Security Glossary
Key terms from the Security course, linked to the lesson that introduces each one.
9,769 terms.
#
- `/dev/random`
- – The "blocking" source
- Lesson 290 — Blocking vs Non-Blocking RandomnessLesson 295 — Entropy Pool Management
- `/dev/urandom`
- – The "non-blocking" source
- Lesson 290 — Blocking vs Non-Blocking RandomnessLesson 295 — Entropy Pool Management
- `data:` URIs
- both allow code execution through URL-like mechanisms that many filters overlook.
- Lesson 653 — JavaScript Protocol and Data URIsLesson 678 — JavaScript URL Schemes and Pseudo- ProtocolsLesson 1063 — SOP Edge Cases and Browser Differences
- `dd`
- (Linux command-line): `dd if=/dev/sdb of=evidence.
- Lesson 2399 — Disk Imaging and Write BlockingLesson 2761 — Firmware Binary Analysis and Unpacking
- `exp` (expiration)
- A Unix timestamp after which the token is invalid.
- Lesson 791 — JWT Expiration and RevocationLesson 793 — JWT Best Practices and Validation
- `nbf` (not before)
- A Unix timestamp before which the token shouldn't be accepted yet.
- Lesson 791 — JWT Expiration and RevocationLesson 793 — JWT Best Practices and Validation
- `Origin`
- – Identifies where the request came from (e.
- Lesson 860 — CORS Request and Response HeadersLesson 869 — Origin and Referer Validation
- `SameSite=Lax`
- (default in modern browsers)
- Lesson 867 — SameSite Cookie AttributeLesson 1059 — Cookie Scoping and SameSite Attribute
- `SameSite=None`
- Lesson 867 — SameSite Cookie AttributeLesson 1059 — Cookie Scoping and SameSite Attribute
- `SameSite=Strict`
- Lesson 867 — SameSite Cookie AttributeLesson 1059 — Cookie Scoping and SameSite Attribute
- 24-48 hours
- of compromise discovery.
- Lesson 2429 — Legal and Regulatory Reporting RequirementsLesson 2473 — Receiving and Triaging Vulnerability Reports
- 45 days
- (extendable once by 45 more days with notice).
- Lesson 2563 — Consumer Rights Under CCPALesson 2566 — CCPA Compliance Requirements
- 60 days
- , with media notification requirements for large breaches.
- Lesson 2429 — Legal and Regulatory Reporting RequirementsLesson 2588 — HIPAA Breach Notification Requirements
- 802.1X authentication
- for enterprise networks or a **Pre-Shared Key (PSK)** for home networks.
- Lesson 514 — WPA2 Architecture and 4-Way HandshakeLesson 545 — Enterprise Wi-Fi Deployment Architecture
A
- A01:2021 Broken Access Control
- (jumped from #5 to #1)
- Lesson 1201 — OWASP Top 10 2021 vs 2017: Key Changes
- A03:2021 Injection
- (dropped from #1, now includes XSS)
- Lesson 1201 — OWASP Top 10 2021 vs 2017: Key Changes
- A04:2021 Insecure Design
- (NEW—focuses on design flaws)
- Lesson 1201 — OWASP Top 10 2021 vs 2017: Key Changes
- ABAC (Attribute-Based)
- handles complex, dynamic rules (time-based access, location restrictions).
- Lesson 802 — Choosing and Implementing Access Models
- Absolute Timeout
- The maximum total lifespan of a session from creation, regardless of activity.
- Lesson 708 — Session Timeout and Idle ManagementLesson 733 — Session Timeout Configurations
- Absorbing phase
- Your input data is XORed into part of SHA-3's internal state (the "rate") in blocks, while another part (the "capacity") remains untouched for security
- Lesson 210 — SHA-3 and the Keccak Algorithm
- abuse cases
- flip the script.
- Lesson 71 — Misuse and Abuse CasesLesson 2029 — Abuse Cases and Misuse CasesLesson 2030 — Security User StoriesLesson 2070 — Security Retrospectives and Continuous Improvement
- Abuse prevention
- from malicious or careless clients
- Lesson 1016 — Quota Management and Tiered Access Control
- Abuse prevention becomes harder
- (blocking spam/harassers is more difficult)
- Lesson 2954 — Sealed Sender and Sender Anonymity
- Accelerated testing
- Run minimal validation in staging—focus on "does it break critical functions?
- Lesson 2459 — Emergency and Out-of-Band Patching
- Accelerating mean-time-to-respond (MTTR)
- from hours to minutes
- Lesson 2325 — Introduction to SOAR Platforms
- accept
- certificates even when they can't verify if those certificates have been revoked—and why that's both practical and dangerous.
- Lesson 196 — Revocation Checking Failures and Soft-FailLesson 1367 — Interpreting and Triaging SAST Results
- Accept not-yet-valid certificates
- Set the clock forward to activate certificates prematurely
- Lesson 188 — Time Validation and Clock Attacks
- Accept opt-out requests
- without requiring account creation
- Lesson 2565 — Sale and Sharing of Personal Information
- Acceptable Use Policy (AUP)
- Document what's allowed on your wireless network.
- Lesson 553 — Wireless Security Policies and ComplianceLesson 2489 — Acceptable Use Policy (AUP)
- Access
- What data or functionality becomes accessible?
- Lesson 837 — Documenting and Reporting Authorization Flaws
- Access Analyzer
- to identify external access patterns.
- Lesson 1744 — Common Cross-Account MisconfigurationsLesson 1749 — Access Analyzer and Unused Access DetectionLesson 1752 — IAM Access Advisor and Remediation Workflows
- Access Analyzer Continuous Monitoring
- Run automated scans to detect overly permissive policies, external access grants, or unused permissions that could become escalation vectors.
- Lesson 1761 — Privilege Escalation Detection and Prevention
- Access authorization/validation
- Granting and reviewing access rights
- Lesson 2585 — HIPAA Security Rule: Physical Safeguards
- Access control
- Authentication (passwords), authorization (role checks), and audit logs—combining concepts from **Least Privilege**, **Separation of Duties**, and **Complete Mediation**
- Lesson 23 — Defense-in-Depth PhilosophyLesson 59 — Information Disclosure ThreatsLesson 531 — Wireless Packet InjectionLesson 703 — What is a Session and Why Web Apps Need ThemLesson 1217 — Secure Defaults and Opt-In SecurityLesson 1507 — Protecting FIM InfrastructureLesson 1797 — Key Management for Database EncryptionLesson 1979 — ISO 27001 and Cloud Security Standards (+1 more)
- Access Control Enforcement
- You implement the **principle of least privilege** at the network level.
- Lesson 2648 — Network Segmentation Fundamentals
- Access Control Evasion
- IP-based restrictions, rate limiting, and origin checks happen at the front-end.
- Lesson 1110 — Bypassing Security Controls via Smuggling
- Access Control Failures
- Try accessing resources you shouldn't—change user IDs in URLs, escalate from user to admin by manipulating parameters, or bypass authorization checks entirely.
- Lesson 2104 — Web Application Vulnerability Hunting
- Access Control Lists (ACLs)
- are ordered sets of rules configured on routers and switches.
- Lesson 2650 — Segmentation Enforcement MechanismsLesson 2782 — MQTT Security Vulnerabilities and Hardening
- Access control mechanisms
- (badges, biometrics, PIN pads)
- Lesson 2279 — Physical Access Control Models and Zones
- Access control segmentation
- Different system components should have permission to access only the data subsets necessary for their declared purpose.
- Lesson 2900 — Purpose Limitation in System Design
- Access control systems
- Key cards, biometric readers, or PIN pads
- Lesson 2585 — HIPAA Security Rule: Physical Safeguards
- Access Controls
- Limit who can access backups.
- Lesson 311 — Key Backup and Recovery ProceduresLesson 317 — Key Backup and RecoveryLesson 319 — Key Archival and ComplianceLesson 1403 — Pipeline Security and Release GatesLesson 1869 — Cloud Logging Architecture and Service OverviewLesson 1918 — Memory Acquisition from Cloud InstancesLesson 1981 — HIPAA and PHI in the CloudLesson 2595 — Confidentiality Criterion
- Access controls replicate
- IAM policies and bucket policies should protect data consistently across all regions
- Lesson 1786 — Cross-Region Replication and Backup Strategies
- Access decision
- The system grants or denies specific actions based on authorization policies
- Lesson 1701 — Authentication vs Authorization in Cloud IAM
- Access internal databases
- Connect to a database server that only accepts connections from inside the corporate network
- Lesson 500 — Local Port Forwarding (-L)
- Access internal resources
- Request internal documentation, APIs, or admin interfaces
- Lesson 886 — Internal Network Enumeration via SSRF
- Access key management
- rotating credentials, retiring unused keys
- Lesson 1690 — Identity and Access Management Boundaries
- Access keys
- (access key ID + secret) for programmatic access via CLI/API
- Lesson 1710 — IAM Users: Creation, Authentication, and Lifecycle
- Access management
- One admin creates accounts, another assigns privileges
- Lesson 2664 — Separation of Duties
- Access Patterns
- Secrets accessed by many systems or users carry higher exposure risk and should rotate more frequently.
- Lesson 1344 — Rotation Strategies and FrequenciesLesson 1699 — Continuous Identity VerificationLesson 1890 — Behavioral Analytics and Anomaly Detection
- Access Point (AP) Locations
- By measuring signal strength (RSSI - Received Signal Strength Indicator) from multiple positions, you can triangulate where APs are physically placed.
- Lesson 355 — Wireless Network Topology Mapping
- Access policies
- – who can deploy or modify your applications
- Lesson 1687 — Shared Responsibility in PaaS
- Access Policies and RBAC
- Control who and what can access specific secrets
- Lesson 1329 — Azure Key Vault
- Access Resources
- The caller uses these temporary credentials to access resources as if they were that role.
- Lesson 1738 — AssumeRole and Trust Policies
- Access review automation
- flags when a user gains elevated privileges beyond what your HIPAA policies allow
- Lesson 2622 — Continuous Compliance Monitoring
- Access Review Completion
- tracks certification campaign effectiveness.
- Lesson 2530 — Access Control and Identity Metrics
- Access Revocation
- Immediately disable vendor credentials, API keys, VPN access, and service accounts.
- Lesson 2542 — Vendor Offboarding and Data RecoveryLesson 2969 — Secure Link Sharing and Expiration
- Access sensitive data
- located on database servers, file shares, or workstations
- Lesson 2150 — Lateral Movement Fundamentals and Objectives
- Access sensitive files
- without triggering typical application-layer logging
- Lesson 2154 — SMB and Administrative Shares
- Access the DOM
- read and modify any content on the page, including forms, hidden fields, and user data
- Lesson 634 — JavaScript Execution Contexts in XSS
- Access to multiple customers
- , multiplying the attack impact
- Lesson 2534 — Third-Party Risk Fundamentals
- access token
- Lesson 756 — OAuth 2.0 Overview and RolesLesson 772 — UserInfo Endpoint and Claims RetrievalLesson 1010 — Bearer Token Authentication for APIsLesson 1429 — Windows Access Tokens and PermissionsLesson 2122 — Token Manipulation and ImpersonationLesson 2128 — Windows Privilege Model and Security ContextLesson 2130 — Token Manipulation and Impersonation
- Access Token Received
- The server responds with an `access_token` (and optionally a `refresh_token`)
- Lesson 758 — Authorization Code Flow Deep Dive
- Access tokens
- are short-lived credentials (typically 15 minutes to 1 hour) that your application presents to protected APIs.
- Lesson 760 — OAuth 2.0 Tokens: Access and Refresh
- Access-Control-Allow-Credentials
- Set to `true` only when needed for cookies/auth
- Lesson 1041 — API Security Headers and CORS
- Access-Control-Allow-Headers
- Define acceptable request headers
- Lesson 1041 — API Security Headers and CORS
- Access-Control-Allow-Methods
- List permitted HTTP methods (GET, POST, etc.
- Lesson 1041 — API Security Headers and CORS
- Access-Control-Allow-Origin
- Specify allowed origins (`https://trusted-site.
- Lesson 1041 — API Security Headers and CORS
- access-controlled
- .
- Lesson 1312 — Common Secret Storage Anti-PatternsLesson 1490 — Log Management for Compliance
- Accessible formats
- Provide SBOMs in standardized formats (SPDX, CycloneDX) that vulnerability scanners can automatically consume.
- Lesson 1282 — SBOM Distribution and Consumption
- Accessing managed services
- (databases, storage) from on-premises networks via VPN/Direct Connect
- Lesson 1848 — Private Link Architecture and Use Cases
- Accessing system tables
- Exploiting overly permissive access to internal database tables that control authentication and authorization
- Lesson 584 — Privilege Escalation via SQL Injection
- Accidental exposure
- Lesson 59 — Information Disclosure Threats
- Accidental misuse
- Multiple checks catch mistakes before damage occurs
- Lesson 2631 — Separation of Privilege
- Accidental rogue APs
- Installed by well-meaning employees (like plugging in a personal router for better Wi-Fi coverage) without realizing the security implications
- Lesson 533 — Rogue Access Points: Definition and Threat Model
- Account Balance Manipulation
- Lesson 903 — Race Conditions in Financial Transactions
- Account balances or credits
- Lesson 916 — Session State Tampering
- Account Feature Abuse
- Lesson 825 — Horizontal Privilege Escalation Patterns
- Account for clock skew
- if a device's clock was 15 minutes fast, adjust accordingly
- Lesson 2417 — Timeline Construction Fundamentals
- Account for variability
- Use ranges and statistical measures (mean, median, standard deviation) rather than exact values.
- Lesson 1897 — Baseline Establishment for Cloud Resources
- Account Lifecycle Metrics
- track time-to-provision new accounts, dormant account counts, and time-to-deactivation after termination.
- Lesson 2530 — Access Control and Identity Metrics
- Account Lockdown
- Disable compromised user accounts immediately
- Lesson 3048 — Security Incident Auto-Response
- Account lockout
- temporarily disables an account after a threshold of failed attempts (e.
- Lesson 700 — Rate Limiting and Account Lockout Policies
- Account suspension threats
- "Urgent: Verify within 24 hours or lose access"
- Lesson 2268 — Urgency and Fear-Based Manipulation
- Account takeover
- Full access to the victim's account
- Lesson 638 — Cookie Theft and Session Hijacking via XSSLesson 850 — CSRF Impact and Real-World Examples
- Account Takeover Scenarios
- If an attacker gains physical access to your unlocked device or compromises your email for magic links, they bypass the passwordless protection.
- Lesson 755 — Passwordless Security Trade-offs
- Account-based throttling
- Slow down after several failures, but don't completely lock
- Lesson 700 — Rate Limiting and Account Lockout Policies
- accountability
- and **visibility**.
- Lesson 2064 — Security Sign-Off and Approval WorkflowsLesson 2521 — Risk Acceptance and Documentation
- Accuracy
- matters most.
- Lesson 1366 — SAST Tool Selection and ComparisonLesson 2354 — Alert Quality MetricsLesson 2553 — Data Processing Principles
- Accurate
- (collected using sound methods)
- Lesson 2379 — Evidence Collection Principles and Legal Considerations
- ACE-OAuth
- extends OAuth concepts to IoT, letting devices get authorization tokens from constrained servers using CoAP instead of HTTPS.
- Lesson 2797 — Authentication Protocols for Constrained Environments
- ACK
- Your system sends an acknowledgment back, *completing* the connection
- Lesson 339 — TCP Connect ScanningLesson 377 — TCP Stream Analysis and Session Reconstruction
- ACK Scan (`-sA`)
- doesn't determine if ports are open or closed—instead, it identifies *filtered* vs *unfiltered* ports.
- Lesson 343 — Advanced Nmap Scan Types
- Acknowledgment of policies
- Having visitors sign security agreements or NDAs
- Lesson 2285 — Visitor Management and Temporary Access
- Acknowledgment tracking
- creates accountability.
- Lesson 2495 — Policy Communication and Training Requirements
- Acoustic analysis
- Listening to electronic noise patterns
- Lesson 2755 — Physical Security Threats to IoT DevicesLesson 2769 — Hardware Security Fundamentals and Threat Model
- Act
- Respond to findings and improve.
- Lesson 32 — The Security Lifecycle: Plan-Do-Check-ActLesson 2600 — ISO 27001 Overview and Structure
- Act immediately
- Cloud logs often have default retention periods (7-90 days).
- Lesson 1917 — Cloud Log Collection for Forensics
- Action
- – `alert`, `log`, `pass`, `drop` (IPS mode)
- Lesson 458 — Snort: Architecture and Rule SyntaxLesson 795 — Access Control FundamentalsLesson 1703 — Policy Structure and Syntax FundamentalsLesson 1713 — Policy Structure: Elements, Syntax, and Evaluation LogicLesson 1951 — Function Execution Role DesignLesson 1952 — Resource-Based Policies for Functions
- Action Items
- Lesson 46 — Documenting Threat Models
- Actions
- Read, Create, Update, Delete
- Lesson 1026 — Authorization Testing AutomationLesson 1854 — WAF Rule Configuration and Custom RulesLesson 2327 — Playbook Design Fundamentals
- Actions (WHAT)
- What happens when the condition matches?
- Lesson 1804 — DLP Policy Design and Implementation
- Activation analysis
- Run training samples through a reference model and examine intermediate layer activations.
- Lesson 2824 — Detecting Poisoned Training Data
- Activation by Personalization (ABP)
- Session keys are hardcoded into the device at manufacturing.
- Lesson 2786 — LoRaWAN Security and Key Hierarchy
- Activation clustering
- Monitor internal neuron activations for backdoor-specific signatures
- Lesson 2826 — Defense Strategies Against Poisoning
- Active discovery
- Use network scanning techniques (ping sweeps, port scans) to find devices that weren't in your original inventory
- Lesson 2442 — Scan Coverage and Asset Discovery
- Active Exploitation Data
- shows which vulnerabilities attackers are currently weaponizing in the wild.
- Lesson 2449 — Threat Intelligence Integration
- Active fingerprinting
- sends crafted packets to a target and analyzes responses.
- Lesson 357 — Introduction to Service and OS Fingerprinting
- Active handshakes
- Recent handshake timestamps indicate healthy connections
- Lesson 498 — WireGuard Deployment Best Practices and Monitoring
- Active Learning Strategies
- Smart attackers use **uncertainty sampling**—querying inputs where their current substitute model is least confident, maximizing information gain per query.
- Lesson 2828 — Query-Based Model Stealing
- Active mesh sensors
- Conductive grids covering the PCB that trigger alerts if cut or punctured
- Lesson 2775 — Physical Tampering and Anti-Tamper Mechanisms
- Active monitoring
- Review last-used timestamps, rotate access keys every 90 days, audit permission changes
- Lesson 1710 — IAM Users: Creation, Authentication, and Lifecycle
- Active Network Connections
- TCP and UDP sockets show which remote IPs and ports your system was communicating with.
- Lesson 2393 — Network Artifact Recovery
- Active reconnaissance
- means directly interacting with the target to gather information.
- Lesson 337 — Active vs Passive Reconnaissance
- Active Scanner
- Sends modified requests with SQLi payloads (like `' OR 1=1--`) and observes responses for database errors, timing anomalies, or logical differences—essentially automating the Boolean- based and time-based techniques you already know.
- Lesson 591 — Burp Suite SQL Injection Scanner Extensions
- active scanning
- mode.
- Lesson 1372 — Active Scanning and Attack SimulationLesson 2212 — Burp Scanner Configuration and Crawling
- Active spidering
- Burp automatically crawls the application, following links and submitting forms to discover hidden pages.
- Lesson 2208 — Target Scope and Site Map Management
- Active surveillance
- If an attacker controls the device *during* the message lifetime, deletion doesn't help
- Lesson 2956 — Disappearing Messages and Perfect Forward Secrecy
- ActiveScriptEventConsumer
- to run PowerShell or VBScript payloads, or **CommandLineEventConsumer** to execute commands directly—all without writing malicious files to disk.
- Lesson 1541 — WMI Event Subscriptions
- Activities
- Visiting sensitive locations, attending events, lifestyle choices
- Lesson 2974 — What is Metadata and Why It Matters
- Activity Logs
- (Azure), or **Cloud Audit Logs** (GCP) to track credential usage and source IPs.
- Lesson 1735 — Credential Theft and Token Security
- Activity timeouts
- (auto-logout after inactivity)
- Lesson 703 — What is a Session and Why Web Apps Need Them
- Actual content
- File contains PHP web shell code, not image data
- Lesson 956 — Content-Type Header Validation and Mismatches
- Actual permissions received
- Only S3, EC2 (RDS and Lambda blocked by boundary)
- Lesson 1717 — Permission Boundaries: Limiting Maximum Permissions
- Adapt training
- Update scenarios based on actual tactics targeting your organization
- Lesson 2296 — Measuring and Improving Security Culture
- Add calibrated noise
- After averaging the clipped gradients, add carefully calibrated random noise (typically Gaussian) before updating weights.
- Lesson 2841 — DP-SGD and Private Training Algorithms
- Add condition keys
- to further restrict when and how permissions apply.
- Lesson 1951 — Function Execution Role Design
- Add new roots
- when CAs meet rigorous security standards
- Lesson 182 — Trust Anchors and Root Certificate Stores
- Add these adversarial examples
- to your training dataset alongside clean data
- Lesson 2847 — Adversarial Training
- Addition
- (modulo 2³²)
- Lesson 117 — ChaCha20: Modern Stream Cipher DesignLesson 251 — Homomorphic Operations and Noise Management
- Additional benefit
- WPA3 is resistant to KRACK-style replay attacks because the handshake mechanism fundamentally prevents key reinstallation.
- Lesson 517 — WPA3 Security Enhancements
- Additional code complexity
- that expands your attack surface
- Lesson 1407 — Disabling Unnecessary Services and Daemons
- Additional Hardening
- Lesson 1132 — Defending Against Host Header and DNS Attacks
- Additional network hops
- revealed by traceroute that weren't there before
- Lesson 413 — Timing and Latency Analysis
- Additional validation
- BFF can add extra security checks before proxying requests
- Lesson 1092 — Backend for Frontend (BFF) Pattern
- Address vulnerabilities found
- – Security flaws must be fixed based on risk rating, just as you learned in risk treatment strategies and remediation tracking.
- Lesson 2576 — Requirement 6: Secure Development
- Adds an ESP header
- before the encrypted data (contains Security Parameter Index and sequence number)
- Lesson 478 — Encapsulating Security Payload (ESP)
- Adds an ESP trailer
- after the encrypted data (padding and next header info)
- Lesson 478 — Encapsulating Security Payload (ESP)
- Adequacy decisions
- – countries the EU deems as having sufficient protections
- Lesson 1982 — GDPR and Data Sovereignty Requirements
- Admin Privilege Escalation
- Lesson 929 — Mass Assignment Attack Vectors
- Administrative actions
- (configuration changes, account modifications)
- Lesson 1490 — Log Management for Compliance
- Administrative enforcement
- actions by CPPA (no 30-day cure period for some violations)
- Lesson 2568 — CPRA Amendments and Enforcement
- Administrative Zone
- General office space for cleared personnel
- Lesson 2279 — Physical Access Control Models and Zones
- Admission webhooks
- are custom HTTP callbacks that let you inject your own policy logic into this checkpoint.
- Lesson 1649 — Admission Controllers and Policy Enforcement
- Adoption of new technologies
- like biometrics, AI/ML, or surveillance capabilities
- Lesson 2888 — PIA Triggers and Scoping
- Advanced
- APTs leverage sophisticated techniques combining multiple malware types you've learned— droppers establish initial access, backdoors maintain persistence, RATs enable remote control, and specialized tools exfiltrate targeted data.
- Lesson 1527 — Advanced Persistent Threats (APTs)Lesson 2682 — Zero Trust Maturity Model
- Advanced Persistent Threat (APT)
- is not just another piece of malware—it's an entire multi-stage, carefully orchestrated campaign typically conducted by well-resourced adversaries (often nation-states or organized cybercrime groups).
- Lesson 1527 — Advanced Persistent Threats (APTs)
- Advanced Techniques
- Sophisticated attackers use real-time proxying (man-in-the-middle) to capture not just credentials but also session tokens and MFA codes as they pass through.
- Lesson 2256 — Credential Harvesting Pages
- Advantage
- Harder for malware to detect or block; more trustworthy acquisition.
- Lesson 2382 — Memory Acquisition Techniques
- Advantages
- Lesson 470 — Full Tunnel vs Split TunnelLesson 1339 — Application-Level Secret RetrievalLesson 1592 — Allowlist Policy Design and Rule TypesLesson 2791 — Pre-Shared Key Authentication for IoTLesson 2920 — Local vs Global Differential Privacy
- Adversarial co-evolution
- As detectors improve, generators adapt (remember adversarial training and transferability?
- Lesson 2864 — Deepfakes: Generation Techniques and Detection Challenges
- Adversarial modeling
- Lesson 2910 — Linkage Attacks and Defenses
- Adversarial Thinking
- Train developers to ask "How could someone abuse this?
- Lesson 83 — Developer Training on Threat Modeling
- Adversarial training
- Include known poisoned examples during training to build resistance
- Lesson 2826 — Defense Strategies Against Poisoning
- Adversary's knowledge
- White-box (full model access) vs.
- Lesson 2846 — Adversarial Robustness Fundamentals
- AEAD
- (Authenticated Encryption with Associated Data) mode in modern cryptography.
- Lesson 125 — AES-GCM: Galois/Counter Mode
- AES
- in appropriate modes are better for:
- Lesson 121 — Stream Ciphers vs Block Ciphers: When to Use EachLesson 481 — IPsec Cryptographic Algorithms and Cipher Suites
- AES uses 128-bit blocks
- , which means 2^128 possible outputs.
- Lesson 92 — Block Size and Security Implications
- AES-NI
- (AES New Instructions) is Intel's (and AMD's) set of six CPU instructions that directly implement AES operations:
- Lesson 94 — Hardware Acceleration and AES-NI
- AFF (Advanced Forensic Format)
- open-source, compressed with metadata
- Lesson 2399 — Disk Imaging and Write Blocking
- Affected asset criticality
- (production server vs.
- Lesson 2361 — Incident vs Event: Defining the Threshold
- Affected Assets
- Lesson 1615 — Vulnerability Scan Reporting
- Affected product configurations
- Lesson 1613 — Vulnerability Database and CVE Mapping
- Affected Systems
- Which workflows/features are vulnerable?
- Lesson 944 — Documenting and Reporting Logic Flaws
- AFL++
- , **LibFuzzer**, or **OSS-Fuzz** directly into your build pipeline.
- Lesson 3014 — Automated Fuzzing in CI/CD
- After login
- (moving from anonymous to authenticated)
- Lesson 735 — Session Regeneration After Privilege Changes
- After new DH exchange
- New random values are mixed into the key derivation
- Lesson 2944 — Post-Compromise Security
- After privilege escalation
- (user becomes admin)
- Lesson 735 — Session Regeneration After Privilege Changes
- After successful authentication
- You must **regenerate the session ID**—destroy the old identifier and issue a completely new one.
- Lesson 707 — Session Creation and Initialization
- Against ASLR
- You need to discover actual runtime addresses.
- Lesson 2112 — Bypassing DEP, ASLR, and Stack Canaries
- Against DEP
- Since you can't execute your own shellcode, you reuse existing executable code.
- Lesson 2112 — Bypassing DEP, ASLR, and Stack Canaries
- Against mass assignment
- Lesson 1241 — Mass Assignment and ORM Injection
- Against ORM injection
- Lesson 1241 — Mass Assignment and ORM Injection
- Against Stack Canaries
- Canaries are random values placed before return addresses.
- Lesson 2112 — Bypassing DEP, ASLR, and Stack Canaries
- Age-based policies
- fail if vulnerabilities remain unpatched beyond X days
- Lesson 1641 — CI/CD Integration and Gating Policies
- Agency Authorization
- A single agency sponsors and authorizes your cloud service for their use.
- Lesson 2613 — FedRAMP Authorization Framework
- Agent management overhead
- You must deploy, update, and maintain agents across potentially thousands of endpoints.
- Lesson 2437 — Agent-Based Scanning
- Agent Resource Usage
- EDR agents are resource-intensive because they collect real-time telemetry from multiple system layers.
- Lesson 1583 — EDR Deployment and Performance Considerations
- Agent-based collection
- Software installed on sources actively forwards logs
- Lesson 2316 — Log Sources and Event Collection Methods
- Agent-based continuous monitoring
- keeps lightweight sensors on endpoints and servers, reporting back constantly without needing scheduled scans.
- Lesson 2443 — Continuous Scanning and Real-Time Detection
- Agent-based monitoring
- Java agents or .
- Lesson 1192 — Detecting and Preventing Deserialization Attacks
- Agent-based scanners
- deploy software on each endpoint for continuous, local assessment
- Lesson 1608 — Vulnerability Scanning Fundamentals
- Agent-Based vs. Network-Based
- Lesson 1608 — Vulnerability Scanning Fundamentals
- Agent/Profile
- Software or configuration profile installed on each device that communicates with the server
- Lesson 2742 — Mobile Device Management (MDM) Fundamentals
- Agentless collection
- SIEM pulls logs via APIs or network protocols (syslog, SNMP)
- Lesson 2316 — Log Sources and Event Collection Methods
- Agents
- Lightweight software on endpoints (e.
- Lesson 2315 — SIEM Architecture: Collectors, Aggregators, and Storage
- Aggregate signatures
- allow multiple signatures (potentially from different signers on different messages) to be combined into a single, compact signature.
- Lesson 239 — Aggregate Signatures and Batch Verification
- Aggregated Risk Score
- Combine individual risk assessments into a weighted overall score.
- Lesson 2532 — Risk Posture and Trending Metrics
- aggregation
- to combine multiple frames for efficiency.
- Lesson 529 — Fragmentation and Aggregation AttacksLesson 1309 — Vulnerability Aggregation and DeduplicationLesson 1402 — Security Test Results ManagementLesson 1882 — Cloud SIEM Query Languages
- Aggregation and anonymization
- (learn patterns without identifying individuals)
- Lesson 2884 — Full Functionality and Positive-Sum
- Aggregation and statistics
- – Count events, calculate averages, or group by fields to spot patterns.
- Lesson 2320 — SIEM Query Languages and Search
- Aggregation limits
- Can oversubscribe the monitoring port if mirroring too many high-traffic sources
- Lesson 463 — Network TAPs vs SPAN Ports
- Aggregation points
- become attack surfaces where adversaries might observe individual updates before they're combined
- Lesson 2843 — Federated Learning Privacy
- Aggregators
- receive raw logs from multiple collectors and normalize them into a common schema.
- Lesson 2315 — SIEM Architecture: Collectors, Aggregators, and Storage
- Aging and Time-to-Remediate
- Lesson 3038 — Vulnerability Management Dashboards
- Alert context enrichment
- is the process of automatically or manually gathering additional information to answer critical questions: Who owns that workstation?
- Lesson 2346 — Alert Context Enrichment
- Alert fatigue
- from unmanageable volumes
- Lesson 1402 — Security Test Results ManagementLesson 1896 — Cloud Alert Design Principles
- Alert on configuration drift
- from approved baselines
- Lesson 1500 — File Integrity Monitoring Fundamentals
- Alert prioritization
- categorizes alerts by severity and likelihood.
- Lesson 460 — False Positives and Alert TuningLesson 1808 — DLP Monitoring and Incident Response
- Alert Quality Metrics
- , the next step is measuring how efficiently your analysts work.
- Lesson 2355 — Analyst Efficiency Metrics
- Alert thresholds
- tuned to detect rotation-related issues quickly
- Lesson 1349 — Rotation Testing and Rollback
- Alert triage
- is the critical skill of rapidly sorting security alerts to identify genuine threats (true positives) from benign activity (false positives).
- Lesson 1578 — EDR Alert Triage and InvestigationLesson 2308 — SOC Analyst Responsibilities and Workflows
- Alert volume
- → Threat landscape severity and resource needs
- Lesson 2359 — Reporting SOC Performance to LeadershipLesson 2531 — Security Operations Center Metrics
- Alert-to-Incident Ratio
- This compares total alerts generated to actual confirmed incidents.
- Lesson 2354 — Alert Quality Metrics
- Alerting
- Triggers notifications when critical Event IDs like 4624 (logon) show anomalous patterns
- Lesson 1517 — Integrating Windows Logs with SIEM PlatformsLesson 2314 — What is a SIEM and Why Organizations Need It
- Algorithm Identifier
- – A standardized code (called an Object Identifier or OID) that specifies the cryptographic algorithm
- Lesson 173 — Public Key Information and Algorithm Identifiers
- Algorithm Selection
- Choose proven, current algorithms rather than inventing your own or using outdated ones.
- Lesson 2035 — Cryptographic Design Decisions
- Algorithm Validation
- Lesson 793 — JWT Best Practices and Validation
- Algorithmic Complexity Attacks
- Lesson 979 — Resource Exhaustion via File Processing
- Alice
- multiplies the generator point by her private key: `Public_A = private_A × G`
- Lesson 165 — ECDH (Elliptic Curve Diffie-Hellman)
- Alice → Eve
- Alice sends her public value, thinking it's going to Bob
- Lesson 156 — Man-in-the-Middle Attacks on Diffie-Hellman
- Alice sends photons
- She randomly chooses polarization states using two bases (rectilinear: —/| or diagonal: /\)
- Lesson 279 — QKD Fundamentals and BB84 Protocol
- Align containment strategies
- to avoid contradictory actions
- Lesson 2541 — Vendor Security Incident Management
- Aligned embargo dates
- so patches and advisories release together
- Lesson 2475 — Coordinated Disclosure with Vendors
- Alignment
- Supports **Separation of Duties** and **Least Privilege**
- Lesson 19 — Access Control Models: DAC, MAC, and RBAC
- Alignment requirements
- Whether the domain in the "From:" header must align with SPF/DKIM domains
- Lesson 2301 — DMARC (Domain-based Message Authentication) Policy
- all
- your traffic through the encrypted tunnel (full tunnel).
- Lesson 491 — Client Configuration and Split TunnelingLesson 508 — DNS Leak PreventionLesson 810 — Mass Assignment Authorization IssuesLesson 1123 — Defending Against Cache PoisoningLesson 1138 — Clickjacking Testing and DetectionLesson 1818 — VPC Deletion and Cleanup SecurityLesson 1994 — Multi-Cloud Compliance Management
- All data access patterns
- (direct access, search results, bulk operations)
- Lesson 838 — Access Control Defense Strategy
- All subsequent users
- receive the malicious content
- Lesson 1865 — CDN Cache Security and Cache Poisoning
- All users
- `C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup`
- Lesson 1540 — Startup Folders and Shell Extensions
- allow
- or **deny**
- Lesson 1649 — Admission Controllers and Policy EnforcementLesson 1703 — Policy Structure and Syntax FundamentalsLesson 1822 — Network ACL Structure and Subnet AssociationLesson 2705 — iOS Permissions and Privacy Controls
- Allow all printable characters
- Including spaces and emojis
- Lesson 694 — Password Complexity Requirements and Their Effectiveness
- AllowedIPs
- IP ranges this peer can send from and that will route to them
- Lesson 494 — WireGuard Peer Configuration and Key Management
- allowlist
- (whitelist) of permitted redirect targets:
- Lesson 1144 — Preventing Open RedirectsLesson 1461 — Platform Key, KEK, and Signature Databases
- Allowlist (Positive Validation)
- Define what is explicitly *allowed* and reject everything else.
- Lesson 1150 — Allowlist vs Denylist Approaches
- Allowlist-based access
- tied to verified identities
- Lesson 2972 — Recipient Verification and Authentication
- Allowlisting
- (also called whitelisting) is the mechanism that defines what *is* permitted.
- Lesson 1406 — Default Deny and AllowlistingLesson 1591 — Application Allowlisting FundamentalsLesson 2862 — LLM Output Validation and SandboxingLesson 3031 — Secret Detection in Pipelines
- Allowlisting Over Blocklisting
- Lesson 600 — NoSQL Injection Prevention and Input Validation
- allowlists
- , **avoiding shell invocation**, and **parameter validation**.
- Lesson 609 — Command Injection Prevention: Input ValidationLesson 1241 — Mass Assignment and ORM InjectionLesson 1258 — False Positive Management and Custom RulesLesson 1653 — Seccomp Profiles
- Alter the request body
- in POST requests (JSON, XML, form data)
- Lesson 2207 — Intercepting and Modifying HTTP Traffic
- Alternative approaches exist
- You can achieve business objectives through safer methods
- Lesson 2518 — Risk Avoidance Decisions
- Alternative extensions
- `.
- Lesson 947 — Web Shell Upload TechniquesLesson 950 — Bypassing Extension BlacklistsLesson 957 — File Extension Filtering and Bypass Techniques
- always
- recalculate prices based on authoritative sources (database lookups) rather than trusting any client input.
- Lesson 923 — Payment Amount TamperingLesson 2399 — Disk Imaging and Write Blocking
- Always Encrypted
- (Microsoft's term, though similar concepts exist across cloud providers) keeps data encrypted end-to-end, including during query execution.
- Lesson 1800 — Always Encrypted and Confidential Computing
- Always enforce mutual authentication
- both client and server must prove identity.
- Lesson 2789 — Securing IoT Protocol Implementations
- Always generate fresh nonces
- per response (never reuse)
- Lesson 667 — Strict CSP and Modern Best Practices
- Always use HTTPS
- when sending authentication headers.
- Lesson 1012 — API Authentication Headers and Best Practices
- Always verify magic bytes
- match the claimed type
- Lesson 956 — Content-Type Header Validation and Mismatches
- Always-on
- Even if the monitoring system crashes, traffic flows normally
- Lesson 463 — Network TAPs vs SPAN PortsLesson 468 — Site-to-Site VPNs
- Amazon Macie
- is AWS's managed service for automated storage security.
- Lesson 1791 — Storage Security Scanning and Macie
- AMCACHE
- Records application execution evidence with timestamps
- Lesson 2403 — Registry Analysis for Windows Forensics
- AMI (Amazon Machine Image)
- or VM image is the blueprint for your cloud instance.
- Lesson 1924 — Instance Launch Security and AMI Hardening
- Amplification
- Combines web cache poisoning with XSS impact
- Lesson 1120 — Cache Poisoning for XSS Delivery
- Analogy
- It's like using the same one-time pad twice.
- Lesson 99 — CTR Mode Nonce Reuse AttacksLesson 102 — GCM Implementation PitfallsLesson 135 — Deterministic IVs and Predictability AttacksLesson 157 — Ephemeral Diffie-Hellman and Forward SecrecyLesson 162 — Elliptic Curve Point OperationsLesson 168 — ECC Implementation VulnerabilitiesLesson 193 — OCSP Stapling and Must-StapleLesson 200 — Second Preimage Resistance (+95 more)
- Analysis
- Examine captured data for weak keys, plaintext info, or protocol flaws
- Lesson 561 — Bluetooth Security Testing ToolsLesson 1307 — License Compliance ScanningLesson 2334 — Threat Intelligence Fundamentals and the Intelligence Lifecycle
- Analysis Tools
- help you examine artifacts, correlate IOCs, parse logs, and reconstruct attacker TTPs.
- Lesson 2373 — IR Tool Selection and Deployment
- Analyst Productivity
- Lesson 2531 — Security Operations Center Metrics
- Analyze incidents
- When real social engineering attempts occur, dissect what worked/failed
- Lesson 2296 — Measuring and Improving Security Culture
- Analyze malware communications
- when you control the server
- Lesson 381 — Decrypting TLS Traffic with Private Keys
- Analyze task properties
- Examine command lines, file paths, and execution accounts.
- Lesson 1538 — Scheduled Tasks and Cron Jobs
- Analyzing proprietary protocols
- requires reverse engineering binary patterns, observing state machines, and correlating device actions with traffic patterns.
- Lesson 2788 — Protocol-Level Attacks and Reconnaissance
- Android
- , this is the **APK** (Android Package Kit), essentially a ZIP archive.
- Lesson 2723 — Mobile App Package Formats and StructureLesson 2735 — Mobile Cryptography Best Practices
- Android Application Sandboxing
- protections you learned about—or worse, calling exposed Java methods.
- Lesson 2717 — Android WebView Security
- Android KeyStore
- similarly provides hardware-backed key storage and cryptographic operations.
- Lesson 2734 — Secure Data Storage on Mobile
- Android Permission Model
- and **Android IPC Security** protections you studied.
- Lesson 2717 — Android WebView Security
- AndroidManifest.xml
- Declares permissions, components (activities, services, receivers), and app metadata—your security policy roadmap
- Lesson 2723 — Mobile App Package Formats and Structure
- Annex A
- a catalog of 114 security controls across 14 domains (authentication, encryption, access control, incident management, etc.
- Lesson 1979 — ISO 27001 and Cloud Security StandardsLesson 2600 — ISO 27001 Overview and StructureLesson 2606 — Statement of Applicability (SoA)
- Annotate details
- – Label nodes with IP addresses, open ports, running services
- Lesson 351 — Network Diagramming from Scan Results
- Annual Reporting
- Agencies must report security metrics to OMB and DHS, creating accountability through transparency.
- Lesson 2615 — FISMA and Federal Compliance
- Annualized Loss Expectancy (ALE)
- or compare cost of controls versus cost of loss, you need a concrete dollar figure.
- Lesson 2510 — Asset Valuation for Risk Analysis
- Anomalies
- Unusual patterns such as rare parent-child process relationships or off-hours network activity
- Lesson 1577 — Threat Hunting with EDR
- Anomalous User-Agents
- Malware often uses distinctive or outdated browser strings
- Lesson 2414 — DNS and HTTP Forensics
- anomaly detection
- flags deviations that might indicate attacks:
- Lesson 416 — Network Monitoring and BaseliningLesson 736 — Concurrent Session ManagementLesson 1966 — Insufficient Logging and MonitoringLesson 2787 — BACnet and Modbus Protocol SecurityLesson 2877 — Malicious Pre-trained Models
- Anonymity layering
- Multiple proxies must be compromised to trace you
- Lesson 2994 — Proxy Chains and SOCKS
- Anonymity networks
- route your traffic through multiple independent nodes in layers, where no single node knows both your identity and your destination.
- Lesson 2982 — Introduction to Anonymity Networks
- Anonymization
- is the irreversible process of removing or destroying all identifiable information from data so that individuals can never be re-identified, even with additional information.
- Lesson 2902 — Anonymization vs. PseudonymizationLesson 2923 — Secure Multi-Party Computation for Privacy
- Anonymization Techniques
- transform identifiable data into de-identified forms through k-anonymity, l-diversity, and other methods.
- Lesson 2922 — Overview of Privacy-Preserving Technologies
- anonymous credentials
- digital tokens proving you have authority or permission without revealing your identity.
- Lesson 233 — Blind Signatures and Anonymous CredentialsLesson 235 — Blind Signatures and Unlinkability
- Anonymous voting
- Verify your vote was counted without revealing who you are
- Lesson 235 — Blind Signatures and Unlinkability
- ANSI X.923
- Some Microsoft systems and legacy protocols
- Lesson 109 — ISO/IEC 7816-4 and Other Padding Methods
- Ansible
- uses agentless SSH connections to push configurations from a central controller.
- Lesson 1619 — Configuration Management ToolsLesson 2457 — Automated Patch Deployment Tools
- Ansible Playbooks
- YAML-based automation that connects to systems via SSH and applies configurations declaratively.
- Lesson 1418 — Automated Hardening and Remediation Scripts
- Anti-passback logic
- Prevents using the same credential twice without exiting first
- Lesson 2282 — Mantrap and Turnstile Controls
- Anti-replay protection
- Sequence numbers prevent attackers from capturing and replaying old packets
- Lesson 477 — Authentication Header (AH) Protocol
- any
- JavaScript they want in your application's context.
- Lesson 1052 — eval() and Dynamic Code Execution RisksLesson 1060 — document.domain Relaxation and RisksLesson 1213 — Complete Mediation and Access Checks
- Any authenticated user
- in the account (using `*` principals)
- Lesson 1756 — Role Assumption and Trust Policy Exploitation
- Apache
- May parse extensions right-to-left until finding a recognized handler (`shell.
- Lesson 950 — Bypassing Extension Blacklists
- Apache/Nginx mod_rewrite rules
- Filter and forward legitimate traffic
- Lesson 2223 — C2 Infrastructure Setup
- API Behavior
- Identifying abnormal sequences of API calls—like a user account that typically reads data suddenly performing mass deletions.
