Kerberoasting
JTAG Port
Occurs when an attacker manipulates an egress sensor to unlock a door.
Egress sensor bypass
An exploit that causes the return address of a subroutine to be replaced by the address of a subroutine that is already present in a processes’ memory
Ret2libc
A client-side security misconfiguration that allows a script running within a browser to write data to a client-side cookie.
Cookie manipulation
Assigning an executable on Linux this permission allows it to run with the permissions of the file’s owner.
SUID
Assigning an executable on Linux this permission allows it to run with the permissions of the group owning the asset
SGID
Local Security Authority Subsystem Service (LSASS)
Used to remotely manage Macintosh systems over a network connection using a graphical user interface
Apple Remote Desktop (ARD)
Used to apply rotational pressure to the lock (in the unlock direction)
Tension Wrench
Used to apply rotational pressure to the lock (in the unlock direction)
Tension Wrench
RID cycling attack
- Allows IPv4 and IPv6 hosts to perform name resolution for other hosts on the same local network without a DNS server
Link-Local Multicast Name Resolution (LLMNR)
Bluesnarfing
Bluejacking
Occurs when an intruder tags along with an authorized person through a physical barrier, such as a locking door or a turnstile
Tailgating
Subject Alternative Name (SAN)
Remote Procedure Call (RPC)/Distributed Component Object Model (DCOM)
Piggybacking