📘 Glossary of Penetration Testing Terms
A reference guide to common terms, techniques, and concepts used in ethical hacking and penetration testing.
A
-
Access Control
Mechanism that restricts access to systems or data based on policies, roles, or rules. -
Active Directory (AD)
Microsoft's directory service for Windows domain networks. Common target in internal network tests. -
Adversary Simulation
Testing method that mimics real-world attackers to assess detection and response capabilities. -
Attack Vector
The path or method used by an attacker to exploit a vulnerability.
B
-
Black Box Testing
Testing without prior knowledge of the internal workings or architecture of the target. -
Blue Team
Defensive cybersecurity team responsible for monitoring and defending infrastructure. -
Brute Force Attack
A method to crack passwords or keys by systematically trying all possible combinations.
C
-
Command Injection
A vulnerability where an attacker can execute arbitrary commands on a host operating system. -
Credential Dumping
Technique used to extract account credentials (e.g., hashes) from systems like Windows. -
Cross-Site Scripting (XSS)
Injection of malicious scripts into otherwise trusted websites viewed by other users. -
CVSS (Common Vulnerability Scoring System)
Industry standard for rating the severity of security vulnerabilities.
D
-
Defense in Depth
Security strategy involving multiple layers of protection across systems. -
Directory Traversal
Vulnerability allowing access to files and directories outside the web root folder. -
DNS Spoofing
Attack that redirects queries to malicious IPs by falsifying DNS data.
E
-
Enumeration
The process of gathering information about usernames, shares, services, etc., from a system or network. -
Exploit
A piece of software, data, or commands that takes advantage of a vulnerability to cause unintended behavior.
F
-
Firewall
A network security device that monitors and filters incoming/outgoing traffic based on rules. -
Footprinting
Passive information gathering about a target prior to active scanning or exploitation.
G
- Gray Box Testing
Testing where the tester has partial knowledge of the target (e.g., credentials or architecture).
H
-
Hash Cracking
Attempting to reverse cryptographic hashes to obtain the original input (usually passwords). -
Honeypot
A decoy system designed to lure attackers and detect or study their methods.
I
-
IDS/IPS (Intrusion Detection/Prevention Systems)
Tools that detect or prevent suspicious activity or policy violations. -
Information Disclosure
Exposure of sensitive information (e.g., debug logs, error messages) that may aid attackers.
J
- JWT (JSON Web Token)
A common token format used for session authentication, often tested for manipulation or forgery.
L
-
Lateral Movement
Technique used by attackers to move deeper into a network after initial compromise. -
Local File Inclusion (LFI)
A vulnerability that allows attackers to include files from the server's filesystem.
M
-
Man-in-the-Middle (MITM)
Attack where the attacker secretly intercepts or alters communications between two parties. -
Metasploit
A widely-used exploitation framework for developing and executing exploits.
N
- Nmap
Popular network scanner used to discover hosts, services, and vulnerabilities.
O
- OSINT (Open Source Intelligence)
Gathering publicly available information for reconnaissance (e.g., via social media, public data).
P
-
Payload
The part of an exploit that performs a specific action, such as opening a shell or reverse connection. -
Phishing
Social engineering attack that tricks users into revealing sensitive info or executing malicious actions. -
Pivoting
Using a compromised system to gain access to additional systems or networks.
R
-
Red Team
Offensive security team simulating real-world attackers to test defenses. -
Reverse Shell
A shell session initiated from the target back to the attacker's system. -
RCE (Remote Code Execution)
A critical vulnerability allowing an attacker to execute arbitrary code remotely.
S
-
Session Hijacking
Exploiting a valid session token to impersonate a legitimate user. -
SQL Injection (SQLi)
Injection attack targeting database queries via unsanitized input.
T
-
TTPs (Tactics, Techniques, and Procedures)
A model describing the behavior and methods of threat actors. -
Trojan
Malicious software disguised as legitimate to trick users into executing it.
U
- User Enumeration
Identifying valid usernames through error messages, timing differences, or other side channels.
V
-
Vulnerability
A weakness in a system that can be exploited to compromise confidentiality, integrity, or availability. -
Vulnerability Assessment
The process of identifying, quantifying, and prioritizing vulnerabilities in systems.
W
-
WAF (Web Application Firewall)
A security solution that filters, monitors, and blocks HTTP traffic to and from a web application. -
Whitelisting
A security approach that allows only explicitly approved applications or traffic.
X
- XML External Entity (XXE)
An attack against XML parsers where external entities are exploited to access internal files or services.
Z
- Zero-Day
A vulnerability unknown to the vendor and public, with no official fix available.
This glossary is maintained as part of the Haxoris Wiki, serving as a learning reference for cybersecurity professionals and ethical hackers.