Please enable JavaScript.
Coggle requires JavaScript to display documents.
Information Gathering and Vulnerability Identification (Information…
Information Gathering and Vulnerability Identification
Information Gathering
Fingerprinting
Cryptography
Packet inspection
Eavesdropping
Packet crafting
Decompilation
Enumeration
Debugging
Scanning
Open Source Intelligence Gathering
CAPEC
Full disclosure
JPCERT
CVE
NIST
CWE
CERT
Vulnerability Scan
Compliance scan
Container security
Stealth scan
Application scan
Considerations of vulnerability scanning
Full scan
Discovery scan
Credentialed vs. non-credentialed
Vulnerability Analyze
Asset categorization
Adjudication
Prioritization of vulnerabilities
Common Techniques
Rainbow tables
Deception
Dictionary attacks
Credential brute forcing
Social engineering
Proof-of-concept development
Cross-compiling code
Exploit chaining
Exploit modification
Specialized Systems
SCADA
Mobile
ICS
IoT
Embedded
Point-of-sale system
Biometrics
Application containers
RTOS