Knowledge Base
Binaries, command, and processes
Common and rare binaries, commands, and processes that you may find in your daily administration activities or security assignments.
Definitions
Explanations on the jargon used in the field of Linux and information security. Time to get everything clarified!
Linux kernel settings
The Linux kernel is tuned with so-called sysctl keys. Some of these keys can influence how the kernel restricts resources to increase security defenses.
Topics
A
- ACL
- AD
- AES
- API testing
- APT
- ARP
- ARP cache poisoning
- ARP spoofing
- AWK
- AWS
- Access Control List
- Amazon S3
- Android
- AppArmor
- Authentication
- Authorization
- Automation
B
- BLE
- BPF
- Backdoor
- Backup
- BadUSB attack
- Banner
- Bash
- Bashware
- Bitbucket
- BlackArch
- Blue Coat
- BlueBorne
- Book author
- Botnet
- Browser history
- Brute force
- Buffer overflow
C
- CANBus
- CDP
- CERT
- CFP
- CLI
- CMS
- CPE
- CRIME
- CSIRT
- CSP
- CVE
- CWE
- Certificate Transparency
- Cisco
- ClamAV
- Cloaking
- CoAP
- Code review
- Collaboration
- Command injection
- Common Platform Enumeration
- Common Vulnerabilities and Exposures
- Conpot
- Container
- Credentials
- Crypto
D
- DDoS
- DFIR
- DHCP
- DLP
- DMA
- DNS
- DNS enumeration
- DNS proxy
- DROWN
- DTP
- DWARF
- Data
- Data Loss Prevention
- Data excavation
- Data exfiltration
- Data exposure
- Data extraction
- Data extrusion
- Data hiding
- Data integrity
- Data sharing
- Database audit
- Database security
- Date
- Defense
- Denial-of-Service
- Detection
- DevOps
- Developer
- Digital forensics
- Dirbuster
- Directory
- Discovery
- Disk forensics
- Disruptive
- Django
- DoS
- Docker
- Dork scanner
- Drupal
- Dynamic analysis
E
- EAP-MD5
- ELF
- ELK
- EWF
- EXT4
- Embedded devices
- Encryption
- Events
- Executables
- Exploit
- Exploit database
- Exploitation
F
G
H
I
- ICS
- IDS
- IKEv2
- IMAP
- IOC
- IP sets
- IPS
- IPSEC
- IPv6
- ISL
- ISO 27001
- Information disclosure
- Information gathering
- Information leaks
- Integrity monitoring
- Intellectual Property
- Intelligence gathering
- Intrusion Detection
- IoT
J
K
L
- LFI
- LOGJAM
- LSM
- Least Privilege
- Linux Audit Framework
- Linux Security Module
- Linux distribution
- Linux security
- Local File Inclusion
- Logging
- Lynis
M
- MD5
- MQTT
- MachO
- Malware
- Malware analysis
- Malware classification
- Malware detection
- Malware identification
- Malware scanner
- Man-in-the-Middle attack
- Management
- Manager
- Medusa
- Memory analysis
- Memory forensics
- Metadata
- Metasploit
- Microsoft Exchange
- MitM
- MongoDB
- Monitoring
- Moodle
- Multiplexer
N
- NFS
- NIDS
- NSE
- NSM
- NTLM
- Nessus
- Network
- Network analysis
- Network discovery
- Network filtering
- Network sniffing
- Nexpose
- Nikto
- NixOS
- Nmap
- NoSQL
- NodeJs
O
P
- PAM
- PCI-DSS
- PCIe
- PDF analysis
- PE
- PEM
- PHP
- POP3
- PPTX
- Packer
- Packet alteration
- Passive
- Password guessing
- Password strength
- Patch Management
- Path traversal
- Performance
- Poisoning
- Port knocking
- Port scanner
- Port scanning
- Post-exploitation
- PowerPoint
- PowerShell
- Practice tool
- Printer
- Probing
- Protocol testing
- Proxy
- Python
R
- RADIUS
- RAT
- RCE
- RDP
- REST API
- ROP
- RSA
- Redis
- Remote administration tool
- Remote code execution
- Reporting
- Risk
- Risk management
- Ruby on Rails
S
- SCADA
- SCAP
- SELinux
- SHA1
- SHA2
