wi-Fi cracking in Penetration Testing
  • Wi-Fi in Penetration Testing
  • Wide Area Network (WAN) in Penetration Testing
  • Windows Sockets API (Winsock) in Penetration Testing
  • Wireless in Penetration Testing
  • Wireless network hacking in Penetration Testing
  • Wiretap Trojan in Penetration Testing
  • WLAN in Penetration Testing
  • Worm in Penetration Testing
  • WoT in Penetration Testing
  • WPA in Penetration Testing
  • WPA-PSK in Penetration Testing
  • WPA2 in Penetration Testing
  • WPAN in Penetration Testing
  • Write protection in Penetration Testing
  • WYSIWYG in Penetration Testing

X

  • XaaS in Penetration Testing

Y

  • Y2K in Penetration Testing

Z

  • Zbot in Penetration Testing
  • Zero-day in Penetration Testing
  • Zero-day vulnerability in Penetration Testing
  • Zero-trust in Penetration Testing
  • Zombie computer. in Penetration Testing
  • Zombie in Penetration Testing
  • Zombie network in Penetration Testing
  • Zombie process in Penetration Testing
  • Zone transfer in Penetration Testing
  • Zoombombing in Penetration Testing
Marketing and Sales Analytics Glossary
MapReduce Glossary

Get industry recognized certification – Contact us

keyboard_arrow_up
Open chat
Need help?
Hello 👋
Can we help you?