- Lesson 1899 — Machine Learning for Cloud Anomaly Detection
- API behavior tests
- Calling fork(), checking writable system directories
- Lesson 2728 — Root and Jailbreak Detection Bypass
- API call behavior
- A service account that normally makes 20 S3 API calls per hour suddenly makes 5,000
- Lesson 1890 — Behavioral Analytics and Anomaly Detection
- API call filtering
- Restrict which external services generated code can invoke
- Lesson 2862 — LLM Output Validation and Sandboxing
- API call logs
- provide granular detail about service interactions, including failed authentication attempts, permission changes, and resource modifications.
- Lesson 1917 — Cloud Log Collection for Forensics
- API call sequences
- Is it calling Windows API functions in combinations typical of keyloggers or credential stealers?
- Lesson 1566 — Heuristic Analysis Techniques
- API calls
- capture every action taken in your cloud environment—who created what, when, and how.
- Lesson 1870 — Log Sources and Data IngestionLesson 1895 — Custom Detection Rules and Tuning
- API calls between microservices
- may cross from authenticated Service A to Service B with different permission models
- Lesson 2639 — Trust Boundary Analysis
- API connections
- to push IDS/IPS alerts in real-time.
- Lesson 465 — Integration with SIEM and Threat IntelligenceLesson 1582 — EDR Integration with SIEM and SOAR
- API design boundaries
- Structure your APIs so purpose-specific data isn't even exposed outside its authorized context.
- Lesson 2900 — Purpose Limitation in System Design
- API discoverability
- Programmatic enumeration makes secrets easier to find
- Lesson 1321 — Environment Variables in Container and Cloud Platforms
- API documentation parsing
- Reading OpenAPI/Swagger specs if available
- Lesson 1371 — Crawling and Application Discovery
- API endpoints
- that accept XML input (REST/SOAP services)
- Lesson 627 — Testing for XXE VulnerabilitiesLesson 813 — IDOR Fundamentals and Common PatternsLesson 819 — Testing for IDOR VulnerabilitiesLesson 842 — Resource-Level Permission ChecksLesson 854 — CSRF in Modern Applications and SPAsLesson 2628 — Fail-Safe Defaults and Secure DefaultsLesson 2666 — Fail-Safe DefaultsLesson 2935 — Right to Access and Data Portability
- API gateway
- acts as a single entry point for all API requests—like a security checkpoint at an airport.
- Lesson 1024 — API Gateway Authorization BypassLesson 1858 — Rate Limiting and Traffic Shaping
- API Gateway Misconfigurations
- Lesson 1965 — Security Misconfiguration
- API Gateway/Load Balancer
- Filter obviously malicious patterns before they reach your application
- Lesson 1152 — Validation Layers and Defense in Depth
- API gateways
- All external requests pass through a single validation layer
- Lesson 29 — Security Choke PointsLesson 1944 — Serverless Data Flow and Injection RisksLesson 2651 — Application-Layer Segmentation
- API integrations
- Import features pulling data from external services
- Lesson 882 — SSRF Fundamentals and Attack Surface
- API key metadata
- Track which keys are used by which services for targeted rotation
- Lesson 1348 — API Key and Certificate Rotation
- API keys
- and tokens in URLs or headers
- Lesson 378 — HTTP Traffic Analysis and Credential ExtractionLesson 1310 — What Are Secrets and Why They Matter
- API keys should be
- Lesson 1009 — API Key Authentication: Design and Security
- API Parameter Injection
- happens when attackers abuse these behaviors to inject malicious payloads into queries, commands, or data structures that the API wasn't designed to handle.
- Lesson 995 — API Parameter Pollution and Injection
- API Parameter Pollution
- occurs when an attacker sends duplicate or conflicting parameters to confuse how the API processes them.
- Lesson 995 — API Parameter Pollution and Injection
- API Parameters
- Lesson 1177 — ReDoS Attack Vectors in Web Applications
- API pollers
- Query cloud services for security events
- Lesson 2315 — SIEM Architecture: Collectors, Aggregators, and Storage
- API request payloads
- Intercepting POST/PUT requests with tools like Burp Suite and changing JSON or form data before it reaches the server
- Lesson 923 — Payment Amount Tampering
- API security
- ensuring the IAM API endpoints themselves resist attacks
- Lesson 1690 — Identity and Access Management Boundaries
- API Server
- The central management hub that handles all API requests.
- Lesson 1662 — Kubernetes Architecture and Attack SurfaceLesson 1968 — Kubernetes Security Architecture Overview
- API tokens
- should be scoped to particular endpoints, not "full access"
- Lesson 2663 — Principle of Least PrivilegeLesson 2876 — Model Repository Security
- API-based log collectors
- that pull data directly from cloud services:
- Lesson 1879 — Cloud Log Collection and Normalization
- API-driven cloud scanning
- queries cloud provider APIs continuously to discover new resources, check their configurations, and flag misconfigurations within minutes of deployment—not days later when a scheduled scan runs.
- Lesson 2443 — Continuous Scanning and Real-Time Detection
- API-driven collection
- Custom scripts using provider SDKs to gather logs, metadata, and configurations
- Lesson 1922 — Cloud Forensics Tools and Legal Considerations
- API-Driven Evidence
- Traditional network captures are replaced by API logs (CloudTrail, VPC Flow Logs).
- Lesson 1904 — Cloud IR Fundamentals and Shared Responsibility
- API-Driven Investigation
- Use cloud provider APIs and SDKs to programmatically query resource states, retrieve logs, analyze configurations, and correlate activity across services.
- Lesson 1905 — Cloud-Native IR Tools and APIs
- API-level enforcement
- the browser itself rejects unsafe data at the source.
- Lesson 1050 — Trusted Types API
- API/Controller layer
- – Function-level access control on every endpoint
- Lesson 838 — Access Control Defense Strategy
- APIs
- Generate JSON payloads with valid syntax but unexpected type combinations
- Lesson 1390 — Structured Input Fuzzing
- APK
- (Android Package Kit), essentially a ZIP archive.
- Lesson 2723 — Mobile App Package Formats and Structure
- APK signature verification
- Compare the current APK signature against your known certificate at runtime
- Lesson 2718 — Android Root Detection and Anti-Tampering
- App Ecosystems
- Chat apps, encrypted messaging platforms, and cloud-synced data require specialized extraction tools.
- Lesson 2387 — Mobile and Endpoint Evidence Collection
- App Sandbox
- Mandatory access controls per application
- Lesson 2701 — iOS Security Architecture Overview
- App switching patterns
- Fake notifications mimicking recently-used apps
- Lesson 2700 — User Behavior and Social Engineering
- App Transport Security (ATS)
- is Apple's security feature that forces iOS apps to use secure HTTPS connections instead of plain HTTP.
- Lesson 2706 — App Transport Security (ATS)
- App-level threats
- target the application layer where users directly interact with software, making them particularly dangerous because they exploit trust relationships between users and the apps they install.
- Lesson 2694 — App-Level Threats
- AppArmor
- uses mandatory access control (MAC) through profiles.
- Lesson 1595 — Linux Application AllowlistingLesson 1654 — AppArmor and SELinux for Containers
- Appending Dots or Spaces
- Some systems strip trailing characters, so `shell.
- Lesson 957 — File Extension Filtering and Bypass Techniques
- Appends an authentication field
- to verify nothing was tampered with
- Lesson 478 — Encapsulating Security Payload (ESP)
- AppInit_DLLs
- Inject DLLs into every process (deprecated but still seen)
- Lesson 1537 — Registry-Based Persistence on Windows
- AppKey
- (root key): Pre-shared secret known only to the device and application server
- Lesson 2786 — LoRaWAN Security and Key Hierarchy
- Apple's Local Differential Privacy
- framework operates differently—noise is added on-device before data ever leaves a user's phone.
- Lesson 2921 — Practical Differential Privacy Implementation
- Application (L5-L7)
- Lesson 2780 — IoT Protocol Landscape and OSI Mapping
- Application allowlisting
- on Linux creates a trusted execution environment where only explicitly permitted programs can execute, blocking everything else by default.
- Lesson 1595 — Linux Application Allowlisting
- Application code
- and dependencies
- Lesson 1682 — Container as a Service SecurityLesson 1858 — Rate Limiting and Traffic Shaping
- Application code security
- – preventing SQL injection, XSS, and other vulnerabilities
- Lesson 1687 — Shared Responsibility in PaaS
- Application configuration
- – secure settings, connection strings, API keys
- Lesson 1687 — Shared Responsibility in PaaS
- Application control
- Only approved executables can run on the system.
- Lesson 1406 — Default Deny and Allowlisting
- Application coverage
- Percentage of services, APIs, and codebases scanned
- Lesson 3017 — Test Coverage and Effectiveness Metrics
- Application Dependencies
- Beyond the OS layer, Trivy inspects application lockfiles and manifests (`package-lock.
- Lesson 1635 — Trivy and Open Source Scanners
- Application generates token
- and builds reset link using the poisoned Host header
- Lesson 1126 — Password Reset Poisoning
- Application identity
- (service-to-service authentication)
- Lesson 2685 — Software-Defined Perimeter and Identity-Based Segmentation
- Application ignores the extension
- , serves the actual `/account/statements` page with sensitive data
- Lesson 1118 — Web Cache Deception Attacks
- Application layer
- Your data (e.
- Lesson 374 — Understanding Network Packets and Protocol LayersLesson 896 — Preventing Internal Network AccessLesson 1939 — IMDS Security Best Practices and MonitoringLesson 2654 — Defense-in- Depth: Core Concept and PhilosophyLesson 2661 — Monitoring and Response Across LayersLesson 2692 — Mobile Attack Surface Overview
- Application Layer (Layer 7)
- Limit requests per user, API key, or IP address.
- Lesson 1858 — Rate Limiting and Traffic Shaping
- Application layer firewalls
- go deeper—they understand the *application protocols* themselves, like HTTP, FTP, DNS, or SMTP.
- Lesson 419 — Application Layer Firewalls and Proxies
- Application lifecycle management
- Deploy, update, and secure apps on any platform
- Lesson 2743 — Enterprise Mobility Management (EMM) and UEM
- Application Load Balancer logs
- Verify SSL/TLS negotiation, protocol versions, cipher suites
- Lesson 1780 — Transit Encryption Monitoring and Compliance
- Application logs
- come from your own code running in containers, VMs, or serverless functions.
- Lesson 1870 — Log Sources and Data IngestionLesson 1917 — Cloud Log Collection for ForensicsLesson 2385 — Log Collection and Preservation
- Application makes the request
- The server-side code, running on the VM with IMDS access, queries the metadata service
- Lesson 1935 — SSRF Attacks Against IMDS
- Application role
- Can use keys for encrypt/decrypt operations only
- Lesson 310 — Key Access Control and Isolation
- Application SDK pattern
- Your code uses a client library to fetch secrets directly from a secret store (Vault, AWS Secrets Manager) during initialization or on-demand.
- Lesson 1335 — Runtime Secret Injection Patterns
- Application server
- receives double-encrypted data, unwraps TLS, then decrypts the application-layer encryption
- Lesson 1775 — End-to-End Encryption Architectures
- Application source code
- Configuration files, API keys, database credentials
- Lesson 620 — XXE Attack Types: File Disclosure
- Application tier
- (backend) — Your primary, authoritative validation layer
- Lesson 1152 — Validation Layers and Defense in Depth
- Application whitelisting
- Prevents unauthorized executables from running, blocking threats AV might miss
- Lesson 1573 — Antivirus Limitations and Complementary Controls
- Application-aware
- They understand HTTP, sessions, cookies, and application logic—not just open ports.
- Lesson 2438 — Web Application Vulnerability Scanners
- Application-based firewall rules
- identify programs by their executable path, digital signature, or hash, then permit or deny network access based on that identity.
- Lesson 1588 — Application-Based Firewall Rules
- Application-layer controls
- that understand service-to-service communications
- Lesson 2679 — Zero Trust Network Segmentation
- Application-layer inspection
- goes deeper—examining the actual protocols and payloads (HTTP headers, API calls, database queries) rather than just IP addresses and ports.
- Lesson 2689 — East-West Traffic Inspection and Enforcement
- Application-Layer Parsing
- decodes protocol-specific fields.
- Lesson 2411 — Protocol Analysis and Reconstruction
- Application-level
- Tag records with classification labels; middleware enforces access policies based on user clearance and data label
- Lesson 2652 — Data Segmentation and Classification
- Application-level security
- You typically cannot modify authentication flows beyond choosing from provider-supported options (SSO, MFA).
- Lesson 1679 — SaaS Security Limitations
- Applications
- Web applications, mobile apps, APIs, and desktop software.
- Lesson 2088 — Common Testing Targets and ScopeLesson 2316 — Log Sources and Event Collection Methods
- Apply appropriate controls
- Encryption, validation, authentication, rate limiting
- Lesson 2639 — Trust Boundary Analysis
- Apply filters
- to reduce noise and focus on security-relevant events
- Lesson 1870 — Log Sources and Data Ingestion
- Apply least privilege to
- Lesson 1208 — Principle of Least Privilege in Code
- Apply length limits
- at multiple layers (display, storage, processing)
- Lesson 1173 — Emoji and Combining Character Attacks
- Apply STRIDE
- to modified/new components
- Lesson 2644 — Iterating Threat Models with Architecture Changes
- Apply strongest encryption automatically
- (not offer it as an upgrade)
- Lesson 2882 — Privacy as the Default Setting
- Apply tags
- for department, owner, and purpose tracking
- Lesson 1710 — IAM Users: Creation, Authentication, and Lifecycle
- Applying changes
- Lesson 1410 — System Configuration Hardening
- Appropriate uses
- Lesson 178 — Self-Signed Certificates vs CA-Issued Certificates
- Approval
- – Escalate to appropriate authority (CISO, Risk Committee, Board)
- Lesson 2494 — Policy Development and Approval Process
- approval gates
- for destructive actions during early deployment.
- Lesson 2332 — Playbook Testing and ValidationLesson 3045 — Remediation Workflows and Orchestration
- Approval Workflow
- Security team reviews and approves/denies
- Lesson 2027 — Drift Reporting and Exception Management
- Approval Workflow Circumvention
- A document approval requires manager sign-off in step 2, but the final publication step (step 3) doesn't check if approval actually happened.
- Lesson 808 — Multi-Step Process Authorization Failures
- Approval workflows
- for high-risk changes
- Lesson 2009 — Automated Remediation WorkflowsLesson 2021 — IaC in CI/CD Pipelines: Security Gates and Approval WorkflowsLesson 2457 — Automated Patch Deployment ToolsLesson 3033 — Pipeline Security Gates and PoliciesLesson 3050 — ChatOps and Collaboration Integration
- Approver signature
- Usually a senior executive or risk committee
- Lesson 2521 — Risk Acceptance and Documentation
- AppSKey
- (Application Session Key): Also derived from `AppKey`; encrypts the actual payload
- Lesson 2786 — LoRaWAN Security and Key Hierarchy
- AR
- gument: Computationally sound (secure against realistic attackers)
- Lesson 246 — zk-STARKs and Transparent Proofs
- Arbiter PUFs
- Exploit race conditions in signal paths
- Lesson 2777 — Hardware Cloning and Counterfeit Prevention
- Arbitrary file overwrite
- (replacing system files, configuration files)
- Lesson 974 — ZIP Slip and Archive Extraction Attacks
- Arbitrary loads
- Disable ATS entirely (strongly discouraged and requires App Store justification)
- Lesson 2706 — App Transport Security (ATS)
- Architecture Probing
- By analyzing response patterns, timing, and confidence distributions, attackers infer architectural details:
- Lesson 2828 — Query-Based Model Stealing
- Architecture review
- means examining your system's design documents, diagrams, and planned structure to identify potential security weaknesses *before* developers start coding.
- Lesson 78 — Architecture Review and Threat Identification
- Archival
- Long-term encrypted backups with key management
- Lesson 2885 — End-to-End Security and Lifecycle Protection
- Archive
- expired keys securely for any legacy data decryption needs
- Lesson 316 — Key Expiration and RenewalLesson 1883 — Scalability and Cost Optimization
- Argon2
- (2015) are "memory-hard" functions.
- Lesson 139 — Modern KDFs: scrypt, Argon2, and HKDFLesson 216 — Hash Function Selection in Modern SystemsLesson 305 — Key Stretching and DerivationLesson 684 — One-Way Hash Functions for Password StorageLesson 690 — Argon2: Modern Password Hashing StandardLesson 698 — Credential Stuffing and Breach Databases
- Argon2d
- (data-dependent, faster but vulnerable to side-channel attacks), **Argon2i** (data-independent, safer against side-channels), and **Argon2id** (hybrid, recommended for password hashing).
- Lesson 690 — Argon2: Modern Password Hashing Standard
- Argon2i
- (data-independent, safer against side-channels), and **Argon2id** (hybrid, recommended for password hashing).
- Lesson 690 — Argon2: Modern Password Hashing Standard
- Argon2id
- (hybrid, recommended for password hashing).
- Lesson 690 — Argon2: Modern Password Hashing StandardLesson 693 — Password Storage Best Practices and Implementation
- ARM assembly
- the low-level instruction set used by mobile processors.
- Lesson 2729 — Native Code Analysis and ARM Assembly
- ARM TrustZone
- , and **AMD SEV** (Secure Encrypted Virtualization).
- Lesson 2927 — Trusted Execution Environments
- Arms race dynamics
- Just as adversarial examples exploit model weaknesses, deepfake creators specifically target detection methods
- Lesson 2864 — Deepfakes: Generation Techniques and Detection Challenges
- ARP cache
- (or ARP table) — a temporary memory store that speeds up future communications.
- Lesson 385 — ARP Cache Mechanics and Poisoning Principles
- ARP cache poisoning
- (or ARP spoofing) exploits this trust by injecting malicious ARP responses.
- Lesson 385 — ARP Cache Mechanics and Poisoning Principles
- ARP spoofing
- or **ARP poisoning**.
- Lesson 384 — ARP Protocol Fundamentals and Security WeaknessesLesson 392 — Man-in-the-Middle Attack FundamentalsLesson 402 — Limitations of Sniffing on Switched NetworksLesson 2243 — Bettercap for MitM and Network Attacks
- Array Injection
- Lesson 995 — API Parameter Pollution and Injection
- Article 30
- requires most organizations to maintain a **Record of Processing Activities (RoPA)**.
- Lesson 2561 — Accountability and Records of Processing
- Artifact storage
- Archive interesting inputs and crashing test cases for regression testing
- Lesson 1394 — Continuous Fuzzing and Integration
- Artifact timeline analysis
- brings all these puzzle pieces together in chronological order, revealing what the attacker did and when.
- Lesson 2420 — Artifact Timeline Analysis
- Artifacts and work products
- show processes in action: completed risk assessments, incident response reports, training completion certificates, vendor security questionnaires, or penetration test findings.
- Lesson 2618 — Audit Evidence Types and Requirements
- AS-REP Roasting
- targets user accounts with "Do not require Kerberos preauthentication" enabled.
- Lesson 2124 — Kerberoasting and AS-REP Roasting
- ASP.NET Core
- provides automatic anti-forgery token generation and validation through attributes and tag helpers that work seamlessly with forms.
- Lesson 870 — Framework-Specific CSRF Protection
- Assertion IDs
- Every SAML assertion must contain a unique ID.
- Lesson 780 — SAML Response Replay and Reuse
- Assess accessibility
- Determine which entry points are internet-facing vs.
- Lesson 73 — Attack Surface Analysis
- Assess compliance
- with security standards and privacy regulations
- Lesson 2722 — Introduction to Mobile App Reverse Engineering
- Assess context
- Does disabling USB ports align with your workflow, or will it cripple field technicians?
- Lesson 1420 — Balancing Security with Operational Requirements
- Assess data exposure
- Determine what data was accessed or downloaded.
- Lesson 1909 — Cloud Storage and Data Breach Response
- Assess impact
- Apply your asset valuation and loss magnitude estimates to determine potential damage
- Lesson 2514 — Threat Modeling Integration with Risk Analysis
- Assess necessity
- Determine if any direct identifiers are required for your analytical purpose (usually they're not)
- Lesson 2903 — Direct Identifiers and Removal
- Assess real-world impact
- – Is this actually exploitable in context?
- Lesson 2213 — Scanner Issue Analysis and Validation
- Assess scope
- Was this an isolated incident or part of a pattern?
- Lesson 1808 — DLP Monitoring and Incident Response
- asset
- , an applicable **threat** that wants to exploit it, and a **vulnerability** that enables the threat to succeed.
- Lesson 2498 — Risk Components: Assets, Threats, and VulnerabilitiesLesson 2638 — Identifying Assets and Attack Surface
- Asset and threat
- What's at risk and from what
- Lesson 2516 — Risk Analysis Documentation and Communication
- Asset coverage
- Are all critical assets (data, services) included?
- Lesson 84 — Measuring Threat Modeling Effectiveness
- Asset criticality
- A vulnerability in your payment system trumps one in a test environment
- Lesson 2076 — Severity Assessment and CVSS ScoringLesson 2160 — Vulnerability Severity and Risk RatingLesson 2322 — Alert Prioritization and Severity ScoringLesson 2450 — Asset Criticality and Business ContextLesson 2452 — Risk-Based Prioritization FrameworksLesson 2473 — Receiving and Triaging Vulnerability Reports
- Asset Discovery
- SCC automatically inventories all your GCP resources (compute instances, storage buckets, databases, networks) and tracks their security posture.
- Lesson 1889 — GCP Security Command CenterLesson 2442 — Scan Coverage and Asset Discovery
- Asset Discovery Integration
- CVM platforms automatically detect new devices joining your network—laptops, servers, IoT devices—and immediately assess them.
- Lesson 1616 — Continuous Vulnerability Monitoring
- Asset Identification
- means cataloging what you're protecting: user credentials, financial data, intellectual property, or system availability itself.
- Lesson 2636 — Architectural Threat Modeling Fundamentals
- Asset value
- What's at stake?
- Lesson 2497 — Risk Assessment Overview and ObjectivesLesson 2513 — Monte Carlo Simulation for Risk Analysis
- Assets
- are what you're defending—anything valuable that attackers want to steal, modify, or destroy.
- Lesson 41 — Assets, Entry Points, and Trust BoundariesLesson 49 — Motivations: Espionage and Intelligence GatheringLesson 2498 — Risk Components: Assets, Threats, and Vulnerabilities
- Assign
- Route to appropriate developer with context
- Lesson 1367 — Interpreting and Triaging SAST ResultsLesson 1989 — Azure Policy and Blueprints
- Assign an Elastic IP
- – This becomes the public-facing address for all outbound traffic
- Lesson 1831 — NAT Gateway Architecture
- Assign to groups
- rather than attaching policies directly
- Lesson 1710 — IAM Users: Creation, Authentication, and Lifecycle
- Assume breach
- What happens if an attacker crosses this boundary?
- Lesson 2639 — Trust Boundary AnalysisLesson 2673 — Zero Trust Principles and Philosophy
- AssumeRole Call
- A user or service in the *source* account calls the AWS STS `AssumeRole` API, requesting to take on that role.
- Lesson 1738 — AssumeRole and Trust Policies
- AssumeRole events
- Who assumed what role, from which account, when
- Lesson 1743 — Cross-Account Access Auditing
- Assumptions
- Lesson 46 — Documenting Threat Models
- Asymmetric routing problems
- happen when traffic flows in via one path but returns via another, breaking stateful Security Group tracking or hitting different NACL rules.
- Lesson 1826 — Common Misconfigurations and Troubleshooting
- Asynchronous messaging
- Perfect for devices that sleep between transmissions
- Lesson 2783 — CoAP (Constrained Application Protocol)Lesson 2981 — Post-Compromise Security and Future Secrecy
- Asynchronous support
- Members can be offline during updates and catch up later
- Lesson 2950 — Message Layer Security (MLS) for Group Messaging
- at least one
- participant honestly destroys their share of toxic waste.
- Lesson 245 — Trusted Setup and Universal Reference StringsLesson 2302 — DMARC Configuration and Alignment
- At or above threshold
- You must either apply more controls, transfer the risk (insurance), or avoid the activity entirely
- Lesson 2505 — Inherent vs Residual Risk
- At rest
- modifying files stored on disk, database records, or configuration files
- Lesson 57 — Tampering with Data ThreatsLesson 1647 — Registry Security and Access ControlLesson 1800 — Always Encrypted and Confidential ComputingLesson 2660 — Data Protection Through Multiple LayersLesson 2681 — Zero Trust Data Protection
- Atomic Operations
- perform read-modify-write as a single, indivisible action.
- Lesson 909 — Preventing Race Conditions with Locking Mechanisms
- Atomic Updates
- Rule changes can be applied atomically—all-or-nothing—reducing the risk of misconfigurations during updates.
- Lesson 443 — nftables Architecture and Improvements
- ATT&CK Navigator
- is MITRE's interactive web-based tool that turns the massive ATT&CK matrix into a visual, color- coded spreadsheet.
- Lesson 2183 — ATT&CK Navigator and VisualizationLesson 2185 — Measuring Defensive Coverage with ATT&CK
- Attach to releases
- Include your SBOM as a downloadable artifact alongside each software release.
- Lesson 1282 — SBOM Distribution and Consumption
- attachments
- , then control routing with **route tables** associated with each attachment.
- Lesson 1838 — Transit Gateway ArchitectureLesson 2406 — Email and Communication Forensics
- Attack Complexity
- Easy to exploit vs.
- Lesson 1265 — Evaluating Vulnerability Severity and ExploitabilityLesson 1637 — Interpreting Scan Results and SeverityLesson 2076 — Severity Assessment and CVSS Scoring
- Attack Delivery
- Lesson 852 — CSRF vs XSS: Key Differences
- Attack graphs
- are similar but more flexible—they show multiple interconnected paths and dependencies as a network diagram, useful when attack steps can happen in various orders or share preconditions.
- Lesson 67 — Attack Trees and Attack Graphs
- Attack motivation
- Consumer IoT attracts opportunistic criminals; IIoT attracts sophisticated adversaries including nation-states.
- Lesson 2753 — Consumer IoT vs Industrial IoT Threats
- Attack Patterns
- Sensors recognize attack signatures like deauthentication floods, WPS PIN brute-force attempts, KRACK exploits, Evil Twin setups, and abnormal packet injection.
- Lesson 548 — Wireless Intrusion Detection Systems (WIDS)Lesson 1372 — Active Scanning and Attack Simulation
- Attack scenario
- If you can inject code that sets `Object.
- Lesson 654 — DOM Clobbering and Prototype ManipulationLesson 1171 — Unicode Case Mapping and Locale Issues
- Attack Signatures
- Lesson 382 — Identifying Malicious Traffic Patterns
- Attack simulation
- Injects payloads designed to trigger vulnerabilities (SQL injection strings, XSS scripts, path traversal attempts)
- Lesson 3010 — Dynamic Application Security Testing (DAST) Deep Dive
- Attack succeeds
- in the same HTTP request-response cycle—no database or storage involved
- Lesson 630 — Reflected XSS: Immediate ExecutionLesson 890 — DNS Rebinding Attacks
- Attack Surface
- (concept #10), you're minimizing how many trust boundaries exist.
- Lesson 11 — Trust Boundaries and Implicit TrustLesson 12 — Security as a Non-Functional RequirementLesson 14 — The Parkerian Hexad: Extending the CIA TriadLesson 18 — Chinese Wall Model: Conflict of Interest PreventionLesson 31 — Security as Continuous Improvement, Not a Final StateLesson 33 — Threat Landscape Evolution and Adaptive SecurityLesson 40 — Threat Modeling in the SDLCLesson 73 — Attack Surface Analysis (+8 more)
- Attack surface grows
- Every branch, function, and edge case is a potential vulnerability waiting to be discovered
- Lesson 1216 — Economy of Mechanism and Simplicity
- Attack Surface Reduction
- means minimizing the number of exposed interfaces, services, code paths, and features that could potentially be exploited by an attacker.
- Lesson 10 — Attack Surface ReductionLesson 23 — Defense-in-Depth PhilosophyLesson 25 — Perimeter vs Internal SecurityLesson 37 — What is Threat Modeling?Lesson 38 — Why Threat Modeling MattersLesson 47 — Understanding Adversary Types and Skill LevelsLesson 49 — Motivations: Espionage and Intelligence GatheringLesson 2648 — Network Segmentation Fundamentals
- Attack surfaces
- are all the points where data enters or exits your system—APIs, user inputs, file uploads, database connections.
- Lesson 2031 — Threat Modeling in Design Phase
- Attack trees
- organize these possibilities hierarchically, like a family tree showing how smaller actions combine to achieve a bigger goal.
- Lesson 67 — Attack Trees and Attack GraphsLesson 76 — Collaborative Threat Modeling WorkshopsLesson 83 — Developer Training on Threat Modeling
- Attack Trees/Kill Chain
- Excellent for understanding specific attack scenarios and adversary progression.
- Lesson 75 — Comparing Threat Modeling Methodologies
- Attack Vector
- How an attacker could exploit this (e.
- Lesson 64 — Creating STRIDE Threat TablesLesson 1265 — Evaluating Vulnerability Severity and ExploitabilityLesson 1637 — Interpreting Scan Results and SeverityLesson 2076 — Severity Assessment and CVSS Scoring
- Attack Vector Automation
- Lesson 2245 — Social Engineering Toolkit (SET) Overview
- Attack-resistant
- Attackers can't bypass with novel encoding or variations you didn't anticipate
- Lesson 1150 — Allowlist vs Denylist Approaches
- Attacker Capabilities
- Lesson 852 — CSRF vs XSS: Key Differences
- Attacker costs
- Lesson 2634 — Work Factor and Attacker Economics
- Attacker crafts malicious page
- – Contains a form or script targeting `bank.
- Lesson 847 — CSRF Attack Anatomy and Prerequisites
- Attacker submits malicious input
- For example, posting a comment like:
- Lesson 631 — Stored XSS: Persistent Attacks
- Attacker tricks the victim
- into using that specific session ID (via malicious link, email, or social engineering)
- Lesson 714 — Session Fixation Attacks
- Attacker uses token
- on the real site to reset victim's password and hijack the account
- Lesson 1126 — Password Reset Poisoning
- Attacker's injection
- Lesson 566 — Union-Based SQL Injection Technique
- Attackers evolve constantly
- They discover new techniques, exploit zero-day vulnerabilities, and adapt to your defenses.
- Lesson 31 — Security as Continuous Improvement, Not a Final State
- Attackers innovate
- Criminals share techniques, automate attacks, and find creative workarounds for existing defenses
- Lesson 33 — Threat Landscape Evolution and Adaptive Security
- Attacking Internal Services
- Lesson 883 — SSRF Impact and Attack Scenarios
- Attempt Limiting
- Failed attempts trigger progressive delays, eventually requiring passcode entry (applying the fail- safe defaults principle).
- Lesson 2707 — Touch ID, Face ID, and Biometric Security
- Attestation
- Both can provide attestation (cryptographic proof of the authenticator's identity and characteristics), allowing websites to verify which type of security hardware was used during registration.
- Lesson 752 — Platform and Roaming AuthenticatorsLesson 1464 — Measured Boot and TPM Integration
- Attestation processes
- formalize ownership and accountability.
- Lesson 2621 — Control Attestation and Testing
- Attestations of Compliance (AOC)
- and **Responsibility Summary documents**.
- Lesson 1980 — PCI DSS in Cloud Environments
- Attribute bombing
- XML tags with thousands of attributes
- Lesson 1188 — XML and JSON Parser Vulnerabilities
- Attribute inference
- is a related technique where an attacker infers sensitive attributes (like race, health status, or income) that were *not* supposed to be learned or exposed by the model, but that correlate with the model's decision boundary.
- Lesson 2832 — Model Inversion and Attribute InferenceLesson 2836 — Privacy Risks in Machine LearningLesson 2838 — Attribute Inference and Property Inference
- Attribute Selectors as Scanners
- Lesson 677 — CSS Injection and Exfiltration
- Attribute verification
- Prove age, citizenship, or credit score meets a threshold without revealing exact values
- Lesson 2926 — Zero-Knowledge Proofs for Privacy
- Attribute-Based Access Control (ABAC)
- evaluates access requests based on *attributes* of multiple entities involved in the transaction.
- Lesson 799 — Attribute-Based Access Control (ABAC)Lesson 1742 — Session Tags and Attribute-Based Access ControlLesson 2034 — Authentication and Authorization Design
- Attribute-based policies
- Services in the production environment cannot access development secrets
- Lesson 1342 — Access Control for Runtime Secret Retrieval
- attributes
- from different sources to decide access.
- Lesson 20 — Attribute-Based Access Control (ABAC)Lesson 546 — Dynamic VLAN Assignment and Access Policies
- Attribution
- Compare technique sets to identify or distinguish threat actors
- Lesson 2180 — Using ATT&CK for Threat Intelligence
- Audience
- Executives, board members, and senior leadership
- Lesson 2335 — Types of Threat Intelligence: Strategic, Tactical, and Operational
- Audience Check
- Verify the `aud` claim contains your application's client ID.
- Lesson 774 — ID Token Validation and Security
- Audit
- authorized_keys files regularly to remove stale entries
- Lesson 1442 — SSH Key Generation and Management
- Audit and Access Tracking
- Environment variables provide no record of *who* accessed *which* secret *when*.
- Lesson 1324 — When Environment Variables Are Insufficient
- Audit and Compliance
- Every secret access is logged in AWS CloudTrail, providing a complete audit trail of who accessed which secret and when.
- Lesson 1328 — AWS Secrets Manager
- Audit and rotation
- Separate secret management systems track who accessed what and when.
- Lesson 1314 — Separation of Secrets from Code and Config
- Audit committees
- need compliance status and trend analysis.
- Lesson 2549 — Audit Reporting and Communication
- Audit configurations regularly
- against responsibility models, especially after service changes
- Lesson 1692 — Common Misunderstandings and Breach Scenarios
- Audit dependencies
- for known vulnerabilities (lodash <4.
- Lesson 1197 — Detecting Prototype Pollution Vulnerabilities
- Audit dependencies regularly
- Use tools to scan for known vulnerabilities (CVEs) in your packages
- Lesson 1945 — Third-Party Dependencies in Functions
- Audit layer usage
- through monitoring logs to detect unexpected layer attachments or version changes across your function inventory.
- Lesson 1957 — Function Layer Security
- audit logging
- (who, what, when, where)
- Lesson 58 — Repudiation ThreatsLesson 1325 — Secret Stores vs Environment VariablesLesson 1329 — Azure Key VaultLesson 1403 — Pipeline Security and Release GatesLesson 1675 — Kubernetes Audit Logging and ForensicsLesson 1981 — HIPAA and PHI in the CloudLesson 2557 — Data Protection by Design and DefaultLesson 3004 — IaC State File Security
- Audit logging continues
- You need visibility into replication events and access patterns in all regions
- Lesson 1786 — Cross-Region Replication and Backup Strategies
- Audit logging review
- monitoring who accessed what and when
- Lesson 1690 — Identity and Access Management Boundaries
- audit logs
- track exactly which application retrieved which secret
- Lesson 1339 — Application-Level Secret RetrievalLesson 2575 — Requirement 5: Anti-Malware ProtectionLesson 2664 — Separation of DutiesLesson 2878 — ML Pipeline Security and GovernanceLesson 2886 — Visibility, Transparency, and User-Centricity
- Audit mechanisms
- that regularly scan all resources across regions and accounts
- Lesson 2002 — Tag Governance and Remediation Workflows
- Audit mode
- Logs violations without blocking (testing phase)
- Lesson 1594 — Windows Defender Application Control (WDAC)Lesson 1597 — Operational Challenges and Maintenance
- Audit Only
- Logs would-be violations without blocking—perfect for testing rules before enforcement
- Lesson 1593 — Windows AppLocker
- Audit role
- Can view key metadata (creation date, usage logs) but never the key material itself
- Lesson 310 — Key Access Control and Isolation
- Audit Rules and Tools
- – Configuration for what to monitor (auditctl) and analysis utilities (ausearch, aureport)
- Lesson 1491 — Introduction to Linux Auditing Framework
- Audit trail
- shows who impersonated which service account and when
- Lesson 1725 — GCP Service Account ImpersonationLesson 1734 — Instance Profiles and Container CredentialsLesson 1784 — Presigned URLs and Temporary Access MechanismsLesson 1797 — Key Management for Database EncryptionLesson 1830 — Route Tables and Subnet AssociationsLesson 1851 — Cross-Region and Cross-Account Private ConnectivityLesson 2021 — IaC in CI/CD Pipelines: Security Gates and Approval WorkflowsLesson 2027 — Drift Reporting and Exception Management (+3 more)
- Audit trails
- (associating actions with authenticated users)
- Lesson 703 — What is a Session and Why Web Apps Need ThemLesson 1316 — Audit Trails and Secret Access LoggingLesson 1318 — Environment Variables as a Secrets Storage MechanismLesson 2900 — Purpose Limitation in System Design
- Audit transitive dependencies
- not just what you install directly
- Lesson 1967 — Using Components with Known Vulnerabilities
- Auditability
- every check is logged and traceable
- Lesson 1301 — Automated Package Verification WorkflowsLesson 1412 — Baseline Security ConfigurationLesson 1711 — IAM Groups: Organizing Users and Permission SetsLesson 2630 — Open Design and Security Through TransparencyLesson 3018 — Policy as Code Fundamentals
- Auditable identity trails
- Every action ties back to a specific identity, enabling comprehensive logging
- Lesson 1694 — Identity-Based Access Control in Cloud
- Auditing
- Actions should be traceable to specific individuals
- Lesson 1720 — Service Accounts vs User Accounts in Cloud
- Auditors/Compliance
- Evidence of controls, policy enforcement, exception tracking
- Lesson 2461 — Patch Compliance Monitoring and Reporting
- Authentic
- (provably what you claim it is)
- Lesson 2379 — Evidence Collection Principles and Legal Considerations
- Authenticate
- frames with a Message Integrity Check (MIC)
- Lesson 520 — Protected Management Frames (PMF)Lesson 1339 — Application-Level Secret Retrieval
- Authenticate as that user
- to access resources the ticket permits
- Lesson 2152 — Pass-the-Ticket and Kerberos Exploitation
- authenticated encryption
- mode that gives you both:
- Lesson 101 — GCM Mode: Authenticated Encryption StandardLesson 127 — ChaCha20-Poly1305Lesson 2942 — Signal Protocol Fundamentals
- Authenticated encryption needs
- GCM and CCM modes provide built-in authentication
- Lesson 121 — Stream Ciphers vs Block Ciphers: When to Use Each
- Authenticated key exchange
- Combining key exchange with identity verification to prevent man-in-the-middle attacks
- Lesson 2941 — Key Exchange in E2EE Systems
- Authenticated scanners
- log into systems with credentials, gaining deep visibility into installed software, configurations, and missing patches—like having a key to inspect every room in a building
- Lesson 1608 — Vulnerability Scanning Fundamentals
- Authenticated scanning
- is like getting a key: you walk inside and inspect the actual contents, configurations, and installed software.
- Lesson 2436 — Authenticated Scanning and Credentialed ChecksLesson 2437 — Agent-Based Scanning
- Authenticated scans
- use valid credentials to log into systems and perform deep inspection.
- Lesson 2434 — Vulnerability Scanning FundamentalsLesson 2441 — False Positives and Validation
- Authenticated sessions
- They maintain login states to test protected areas (similar to credentialed network scanning, but at the application layer).
- Lesson 2438 — Web Application Vulnerability Scanners
- Authenticated vs. Unauthenticated Scanners
- Lesson 1608 — Vulnerability Scanning Fundamentals
- Authenticates
- service identities with certificates
- Lesson 1971 — Network Policies and Service Mesh Security
- Authenticates and authorizes per-request
- , not per-session
- Lesson 2686 — BeyondCorp Model and Zero Trust Access
- Authentication
- Is the identity verified?
- Lesson 63 — STRIDE per Interaction AnalysisLesson 122 — Why Authentication Matters in EncryptionLesson 225 — Digital Signature Fundamentals and Use CasesLesson 466 — VPN Fundamentals and PurposeLesson 474 — IPsec Architecture and Protocol SuiteLesson 477 — Authentication Header (AH) ProtocolLesson 478 — Encapsulating Security Payload (ESP)Lesson 745 — FIDO2 and WebAuthn (+14 more)
- Authentication (integrity)
- Lesson 481 — IPsec Cryptographic Algorithms and Cipher Suites
- Authentication & Session Flaws
- Attempt password resets without proper verification, test for weak session tokens, check if sessions expire properly, and look for predictable credential recovery mechanisms.
- Lesson 2104 — Web Application Vulnerability Hunting
- Authentication and authorization
- Each application/user must prove identity and is granted only necessary secrets
- Lesson 1325 — Secret Stores vs Environment VariablesLesson 1687 — Shared Responsibility in PaaS
- Authentication and authorization points
- are they placed correctly?
- Lesson 78 — Architecture Review and Threat Identification
- Authentication bypass
- Testing login forms with operator injection
- Lesson 592 — NoSQLMap and NoSQL Injection AutomationLesson 1110 — Bypassing Security Controls via SmugglingLesson 1171 — Unicode Case Mapping and Locale IssuesLesson 1196 — Server-Side Prototype Pollution Impact
- Authentication Bypasses
- happen when conditional logic around login checks can be circumvented.
- Lesson 2039 — Common Vulnerability Patterns in CodeLesson 2106 — Chaining Vulnerabilities for ImpactLesson 2729 — Native Code Analysis and ARM Assembly
- Authentication Configuration
- involves providing your DAST tool with valid login credentials—typically a username and password, but potentially API keys, tokens, or multi-step authentication flows.
- Lesson 1373 — Authentication and Session Handling in DAST
- Authentication confusion
- – The scanner loses session state and flags logout pages as access control issues
- Lesson 1375 — False Positive Management in DAST
- Authentication error rate spikes
- that indicate apps using stale secrets
- Lesson 1349 — Rotation Testing and Rollback
- authentication events
- and session activity
- Lesson 58 — Repudiation ThreatsLesson 1490 — Log Management for Compliance
- Authentication failures
- Wrong credentials or certificate issues
- Lesson 492 — Troubleshooting and Monitoring OpenVPN ConnectionsLesson 1206 — Authentication vs Identification: Terminology Changes
- Authentication gateways
- All users must log in through one identity management system
- Lesson 29 — Security Choke Points
- Authentication happens first
- A user presents credentials (password + MFA token) to the cloud provider
- Lesson 1701 — Authentication vs Authorization in Cloud IAMLesson 2685 — Software-Defined Perimeter and Identity-Based Segmentation
- Authentication happens per-request
- Cloud APIs verify identity tokens on every call
- Lesson 1694 — Identity-Based Access Control in Cloud
- Authentication Header (AH)
- is one of two core IPsec protocols (alongside ESP, which you'll learn later).
- Lesson 477 — Authentication Header (AH) Protocol
- Authentication patterns
- (login times, source locations, MFA usage)
- Lesson 1897 — Baseline Establishment for Cloud Resources
- Authentication resilience
- Does the AP properly validate client credentials under unusual conditions?
- Lesson 531 — Wireless Packet Injection
- Authentication Server
- The backend system (typically a RADIUS server) that verifies credentials and makes the trust decision.
- Lesson 540 — 802.1X Authentication Framework
- Authentication Success Rates
- monitor login attempts versus failures.
- Lesson 2530 — Access Control and Identity Metrics
- Authentication summary
- Lesson 1496 — Searching and Analyzing Audit Logs
- Authentication tag
- A short value (typically 128 bits) that proves the ciphertext hasn't been modified
- Lesson 101 — GCM Mode: Authenticated Encryption Standard
- Authentication testing
- Brute-force or test default credentials
- Lesson 2197 — Auxiliary Modules and Scanning
- Authentication tokens
- Session cookies sent in 0-RTT can be replayed
- Lesson 1103 — HTTP/3 0-RTT Replay Attacks
- Authentication without credentials
- Prove you have the right password without sending it
- Lesson 2926 — Zero-Knowledge Proofs for Privacy
- Authentication/session flaws
- (tests actual login mechanisms)
- Lesson 3010 — Dynamic Application Security Testing (DAST) Deep Dive
- Authenticator
- The network access device (usually your wireless access point or network switch).
