Translate

SecurityTesting Index


  • What is cross-site scripting (XSS)?
  • What is SQL-injection?
  • What is clickjacking?
  • What is Man-in-the-middle attack?
  • What is Denial of Service(DOS)?
  • Things to do before penetration testing
  • Different types of protocols
  • What is authorization and authentication?
  • What is a cookie?
  • What is brute force attack?
  • What is a three-way handshake?
  • What is AJAX?
  • What is forensic analysis?
  • What is Information gathering of a target?
  • What is session management testing?
  • What is NMAP?
  • What is Kali Linux? How to install it?
  • What is Service enumeration?
  • What is network footprinting and fingerprinting?
  • What is port scanning?
  • What is cryptography?
  • What’s the difference between a router, a bridge, a hub and a switch?
  • How to design ISMS framework?
  • What is DNS Hijacking?
  • What is Spyware?
  • What is adware?
  • What is LDAP?
  • What are DCO and HPA?
  • What’s the difference between a threat, vulnerability, and a risk?
  • What is stateful packet inspection?
  • What is WireShark?
  • What is NAT and how does it work?
  • What are salted hashes?
  • What’s the difference between Symmetric and Asymmetric?
  • What is the proper sequence of a TCP connection?
  • What is WEP and WPA?
  • What’s the difference between TCP and UDP?
  • What is a logic bomb virus?
  • What is a null session?
  • What does ICMP stand for and what does it do?
  • What the difference between windows 2000 and NT?
  • What is a buffer overflow?
  • What are the layers of the ISO model?
  • What is the difference between Encryption,Hasing and Encoding?
  • List of common ports numbers




No comments:

Post a Comment