P Glossary Flashcards
Packer
A method of compressing software to avoid detection from anti-malware systems
Packet Crafting
- Generating a packet that has fields set in a way specified by the attacker
- May include a payload in addition to headers
Persistence
A method an attacker would use to maintain access to a system after the initial compromise
PGP
A means of managing certificates in a distributed way
Pretty Good Privacy
Phishing
A social engineering attack in which email is sent to a user to persuade them to give up info
Ping Sweep
Using ICMP echo requests to identify all responding hosts on a network
Pivoting
A post-exploitation activity used to gain access to other networks inside an organization by using a compromised system as a router
Port Scan
A technique used to identify open ports on a remote system
Pretexting
The story used by an attacker when they make social engineering attacks.
It is a plausible reason for the attacker to contact the user.
Privilege Escalation
Trying to obtain more capabilities on a system than you currently have
Process Injection
Injecting code into an existing process to take control of its execution path, hiding the running code.
Programmable Logic Controller
- A special-purpose computing device used to interface with automation systems in manufacturing.
- They can have data that can be read, or they can be sent instructions to pass on to the automation system.
Public Key Cryptography
The use of asymmetric keys to encrypt and decrypt messages between parties