📘 Glossary of Penetration Testing Terms

A reference guide to common terms, techniques, and concepts used in ethical hacking and penetration testing.


A

  • Access Control
    Mechanism that restricts access to systems or data based on policies, roles, or rules.

  • Active Directory (AD)
    Microsoft's directory service for Windows domain networks. Common target in internal network tests.

  • Adversary Simulation
    Testing method that mimics real-world attackers to assess detection and response capabilities.

  • Attack Vector
    The path or method used by an attacker to exploit a vulnerability.


B

  • Black Box Testing
    Testing without prior knowledge of the internal workings or architecture of the target.

  • Blue Team
    Defensive cybersecurity team responsible for monitoring and defending infrastructure.

  • Brute Force Attack
    A method to crack passwords or keys by systematically trying all possible combinations.


C

  • Command Injection
    A vulnerability where an attacker can execute arbitrary commands on a host operating system.

  • Credential Dumping
    Technique used to extract account credentials (e.g., hashes) from systems like Windows.

  • Cross-Site Scripting (XSS)
    Injection of malicious scripts into otherwise trusted websites viewed by other users.

  • CVSS (Common Vulnerability Scoring System)
    Industry standard for rating the severity of security vulnerabilities.


D

  • Defense in Depth
    Security strategy involving multiple layers of protection across systems.

  • Directory Traversal
    Vulnerability allowing access to files and directories outside the web root folder.

  • DNS Spoofing
    Attack that redirects queries to malicious IPs by falsifying DNS data.


E

  • Enumeration
    The process of gathering information about usernames, shares, services, etc., from a system or network.

  • Exploit
    A piece of software, data, or commands that takes advantage of a vulnerability to cause unintended behavior.


F

  • Firewall
    A network security device that monitors and filters incoming/outgoing traffic based on rules.

  • Footprinting
    Passive information gathering about a target prior to active scanning or exploitation.


G

  • Gray Box Testing
    Testing where the tester has partial knowledge of the target (e.g., credentials or architecture).

H

  • Hash Cracking
    Attempting to reverse cryptographic hashes to obtain the original input (usually passwords).

  • Honeypot
    A decoy system designed to lure attackers and detect or study their methods.


I

  • IDS/IPS (Intrusion Detection/Prevention Systems)
    Tools that detect or prevent suspicious activity or policy violations.

  • Information Disclosure
    Exposure of sensitive information (e.g., debug logs, error messages) that may aid attackers.


J

  • JWT (JSON Web Token)
    A common token format used for session authentication, often tested for manipulation or forgery.

L

  • Lateral Movement
    Technique used by attackers to move deeper into a network after initial compromise.

  • Local File Inclusion (LFI)
    A vulnerability that allows attackers to include files from the server's filesystem.


M

  • Man-in-the-Middle (MITM)
    Attack where the attacker secretly intercepts or alters communications between two parties.

  • Metasploit
    A widely-used exploitation framework for developing and executing exploits.


N

  • Nmap
    Popular network scanner used to discover hosts, services, and vulnerabilities.

O

  • OSINT (Open Source Intelligence)
    Gathering publicly available information for reconnaissance (e.g., via social media, public data).

P

  • Payload
    The part of an exploit that performs a specific action, such as opening a shell or reverse connection.

  • Phishing
    Social engineering attack that tricks users into revealing sensitive info or executing malicious actions.

  • Pivoting
    Using a compromised system to gain access to additional systems or networks.


R

  • Red Team
    Offensive security team simulating real-world attackers to test defenses.

  • Reverse Shell
    A shell session initiated from the target back to the attacker's system.

  • RCE (Remote Code Execution)
    A critical vulnerability allowing an attacker to execute arbitrary code remotely.


S

  • Session Hijacking
    Exploiting a valid session token to impersonate a legitimate user.

  • SQL Injection (SQLi)
    Injection attack targeting database queries via unsanitized input.


T

  • TTPs (Tactics, Techniques, and Procedures)
    A model describing the behavior and methods of threat actors.

  • Trojan
    Malicious software disguised as legitimate to trick users into executing it.


U

  • User Enumeration
    Identifying valid usernames through error messages, timing differences, or other side channels.

V

  • Vulnerability
    A weakness in a system that can be exploited to compromise confidentiality, integrity, or availability.

  • Vulnerability Assessment
    The process of identifying, quantifying, and prioritizing vulnerabilities in systems.


W

  • WAF (Web Application Firewall)
    A security solution that filters, monitors, and blocks HTTP traffic to and from a web application.

  • Whitelisting
    A security approach that allows only explicitly approved applications or traffic.


X

  • XML External Entity (XXE)
    An attack against XML parsers where external entities are exploited to access internal files or services.

Z

  • Zero-Day
    A vulnerability unknown to the vendor and public, with no official fix available.

This glossary is maintained as part of the Haxoris Wiki, serving as a learning reference for cybersecurity professionals and ethical hackers.