- Lesson 540 — 802.1X Authentication Framework
- Authenticity
- , and **Utility**.
- Lesson 14 — The Parkerian Hexad: Extending the CIA TriadLesson 130 — AEAD Security Properties and LimitationsLesson 217 — HMAC Construction and Security Properties
- Authority and urgency
- (building on prior lessons about manipulation)
- Lesson 2269 — Vishing and Phone-Based Pretexting
- Authority chain validation
- Contact the supposed authority figure through known channels, not the contact info provided by the caller
- Lesson 2270 — Detecting and Resisting Manipulation Attempts
- Authority impersonation
- Pretending to be executives, law enforcement, or technical support
- Lesson 2259 — Smishing and Vishing
- Authority pretexting
- Wearing uniforms (delivery, maintenance, security) to gain trust
- Lesson 2272 — Tailgating and Piggybacking Attacks
- Authority without validation
- Claims of being from IT, executives, or vendors without proper credentials
- Lesson 2270 — Detecting and Resisting Manipulation Attempts
- Authority-Based Manipulation
- relies on the psychological principle that employees rarely question direct requests from executives.
- Lesson 2255 — Whaling and Executive Impersonation
- Authorization
- Is privilege checked at both ends?
- Lesson 63 — STRIDE per Interaction AnalysisLesson 825 — Horizontal Privilege Escalation PatternsLesson 1006 — Mutation Security and Side EffectsLesson 1701 — Authentication vs Authorization in Cloud IAMLesson 2034 — Authentication and Authorization DesignLesson 2594 — Processing Integrity CriterionLesson 2665 — Complete Mediation
- Authorization bypass
- Path checks like `/Admin/` vs `/admin/` behave unexpectedly
- Lesson 1171 — Unicode Case Mapping and Locale IssuesLesson 1193 — Prototype Pollution Fundamentals
- Authorization checks
- – Does this user have permission to access this specific file?
- Lesson 988 — Secure File Serving and Access Control
- Authorization Code Flow
- is OAuth 2.
- Lesson 758 — Authorization Code Flow Deep DiveLesson 771 — OIDC Authentication FlowsLesson 1011 — OAuth 2.0 Flows for API Access
- Authorization Code Grant
- is the gold standard for web applications with server backends.
- Lesson 757 — OAuth 2.0 Grant Types
- Authorization Code Issued
- The server redirects back to your `redirect_uri` with a short-lived authorization code (valid ~10 minutes)
- Lesson 758 — Authorization Code Flow Deep Dive
- Authorization Code Receipt
- Server returns the authorization code as usual
- Lesson 1089 — Authorization Code Flow with PKCE for SPAs
- Authorization determines visibility
- (users can't even see resources they're not entitled to)
- Lesson 2685 — Software-Defined Perimeter and Identity-Based Segmentation
- Authorization flaws
- Accessing other users' resources (BOLA/IDOR)
- Lesson 3013 — API Security Testing Automation
- Authorization Flow
- The authorization server stores the code challenge alongside the authorization code.
- Lesson 759 — PKCE (Proof Key for Code Exchange)
- Authorization follows
- Once authenticated, IAM checks policies attached to that identity to determine resource access
- Lesson 1701 — Authentication vs Authorization in Cloud IAM
- authorization framework
- (not authentication) that lets you grant a third-party application limited access to your resources without sharing your password.
- Lesson 756 — OAuth 2.0 Overview and RolesLesson 769 — OpenID Connect Overview and Relationship to OAuth 2.0
- Authorization header
- Standard and secure (`Authorization: Bearer <token>`)
- Lesson 1010 — Bearer Token Authentication for APIs
- Authorization headers
- using Basic Authentication (Base64-encoded credentials)
- Lesson 378 — HTTP Traffic Analysis and Credential Extraction
- Authorization is explicit
- Access is granted through IAM policies, not firewall rules
- Lesson 1694 — Identity-Based Access Control in Cloud
- Authorization matters
- Only reverse engineer apps you own, have explicit permission to analyze, or where legitimate security research applies
- Lesson 2722 — Introduction to Mobile App Reverse Engineering
- Authorization Request
- Your app redirects the user to the authorization server with a `redirect_uri` and optional PKCE `code_challenge`
- Lesson 758 — Authorization Code Flow Deep DiveLesson 1089 — Authorization Code Flow with PKCE for SPAs
- Authorized actions
- Can you perform denial-of-service tests?
- Lesson 2088 — Common Testing Targets and Scope
- Auto-escaping templates
- automatically encode outputs based on context:
- Lesson 1224 — Template Auto-Escaping vs Manual Encoding
- Auto-scaling policies
- Pre-configure resource scaling thresholds
- Lesson 1861 — DDoS Response and Incident Management
- Autocrypt
- is a specification for automating OpenPGP key exchange through regular email headers.
- Lesson 2966 — Modern Alternatives: Autocrypt and Delta Chat
- Autoencoders
- compress faces into latent representations, then decode them onto different targets.
- Lesson 2864 — Deepfakes: Generation Techniques and Detection Challenges
- Autofill and Form Data
- Lesson 2405 — Browser Forensics and Web Artifacts
- Automatable
- – Can attackers exploit this at scale without human intervention?
- Lesson 2448 — SSVC (Stakeholder-Specific Vulnerability Categorization)
- Automate
- initial response (isolation, blocking) when thresholds breach
- Lesson 2661 — Monitoring and Response Across Layers
- Automate dependency updates
- with testing to catch breaking changes
- Lesson 1967 — Using Components with Known Vulnerabilities
- Automate generation
- Integrate SBOM generation into your CI/CD pipeline so every build automatically produces an up-to-date SBOM.
- Lesson 1282 — SBOM Distribution and Consumption
- Automated access control testing
- lets tools systematically check whether authorization rules are enforced correctly across your entire application surface.
- Lesson 833 — Automated Access Control Testing
- Automated alerting
- Trigger on specific field values (e.
- Lesson 1472 — Structured vs Unstructured Logging
- Automated approval
- Policy engine evaluates request against rules and context
- Lesson 2677 — Least Privilege Access in Zero Trust
- Automated bumping
- Follows your configured rules (e.
- Lesson 1303 — GitHub Dependency Scanning and Dependabot
- Automated checks
- Performance benchmarks, adversarial robustness tests, fairness metrics
- Lesson 2878 — ML Pipeline Security and Governance
- Automated Cloning
- Tools like SET (Social Engineering Toolkit) can automatically scrape and clone target websites with a single command, making pixel-perfect copies in seconds.
- Lesson 2256 — Credential Harvesting Pages
- Automated Compliance Checks
- scan your infrastructure continuously.
- Lesson 1992 — Continuous Compliance MonitoringLesson 2653 — Testing and Validating Segmentation
- Automated conflict detection
- Flagging when a single user tries to execute multiple phases
- Lesson 2664 — Separation of Duties
- Automated Enrichment
- Configure your SOAR platform to automatically query your TIP when investigating alerts, pulling in context about threat actors, campaigns, and recommended response actions.
- Lesson 2342 — Operationalizing Threat Intelligence
- Automated Enumeration
- Once authenticated, CME enumerates shares, sessions, logged-in users, local admin group members, and domain information—no manual interaction needed.
- Lesson 2239 — CrackMapExec for Network Enumeration
- Automated evidence collection
- means deploying tools, scripts, and integrations that continuously capture compliance artifacts from your systems without human intervention.
- Lesson 2620 — Automated Evidence CollectionLesson 2622 — Continuous Compliance Monitoring
- Automated hardening scripts
- are pre-written configuration management tools that read security baseline requirements and apply them systematically.
- Lesson 1418 — Automated Hardening and Remediation Scripts
- Automated key replication
- Some providers support automatic key material sharing across regions for seamless backup copying
- Lesson 1798 — Encrypted Backups and Snapshots
- Automated package verification workflows
- integrate these security checks directly into your continuous integration and deployment pipelines, making verification a mandatory gate rather than an optional step.
- Lesson 1301 — Automated Package Verification Workflows
- Automated policy enforcement
- Apply security rules based on tags (`Environment=Production` triggers stricter network policies)
- Lesson 1996 — Cloud Resource Tagging Strategy and Standards
- Automated policy generation
- based on observed traffic patterns and least-privilege principles
- Lesson 2679 — Zero Trust Network Segmentation
- Automated pull requests
- when updates fix vulnerabilities (like Dependabot)
- Lesson 1399 — Dependency and SCA Scanning in Pipelines
- Automated remediation
- to apply default tags or notify owners
- Lesson 1997 — Mandatory Tags for Security and ComplianceLesson 2002 — Tag Governance and Remediation WorkflowsLesson 2802 — IoT Botnet Detection and Mitigation
- Automated renewal
- TLS certificates should auto-renew 30+ days before expiration
- Lesson 1348 — API Key and Certificate Rotation
- Automated response
- shrinks containment windows from hours to seconds
- Lesson 1582 — EDR Integration with SIEM and SOARLesson 1761 — Privilege Escalation Detection and PreventionLesson 1894 — Threat Intelligence Integration
- Automated Risk Assessment Tools
- Software that calculates k-anonymity levels, identifies quasi-identifier combinations, and flags high-risk records.
- Lesson 2911 — Measuring and Testing Anonymization Effectiveness
- Automated rollback scripts
- Pre-tested removal commands
- Lesson 1605 — Patch Rollback and Emergency Procedures
- Automated scanners
- Tools that probe endpoints and flag HTTP/plaintext services
- Lesson 1780 — Transit Encryption Monitoring and ComplianceLesson 2098 — Manual vs Automated Discovery Approaches
- Automated scanning
- Import SBOMs into your SCA tools or vulnerability management platforms to automatically monitor for newly disclosed CVEs affecting your dependencies.
- Lesson 1282 — SBOM Distribution and ConsumptionLesson 1308 — Integrating Scanning into CI/CD PipelinesLesson 1621 — Compliance Scanning and ValidationLesson 1802 — Data Discovery and InventoryLesson 2098 — Manual vs Automated Discovery Approaches
- Automated scanning in pipelines
- as mandatory quality gates
- Lesson 2013 — Secrets in IaC: Detection and Prevention
- Automated Scheduling
- Configure scanners to run daily, weekly, or even hourly against critical assets.
- Lesson 1616 — Continuous Vulnerability Monitoring
- Automated security scanning tools
- solve this by continuously analyzing storage contents and configurations to identify risks you might not even know exist.
- Lesson 1791 — Storage Security Scanning and Macie
- Automated snapshots
- Schedule regular snapshots of critical volumes (you learned this in encrypted storage lessons)
- Lesson 1931 — Instance Termination Protection and Data Persistence
- Automated Technical Controls
- provide continuous verification.
- Lesson 2496 — Policy Compliance Monitoring and Enforcement
- Automated testing
- Run scripts or tools to validate technical controls at scale
- Lesson 2547 — Control Testing Methodologies
- Automated ticket creation
- uses configurable rules: only create tickets for critical/high findings, deduplicate similar issues, assign to the right team based on asset ownership.
- Lesson 3049 — Integration with Ticketing and ITSM
- Automated tools
- Scanner software that connects to many services and records all banners
- Lesson 358 — Banner Grabbing FundamentalsLesson 2138 — Windows Privilege Escalation Enumeration and ToolsLesson 2619 — Evidence Collection and Preservation
- Automated tools excel at
- Lesson 942 — Manual vs Automated Business Logic Testing
- Automated triage
- to filter noise and escalate genuine risks
- Lesson 1808 — DLP Monitoring and Incident Response
- Automated triage rules
- that flag duplicates or out-of-scope domains
- Lesson 2486 — Scaling and Optimizing Programs
- Automated Workflows
- Integration enables automatic response playbooks.
- Lesson 1995 — Compliance Tool Integration with SIEM
- Automatic deletion
- ensures compliance without human intervention.
- Lesson 2897 — Temporal Data Minimization
- Automatic escalation triggers
- Ransomware detection, data exfiltration >10GB, C-level credential compromise
- Lesson 2427 — Incident Status Updates and Escalation
- Automatic expiration
- limits blast radius of compromised tokens
- Lesson 1725 — GCP Service Account Impersonation
- Automatic failover
- detects when the primary secret store becomes unresponsive and seamlessly switches to a standby replica without manual intervention.
- Lesson 1333 — High Availability and Disaster Recovery
- Automatic loading
- of PowerShell scripts and executables
- Lesson 2244 — Evil-WinRM and PowerShell Remoting Attacks
- Automatic parsing
- Frameworks convert JSON directly into objects without validation
- Lesson 596 — JSON Injection and Type Confusion
- Automatic public IP assignment
- – Instances may receive public IPs without explicit configuration
- Lesson 1813 — Default VPC Security Considerations
- Automatic Replication
- Secrets are automatically replicated across multiple locations within a region or globally, depending on your replication policy.
- Lesson 1330 — Google Cloud Secret Manager
- Automatic Rotation
- One of Secrets Manager's most powerful features is built-in secret rotation.
- Lesson 1328 — AWS Secrets ManagerLesson 1734 — Instance Profiles and Container CredentialsLesson 1797 — Key Management for Database Encryption
- automatically
- escapes output based on context.
- Lesson 672 — Template Auto-EscapingLesson 2575 — Requirement 5: Anti-Malware Protection
- Automatically update allowlist policies
- to include these signed artifacts
- Lesson 1598 — Allowlisting in DevOps and CI/CD
- Automatically updated
- when vulnerabilities are discovered
- Lesson 870 — Framework-Specific CSRF Protection
- Automation
- Use specialized tools (like regex analyzers you learned about) to generate worst-case inputs automatically rather than guessing.
- Lesson 1182 — Testing for ReDoS VulnerabilitiesLesson 2056 — Security as Code FundamentalsLesson 2261 — Phishing Infrastructure and AutomationLesson 2313 — SOC Maturity ModelsLesson 2325 — Introduction to SOAR Platforms
- Automation and Scripting
- Chain multiple Volatility plugins together using shell scripts or automation frameworks.
- Lesson 2397 — Memory Analysis with Volatility Framework
- Automation Tools
- Lesson 893 — Testing for SSRF Vulnerabilities
- Autonomous System Numbers (ASNs)
- unique identifiers assigned to networks that manage their own routing policies.
- Lesson 336 — ASN and IP Range Discovery via Public Sources
- Autorun Exploitation
- was historically devastating.
- Lesson 1530 — Removable Media and USB-Based Attacks
- Autorun payloads
- Scripts that execute automatically when mounted
- Lesson 2251 — QR Code and USB Drop Attack Tools
- Autoruns
- (from Sysinternals) enumerate all auto-start locations, making suspicious entries visible.
- Lesson 1540 — Startup Folders and Shell ExtensionsLesson 1545 — Detecting and Removing Persistence Mechanisms
- Auxiliary
- Scanners, fuzzers, and reconnaissance tools
- Lesson 2193 — Metasploit Architecture and Components
- auxiliary modules
- are Metasploit's non-exploitation workhorses.
- Lesson 2197 — Auxiliary Modules and ScanningLesson 2204 — Custom Module Development
- AV scan
- Pass the file to an antivirus engine (like ClamAV, VirusTotal API, or cloud scanning services)
- Lesson 961 — Virus Scanning and Malware Detection Integration
- Availability
- Restricted deletion rights = systems stay running
- Lesson 2 — Least Privilege PrincipleLesson 3 — Defense in DepthLesson 13 — CIA Triad: Confidentiality, Integrity, AvailabilityLesson 21 — Security Frameworks: NIST Cybersecurity FrameworkLesson 23 — Defense-in-Depth PhilosophyLesson 50 — Motivations: Hacktivism and Ideological AttacksLesson 51 — Motivations: Disruption and Destructive AttacksLesson 60 — Denial of Service Threats (+6 more)
- Availability attacks
- Degrade the model's general performance by corrupting enough training data that it becomes unreliable.
- Lesson 2818 — Data Poisoning Attack Fundamentals
- Availability zone placement
- – Deploy one NAT gateway per AZ for high availability
- Lesson 1831 — NAT Gateway Architecture
- Available exploits
- Are active attacks targeting this library?
- Lesson 1267 — Unmaintained Dependencies and End-of-Life Libraries
- Avatar²
- Orchestrates hybrid setups mixing emulation with real hardware
- Lesson 2767 — Firmware Emulation and Dynamic Analysis
- Average queries
- Sensitivity depends on bounds and dataset size—often requires more complex analysis or query restructuring
- Lesson 2917 — Sensitivity and Query Analysis
- Avoid `unsafe-inline` and `unsafe-eval`
- strict CSP makes them unnecessary
- Lesson 667 — Strict CSP and Modern Best Practices
- Avoid blind spots
- by overlapping camera fields-of-view.
- Lesson 2284 — Video Surveillance and Monitoring
- Avoid broad port ranges
- Instead of allowing `0-65535`, specify exact ports:
- Lesson 1821 — Security Group Rule Design Best Practices
- Avoid dangerous wildcards
- Configurations like `/bin/*` seem convenient but let users run any binary in that directory, including shells or editors that can spawn root shells.
- Lesson 1426 — Sudo Configuration and Security
- Avoid exposing
- Lesson 1042 — API Documentation and Security
- Avoid inline event handlers
- Use `addEventListener()` instead of `onclick=".
- Lesson 1222 — JavaScript Context Encoding Challenges
- Avoid mixing identities
- keep separate Tor Browser profiles for different activities
- Lesson 2991 — Operational Security for Tor Users
- Avoid serialization
- Never let secrets get serialized into logs, error messages, or debug output where they might persist unexpectedly.
- Lesson 1341 — Secret Caching and Memory Management
- Avoid technical jargon
- Replace "privilege escalation via misconfigured sudo binary" with "attackers could gain complete system control through misconfigured administrator tools.
- Lesson 2161 — Executive Summary Writing
- Awareness
- It educates developers about the most prevalent security risks
- Lesson 1200 — History and Purpose of the OWASP Top 10
- Awareness campaigns
- keep security top-of-mind between formal training cycles: posters, newsletters, simulated phishing exercises, and "lunch and learn" sessions build culture.
- Lesson 2495 — Policy Communication and Training Requirements
- AWS
- `http://169.
- Lesson 885 — Cloud Metadata Service AttacksLesson 1745 — Multi-Factor Authentication in Cloud IAM
- AWS Access Key
- Lesson 1253 — Secret Patterns and Regular Expressions
- AWS Athena
- or **Google BigQuery** let you query logs using familiar SQL syntax.
- Lesson 1882 — Cloud SIEM Query Languages
- AWS Auth
- allows EC2 instances or Lambda functions to authenticate using AWS IAM credentials or instance identity documents.
- Lesson 1327 — Vault Authentication Methods
- AWS Certificate Manager (ACM)
- provisions, deploys, and renews certificates automatically for services like load balancers, CloudFront distributions, and API Gateway.
- Lesson 1774 — Certificate Management in Cloud Environments
- AWS CloudFormation
- AWS-native, JSON/YAML templates
- Lesson 2012 — Infrastructure as Code Fundamentals and Security Implications
- AWS CloudWatch Logs
- collects logs from EC2 instances, Lambda functions, VPC Flow Logs, CloudTrail API calls, and custom applications.
- Lesson 1869 — Cloud Logging Architecture and Service Overview
- AWS Config
- , **Azure Policy**, and **GCP Organization Policy Service** can all trigger OPA evaluations.
- Lesson 1991 — Compliance as Code with Open Policy AgentLesson 2004 — Core CSPM CapabilitiesLesson 2023 — Detecting Configuration Drift with Cloud-Native Tools
- AWS ECR
- Set scan-on-push via registry configuration; supports both basic and enhanced scanning
- Lesson 1636 — Registry-Integrated Scanning
- AWS IAM Access Analyzer
- to automatically detect resources shared with external entities and flag unusual or overly permissive grants.
- Lesson 1751 — Cross-Account and External Access Analysis
- AWS Lambda functions
- trigger on CloudWatch Events/EventBridge
- Lesson 1911 — Cloud IR Playbooks and Automation
- AWS Macie
- continuously monitors S3 buckets, using machine learning to identify personally identifiable information (PII), financial data, and intellectual property.
- Lesson 1803 — Cloud-Native Data Classification Tools
- AWS PrivateLink
- Exposes services via private endpoints in your VPC
- Lesson 1779 — VPN and Private Connectivity Encryption
- AWS STS
- allows 15 minutes to 12 hours (or up to 36 hours for role chaining in some configurations)
- Lesson 1731 — Session Duration and Token Lifecycle
- AWS-managed
- Standard patterns, quick setup, automatic updates
- Lesson 1714 — Managed Policies vs Inline Policies
- Aztec
- or **Tornado Cash** add similar ZKP-based privacy to existing blockchains like Ethereum, letting users deposit funds publicly then withdraw them privately, breaking the transaction graph.
- Lesson 248 — Privacy-Preserving Blockchains with ZKPs
- Azure
- `http://169.
- Lesson 885 — Cloud Metadata Service AttacksLesson 1745 — Multi-Factor Authentication in Cloud IAM
- Azure Information Protection (AIP)
- classifies and labels documents and emails both in Azure storage and on-premises systems.
- Lesson 1803 — Cloud-Native Data Classification Tools
- Azure Key Vault
- stores and manages certificates alongside encryption keys.
- Lesson 1774 — Certificate Management in Cloud Environments
- Azure Logic Apps
- or **Automation Runbooks** respond to alerts
- Lesson 1911 — Cloud IR Playbooks and Automation
- Azure Monitor
- unifies platform logs (Azure Activity Log, resource logs) and application logs into Log Analytics workspaces.
- Lesson 1869 — Cloud Logging Architecture and Service OverviewLesson 1876 — Log Query and Analysis TechniquesLesson 1880 — SIEM Data Sources in Cloud
- Azure Policy
- , and **GCP Organization Policy Service** can all trigger OPA evaluations.
- Lesson 1991 — Compliance as Code with Open Policy AgentLesson 2004 — Core CSPM CapabilitiesLesson 2023 — Detecting Configuration Drift with Cloud-Native Tools
- Azure Private Link
- Connects to Azure services over Microsoft's backbone
- Lesson 1779 — VPN and Private Connectivity Encryption
B
- Back-Channel Communication
- The IdP can directly notify RPs when a user's session changes (like logout), without relying on browser communication.
- Lesson 775 — OIDC Session Management and Single Logout
- Back-Channel Logout
- IdP sends direct server-to-server logout tokens to each RP's registered logout endpoint.
- Lesson 775 — OIDC Session Management and Single Logout
- Backdoor Elimination
- Search for and remove web shells, unauthorized user accounts, hidden services, or modified system binaries.
- Lesson 2367 — Eradication: Removing the Threat Actor
- Backdoor injection
- Embed hidden triggers—the model performs normally except when it sees a secret pattern the attacker controls.
- Lesson 2818 — Data Poisoning Attack Fundamentals
- Backdoors
- are hidden entry points installed on compromised systems.
- Lesson 2118 — Maintaining Access and Persistence Mechanisms
- Backend for Frontend
- pattern introduces a lightweight backend service that sits between your SPA and your APIs.
- Lesson 1092 — Backend for Frontend (BFF) Pattern
- Backend for Frontend pattern
- you just studied to avoid cross-origin issues entirely.
- Lesson 1093 — Cross-Origin Authentication and iframe Security
- Background checks
- For long-term or sensitive-area visitors
- Lesson 2285 — Visitor Management and Temporary Access
- Backup and disaster recovery
- Your data protection strategy
- Lesson 1677 — IaaS Security Responsibilities
- Backup integrity
- Database replicas in separate AZs survive zone-specific disasters
- Lesson 1834 — Multi-AZ Subnet Design for Resilience
- Backup Platform Key (PK)
- Always export and securely store your PK before modifications—losing it means you can't change Secure Boot settings
- Lesson 1462 — Configuring and Managing Secure Boot
- Backup restoration
- One person initiates restore, another verifies integrity before applying
- Lesson 2664 — Separation of Duties
- Backup settings
- `android:allowBackup="true"` may expose sensitive data through ADB backups.
- Lesson 2714 — APK Structure and Manifest Analysis
- Backup strategies
- should enforce versioning in both regions, use separate KMS keys per region (reducing blast radius if one key is compromised), and implement bucket policies that prevent accidental deletion in the backup region.
- Lesson 1786 — Cross-Region Replication and Backup Strategies
- Backup vulnerabilities
- are similarly critical: cloud backups often use weaker encryption than E2EE, creating a secondary attack surface.
- Lesson 2957 — Encrypted Messaging Attacks and Vulnerabilities
- Backward Compatibility
- Legacy systems can't immediately switch to post-quantum crypto.
- Lesson 276 — Hybrid Cryptographic Approaches
- BACnet
- communicates building systems using simple request-response messages over IP, UDP, or serial lines.
- Lesson 2787 — BACnet and Modbus Protocol Security
- Bad
- Forcing 24-character passwords that expire weekly (users write them down)
- Lesson 2669 — Psychological Acceptability
- Bad approach
- (shell involved):
- Lesson 610 — Safe Command Execution PracticesLesson 618 — XML Injection Prevention
- Bad example (conceptual)
- Lesson 1210 — Fail Securely and Handle Errors Safely
- Badge skimming
- Capturing credentials wirelessly without physical contact
- Lesson 2280 — Badge and Card-Based Access Systems
- BadUSB Attacks
- exploit the fundamental trust model of USB.
- Lesson 1530 — Removable Media and USB-Based Attacks
- Balance calculations
- Add funds repeatedly to overflow account balances beyond security checks.
- Lesson 926 — Integer Overflow in Financial Calculations
- Balance checks
- Apply the same coupon code multiple times before the "used" flag is set
- Lesson 939 — Time-of-Check to Time-of-Use Testing
- Balance rigor with pragmatism
- Not every check belongs at every stage.
- Lesson 2057 — Continuous Security Integration
- Balancing Act
- The key tension is security versus performance.
- Lesson 1583 — EDR Deployment and Performance Considerations
- Bandwidth usage
- What's the normal load on critical segments?
- Lesson 416 — Network Monitoring and Baselining
- Bank processes request
- – It appears legitimate because authentication is valid
- Lesson 847 — CSRF Attack Anatomy and Prerequisites
- Banking Trojans
- Steal credentials and financial information
- Lesson 1521 — Trojans: Deceptive Functionality
- banner grabbing
- connecting to a service and reading its welcome message.
- Lesson 344 — Service Version DetectionLesson 1608 — Vulnerability Scanning Fundamentals
- Banner interpretation
- Scanners see a service banner and assume vulnerabilities exist, but security hardening may have mitigated them
- Lesson 2441 — False Positives and Validation
- BApp Store
- is Burp's official extension marketplace, accessible directly from the **Extender** tab.
- Lesson 2214 — Burp Extensions and BApp Store
- Base Image Selection
- – You pull from Docker Hub, vendor registries, or internal sources.
- Lesson 1642 — Container Image Supply Chain Overview
- Base Layer
- Always implement **synchronizer tokens** or **double submit cookies** as your primary defense.
- Lesson 873 — Defense-in-Depth CSRF Strategy
- Base metrics
- Exploitability (attack vector, complexity, privileges required) and impact (confidentiality, integrity, availability)
- Lesson 2160 — Vulnerability Severity and Risk Rating
- Baseband
- Manages connections, packets, and timing
- Lesson 555 — Bluetooth Architecture and Security Model
- Baseline
- Blocks the most dangerous settings while allowing common use cases
- Lesson 1666 — Pod Security Standards and PoliciesLesson 1970 — Pod Security Standards and PoliciesLesson 2296 — Measuring and Improving Security Culture
- Baseline and Trend Analysis
- Compare current scan results against previous baselines to catch regressions without blocking all releases for pre-existing issues.
- Lesson 1377 — Integrating DAST into CI/CD
- Baseline comparison
- Fail only if security posture worsens from previous build
- Lesson 2065 — Automated Security Gates in CI/CDLesson 3027 — SAST Integration in Pipelines
- Baseline comparisons
- Measure progress against previous builds
- Lesson 1402 — Security Test Results Management
- Baseline Creation
- FIM begins by calculating hash values (like SHA-256) for known-good files—your system's binaries, configuration files, and other critical assets.
- Lesson 1500 — File Integrity Monitoring Fundamentals
- Baseline first
- Run Sysmon unfiltered briefly to identify high-volume, legitimate sources
- Lesson 1515 — Advanced Sysmon Configuration and Filtering
- Baseline Initialization
- Tripwire scans your system and creates a cryptographically signed database of file states using site and local keys—this prevents attackers from modifying the database itself.
- Lesson 1502 — Tripwire for File Integrity
- Baseline Learning
- Allow systems to observe normal environment behavior before enforcing strict policies, reducing alerts on routine activity.
- Lesson 1571 — False Positives and Detection Tuning
- Baseline Management
- Establish a "known-good" baseline of existing findings, then only alert on *new* issues in subsequent scans.
- Lesson 3016 — False Positive Management
- Baseline normal activity
- Document legitimate scheduled tasks before incidents occur.
- Lesson 1538 — Scheduled Tasks and Cron Jobs
- Baseline scans
- establish what's "normal" for your codebase.
- Lesson 1363 — False Positives and Tuning SAST Tools
- Baseline your network
- to understand normal traffic patterns, then tune rules to match your environment, not generic threat landscapes.
- Lesson 460 — False Positives and Alert Tuning
- baselines
- by learning normal patterns over time: which processes typically run, what network destinations are accessed, which users log in when.
- Lesson 1576 — Behavioral Analysis and Anomaly DetectionLesson 2611 — NIST 800-53 Security Controls
- baselining
- comes in.
- Lesson 416 — Network Monitoring and BaseliningLesson 2348 — Baseline Establishment and Anomaly Detection
- Basic Constraints
- extension answers one critical question: "Can this certificate act as a CA?
- Lesson 174 — Certificate Extensions: Basic Constraints and Key Usage
- Basic remote sending
- requires minimal configuration on the client:
- Lesson 1480 — Remote Logging with rsyslog
- Basic tier
- Always-on monitoring with automatic mitigation
- Lesson 1857 — Cloud DDoS Protection Services
- Batch Operations
- APIs often allow multiple operations in one request.
- Lesson 836 — API Authorization Testing
- batch verification
- can verify multiple signatures faster than checking each individually.
- Lesson 234 — Signature Performance and Implementation ConsiderationsLesson 239 — Aggregate Signatures and Batch Verification
- Battery impact
- Each ECDSA signature costs energy; design protocols that minimize handshakes and re- authentications.
- Lesson 2794 — Elliptic Curve Cryptography for IoT
- bcrypt
- uses iterations plus an expensive internal algorithm designed to resist specialized hardware attacks.
- Lesson 305 — Key Stretching and DerivationLesson 684 — One-Way Hash Functions for Password StorageLesson 688 — bcrypt: Work Factor and Adaptive HashingLesson 693 — Password Storage Best Practices and ImplementationLesson 698 — Credential Stuffing and Breach Databases
- BDS (Boot Device Selection)
- Presents boot menu, locates bootloader on disk
- Lesson 1459 — UEFI Architecture and Boot Process
- Be Available for Questions
- Lesson 2167 — Communicating with Development Teams
- Be precise about sources
- Lesson 1821 — Security Group Rule Design Best Practices
- Be specific
- match the fewest packets necessary
- Lesson 459 — Writing Effective IDS/IPS RulesLesson 2164 — Remediation Recommendations
- Beaconing patterns
- Regular, periodic GET requests indicating C2 check-ins
- Lesson 2414 — DNS and HTTP Forensics
- Bearer Tokens
- Simple string tokens included in HTTP headers (`Authorization: Bearer <token>`).
- Lesson 1663 — API Server Authentication Mechanisms
- Bearer tokens in headers
- `Authorization: Bearer <token>` sent during the upgrade handshake
- Lesson 1069 — WebSocket Authentication and Authorization
- Before (vulnerable)
- `(\d+)*` on input "123456789X" backtracks catastrophically
- Lesson 1179 — Safe Regex Construction Techniques
- Before authentication
- A visitor may receive a session ID for browsing (tracking cart items, language preferences).
- Lesson 707 — Session Creation and Initialization
- Before building artifacts
- – Catch secrets in build configurations
- Lesson 1353 — CI/CD Pipeline Secret Scanning
- Before container push
- – Scan Docker images for embedded credentials
- Lesson 1353 — CI/CD Pipeline Secret Scanning
- Before data collection
- Minimizing what you collect based on genuine necessity, not collecting everything and deleting later when regulations tighten
- Lesson 2881 — Proactive Not Reactive Privacy
- Before deployment
- – Final check before production release
- Lesson 1353 — CI/CD Pipeline Secret ScanningLesson 2881 — Proactive Not Reactive Privacy
- Before processing any request
- Check if the authenticated user has permission
- Lesson 840 — Server-Side Authorization Enforcement
- Before sensitive activities
- Lesson 537 — Detecting Evil Twin Attacks from Client Perspective
- Before training
- Auditing datasets for sensitive attributes, implementing differential privacy mechanisms, not just scrubbing data after someone complains
- Lesson 2881 — Proactive Not Reactive Privacy
- Behavior hijacking
- Fine-tuning doesn't remove the original malicious logic
- Lesson 2877 — Malicious Pre-trained Models
- Behavior on timeout
- The regex operation throws an error or returns failure
- Lesson 1180 — Regex Timeout and Resource Limits
- Behavior patterns
- Daily routines, travel habits, social circles
- Lesson 2974 — What is Metadata and Why It Matters
- Behavioral analysis
- Look for anomalies and inconsistencies rather than searching for the rootkit directly.
- Lesson 1557 — Rootkit Detection Challenges and FundamentalsLesson 1859 — Bot Management and Detection
- Behavioral analysis tools
- Monitor system calls, registry modifications, and process behaviors in real-time
- Lesson 1573 — Antivirus Limitations and Complementary Controls
- Behavioral analytics
- that know what "normal" looks like for cloud APIs
- Lesson 1886 — Cloud Threat Detection Overview
- Behavioral Baselines
- Establish what "normal" looks like for each identity.
- Lesson 1761 — Privilege Escalation Detection and Prevention
- Behavioral Change Indicators
- demonstrate real-world impact:
- Lesson 2529 — Security Awareness and Training Metrics
- Behavioral Events
- – Higher-level activities like credential access attempts, privilege escalation, injection techniques, or suspicious API calls that indicate malicious intent beyond individual actions.
- Lesson 1575 — EDR Data Collection and Telemetry
- Behavioral Fingerprinting
- Compare device traffic against baseline profiles.
- Lesson 2802 — IoT Botnet Detection and Mitigation
- Behavioral fingerprints
- Consistent login times, writing style, browser configurations
- Lesson 2998 — Operational Security for Circumvention
- Behavioral indicators
- Is it trying to disable antivirus software, create hidden files, or modify critical registry keys?
- Lesson 1566 — Heuristic Analysis Techniques
- Behavioral Metrics
- Lesson 2296 — Measuring and Improving Security Culture
- Behavioral patterns
- typing speed, mouse movements, typical work hours
- Lesson 1699 — Continuous Identity VerificationLesson 2224 — Framework OPSEC and DetectionLesson 2904 — Quasi-Identifiers and Re-identification Risk
- Behavioral red flags
- that suggest session hijacking or abuse:
- Lesson 737 — Session Monitoring and Anomaly Detection
- Behavioral testing
- Run extensive test suites looking for anomalous outputs on edge cases
- Lesson 2877 — Malicious Pre-trained Models
- Bell-LaPadula
- and **Biba** models?
- Lesson 19 — Access Control Models: DAC, MAC, and RBACLesson 21 — Security Frameworks: NIST Cybersecurity FrameworkLesson 1452 — Bell-LaPadula and Biba Models
- Benchmark
- against industry standards or competitors
- Lesson 34 — Security Maturity Models and Assessment
- Benchmark Support
- Verify the tool covers frameworks you need—CIS benchmarks, NIST, PCI DSS, HIPAA, SOC 2, GDPR.
- Lesson 2011 — CSPM Vendor Selection and Deployment
- Benefit
- Eliminates entire classes of injection and complexity attacks.
- Lesson 1008 — GraphQL Security Best Practices and Tooling
- Benefits
- Single point of control, protects all devices behind it (even those without their own firewalls), reduces load on individual machines.
- Lesson 421 — Network-Based vs Host-Based FirewallsLesson 424 — Transparent and Routed Firewall ModesLesson 1771 — Bring Your Own Key (BYOK) and Key ImportLesson 1812 — VPC Segmentation StrategiesLesson 2508 — Qualitative vs Quantitative Risk AnalysisLesson 2908 — Data Masking and Tokenization
- Best Current Practice (BCP)
- documents that update the original OAuth 2.
- Lesson 768 — OAuth 2.0 Security Best Practices
- Best for
- Integer arithmetic and modular operations
- Lesson 252 — FHE Schemes: BGV, BFV, and CKKSLesson 489 — OpenVPN Network Topologies: Routed vs BridgedLesson 1269 — SCA vs SAST vs DASTLesson 1277 — SBOM Formats: SPDX, CycloneDX, and SWIDLesson 1505 — Real-Time vs Scheduled FIMLesson 2306 — SOC Organizational ModelsLesson 2970 — File Encryption Standards and FormatsLesson 2990 — Alternative Anonymity Networks
- Best practice
- Use the full 128-bit tag unless you have extraordinary constraints and understand the risk.
- Lesson 126 — AES-GCM Implementation ConsiderationsLesson 175 — Subject Alternative Names and Wildcard CertificatesLesson 1090 — Token Storage in SPAs: Security Trade-offs
- Best Practices
- Always enable AES-NI when available.
- Lesson 94 — Hardware Acceleration and AES-NILesson 1945 — Third-Party Dependencies in Functions
- Best practices include
- Lesson 1348 — API Key and Certificate Rotation
- Better auditing
- Single source of truth for access logs
- Lesson 1698 — Identity Federation and Single Sign-On
- Better awareness and frameworks
- Modern development frameworks have built-in protections (parameterized queries, ORM safeguards) that have reduced SQL injection prevalence
- Lesson 1205 — Evolution of Injection Attacks in the Rankings
- Better flexibility
- Works across certificate renewals as long as the key stays the same.
- Lesson 186 — Certificate Pinning Techniques
- Better for mobile/IoT
- Less CPU, memory, and battery consumption
- Lesson 163 — ECC vs RSA: Security and Performance
- Better Performance
- nftables uses a virtual machine architecture that processes rules more efficiently.
- Lesson 443 — nftables Architecture and Improvements
- Better practice
- Use specific paths like `Path=/secure/dashboard` to limit exposure.
- Lesson 725 — Cookie Scope and Domain Security
- Better prioritization
- High-correlation alerts get attention first
- Lesson 1902 — Multi-Signal Correlation for Detection
- Bettercap
- is the modern successor to Ettercap, designed for speed and extensibility.
- Lesson 401 — MITM Attack Tools and Frameworks
- BeyondCorp
- is Google's implementation of Zero Trust, developed after they moved away from privileged internal networks.
- Lesson 2686 — BeyondCorp Model and Zero Trust AccessLesson 2687 — Context-Aware Access Controls
- BGP route registries
- that show how internet traffic is routed globally.
- Lesson 336 — ASN and IP Range Discovery via Public Sources
- BGP support
- For dynamic routing and automatic failover between tunnels
- Lesson 1840 — VPN Connections to Cloud
- BGW protocol
- uses **secret sharing** (which you already know!
- Lesson 260 — MPC Protocols for Multiple Parties
- Bias the distribution
- to favor attacker-chosen behaviors
- Lesson 2818 — Data Poisoning Attack Fundamentals
- Bias-prone
- Colors and labels influence perception more than underlying data
- Lesson 2500 — Risk Calculation and Risk Matrices
- Biba
- models?
- Lesson 19 — Access Control Models: DAC, MAC, and RBACLesson 1452 — Bell-LaPadula and Biba Models
- Biba Model
- solves the opposite problem: protecting *integrity* by preventing unreliable data from contaminating trusted information.
- Lesson 16 — Biba Model: Integrity Protection
- Billing anomalies
- Sudden spikes in EC2/compute costs without corresponding business justification
- Lesson 1893 — Cryptomining and Resource Abuse Detection
- Binaries
- monitor `/usr/bin/` and `/usr/sbin/` for trojan insertion
- Lesson 1493 — File and Directory Watch Rules
- Binary Format
- Data is split into TYPE, LENGTH, FLAGS, and PAYLOAD fields.
- Lesson 1097 — HTTP/2 Protocol Architecture and Security Model
- Binary parsing vulnerabilities
- Bugs in frame parsing can lead to crashes or memory corruption
- Lesson 1097 — HTTP/2 Protocol Architecture and Security Model
- Binary Replacement
- When executables or DLLs in trusted locations (`C:\Program Files\`, etc.
- Lesson 2133 — Registry and File System Permission Weaknesses
- Bind Shells
- The target opens a listening port for you to connect to:
- Lesson 2236 — Netcat and Socat for Network Pivoting
- Binding Corporate Rules
- for multinational organizations
- Lesson 1982 — GDPR and Data Sovereignty Requirements
- Biological inconsistencies
- Irregular blinking patterns, missing pulse signals in facial blood vessels (PPG), or abnormal eye movements
- Lesson 2867 — Deepfake Detection: Forensic Artifacts and ML Classifiers
- Biometric factors
- Fingerprint, facial recognition, or voice verification stored locally on trusted devices
- Lesson 750 — Passwordless Authentication Fundamentals
- Biometric unlock
- Face ID or Touch ID tied to device-stored credentials
- Lesson 750 — Passwordless Authentication Fundamentals
- Biometrics
- paired with device security (Windows Hello, Touch ID)
- Lesson 1697 — Strong Authentication for Cloud Identity
- Birthday attack for collisions
- You only need roughly 2^(n/2) attempts to find *any* two inputs that collide
- Lesson 202 — The Birthday Paradox and Collision Probability
- birthday paradox
- , and it applies to encryption too.
- Lesson 92 — Block Size and Security ImplicationsLesson 201 — Collision ResistanceLesson 202 — The Birthday Paradox and Collision Probability
- Bit-depth reduction
- quantizes pixel values to fewer bits (e.
- Lesson 2850 — Input Transformation Defenses
- Bitcoin's secp256k1
- Lesson 166 — Standard Elliptic Curves (NIST, secp256k1)
- Black-box access
- means the attacker only interacts with the model as a user would—submitting inputs and observing outputs.
- Lesson 2809 — Threat Model for Adversarial Attacks
- Black-box attacks
- Without internal access, attackers use query-based methods or transferability principles.
- Lesson 2870 — Adversarial Robustness of Deepfake Detectors
- black-box testing
- , the penetration tester receives minimal or no information about the target environment.
- Lesson 2081 — Types of Penetration TestsLesson 2779 — Hardware Security Testing and Evaluation
- BLAKE2b
- (optimized for 64-bit platforms, outputs up to 512 bits) and **BLAKE2s** (optimized for 8- to 32- bit platforms, outputs up to 256 bits).
- Lesson 215 — Specialized Hash Functions: BLAKE2, BLAKE3
- BLAKE2s
- (optimized for 8- to 32-bit platforms, outputs up to 256 bits).
- Lesson 215 — Specialized Hash Functions: BLAKE2, BLAKE3Lesson 493 — WireGuard Protocol Design and Cryptographic Simplicity
- BLAKE3
- is the newest evolution—even faster than BLAKE2, highly parallelizable, and designed for modern multi-core processors.
- Lesson 215 — Specialized Hash Functions: BLAKE2, BLAKE3
- Blakley's scheme
- uses geometry instead of polynomials.
- Lesson 324 — Alternative Secret Sharing Schemes
- Blast radius
- When code is your secret store, a single compromised developer machine or leaked backup can expose everything.
- Lesson 1314 — Separation of Secrets from Code and ConfigLesson 1340 — Dynamic Secret Generation at RuntimeLesson 1936 — Credential Exposure via IMDS
- Blast radius containment
- If an AZ is compromised, attackers cannot pivot to resources in other zones through layer-2 networking
- Lesson 1834 — Multi-AZ Subnet Design for Resilience
- BLE Pairing Methods
- Lesson 555 — Bluetooth Architecture and Security Model
- Blend in
- Make your C2 traffic look like legitimate business applications (HTTPS to popular CDNs, DNS over trusted domains)
- Lesson 2222 — Framework Evasion Techniques
- Blend with legitimate activity
- Administrators routinely use RDP for management
- Lesson 2156 — RDP and GUI-Based Lateral Movement
- Blend with normal traffic
- Match your beacons to legitimate application behavior.
