Term
|
Definition
A way for you to simulate the methods that an attacker might use to circumvent security controls and gain access to an organization’s systems. |
|
|
Term
|
Definition
Penetration Testing Execution Standard |
|
|
Term
|
Definition
1. Pre-engagement Interactions 2. Intelligence Gathering 3. Threat Modeling 4. Vulnerability Analysis 5. Exploitation 6. Post Exploitation 7. Reporting |
|
|
Term
|
Definition
An exploit is the means by which an attacker, or pen tester for that matter, takes advantage of a flaw within a system, an application, or a service. An attacker uses an exploit to attack a system in a way that results in a particular desired outcome that the developer never intended. Common exploits include buffer overflows, web application vulnerabilities (such as SQL injection), and configuration errors. |
|
|
Term
|
Definition
A payload is code that we want the system to execute and that is to be selected and delivered by the Framework. For example, a reverse shell is a payload that creates a connection from the target machine back to the attacker as a Windows command prompt (see Chapter 5), whereas a bind shell is a payload that “binds” a command prompt to a listening port on the target machine, which the attacker can then connect. A payload could also be something as simple as a few commands to be executed on the target operating system. |
|
|
Term
|
Definition
reverse shell is a payload that creates a connection from the target machine back to the attacker as a Windows command prompt |
|
|
Term
|
Definition
bind shell is a payload that “binds” a command prompt to a listening port on the target machine, which the attacker can then connect. |
|
|
Term
|
Definition
Shellcode is a set of instructions used as a payload when exploitation occurs. Shellcode is typically written in assembly language. In most cases, a command shell or a Meterpreter shell will be provided after the series of instructions have been performed by the target machine, hence the name. |
|
|
Term
|
Definition
A module in the context of this book is a piece of software that can be used by the Metasploit Framework. |
|
|
Term
|
Definition
a software component that conducts the attack. |
|
|
Term
|
Definition
may be required to perform an action such as scanning or system enumeration. |
|
|
Term
|
Definition
A listener is a component within Metasploit that waits for an incoming connection of some sort. |
|
|