Real Practice Flashcards
Light scan
nmap IP –top-ports 10 –open
SSH port
22
HTTP Port
80
Heavy Scan
nmap IP -p- -sV
How to check version of ssh remotely by netcat?
nc -nv IP 22
How to check up headers from the web server?
curl -i IP
How to get robots.txt from web server?
curl IP/robots.txt -s | html2text
vulnerability
A vulnerability is flaw in a system which COULD provide an attacker with a way into the software itself, in a
unattended manner.
It is not an open door, but a weak door, which MIGHT allow an attacker a way in.
exploit
A exploit is the way INTO the system. An attacker turns the vulnerability into a method into the system.
An exploit is the tool used to bust down the door - allowing the attacker to walk through the door.
0day
0day means the exploit has been known about for less than a day. So the software authors didn’t have any
notice/chance to create a patch, to protect from the vulnerability.
Someone has found a way to bust down a door without giving the chance to put up any protections,
stopping the attack from happening.
1day
1day means the vulnerability is publicly known about, allowing for the software authors to create a patch. However,
there isn’t yet any public exploit code.
Able to protect a door from being busted down even though there isn’t yet a known way to open the
door.
CVE
CVE is a standard, for making a list of vulnerabilities, using a certain naming format and terms. It makes it easier to
identity and reference vulnerabilities.
Able to identity what the issue is.
Feature
A “feature” is using the software how it was designed in order to perform an action
Such as allowing file uploads on a web site, to share pictures, might also allow for web shells to be
uploaded.