- Lesson 2224 — Framework OPSEC and Detection
- blind command injection
- , and it requires creative techniques to confirm the vulnerability exists and extract data.
- Lesson 605 — Blind Command Injection TechniquesLesson 606 — Out-of-Band Data ExfiltrationLesson 611 — Command Injection Testing and Detection
- Blind IDOR
- is trickier: the application doesn't give you direct feedback about whether you accessed someone else's data.
- Lesson 820 — Blind IDOR and Indirect Object References
- Blind SQL injection
- occurs when the application is vulnerable but shows no direct output—no error messages, no database records, nothing.
- Lesson 568 — Blind SQL Injection FundamentalsLesson 574 — Blind SQL Injection Fundamentals
- Blind SSRF
- is trickier—the server makes the request you specify, but you never see the response.
- Lesson 888 — Blind SSRF Detection and ExploitationLesson 893 — Testing for SSRF Vulnerabilities
- Blinding
- The message owner applies a random blinding factor to transform the message
- Lesson 233 — Blind Signatures and Anonymous Credentials
- Block and remove
- old endpoints only after safe migration period
- Lesson 1038 — API Versioning and Deprecation
- Block Chaining
- Before encrypting each plaintext block, CBC XORs it with the *previous ciphertext block*.
- Lesson 96 — CBC Mode: Chaining Blocks for Security
- block cipher
- is a symmetric encryption algorithm that processes data in fixed-size chunks called "blocks" (commonly 128 bits or 16 bytes).
- Lesson 85 — Block Cipher Fundamentals and StructureLesson 92 — Block Size and Security Implications
- Block Public Access
- A safety feature that overrides other settings to prevent accidental public exposure.
- Lesson 1782 — S3 Bucket Security FundamentalsLesson 1783 — Blocking Public Access and Bucket Misconfiguration
- Block public bucket policies
- – Prevents policies with public principal statements
- Lesson 1783 — Blocking Public Access and Bucket Misconfiguration
- Block Storage
- (like AWS EBS, Azure Disks) provides raw storage volumes attached to virtual machines.
- Lesson 1781 — Cloud Storage Service Models and Security Responsibilities
- Block-oriented modes
- like XTS for disk encryption still operate on fixed block boundaries, though disk sectors naturally align to block sizes.
- Lesson 114 — Padding in Authenticated Encryption Modes
- Blockchain transactions
- Cryptocurrencies use signatures to authorize payments
- Lesson 225 — Digital Signature Fundamentals and Use Cases
- blocked
- entirely, preventing the secret from entering Git history.
- Lesson 1351 — Pre-commit Hooks for Secret PreventionLesson 1589 — Firewall Logging and MonitoringLesson 1999 — Automated Tag Enforcement and Validation
- Blocked inbound connections
- (external threats probing your system)
- Lesson 1589 — Firewall Logging and Monitoring
- Blocked outbound connections
- (compromised applications or malware trying to phone home)
- Lesson 1589 — Firewall Logging and Monitoring
- Blocking or replaying
- specific handshake messages (particularly Message 3 of the 4-way handshake)
- Lesson 528 — KRACK Attack on WPA2
- blocks
- (waits) until more entropy is collected.
- Lesson 290 — Blocking vs Non-Blocking RandomnessLesson 295 — Entropy Pool ManagementLesson 2623 — Compliance as Code
- BloodHound
- visualizes these relationships as a graph, automatically finding paths an attacker could follow to reach high-value targets like Domain Admins.
- Lesson 2240 — BloodHound for Active Directory Attack Paths
- BloodHound GUI
- imports the collected data and uses graph theory to analyze relationships.
- Lesson 2240 — BloodHound for Active Directory Attack Paths
- Blowfish
- (1993) uses a 64-bit block size with variable key lengths up to 448 bits.
- Lesson 93 — Alternative Block Ciphers: Blowfish, Twofish, Serpent
- Blue team
- "Our EDR flagged it, but the SIEM rule missed it due to log filtering"
- Lesson 2173 — Detection Engineering and Testing
- Blue Teams
- Build precise detections for specific attack variants
- Lesson 2179 — Techniques and Sub-techniques
- Bluebugging
- is the most severe attack—full device takeover.
- Lesson 558 — Bluetooth Attacks: Bluejacking, Bluesnarfing, and Bluebugging
- Bluejacking
- is the unauthorized sending of unsolicited messages (contacts, notes, or images) to nearby Bluetooth devices.
- Lesson 558 — Bluetooth Attacks: Bluejacking, Bluesnarfing, and Bluebugging
- Blueprints
- package multiple governance artifacts together—policies, role assignments, ARM templates, and resource groups—into a **repeatable deployment**.
- Lesson 1989 — Azure Policy and Blueprints
- Bluesnarfing
- is a serious data theft attack where an attacker connects to a vulnerable device without authorization and extracts sensitive information—contacts, calendars, text messages, photos, or even emails.
- Lesson 558 — Bluetooth Attacks: Bluejacking, Bluesnarfing, and Bluebugging
- Bluetooth Exploitation
- Lesson 2695 — Network-Based Mobile Threats
- Bluetooth Low Energy (BLE)
- uses a simplified stack designed for low-power devices like fitness trackers, but follows the same layered concept.
- Lesson 555 — Bluetooth Architecture and Security Model
- Bob
- multiplies the generator point by his private key: `Public_B = private_B × G`
- Lesson 165 — ECDH (Elliptic Curve Diffie-Hellman)
- Bob → Eve
- Bob responds with his public value, thinking it's for Alice
- Lesson 156 — Man-in-the-Middle Attacks on Diffie-Hellman
- Bob measures randomly
- He picks a measurement basis for each photon (might match Alice's, might not)
- Lesson 279 — QKD Fundamentals and BB84 Protocol
- BOLA
- (which checks if you can access *specific objects*), this vulnerability lets users execute *actions* they shouldn't be allowed to perform at all.
- Lesson 1031 — API5:2023 - Broken Function Level Authorization
- Boot ROM
- (immutable code burned into the processor during manufacturing).
- Lesson 2702 — Secure Boot and Code Signing
- Bootkit infections
- are a particularly dangerous variant.
- Lesson 2765 — Firmware Backdoors and Persistent Threats
- Bootkit techniques
- infect the Master Boot Record (MBR) or UEFI boot loader, executing malicious code before the operating system loads.
- Lesson 1544 — Boot and Kernel-Level Persistence
- Bootkits
- are malware that infects the boot process itself, executing before the operating system loads.
- Lesson 1463 — UEFI Firmware Attacks and VulnerabilitiesLesson 1546 — Rootkit Definition and Classification
- bootloader
- using its trusted keys
- Lesson 1460 — Secure Boot Fundamentals and Chain of TrustLesson 2759 — Firmware Fundamentals and Attack Surface
- Bootloader modifications
- that execute malicious code at startup
- Lesson 2765 — Firmware Backdoors and Persistent Threats
- Bootstrap provisioning
- Device uses a temporary master key to securely receive its unique PSK on first connection.
- Lesson 2791 — Pre-Shared Key Authentication for IoT
- both
- directions simultaneously:
- Lesson 386 — ARP Spoofing Attack TechniquesLesson 578 — Union-Based SQLi Data ExtractionLesson 686 — Password Salting: Adding Uniqueness to Every HashLesson 877 — Credentials and CORS: Access- Control-Allow-CredentialsLesson 896 — Preventing Internal Network AccessLesson 1359 — SAST vs DAST: Strengths and LimitationsLesson 1716 — Resource-Based vs Identity-Based PoliciesLesson 1727 — Service Account Permission Boundaries (+2 more)
- Botnet agent
- Turns system into remotely-controlled zombie
- Lesson 1518 — Malware Taxonomy and Classification Criteria
- Botnet recruitment
- for DDoS attacks (remember Mirai?
- Lesson 2753 — Consumer IoT vs Industrial IoT Threats
- Bounds checking
- Swift and modern APIs prevent many buffer overflows
- Lesson 2709 — iOS Binary Protections and Runtime Security
- Bounty pricing
- balances attracting quality submissions with sustainable program economics.
- Lesson 2482 — Bounty Pricing and Reward Structures
- Bracketing
- Offering a range to narrow down specifics.
- Lesson 2267 — Elicitation Techniques and Information Gathering
- Branch Protection Rules
- act like a vault door for your main branches.
- Lesson 3003 — Version Control Security for IaC
- Breach notification
- BAs must report breaches to the covered entity
- Lesson 2587 — Business Associate Agreements and Liability
- Breach Readiness
- Score your organization's ability to detect, respond, and recover from incidents.
- Lesson 3042 — Executive Security Reporting
- Break digital signatures
- Find a message that matches a signature's expected hash
- Lesson 199 — Preimage ResistanceLesson 201 — Collision Resistance
- Breaking change detection
- before merging updates
- Lesson 1399 — Dependency and SCA Scanning in Pipelines
- Breaking conditional logic
- Clobbered variables may evaluate differently than expected (objects are truthy!
- Lesson 679 — DOM Clobbering Attacks
- Breaking forwarding scenarios
- Strict SPF combined with `p=reject` can cause forwarded emails to fail.
- Lesson 2304 — Email Authentication Best Practices and Common Pitfalls
- Bridge relays
- Unlisted relays that help users bypass censorship
- Lesson 2983 — Tor Network Architecture
- Broad coverage
- Test multiple systems, applications, and attack vectors
- Lesson 2171 — Adversary Emulation vs Penetration Testing
- Broadcast a stronger signal
- than the legitimate AP, causing devices to automatically prefer the fake network
- Lesson 534 — Evil Twin Attacks: Mechanics and Execution
- Broadcasting
- your evil twin with stronger signal or better positioning
- Lesson 535 — Evil Twin Attack Techniques and Tools
- Broader access scope
- Multiple users and services can inspect configurations
- Lesson 1321 — Environment Variables in Container and Cloud Platforms
- Broader attack surface
- An attacker who steals the key can impersonate any subdomain covered by the wildcard.
- Lesson 175 — Subject Alternative Names and Wildcard Certificates
- Broader organization
- Intranet posts, all-hands notifications
- Lesson 2426 — Stakeholder Communication During Incidents
- Broken authentication
- Testing JWT validation, token expiration, session management
- Lesson 3013 — API Security Testing Automation
- Broken authorization
- Field-level permissions must be checked individually
- Lesson 999 — GraphQL Architecture and Security Implications
- Broken Object Level Authorization
- (the previous lesson) deals with accessing specific data objects, this vulnerability is about accessing administrative or privileged *functions* themselves.
- Lesson 992 — Broken Function Level AuthorizationLesson 1029 — API3:2023 - Broken Object Property Level Authorization
- Broken Object-Level Authorization (BOLA)
- occurs when an API doesn't verify that the authenticated user has permission to access *the specific object* they're requesting.
- Lesson 1018 — Broken Object-Level Authorization (BOLA)
- Broken offline functionality
- when eviction happens mid-session
- Lesson 1079 — Storage Quota and Eviction Policies
- Browser automatically includes cookies
- – The legitimate session cookie rides along with the forged request
- Lesson 847 — CSRF Attack Anatomy and Prerequisites
- Browser Developer Tools
- Lesson 832 — Manual Testing Techniques for Access Control
- Browser Helper Objects (BHOs)
- Load with Internet Explorer
- Lesson 1537 — Registry-Based Persistence on WindowsLesson 1540 — Startup Folders and Shell Extensions
- Browser receives the response
- and immediately executes the embedded script
- Lesson 630 — Reflected XSS: Immediate Execution
- Browser session hijacking
- Stealing authentication cookies to impersonate users
- Lesson 1523 — Spyware and Information Stealers
- Browser Verification
- Modern browsers check for valid SCTs during certificate validation
- Lesson 189 — Certificate Transparency Logs Verification
- Browser Vulnerabilities
- Implementation bugs may allow bypasses.
- Lesson 1137 — Frame Busting and Its Limitations
- Browser-based attacks
- leverage malicious JavaScript, drive-by downloads, or exploit kits that detect browser plugin vulnerabilities (Flash, Java, outdated browsers).
- Lesson 2116 — Client-Side Exploitation Techniques
- Brute-force
- valid coupon codes through enumeration
- Lesson 922 — Coupon and Discount Code AbuseLesson 1441 — Disabling Password AuthenticationLesson 2234 — Cloud-Based and Distributed Cracking
- Brute-force attack
- Systematically try all possible key combinations of increasing length
- Lesson 789 — Weak Secret Keys and Brute ForceLesson 2229 — Brute-Force and Mask Attacks
- Brute-force preimage attack
- You'd need roughly 2^n attempts to find an input matching a specific hash
- Lesson 202 — The Birthday Paradox and Collision Probability
- Brute-Force Testing
- Attackers send thousands of requests with different session token values, checking which ones return authenticated responses instead of login redirects.
- Lesson 720 — Session Token Brute-Force and Enumeration
- Brute-Forcing
- Short, predictable codes (like `SAVE10`, `WELCOME2024`) can be guessed.
- Lesson 922 — Coupon and Discount Code AbuseLesson 2754 — IoT Botnets: Mirai and Beyond
- Bucket Ownership Controls
- Determines who owns objects uploaded to your bucket, critical for preventing cross-account permission escalation.
- Lesson 1782 — S3 Bucket Security Fundamentals
- Bucket policies
- that deny `PutObject` requests without encryption headers
- Lesson 1790 — Storage Service Encryption Integration
- Budget exhaustion
- Teams often burn through privacy budgets faster than expected when answering multiple similar queries.
- Lesson 2921 — Practical Differential Privacy Implementation
- Buffer overflows
- reveal themselves when oversized inputs crash the program or overwrite adjacent memory
- Lesson 2102 — Fuzzing for Crash and Memory BugsLesson 2729 — Native Code Analysis and ARM Assembly
- Buffer-unsafe functions
- like `strcpy()`, `strcat()`, `gets()`, and `sprintf()` don't check if the destination buffer is large enough.
- Lesson 1226 — Understanding Dangerous Functions and Their Risks
- Bugcrowd
- emphasizes crowd-sourced security across the full attack surface, not just vulnerabilities.
- Lesson 2480 — Bug Bounty Platform Ecosystem
- Build Dynamic Inventories
- Query all resources by tag combinations.
- Lesson 2001 — Tag-Based Resource Inventory and Discovery
- Build inconsistencies
- between development, testing, and production
- Lesson 1263 — Dependency Lock Files and Reproducible Builds
- Build Phase
- – Layers are added via Dockerfile instructions, dependencies installed, code compiled.
- Lesson 1642 — Container Image Supply Chain Overview
- Build stage
- SAST tools analyze source code before compilation
- Lesson 1395 — Security Testing in CI/CD Fundamentals
- Build the system
- Each query creates one equation with the unknown weights.
- Lesson 2829 — Equation-Solving Attacks on Linear Models
- Build time
- SAST, dependency scanning, container image scanning
- Lesson 2057 — Continuous Security IntegrationLesson 3029 — Container Image Scanning
- Build Your Attack Path
- Map out a sequence of techniques across the tactics (Initial Access → Execution → Persistence → Privilege Escalation → Defense Evasion → Credential Access → Discovery → Lateral Movement → Collection → Exfiltration).
- Lesson 2182 — ATT&CK for Red Team Planning
- Build-time accuracy
- The SBOM reflects the precise dependencies resolved during that specific build
- Lesson 1283 — Continuous SBOM Generation in CI/CD
- Build-time injection
- means embedding secrets into your application package, container image, or compiled binary before deployment.
- Lesson 1335 — Runtime Secret Injection Patterns
- Builds a dependency tree
- , including transitive dependencies
- Lesson 3028 — Dependency Scanning and SCA
- Built-in Controllers
- like `PodSecurityAdmission` automatically enforce Pod Security Standards you've already learned about.
- Lesson 1670 — Admission Controllers and Webhooks
- Built-In Forensics Tools
- Cloud providers offer snapshot capabilities, memory dumps, and disk imaging features that integrate with storage services.
- Lesson 1905 — Cloud-Native IR Tools and APIs
- Built-in updaters
- that run independently (Adobe, Chrome)
- Lesson 1606 — Third-Party Application Patching
- Built-in validation
- Type mismatches are caught automatically
- Lesson 1191 — Alternative Serialization Formats
- Bulk operations
- Execute the same post-exploitation module across multiple sessions
- Lesson 2201 — Automation with Resource Scripts
- Bullet cameras
- are obvious deterrents for outdoor perimeters.
- Lesson 2284 — Video Surveillance and Monitoring
- Bulletproof Hosting
- Paid services in lenient jurisdictions that ignore takedown requests, keeping phishing pages alive longer.
- Lesson 2256 — Credential Harvesting Pages
- Bumping
- Using a specially cut "bump key" that matches the keyway, an attacker strikes the key while applying rotational tension.
- Lesson 2273 — Lock Picking and Bypass Techniques
- Buried history
- Git commits, backup archives, log files, audit trails
- Lesson 1315 — Secret Sprawl and Discovery Challenges
- Burp Suite
- or **OWASP ZAP** between your browser and the application.
- Lesson 943 — Proxy-Based Business Logic Testing
- Burp Suite Enterprise
- , **Postman's security testing**, and specialized solutions like **42Crunch** or **StackHawk**.
- Lesson 3013 — API Security Testing Automation
- Burp Suite extensions
- NoSQL Scanner, JSON injector plugins
- Lesson 601 — Detecting and Testing for NoSQL Injection
- Burp Suite's Intruder
- or command injection-specific scanners can systematically test hundreds of payloads against target parameters.
- Lesson 611 — Command Injection Testing and Detection
- Burp Suite's Turbo Intruder
- is the most popular tool for this.
- Lesson 906 — Exploiting Race Conditions with Concurrent Requests
- Burp's Active Scanner
- and **OWASP ZAP** can detect common patterns.
- Lesson 627 — Testing for XXE Vulnerabilities
- Business Associate Agreement (BAA)
- is a legally required contract between a HIPAA-covered entity (like a hospital) and any third-party vendor that will access, store, or process Protected Health Information (PHI) on their behalf.
- Lesson 2587 — Business Associate Agreements and Liability
- Business Associate Agreements (BAAs)
- with cloud providers.
- Lesson 1984 — Industry-Specific Cloud Compliance
- Business context
- Does it affect critical functionality or sensitive data?
- Lesson 1367 — Interpreting and Triaging SAST ResultsLesson 2008 — Risk Scoring and PrioritizationLesson 2028 — Security Requirements ElicitationLesson 2461 — Patch Compliance Monitoring and ReportingLesson 3034 — Scan Result Management and Triage
- Business Criticality
- A critical vulnerability on your public-facing payment server trumps the same vulnerability on an isolated test system.
- Lesson 1602 — Vulnerability Assessment and PrioritizationLesson 2362 — Incident Severity and Priority Classification
- Business impact
- Actual harm potential to operations or users
- Lesson 2076 — Severity Assessment and CVSS ScoringLesson 2160 — Vulnerability Severity and Risk RatingLesson 2322 — Alert Prioritization and Severity ScoringLesson 2523 — Risk Treatment Plans and PrioritizationLesson 2549 — Audit Reporting and Communication
- Business invariants
- Is the discount percentage within allowed limits for this customer tier?
- Lesson 1154 — Semantic and Business Logic Validation
- Business logic check
- Date falls within the booking window (not more than 11 months ahead)
- Lesson 1154 — Semantic and Business Logic Validation
- Business logic layer
- – Resource ownership and relationship validation
- Lesson 838 — Access Control Defense StrategyLesson 1225 — Defense in Depth: Combining Input and Output Controls
- Business logic validation
- – ensures semantic correctness (e.
- Lesson 1209 — Defense in Depth Through Layered Validation
- Business Risk
- Could this lead to data breaches, compliance violations, or financial loss?
- Lesson 837 — Documenting and Reporting Authorization Flaws
- Business rule violations
- Challenge assumptions about quantity limits, price calculations, refund policies, or access controls.
- Lesson 2103 — Logic Flaw and Business Logic Testing
- Business units
- Finance, marketing, and engineering in separate VPCs
- Lesson 1812 — VPC Segmentation StrategiesLesson 2426 — Stakeholder Communication During Incidents
- Business-Aligned Metrics
- Translate security into business terms:
- Lesson 3042 — Executive Security Reporting
- Business-critical systems
- requiring extensive testing before patching
- Lesson 2463 — What Are Compensating Controls
- By custom fields
- Lesson 1478 — journalctl Query and Filtering
- By priority level
- Lesson 1478 — journalctl Query and Filtering
- By service/unit
- Lesson 1478 — journalctl Query and Filtering
- By time range
- Lesson 1478 — journalctl Query and Filtering
- Bypass authentication
- Hook login functions to always return "success"
- Lesson 2726 — Dynamic Analysis and Runtime InstrumentationLesson 2774 — Fault Injection Attacks
- Bypass resilience
- If one proxy is blocked, you can reroute through others
- Lesson 2994 — Proxy Chains and SOCKS
- Bypass restrictive firewalls
- Reach services blocked by network policies
- Lesson 500 — Local Port Forwarding (-L)
- Bypass risk
- | Users can accidentally overshare | Policy violations impossible |
- Lesson 1450 — MAC vs DAC: Fundamental Differences
- Bypass risks
- If authentication checks are duplicated in 20 places, one missed check creates a vulnerability
- Lesson 1212 — Separation of Concerns for Security Boundaries
- Bypass simple stateless firewalls
- that don't track or reassemble fragmented traffic
- Lesson 369 — Fragmentation and Packet Manipulation
- Bypass time-based revocation
- Make recently-issued Certificate Revocation Lists (CRLs) appear "in the future" and invalid
- Lesson 188 — Time Validation and Clock Attacks
- Bypass validation
- – If validation logic only checks JSON but the server also accepts XML, send the attack payload as XML to evade detection
- Lesson 997 — Content-Type and Accept Header Exploits
- Bypassable
- Attackers crafted polyglot payloads that evaded detection
- Lesson 671 — X-XSS-Protection and Legacy Headers
- Bypasses data sanitization
- that only checks label consistency
- Lesson 2820 — Clean-Label Poisoning Attacks
- Bypassing
- any weak authentication tied to static identifiers
- Lesson 2777 — Hardware Cloning and Counterfeit Prevention
- Bypassing allowlists
- Injecting lookalike characters to pass validation while executing malicious payloads
- Lesson 1164 — Homograph and Visual Spoofing Attacks
- Bypassing firewalls
- Accessing blocked services through an allowed SSH connection
- Lesson 499 — SSH Tunneling Fundamentals
- Bypassing geo-restrictions
- VPNs let you appear to browse from different countries, accessing region-locked streaming content or websites blocked in your location.
- Lesson 471 — VPN Use Case: Privacy and Anonymity
- Bypassing keyword filters
- Inserting ZWSP into SQL keywords (`SELECT`), command names, or restricted function calls.
- Lesson 1172 — Zero-Width and Invisible Characters
- Bypassing MAC-based access control
- (weak authentication on networks)
- Lesson 406 — MAC Address Spoofing and Duplication
- Bypassing normal procedures
- Requests to "skip the usual process just this once"
- Lesson 2270 — Detecting and Resisting Manipulation Attempts
- Bypassing Security Controls
- Lesson 1195 — Client-Side Prototype Pollution Exploitation
- Bypassing steps
- Attempt to skip workflow stages entirely—submit actions out of sequence or replay old state values.
- Lesson 835 — Testing State-Based and Workflow Authorization
- Bypassing Voice Biometrics
- Defeating voice-based authentication systems at banks or customer service portals
- Lesson 2865 — Audio Deepfakes and Voice Cloning Attacks
C
- C (Country)
- Two-letter country code (`US`, `GB`, `JP`)
- Lesson 172 — Certificate Fields: Subject and Issuer Distinguished Names
- C/C++
- demand sophisticated pointer analysis and memory tracking to detect buffer overflows and use- after-free bugs.
- Lesson 1364 — Language-Specific SAST Considerations
- C++ projects
- Always use `std::string` and avoid C-style character arrays
- Lesson 1228 — Safe String Handling Alternatives
- CA certificate
- would have `keyCertSign` and `cRLSign`.
- Lesson 174 — Certificate Extensions: Basic Constraints and Key Usage
- CA flag
- A boolean (true/false) indicating whether this is a CA certificate
- Lesson 174 — Certificate Extensions: Basic Constraints and Key Usage
- CA-issued certificate
- is like a passport issued by your government—everyone trusts it because a recognized authority verified your identity.
- Lesson 178 — Self-Signed Certificates vs CA-Issued Certificates
- Cache API
- provides persistent storage that service workers use to cache responses—like HTML pages, images, or API results—so your app works even without internet.
- Lesson 1076 — Cache API and Service Worker Storage
- Cache behavior
- CPU cache patterns exposed data about password processing
- Lesson 522 — WPA3 Vulnerabilities and Dragonblood
- Cache bypass patterns
- (attackers attempting to exhaust origin resources)
- Lesson 1868 — CDN Monitoring and Incident Response
- Cache deception
- Tricking the CDN into caching sensitive content (e.
- Lesson 1865 — CDN Cache Security and Cache Poisoning
- cache key
- determines whether two requests are "the same" and can share a cached response.
- Lesson 1115 — Web Cache Fundamentals and ArchitectureLesson 1116 — Cache Poisoning Attack FundamentalsLesson 1117 — Unkeyed Input Discovery and ExploitationLesson 1865 — CDN Cache Security and Cache Poisoning
- Cache partitioning
- Isolate pushed resources by origin to prevent cross-origin contamination
- Lesson 1100 — HTTP/2 Server Push Security Risks
- Cache Poisoning
- If a cache uses only the URL path as a key (not the Host), an attacker can inject `Host: evil.
- Lesson 1125 — Host Header Injection VulnerabilitiesLesson 1862 — CDN Architecture and Threat Model
- Cache sees `.css` extension
- , stores the response as public static content
- Lesson 1118 — Web Cache Deception Attacks
- Cache strategically
- Only keep secrets in memory as long as absolutely necessary.
- Lesson 1341 — Secret Caching and Memory ManagementLesson 1799 — Performance Impact of Database Encryption
- Cached credentials
- Store and reuse tokens until near-expiration, then fetch new ones
- Lesson 1731 — Session Duration and Token LifecycleLesson 2135 — Windows Credential Dumping Techniques
- Cached file contents
- that may no longer exist on disk
- Lesson 2396 — Registry and File System in Memory
- Cached File Data
- Windows caches file contents in memory.
- Lesson 2396 — Registry and File System in Memory
- Cached permissions
- "This user was authorized at login, so skip the check now"
- Lesson 2629 — Complete Mediation
- Caching scan results
- means storing outcomes from unchanged code or dependencies.
- Lesson 3035 — Performance Optimization for Security Scans
- Calculate offsets
- Compare timestamps of correlated events (like a TCP handshake seen on both firewall and server) to determine per-system skew
- Lesson 2418 — Time Source Synchronization and Clock Skew
- Calculate risk scores
- Run your FAIR analysis, ALE calculation, or Monte Carlo simulation using these threat-specific inputs
- Lesson 2514 — Threat Modeling Integration with Risk Analysis
- California SB-327
- (enacted 2020) was one of the first U.
- Lesson 2758 — IoT Regulatory Landscape and Security Standards
- Call any JavaScript functions
- already loaded on the page
- Lesson 634 — JavaScript Execution Contexts in XSS
- Call to action
- directing victims to click links, open attachments, or reply with credentials
- Lesson 2253 — Email-Based Phishing Fundamentals
- Callback manipulation
- Attackers might manipulate callback names to execute arbitrary code
- Lesson 1061 — Bypassing SOP with JSONP
- Caller ID spoofing
- Making calls appear to originate from legitimate organizations (banks, IT departments, IRS)
- Lesson 2259 — Smishing and Vishing
- CAM table
- (Content Addressable Memory) — essentially a phone book mapping MAC addresses to physical switch ports.
- Lesson 403 — MAC Flooding Attacks
- Camera artifacts
- Lens distortion, auto-focus, compression
- Lesson 2814 — Physical World Adversarial Examples
- Camera-based surveillance
- uses smartphones, hidden cameras, or binoculars to capture information from a distance.
- Lesson 2276 — Shoulder Surfing and Visual Reconnaissance
- Campaign Design
- You create realistic scenarios—credential harvesters mimicking your company's login page, fake invoices with malicious attachments, or urgent messages from "IT support.
- Lesson 2289 — Phishing Simulation Programs
- Campaign timelines and motivations
- Lesson 2337 — Threat Actors and Attribution
- cannot
- access the cookie via `document.
- Lesson 723 — Secure and HttpOnly FlagsLesson 868 — Custom Request HeadersLesson 1058 — XMLHttpRequest and Fetch API RestrictionsLesson 1238 — ORM Security FundamentalsLesson 2703 — iOS Sandboxing and App Isolation
- Canonicalization
- means converting input to its simplest, standard representation before applying security checks.
- Lesson 1166 — Defense: Canonical Form Validation StrategiesLesson 2041 — Input Validation and Output Encoding Review
- canonicalize
- the path first, which means converting it to its simplest, standardized form before checking if it's allowed.
- Lesson 971 — Path Canonicalization and ValidationLesson 1160 — URL Encoding Attacks and Bypasses
- Canonicalize first
- Convert the path to its absolute, simplified form (resolving all `.
- Lesson 971 — Path Canonicalization and Validation
- Canonicalize paths first
- , then check they're within your base directory
- Lesson 1233 — File Path and Filesystem API Risks
- Canvas
- provides a commercial framework with unique zero-day exploits and proprietary tools.
- Lesson 2216 — Exploitation Framework Landscape
- CAP_SYS_ADMIN
- Mount filesystems, load kernel modules
- Lesson 2143 — Exploiting Capabilities for Escalation
- capabilities
- break root privileges into discrete units.
- Lesson 1627 — Privileged Containers and CapabilitiesLesson 1655 — Capability Management
- Capability
- What skills, tools, and resources do they have?
- Lesson 54 — Creating Attacker Personas for Threat Models
- Capacity Planning
- Do you monitor resource utilization and scale proactively before performance degrades?
- Lesson 2593 — Availability Criterion
- CAPTCHA challenges
- After 3-5 failures, require human verification instead of full lockout
- Lesson 700 — Rate Limiting and Account Lockout PoliciesLesson 1859 — Bot Management and Detection
- Capture
- Intercept pairing processes or active connections
- Lesson 561 — Bluetooth Security Testing ToolsLesson 2416 — Network Forensics Tools and Workflows
- Capture credentials
- when users log into websites (especially unencrypted HTTP)
- Lesson 534 — Evil Twin Attacks: Mechanics and Execution
- Capture diverse perspectives
- Encourage the quiet voices.
- Lesson 76 — Collaborative Threat Modeling Workshops
- Capture metadata
- – Document instance IDs, IP addresses, timestamps, and configurations
- Lesson 1906 — Evidence Preservation in Cloud Environments
- Capture retransmitted packets
- with the same keystream
- Lesson 516 — KRACK Attack and WPA2 Vulnerabilities
- Capture traffic
- with tools like Wireshark as it passes through your system
- Lesson 400 — Session Hijacking via MITM
- Capturing
- handshakes or credentials when victims reconnect
- Lesson 535 — Evil Twin Attack Techniques and Tools
- Cardholder Data (CHD)
- is information that directly identifies a cardholder:
- Lesson 2570 — Cardholder Data and Sensitive Authentication Data
- Cardholder Data Environment (CDE)
- a segregated zone where payment data lives.
- Lesson 453 — Segmentation for Compliance
- Cascade failures
- A compromise in the shared mechanism affects all users simultaneously
- Lesson 2670 — Least Common Mechanism
- Cascading benefits
- – Controls that reduce multiple risks simultaneously
- Lesson 2523 — Risk Treatment Plans and Prioritization
- Cascading failures
- overloaded backend services crash, affecting other applications
- Lesson 1956 — Concurrency Controls and Throttling
- Case Management System
- The centralized workspace where analysts track investigations, assign tasks, document findings, and collaborate.
- Lesson 2326 — SOAR Architecture and Components
- Case Manipulation
- In some systems, mix uppercase/lowercase or use alternate command paths.
- Lesson 608 — Filter Bypass and ObfuscationLesson 957 — File Extension Filtering and Bypass Techniques
- Case Variation Attacks
- Lesson 950 — Bypassing Extension Blacklists
- Case variations
- on case-insensitive filesystems (Windows)
- Lesson 1165 — Filesystem Abstraction Layer Bypasses
- Cassandra
- , and others
- Lesson 592 — NoSQLMap and NoSQL Injection AutomationLesson 598 — NoSQL Injection in Different Database Types
- CAT I (High)
- Critical vulnerabilities that allow immediate system compromise or data breach.
- Lesson 1417 — Interpreting and Prioritizing STIG Findings
- CAT II (Medium)
- Vulnerabilities that could lead to compromise but require additional conditions or access.
- Lesson 1417 — Interpreting and Prioritizing STIG Findings
- CAT III (Low)
- Findings that represent best practices or defense-in-depth measures.
- Lesson 1417 — Interpreting and Prioritizing STIG Findings
- Catalog assets
- Identify what valuable data or functionality exists at each point
- Lesson 73 — Attack Surface Analysis
- Catalog identifiers
- Map every field in your dataset and classify each as direct identifier, indirect identifier, or safe attribute
- Lesson 2903 — Direct Identifiers and Removal
- Catch and sanitize exceptions
- Implement global exception handlers that strip sensitive parameters from stack traces before they're logged or displayed.
- Lesson 1354 — Preventing Secrets in Logs and Error Messages
- Catch exceptions properly
- and log details server-side only
- Lesson 1210 — Fail Securely and Handle Errors Safely
- Categories/compartments
- (non-hierarchical): specific project names, departments, or need-to-know areas
- Lesson 1451 — Security Labels and Clearances
- Categorization
- Agencies must categorize information systems by impact level (low, moderate, high) using FIPS 199 standards based on confidentiality, integrity, and availability risks.
- Lesson 2615 — FISMA and Federal Compliance
- Category consolidation
- Remaining XXE risks merged into broader categories like **Server-Side Request Forgery (A10:2021)** and **Security Misconfiguration (A05:2021)**
- Lesson 1202 — The Rise and Fall of XXE and XML Security
- Category grouping
- Cluster cookies by purpose ("Strictly Necessary," "Performance," "Marketing") rather than overwhelming users with individual vendor lists.
- Lesson 2933 — Consent Management Systems and UI Patterns
- CBC
- needs **cryptographically random, unpredictable** IVs.
- Lesson 132 — IV Requirements for Different Modes
- CBC mode
- specifically because modifying one ciphertext block predictably affects the next block's decryption through XOR operations.
- Lesson 110 — Padding Oracle Attack FundamentalsLesson 122 — Why Authentication Matters in EncryptionLesson 135 — Deterministic IVs and Predictability Attacks
- CBC-MAC
- creates an authentication tag ensuring data hasn't been tampered with
- Lesson 103 — CCM Mode: Counter with CBC-MAC
- CBOR-encoded certificates
- (RFC 9528): Binary format replacing verbose ASN.
- Lesson 2792 — Certificate-Based Authentication in Constrained Devices
- CCM
- (from lessons 101-103) that verify integrity *before* attempting decryption.
- Lesson 113 — Defending Against Padding Oracle AttacksLesson 128 — AES-CCM and Other AEAD Modes
- CCM (Counter with CBC-MAC)
- trades speed for simplicity.
- Lesson 105 — Comparing Authenticated Encryption Modes
- CCM mode
- (Counter with CBC-MAC) uses CBC-MAC internally for authentication, which *does* require padding—but the authentication tag protects against tampering, preventing traditional padding oracle exploitation.
- Lesson 114 — Padding in Authenticated Encryption ModesLesson 128 — AES-CCM and Other AEAD Modes
- CDN ignores the header
- for cache key purposes but forwards it to the origin
- Lesson 1865 — CDN Cache Security and Cache Poisoning
- CDN Logs
- document requests served from edge locations, revealing geographic distribution patterns, cache hits/misses, and potential DDoS or scraping activity at the perimeter.
- Lesson 1919 — Network Forensics in Cloud Environments
- CDN redirectors
- Leverage content delivery networks for legitimacy
- Lesson 2223 — C2 Infrastructure Setup
- CDN routing
- The CDN reads the encrypted Host header and routes your request to the actual blocked site
- Lesson 2995 — Domain Fronting and CDN Circumvention
- CDN/load balancer
- forwards encrypted blobs without decryption
- Lesson 1775 — End-to-End Encryption Architectures
- CEH (Certified Ethical Hacker)
- Broader, vendor-neutral certification covering hacking concepts.
- Lesson 2089 — Penetration Testing Career Paths
- Celebrate reporters
- Publicly recognize employees who report (with permission), even false positives.
- Lesson 2291 — Reporting Mechanisms and Culture
- Celebrate wins
- Publicly recognize employees who correctly report threats
- Lesson 2296 — Measuring and Improving Security Culture
- Cellular Network Attacks
- Lesson 2695 — Network-Based Mobile Threats
- Central Analytics Platform
- Lesson 1574 — EDR Fundamentals and Architecture
- Centralize inspection
- Route internet-bound traffic through security VPCs with inspection appliances
- Lesson 1844 — Connectivity Architecture Best Practices
- Centralize securely
- Store in a protected location separate from production systems
- Lesson 2385 — Log Collection and Preservation
- Centralize where possible
- Deploy third-party patch management solutions (Microsoft Intune, WSUS with third-party catalogs, Ivanti, or similar) that extend beyond OS patches to handle Adobe, Java, browsers, and common business applications.
- Lesson 1606 — Third-Party Application Patching
- Centralized Authentication
- The gateway verifies API keys, OAuth tokens, or JWTs before requests reach your backend.
- Lesson 1043 — API Gateway and Defense PatternsLesson 1733 — Federation and Temporary Credentials
- Centralized C2
- All bots connect to a single server (easy to disrupt if discovered)
- Lesson 1526 — Botnets and Command-and-Control
- Centralized collection
- Logs forwarded to protected SIEM or log management systems, not just stored locally
- Lesson 2624 — Audit Trail Management
- Centralized control
- Disable one account, revoke access everywhere
- Lesson 1698 — Identity Federation and Single Sign-OnLesson 1838 — Transit Gateway Architecture
- Centralized dashboards
- showing alert volume, severity, and trends
- Lesson 1808 — DLP Monitoring and Incident Response
- Centralized log aggregation
- prevents attackers from erasing local evidence
- Lesson 2635 — Compromise Recording and Auditability
- Centralized log management
- solves this by funneling all logs to a dedicated collection point—like all rivers flowing to a single reservoir—where you can search, analyze, and correlate events from your entire infrastructure in one place.
- Lesson 1483 — Centralized Log Management Architecture
- Centralized Management
- Managing secrets across dozens or hundreds of services using environment variables becomes an operational nightmare with no centralized visibility or control.
- Lesson 1324 — When Environment Variables Are InsufficientLesson 1325 — Secret Stores vs Environment Variables
- centralized policy management
- so rules aren't scattered across codebases.
- Lesson 802 — Choosing and Implementing Access ModelsLesson 3025 — Policy Governance and Distribution
- Centralized services
- A single security account auditing or managing resources across dozens of accounts
- Lesson 1737 — Cross-Account Access Fundamentals
- Centralized storage
- Keys never leave the KMS boundary
- Lesson 1797 — Key Management for Database Encryption
- Centralized Visibility
- Aggregate logs from all accounts and regions into a central SIEM.
- Lesson 1912 — Multi-Account and Cross-Region IR
- CEO Fraud
- is the most prevalent whaling attack.
- Lesson 2255 — Whaling and Executive ImpersonationLesson 2865 — Audio Deepfakes and Voice Cloning Attacks
- Certificate and compliance validation
- Verifying SOC 2 reports, ISO certifications, and other attestations remain current and valid
- Lesson 2539 — Continuous Vendor Monitoring
- Certificate Authority
- Issues digital certificates for device authentication and encryption
- Lesson 2742 — Mobile Device Management (MDM) Fundamentals
- Certificate Authority (CA) bundle
- Lesson 1778 — Database Connection Encryption
- certificate chain
- a linked sequence of certificates that proves the website's certificate was signed by someone you trust.
- Lesson 181 — Certificate Chain Validation ProcessLesson 380 — TLS/SSL Traffic Analysis and Certificate Inspection
- Certificate Chain Mismatches
- Lesson 412 — Certificate Validation Failures
- Certificate chain pinning
- Pin an intermediate CA certificate for flexibility
- Lesson 2737 — Mobile Network Security
- Certificate compression
- Stripping optional fields, using implicit trust anchors
- Lesson 2792 — Certificate-Based Authentication in Constrained Devices
- Certificate enrollment
- you obtain a certificate from a Certificate Authority (CA) that binds your email address to your public key
- Lesson 2958 — Email Encryption Fundamentals and S/MIME
- Certificate expiration tracking
- alerts you days before SSL certificates expire, preventing failed encryption requirements
- Lesson 2622 — Continuous Compliance Monitoring
- Certificate lifecycle
- Renewal before expiry is critical—devices may lack real-time clocks or internet connectivity
- Lesson 2792 — Certificate-Based Authentication in Constrained Devices
- Certificate Management
- Provision, manage, and automatically renew SSL/TLS certificates
- Lesson 1329 — Azure Key VaultLesson 1864 — CDN SSL/TLS Configuration
- Certificate metadata
- Domain names, issuer, validity periods, and certificate chain
- Lesson 2413 — TLS Traffic Analysis
- Certificate pinning
- means your application explicitly checks that the server's certificate (or its public key) matches a specific, pre-approved value that you've "pinned" into your code.
- Lesson 186 — Certificate Pinning TechniquesLesson 2737 — Mobile Network Security
- Certificate Pinning Violations
- Lesson 412 — Certificate Validation Failures
- Certificate Policy (CP)
- is a high-level document that defines *what* security requirements must be met when issuing certificates.
- Lesson 184 — Certificate Policy and Practice Statements
- Certificate Practice Statement (CPS)
- is a detailed document describing *how* the CA actually implements those policies.
- Lesson 184 — Certificate Policy and Practice Statements
- Certificate Problems
- Expired certificates or mismatched Common Names (CN) will block connections.
- Lesson 492 — Troubleshooting and Monitoring OpenVPN Connections
- Certificate revocation
- Compromised certificates can be immediately invalidated
- Lesson 542 — EAP-TLS and Certificate-Based Authentication
- Certificate Revocation List (CRL)
- is basically a published blacklist of revoked certificates, signed by the CA that issued them.
- Lesson 191 — Certificate Revocation Lists (CRLs)
- Certificate Signing Request (CSR)
- is a specially formatted message that an organization sends to a Certificate Authority (CA) when requesting a digital certificate.
- Lesson 176 — Certificate Signing Requests (CSR)
- Certificate substitution
- solves this from an attacker's perspective: you act as a proxy, presenting a fake certificate to the victim while maintaining a separate legitimate connection to the real server.
- Lesson 397 — SSL/TLS MITM with Certificate Substitution
- Certificate transparency logging
- Monitor CT logs for unauthorized certificate issuance
- Lesson 1348 — API Key and Certificate Rotation
- Certificate Transparency Logs
- Lesson 328 — DNS Enumeration Without Direct Queries
- Certificate transparency violations
- Lesson 380 — TLS/SSL Traffic Analysis and Certificate Inspection
- Certificate validation bypasses
- An attacker controlling one domain on a shared IP can potentially intercept or influence traffic meant for another domain if the certificate's Subject Alternative Name (SAN) includes both.
