1/25
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Buffer overflow attacks
A buffer overflow attack happens when a program receives more data than it can store, causing extra data to overwrite nearby memory. Attackers can use this to run malicious code or take control of a system.
Cross-site scripting (XSS)
Cross-site scripting (XSS) is when attackers inject harmful code (usually JavaScript) into a website so it runs in other users' browsers. This can steal cookies, passwords, or session data.
Exploit development
Exploit development is the process of finding a weakness in software and creating code that takes advantage of it to gain access, run commands, or steal data.
Hacker
A hacker is someone who uses technical skills to access computer systems. Hackers can be malicious (breaking in illegally) or ethical (testing systems to improve security).
IP address
An IP address is a unique number that identifies a device on a network. It allows devices to send and receive data over the internet or a local network.
Malware
Malware is malicious software designed to harm systems, steal data, or give attackers control. Examples include viruses, ransomware, and spyware.
Network mapping
Network mapping uses scan results to create a structured list of devices, including IP addresses, operating systems, and services.
Network scanning
Network scanning is the process of checking a network to find active devices, open ports, services, and possible vulnerabilities.
Network topology
Network topology shows how devices are connected and how data flows between them, either physically or logically.
Open-source intelligence (OSINT)
OSINT is collecting information from public sources like websites, social media, and forums without hacking or breaking laws.
OS detection
OS detection identifies the operating system running on a device by analyzing how it responds to network probes.
Password cracking tool
A password cracking tool is a program that tries many password combinations to guess or recover passwords. Security professionals use them to test password strength.
Penetration testing
Penetration testing is an authorized, controlled cyberattack used to find security weaknesses before real attackers can exploit them.
Port scanning
Port scanning checks which ports on a device are open or closed to see what services are running and how exposed the system is.
Pretexting
Pretexting is creating a fake but believable story or identity to trick someone into giving confidential information.
Response plan
A response plan outlines how an organization detects, responds to, and recovers from a cyber incident.
Search engine dorking
Search engine dorking uses special search queries to find exposed files, login pages, or sensitive information indexed by search engines.
Security posture assessment
A security posture assessment evaluates how well an organization can defend against cyber threats, including policies, tools, and practices.
Social engineering attacks
Social engineering attacks manipulate people into revealing information or performing actions that weaken security, instead of attacking systems directly.
SQL injection
SQL injection is when attackers insert malicious SQL commands into a website's input fields to access, change, or delete database data.
System forensics
System forensics involves analyzing logs, files, and system activity to understand how an attack happened and what the attacker did.
Testing
Testing refers to systematically checking systems, networks, or applications to identify vulnerabilities and security risks.
Black box
Black box testing simulates an external attacker with no inside knowledge of the system.
Grey box
Grey box testing uses partial knowledge of the system, simulating an insider or attacker with limited access.
White box
White box testing gives testers full knowledge of the system, including code, configurations, and network diagrams.
Vishing (voice phishing)
Vishing is a social engineering attack where attackers use phone calls to pretend to be trusted people and steal sensitive information.