Vulnerability Ranking
The process of evaluating and ranking vulnerabilities in terms of the potential threat they may pose to the organization.
Automated Vulnerability Scanners
OpenVAS
Nessus
Cross-Compiled Code
Exploit Chaining
The act of using multiple exploits to form a larger attack.
* Success may depend on all exploits doing their part.
* Distributed nature makes them complex and difficult to defend against.
* Some chained exploits must run consecutively.
* Some run in parallel.
Proof of Concept Development
A benign exploit developed to highlight vulnerabilities.
* Usually created by security researchers.
* Demonstrates security issue to target organization or general public.
* Technical aspects might be published in great detail.
* Or researcher may not include specifics.
− Discourages malicious actors from using this exploit in the wild.
Social Engineering
Dictionary Attacks
An attack in which a password cracking tool goes through a list of words until it either finds the password or exhausts the list.
Rainbow Table Attacks
The passwords in the wordlist have been pre-computed into their corresponding hashes, then compressed in a highly efficient manner.
Credential Brute Force Attacks
An attack in which the attacker tries many passwords in the hope of eventually guessing the right one.