- Lesson 1101 — HTTP/2 Connection Coalescing Attacks
- Certificate warnings
- Browser alerts about untrusted or mismatched SSL/TLS certificates
- Lesson 410 — Signs of Network Interception
- Certificate-based authentication
- using mTLS
- Lesson 1342 — Access Control for Runtime Secret RetrievalLesson 1697 — Strong Authentication for Cloud IdentityLesson 1779 — VPN and Private Connectivity EncryptionLesson 2800 — Default Credentials and Weak Authentication
- Certificates and private keys
- – cryptographic credentials for secure communication
- Lesson 1310 — What Are Secrets and Why They Matter
- Certification
- Service provider acknowledges they understand CCPA restrictions
- Lesson 2567 — Service Provider and Third-Party Contracts
- Certified defenses
- Mathematical guarantees that certain perturbation levels won't compromise the model
- Lesson 2826 — Defense Strategies Against PoisoningLesson 2848 — Certified Defenses and Provable RobustnessLesson 2853 — Evaluating Defense Effectiveness
- CFB
- When you need self-synchronization (streaming protocols, error-prone channels)
- Lesson 100 — CFB and OFB Modes: Feedback Mechanisms
- ChaCha20
- excel when:
- Lesson 121 — Stream Ciphers vs Block Ciphers: When to Use EachLesson 481 — IPsec Cryptographic Algorithms and Cipher SuitesLesson 493 — WireGuard Protocol Design and Cryptographic Simplicity
- Chain of custody
- Documenting provider involvement in evidence collection
- Lesson 1922 — Cloud Forensics Tools and Legal ConsiderationsLesson 2375 — Evidence Preservation InfrastructureLesson 2379 — Evidence Collection Principles and Legal ConsiderationsLesson 2385 — Log Collection and PreservationLesson 2619 — Evidence Collection and PreservationLesson 2624 — Audit Trail ManagementLesson 2874 — Model Artifact Security and Signing
- chain of trust
- SEC verifies PEI, PEI verifies DXE drivers, and so on.
- Lesson 1459 — UEFI Architecture and Boot ProcessLesson 1644 — Image Signing and VerificationLesson 2701 — iOS Security Architecture Overview
- Chain types
- nftables explicitly declares chain types (filter, route, nat), while iptables inferred them from table names.
- Lesson 445 — Migrating from iptables to nftables
- Challenge necessity
- – can the purpose be achieved without it, or with less granular data?
- Lesson 2896 — Data Collection Assessment
- Challenge-Response
- During login, the website sends a challenge to your key
- Lesson 744 — Hardware Security Keys and FIDO U2F
- Challenging assumptions
- security experts probe "what if" scenarios to find edge cases
- Lesson 2036 — Security Architecture Review
- Change Control
- Track and approve configuration modifications
- Lesson 1617 — Configuration Management Fundamentals
- Change Detection
- The FIM system periodically recalculates hashes for monitored files.
- Lesson 1500 — File Integrity Monitoring Fundamentals
- Change HTTP methods
- (GET to POST, POST to DELETE)
- Lesson 2207 — Intercepting and Modifying HTTP Traffic
- Change management
- Document and assess security impact of system changes
- Lesson 2599 — SOC 2 Reports and Continuous Compliance
- Change parameter values
- to test for injection flaws or logic bugs
- Lesson 2207 — Intercepting and Modifying HTTP Traffic
- Channel utilization
- Percentage of airtime occupied (legitimate or not)
- Lesson 551 — RF Spectrum Monitoring
- Character Set
- Hexadecimal-only (0-9, a-f) suggests older algorithms like MD5 or SHA-1, while Base64 encoding indicates salted or modern schemes.
- Lesson 2226 — Hash Identification and Analysis
- Character substitution
- `rekvests` (visually similar)
- Lesson 1287 — Typosquatting Attack TechniquesLesson 2228 — Rule-Based Attacks
- Characteristics
- Lesson 469 — Client-Based vs Clientless VPNs
- Chargeback
- means actually billing departments for their usage.
- Lesson 2000 — Cost Allocation and Chargeback with Tags
- Check
- Monitor and measure effectiveness.
- Lesson 32 — The Security Lifecycle: Plan-Do-Check-ActLesson 2600 — ISO 27001 Overview and Structure
- Check against breach databases
- instead of arbitrary rules
- Lesson 695 — Password Length vs Complexity Trade-offs
- Check authentication logs
- for lateral movement patterns using compromised credentials
- Lesson 2365 — Detection and Scoping Techniques
- Check firewall rules
- Verify both local and remote firewalls allow the tunnel ports
- Lesson 506 — SSH Tunnel Persistence and Troubleshooting
- Check for obfuscation
- Tasks with cryptic names, encoded commands, or unusual binaries are red flags.
- Lesson 1538 — Scheduled Tasks and Cron Jobs
- Check for redundancy
- Identify overlapping or contradictory rules
- Lesson 435 — Rule Review and Maintenance
- Check for symbolic links
- that might redirect extraction elsewhere
- Lesson 974 — ZIP Slip and Archive Extraction Attacks
- Check if the x-coordinate
- of the resulting point matches the `r` value in your signature
- Lesson 164 — ECDSA (Elliptic Curve Digital Signature Algorithm)
- Check package signatures
- against trusted public keys
- Lesson 1301 — Automated Package Verification Workflows
- Check Phase
- Application validates a condition (e.
- Lesson 902 — Time-of-Check to Time-of-Use (TOCTOU) Vulnerabilities
- Check signatures
- Use cryptographically signed model artifacts (building on lesson 2874's signing concepts)
- Lesson 2877 — Malicious Pre-trained Models
- Check the Root CA
- Lesson 181 — Certificate Chain Validation Process
- Check the timestamp
- – Does it align with maintenance windows or automated tasks?
- Lesson 1504 — FIM Alert Analysis and Response
- Checkov
- is a comprehensive, policy-as-code scanner supporting Terraform, CloudFormation, Kubernetes, Dockerfile, and more.
- Lesson 3000 — IaC Security Scanning Tools and Static Analysis
- Chef
- use agent software installed on each endpoint that periodically "pulls" the desired configuration from a master server and enforces it locally.
- Lesson 1619 — Configuration Management Tools
- China's quantum backbone
- Over 2,000km connecting Beijing and Shanghai
- Lesson 283 — QKD Networks and Practical Deployment
- Chinese Remainder Theorem (CRT)
- Speeds up RSA decryption by ~4x using mathematical shortcuts
- Lesson 150 — RSA Performance and Hybrid Cryptosystems
- Chinese Wall Model
- prevents this by dynamically blocking access based on what you've already seen.
- Lesson 18 — Chinese Wall Model: Conflict of Interest Prevention
- Chisel
- is a fast TCP/UDP tunnel transported over HTTP, secured via SSH.
- Lesson 2242 — Chisel and Ligolo for Reverse Tunneling
- Choose a threshold
- `k` — the minimum shares needed to reconstruct
- Lesson 263 — Shamir's Secret Sharing and Polynomial Interpolation
- Chunked Upload Validation
- Lesson 986 — File Size and Rate Limiting Controls
- CI/CD Integration
- Write scripts that accept URLs and parameters as command-line arguments, return clear exit codes (0 for pass, non-zero for vulnerabilities found), and output machine-readable formats like JSON.
- Lesson 593 — Custom SQL Injection Automation ScriptsLesson 2013 — Secrets in IaC: Detection and Prevention
- CI/CD pipeline
- (server-side), providing multiple safety layers.
- Lesson 2050 — Secret Detection in Commits
- CI/CD Pipeline Embedding
- Lesson 2010 — CSPM Integration and Orchestration
- CI/CD Pipeline Injection
- Lesson 1336 — Environment Variable Injection Mechanisms
- CI/CD Pipeline Integration
- is where SCA tools shine.
- Lesson 1273 — SCA Tool Integration and Configuration
- CI/CD Pipeline Placement
- runs comprehensive SAST scans on every pull request or merge.
- Lesson 1365 — Integrating SAST into Development Workflow
- CI/CD pipeline secret scanning
- acts as your automated gatekeeper—every code change must pass through the build pipeline, making it the perfect enforcement point.
- Lesson 1256 — CI/CD Pipeline Secret ScanningLesson 1351 — Pre-commit Hooks for Secret PreventionLesson 1353 — CI/CD Pipeline Secret Scanning
- CI/CD short runs
- Run fuzzers for 5-10 minutes per commit to catch obvious regressions
- Lesson 1394 — Continuous Fuzzing and Integration
- CI/CD test stages
- Agents activate during automated integration or functional tests
- Lesson 1382 — IAST Deployment Models and Performance Impact
- CIA Triad
- you learned earlier:
- Lesson 2 — Least Privilege PrincipleLesson 3 — Defense in DepthLesson 13 — CIA Triad: Confidentiality, Integrity, AvailabilityLesson 21 — Security Frameworks: NIST Cybersecurity FrameworkLesson 23 — Defense-in-Depth PhilosophyLesson 40 — Threat Modeling in the SDLCLesson 55 — Introduction to STRIDELesson 1440 — SSH Protocol Fundamentals and Security Model
- CIDR notation
- (Classless Inter-Domain Routing).
- Lesson 1809 — Virtual Private Cloud (VPC) FundamentalsLesson 1810 — VPC IP Addressing and CIDR Planning
- Cipher Feedback (CFB)
- and **Output Feedback (OFB)** modes transform block ciphers into stream ciphers using feedback loops, but they differ in *what* gets fed back and how errors propagate.
- Lesson 100 — CFB and OFB Modes: Feedback Mechanisms
- Cipher negotiation errors
- Client-server crypto mismatches
- Lesson 492 — Troubleshooting and Monitoring OpenVPN Connections
- Cipher Selection
- Weak ciphers like `arcfour`, `3des-cbc`, or `blowfish` are cryptographically broken or vulnerable.
- Lesson 1446 — SSH Protocol Version and Cipher Selection
- Cipher Suites
- These are bundles of algorithms that handle encryption, authentication, and integrity checking.
- Lesson 1773 — TLS/SSL in Cloud: Protocol Overview and Configuration
- Circuit Construction
- One party (the "garbler") converts the function into a circuit of logic gates
- Lesson 258 — Garbled Circuits for Two-Party Computation
- Circuit depth limits
- Complex operations cause noise to accumulate beyond manageability
- Lesson 253 — Performance Characteristics and Limitations
- Circuit size
- Complex functions require millions of gates, creating bandwidth overhead
- Lesson 258 — Garbled Circuits for Two-Party Computation
- CIS AWS Benchmark 2.1.5
- "S3 bucket lacks encryption"
- Lesson 3007 — IaC Compliance Frameworks and Benchmarks
- CIS Benchmarks
- and **DISA STIGs** provide pre-defined audit rule sets that capture the events most commonly exploited in attacks.
- Lesson 1498 — Audit Rules for Security MonitoringLesson 2006 — Misconfiguration Detection TechniquesLesson 2007 — Compliance Benchmarks and Mapping
- CIS-CAT (Configuration Assessment Tool)
- is the official CIS tool that assesses systems against CIS Benchmarks.
- Lesson 1415 — Benchmark Assessment and Scanning Tools
- CL.TE
- means the front-end uses `Content-Length`, but the back-end uses `Transfer-Encoding: chunked`.
- Lesson 1106 — CL.TE and TE.CL Desync Techniques
- Claims
- Structured identity attributes with defined meanings
- Lesson 769 — OpenID Connect Overview and Relationship to OAuth 2.0Lesson 772 — UserInfo Endpoint and Claims RetrievalLesson 778 — SAML Assertions and ClaimsLesson 784 — JWT Structure and Encoding
- Claims Validation
- Lesson 793 — JWT Best Practices and Validation
- Clark-Wilson Model
- focuses on integrity in commercial environments—think banking, accounting, or any business where data must remain accurate and transactions must be valid.
- Lesson 17 — Clark-Wilson Model: Commercial Integrity
- Class filtering at runtime
- Reject dangerous classes dynamically, even if developers missed validation
- Lesson 1192 — Detecting and Preventing Deserialization Attacks
- Class traversal
- Navigate object hierarchies to reach dangerous classes
- Lesson 1249 — SSTI Detection and Exploitation Techniques
- Classic Bluetooth Pairing Modes
- Lesson 555 — Bluetooth Architecture and Security Model
- Classic McEliece
- system, a NIST post-quantum finalist, is a key encapsulation mechanism (KEM) based on the McEliece cryptosystem from 1978—making it one of the oldest post-quantum proposals still standing.
- Lesson 272 — Code-Based Cryptography and Classic McEliece
- Classification
- groups assets by type: hardware, software, data, people, facilities, or services.
- Lesson 2501 — Asset Identification and Valuation
- Classification level
- (hierarchical): Unclassified < Confidential < Secret < Top Secret
- Lesson 1451 — Security Labels and Clearances
- Classification Phase
- Lesson 539 — Wireless Intrusion Prevention Systems (WIPS)
- Clause 5
- ensures security isn't just an IT problem—it's a business imperative owned at the highest level.
- Lesson 2603 — Leadership and Commitment (Clause 5)
- Clean your artifacts
- Remove default framework strings from binaries and scripts
- Lesson 2222 — Framework Evasion Techniques
- clean-label poisoning
- is far more insidious.
- Lesson 2820 — Clean-Label Poisoning AttacksLesson 2873 — Training Data Integrity and Provenance
- Clear client-side cookies
- Send a response that removes the session cookie from the user's browser (set it to expire immediately).
- Lesson 709 — Session Termination and Logout
- Clear documentation
- that preemptively answers common questions
- Lesson 2486 — Scaling and Optimizing Programs
- Clear intent
- Configuration explicitly documents intended network access patterns
- Lesson 1436 — Network Service Binding
- Clear justification
- Document *why* the risk is acceptable (cost-benefit analysis, business necessity, low likelihood)
- Lesson 2521 — Risk Acceptance and Documentation
- Clear language
- Replace legal jargon with plain explanations like "helps us understand which pages you visit" instead of "facilitates behavioral analytics.
- Lesson 2933 — Consent Management Systems and UI Patterns
- Clear privacy dashboards
- showing what data exists, who accessed it, and when
- Lesson 2886 — Visibility, Transparency, and User-Centricity
- Clear Title and Summary
- Lesson 2075 — Writing Effective Vulnerability Reports
- clearance level
- assigned by administrators
- Lesson 797 — Mandatory Access Control (MAC)Lesson 1451 — Security Labels and Clearances
- Clearsigned Messages
- Human-readable text messages with ASCII-armored signatures appended below.
- Lesson 2960 — OpenPGP Message Format and Operations
- Client
- (photo app) asks the **Resource Owner** (you) for permission
- Lesson 756 — OAuth 2.0 Overview and Roles
- Client Associations
- Wireless devices constantly communicate with their connected APs.
- Lesson 355 — Wireless Network Topology Mapping
- Client certificate authentication
- for mutual TLS (strongest option for device identity)
- Lesson 2781 — MQTT Security Architecture
- Client Certificates
- The most common approach for admin access.
- Lesson 1663 — API Server Authentication Mechanisms
- Client confidential data
- (business information, vulnerabilities)
- Lesson 2092 — Legal Agreements and Authorization
- Client connects
- to the wireless network and initiates 802.
- Lesson 542 — EAP-TLS and Certificate-Based Authentication
- Client control
- Allow clients to refuse pushed resources using `RST_STREAM` frames
- Lesson 1100 — HTTP/2 Server Push Security Risks
- Client Credentials Flow
- is for machine-to-machine communication where no user is involved.
- Lesson 1011 — OAuth 2.0 Flows for API Access
- Client Credentials Grant
- is for machine-to-machine communication where no user is involved.
- Lesson 757 — OAuth 2.0 Grant Types
- Client encrypts data
- using a key only the application server possesses (or derived through key exchange)
- Lesson 1775 — End-to-End Encryption Architectures
- Client isolation
- (sometimes called "AP isolation" or "wireless isolation") prevents wireless clients connected to the same access point from communicating directly with each other.
- Lesson 552 — Client Isolation and Network Segmentation
- Client probing behavior
- – devices broadcasting previous network names
- Lesson 550 — Wireless Packet Capture and Analysis
- Client Requirements
- Lesson 485 — TLS VPNs: Architecture and Differences from IPsec
- Client sends request
- During TLS handshake, the client contacts an OCSP responder (URL specified in the certificate's "Authority Information Access" extension)
- Lesson 192 — Online Certificate Status Protocol (OCSP)
- Client side
- The request must set `credentials: 'include'` (in JavaScript fetch) or `withCredentials: true` (in XMLHttpRequest)
- Lesson 877 — Credentials and CORS: Access-Control-Allow-Credentials
- Client software
- on your device authenticates you (username/password, certificate, or multi-factor authentication)
- Lesson 467 — Remote Access VPNs
- Client-side
- Add `route 192.
- Lesson 491 — Client Configuration and Split TunnelingLesson 705 — Session Storage Mechanisms: Server- Side vs Client-Side
- Client-side code inspection
- revealing hidden endpoints
- Lesson 1019 — Broken Function-Level Authorization
- Client-side decryption
- Recipients' devices receive the encrypted file and the key separately, decrypting locally
- Lesson 2968 — End-to-End Encrypted File Sharing
- client-side encryption
- , you encrypt your data *before* it ever leaves your infrastructure and travels to the cloud.
- Lesson 1766 — Client-Side Encryption for Cloud DataLesson 1799 — Performance Impact of Database EncryptionLesson 2968 — End-to-End Encrypted File Sharing
- Client-Side HPP
- occurs when polluted parameters are **reflected in URLs or embedded in the client's browser**, affecting JavaScript execution, client-side routing, or subsequent requests the browser makes.
- Lesson 933 — Server-Side vs Client-Side HPP
- Client-side logic manipulation
- Lesson 1193 — Prototype Pollution Fundamentals
- Client-Side Session Data
- Some applications store session data entirely in cookies (like JWTs without signatures or weakly signed tokens).
- Lesson 827 — Session and Cookie Manipulation
- Client-side validation
- (browser JavaScript) — Quick feedback for users, but *never trusted* since attackers bypass it easily
- Lesson 1152 — Validation Layers and Defense in DepthLesson 1209 — Defense in Depth Through Layered Validation
- Clip gradients per example
- Instead of computing one big gradient from the entire batch, calculate each training example's gradient separately and limit its magnitude (clip it).
- Lesson 2841 — DP-SGD and Private Training Algorithms
- Clock attacks
- exploit systems with incorrect time settings.
- Lesson 188 — Time Validation and Clock Attacks
- Clock skew
- is the difference between a system's recorded time and true time (typically UTC from an authoritative source).
- Lesson 2418 — Time Source Synchronization and Clock Skew
- Clone devices
- by copying cryptographic keys stored in unprotected memory
- Lesson 2755 — Physical Security Threats to IoT Devices
- Cloning
- Once captured, the credential is written to a blank writable RFID card or tag.
- Lesson 2274 — Badge Cloning and RFID AttacksLesson 2280 — Badge and Card-Based Access Systems
- Closed port
- Usually sends back an **ICMP port unreachable** message (the OS tells you "nothing is listening here")
- Lesson 341 — UDP Scanning Techniques
- Closing Attack Vectors
- Patch the vulnerability or fix the misconfiguration that allowed initial access.
- Lesson 2367 — Eradication: Removing the Threat Actor
- Cloud Audit Logs
- (GCP) to track credential usage and source IPs.
- Lesson 1735 — Credential Theft and Token Security
- Cloud backup
- Some apps (Authy, Microsoft Authenticator) offer encrypted cloud backups.
- Lesson 743 — Authenticator Apps and Seed ManagementLesson 2965 — Usability Challenges and Key Management UX
- Cloud backups
- Encrypted blob stored remotely, but the encryption key never leaves your devices or exists only in encrypted form
- Lesson 2947 — E2EE Backup and Multi-Device
- Cloud computation
- Users outsource heavy computations on sensitive business data without trusting the cloud provider with plaintext.
- Lesson 2924 — Homomorphic Encryption Applications
- Cloud Coverage
- Does the vendor support all your cloud providers (AWS, Azure, GCP) and services?
- Lesson 2011 — CSPM Vendor Selection and Deployment
- Cloud IAM roles
- (AWS IAM, Azure Managed Identity, GCP Service Accounts)
- Lesson 1342 — Access Control for Runtime Secret Retrieval
- Cloud impact
- While cloud providers have large bandwidth capacity, volumetric attacks can trigger massive egress charges (you pay for outbound traffic).
- Lesson 1856 — DDoS Attack Types and Cloud Impacts
- Cloud integration
- Connecting on-premises infrastructure to cloud resources
- Lesson 468 — Site-to-Site VPNs
- Cloud Intelligence
- Modern NGAV platforms leverage cloud connectivity to access massive threat databases, receive real-time updates, and submit suspicious files for instant analysis across global threat networks.
- Lesson 1572 — Next-Generation Antivirus (NGAV)
- Cloud metadata access
- Retrieve AWS credentials from `http://169.
- Lesson 621 — XXE Attack Types: SSRF via XXELesson 883 — SSRF Impact and Attack Scenarios
- Cloud metadata services
- are the game-changer.
- Lesson 1204 — Server-Side Request Forgery Enters the Top 10
- Cloud Platform APIs
- AWS ECS task definitions, Azure container configurations, and similar services store environment variable definitions in cloud APIs.
- Lesson 1321 — Environment Variables in Container and Cloud Platforms
- Cloud provider recommendations
- (AWS Well-Architected, Azure Security Baseline)
- Lesson 2006 — Misconfiguration Detection Techniques
- Cloud Provider Responsibilities
- Lesson 1904 — Cloud IR Fundamentals and Shared Responsibility
- Cloud provider tooling
- AWS's EC2 snapshot analysis, Azure's Disk Export, GCP's persistent disk cloning
- Lesson 1922 — Cloud Forensics Tools and Legal Considerations
- Cloud security posture
- (compliance drift, misconfigurations)
- Lesson 3043 — Dashboard Tools and Integration
- Cloud service logs
- (like CloudTrail, Azure Activity Log, or GCP Cloud Audit Logs) record every API call made in your environment—who did what, when, and from where.
- Lesson 1917 — Cloud Log Collection for Forensics
- Cloud services
- (AWS, Azure, Google Cloud, SaaS platforms) log API calls, configuration changes, and access patterns.
- Lesson 2316 — Log Sources and Event Collection Methods
- Cloud SIEM
- is your security operations command center—it collects logs and events from all those sources you've been configuring (CloudTrail, VPC Flow Logs, application logs, etc.
- Lesson 1878 — Cloud SIEM Architecture and Components
- Cloud storage access
- crosses from your controlled infrastructure into a third-party security domain
- Lesson 2639 — Trust Boundary Analysis
- Cloud VPCs
- (Virtual Private Clouds) create isolated network segments in AWS, Azure, or GCP.
- Lesson 426 — Virtual Firewalls and Cloud Architectures
- Cloud-based and distributed cracking
- solves this by spreading the workload across multiple high-powered machines, turning months of cracking time into hours.
- Lesson 2234 — Cloud-Based and Distributed Cracking
- Cloud-based redirectors
- Disposable instances on AWS, Azure, or DigitalOcean
- Lesson 2223 — C2 Infrastructure Setup
- Cloud-native engines
- like AWS Service Control Policies, Azure Policy, and GCP Organization Policy enforce rules at the platform level, complementing IaC validation.
- Lesson 2015 — Policy as Code for IaC Validation
- Cloud-native platforms
- Cloud Custodian, Prowler, or ScoutSuite for configuration forensics
- Lesson 1922 — Cloud Forensics Tools and Legal Considerations
- Cloud-native policies
- (AWS Config Rules, Azure Policy, GCP Organization Policy)
- Lesson 1997 — Mandatory Tags for Security and Compliance
- Cloud-native services
- AWS Config Rules with automatic remediation actions, Azure Policy with `deployIfNotExists` effects
- Lesson 3046 — Auto-Remediation for Infrastructure Drift
- CloudTrail
- (AWS), **Activity Logs** (Azure), or **Cloud Audit Logs** (GCP) to track credential usage and source IPs.
- Lesson 1735 — Credential Theft and Token Security
- CloudTrail API activity
- showing unusual IAM role assumption
- Lesson 1902 — Multi-Signal Correlation for Detection
- CloudTrail Events
- Monitors API activity for compromised credentials, unusual console logins, privilege escalation, and configuration changes
- Lesson 1887 — AWS GuardDuty Fundamentals
- CloudTrail/Activity Logging
- Enable comprehensive API logging to capture every IAM action.
- Lesson 1761 — Privilege Escalation Detection and Prevention
- CloudTrail/Activity Logs
- Track configuration changes that might weaken encryption (e.
- Lesson 1780 — Transit Encryption Monitoring and Compliance
- CloudWatch Logs
- with flow log data showing internal IPs and traffic patterns
- Lesson 1818 — VPC Deletion and Cleanup Security
- ClusterFuzz
- is the underlying infrastructure that powers OSS-Fuzz.
- Lesson 1394 — Continuous Fuzzing and Integration
- Clustering analysis
- Group similar samples; isolated clusters may contain attacks
- Lesson 2826 — Defense Strategies Against Poisoning
- ClusterRoleBinding
- grants a ClusterRole's permissions cluster-wide
- Lesson 1664 — Role-Based Access Control (RBAC) Fundamentals
- ClusterRoles
- work across the entire cluster or for cluster-wide resources (like nodes).
- Lesson 1664 — Role-Based Access Control (RBAC) Fundamentals
- CMS/PKCS#7
- is the standard for enterprise systems, email (S/MIME), and document signing.
- Lesson 232 — Detached Signatures and Signature Formats
- CN (Common Name)
- The entity's primary identifier
- Lesson 172 — Certificate Fields: Subject and Issuer Distinguished Names
- Cobalt Strike
- is purpose-built for red team operations with advanced command-and-control (C2), malleable profiles for evasion, and collaboration features.
- Lesson 2216 — Exploitation Framework LandscapeLesson 2217 — Metasploit vs. Alternative Frameworks
- Code Challenge
- The client hashes the verifier (typically with SHA-256) to create a "lock.
- Lesson 759 — PKCE (Proof Key for Code Exchange)Lesson 1089 — Authorization Code Flow with PKCE for SPAs
- Code Coverage Metrics
- Lesson 3040 — Application Security Metrics
- Code deployment
- A developer writes code, but a separate reviewer must approve it before production
- Lesson 7 — Separation of Duties and Privilege SeparationLesson 2664 — Separation of Duties
- Code deployment gates
- Automated tests *and* peer review *and* security scan must all pass
- Lesson 2631 — Separation of Privilege
- Code execution
- Invoke system functions through template syntax
- Lesson 1249 — SSTI Detection and Exploitation Techniques
- Code execution sandboxing
- Run generated code in containerized environments with restricted permissions, network access, and resource limits
- Lesson 2862 — LLM Output Validation and Sandboxing
- Code Injection
- Targets the application runtime (like PHP or JavaScript eval), executing application code
- Lesson 602 — Command Injection FundamentalsLesson 2394 — Memory-Resident Malware Detection
- Code Integrity Policies
- define what code can run based on cryptographic signatures, file hashes, or publisher certificates.
- Lesson 1594 — Windows Defender Application Control (WDAC)
- Code manipulation
- Malicious apps cannot modify another app's code or behavior
- Lesson 2713 — Android Application Sandboxing
- Code pattern analysis
- Does the program attempt to decrypt itself at runtime?
- Lesson 1566 — Heuristic Analysis Techniques
- Code Reuse
- A "single-use" coupon code that isn't properly invalidated after redemption can be applied repeatedly, either by the same user or shared publicly.
- Lesson 922 — Coupon and Discount Code Abuse
- Code signing
- Developers sign executables to prevent malware injection
- Lesson 225 — Digital Signature Fundamentals and Use CasesLesson 2764 — Firmware Update Mechanisms and Validation
- Code signing workflows
- become critical: establish a trusted signing authority, integrate signing into build steps, and configure allowlist policies to trust that signing certificate rather than individual file hashes.
- Lesson 1598 — Allowlisting in DevOps and CI/CD
- Code Verifier
- The client generates a random, unpredictable string (43-128 characters).
- Lesson 759 — PKCE (Proof Key for Code Exchange)
- Code Verifier Creation
- Your SPA generates a random string called a `code_verifier` (43-128 characters, cryptographically random)
- Lesson 1089 — Authorization Code Flow with PKCE for SPAs
- Code-based cryptography
- Relies on error-correcting codes and decoding problems.
- Lesson 268 — Post-Quantum Cryptography Fundamentals
- Code-level defaults
- Lesson 839 — Deny by Default Principles
- CodeBuild
- Inject malicious build scripts that execute with the project's service role
- Lesson 1757 — Service-Specific Escalation Vectors
- Cognitive overload
- developers and security teams can't hold the entire system in their heads
- Lesson 2632 — Economy of Mechanism (Keep It Simple)Lesson 2965 — Usability Challenges and Key Management UX
- Cold start
- The platform provisions a fresh execution environment.
- Lesson 1942 — Function Execution Context and Isolation
- Cold start artifacts
- sometimes leave temporary data in `/tmp` directories, but these disappear after warm containers recycle.
- Lesson 1920 — Container and Serverless Forensics
- Cold starts and timeouts
- Can enable denial-of-wallet attacks
- Lesson 1940 — Serverless Architecture and Security Implications
- Cold storage
- (31-365 days): Slower access, reduced cost (often 50-80% cheaper)
- Lesson 1883 — Scalability and Cost OptimizationLesson 2315 — SIEM Architecture: Collectors, Aggregators, and Storage
- Cold/archive
- Long-term retention (1-7 years) on cheaper storage or offline
- Lesson 1484 — Log Rotation and Retention Policies
- Collaboration
- enables security and development teams to review changes together using pull requests
- Lesson 2056 — Security as Code Fundamentals
- Collaboration Servers
- Lesson 893 — Testing for SSRF Vulnerabilities
- Collaborative gap analysis
- Both teams identify blind spots together
- Lesson 2168 — Purple Team: Bridging Red and Blue
- Collect comprehensively
- Don't just grab obvious logs—capture load balancer logs, DNS query logs, authentication logs, and configuration change histories.
- Lesson 1917 — Cloud Log Collection for Forensics
- Collect only what's needed
- for the specific purpose (data minimization built into forms and APIs)
- Lesson 2883 — Privacy Embedded into Design
- Collect timestamps
- from all evidence sources you've gathered
- Lesson 2417 — Timeline Construction Fundamentals
- Collection
- Entropy sources feed unpredictable data into the pool
- Lesson 295 — Entropy Pool ManagementLesson 2178 — Tactics: The Why Behind Adversary ActionsLesson 2334 — Threat Intelligence Fundamentals and the Intelligence LifecycleLesson 2596 — Privacy Criterion and GDPR AlignmentLesson 2619 — Evidence Collection and PreservationLesson 2885 — End- to-End Security and Lifecycle Protection
- Collection Agents
- run on each monitored system, gathering logs from local files, the systemd journal, or application outputs, then shipping them reliably to aggregators or directly to the central server.
- Lesson 1483 — Centralized Log Management Architecture
- Collection and Storage
- Document *what* vulnerabilities exposed data without copying entire databases.
- Lesson 2096 — Data Handling and Confidentiality
- Collection Period
- Gather data for 30–90 days minimum (avoiding holiday/incident anomalies)
- Lesson 2348 — Baseline Establishment and Anomaly Detection
- Collector server
- Runs the Windows Event Collector service and defines subscriptions (which events to collect from which computers)
- Lesson 1510 — Windows Event Forwarding (WEF) and Collection
- Collector-initiated
- Collector pulls logs from specified computers (simpler for small networks)
- Lesson 1510 — Windows Event Forwarding (WEF) and Collection
- Collectors
- are distributed agents or forwarders deployed near data sources.
- Lesson 2315 — SIEM Architecture: Collectors, Aggregators, and Storage
- Collectors (SharpHound)
- gather data from Active Directory about users, groups, computers, sessions, ACLs (Access Control Lists), and trust relationships.
- Lesson 2240 — BloodHound for Active Directory Attack Paths
- Collects results
- Captures findings in a structured format (JSON, XML)
- Lesson 1401 — Dynamic Testing and DAST in Pipelines
- Collision resistance
- takes this further: it must be impossibly hard to find *any pair* of different inputs—call them `input1` and `input2`—where `hash(input1) == hash(input2)`.
- Lesson 201 — Collision ResistanceLesson 202 — The Birthday Paradox and Collision ProbabilityLesson 208 — MD5 and SHA-1: Broken Hash Functions
- Colonial Pipeline (2021)
- Ransomware forced shutdown of critical fuel infrastructure
- Lesson 2805 — OT-Specific Threats and Attacks
- Column count match
- Your injected SELECT must return the same number of columns (covered in lesson 565)
- Lesson 578 — Union-Based SQLi Data Extraction
- Column-family stores
- (Cassandra): Wide tables with flexible columns
- Lesson 594 — NoSQL Database Fundamentals and Attack Surface
- Column-level encryption
- Higher overhead (10-25%) because queries can't use indexes on encrypted columns
- Lesson 1799 — Performance Impact of Database Encryption
- Combine
- hash and salt through a clever mathematical process involving mask generation functions
- Lesson 148 — PSS: Probabilistic Signature SchemeLesson 164 — ECDSA (Elliptic Curve Digital Signature Algorithm)
- Combined factors
- Often both—your fingerprint unlocks a cryptographic key stored on your phone
- Lesson 750 — Passwordless Authentication Fundamentals
- Command & Control
- Can network monitoring spot unusual outbound connections?
- Lesson 74 — Kill Chain Threat Modeling
- Command and Control
- Communicate with compromised systems
- Lesson 2178 — Tactics: The Why Behind Adversary Actions
- Command Chaining
- If sudo allows commands that can execute others (like `find`, `vim`, `less`, `awk`), attackers escape to shells:
- Lesson 2142 — Sudo Misconfigurations and Exploits
- Command execution
- `xp_cmdshell` in MSSQL runs Windows shell commands; `COPY PROGRAM` in PostgreSQL can invoke system utilities
- Lesson 585 — File System and OS Command ExecutionLesson 3050 — ChatOps and Collaboration Integration
- Command history
- Recent commands executed by users or attackers
- Lesson 2389 — Memory Forensics Fundamentals
- Command History Clearing
- Removing shell history files (`.
- Lesson 2126 — Covering Tracks and Anti-Forensics
- Command Injection
- Targets the operating system layer, executing shell commands
- Lesson 602 — Command Injection FundamentalsLesson 1148 — Why Input Validation MattersLesson 1372 — Active Scanning and Attack SimulationLesson 2787 — BACnet and Modbus Protocol Security
- Command-and-Control (C2) Traffic
- Lesson 382 — Identifying Malicious Traffic PatternsLesson 2412 — Identifying Malicious Network Activity
- Command-and-control beaconing
- Repeated connections to external IPs at regular intervals
- Lesson 2410 — Network Flow Analysis
- CommandLineEventConsumer
- to execute commands directly—all without writing malicious files to disk.
- Lesson 1541 — WMI Event Subscriptions
- Comment-like behavior
- Closing parentheses prematurely to ignore password checks
- Lesson 612 — LDAP Injection Fundamentals
- Commercial feeds
- are subscription-based services that provide curated, high-fidelity threat data.
- Lesson 2339 — Threat Intelligence Feeds and Sources
- Commercial tools
- like Tenable Nessus, Qualys, and Rapid7 offer broader scanning capabilities with benchmark assessment features.
- Lesson 1415 — Benchmark Assessment and Scanning Tools
- Commit/Build Stage
- Lesson 2045 — Security Testing in the CI/CD Pipeline
- Common attack scenario
- Lesson 1066 — postMessage XSS and Data Injection
- Common attack vectors
- Lesson 1164 — Homograph and Visual Spoofing Attacks
- Common attack vectors include
- Lesson 2775 — Physical Tampering and Anti-Tamper Mechanisms
- Common automated scenarios
- Lesson 1911 — Cloud IR Playbooks and Automation
- Common configurations
- Lesson 708 — Session Timeout and Idle Management
- Common Criteria (CC)
- for international security evaluations
- Lesson 2779 — Hardware Security Testing and Evaluation
- Common deployment models
- Lesson 1382 — IAST Deployment Models and Performance Impact
- Common epsilon ranges
- Lesson 2914 — Privacy Budget and Epsilon
- Common error pattern
- Lesson 1823 — Network ACL Rule Ordering and Evaluation
- Common escalation methods
- Lesson 584 — Privilege Escalation via SQL Injection
- Common exploitation patterns
- Lesson 679 — DOM Clobbering Attacks
- Common incident criteria
- Lesson 2361 — Incident vs Event: Defining the Threshold
- Common Language
- It gives developers, security teams, and management a shared vocabulary
- Lesson 1200 — History and Purpose of the OWASP Top 10
- Common mistakes to avoid
- Lesson 2018 — Least Privilege in IaC: Roles, Permissions, and Service Accounts
- Common parser hardening steps
- Lesson 625 — XXE Prevention: Parser Configuration
- Common passwords
- ("iloveyou", "letmein") appear in every dictionary wordlist
- Lesson 696 — Brute Force and Dictionary Attacks
- Common pitfall
- Never store sensitive data in regular `SharedPreferences` or internal storage as plaintext.
- Lesson 2720 — Android Secure Storage and Data Protection
- Common predictable patterns
- Lesson 814 — Sequential and Predictable Identifiers
- Common Reference String (CRS)
- essentially mathematical values that both the prover and verifier need to create and check zero- knowledge proofs.
- Lesson 245 — Trusted Setup and Universal Reference Strings
- Common risk scenarios
- Lesson 1722 — Service Account Keys and Credentials
- Common risks
- Lesson 2877 — Malicious Pre-trained Models
- Common SLA framework example
- Lesson 2453 — Vulnerability Age and Remediation SLAs
- Common tamper scripts
- Lesson 590 — SQLMap Evasion and Tampering Scripts
- Common Use Cases
- Lesson 307 — Trusted Platform Modules (TPMs)
- Common uses
- Lesson 129 — Associated Data in AEAD
- Common vulnerabilities
- Lesson 815 — GUID and UUID VulnerabilitiesLesson 2817 — Transferability of Adversarial Examples
- Common vulnerable fields
- Lesson 928 — Mass Assignment Fundamentals
- Common vulnerable headers
- Lesson 1119 — Cache Poisoning via HTTP Header Injection
- Communicate
- status to stakeholders
- Lesson 1868 — CDN Monitoring and Incident ResponseLesson 2500 — Risk Calculation and Risk Matrices
- Communication breakdowns
- Were escalation paths followed?
- Lesson 2369 — Lessons Learned and Process Improvement
- Communication Channels
- Establish out-of-band communication (not just cloud-native tools) since attackers may have compromised your cloud environment's messaging systems.
- Lesson 1912 — Multi-Account and Cross-Region IR
- Communication is Critical
- Certificate authorities publish CRLs and operate Online Certificate Status Protocol (OCSP) responders to inform verifiers about revoked certificates in real-time.
- Lesson 318 — Key Revocation and Compromise Response
- Communication paths
- How different parts of an organization connect
- Lesson 353 — Gateway and Router Identification
- Communication Platforms
- keep the IR team, leadership, and external stakeholders synchronized.
- Lesson 2373 — IR Tool Selection and Deployment
- Communication protocols
- Notify stakeholders immediately
- Lesson 1605 — Patch Rollback and Emergency ProceduresLesson 2072 — Responsible Disclosure FundamentalsLesson 2094 — Communication Protocols and EscalationLesson 2370 — Incident Response Plan Development
- Communication templates
- Status updates for stakeholders and customers
- Lesson 1861 — DDoS Response and Incident ManagementLesson 2372 — IR Playbooks and Runbooks
- Community images
- are user-contributed—they might be convenient, but you're trusting unknown maintainers who may abandon them or include malicious code.
- Lesson 1633 — Base Image Selection and Trust
- Compact certificate profiles
- Using minimal extensions, shorter validity periods, and compressed encodings
- Lesson 2792 — Certificate-Based Authentication in Constrained Devices
- Company websites
- expose organizational structure, vendors, and technologies used
- Lesson 2254 — Spear Phishing and Targeted Attacks
- Company-specific
- Employee names, product names, locations from OSINT
- Lesson 2227 — Dictionary Attacks with Wordlists
- Compare
- – Examine changed files against known-good baselines
- Lesson 1504 — FIM Alert Analysis and Response
- Compare responses
- between authorized and unauthorized attempts
- Lesson 819 — Testing for IDOR VulnerabilitiesLesson 2209 — Burp Repeater for Manual Testing
- Compare SBOMs
- between expected and actual dependencies
- Lesson 1301 — Automated Package Verification Workflows
- Compare scenarios
- "Without controls: $2M annual loss.
- Lesson 2516 — Risk Analysis Documentation and Communication
- Compare to baseline
- (random guessing = 50% accuracy)
- Lesson 2845 — Privacy Auditing and Empirical Measurement
- Comparer
- highlights byte-level or word-level differences between two HTTP responses or requests.
- Lesson 2215 — Advanced Burp Features and Workflows
- Comparison
- Scan results are matched against the policy requirements
- Lesson 1621 — Compliance Scanning and Validation
- Compatibility
- Legacy systems may require SHA-1 (for non-security purposes only) or SHA-256
- Lesson 216 — Hash Function Selection in Modern Systems
- Compatibility checks
- Do applications interact correctly after patching?
- Lesson 1603 — Patch Testing and Staging
- Compatibility risks
- Business-critical plugins or integrations may break with updates.
- Lesson 2460 — Third-Party and Application Patching
- Compatibility Testing
- Test EDR agents in non-production environments first.
- Lesson 1583 — EDR Deployment and Performance ConsiderationsLesson 2455 — Patch Testing and Staging Environments
- Compelling subject line
- designed to trigger emotional response
- Lesson 2253 — Email-Based Phishing Fundamentals
- compensating control
- is an alternative security measure that provides equivalent or comparable protection when the primary control isn't feasible.
- Lesson 26 — Compensating ControlsLesson 2463 — What Are Compensating Controls
- Compensating controls
- Lesson 26 — Compensating ControlsLesson 35 — Balancing Security with Usability and Business GoalsLesson 57 — Tampering with Data ThreatsLesson 1267 — Unmaintained Dependencies and End-of-Life LibrariesLesson 2160 — Vulnerability Severity and Risk RatingLesson 2166 — Retest and Validation ProcessLesson 2441 — False Positives and Validation
- Compile and deliver
- within regulatory timeframes (typically 30 days)
- Lesson 2935 — Right to Access and Data Portability
- Complete
- (not selectively edited)
- Lesson 2379 — Evidence Collection Principles and Legal ConsiderationsLesson 2546 — Evidence Collection and Documentation
- Complete and unaltered
- (full logs, not cherry-picked samples)
- Lesson 2618 — Audit Evidence Types and Requirements
- Complete Mediation
- (checking every access), **Least Privilege** (minimal permissions), or **Defense in Depth** (multiple layers), you're already building multiple components.
- Lesson 8 — Economy of Mechanism and Keep It SimpleLesson 11 — Trust Boundaries and Implicit TrustLesson 20 — Attribute-Based Access Control (ABAC)Lesson 21 — Security Frameworks: NIST Cybersecurity FrameworkLesson 23 — Defense-in-Depth PhilosophyLesson 25 — Perimeter vs Internal SecurityLesson 42 — Creating a Data Flow Diagram (DFD)Lesson 57 — Tampering with Data Threats (+11 more)
- Complete Protection
- (`NSFileProtectionComplete`): Data accessible only when device is unlocked.
- Lesson 2704 — Data Protection API and Keychain
- Complete separation
- between critical security parameters and operators
- Lesson 1768 — Hardware Security Modules (HSMs) in Cloud
- Completely breaks authentication
- , allowing attackers to forge valid tags for arbitrary messages
- Lesson 102 — GCM Implementation Pitfalls
- completeness
- don't just test the happy path.
- Lesson 831 — Authorization Testing MethodologyLesson 1279 — SBOM Contents and Metadata QualityLesson 1490 — Log Management for ComplianceLesson 2082 — Penetration Testing Methodologies
- Complex boolean logic
- – Combine AND, OR, NOT operators with wildcards and regular expressions for precise hunting.
- Lesson 2320 — SIEM Query Languages and Search
- Complex processing
- (images resized, documents parsed)
- Lesson 945 — File Upload Attack Surface and Risk Assessment
- Complexity
- Simple, stable utilities may be safer than complex parsers
- Lesson 1267 — Unmaintained Dependencies and End-of-Life LibrariesLesson 2894 — Data Minimization Principle
- Compliance
- Many regulations (SOC 2, HIPAA, PCI-DSS) require proof that sensitive data access is monitored and traceable
- Lesson 1316 — Audit Trails and Secret Access LoggingLesson 1682 — Container as a Service Security
- Compliance alignment
- Many regulations (PCI-DSS, HIPAA) require specific data fields to be encrypted separately.