- SIEM
- SIP
- SMB
- SNARE
- SOC
- SOC 2
- SQL injection
- SSH
- SSH honeypot
- SSH scanner
- SSH security
- SSL
- SSL certificate
- SSL sniffing
- SSL stripping
- SSL/TLS scanner
- STP
- SaltStack
- Samba
- Scanner
- Scheduling
- Search engine
- Secret
- Secret storage
- Security automation
- Security monitoring
- Security research
- Security review
- Security scanner
- Sensor
- Service discovery
- Service emulation
- Session Initiation Protocol
- Shell
- Shodan
- SilverStripe
- Skinny
- Slowloris
- Software
- Software development
- Software repository
- Software testing
- Spam
- Spark
- Speaker
- Static code analysis
- Steganography
- Storage
- Syslog
T
- TANNER
- TLS
- Terminal
- Threat
- Threat detection
- Threat hunting
- Threat intelligence
- Tor
- Traffic analysis
- Trojan Horse
U
V
- VCS
- VLAN hopping
- VPN
- VTP
- Virus
- VoIP
- Vulnerability
- Vulnerability discovery
- Vulnerability emulation
- Vulnerable application
W
- WAF
- WHOIS
- WPS
- WannaCry
- Watch
- Watermarking
- Web
- Web Application Firewall
- Web application honeypot
- Web application security
- Web application testing
- Web browser
- Web interface
- WebDAV
- Website scanner
- WiFi
- WiFi security
- Windows Registry
- WordPress
- WordPress scanner
X
Z
A
- Access control
- Account
- Accounting
- Ad blocker
- Add-on
- Alerting
- Analysis
- Anonymity
- Anti-debugging
- Anti-tracking
- Antivirus
- Application fingerprinting
- Application firewall
- Application security
- Application testing
- Artifact
- Assessment
- Asset discovery
- Asymmetric cryptography
- Audit
- Audit trail
B
- Banner grabbing
- Best practices
- Binary
- Binary analysis
- Bind shell
- Black box
- Blog
- Bluetooth
- Botnet analysis
- Browser extension
C
- Canary
- Chroot
- Cipher
- Cleartext
- Client honeypot
- Cloud security
- Code security
- Compliance
- Conference
- Configuration audit
- Configuration management
- Container orchestration
- Cross-site scripting
- Cryptanalysis
D
- Data enrichment
- Data leak
- Data manipulation
- Data restore
- Data sanitizing
- Data science
- Data transfer
- Deauthentication attack
- Decompiler
- Decoy
- Decryption
- Dictionary attack
- Digital certificate
- Digital signature
- Domain
- Double free error
E
F
- File descriptor
- File inspection
- File permissions
- File sharing
- File system
- Fingerprinting
- Firewall
- Firewall bypass
- Firmware
- Footprinting
- Framework
- Fraud detection
G
H
I
L
M
N
O
P
- Package manager
- Packet capture
- Parser
- Password
- Password audit
- Password cracker
- Password manager
- Password vault
- Pcap
- Pentesting
- Phishing
- Policy
- Printer honeypot
- Printer sharing
- Privacy
- Privilege escalation
- Promotion
- Propagation
- Public speaking
R
- Read-only
- Reconnaissance
- Restrictive shell
- Reverse engineering
- Reverse shell
- Reverse tunnel
- Rkhunter
- Rootkit
- Rootkit scanner
- Ruggedization
S
- Seccomp
- Secure development practices
- Security audit
- Security awareness
- Security baseline
- Security design
- Security incident
- Security tools
- Shell script
- Shellbag
- Skill development
- Smart meter
- Social engineering
- Spear phishing
- Static analysis
- Subdomain
- Subdomain takeover
- Sudo
- Syscall
- System audit
- System hardening
- Systemd
T
V
- Virtual host
- Vulnerability database
- Vulnerability feed
- Vulnerability management
- Vulnerability scanner
- Vulnerability testing
W