Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "User:D1551D3N7"
From NetSec
(More terms and definitions :)) |
|||
| Line 52: | Line 52: | ||
| Bash is the linux command line utility similar to MS-DOS. | | Bash is the linux command line utility similar to MS-DOS. | ||
|- | |- | ||
| − | | | + | | [[Binary]] |
| − | | | + | | Binary is machine-readable code consisting of 0s and 1s |
|- | |- | ||
| − | | | + | | [[Biometric]] |
| − | | | + | | In the scope of security, biometrics may be used to authenticate users based on unique physical traits, such as fingerprints or retina scans. |
| + | |- | ||
| + | | [[Bitwise Math]] | ||
| + | | Bitwise math is the foundation of all binary math and most mathematic operations performed in assembly. | ||
| + | |- | ||
| + | | [[Boolean Enumeration]] | ||
| + | | Boolean enumeration is used to discover data when you can only ask the an information system yes or no questions about a value. | ||
| + | |- | ||
| + | | [[Bootloader]] | ||
| + | | A bootloader is the code that runs prior to the loading of the operating system. | ||
| + | |- | ||
| + | | [[Botnet]] | ||
| + | | A botnet is a collection of computers under the control of an entity. | ||
| + | |- | ||
| + | | [[Brute force]] | ||
| + | | A brute force attack is a highly primitive method used to obtain authentication credentials by repeatedly guessing based on set parameters such as estimated length and characters used. | ||
| + | |- | ||
| + | | [[Buffer]] | ||
| + | | A Data Buffer is a space in computer memory, where data is stored to prevent the program or resource that requires either hardware or software, to run out of data during a transfer. | ||
|} | |} | ||
Revision as of 12:59, 12 August 2012
Google Dorks
Google dorks are search terms created to look for vulnerable websites using Google. They usually use the "inurl:" "intitle:" and "intext:" search operators. They are commonly used for web applications that exploits have been found in already and to find sites with the vulnerable version of that software.
- Inurl searches for sites with the text after the colon (:) in their url. eg inurl:index.php?page= will get result websites like http://www.example.com/index.php?page=76
- Intitle searches for sites with the text after the colon in their page title. eg intitle:FuBar_V2.0 will bring up websites with FuBar_V2.0 as the page title.
- Intext searches for site containing the text after the colon within the text. eg intext:Email_Administration_Panel_V3.0 will get results with that in the page.
Glossary
A glossary is a list of terms and definitions. This is a list of terms and definitions for words used within this wiki.
| Term | Definition |
|---|---|
| AJAX | AJAX is a way to request information from web servers without the need of having to refresh the webpage. |
| API | An API is a component for a specific piece of software which enables other software to communicate with it. |
| ARP | ARP is used to resolve a network layer address to a link layer address, typically resolving a MAC address to an IP address. |
| ASCII | ASCII codes represent text and is used by computers or other devices that use text. |
| ASLR | A runtime security measure that randomizes the memory addresses that programs load data and code into. |
| ASP | ASP is a server-side interpreted language used mostly in web applications. |
| Administration | In the context of information technology, administration typically refers to system administration or network administration. |
| Application | An application is a software program in any form. |
| Assembly | Assembly is a low-level computer language. |
| Availability | Availability is the assurance that data will be accessible by those authorized to receive it when the data is needed. |
| BGP | BGP is the underlying dynamic routing protocol of the entire Internet. |
| Bash | Bash is the linux command line utility similar to MS-DOS. |
| Binary | Binary is machine-readable code consisting of 0s and 1s |
| Biometric | In the scope of security, biometrics may be used to authenticate users based on unique physical traits, such as fingerprints or retina scans. |
| Bitwise Math | Bitwise math is the foundation of all binary math and most mathematic operations performed in assembly. |
| Boolean Enumeration | Boolean enumeration is used to discover data when you can only ask the an information system yes or no questions about a value. |
| Bootloader | A bootloader is the code that runs prior to the loading of the operating system. |
| Botnet | A botnet is a collection of computers under the control of an entity. |
| Brute force | A brute force attack is a highly primitive method used to obtain authentication credentials by repeatedly guessing based on set parameters such as estimated length and characters used. |
| Buffer | A Data Buffer is a space in computer memory, where data is stored to prevent the program or resource that requires either hardware or software, to run out of data during a transfer. |
Abbreviations
An abbreviation is when a long set of words is shortened into a few letters. This is a list of abbrieviations and their long format as used in this wiki.
| Abbreviation | In Full |
|---|---|
| AJAX | Asynchronous JavaScript And XML |
| API | Application Programmable Interface |
| ARP | Address Resolution Protocol |
| ASCII | American Standard Code for Information Interchange |
| ASLR | Address Space Layout Randomization |
| ASP | Active Server Pages |
| ASN | Autonomous System Number |
| BGP | Border Gateway Protocol |
| Bash | Bourne-Again SHell |