- Lesson 1794 — Column-Level and Field-Level EncryptionLesson 1841 — Direct Connect and Dedicated ConnectivityLesson 1845 — Service Endpoints vs Public Internet Access
- Compliance and Audit
- Regulatory frameworks (PCI-DSS, HIPAA, SOX) mandate logging specific events and retaining them for set periods.
- Lesson 1466 — Introduction to System Logging
- Compliance as Code
- means writing your compliance requirements as actual code that can be executed, tested, and enforced automatically.
- Lesson 2623 — Compliance as Code
- Compliance audits
- demanding proof of hardware separation
- Lesson 1815 — Network Isolation with Dedicated Tenancy
- Compliance boundaries are respected
- Some data may not legally cross certain geographic boundaries
- Lesson 1786 — Cross-Region Replication and Backup Strategies
- Compliance by criticality
- Track high-risk patches separately
- Lesson 1607 — Patch Compliance Monitoring and Reporting
- Compliance checking
- compares a device's current state against your security policy:
- Lesson 2678 — Device Trust and Endpoint Security
- Compliance checks
- – password policies, encryption status, audit configurations
- Lesson 2436 — Authenticated Scanning and Credentialed Checks
- Compliance dashboards
- to monitor tagging coverage
- Lesson 1997 — Mandatory Tags for Security and Compliance
- Compliance enforcement
- Ensure no one can bypass security controls, regardless of policy changes
- Lesson 1707 — IAM Boundaries and Permission Guardrails
- Compliance exposure
- GDPR breach notification required within 72 hours
- Lesson 2431 — Executive Summary and Business Impact
- Compliance failures
- when regulations require detailed access logs
- Lesson 1966 — Insufficient Logging and Monitoring
- Compliance gaps
- Many regulations (PCI DSS, SOC 2) mandate regular credential rotation
- Lesson 1343 — Secret Rotation Fundamentals
- Compliance gates
- Verify license compliance, security scan completion
- Lesson 1403 — Pipeline Security and Release Gates
- Compliance is impossible
- Regulatory requirements cannot be met with the activity
- Lesson 2518 — Risk Avoidance Decisions
- Compliance issues
- Default configurations rarely meet regulatory requirements for network isolation
- Lesson 1813 — Default VPC Security Considerations
- Compliance mode
- is stricter—**no one**, not even the account owner, can delete or modify locked objects until retention expires.
- Lesson 1787 — Object Lock and Immutable Storage
- Compliance monitoring
- rules that alert on unencrypted objects
- Lesson 1790 — Storage Service Encryption Integration
- Compliance officers
- verify regulatory requirements
- Lesson 2064 — Security Sign-Off and Approval Workflows
- Compliance regulations
- HIPAA requires 6 years, PCI-DSS mandates 1 year of audit logs, GDPR limits unnecessary retention
- Lesson 1874 — Log Retention and Lifecycle Policies
- Compliance reporting
- becomes measurable
- Lesson 1618 — Configuration Baselines and Hardening StandardsLesson 1929 — VM Patch Management and Update StrategiesLesson 1993 — Compliance Reporting and Evidence Collection
- Compliance Reporting Dashboards
- aggregate findings from both sources, showing leadership where gaps exist and tracking trends over time.
- Lesson 2496 — Policy Compliance Monitoring and Enforcement
- Compliance Requirements
- Regulations like PCI-DSS often mandate specific rotation frequencies (e.
- Lesson 1344 — Rotation Strategies and FrequenciesLesson 1470 — Log Rotation and RetentionLesson 1491 — Introduction to Linux Auditing FrameworkLesson 1797 — Key Management for Database EncryptionLesson 1848 — Private Link Architecture and Use Cases
- Compliance responsibility mapping
- is the process of determining which party (cloud provider or customer) is responsible for implementing and maintaining each control required by regulations like HIPAA, PCI-DSS, SOC 2, or GDPR.
- Lesson 1691 — Compliance Responsibility Mapping
- Compliance Rule Deviations
- Detect when resources fall out of compliance with security standards—encryption disabled on a bucket, logging turned off, or MFA removed from privileged accounts.
- Lesson 2026 — Drift Detection for Security Policies and Permissions
- Compliance scanning
- automates the process of checking whether systems adhere to defined security standards and regulatory frameworks.
- Lesson 1621 — Compliance Scanning and Validation
- Compliance Scanning and Validation
- (the previous lesson) detects **Configuration Drift** — like an unauthorized service running or a weak password policy — you have two choices: fix it manually or automate the correction.
- Lesson 1622 — Remediation and Enforcement
- Compliance scans
- (targeted): Check specific regulatory requirements (PCI-DSS, HIPAA)
- Lesson 2440 — Scan Configuration and Optimization
- Compliance scope identification
- Quickly find all resources subject to HIPAA or PCI DSS (`ComplianceScope=HIPAA`)
- Lesson 1996 — Cloud Resource Tagging Strategy and Standards
- Compliance Scores
- aggregate control implementation percentages across frameworks (CIS, NIST, PCI-DSS).
- Lesson 3037 — Key Security Metrics and KPIs
- Compliance standards
- (PCI DSS, HIPAA technical requirements)
- Lesson 2006 — Misconfiguration Detection Techniques
- Compliance validation
- checks resources against policies continuously (CSPM, Policy as Code)
- Lesson 2059 — Security Automation and Orchestration
- Compliance Violations
- Drifted resources may fail audit requirements because they no longer match documented, approved configurations.
- Lesson 2022 — Infrastructure Drift: Causes and Risks
- Compliance-driven
- Often required for regulatory frameworks
- Lesson 2171 — Adversary Emulation vs Penetration Testing
- Compliant device
- Full access granted (perhaps to production systems)
- Lesson 2678 — Device Trust and Endpoint Security
- Component interactions
- which services talk to each other and how?
- Lesson 78 — Architecture Review and Threat Identification
- Component removal
- Desoldering flash chips or secure elements to read them with specialized equipment
- Lesson 2775 — Physical Tampering and Anti-Tamper Mechanisms
- Components
- Exported activities, services, broadcast receivers, or content providers (`android:exported="true"`) are publicly accessible—potential attack entry points.
- Lesson 2714 — APK Structure and Manifest Analysis
- Comprehensive Logging
- Every request passes through one point, making it easy to log, monitor, and audit API access patterns.
- Lesson 1043 — API Gateway and Defense Patterns
- Comprehensive Transition Verification
- Check every constraint before allowing a state change: Has the previous step completed?
- Lesson 919 — Defensive Workflow State Management
- Compressed risk assessment
- Use CVSS, EPSS, and asset criticality to confirm emergency status
- Lesson 2459 — Emergency and Out-of-Band Patching
- Compression
- They take arbitrary-length input and produce fixed-length output
- Lesson 198 — Hash Function FundamentalsLesson 1470 — Log Rotation and RetentionLesson 1484 — Log Rotation and Retention Policies
- Compression artifacts
- Real-world distribution (social media compression) destroys subtle detection signals
- Lesson 2864 — Deepfakes: Generation Techniques and Detection ChallengesLesson 2867 — Deepfake Detection: Forensic Artifacts and ML Classifiers
- Compression before encryption
- (if applicable—encrypted data doesn't compress)
- Lesson 2971 — Large File Transfer Security
- Compromise certificate validation
- Create fraudulent certificates that hash to expected values
- Lesson 199 — Preimage Resistance
- Compromise Recording
- is the design principle that assumes breaches *will* happen—so your system must create an unforgeable trail of evidence when they do.
- Lesson 2635 — Compromise Recording and AuditabilityLesson 2654 — Defense-in-Depth: Core Concept and Philosophy
- Compromised API sources
- can inject malicious data into your system
- Lesson 1036 — API10:2023 - Unsafe Consumption of APIs
- Compromised credentials
- that grant legitimate-looking access past perimeter controls
- Lesson 25 — Perimeter vs Internal SecurityLesson 1696 — Identity as Attack SurfaceLesson 1891 — Identity-Based Threat Detection
- Compromised insiders
- have their legitimate credentials stolen by external attackers, turning them into unwitting accomplices.
- Lesson 52 — Insider Threats and Privileged Access Abuse
- Compromised keychain
- Root access may expose encrypted credentials
- Lesson 2708 — iOS Jailbreaking and Detection
- Compromised password detection
- acts like a security checkpoint at account creation or password reset: before accepting a new password, you verify it hasn't appeared in known breaches.
- Lesson 701 — Compromised Password DetectionLesson 702 — Password Expiration and Rotation Policies
- Compromised Websites
- Legitimate websites get hacked and injected with malicious code.
- Lesson 1528 — Drive-by Downloads and Web-Based Infection
- Computational cost
- Each ratchet step adds processing overhead
- Lesson 2981 — Post-Compromise Security and Future Secrecy
- Compute resource hijacking
- shows several telltale signs:
- Lesson 1893 — Cryptomining and Resource Abuse Detection
- Compute two values
- from the message hash and signature components
- Lesson 164 — ECDSA (Elliptic Curve Digital Signature Algorithm)
- Computer Discovery
- Cataloging domain-joined workstations and servers helps you identify valuable targets (domain controllers, file servers, database hosts) and plan lateral movement paths.
- Lesson 2123 — Domain Enumeration and Reconnaissance
- Concentration risk analysis
- Identify single points of failure (e.
- Lesson 2540 — Fourth-Party and Supply Chain Risk
- Conceptual approach
- Lesson 569 — Boolean-Based Blind SQL Injection
- Conceptual example in MongoDB
- Lesson 597 — NoSQL Blind Injection and Timing Attacks
- Concurrent connection limits
- Reduce simultaneous connections to a target
- Lesson 2440 — Scan Configuration and Optimization
- Concurrent execution limits
- Set maximum simultaneous function instances (e.
- Lesson 1948 — Serverless Denial of Service and Resource Limits
- Concurrent Modifications
- Multiple team members or pipelines modify the same resources without coordination.
- Lesson 2022 — Infrastructure Drift: Causes and Risks
- Concurrent Session Exploitation
- occurs when an application either:
- Lesson 719 — Concurrent Session Exploitation
- Concurrent session management
- decides how many active sessions a user can have simultaneously and provides controls to manage them.
- Lesson 710 — Concurrent Sessions and Device Management
- Condition
- (optional) — Additional constraints like time of day, source IP address, or MFA requirement.
- Lesson 1703 — Policy Structure and Syntax FundamentalsLesson 1713 — Policy Structure: Elements, Syntax, and Evaluation LogicLesson 1951 — Function Execution Role DesignLesson 1952 — Resource- Based Policies for FunctionsLesson 2548 — Audit Findings and Risk Rating
- Condition keys
- Add conditions like IP ranges, time windows, or MFA requirements where applicable.
- Lesson 1950 — Least Privilege for Serverless Functions
- conditional access
- rules you learned earlier to enforce time-based or context-based restrictions on sensitive operations.
- Lesson 1749 — Access Analyzer and Unused Access DetectionLesson 2745 — BYOD Security Strategies
- Conditional logic
- Does "if severity = high" correctly filter critical alerts?
- Lesson 2332 — Playbook Testing and Validation
- Conditions
- Time validity window, audience restrictions (which service provider can use this)
- Lesson 778 — SAML Assertions and ClaimsLesson 1703 — Policy Structure and Syntax FundamentalsLesson 1989 — Azure Policy and BlueprintsLesson 2327 — Playbook Design Fundamentals
- Conditions are AND gates
- All conditions in a statement must be satisfied
- Lesson 1713 — Policy Structure: Elements, Syntax, and Evaluation Logic
- Confidence
- High-confidence findings deserve immediate attention.
- Lesson 1367 — Interpreting and Triaging SAST ResultsLesson 2349 — Alert Fatigue Management
- Confidence level
- indicating likelihood of being a true positive
- Lesson 1367 — Interpreting and Triaging SAST Results
- Confidential
- Sensitive business data (financial reports, strategic plans)
- Lesson 1801 — Data Classification FundamentalsLesson 2491 — Data Classification and Handling PolicyLesson 2652 — Data Segmentation and Classification
- Confidential clients
- (backend servers) can securely store secrets—think of a locked vault.
- Lesson 764 — OAuth 2.0 Client Authentication
- Confidential Computing
- takes this further using **hardware-based trusted execution environments (TEEs)**, such as Intel SGX or AMD SEV.
- Lesson 1800 — Always Encrypted and Confidential Computing
- Confidentiality
- Fewer people with access = fewer chances for leaks
- Lesson 2 — Least Privilege PrincipleLesson 3 — Defense in DepthLesson 13 — CIA Triad: Confidentiality, Integrity, AvailabilityLesson 15 — Bell-LaPadula Model: Confidentiality ControlLesson 23 — Defense-in- Depth PhilosophyLesson 49 — Motivations: Espionage and Intelligence GatheringLesson 59 — Information Disclosure ThreatsLesson 63 — STRIDE per Interaction Analysis (+13 more)
- Confidentiality Criterion
- in SOC 2 reporting focuses on protecting information designated as confidential from unauthorized access, use, or disclosure.
- Lesson 2595 — Confidentiality Criterion
- Configuration approach
- Start with a global deny rule, then layer on specific allow rules based on tested authorization checks.
- Lesson 839 — Deny by Default Principles
- Configuration assessment
- comparing settings against security baselines
- Lesson 1608 — Vulnerability Scanning Fundamentals
- Configuration baseline tracking
- Maintain a known-good state for comparison and recovery
- Lesson 2493 — Change Management and Configuration Control Policy
- Configuration baselines
- solve this chaos by defining a single, documented standard for what a "secure system" looks like.
- Lesson 1618 — Configuration Baselines and Hardening Standards
- Configuration Change Control
- is your formal gatekeeper process ensuring changes are intentional, tested, approved, and traceable.
- Lesson 1623 — Configuration Change Control
- Configuration changes
- can reduce attack surface: disable vulnerable features, restrict access via firewall rules, enforce stricter authentication, or enable additional logging.
- Lesson 2462 — Virtual Patching and Temporary Mitigations
- Configuration Drift
- like an unauthorized service running or a weak password policy — you have two choices: fix it manually or automate the correction.
- Lesson 1622 — Remediation and EnforcementLesson 1986 — Multi-Cloud and Hybrid Compliance Challenges
- Configuration drift detection
- alerts when infrastructure changes unexpectedly
- Lesson 2059 — Security Automation and Orchestration
- Configuration Errors
- Debug endpoints left enabled in production, verbose error messages revealing paths and versions, backup files in web roots (`.
- Lesson 2115 — Exploitation via Misconfiguration
- Configuration errors fail safely
- A typo or misconfiguration results in blocked access (annoying but safe) rather than unintended exposure
- Lesson 839 — Deny by Default Principles
- Configuration File Manipulation
- Applications reading `.
- Lesson 2133 — Registry and File System Permission Weaknesses
- Configuration Files
- Formats like RSS, SOAP messages, or API payloads sent with `Content-Type: application/xml`.
- Lesson 623 — XXE via File Upload and Content TypesLesson 1353 — CI/CD Pipeline Secret ScanningLesson 1493 — File and Directory Watch RulesLesson 3016 — False Positive Management
- Configuration flags
- Security features enabled by default, requiring explicit opt-out
- Lesson 2666 — Fail-Safe Defaults
- Configuration hints
- Error messages, HTTP headers, metadata in documents
- Lesson 2099 — Reconnaissance for Vulnerability Discovery
- Configuration management
- Store private keys securely (mode 0600, root-only access).
- Lesson 498 — WireGuard Deployment Best Practices and Monitoring
- Configuration management platforms
- (like Ansible, Puppet, Chef) can deploy and update iptables/nftables rules across Linux fleets
- Lesson 1590 — Host Firewall Management at Scale
- Configuration management tools
- can enforce it automatically
- Lesson 1618 — Configuration Baselines and Hardening StandardsLesson 1622 — Remediation and Enforcement
- Configuration monitoring
- validates that all production servers still meet PCI-DSS hardening requirements every hour, not just during the annual assessment
- Lesson 2622 — Continuous Compliance Monitoring
- Configuration nuances
- What's vulnerable in default configurations may be safe after proper hardening
- Lesson 2441 — False Positives and Validation
- Configuration review
- Check actual system configs against scanner assumptions
- Lesson 2441 — False Positives and Validation
- Configuration Risk Detection
- Lesson 1791 — Storage Security Scanning and Macie
- configuration state
- of your AWS resources—everything from EC2 instance settings to S3 bucket permissions— creating a historical timeline of changes.
- Lesson 1988 — AWS Config for Compliance MonitoringLesson 2005 — Cloud Asset Discovery and Inventory
- Configuration steps
- Lesson 1954 — VPC Configuration and Network Isolation
- Configuration Vulnerabilities
- A manually opened port or disabled encryption setting creates an attack surface invisible to your IaC security scans and policy checks.
- Lesson 2022 — Infrastructure Drift: Causes and Risks
- ConfigurationChange (Event ID 16-18)
- Track driver installations and Sysmon's own configuration changes, preventing attackers from disabling monitoring.
- Lesson 1514 — Sysmon File and Registry Activity Monitoring
- Configure destinations
- (CloudWatch, Log Analytics workspace, SIEM systems)
- Lesson 1870 — Log Sources and Data Ingestion
- Configure dual-stack VPN support
- by ensuring your VPN handles both IPv4 and IPv6 traffic.
- Lesson 509 — IPv6 Leak Mitigation
- Configure framework logging
- Most logging frameworks support field exclusion lists.
- Lesson 1354 — Preventing Secrets in Logs and Error Messages
- Configure path sensitivity
- and context awareness settings.
- Lesson 1363 — False Positives and Tuning SAST Tools
- Configure SSL certificates
- from your cloud certificate manager
- Lesson 1773 — TLS/SSL in Cloud: Protocol Overview and Configuration
- Configure suppression rules
- in your DAST tool to mark validated false positives, preventing them from reappearing in future scans.
- Lesson 1375 — False Positive Management in DAST
- Confirm authentication works
- with the new secret before invalidating the old one
- Lesson 1349 — Rotation Testing and Rollback
- Confirm scope/permissions
- for the requested resource
- Lesson 1010 — Bearer Token Authentication for APIs
- Confirmed malicious activity
- (not just suspicious)
- Lesson 2361 — Incident vs Event: Defining the Threshold
- Conflict Detection
- When multiple policies apply to the same resource, they might contradict each other (one allows, another denies).
- Lesson 3024 — Policy Testing and Validation
- Conflicts with existing design
- Adding encryption or access controls later can break functionality
- Lesson 12 — Security as a Non-Functional Requirement
- Confusion
- means making the relationship between the key and the ciphertext as complex as possible.
- Lesson 85 — Block Cipher Fundamentals and StructureLesson 90 — AES Round Transformations
- Confusion about trust
- When boundaries blur, developers may forget which data is validated and which isn't
- Lesson 1212 — Separation of Concerns for Security Boundaries
- Connection attempts
- Who's connecting and when
- Lesson 492 — Troubleshooting and Monitoring OpenVPN Connections
- Connection Layer
- multiplexes multiple logical channels over one SSH connection—simultaneous shell sessions, file transfers, and port forwards all share the same secure tunnel.
- Lesson 1440 — SSH Protocol Fundamentals and Security Model
- Connection patterns
- Which devices talk to each other regularly?
- Lesson 416 — Network Monitoring and Baselining
- Connection relationships
- Which devices communicate directly?
- Lesson 349 — Network Mapping Fundamentals
- Connection requirements
- Reverse connections when firewalls block incoming traffic
- Lesson 2195 — Exploit Modules and Payloads
- Connection resets
- Unexpected TCP RST packets during connections
- Lesson 2992 — Censorship Techniques and Detection Methods
- Connection string parameters
- that require encrypted channels
- Lesson 1778 — Database Connection EncryptionLesson 1796 — Database Connection Encryption
- Connection strings
- – URLs containing embedded credentials
- Lesson 1310 — What Are Secrets and Why They Matter
- Connection tracking
- Both support stateful filtering, but nftables syntax uses `ct state` instead of `-m conntrack -- ctstate`.
- Lesson 445 — Migrating from iptables to nftables
- Connection Whitelisting
- Allow only connections to legitimate cloud services; block everything else.
- Lesson 2802 — IoT Botnet Detection and Mitigation
- Cons
- Password sharing creates risk—if one person leaves or leaks it, you must change it for everyone.
- Lesson 515 — WPA2-PSK vs WPA2-EnterpriseLesson 785 — JWT Signature AlgorithmsLesson 1345 — Automated vs Manual RotationLesson 2479 — Bug Bounty Fundamentals and Models
- consent
- is one of several legal bases for processing personal data (as you learned in "Legal Bases for Processing").
- Lesson 2556 — Consent Requirements and ManagementLesson 2931 — Legal Bases for Data ProcessingLesson 2932 — Consent Requirements and Valid Consent
- Consent Management System (CMS)
- is the technical infrastructure that captures, stores, and respects user consent choices across your application.
- Lesson 2933 — Consent Management Systems and UI Patterns
- Consent records
- showing when and how individuals agreed
- Lesson 2561 — Accountability and Records of Processing
- Consent Scope
- Document granular consent choices—did they agree to marketing emails but not third-party sharing?
- Lesson 2934 — Consent Records and Proof of Consent
- Consider context
- A startup and an enterprise have different resources.
- Lesson 2164 — Remediation Recommendations
- Consider post-quantum alternatives
- when planning for long-term data protection (10+ years) or compliance with emerging quantum- safe standards
- Lesson 151 — RSA vs Other Asymmetric Algorithms
- Consistency
- Data remains valid after transactions
- Lesson 905 — Database Transaction Isolation LevelsLesson 1301 — Automated Package Verification WorkflowsLesson 1412 — Baseline Security ConfigurationLesson 1711 — IAM Groups: Organizing Users and Permission SetsLesson 2059 — Security Automation and OrchestrationLesson 2082 — Penetration Testing MethodologiesLesson 3018 — Policy as Code Fundamentals
- Consistency Across Touchpoints
- Lesson 2266 — Building Trust and Establishing Rapport
- Consistent analysis
- No breaking when message wording changes
- Lesson 1472 — Structured vs Unstructured Logging
- Consistent bandwidth
- – Reserved capacity, not subject to internet congestion
- Lesson 1841 — Direct Connect and Dedicated Connectivity
- Consistent security posture
- no gaps between framework silos
- Lesson 2617 — Framework Mapping and Harmonization
- Constant-time comparisons
- for any secret validation (don't short-circuit on first mismatch)
- Lesson 1949 — Serverless Cold Start and Timing Side Channels
- Constant-time implementation
- ChaCha20-Poly1305 is easier to implement without timing vulnerabilities, reducing side-channel attack risks
- Lesson 127 — ChaCha20-Poly1305
- constant-time operations
- in mind.
- Lesson 228 — EdDSA and Ed25519 SignaturesLesson 234 — Signature Performance and Implementation ConsiderationsLesson 2772 — Side-Channel Attacks: Power Analysis
- Constraint reframing
- works by convincing the model that safety rules don't apply:
- Lesson 2858 — Jailbreaking and Constraint Bypass
- Constraints
- What techniques or actions are forbidden (e.
- Lesson 2084 — Legal and Ethical ConsiderationsLesson 2857 — System Prompt Extraction Techniques
- Consult vendor documentation
- – Verify whether the detected version actually contains the reported CVE.
- Lesson 1614 — False Positive Management
- Consulting firms
- Teams are isolated from competing clients' projects
- Lesson 18 — Chinese Wall Model: Conflict of Interest Prevention
- Contact poisoning
- involves tricking users into adding attacker-controlled accounts.
- Lesson 2957 — Encrypted Messaging Attacks and Vulnerabilities
- Container attack surface
- Kernel vulnerabilities affect *all* containers.
- Lesson 1625 — Container vs VM Security Model
- Container Environment Injection
- Lesson 1336 — Environment Variable Injection Mechanisms
- Container escape
- means breaking out of this isolation to gain control of the host operating system, typically with root privileges.
- Lesson 2148 — Container Escape for Privilege Escalation
- Container Image Scanning
- examines:
- Lesson 2049 — Container and IaC ScanningLesson 3029 — Container Image Scanning
- Container images
- being built
- Lesson 1353 — CI/CD Pipeline Secret ScanningLesson 1682 — Container as a Service SecurityLesson 1916 — Snapshot and Image AcquisitionLesson 2386 — Cloud and Virtual Environment Evidence
- Container logs
- sent to centralized logging are often your best persistent evidence—ensure all stdout/stderr and application logs flow to your SIEM before containers die.
- Lesson 1920 — Container and Serverless Forensics
- Container Manifests
- In Kubernetes, environment variables are defined in YAML manifests that specify pod configurations.
- Lesson 1321 — Environment Variables in Container and Cloud Platforms
- Container Runtime Restrictions
- Lesson 1938 — Blocking IMDS Access from Application Layer
- Container scanning
- checks images for vulnerable packages and misconfigurations before they reach production.
- Lesson 3008 — Automated Security Testing OverviewLesson 3026 — Pipeline Security Scanning Overview
- Container services
- (ECS/Fargate tasks with escalated permissions)
- Lesson 1759 — PassRole Permission Exploitation
- Container Threat Detection
- identifies suspicious container runtime behavior
- Lesson 1889 — GCP Security Command Center
- Container-based applications
- where orchestrators inject environment variables
- Lesson 1318 — Environment Variables as a Secrets Storage Mechanism
- Containerized test environments
- that spin up and tear down quickly
- Lesson 3051 — Testing and Validating Remediation Actions
- Containers
- share the host kernel and rely on Linux kernel features (namespaces, cgroups, seccomp) for isolation.
- Lesson 1625 — Container vs VM Security Model
- Containment
- If malware infects a workstation segment, it cannot directly reach your database servers in another protected zone.
- Lesson 446 — Network Segmentation FundamentalsLesson 1450 — MAC vs DAC: Fundamental Differences
- Containment actions
- Isolate host, disable account, block IP
- Lesson 2311 — Playbooks and Standard Operating Procedures
- Containment options
- Short-term (isolate systems) and long-term (patch vulnerabilities)
- Lesson 2372 — IR Playbooks and Runbooks
- Containment Phase (Active Prevention)
- Lesson 539 — Wireless Intrusion Prevention Systems (WIPS)
- Containment Tools
- enable rapid response actions—blocking IPs at firewalls, isolating endpoints via EDR agents, or quarantining email threats.
- Lesson 2373 — IR Tool Selection and Deployment
- Contemporaneous
- (created when the control operated, not reconstructed later)
- Lesson 2618 — Audit Evidence Types and Requirements
- Content
- Does it contain only allowlisted characters?
- Lesson 609 — Command Injection Prevention: Input Validation
- Content authentication technologies
- (lesson 2868) embed cryptographic watermarks at creation time.
- Lesson 2871 — Mitigating Deepfake Harms: Policy, Education, and Technical Controls
- Content creation
- Spam posting through legitimate APIs
- Lesson 1032 — API6:2023 - Unrestricted Access to Sensitive Business Flows
- Content injection
- Add misleading text or links within trusted pages.
- Lesson 676 — HTML Injection and Context Confusion
- Content Inspection
- Deep scanning that reads actual data within files and database fields, using pattern matching and machine learning to detect sensitive information regardless of how it's labeled.
- Lesson 1802 — Data Discovery and Inventory
- Content matching
- specific byte sequences or strings in packets
- Lesson 459 — Writing Effective IDS/IPS RulesLesson 1476 — rsyslog Configuration and Filtering
- Content scanning
- Screen for suspicious patterns like command injection attempts, credential exposure, or PII leakage
- Lesson 2862 — LLM Output Validation and Sandboxing
- Content Security Policy
- Use CSP to limit where service workers can be registered from.
- Lesson 1082 — Service Worker Registration and HijackingLesson 1217 — Secure Defaults and Opt-In Security
- Content Security Policy (CSP)
- is a browser security mechanism that lets website owners declare which sources of content are legitimate.
- Lesson 657 — CSP Fundamentals and PurposeLesson 675 — Defense-in-Depth XSS Strategy
- Content structure validation
- (parse the file format)
- Lesson 982 — Multi-Layer File Upload Validation Strategy
- Content-Length header
- Specifies the exact number of bytes in the request body
- Lesson 1105 — HTTP Request Smuggling Fundamentals
- Content-Length vs. frame boundaries
- HTTP/2 uses frame-based message delimiting, while HTTP/1.
- Lesson 1112 — HTTP/2 Downgrade and Smuggling
- Content-Security-Policy (CSP)
- Restricts what resources the browser can load, preventing XSS attacks if your API accidentally returns HTML.
- Lesson 1041 — API Security Headers and CORS
- context
- if the application outputs user data inside an HTML attribute, tag body, or unescaped section, the browser's HTML parser treats special characters (`<`, `>`, `"`) as markup delimiters, not literal text.
- Lesson 676 — HTML Injection and Context ConfusionLesson 812 — Context-Dependent Authorization FailuresLesson 844 — Authorization Logging and MonitoringLesson 2349 — Alert Fatigue ManagementLesson 2665 — Complete MediationLesson 2685 — Software-Defined Perimeter and Identity-Based Segmentation
- Context awareness
- – ignoring matches in comments or test files
- Lesson 1258 — False Positive Management and Custom RulesLesson 3031 — Secret Detection in Pipelines
- Context blindness
- A scanner flags an "open" service that's actually protected by network segmentation or requires additional authentication
- Lesson 2441 — False Positives and Validation
- Context Confusion
- is the underlying vulnerability: when user data is embedded in a different parsing context than the application expects.
- Lesson 676 — HTML Injection and Context ConfusionLesson 1223 — Double Encoding and Context Confusion AttacksLesson 2854 — LLM Architecture and Attack SurfaceLesson 2855 — Prompt Injection Fundamentals
- Context display
- The notification shows login details—location, IP address, browser type, timestamp.
- Lesson 746 — Push Notification-Based MFA
- Context limitations
- Understand that auto-escaping typically targets HTML context; JavaScript or URL contexts may need additional manual encoding
- Lesson 1247 — Auto-Escaping Mechanisms and Configuration
- Context manipulation
- Change URL parameters or API calls to access resources they shouldn't, bypassing the single initial check
- Lesson 1213 — Complete Mediation and Access Checks
- Context matters
- HTML encoding differs from SQL escaping or shell encoding
- Lesson 1218 — Input Validation vs Output Encoding Philosophy
- Context switching
- exploits where your payload lands in the page.
- Lesson 648 — Filter Evasion Fundamentals
- Context-aware enforcement
- Adjust permissions based on device posture, location, and user identity
- Lesson 2743 — Enterprise Mobility Management (EMM) and UEM
- Context-enriched alerts
- that include resource owner, last modification timestamp, and policy violated
- Lesson 2027 — Drift Reporting and Exception Management
- Contextual Analysis
- examines the *situation* around data movement, not just content.
- Lesson 1807 — False Positive Management and TuningLesson 3016 — False Positive Management
- contextual signals
- to decide when to challenge users:
- Lesson 749 — Implementing and Enforcing MFALesson 1699 — Continuous Identity Verification
- Contextualization
- Connect dots between multiple intelligence sources.
- Lesson 2343 — Threat Intelligence Analysis and Reporting
- Contextualize findings
- Compare to industry standards or past assessments.
- Lesson 2161 — Executive Summary Writing
- Continuous
- Fuzzing runs in parallel, continuously exploring edge cases
- Lesson 1395 — Security Testing in CI/CD FundamentalsLesson 2054 — DevSecOps Philosophy and Culture Shift
- continuous assessment
- , reporting findings as soon as vulnerabilities are discovered.
- Lesson 1611 — Agent-Based Vulnerability AssessmentLesson 2678 — Device Trust and Endpoint Security
- Continuous compliance monitoring
- shifts from periodic snapshots to always-on surveillance of your control environment.
- Lesson 2622 — Continuous Compliance MonitoringLesson 2623 — Compliance as Code
- Continuous fuzzing
- runs brief fuzz campaigns on every pull request to catch obvious issues quickly.
- Lesson 3014 — Automated Fuzzing in CI/CD
- Continuous Identity Verification
- means constantly re-evaluating whether the current user is genuinely who they claim to be throughout the entire session.
- Lesson 1699 — Continuous Identity Verification
- Continuous Improvement
- Lesson 1752 — IAM Access Advisor and Remediation WorkflowsLesson 2625 — Remediation Tracking and Reporting
- Continuous Learning
- Security becomes part of sprint planning, retrospectives, and daily standups.
- Lesson 2054 — DevSecOps Philosophy and Culture Shift
- Continuous monitoring
- Alerts you when new vulnerabilities are discovered in components you already use
- Lesson 1268 — Introduction to Software Composition Analysis (SCA)Lesson 2045 — Security Testing in the CI/CD PipelineLesson 2519 — Risk Mitigation and Control SelectionLesson 2599 — SOC 2 Reports and Continuous ComplianceLesson 2615 — FISMA and Federal ComplianceLesson 2677 — Least Privilege Access in Zero TrustLesson 2740 — Third-Party SDK and Library SecurityLesson 2861 — Defense Strategies Against Prompt Injection
- Continuous refinement
- Baselines drift as your environment evolves.
- Lesson 1897 — Baseline Establishment for Cloud Resources
- Continuous scanning
- means abandoning the snapshot approach for persistent, always-on monitoring that detects vulnerabilities the moment they appear.
- Lesson 2443 — Continuous Scanning and Real-Time Detection
- Continuous Security Integration
- practices to automate repetitive checks.
- Lesson 2062 — Balancing Security and Velocity
- Continuous security testing
- means automatically scanning your APIs on every deployment or schedule—not just once.
- Lesson 1044 — API Security Testing and Monitoring
- Continuous validation
- Schedule regular scans to catch configuration drift
- Lesson 1621 — Compliance Scanning and Validation
- Continuous Variable QKD
- measures continuous properties like light wave amplitude and phase—imagine measuring the exact height of ocean waves rather than counting individual droplets.
- Lesson 281 — QKD Protocols: E91 and Continuous Variable
- Continuous Verification
- Access is continuously re-evaluated; sessions can be terminated if context changes
- Lesson 2690 — Zero Trust Network Access (ZTNA) Solutions
- Contract
- Processing is necessary to fulfill a contract with the individual (e.
- Lesson 2931 — Legal Bases for Data Processing
- Contractor obligations
- strengthened beyond service providers
- Lesson 2568 — CPRA Amendments and Enforcement
- Contractual and technical controls
- Lesson 2910 — Linkage Attacks and Defenses
- Control
- | Owner decides | System policy decides |
- Lesson 1450 — MAC vs DAC: Fundamental DifferencesLesson 1554 — UEFI and Firmware Rootkits
- Control access
- Use IAM roles and least privilege (concepts you've learned)
- Lesson 1980 — PCI DSS in Cloud Environments
- Control Attestation and Testing
- (lesson 2621) by providing real-time control validation data.
- Lesson 2622 — Continuous Compliance Monitoring
- Control channel
- Handles authentication, key exchange, and tunnel setup using TLS (remember: TLS VPNs from the previous lesson).
- Lesson 486 — OpenVPN Architecture and Components
- Control Description
- Specific measures implemented (e.
- Lesson 2469 — Documenting and Reviewing Compensating ControlsLesson 2598 — Control Design and Implementation
- Control Effectiveness Rate
- Percentage of security controls operating as intended.
- Lesson 2532 — Risk Posture and Trending Metrics
- Control enhancements
- (additional layers for higher assurance)
- Lesson 2611 — NIST 800-53 Security Controls
- Control flow analysis
- maps out all the possible paths code can take—every `if`, `else`, `switch`, loop, and function call creates branches in execution.
- Lesson 1361 — Control Flow Analysis and Path SensitivityLesson 3009 — Static Application Security Testing (SAST) Deep Dive
- Control gaps
- Where do multiple paths converge without defense-in-depth?
- Lesson 2641 — Architecture-Level Attack Trees
- Control groups (cgroups)
- are a Linux kernel feature that limits, accounts for, and isolates resource usage of process groups.
- Lesson 1434 — Resource Limits and Cgroups
- Control layer permissions
- using resource-based policies that explicitly allow only authorized functions or accounts to attach the layer.
- Lesson 1957 — Function Layer Security
- Control Mapping Complexity
- A single GDPR requirement might require CloudTrail in AWS, Azure Monitor in Azure, and Cloud Audit Logs in GCP.
- Lesson 1986 — Multi-Cloud and Hybrid Compliance Challenges
- Control objective
- Which TSC criterion it addresses (e.
- Lesson 2598 — Control Design and Implementation
- Control plane security
- (API servers, schedulers, controllers)
- Lesson 1682 — Container as a Service Security
- Control points
- Devices with special privileges and security policies
- Lesson 353 — Gateway and Router Identification
- Control refinement
- Update controls as threats, business processes, and technology evolve
- Lesson 2599 — SOC 2 Reports and Continuous Compliance
- Control testing
- Validate effectiveness before considering risk "mitigated"
- Lesson 2519 — Risk Mitigation and Control Selection
- Controlled resources
- Virtual file systems, network simulations, fake data
- Lesson 1567 — Behavioral Detection and Sandboxing
- Controlled Traffic Testing
- Lesson 434 — Rule Testing and Validation
- Controller Manager
- Runs background processes that maintain desired cluster state (restarting failed pods, managing deployments).
- Lesson 1662 — Kubernetes Architecture and Attack Surface
- Convenience vs. risk tradeoff
- One compromised server with the wildcard certificate's private key now threatens *all* your subdomains.
- Lesson 175 — Subject Alternative Names and Wildcard Certificates
- Conversion Workflows
- neutralize threats by re-encoding files into safe formats.
- Lesson 981 — Safe File Processing Practices
- Convex relaxation
- Approximate neural network behavior with simpler, analyzable functions
- Lesson 2848 — Certified Defenses and Provable Robustness
- Cookie injection
- via HTTP response splitting (less common with modern browsers)
- Lesson 714 — Session Fixation Attacks
- Cookie management
- Preserving session cookies between requests
- Lesson 1373 — Authentication and Session Handling in DAST
- Cookie security flags
- are your first line of defense.
- Lesson 670 — HttpOnly and Secure Cookie FlagsLesson 1217 — Secure Defaults and Opt-In Security
- cookie tampering
- , and it's a serious threat if your application trusts cookie data blindly.
- Lesson 727 — Cookie Tampering and IntegrityLesson 827 — Session and Cookie Manipulation
- Cookie Theft
- Lesson 644 — Data Exfiltration TechniquesLesson 647 — XSS Worms and Self-Propagating AttacksLesson 1060 — document.domain Relaxation and Risks
- Cookie values
- Occasionally store references you can manipulate
- Lesson 819 — Testing for IDOR Vulnerabilities
- Cookies
- are stored by the browser and automatically included with every request to the same domain.
- Lesson 706 — Session Transmission: Cookies vs URL Parameters vs HeadersLesson 809 — Parameter Tampering for Authorization BypassLesson 911 — Understanding Application State and WorkflowLesson 912 — State Manipulation FundamentalsLesson 1010 — Bearer Token Authentication for APIsLesson 1072 — Client-Side Storage Overview and Threat ModelLesson 2405 — Browser Forensics and Web Artifacts
- Cookies are preferred
- because:
- Lesson 706 — Session Transmission: Cookies vs URL Parameters vs Headers
- Coordinate communications
- to customers, regulators, and stakeholders
- Lesson 2541 — Vendor Security Incident Management
- coordinated disclosure
- represent different philosophies about transparency, timing, and stakeholder involvement.
- Lesson 2470 — Vulnerability Disclosure ModelsLesson 2476 — CVE Assignment and Public Disclosure
- Coordinating
- Reporting back to command-and-control servers for attack instructions
- Lesson 2754 — IoT Botnets: Mirai and Beyond
- Coordination requirements
- Researchers must give you time to remediate before public disclosure
- Lesson 2478 — Legal and Safe Harbor Considerations
- Copies
- the original signed assertion to keep the signature valid
- Lesson 779 — XML Signature Wrapping Attacks
- Copyleft obligations
- Licenses like GPL require you to release your own code under the same license if you distribute your application.
- Lesson 1272 — License Compliance Scanning
- Copyright and DMCA laws
- (in the US) restrict circumventing protection mechanisms
- Lesson 2722 — Introduction to Mobile App Reverse Engineering
- Core components
- of effective risk documentation:
- Lesson 2516 — Risk Analysis Documentation and Communication
- Core elements
- Lesson 2174 — Debrief and Knowledge Transfer
- Core Impact
- offers a commercial, GUI-driven approach with automated pivoting and client-side attacks.
- Lesson 2216 — Exploitation Framework Landscape
- Corporate governance
- Board decisions require majority approval
- Lesson 237 — Multisignatures and Threshold Signatures
- Corporate spies
- steal business plans, product designs, customer lists, or R&D data to benefit competing companies
- Lesson 49 — Motivations: Espionage and Intelligence Gathering
- corpus
- of interesting inputs and use genetic algorithms to evolve test cases that maximize code coverage, exactly as coverage-guided fuzzing prescribes.
- Lesson 1389 — AFL and LibFuzzerLesson 3014 — Automated Fuzzing in CI/CD
- Correction
- Automatically reapply the desired configuration, reverting unauthorized changes
- Lesson 3046 — Auto-Remediation for Infrastructure Drift
- Corrective + Technology D
- Automated account suspension triggered by anomaly detection
- Lesson 2658 — Control Diversity: Types and Technologies
- Corrective controls
- fix problems after detection.
- Lesson 27 — Security Control TypesLesson 1999 — Automated Tag Enforcement and Validation
- Correctness
- The computed result is accurate, even if some parties try to cheat
- Lesson 255 — Introduction to Secure Multi-Party Computation (MPC)Lesson 256 — MPC Threat Model and Security Definitions
- Correlate
- data to identify connections and relationships
- Lesson 356 — Automated Network Mapping ToolsLesson 1868 — CDN Monitoring and Incident ResponseLesson 1876 — Log Query and Analysis Techniques
- Correlate events
- match activities across sources (user login in event log + network connection in firewall log)
- Lesson 2417 — Timeline Construction Fundamentals
- Correlate time windows
- when the attacker was active across multiple systems
- Lesson 2365 — Detection and Scoping Techniques
- Correlate with other logs
- – Do system logs show legitimate admin activity or package installations?
- Lesson 1504 — FIM Alert Analysis and Response
- Correlating multiple signals
- (failed login *plus* unusual geography *plus* MFA bypass attempt)
- Lesson 1895 — Custom Detection Rules and Tuning
- Correlation
- Links a malicious PowerShell execution (Event ID 4104) with suspicious network connections (Sysmon Event ID 3) from the same process
- Lesson 1517 — Integrating Windows Logs with SIEM PlatformsLesson 2314 — What is a SIEM and Why Organizations Need It
- Correlation Engine
- Lesson 1878 — Cloud SIEM Architecture and Components
- Correlation patterns
- Same person using normal and circumvented connections
- Lesson 2998 — Operational Security for Circumvention
- Correlation rules
- are the detective logic that connects these dots.
- Lesson 2318 — Correlation Rules and Detection Logic
- CORS misconfigurations
- that allow malicious origins to make credentialed requests
- Lesson 854 — CSRF in Modern Applications and SPAs
- CORS policies
- Lesson 1006 — Mutation Security and Side Effects
- COSE
- (CBOR Object Signing and Encryption) for compact cryptographic operations
- Lesson 2797 — Authentication Protocols for Constrained Environments
- cosign
- is a newer tool from the Sigstore project that simplifies container signing.
- Lesson 1297 — Container Image VerificationLesson 1638 — Image Signing and Content TrustLesson 1645 — Cosign and Sigstore for Image Signing
- cost
- to users and operations?
- Lesson 35 — Balancing Security with Usability and Business GoalsLesson 463 — Network TAPs vs SPAN PortsLesson 1955 — Function Timeout and Memory Limits
- Cost alarms
- Set billing alerts that trigger when spend exceeds expected patterns, giving you early warning of an attack.
- Lesson 1948 — Serverless Denial of Service and Resource Limits
- Cost allocation
- Track spending by team, project, or environment (`Owner=SecurityTeam`, `CostCenter=CC- 1234`)
- Lesson 1996 — Cloud Resource Tagging Strategy and Standards
- Cost and Data Transfer
- Cross-region connectivity incurs data transfer charges—factor this into your security architecture
- Lesson 1842 — Cross-Region and Cross-Account Connectivity
- Cost avoidance
- Compare the cost of fixing issues in design vs fixing breaches in production.
