Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "User:D1551D3N7"
From NetSec
(More terms and definitions :)) |
|||
Line 52: | Line 52: | ||
| Bash is the linux command line utility similar to MS-DOS. | | Bash is the linux command line utility similar to MS-DOS. | ||
|- | |- | ||
− | | | + | | [[Binary]] |
− | | | + | | Binary is machine-readable code consisting of 0s and 1s |
|- | |- | ||
− | | | + | | [[Biometric]] |
− | | | + | | In the scope of security, biometrics may be used to authenticate users based on unique physical traits, such as fingerprints or retina scans. |
+ | |- | ||
+ | | [[Bitwise Math]] | ||
+ | | Bitwise math is the foundation of all binary math and most mathematic operations performed in assembly. | ||
+ | |- | ||
+ | | [[Boolean Enumeration]] | ||
+ | | Boolean enumeration is used to discover data when you can only ask the an information system yes or no questions about a value. | ||
+ | |- | ||
+ | | [[Bootloader]] | ||
+ | | A bootloader is the code that runs prior to the loading of the operating system. | ||
+ | |- | ||
+ | | [[Botnet]] | ||
+ | | A botnet is a collection of computers under the control of an entity. | ||
+ | |- | ||
+ | | [[Brute force]] | ||
+ | | A brute force attack is a highly primitive method used to obtain authentication credentials by repeatedly guessing based on set parameters such as estimated length and characters used. | ||
+ | |- | ||
+ | | [[Buffer]] | ||
+ | | A Data Buffer is a space in computer memory, where data is stored to prevent the program or resource that requires either hardware or software, to run out of data during a transfer. | ||
|} | |} | ||
Revision as of 12:59, 12 August 2012
Google Dorks
Google dorks are search terms created to look for vulnerable websites using Google. They usually use the "inurl:" "intitle:" and "intext:" search operators. They are commonly used for web applications that exploits have been found in already and to find sites with the vulnerable version of that software.
- Inurl searches for sites with the text after the colon (:) in their url. eg inurl:index.php?page= will get result websites like http://www.example.com/index.php?page=76
- Intitle searches for sites with the text after the colon in their page title. eg intitle:FuBar_V2.0 will bring up websites with FuBar_V2.0 as the page title.
- Intext searches for site containing the text after the colon within the text. eg intext:Email_Administration_Panel_V3.0 will get results with that in the page.
Glossary
A glossary is a list of terms and definitions. This is a list of terms and definitions for words used within this wiki.
Term | Definition |
---|---|
AJAX | AJAX is a way to request information from web servers without the need of having to refresh the webpage. |
API | An API is a component for a specific piece of software which enables other software to communicate with it. |
ARP | ARP is used to resolve a network layer address to a link layer address, typically resolving a MAC address to an IP address. |
ASCII | ASCII codes represent text and is used by computers or other devices that use text. |
ASLR | A runtime security measure that randomizes the memory addresses that programs load data and code into. |
ASP | ASP is a server-side interpreted language used mostly in web applications. |
Administration | In the context of information technology, administration typically refers to system administration or network administration. |
Application | An application is a software program in any form. |
Assembly | Assembly is a low-level computer language. |
Availability | Availability is the assurance that data will be accessible by those authorized to receive it when the data is needed. |
BGP | BGP is the underlying dynamic routing protocol of the entire Internet. |
Bash | Bash is the linux command line utility similar to MS-DOS. |
Binary | Binary is machine-readable code consisting of 0s and 1s |
Biometric | In the scope of security, biometrics may be used to authenticate users based on unique physical traits, such as fingerprints or retina scans. |
Bitwise Math | Bitwise math is the foundation of all binary math and most mathematic operations performed in assembly. |
Boolean Enumeration | Boolean enumeration is used to discover data when you can only ask the an information system yes or no questions about a value. |
Bootloader | A bootloader is the code that runs prior to the loading of the operating system. |
Botnet | A botnet is a collection of computers under the control of an entity. |
Brute force | A brute force attack is a highly primitive method used to obtain authentication credentials by repeatedly guessing based on set parameters such as estimated length and characters used. |
Buffer | A Data Buffer is a space in computer memory, where data is stored to prevent the program or resource that requires either hardware or software, to run out of data during a transfer. |
Abbreviations
An abbreviation is when a long set of words is shortened into a few letters. This is a list of abbrieviations and their long format as used in this wiki.
Abbreviation | In Full |
---|---|
AJAX | Asynchronous JavaScript And XML |
API | Application Programmable Interface |
ARP | Address Resolution Protocol |
ASCII | American Standard Code for Information Interchange |
ASLR | Address Space Layout Randomization |
ASP | Active Server Pages |
ASN | Autonomous System Number |
BGP | Border Gateway Protocol |
Bash | Bourne-Again SHell |