The More You Learn The More You Play
What is penetration testing?
What is a vulnerability?
What is a payload?
What is an exploitation?
What are the types of penetration testing?
Various security testing methodologies
What is spoofing?
What is sniffing?
What is phishing?
What is pharming?
What is defacement?
What is vulnerability assessment?
What is cross-site scripting (XSS)?
What is SQL-injection?
What is clickjacking?
What is Man-in-the-middle attack?
What is Denial of Service(DOS)?
Things to do before penetration testing
Different types of protocols
What is authorization and authentication?
What is a cookie?
What is brute force attack?
What is a three-way handshake?
What is AJAX?
What is forensic analysis?
What is Information gathering of a target?
What is session management testing?
What is NMAP?
What are the commands in Linux?
What is Kali Linux? How to install it?
What is Service enumeration?
What is network footprinting and fingerprinting?
What is port scanning?
What is cryptography?
What’s the difference between a router, a bridge, a hub and a switch?
How to design ISMS framework?
What is DNS Hijacking?
What is Spyware?
What is adware?
What is LDAP?
What are DCO and HPA?
What’s the difference between a threat, vulnerability, and a risk?
What is stateful packet inspection?
What is WireShark?
What is NAT and how does it work?
What are salted hashes?
What’s the difference between Symmetric and Asymmetric?
What is the proper sequence of a TCP connection?
What is WEP and WPA?
What’s the difference between TCP and UDP?
What is a logic bomb virus?
What is a null session?
What does ICMP stand for and what does it do?
What the difference between windows 2000 and NT?
What is a buffer overflow?
What are the layers of the ISO model?
What is the difference between Encryption,Hasing and Encoding?
List of common ports numbers
Share to Twitter
Share to Facebook
Share to Pinterest
Post a Comment