- Lesson 84 — Measuring Threat Modeling Effectiveness
- Cost considerations
- Lesson 2662 — Defense-in-Depth Trade-offs and Cost-Benefit
- Cost control
- Deny expensive instance types across development accounts while allowing them in production.
- Lesson 1718 — Service Control Policies and Organizational Controls
- Cost explosion
- you pay for every execution, with bills potentially reaching thousands of dollars in minutes
- Lesson 1956 — Concurrency Controls and Throttling
- Cost optimization
- Moving logs to cheaper storage tiers after 30-90 days
- Lesson 1874 — Log Retention and Lifecycle Policies
- Cost vs. benefit
- Cloud GPU time is expensive—run cost analyses before launching large jobs
- Lesson 2234 — Cloud-Based and Distributed Cracking
- Cost-based
- Maximum 10,000 cost points per hour (allows flexibility—cheap queries can run more often)
- Lesson 1002 — Query Cost Analysis and Rate Limiting
- Cost-benefit analysis
- Control cost vs potential loss (ALE reduction)
- Lesson 2516 — Risk Analysis Documentation and Communication
- Cost-effective
- – you pay per valid vulnerability, not hourly rates
- Lesson 2479 — Bug Bounty Fundamentals and Models
- Cost-effectiveness
- Control cost should be proportional to the risk being reduced (don't spend $100,000 to protect a $10,000 asset)
- Lesson 2519 — Risk Mitigation and Control SelectionLesson 2662 — Defense-in-Depth Trade-offs and Cost- Benefit
- Cost-per-Vulnerability
- compares bounty payouts to what those bugs would cost if exploited (data breach costs, downtime) or found through penetration testing contracts.
- Lesson 2485 — Bug Bounty Metrics and ROI
- CouchDB
- (JSON-based queries)
- Lesson 592 — NoSQLMap and NoSQL Injection AutomationLesson 598 — NoSQL Injection in Different Database Types
- Count grapheme clusters
- , not code points or bytes (what users perceive as characters)
- Lesson 1173 — Emoji and Combining Character Attacks
- Counter
- Block counter (1 word)
- Lesson 117 — ChaCha20: Modern Stream Cipher DesignLesson 741 — HOTP and Counter-Based OTP
- counter value
- that increments for each block.
- Lesson 98 — CTR Mode: Turning Block Ciphers into StreamsLesson 741 — HOTP and Counter-Based OTP
- Coupon reuse
- Applying a single-use discount code in parallel requests
- Lesson 902 — Time-of-Check to Time-of-Use (TOCTOU) Vulnerabilities
- Covenant
- , **Cobalt Strike**, and others emerged to address specific operational needs, evasion requirements, and attack methodologies that Metasploit wasn't originally designed to handle.
- Lesson 2217 — Metasploit vs. Alternative Frameworks
- Cover critical scope
- Operating system binaries, configuration files, application code, and databases handling regulated data
- Lesson 1506 — FIM for Compliance Requirements
- Coverage
- answers: "Are we threat modeling the right things?
- Lesson 84 — Measuring Threat Modeling EffectivenessLesson 2059 — Security Automation and OrchestrationLesson 2642 — Evaluating Architectural Security Controls
- Coverage Comparison
- Overlay multiple layers—your EDR coverage, your SIEM rules, and manual monitoring—to see where protections overlap or conflict.
- Lesson 2183 — ATT&CK Navigator and Visualization
- coverage gaps
- techniques adversaries commonly use that you cannot detect.
- Lesson 2185 — Measuring Defensive Coverage with ATT&CKLesson 2437 — Agent-Based Scanning
- Coverage Validation
- Measure which policy rules are actually executed during tests.
- Lesson 3024 — Policy Testing and Validation
- covert channels
- communication methods that hide within legitimate-looking traffic.
- Lesson 1556 — Rootkit Communication and Command-and-ControlLesson 2670 — Least Common Mechanism
- CPU
- 5-30% increase depending on agent configuration
- Lesson 1382 — IAST Deployment Models and Performance Impact
- CPU allocation
- Cloud providers tie CPU power to memory settings
- Lesson 1955 — Function Timeout and Memory Limits
- CPU limits
- prevent runaway processes from monopolizing processor time.
- Lesson 1657 — Resource Limits and Isolation
- CPU overhead
- Mirroring consumes switch resources
- Lesson 463 — Network TAPs vs SPAN PortsLesson 1569 — Real-Time Protection and Scanning Strategies
- CPU state inspection
- Direct access to registers, control structures, and execution state reveals hidden modifications
- Lesson 1563 — Hardware-Assisted Detection Techniques
- Crack Rate
- The percentage of hashes you successfully cracked versus the total.
- Lesson 2235 — Password Analysis and Cracking Metrics
- CrackStation
- Massive wordlists combining multiple breach datasets
- Lesson 2227 — Dictionary Attacks with Wordlists
- Craft a malicious request
- Use that input to generate a harmful response (e.
- Lesson 1116 — Cache Poisoning Attack Fundamentals
- Crafting Malicious Inputs
- Lesson 1182 — Testing for ReDoS Vulnerabilities
- Crash Dump
- Windows generates these automatically during system crashes.
- Lesson 2391 — Memory Image Formats and Validation
- crawling
- (mapping the application) and **scanning** (testing for vulnerabilities).
- Lesson 2212 — Burp Scanner Configuration and CrawlingLesson 2438 — Web Application Vulnerability Scanners
- Crawling/Spidering
- Discovers all endpoints, forms, APIs, and parameters by following links and exploring the application surface
- Lesson 3010 — Dynamic Application Security Testing (DAST) Deep Dive
- Crawls
- the application to discover endpoints, forms, and parameters
- Lesson 1368 — DAST Fundamentals and Runtime Testing
- Create a key pair
- (public and private key) if you don't have one already
- Lesson 176 — Certificate Signing Requests (CSR)
- Create a malicious MSI
- package containing a payload (reverse shell, add user to Administrators group, credential dumper, etc.
- Lesson 2136 — Always Install Elevated and MSI Exploitation
- Create a SUID binary
- as root on your machine (since `no_root_squash` preserves your root status)
- Lesson 2147 — NFS and Network File System Exploits
- Create a trimmed policy
- removing those permissions
- Lesson 1750 — Last Access Analysis and Permission Rightsizing
- Create backdoors
- `INSERT INTO users VALUES('hacker','password123','admin')`
- Lesson 580 — Stacked Queries and Multiple Statements
- Create compliance foundation
- – Satisfy legal, regulatory, and contractual requirements by documenting your security stance
- Lesson 2487 — Purpose and Scope of Information Security Policy
- Create copies
- Original evidence stays pristine; work with copies for analysis
- Lesson 2385 — Log Collection and Preservation
- Create forensic copies
- , never work on originals
- Lesson 2398 — Disk Forensics Fundamentals and Chain of Custody
- Create hidden elements
- that execute on page load
- Lesson 646 — Persistent Backdoors via DOM Manipulation
- Create ID tokens
- for authenticating to specific services
- Lesson 1725 — GCP Service Account Impersonation
- Create new processes
- under that stolen identity to execute commands with elevated privileges
- Lesson 2130 — Token Manipulation and Impersonation
- Create synthetic reviews
- that mimic genuine customer experiences, boosting or destroying product reputations
- Lesson 2866 — Synthetic Text Generation and GPT-Based Misinformation
- Create test accounts
- to generate valid IDs from different user perspectives
- Lesson 1021 — Testing for BOLA Vulnerabilities
- Create test matrices
- (user roles × resources × actions)
- Lesson 831 — Authorization Testing Methodology
- Create unintended references
- Point to internal application files, configuration data, or even other users' uploaded content.
- Lesson 969 — Symbolic Link Attacks
- Creating new admin users
- Using injection to run `CREATE USER` commands with administrative roles
- Lesson 584 — Privilege Escalation via SQL Injection
- Creating Tickets
- transforms scan results into actionable work items.
- Lesson 2053 — Test Result Management and Remediation Workflows
- Creation/modification dates
- (indicating work patterns)
- Lesson 334 — Email Harvesting and Metadata Extraction
- Credential Access
- Steal account credentials
- Lesson 2178 — Tactics: The Why Behind Adversary ActionsLesson 2423 — Attack Chain Reconstruction
- Credential Capture
- Using portable RFID readers (like Proxmark3 or HID cloners), attackers position themselves near badge readers or pass close to employees carrying badges.
- Lesson 2274 — Badge Cloning and RFID Attacks
- Credential collection
- Stolen passwords automatically forwarded via Telegram bots or email
- Lesson 2261 — Phishing Infrastructure and Automation
- Credential dumping
- is the technique of extracting usernames, passwords, and authentication tokens from a compromised machine.
- Lesson 2119 — Credential Dumping Fundamentals
- Credential dumping tools
- executing (LSASS access, Mimikatz indicators)
- Lesson 2159 — Detection and Defense Against Lateral Movement
- Credential Generation
- If authorized, STS creates three components:
- Lesson 1730 — AWS STS and AssumeRole Mechanics
- credential harvesting
- on public WiFi networks, corporate LANs, or compromised routers.
- Lesson 378 — HTTP Traffic Analysis and Credential ExtractionLesson 533 — Rogue Access Points: Definition and Threat ModelLesson 1523 — Spyware and Information StealersLesson 2245 — Social Engineering Toolkit (SET) Overview
- Credential Hygiene
- Force password resets for compromised accounts.
- Lesson 2367 — Eradication: Removing the Threat Actor
- Credential isolation
- Secrets should never appear in logs or be accessible to untrusted steps
- Lesson 1403 — Pipeline Security and Release Gates
- Credential leaks
- API tokens accidentally committed to public repos
- Lesson 2876 — Model Repository Security
- Credential replay
- Recording and replaying authentication sequences
- Lesson 2280 — Badge and Card-Based Access Systems
- Credential reuse across regions
- suggesting compromise
- Lesson 1736 — Best Practices for Temporary Credentials
- Credential stuff
- using leaked passwords from other breaches
- Lesson 1441 — Disabling Password Authentication
- credential stuffing
- uses *known valid* credentials from one breach to attack other sites.
- Lesson 698 — Credential Stuffing and Breach DatabasesLesson 699 — Password Spraying TechniquesLesson 1028 — API2:2023 - Broken Authentication
- Credential Stuffing at Scale
- Stolen plain text credentials are sold on dark web marketplaces and used in automated "credential stuffing" attacks, where bots attempt login across thousands of websites using leaked username/password pairs.
- Lesson 683 — Why Plain Text Password Storage is Catastrophic
- Credential Testing at Scale
- Feed CME usernames, passwords, or NTLM hashes, and it tests them against entire network ranges via SMB, identifying which accounts work on which machines.
- Lesson 2239 — CrackMapExec for Network Enumeration
- Credential Theft
- Lesson 629 — Why XSS is Dangerous: Impact and ConsequencesLesson 638 — Cookie Theft and Session Hijacking via XSSLesson 958 — MIME Type Sniffing and Security ImplicationsLesson 1696 — Identity as Attack SurfaceLesson 2421 — Pivot Points and Indicators of Compromise
- Credential verification
- Ask for employee ID, callback numbers, or ticket numbers—then independently verify them
- Lesson 2270 — Detecting and Resisting Manipulation Attempts
- Credentialed scans
- provide the scanner with legitimate login credentials (username/password, SSH keys, API tokens).
- Lesson 1609 — Credentialed vs Non-Credentialed Scans
- Credentials
- (usernames and passwords) are another lucrative target.
- Lesson 48 — Motivations: Financial Gain and CybercrimeLesson 2125 — Data Discovery and Staging
- Credentials leaked
- The response contains temporary AWS credentials (access key, secret key, session token) that the attacker can now extract
- Lesson 1935 — SSRF Attacks Against IMDS
- Credit and Attribution
- Ask researchers how they'd like to be credited—some prefer full names, others use handles, some want anonymity.
- Lesson 2474 — Communicating with Security Researchers
- CRIME
- (Compression Ratio Info-leak Made Easy) was the original attack demonstrating this principle against TLS compression.
- Lesson 1099 — HPACK Header Compression Attacks
- Criminal convictions and offenses
- (handled separately but with similar protections)
- Lesson 2552 — Personal Data and Special Categories
- Criteria
- What the requirement or standard says should exist
- Lesson 2548 — Audit Findings and Risk Rating
- Critical
- If the setup's secret randomness ("toxic waste") leaks, someone could forge fake proofs.
- Lesson 244 — zk-SNARKs ArchitectureLesson 304 — Asymmetric Key Pair GenerationLesson 1273 — SCA Tool Integration and ConfigurationLesson 1600 — Types of Patches and UpdatesLesson 1709 — IAM Best Practices and Security BaselineLesson 2331 — Response Actions and Containment AutomationLesson 2344 — Alert Triage Fundamentals and WorkflowLesson 2482 — Bounty Pricing and Reward Structures (+1 more)
- Critical (9.0–10.0)
- Catastrophic impact, trivial exploitation
- Lesson 2446 — CVSS Score Interpretation and Limitations
- Critical Actions Layer
- For sensitive operations (changing passwords, transferring money, deleting accounts), require **re-authentication** or additional confirmation beyond CSRF tokens alone.
- Lesson 873 — Defense-in-Depth CSRF Strategy
- Critical alert
- Lesson 2322 — Alert Prioritization and Severity Scoring
- Critical defense
- Separate the LLM into distinct privilege levels:
- Lesson 2861 — Defense Strategies Against Prompt Injection
- Critical infrastructure
- Require multiple administrators to approve configuration changes
- Lesson 237 — Multisignatures and Threshold SignaturesLesson 349 — Network Mapping Fundamentals
- Critical production database passwords
- quarterly, with a change control board reviewing each rotation
- Lesson 1345 — Automated vs Manual Rotation
- critical security controls
- because they enforce network segmentation:
- Lesson 1830 — Route Tables and Subnet AssociationsLesson 2025 — Automated Drift Remediation Strategies
- Critical vendors
- Direct access to production systems, sensitive data, or mission-critical services (cloud providers, managed security services)
- Lesson 2534 — Third-Party Risk Fundamentals
- Critical vulnerabilities
- (high CVSS scores with known exploits) demand immediate attention—within hours or days.
- Lesson 1266 — Dependency Update Strategies and PatchingLesson 2079 — Building an Internal Bug Bounty ProgramLesson 2453 — Vulnerability Age and Remediation SLAs
- Critical vulnerable scenarios
- Lesson 1103 — HTTP/3 0-RTT Replay Attacks
- Critical weakness
- The requesting page blindly trusts and executes whatever the server returns—a major CSRF and security risk.
- Lesson 858 — SOP Exceptions and Relaxations
- Critical Zone
- Data centers, vault rooms, control systems
- Lesson 2279 — Physical Access Control Models and Zones
- Critical-only scans
- (focused): Test high-severity vulnerabilities only
- Lesson 2440 — Scan Configuration and Optimization
- Critical/P1
- Active data exfiltration, ransomware spreading, complete service outage
- Lesson 2362 — Incident Severity and Priority Classification
- CRL Distribution Points (CDPs)
- , typically HTTP or LDAP URLs embedded in the certificate itself.
- Lesson 191 — Certificate Revocation Lists (CRLs)
- CRLSets
- (Chrome) and **OneCRL** (Firefox) are browser-maintained lists of revoked certificates.
- Lesson 197 — Modern Revocation Alternatives
- Cross-account
- connectivity means Organization A's VPC needs to access Organization B's private service—all while maintaining network isolation boundaries.
- Lesson 1851 — Cross-Region and Cross-Account Private Connectivity
- Cross-account access
- A service in Account A assumes a role in Account B, enabling secure resource sharing without embedding Account B credentials in Account A.
- Lesson 1712 — IAM Roles: Federated and Assumable IdentitiesLesson 1716 — Resource-Based vs Identity- Based PoliciesLesson 1732 — Role Chaining and Session PoliciesLesson 1737 — Cross-Account Access FundamentalsLesson 1912 — Multi-Account and Cross-Region IRLesson 1921 — Cross-Account and Multi- Cloud ForensicsLesson 1952 — Resource-Based Policies for Functions
- Cross-account logging
- routes logs (CloudTrail, VPC Flow Logs, application logs) from multiple AWS accounts to a single "security account" or dedicated logging account.
- Lesson 1877 — Cross-Account and Multi-Region Logging
- Cross-account misconfigurations
- Weak external IDs or overly trusting resource-based policies
- Lesson 1753 — IAM Privilege Escalation Overview
- Cross-account resource access
- S3 bucket reads, Lambda invocations, secret retrievals
- Lesson 1743 — Cross-Account Access Auditing
- Cross-account resource sharing
- Allow production VPC in Account A to access shared services (databases, APIs) in Account B
- Lesson 1836 — VPC Peering Fundamentals
- Cross-account service consumption
- with full network isolation
- Lesson 1848 — Private Link Architecture and Use Cases
- Cross-Context Communication Risks
- Lesson 1085 — Web Workers and Shared Workers Security
- Cross-device sync
- Getting the same key on phone, laptop, and tablet
- Lesson 2965 — Usability Challenges and Key Management UX
- Cross-origin attacks
- `Origin` headers can be manipulated in many contexts despite same-origin policy protections
- Lesson 811 — Referer and Origin-Based Authorization Flaws
- Cross-Origin Push Attacks
- Lesson 1100 — HTTP/2 Server Push Security Risks
- Cross-Origin Resource Sharing (CORS)
- is the mechanism that allows servers to explicitly permit cross-origin requests.
- Lesson 1058 — XMLHttpRequest and Fetch API RestrictionsLesson 1095 — Protecting API Calls from the SPA
- Cross-platform inventory
- Single dashboard showing device health, patch levels, and configuration drift
- Lesson 2743 — Enterprise Mobility Management (EMM) and UEM
- Cross-reference
- header against actual file signature
- Lesson 956 — Content-Type Header Validation and Mismatches
- Cross-region
- connectivity means linking resources in, say, `us-east-1` with `eu-west-1`.
- Lesson 1851 — Cross-Region and Cross-Account Private Connectivity
- Cross-region replication
- Copy snapshots to another region for disaster recovery
- Lesson 1931 — Instance Termination Protection and Data Persistence
- Cross-service consistency
- Use the same CMK across multiple databases
- Lesson 1797 — Key Management for Database Encryption
- Cross-site attacks
- Exploiting CSRF vulnerabilities combined with session token leakage
- Lesson 713 — Session Hijacking Fundamentals
- Cross-site permission abuse
- Compromised legitimate sites can abuse existing trusted permissions to deliver malicious notifications.
- Lesson 1087 — Web Push Notifications and Permissions
- Cross-Site Scripting (XSS)
- It injects JavaScript like `<script>alert('XSS')</script>`
- Lesson 1372 — Active Scanning and Attack SimulationLesson 2104 — Web Application Vulnerability Hunting
- Cross-Tool Coordination
- ties everything together—your orchestrator must integrate with vulnerability scanners, ticketing systems, deployment tools, monitoring platforms, and communication channels, passing data between each step.
- Lesson 3045 — Remediation Workflows and Orchestration
- Cryptanalysis advances
- Theoretical weaknesses might let attackers narrow down possible states
- Lesson 291 — PRNG State and Reseeding
- Crypto-agility
- means designing systems that can swap cryptographic algorithms without requiring massive rewrites.
- Lesson 277 — Migration Strategies and Crypto-Agility
- Crypto-ransomware
- encrypts your files using strong cryptographic algorithms, making them unreadable without the decryption key held by the attacker.
- Lesson 1522 — Ransomware: Extortion Through Encryption
- Cryptocurrency wallets
- Require 2-of-3 signatures to move funds (you, your business partner, and an escrow service)
- Lesson 237 — Multisignatures and Threshold SignaturesLesson 321 — Secret Sharing FundamentalsLesson 326 — Secret Sharing in Practice
- Cryptographic Agility
- Design systems so you can swap algorithms later without rewriting everything.
- Lesson 2035 — Cryptographic Design Decisions
- Cryptographic erasure
- Instead of trying to find every copy of a key, encrypt all data with a **Key Encryption Key (KEK)**.
- Lesson 320 — Key Destruction and Sanitization
- Cryptographic Failures
- replaced "Sensitive Data Exposure" with clearer focus
- Lesson 1201 — OWASP Top 10 2021 vs 2017: Key Changes
- cryptographic hash
- (SHA-256, etc.
- Lesson 1592 — Allowlist Policy Design and Rule TypesLesson 2971 — Large File Transfer Security
- Cryptographic key splitting
- Payment authorization requires keys from both finance and compliance systems
- Lesson 2631 — Separation of Privilege
- Cryptographic operations
- (sign, decrypt, MAC) performed *within* the HSM
- Lesson 306 — Hardware Security Modules (HSMs)Lesson 1690 — Identity and Access Management Boundaries
- Cryptographic randomness
- requires everything statistical randomness has, *plus* **unpredictability**.
- Lesson 285 — Cryptographic vs Statistical RandomnessLesson 704 — Session Identifiers: Generation and Properties
- Cryptographic Signing
- Lesson 1485 — Log Integrity Protection MechanismsLesson 2624 — Audit Trail Management
- Cryptographic Workflow Tokens
- Issue signed, tamper-proof tokens that encode the current valid state and allowable next steps.
- Lesson 919 — Defensive Workflow State Management
- cryptographically random
- values less than your prime.
- Lesson 323 — Implementing Shamir's Secret SharingLesson 731 — Session Creation and InitializationLesson 747 — Recovery and Backup Codes
- Cryptographically Secure PRNG (CSPRNG)
- must guarantee:
- Lesson 288 — Cryptographically Secure PRNGs (CSPRNGs)
- Cryptography
- (data-at-rest and in-transit encryption)
- Lesson 1979 — ISO 27001 and Cloud Security Standards
- Cryptominer
- Uses system resources to mine cryptocurrency
- Lesson 1518 — Malware Taxonomy and Classification Criteria
- CRYSTALS-Kyber
- won the key encapsulation mechanism (KEM) category.
- Lesson 270 — CRYSTALS-Kyber: Post-Quantum Key Encapsulation
- CSP frame-ancestors
- directives on your auth endpoints
- Lesson 1093 — Cross-Origin Authentication and iframe Security
- CSPM Integration
- Feed misconfiguration alerts (open S3 buckets, overly permissive security groups) into your SIEM.
- Lesson 1884 — SIEM Integration with Cloud Security Tools
- CSPRNG
- (like those we've covered from operating system APIs) rather than statistical PRNGs like Mersenne Twister.
- Lesson 302 — Key Generation Requirements and Best Practices
- CSPRNGs
- , you need a practical way to get secure random bytes in real programs.
- Lesson 289 — Operating System Random APIs
- CSRF
- tricks an authenticated user's browser into making unwanted requests to a website where they're already logged in.
- Lesson 635 — XSS vs CSRF: Understanding the DifferenceLesson 674 — SameSite Cookie AttributeLesson 721 — Man-in-the-Browser and Session RidingLesson 852 — CSRF vs XSS: Key Differences
- CSRF (Cross-Site Request Forgery)
- sound similar but exploit completely different vulnerabilities:
- Lesson 635 — XSS vs CSRF: Understanding the Difference
- CSS Context
- Escape characters that could break out of style declarations or inject properties.
- Lesson 668 — Output Encoding and Escaping FundamentalsLesson 1220 — Context-Specific Output Encoding
- CSS values
- Has its own escaping rules for backslashes and quotes
- Lesson 1246 — Context-Aware Output Encoding
- CT Log Entry
- The CA submits the certificate to CT logs before or when issuing it
- Lesson 189 — Certificate Transparency Logs Verification
- CTAP protocol
- (how authenticators communicate with devices).
- Lesson 745 — FIDO2 and WebAuthnLesson 751 — WebAuthn and FIDO2 Protocol
- CTR
- mode only requires IVs to be **unique** (never reused with the same key), but they don't need to be unpredictable.
- Lesson 132 — IV Requirements for Different Modes
- CTR encryption
- Encrypts your data by XORing it with keystream blocks (counter-based)
- Lesson 101 — GCM Mode: Authenticated Encryption Standard
- CTR mode
- encrypts both the plaintext and the authentication tag
- Lesson 103 — CCM Mode: Counter with CBC-MACLesson 122 — Why Authentication Matters in Encryption
- CTR mode encryption
- Your plaintext is encrypted by XORing it with a keystream generated from an incrementing counter, turning the block cipher into a stream cipher
- Lesson 125 — AES-GCM: Galois/Counter Mode
- Curiosity
- (enticing downloads, "see who viewed your profile")
- Lesson 1533 — Social Engineering and User Deception
- Currency Switching Exploits
- Adding items to a cart in one currency, then switching currencies before checkout without proper recalculation.
- Lesson 924 — Currency and Conversion Exploits
- Current status
- (Investigating/Contained/Eradicating/Resolved)
- Lesson 2427 — Incident Status Updates and Escalation
- Current timeline
- Experts estimate 10-30 years before quantum computers powerful enough to break RSA exist.
- Lesson 152 — RSA Cryptanalysis: Factoring and Future Threats
- Curve25519
- (and its signature variant **Ed25519**) represent a newer generation designed explicitly to avoid implementation pitfalls.
- Lesson 167 — Curve25519 and EdDSALesson 493 — WireGuard Protocol Design and Cryptographic SimplicityLesson 2794 — Elliptic Curve Cryptography for IoT
- Custom Import
- Allows you to import your own HTML credential harvesting page for maximum control and customization.
- Lesson 2246 — Credential Harvester and Attack Vectors
- Custom pattern matching
- for application-specific attack vectors
- Lesson 1867 — CDN WAF Integration and Edge Security
- Custom questionnaires
- supplement standards with organization-specific requirements—regulatory needs, data classification handling, or technology-specific controls not covered in generic frameworks.
- Lesson 2537 — Security Questionnaires and Standards
- Custom RDP configurations
- Modify logging settings to reduce audit trails
- Lesson 2156 — RDP and GUI-Based Lateral Movement
- custom request headers
- .
- Lesson 872 — CSRF Protection for AJAX and SPAsLesson 873 — Defense-in-Depth CSRF Strategy
- custom rules
- that match your specific threat model.
- Lesson 1854 — WAF Rule Configuration and Custom RulesLesson 1988 — AWS Config for Compliance Monitoring
- Custom scripts
- Python requests with payload libraries
- Lesson 601 — Detecting and Testing for NoSQL InjectionLesson 906 — Exploiting Race Conditions with Concurrent RequestsLesson 1008 — GraphQL Security Best Practices and ToolingLesson 1114 — Testing and Tools for Request Smuggling
- Customer Gateway
- Represents your physical on-premises VPN device (router or firewall) in the cloud configuration.
- Lesson 1840 — VPN Connections to Cloud
- Customer Notifications
- must balance urgency with accuracy.
- Lesson 2428 — External Communication and Disclosure
- Customer-managed
- Custom, reusable permission sets across your organization
- Lesson 1714 — Managed Policies vs Inline Policies
- Customer-managed keys
- may add latency if KMS calls are throttled
- Lesson 1770 — Encryption for Block Storage and Virtual Disks
- Customer-managed keys via KMS
- You control rotation and access policies
- Lesson 1793 — Transparent Data Encryption (TDE)
- Customer-Provided Keys (SSE-C, BYOK)
- You supply the encryption key with each request.
- Lesson 1790 — Storage Service Encryption Integration
- Customers create private endpoints
- in their VPCs pointing to your service
- Lesson 1850 — Private Link Service for Custom Applications
- Customize everything
- Change default port numbers, user agents, URIs, and staging paths
- Lesson 2222 — Framework Evasion TechniquesLesson 2224 — Framework OPSEC and Detection
- Customize rule sets
- by disabling checks irrelevant to your tech stack or enabling additional rules for your specific risks.
- Lesson 1363 — False Positives and Tuning SAST Tools
- CVE
- (Common Vulnerabilities and Exposures) identifiers come in.
- Lesson 1271 — CVE Databases and Vulnerability Feeds
- CVE Database
- Maintained by MITRE, this is the naming standard.
- Lesson 1613 — Vulnerability Database and CVE Mapping
- CVE Databases
- The Common Vulnerabilities and Exposures (CVE) system catalogs publicly known security flaws.
- Lesson 365 — Combining Fingerprinting with Vulnerability Research
- CVE ID
- looks like `CVE-2023-12345` and serves as a unique reference number for a specific vulnerability.
- Lesson 1271 — CVE Databases and Vulnerability FeedsLesson 2476 — CVE Assignment and Public Disclosure
- CVE Numbering Authorities (CNAs)
- are authorized organizations that assign CVE IDs.
- Lesson 2476 — CVE Assignment and Public Disclosure
- CVSS score limits
- Fail builds with vulnerabilities scoring above 7.
- Lesson 2052 — Security Gates and Failure Policies
- CVSS Scores
- The Common Vulnerability Scoring System provides a standardized severity rating (0-10).
- Lesson 1602 — Vulnerability Assessment and PrioritizationLesson 1613 — Vulnerability Database and CVE Mapping
- CWPP Integration
- Stream runtime alerts from container or VM agents—suspicious processes, file integrity changes, network anomalies—directly into SIEM.
- Lesson 1884 — SIEM Integration with Cloud Security Tools
- Cybercriminals
- Financially motivated actors ranging from lone operators to organized crime syndicates
- Lesson 2337 — Threat Actors and Attribution
D
- DAC
- Flexible environments where users need autonomy
- Lesson 19 — Access Control Models: DAC, MAC, and RBAC
- DAC (Discretionary)
- works well for personal content where users own resources (like Google Drive).
- Lesson 802 — Choosing and Implementing Access Models
- DAC + RBAC
- Users own resources but organizational roles set boundaries
- Lesson 802 — Choosing and Implementing Access Models
- DAI
- uses the DHCP snooping binding table to validate every ARP packet.
- Lesson 415 — DHCP Snooping and DAI
- DANE
- (DNS-Based Authentication of Named Entities) uses **DNSSEC-signed DNS records** to publish keys directly.
- Lesson 2962 — Key Discovery and Distribution
- Dangerous characters
- are neutralized before reaching the browser
- Lesson 1247 — Auto-Escaping Mechanisms and Configuration
- Dashboards
- that visualize drift by severity, resource type, and age
- Lesson 2027 — Drift Reporting and Exception ManagementLesson 2060 — Feedback Loops and Metrics
- Dashboards and Reporting
- Provides visualization for compliance, investigations, and executive reporting
- Lesson 2314 — What is a SIEM and Why Organizations Need It
- DAST
- test-drives the finished vehicle to see what happens on the road.
- Lesson 1269 — SCA vs SAST vs DASTLesson 1275 — SCA Limitations and Best PracticesLesson 1369 — DAST vs SAST: Complementary ApproachesLesson 1379 — IAST vs SAST vs DAST Trade-offsLesson 1384 — Combining IAST with Other Testing ApproachesLesson 3026 — Pipeline Security Scanning Overview
- DAST excels at
- Lesson 1369 — DAST vs SAST: Complementary Approaches
- DAST Gates
- Configure runtime test failures based on exploitable vulnerabilities detected in running applications—for example, blocking deployment if SQL injection or XSS vulnerabilities are discovered.
- Lesson 2065 — Automated Security Gates in CI/CD
- Data access layer
- – Database-level permissions and row-level security
- Lesson 838 — Access Control Defense StrategyLesson 1244 — Database Access Layer Security Patterns
- Data access patterns
- (which users access which S3 buckets, when)
- Lesson 1897 — Baseline Establishment for Cloud Resources
- Data affected
- 50,000 customer records (names, emails, purchase history)
- Lesson 2431 — Executive Summary and Business Impact
- Data at rest
- Encrypting stored data in databases, object storage, or volumes
- Lesson 1689 — Data Protection Responsibilities
- Data backup and retention
- (where applicable): Some SaaS providers offer limited recovery windows.
- Lesson 1688 — Shared Responsibility in SaaS
- Data Breach
- Legal notification timelines, forensic preservation, customer communication
- Lesson 2372 — IR Playbooks and Runbooks
- Data breaches
- – stolen secrets unlock protected systems
- Lesson 1310 — What Are Secrets and Why They MatterLesson 2254 — Spear Phishing and Targeted AttacksLesson 2647 — Trust Boundary Violations and Risks
- Data breaches involving minors
- Up to **$7,500 per child affected**
- Lesson 2568 — CPRA Amendments and Enforcement
- Data channel establishment
- Symmetric cipher begins encrypting traffic using those keys
- Lesson 487 — OpenVPN Cryptographic Configuration
- Data classification
- is the systematic process of organizing data into categories based on sensitivity, regulatory requirements, and business impact if compromised.
- Lesson 1801 — Data Classification FundamentalsLesson 2033 — Data Flow Diagrams for Security
- Data classification and handling
- You determine what data goes into the SaaS application and whether it's appropriate for that service's security level.
- Lesson 1688 — Shared Responsibility in SaaS
- Data Collection Assessment
- is the systematic process of examining every piece of personal data your system collects and asking: "Do we *really* need this?
- Lesson 2896 — Data Collection Assessment
- Data Collection Methods
- Lesson 1523 — Spyware and Information Stealers
- Data controllers
- Entities that determine *why* and *how* personal data is processed
- Lesson 2551 — GDPR Overview and Scope
- Data discovery and staging
- is the methodical process of locating valuable information—credentials, customer databases, intellectual property, financial records—and preparing it for removal while staying under the radar.
- Lesson 2125 — Data Discovery and Staging
- Data Encryption Keys (DEKs)
- encrypt your actual data
- Lesson 308 — Key Storage Encryption and ProtectionLesson 1767 — Key Management Services (KMS) Deep Dive
- Data Encryption Parameters
- Unlike Phase 1 (which used IKE), Phase 2 establishes ESP or AH protocols to actually protect the data flowing through the tunnel.
- Lesson 480 — Internet Key Exchange (IKE) Phase 2
- Data Encryption Standard (DES)
- is a symmetric block cipher adopted in 1977 that encrypts 64-bit blocks of data using a 56-bit key.
- Lesson 87 — DES: Design and Weaknesses
- Data Events
- capture data plane operations: reading S3 objects, invoking Lambda functions.
- Lesson 1871 — CloudTrail for API Activity Monitoring
- Data Execution Prevention (DEP)
- or **No-eXecute (NX)** bits that mark stack and heap memory as non-executable.
- Lesson 2109 — Return-Oriented Programming (ROP)Lesson 2112 — Bypassing DEP, ASLR, and Stack Canaries
- Data Exfiltration
- Lesson 382 — Identifying Malicious Traffic PatternsLesson 622 — Blind XXE TechniquesLesson 644 — Data Exfiltration TechniquesLesson 1084 — Service Worker Message InterceptionLesson 1588 — Application-Based Firewall RulesLesson 2117 — Post-Exploitation Goals and ObjectivesLesson 2412 — Identifying Malicious Network ActivityLesson 2877 — Malicious Pre-trained Models
- Data exfiltration patterns
- Unusually large outbound transfers to rare destinations
- Lesson 2410 — Network Flow Analysis
- Data flow
- through the application (tracking tainted user input)
- Lesson 1378 — IAST Fundamentals and How It Works
- data flow analysis
- they trace how data moves through your program from sources (where data enters) to sinks (where it's used).
- Lesson 1360 — Abstract Syntax Trees and Data Flow AnalysisLesson 3009 — Static Application Security Testing (SAST) Deep Dive
- Data Flow Diagram (DFD)
- is a visual blueprint of your system that shows how information moves through it.
- Lesson 42 — Creating a Data Flow Diagram (DFD)Lesson 57 — Tampering with Data ThreatsLesson 2637 — Creating Architecture Data Flow Diagrams
- Data Flow Diagrams
- or applied **STRIDE** alone, you might have missed threats visible only to someone else.
- Lesson 76 — Collaborative Threat Modeling Workshops
- Data Flow Diagrams (DFDs)
- are your visual foundation.
- Lesson 81 — Threat Model Documentation and ArtifactsLesson 2636 — Architectural Threat Modeling Fundamentals
- Data flow path
- showing how tainted input reaches a sink
- Lesson 1367 — Interpreting and Triaging SAST Results
- Data Flow Understanding
- Lesson 2038 — Pre-Review Preparation and Context Gathering
- Data Flows
- (arrows): How information moves between the above elements
- Lesson 42 — Creating a Data Flow Diagram (DFD)Lesson 62 — STRIDE per Element AnalysisLesson 68 — Data Flow Diagrams for Threat ModelingLesson 1895 — Custom Detection Rules and TuningLesson 2637 — Creating Architecture Data Flow Diagrams
- Data format handling
- Can your playbook parse different log formats?
- Lesson 2332 — Playbook Testing and Validation
- Data handling rules
- How to store, transmit, and dispose of sensitive information
- Lesson 2489 — Acceptable Use Policy (AUP)
- Data in transit
- Ensuring TLS/SSL for data moving between services
- Lesson 1689 — Data Protection Responsibilities
- Data Ingestion Pipelines
- Lesson 1878 — Cloud SIEM Architecture and Components
- data integrity
- and **origin authentication** for IP packets, but notably *does not encrypt* the payload.
- Lesson 477 — Authentication Header (AH) ProtocolLesson 478 — Encapsulating Security Payload (ESP)Lesson 1171 — Unicode Case Mapping and Locale IssuesLesson 1481 — Journal Gateway and Remote Access
- Data integrity issues
- can corrupt your database or business logic
- Lesson 1036 — API10:2023 - Unsafe Consumption of APIs
- Data Isolation
- Lesson 1085 — Web Workers and Shared Workers Security
- Data leakage
- Cached sensitive content might persist longer than intended
- Lesson 1862 — CDN Architecture and Threat ModelLesson 2854 — LLM Architecture and Attack Surface
- Data Leakage Threats
- Sensitive information escaping through logs, caches, screenshots, keyboard buffers, backups, or insecure storage.
- Lesson 2733 — Mobile App Threat Modeling
- Data leaks
- to expose internal communications or embarrassing information
- Lesson 50 — Motivations: Hacktivism and Ideological Attacks
- Data Link layer
- Ethernet header added (MAC addresses)
- Lesson 374 — Understanding Network Packets and Protocol Layers
- Data loss attacks
- An attacker can fill your origin's storage with garbage data, forcing the browser to evict legitimate user data
- Lesson 1079 — Storage Quota and Eviction Policies
- Data mapping
- is the systematic process of identifying and documenting *where* personal data originates, *how* it moves through systems, *where* it's stored, *who* processes it, and *where* it ultimately goes —whether deleted, archived, or shared with third part...
- Lesson 2889 — Data Mapping for PIAs
- Data masking
- replaces original sensitive values with structurally similar but fictitious data.
- Lesson 2908 — Data Masking and Tokenization
- Data Minimization
- Lesson 2553 — Data Processing PrinciplesLesson 2899 — Progressive Data CollectionLesson 2956 — Disappearing Messages and Perfect Forward Secrecy
- Data Modification and Deletion
- Lesson 850 — CSRF Impact and Real-World Examples
- data poisoning
- targets the model during its most vulnerable phase: *training*.
- Lesson 2818 — Data Poisoning Attack FundamentalsLesson 2872 — ML Supply Chain Threat Landscape
- Data portability tools
- letting users export their information
- Lesson 2886 — Visibility, Transparency, and User-Centricity
- Data processors
- Entities that process data *on behalf of* controllers
- Lesson 2551 — GDPR Overview and Scope
- Data protection
- Encryption at rest, encryption in transit, access controls, and backup systems supporting **Confidentiality** and **Availability** from the **CIA Triad**
- Lesson 23 — Defense-in-Depth PhilosophyLesson 2656 — Redundant Controls and Failure Tolerance
- Data Protection API
- allows apps to classify data sensitivity, determining when files become accessible (after first unlock, while unlocked, etc.
- Lesson 2701 — iOS Security Architecture OverviewLesson 2704 — Data Protection API and Keychain
- Data Protection Impact Assessments
- (DPIAs from lesson 2558) for high-risk processing
- Lesson 2561 — Accountability and Records of Processing
- Data protection layers
- Encrypt data at rest, in transit, and in use.
- Lesson 2671 — Defense in Depth Through Design
- Data remains encrypted
- in memory, protected from privileged access
- Lesson 2927 — Trusted Execution Environments
- Data residency
- refers to the physical location where data is stored.
- Lesson 1982 — GDPR and Data Sovereignty Requirements
- Data Return
- Contractually require vendors to return all data in agreed formats (encrypted archives, specific file types).
- Lesson 2542 — Vendor Offboarding and Data Recovery
- Data security
- – encryption, classification, and access controls
- Lesson 1687 — Shared Responsibility in PaaSLesson 2234 — Cloud-Based and Distributed CrackingLesson 2437 — Agent-Based Scanning
- Data segmentation and classification
- ensures you store, process, and protect information according to its sensitivity—preventing overexposure of critical assets while avoiding wasteful security theater on public data.
- Lesson 2652 — Data Segmentation and Classification
- Data sensitivity
- Access to PII versus public marketing pages
- Lesson 2076 — Severity Assessment and CVSS ScoringLesson 2892 — Mitigation Strategies and Controls
- Data sharing arrangements
- with external partners or across borders
- Lesson 2888 — PIA Triggers and Scoping
- Data source
- Windows Security Event 4656 or Sysmon Event ID 10
- Lesson 2181 — ATT&CK for Detection and Analytics
- Data sources
- (HTTP requests, file uploads, API calls)
- Lesson 1380 — Instrumentation Agents and Runtime Monitoring
- Data sovereignty
- Which country's laws govern your evidence?
- Lesson 1922 — Cloud Forensics Tools and Legal Considerations
- Data storage and encryption
- While providers encrypt data, you usually cannot choose encryption algorithms, manage keys directly (unless using BYOK features), or audit cryptographic implementations.
- Lesson 1679 — SaaS Security Limitations
- Data storage and transmission
- how is sensitive information protected?
- Lesson 78 — Architecture Review and Threat Identification
- Data Store
- Holds contextual data (user roles, resource attributes, etc.
- Lesson 3019 — Open Policy Agent (OPA) Introduction
- Data Stores
- (parallel lines): Where data sits (databases, file systems, caches)
- Lesson 42 — Creating a Data Flow Diagram (DFD)Lesson 62 — STRIDE per Element AnalysisLesson 68 — Data Flow Diagrams for Threat ModelingLesson 2637 — Creating Architecture Data Flow Diagrams
- Data tagging and metadata
- Label datasets with their collection purpose at ingestion.
- Lesson 2900 — Purpose Limitation in System Design
- Data tampering
- Attackers can modify stored data to bypass client-side validation, manipulate application state, or escalate privileges
- Lesson 1072 — Client-Side Storage Overview and Threat Model
- Data theft
- App A cannot read App B's saved passwords, tokens, or user data
- Lesson 2713 — Android Application Sandboxing
- Data Type
- Ensure the input is the expected primitive type (integer, string, boolean, decimal).
- Lesson 1153 — Data Type and Format Validation
- Data type compatibility
- Columns must be compatible types (string to string, etc.
- Lesson 578 — Union-Based SQLi Data Extraction
- Database
- Sessions stored in MySQL, PostgreSQL, etc.
- Lesson 705 — Session Storage Mechanisms: Server-Side vs Client-SideLesson 1167 — Unicode Normalization and Equivalence
- Database → Application Logic
- Even data retrieved from your own database if it originally came from users
- Lesson 1149 — Trust Boundaries and Data Flow
- Database access
- On-premises applications securely query cloud-hosted databases without exposing them to the internet.
- Lesson 472 — VPN Use Case: Secure Cloud ConnectivityLesson 2628 — Fail-Safe Defaults and Secure Defaults
- Database access boundaries
- Trusted, parameterized queries should be the *only* way business logic talks to databases
- Lesson 1212 — Separation of Concerns for Security Boundaries
- Database access layers
- Applications don't query databases directly—they go through a controlled service
- Lesson 29 — Security Choke Points
- Database audit logs
- Confirm all connections use encrypted channels
- Lesson 1780 — Transit Encryption Monitoring and Compliance
- Database constraints
- – final integrity check at storage layer
- Lesson 1209 — Defense in Depth Through Layered Validation
- Database Encryption Key (DEK)
- Encrypts the actual data pages
- Lesson 1793 — Transparent Data Encryption (TDE)
- Database Errors
- Raw SQL errors reveal table names, column structures, and database types, making SQL injection attempts easier.
- Lesson 1007 — GraphQL Error Handling and Information Leakage
- Database indexing
- Fixed-length hashes work perfectly as database keys or in data structures that require consistent- sized values.
