Please enable JavaScript.
Coggle requires JavaScript to display documents.
System Hacking Phases & Attacks - Coggle Diagram
System Hacking Phases & Attacks
Vulnerability Analysis
Classification and assessment types
solutions and tools
nmap
nessus
burp suite
nikto
reports
scoring systems
CVSS
CVE
NVD
system hacking
gaining access
cracking passwords
dictionary
brute-force
rule-based
guessing
keylogger
hash injection
tools
John the Ripper
Hydra
crunch
vuln exploitation
priv esc
maintaining access
executing apps
hiding files
clearing logs
authentication
NTLM (Windows)
Kerberos
KDC
AS
TGS
TGT
Malware threats
APT
trojan
virus and worm
file-less malware
analysis
countermeasures
common vulnerabilities
shellshock
priv esc enabling command execution
bugs in Unix Bash shell
often exploits websites using CGI
Heartbleed
openSSL bug
resulted from improper input validation in TLS heartbeat
buffer over-read
POODLE
forcing degradation to vulnerable SSL/TLS version
MitM exploit
FREAK
factoring RSA keys
force downgrade of RSA key to weaker length
DROWN
decrypting RSA with obsolete and weakened encryption
metasploit
framework for building and performing exploits against targets
interfaces
meterpreter
payload that provides control over exploited target system
msfvenom
generates standalone payload
msfconsole
all-in-one console for all of the options available in MSF
contains most features