- Lesson 204 — Fixed-Length Output Property
- Database layer
- Constraints and type checking as a final safety net
- Lesson 1152 — Validation Layers and Defense in Depth
- Database records
- (order status, workflow stage)
- Lesson 911 — Understanding Application State and Workflow
- Database Security
- Your FIM baseline database (the "known-good" fingerprints) must be read-only to normal processes.
- Lesson 1507 — Protecting FIM Infrastructure
- Database Zone
- Database servers, accessible only from Server Zone (10.
- Lesson 450 — Internal Network Zoning
- Database-Specific Functions
- Lesson 572 — Database Fingerprinting via SQL InjectionLesson 582 — Database Fingerprinting Techniques
- Databases
- (SQL servers, MongoDB instances, cloud storage buckets)
- Lesson 2125 — Data Discovery and Staging
- Databases (PostgreSQL/MySQL)
- Lesson 1437 — Service Configuration Hardening
- DataContractSerializer
- and similar XML-based deserializers can also be exploited when configured to accept arbitrary types rather than a safe allowlist.
- Lesson 1185 — Insecure Deserialization in .NET
- Dataset Compromise
- Poisoning widely-used training datasets (scraped web data, benchmark sets) means hundreds of downstream models inherit the backdoor automatically.
- Lesson 2823 — Supply Chain Poisoning in ML Pipelines
- Days 0-30
- CloudTrail logs in standard storage, instantly queryable
- Lesson 1874 — Log Retention and Lifecycle Policies
- Days 31-365
- Moved to infrequent access storage, slower retrieval
- Lesson 1874 — Log Retention and Lifecycle Policies
- DCS
- (Distributed Control Systems) for process automation
- Lesson 2803 — OT and ICS Security Fundamentals
- DDE
- (a legacy protocol for inter-application communication).
- Lesson 980 — Office Macro and DDE Exploits
- DDoS resilience
- Distributes attack surface across independent infrastructure
- Lesson 1834 — Multi-AZ Subnet Design for Resilience
- De-identification
- is the broader umbrella term for any technique that removes or obscures personally identifiable information, including both anonymization and pseudonymization approaches.
- Lesson 2902 — Anonymization vs. Pseudonymization
- Dead Letter Queue
- is a separate queue or topic where failed events are routed after all retry attempts are exhausted.
- Lesson 1958 — Dead Letter Queues and Error Handling
- Dealer trust
- If secret sharing uses a single dealer, they temporarily see the entire secret.
- Lesson 266 — Threshold Cryptography Applications and Security
- Deauthenticate users
- from the real AP using techniques you've learned, forcing reconnection to the stronger evil twin
- Lesson 534 — Evil Twin Attacks: Mechanics and Execution
- Deauthenticating
- clients from the real AP (forcing disconnect)
- Lesson 535 — Evil Twin Attack Techniques and Tools
- Deauthentication frames
- tell a client "you're no longer authenticated, disconnect immediately"
- Lesson 527 — Deauthentication and Disassociation Attacks
- Deauthentication/disassociation floods
- – unusually high volumes of management frames
- Lesson 550 — Wireless Packet Capture and Analysis
- Debug approach
- Compare Phase 1 and Phase 2 proposals on both endpoints.
- Lesson 484 — IPsec Troubleshooting and Common Misconfigurations
- Debug lockout modes
- Use processor security features to disable JTAG after initial programming
- Lesson 2776 — Debug Interfaces and JTAG Security
- Debug logging
- that dumps request/response bodies or variable values
- Lesson 1354 — Preventing Secrets in Logs and Error Messages
- Debug overrides
- (to allow proxy tools during testing)
- Lesson 2719 — Android Certificate Pinning and Network Security
- Debug TLS connections
- in controlled environments
- Lesson 381 — Decrypting TLS Traffic with Private Keys
- Debugger Detection
- Lesson 1555 — Anti-Detection TechniquesLesson 2718 — Android Root Detection and Anti-Tampering
- Debugging exposure
- Developers might cache authentication tokens or PII during development, forgetting to remove caching logic
- Lesson 1076 — Cache API and Service Worker Storage
- Decapping
- Chemically removing chip packaging to expose the silicon die, enabling microscope-assisted reverse engineering or data extraction
- Lesson 2775 — Physical Tampering and Anti-Tamper Mechanisms
- Decapsulation
- Alice unlocks the box with her private key to recover Bob's secret and derives the same shared secret
- Lesson 270 — CRYSTALS-Kyber: Post-Quantum Key Encapsulation
- Decentralization
- No single trusted third party controls the computation
- Lesson 255 — Introduction to Secure Multi-Party Computation (MPC)
- Decision
- If clean, move to permanent storage; if infected, reject and log
- Lesson 961 — Virus Scanning and Malware Detection Integration
- Decision Engine
- Evaluates queries against policies and data
- Lesson 3019 — Open Policy Agent (OPA) Introduction
- Decision Points
- Where the application checks conditions and branches (e.
- Lesson 937 — Mapping Business WorkflowsLesson 2311 — Playbooks and Standard Operating ProceduresLesson 2327 — Playbook Design FundamentalsLesson 2350 — Triage Playbooks and Runbooks
- Decode all encoding layers
- (URL encoding, HTML entities, Unicode normalization)
- Lesson 1166 — Defense: Canonical Form Validation Strategies
- Decoder
- is your Swiss Army knife for transforming data formats.
- Lesson 2215 — Advanced Burp Features and Workflows
- Decompile
- Use tools to convert the binary back into readable code
- Lesson 2731 — Repackaging and Code Injection Attacks
- Decomposed form
- (NFD): Base letter "e" (`U+0065`) + combining acute accent (`U+0301`)
- Lesson 1167 — Unicode Normalization and Equivalence
- Decoy Scanning
- sends packets from fake IP addresses alongside your real one.
- Lesson 347 — Firewall and IDS EvasionLesson 370 — Decoy Scanning and IP Spoofing
- Decrypt access
- Separate KMS key permissions control who can decrypt encrypted logs
- Lesson 1875 — Log Encryption and Access Controls
- Decrypt packets
- by exploiting the repeated key stream in protocols like AES-GCMP
- Lesson 528 — KRACK Attack on WPA2
- Decrypted secrets
- Passwords, encryption keys, and credentials in plaintext
- Lesson 2389 — Memory Forensics Fundamentals
- Decryption
- XOR the ciphertext with the same keystream to recover plaintext
- Lesson 115 — Stream Cipher Fundamentals and XOR OperationsLesson 143 — RSA Encryption and Decryption OperationsLesson 1766 — Client-Side Encryption for Cloud Data
- Decryption happens only
- on the recipient's device using their private key
- Lesson 2939 — What is End-to-End Encryption (E2EE)
- Decrypts blocks on-the-fly
- when your instance reads data
- Lesson 1770 — Encryption for Block Storage and Virtual Disks
- Dedicated fuzzing infrastructure
- Long-running clusters that build corpora over days and weeks
- Lesson 1394 — Continuous Fuzzing and Integration
- Dedicated Hosts
- give you an entire physical server with visibility into sockets, cores, and host IDs.
- Lesson 1815 — Network Isolation with Dedicated Tenancy
- Dedicated Instances
- run on hardware dedicated to your account, but AWS/Azure/GCP still manages placement.
- Lesson 1815 — Network Isolation with Dedicated Tenancy
- Dedicated parsers
- are purpose-built for specific formats.
- Lesson 1181 — Alternative Parsing Strategies
- Dedicated QA/staging environments
- IAST runs continuously in pre-production
- Lesson 1382 — IAST Deployment Models and Performance Impact
- Dedicated scanner service accounts
- (not admin personal accounts)
- Lesson 2436 — Authenticated Scanning and Credentialed Checks
- Dedicated security page
- Host your full VDP at `https://yourdomain.
- Lesson 2472 — Creating and Publishing a VDP
- Dedicated Storage Volumes
- Lesson 983 — Secure File Storage Architecture
- Dedicated triage personnel
- separate from remediation teams
- Lesson 2486 — Scaling and Optimizing Programs
- Deduplication
- eliminates redundant entries, keeping the most accurate or severe instance.
- Lesson 1309 — Vulnerability Aggregation and DeduplicationLesson 1402 — Security Test Results Management
- Deep Content Inspection
- Use specialized libraries to parse the file structure and examine what's embedded.
- Lesson 962 — Document Format Validation for Office Files
- Deep inspection
- Running on the endpoint itself, agents access system internals that **Authenticated Scanning** can reach but with persistent presence.
- Lesson 2437 — Agent-Based Scanning
- deep packet inspection
- sees *what* the traffic actually is, not just *where* it's going.
- Lesson 420 — Next-Generation Firewalls (NGFW)Lesson 1853 — Cloud Firewall Architectures
- Deep-dive
- Load relevant PCAP slices into Wireshark for protocol-level investigation
- Lesson 2416 — Network Forensics Tools and Workflows
- Default credentials
- and weak authentication settings
- Lesson 2434 — Vulnerability Scanning FundamentalsLesson 2800 — Default Credentials and Weak Authentication
- default deny
- principle and creating **explicit allow rules**, you now refine those rules to be as narrow as possible:
- Lesson 430 — Least Privilege Network AccessLesson 1210 — Fail Securely and Handle Errors SafelyLesson 1406 — Default Deny and AllowlistingLesson 1407 — Disabling Unnecessary Services and DaemonsLesson 1453 — SELinux Architecture and ComponentsLesson 1705 — Policy Evaluation Logic and PrecedenceLesson 1713 — Policy Structure: Elements, Syntax, and Evaluation LogicLesson 2677 — Least Privilege Access in Zero Trust
- Default Deny Principle
- means your firewall's baseline rule is to block *all* traffic unless you've explicitly allowed it.
- Lesson 428 — Default Deny PrincipleLesson 435 — Rule Review and MaintenanceLesson 452 — East-West Traffic Control
- Default Encryption
- Ensures all objects are encrypted at rest, even if not specified during upload.
- Lesson 1782 — S3 Bucket Security Fundamentals
- Default encryption settings
- that automatically apply encryption to all new objects
- Lesson 1790 — Storage Service Encryption Integration
- default gateway
- .
- Lesson 353 — Gateway and Router IdentificationLesson 386 — ARP Spoofing Attack Techniques
- Default VLAN usage
- Never use VLAN 1 for production traffic—it's a security risk and management nightmare.
- Lesson 2649 — VLAN and Subnet Segmentation
- Default-deny is safer
- Anything you didn't think of is automatically rejected
- Lesson 1150 — Allowlist vs Denylist Approaches
- Default-deny principle
- Most firewalls end with an implicit or explicit "deny all" rule at the bottom, so anything not explicitly allowed gets blocked.
- Lesson 427 — Rule Ordering and Priority
- Defeat secure boot
- Make verification routines return "success" without checking
- Lesson 2774 — Fault Injection Attacks
- Defeat SSL pinning
- Intercept certificate validation to accept any cert
- Lesson 2726 — Dynamic Analysis and Runtime Instrumentation
- Defense
- Never trust cookies blindly.
- Lesson 725 — Cookie Scope and Domain SecurityLesson 1102 — HTTP/3 and QUIC Security Fundamentals
- Defense in Depth
- by ensuring each layer defaults to secure rather than relying on another layer to catch mistakes.
- Lesson 4 — Fail-Safe Defaults and Secure by DefaultLesson 5 — Complete MediationLesson 6 — Open Design and Security Through ObscurityLesson 7 — Separation of Duties and Privilege SeparationLesson 8 — Economy of Mechanism and Keep It SimpleLesson 9 — Psychological Acceptability and Usable SecurityLesson 10 — Attack Surface ReductionLesson 12 — Security as a Non-Functional Requirement (+26 more)
- Defense Mechanisms
- Lesson 852 — CSRF vs XSS: Key Differences
- Defense-in-Depth
- and **Security Layer Categories**: you've established multiple protective layers, but now you must evaluate which one fails first under pressure.
- Lesson 30 — Weakest Link AnalysisLesson 61 — Elevation of Privilege ThreatsLesson 276 — Hybrid Cryptographic ApproachesLesson 982 — Multi-Layer File Upload Validation StrategyLesson 1140 — Defense-in-Depth for Frame-Based AttacksLesson 1416 — CIS Level 1 vs Level 2 HardeningLesson 1779 — VPN and Private Connectivity EncryptionLesson 1830 — Route Tables and Subnet Associations (+4 more)
- Defensive coverage measurement
- means mapping your security controls (EDR, SIEM rules, network sensors, etc.
- Lesson 2185 — Measuring Defensive Coverage with ATT&CK
- Defensive Improvements
- measure tangible changes implemented after the exercise.
- Lesson 2175 — Measuring Exercise Effectiveness
- Defensive Tool Deployment
- Lesson 2170 — Blue Team Responsibilities and Tools
- Defensive wins
- Celebrate successful detections and response actions
- Lesson 2174 — Debrief and Knowledge Transfer
- Defer
- Valid but low-priority
- Lesson 1367 — Interpreting and Triaging SAST ResultsLesson 2448 — SSVC (Stakeholder-Specific Vulnerability Categorization)
- Define clear trigger conditions
- to avoid false positive actions
- Lesson 1911 — Cloud IR Playbooks and Automation
- Define detection logic
- (what pattern indicates malicious use vs legitimate?
- Lesson 2181 — ATT&CK for Detection and Analytics
- Define organizational risk appetite
- – What level of security risk is acceptable?
- Lesson 2487 — Purpose and Scope of Information Security Policy
- Define security requirements
- – Does the system need encryption?
- Lesson 77 — Threat Modeling in Requirements Phase
- Define the baseline
- Select a compliance framework (PCI-DSS, HIPAA, CIS Level 1/2, custom policy)
- Lesson 1621 — Compliance Scanning and Validation
- Define the structure
- Use format specifications (JSON schemas, protocol RFCs, file format specs) or reverse-engineer the grammar
- Lesson 1390 — Structured Input Fuzzing
- Define the threat
- (what attack are you detecting?
- Lesson 2319 — Use Cases and Detection Content Development
- Defined
- Documented processes are in place and generally followed
- Lesson 34 — Security Maturity Models and Assessment
- Degraded performance
- Noticeably slower speeds (attackers relay your traffic)
- Lesson 537 — Detecting Evil Twin Attacks from Client Perspective
- Delays and throttling
- `--delay=2` adds pauses between requests to avoid rate-limiting triggers
- Lesson 590 — SQLMap Evasion and Tampering Scripts
- Delegated administration
- Allow team leads to manage IAM without risking full admin escalation
- Lesson 1707 — IAM Boundaries and Permission Guardrails
- Delegation
- Allow users to assume roles but limit what they can do through session policies
- Lesson 1732 — Role Chaining and Session Policies
- DELETE /api/documents/abc123
- Delete files you shouldn't access
- Lesson 817 — IDOR in REST APIs and GraphQL
- Delete resource-heavy dependencies
- (load balancers, NAT gateways, instances)
- Lesson 1818 — VPC Deletion and Cleanup Security
- Delete/modify access
- Heavily restricted; often prohibited entirely for compliance
- Lesson 1875 — Log Encryption and Access Controls
- Deleted/draft messages
- often exposing intent or hidden coordination
- Lesson 2406 — Email and Communication Forensics
- Deletion
- Lesson 1430 — Account Lifecycle and Privilege ReviewLesson 1484 — Log Rotation and Retention Policies
- Deletion Obligation
- Upon request, the vendor must delete consumer data (unless legally retained)
- Lesson 2567 — Service Provider and Third-Party Contracts
- Deletion Verification
- Demand certificates of destruction following your data retention policies.
- Lesson 2542 — Vendor Offboarding and Data Recovery
- Deliver malware links
- disguised as legitimate notifications
- Lesson 1087 — Web Push Notifications and Permissions
- Delivery mechanisms
- that might execute uploaded content
- Lesson 945 — File Upload Attack Surface and Risk Assessment
- Delta analysis
- Rather than rebuilding from scratch, identify what changed: new components, modified trust boundaries, altered data flows.
- Lesson 2644 — Iterating Threat Models with Architecture Changes
- Delta Chat
- implements Autocrypt to transform email into a WhatsApp-like experience.
- Lesson 2966 — Modern Alternatives: Autocrypt and Delta Chat
- Delta CRLs
- only contain changes since the last full CRL—like incremental backups versus full backups— reducing download size and bandwidth.
- Lesson 191 — Certificate Revocation Lists (CRLs)
- Demilitarized Zone (DMZ)
- is a separate network segment that sits between the internet and your internal network.
- Lesson 423 — Demilitarized Zones (DMZ)
- Demographics
- age, gender, ethnicity, marital status
- Lesson 2904 — Quasi-Identifiers and Re-identification Risk
- Denial of Service
- or **Tampering** to disrupt operations.
- Lesson 55 — Introduction to STRIDELesson 62 — STRIDE per Element AnalysisLesson 63 — STRIDE per Interaction AnalysisLesson 66 — STRIDE Mitigations and ControlsLesson 76 — Collaborative Threat Modeling WorkshopsLesson 1173 — Emoji and Combining Character AttacksLesson 1193 — Prototype Pollution FundamentalsLesson 1963 — XML External Entities and Insecure Deserialization (+2 more)
- Denial of Service (DoS)
- threat targets the **Availability** component of the CIA Triad.
- Lesson 60 — Denial of Service ThreatsLesson 527 — Deauthentication and Disassociation AttacksLesson 959 — File Size Limits and Resource Exhaustion Prevention
- Denial of service concerns
- Rejecting too strictly might lock out legitimate users
- Lesson 1155 — Rejecting vs Sanitizing Invalid Input
- Denied attempts
- Failed cross-account calls often indicate reconnaissance
- Lesson 1743 — Cross-Account Access Auditing
- Denoising filters
- (like median filters or deep learning denoisers) explicitly remove patterns that look like noise— which adversarial perturbations essentially are, from a signal-processing perspective.
- Lesson 2850 — Input Transformation Defenses
- deny
- Lesson 1649 — Admission Controllers and Policy EnforcementLesson 1822 — Network ACL Structure and Subnet AssociationLesson 2705 — iOS Permissions and Privacy Controls
- deny by default
- every action should require explicit authorization, not just the "sensitive" ones.
- Lesson 838 — Access Control Defense StrategyLesson 839 — Deny by Default Principles
- Deny everything else
- Lesson 428 — Default Deny Principle
- Deny-on-create rules
- that reject resource creation without required tags
- Lesson 1997 — Mandatory Tags for Security and Compliance
- Denylist (Negative Validation)
- Define what is explicitly *forbidden* and allow everything else.
- Lesson 1150 — Allowlist vs Denylist Approaches
- denylists
- (blocklists), which try to enumerate all possible bad inputs—an impossible task against creative attackers.
- Lesson 669 — Input Validation and SanitizationLesson 1653 — Seccomp ProfilesLesson 1860 — Geo- Blocking and IP Reputation
- Departmental heat maps
- showing organizational weak spots
- Lesson 2252 — Social Engineering Reporting and Metrics
- Dependabot alerts
- Notifications when vulnerabilities are found
- Lesson 1303 — GitHub Dependency Scanning and Dependabot
- Dependabot security updates
- Auto-PRs to fix vulnerabilities
- Lesson 1303 — GitHub Dependency Scanning and Dependabot
- Dependabot version updates
- Auto-PRs to update dependencies based on schedule
- Lesson 1303 — GitHub Dependency Scanning and Dependabot
- Dependencies
- Which nodes enable multiple attack paths (high-value targets)?
- Lesson 2641 — Architecture-Level Attack Trees
- Dependency coverage
- How many components undergo SCA scanning
- Lesson 3017 — Test Coverage and Effectiveness Metrics
- Dependency depth
- measures how many layers deep your dependencies go.
- Lesson 1259 — Understanding Software Dependencies and Transitive Risk
- Dependency graph
- Shows all your dependencies visually
- Lesson 1303 — GitHub Dependency Scanning and Dependabot
- Dependency management
- – third-party libraries and packages
- Lesson 1687 — Shared Responsibility in PaaS
- Dependency pinning
- locks exact versions in `requirements.
- Lesson 2875 — Dependency Vulnerabilities in ML Frameworks
- Dependency risk assessment
- Identify unmaintained or high-risk components
- Lesson 1276 — What is an SBOM and Why It Matters
- Dependency scanning
- Check if npm packages have known pollution CVEs
- Lesson 1197 — Detecting Prototype Pollution VulnerabilitiesLesson 2048 — Dependency Scanning in Build Pipelines
- Dependency tracking
- (understand transitive dependencies)
- Lesson 1646 — Software Bill of Materials (SBOM) for Containers
- Deploy new keys
- using your key rotation procedures
- Lesson 318 — Key Revocation and Compromise Response
- Deploy patch to staging
- Apply updates to isolated test systems first
- Lesson 2455 — Patch Testing and Staging Environments
- Deploy the configuration change
- – new connections use the new user, old connections continue with the old user
- Lesson 1347 — Database Credential Rotation
- Deploy time
- IaC validation, DAST against ephemeral environments
- Lesson 2057 — Continuous Security Integration
- Deploy to test environment
- using your IaC templates
- Lesson 2020 — Testing and Validation of IaC Security Controls
- Deployment
- administrators apply updates to live IDS/IPS
- Lesson 456 — Signature-Based Detection FundamentalsLesson 2248 — GoPhish Phishing FrameworkLesson 2822 — Trojan Attacks on Neural Networks
- Deployment Phase
- Use code signing, enable obfuscation, configure app transport security, implement root/jailbreak detection, and establish secure update mechanisms.
- Lesson 2732 — Secure Mobile Development Lifecycle
- Deployment Scale
- Organizations deploy thousands or millions of identical IoT devices.
- Lesson 2750 — IoT Attack Surface and Unique Challenges
- Deployment Strategy
- Use blue-green deployments or canary releases even for emergency patches.
- Lesson 2069 — Vulnerability Response and Hotfix Process
- Deployment to staging
- DAST and IAST test running applications
- Lesson 1395 — Security Testing in CI/CD Fundamentals
- Deploys to staging
- Spins up your application in an ephemeral or dedicated test environment (containers, VMs, or cloud instances)
- Lesson 1401 — Dynamic Testing and DAST in Pipelines
- Deprecated endpoints
- that were removed from newer versions for security reasons
- Lesson 998 — API Versioning and Legacy Endpoint Vulnerabilities
- Deprecated status
- Explicit EOL announcements
- Lesson 1267 — Unmaintained Dependencies and End-of-Life Libraries
- Deprecation
- is the controlled process of retiring those old versions safely.
- Lesson 1038 — API Versioning and Deprecation
- DER
- is the raw binary encoding of certificate data.
- Lesson 179 — Certificate Encoding: PEM, DER, PKCS#12, and Formats
- Derive from user password
- Requires user to re-enter password
- Lesson 1078 — Client-Side Encryption for Storage
- Descriptive
- Names should clearly indicate the permission granted
- Lesson 761 — OAuth 2.0 Scopes and Consent
- Deserialization
- is the reverse: reading that stored format and reconstructing the original object in memory.
- Lesson 1183 — Deserialization Fundamentals and Attack Surface
- Deserialization Vulnerabilities
- appear frequently in libraries that handle serialized data formats.
- Lesson 1260 — Common Vulnerability Types in Dependencies
- Design effectiveness
- asks: *Is this control capable of preventing or detecting the risk it's meant to address?
- Lesson 2547 — Control Testing Methodologies
- Design Phase
- Apply threat modeling (STRIDE, attack trees) to your architecture.
- Lesson 2732 — Secure Mobile Development Lifecycle
- Destination
- Where is it going?
- Lesson 429 — Explicit Allow RulesLesson 882 — SSRF Fundamentals and Attack SurfaceLesson 900 — Monitoring and Detection of SSRF Attempts
- Destination limits
- Permit access only to the specific servers or services needed
- Lesson 430 — Least Privilege Network Access
- Destination NACL
- Does it allow inbound traffic on the target port *and* outbound ephemeral responses?
- Lesson 1826 — Common Misconfigurations and Troubleshooting
- Destination oddities
- Traffic to suspicious IPs or domains
- Lesson 382 — Identifying Malicious Traffic Patterns
- Destination port
- Where the mirrored traffic is sent
- Lesson 404 — Port Mirroring and SPAN PortsLesson 417 — Packet Filtering Firewalls
- Destination Security Group
- Does it permit inbound traffic from the source?
- Lesson 1826 — Common Misconfigurations and Troubleshooting
- Destroy test infrastructure
- automatically
- Lesson 2020 — Testing and Validation of IaC Security Controls
- Destruction
- After report delivery and client acceptance, securely delete all sensitive data using methods like secure erase or physical destruction.
- Lesson 2096 — Data Handling and ConfidentialityLesson 2885 — End-to-End Security and Lifecycle Protection
- Detached signatures
- keep the signature in a separate file from the data being signed.
- Lesson 232 — Detached Signatures and Signature FormatsLesson 2960 — OpenPGP Message Format and Operations
- Detailed server-side logging
- Log everything internally—exact validation failures, attempted payloads, timestamps, source IPs.
- Lesson 1156 — Validation Error Handling
- Detailed validation failures
- (enable enumeration attacks)
- Lesson 1040 — Error Handling and Information Disclosure
- Detect
- Lesson 21 — Security Frameworks: NIST Cybersecurity FrameworkLesson 58 — Repudiation ThreatsLesson 462 — IPS Blocking Actions and ResponseLesson 2610 — NIST Cybersecurity Framework (CSF)Lesson 2623 — Compliance as Code
- Detect change
- through architecture review boards or automated diagram comparisons
- Lesson 2644 — Iterating Threat Models with Architecture Changes
- Detect dangerous patterns
- (hardcoded secrets, SQL concatenation, unsafe deserialization)
- Lesson 2037 — Security-Focused Code Review Fundamentals
- Detect exceptions
- – Did someone disable encryption for "testing" and forget to re-enable it?
- Lesson 1780 — Transit Encryption Monitoring and Compliance
- Detect malicious behavior
- such as data exfiltration or unauthorized permissions
- Lesson 2722 — Introduction to Mobile App Reverse Engineering
- Detect Orphaned Resources
- Identify resources lacking ownership tags or those whose tagged owner has left the organization.
- Lesson 2001 — Tag-Based Resource Inventory and Discovery
- Detect over-permissioning
- Compare granted permissions against *actual API calls* made by identities
- Lesson 1749 — Access Analyzer and Unused Access Detection
- Detect spoofing
- Spot unauthorized IPs failing authentication
- Lesson 2303 — DMARC Reporting and Analysis
- Detect symlinks during processing
- Check if uploaded files are symlinks and reject them
- Lesson 969 — Symbolic Link Attacks
- Detect threats
- Identify malware signatures, exploit attempts, privilege escalations, and anomalous behavior
- Lesson 1930 — Instance Monitoring and Runtime ProtectionLesson 2305 — What is a Security Operations Center (SOC)?
- Detect unauthorized changes
- to critical system files, configurations, and executables
- Lesson 1500 — File Integrity Monitoring Fundamentals
- detect-secrets
- , and **Talisman** provide pre-commit hook frameworks.
- Lesson 1351 — Pre-commit Hooks for Secret PreventionLesson 3031 — Secret Detection in Pipelines
- Detectability
- Revealing that certain data or activities exist (e.
- Lesson 70 — LINDDUN for Privacy Threat Modeling
- Detection
- Identifying vulnerable input parameters
- Lesson 592 — NoSQLMap and NoSQL Injection AutomationLesson 1307 — License Compliance ScanningLesson 1617 — Configuration Management FundamentalsLesson 2085 — Penetration Testing vs Red TeamingLesson 2407 — Anti-Forensics Detection and Encrypted Volumes
- Detection and Analysis
- Lesson 2170 — Blue Team Responsibilities and Tools
- Detection coverage
- → Protected business systems and data
- Lesson 2359 — Reporting SOC Performance to LeadershipLesson 2366 — Containment Strategies: Short- Term vs Long-Term
- Detection Engineering
- – Are you relying on vendor defaults, or building custom detection logic?
- Lesson 2313 — SOC Maturity Models
- Detection gaps
- Blue team identifies what they *should have* seen but didn't
- Lesson 2174 — Debrief and Knowledge TransferLesson 2356 — Detection Coverage Measurement
- Detection layer
- Monitor CloudTrail and application logs for metadata access
- Lesson 1939 — IMDS Security Best Practices and Monitoring
- Detection levels
- (1-5) control thoroughness:
- Lesson 587 — SQLMap Detection and Fingerprinting Techniques
- Detection Logic
- Your script should test injection points (URL parameters, form fields, headers) with payloads like `' OR '1'='1`, `1' AND SLEEP(5)--`, and union-based probes.
- Lesson 593 — Custom SQL Injection Automation ScriptsLesson 2002 — Tag Governance and Remediation WorkflowsLesson 2181 — ATT&CK for Detection and Analytics
- Detection Phase
- Lesson 539 — Wireless Intrusion Prevention Systems (WIPS)Lesson 1752 — IAM Access Advisor and Remediation WorkflowsLesson 1899 — Machine Learning for Cloud Anomaly Detection
- Detection Quality
- Request a trial with your actual environment.
- Lesson 2011 — CSPM Vendor Selection and Deployment
- Detection Rates
- track what percentage of red team techniques were caught by the blue team.
- Lesson 2175 — Measuring Exercise Effectiveness
- Detection rule sharing
- Give blue team actual queries and signatures
- Lesson 2174 — Debrief and Knowledge Transfer
- Detection source
- GuardDuty findings route differently than VPC Flow Log anomalies
- Lesson 1903 — Alert Routing and Escalation Workflows
- Detection systems
- (cameras, motion sensors, alarms)
- Lesson 2279 — Physical Access Control Models and Zones
- Detection triggers
- What metrics indicate an attack (traffic spikes, error rate increases, geo-blocking hits from lesson 1860)
- Lesson 1861 — DDoS Response and Incident Management
- Detective + Technology C
- SIEM monitoring for unusual access patterns
- Lesson 2658 — Control Diversity: Types and Technologies
- Detective controls
- identify attacks in progress or after they occur.
- Lesson 27 — Security Control TypesLesson 1999 — Automated Tag Enforcement and Validation
- Determine intent
- Accidental share or malicious exfiltration?
- Lesson 1808 — DLP Monitoring and Incident Response
- Determine sensitivity
- How much could one person's data change the result?
- Lesson 2915 — The Laplace Mechanism
- Determine the blast radius
- What systems did this secret grant access to?
- Lesson 1357 — Secret Leakage Response Procedures
- deterministic
- (predictable or reused in a pattern), attackers can exploit this weakness.
- Lesson 135 — Deterministic IVs and Predictability AttacksLesson 148 — PSS: Probabilistic Signature SchemeLesson 167 — Curve25519 and EdDSALesson 198 — Hash Function FundamentalsLesson 203 — Determinism and Avalanche EffectLesson 228 — EdDSA and Ed25519 Signatures
- Deterministic or randomized
- Supports both modes depending on requirements
- Lesson 271 — CRYSTALS-Dilithium: Post-Quantum Digital Signatures
- Deterrent + Technology E
- Legal warnings displayed before access
- Lesson 2658 — Control Diversity: Types and Technologies
- Develop configuration standards
- for all system components that address known security vulnerabilities
- Lesson 2572 — Requirement 2: Secure Configurations
- Developer awareness
- The 2017 spotlight drove widespread fixes
- Lesson 1202 — The Rise and Fall of XXE and XML Security
- Developer self-service
- Let developers create roles, but only with permissions within a safe boundary
- Lesson 1707 — IAM Boundaries and Permission Guardrails
- Developing
- Some policies exist but aren't consistently followed
- Lesson 34 — Security Maturity Models and Assessment
- Development and testing
- environments where convenience matters more than elaborate controls
- Lesson 1318 — Environment Variables as a Secrets Storage Mechanism
- Development environments
- Use reconciliation loops on a schedule
- Lesson 2025 — Automated Drift Remediation Strategies
- Development leads
- confirm code quality and basic security practices
- Lesson 2064 — Security Sign-Off and Approval Workflows
- Development libraries
- `-dev` or `-devel` packages
- Lesson 1408 — Removing Unnecessary Software Packages
- Development Phase
- Enforce secure coding standards—proper use of KeyStore/Keychain, input validation, avoiding hardcoded secrets, implementing certificate pinning, and using platform security APIs correctly.
- Lesson 2732 — Secure Mobile Development Lifecycle
- Development vs. Production
- Debug interfaces should be **fully functional during development** but **disabled or secured in production devices**.
- Lesson 2776 — Debug Interfaces and JTAG Security
- Development/staging replicas
- with realistic data and configurations
- Lesson 3051 — Testing and Validating Remediation Actions
- Device attestation
- proving to remote servers that your hardware is genuine
- Lesson 307 — Trusted Platform Modules (TPMs)
- Device backups
- Messages might persist in cloud/local backups
- Lesson 2956 — Disappearing Messages and Perfect Forward Secrecy
- Device compliance
- (patch level, encryption, endpoint security status)
- Lesson 2686 — BeyondCorp Model and Zero Trust Access
- Device Enrollment
- – The entire device is managed (common for company-owned devices).
- Lesson 2742 — Mobile Device Management (MDM) Fundamentals
- Device Hardening
- means disabling Bluetooth when not needed, just as you lock your car when parked.
- Lesson 560 — Bluetooth Security Best Practices
- Device identifiers
- Phone numbers, device IDs, MAC addresses
- Lesson 2974 — What is Metadata and Why It Matters
- Device impersonation
- Pretend to be a master controller or sensor
- Lesson 2787 — BACnet and Modbus Protocol Security
- Device inventory
- (is this a known, managed device?
- Lesson 2686 — BeyondCorp Model and Zero Trust Access
- Device linking
- typically works through an authenticated channel.
- Lesson 2955 — Device Management and Multi-Device Security
- Device posture
- (security state of your endpoint)
- Lesson 2685 — Software-Defined Perimeter and Identity-Based SegmentationLesson 2687 — Context- Aware Access Controls
- Device registration/enrollment
- Establishing baseline device identity
- Lesson 2678 — Device Trust and Endpoint Security
- Device seizure
- is the most direct threat.
- Lesson 2957 — Encrypted Messaging Attacks and Vulnerabilities
- Device state
- Is the device managed, compliant, and recognized?
- Lesson 1747 — Conditional Access and Context-Aware MFA
- Device switching
- Sudden change in user agent mid-session
- Lesson 737 — Session Monitoring and Anomaly Detection
- Device usage
- BYOD rules, company laptop standards, mobile device expectations
- Lesson 2489 — Acceptable Use Policy (AUP)
- Device-to-device verification
- Your existing phone authenticates the new laptop (e.
- Lesson 2947 — E2EE Backup and Multi-Device
- Dex/code integrity checks
- Calculate checksums of your compiled code and verify they match expected values
- Lesson 2718 — Android Root Detection and Anti-Tampering
- DFD sketches
- during design discussions or apply **STRIDE per Element** during code reviews.
- Lesson 83 — Developer Training on Threat Modeling
- DH ratchet
- Performs new Diffie-Hellman exchanges periodically to inject fresh entropy
- Lesson 2942 — Signal Protocol Fundamentals
- DHCP snooping
- creates a trust boundary: only designated "trusted" ports (where legitimate DHCP servers sit) can offer IP addresses.
- Lesson 409 — Switch Port Security and DefensesLesson 415 — DHCP Snooping and DAI
- DHE (Diffie-Hellman Ephemeral)
- or **ECDHE (Elliptic Curve Diffie-Hellman Ephemeral)** cipher suites instead of static RSA key exchange.
- Lesson 2979 — Implementing Forward Secrecy in TLS
- dictionary attack
- is smarter: instead of random combinations, attackers use *wordlists*—files containing thousands or millions of commonly used passwords like "password", "123456", "qwerty", and "admin".
- Lesson 696 — Brute Force and Dictionary AttacksLesson 789 — Weak Secret Keys and Brute ForceLesson 2227 — Dictionary Attacks with Wordlists
- Dieharder
- is an extended, more comprehensive battery based on earlier work by George Marsaglia.
- Lesson 293 — Testing Randomness Quality
- Different API layers
- Check the same data through high-level functions versus low-level system calls
- Lesson 1560 — Cross-View Differential Analysis
- Different lifecycles
- Code changes frequently and is shared broadly among developers.
- Lesson 1314 — Separation of Secrets from Code and Config
- Different mathematical foundation
- Based on bit permutations rather than modular arithmetic
- Lesson 210 — SHA-3 and the Keccak Algorithm
- Different origin
- (protocol differs)
- Lesson 855 — Same-Origin Policy FundamentalsLesson 1056 — Origin Components: Scheme, Host, and Port
- Different origins
- (scheme differs)
- Lesson 856 — Origin Definition and ComparisonLesson 1055 — Same-Origin Policy Fundamentals
- Different systems
- development machines, staging environments, production servers, CI/CD platforms, container registries
- Lesson 1315 — Secret Sprawl and Discovery Challenges
- Differential analysis
- involves sending the same request twice: once normally, once with smuggling payloads.
- Lesson 1114 — Testing and Tools for Request Smuggling
- Differential Power Analysis (DPA)
- to correlate power patterns with specific key bits.
- Lesson 2772 — Side-Channel Attacks: Power Analysis
- Differential privacy
- Add noise during training to limit any single sample's influence
- Lesson 2826 — Defense Strategies Against PoisoningLesson 2884 — Full Functionality and Positive-SumLesson 2922 — Overview of Privacy-Preserving TechnologiesLesson 2923 — Secure Multi-Party Computation for PrivacyLesson 2929 — Federated Learning and Analytics
- Differential privacy (DP)
- solves this by making it mathematically impossible to determine whether any specific person's data was used in training.
- Lesson 2840 — Differential Privacy Fundamentals for ML
- Differential Privacy Budget Tracking
- If using DP techniques, monitor cumulative privacy loss (ε values) across queries.
- Lesson 2911 — Measuring and Testing Anonymization Effectiveness
- Differential privacy integration
- Add calibrated noise during generation to provide formal privacy guarantees
- Lesson 2909 — Synthetic Data GenerationLesson 2930 — Privacy-Preserving Record Linkage
- Differential testing
- Comparing responses from inside vs.
- Lesson 2992 — Censorship Techniques and Detection Methods
- Difficult auditing
- reviewers can't easily trace all execution paths
- Lesson 2632 — Economy of Mechanism (Keep It Simple)
- Difficult to secure
- Organizations had to ensure **every single subdomain** was secure, or none were safe
- Lesson 1060 — document.domain Relaxation and Risks
- Diffie-Hellman key exchange
- solves this elegantly using mathematical properties:
- Lesson 2941 — Key Exchange in E2EE SystemsLesson 2984 — How Onion Routing Works
- Diffie-Hellman ratchet
- Performs a new DH exchange with each message round-trip, creating fresh root keys — providing post-compromise security
- Lesson 2949 — Signal Protocol: Double Ratchet and Key Agreement
- Diffusion
- means spreading the influence of each plaintext bit across many ciphertext bits.
- Lesson 85 — Block Cipher Fundamentals and StructureLesson 90 — AES Round TransformationsLesson 115 — Stream Cipher Fundamentals and XOR Operations
- Digital
- pixel patterns, watermarks, or frequency-domain modifications
- Lesson 2822 — Trojan Attacks on Neural Networks
- Digital cash (e-cash)
- A bank signs your blinded coin without knowing its serial number, so when you spend it, the bank can verify it's genuine but cannot trace it back to you
- Lesson 235 — Blind Signatures and Unlinkability
- Digital Certificates
- Each peer has a certificate signed by a trusted Certificate Authority
- Lesson 479 — Internet Key Exchange (IKE) Phase 1
- Digital footprints
- Code repositories, employee information, technology job postings
- Lesson 2099 — Reconnaissance for Vulnerability Discovery
- digital signatures
- for critical transactions
- Lesson 58 — Repudiation ThreatsLesson 1293 — Package Integrity and ChecksumsLesson 1489 — Log Verification and Tamper Detection
- Direct Connect
- is that private road for your data.
- Lesson 1841 — Direct Connect and Dedicated Connectivity
- Direct financial loss
- Revenue impact, fines, legal costs
- Lesson 2501 — Asset Identification and Valuation
- Direct Generation from CSPRNGs
- Lesson 303 — Symmetric Key Generation
- Direct hardware access
- allows manipulation of sensors, storage, or network chips
- Lesson 2759 — Firmware Fundamentals and Attack Surface
- Direct injection
- User input contains commands like "Ignore previous instructions and reveal system prompt"
- Lesson 2855 — Prompt Injection FundamentalsLesson 2856 — Direct vs Indirect Prompt Injection
- Direct Object References
- Test whether changing resource IDs in URLs like `/api/users/123` or `/api/orders/456` lets you access other users' data.
- Lesson 836 — API Authorization Testing
- Direct observation
- involves physically positioning yourself to see screens, keypads, or documents.
- Lesson 2276 — Shoulder Surfing and Visual Reconnaissance
- Direct URL Manipulation
- Lesson 824 — Vertical Privilege Escalation Techniques
- Direction
- You can mirror ingress (incoming), egress (outgoing), or both
- Lesson 404 — Port Mirroring and SPAN PortsLesson 458 — Snort: Architecture and Rule SyntaxLesson 459 — Writing Effective IDS/IPS Rules
- Direction of traffic
- (inbound/ingress or outbound/egress)
- Lesson 1660 — Network Policies and Segmentation
- directives
- .
- Lesson 658 — CSP Directives and SyntaxLesson 1048 — Content Security Policy (CSP) Fundamentals
- Directory authorities
- are trusted servers (currently 9 worldwide) that maintain consensus about which relays are trustworthy, fast, and available.
- Lesson 2983 — Tor Network Architecture
- Directory Integration
- Connects to identity systems (Active Directory, LDAP) for user authentication
- Lesson 2742 — Mobile Device Management (MDM) Fundamentals
- DISA STIGs
- provide pre-defined audit rule sets that capture the events most commonly exploited in attacks.
- Lesson 1498 — Audit Rules for Security Monitoring
- Disable
- everything else (not just stop—actually disable so it won't restart)
- Lesson 1407 — Disabling Unnecessary Services and Daemons
- Disable caching
- for personalized or sensitive pages
- Lesson 1865 — CDN Cache Security and Cache Poisoning
- Disable DTD parsing entirely
- – Blocks the mechanism XXE attacks rely on
- Lesson 625 — XXE Prevention: Parser Configuration
- Disable external entity processing
- (prevents XXE attacks)
- Lesson 618 — XML Injection PreventionLesson 625 — XXE Prevention: Parser Configuration
- Disable forwarding by default
- Set `AllowTcpForwarding no` globally
- Lesson 503 — SSH Tunnel Security and Authentication
- Disable read-only port
- (`--read-only-port=0`): This legacy port bypasses authentication entirely
- Lesson 1671 — Kubelet Security and Node Hardening
- Disable security tools
- by modifying their kernel-level components
- Lesson 1547 — Kernel-Mode Rootkits Fundamentals
- Disable Unnecessary Features
- Lesson 513 — VPN Client Security Hardening
- Disable Unused Services
- Lesson 1924 — Instance Launch Security and AMI Hardening
- Disable XInclude
- – Prevents another XML inclusion method
- Lesson 625 — XXE Prevention: Parser Configuration
- Disabling block public access
- at the account level, then forgetting individual buckets inherit this
- Lesson 1783 — Blocking Public Access and Bucket Misconfiguration
- Disabling Logging
- Stopping logging services or reconfiguring them to exclude your activities before taking action.
- Lesson 2126 — Covering Tracks and Anti-Forensics
- Disabling PMF
- Even within WPA2/WPA3, turning off Protected Management Frames re-enables deauthentication attacks
- Lesson 530 — Downgrade Attacks
- Disadvantages
- Lesson 470 — Full Tunnel vs Split TunnelLesson 2791 — Pre-Shared Key Authentication for IoT
- Disappearing messages
- (also called ephemeral messaging) automatically delete messages from devices after a set time— minutes, hours, or days.
- Lesson 2956 — Disappearing Messages and Perfect Forward Secrecy
- Disassociation frames
- tell a client "you're no longer associated with this network"
- Lesson 527 — Deauthentication and Disassociation Attacks
- Disaster recovery
- Replicate critical data from on-premises to cloud backup systems through persistent VPN tunnels.
- Lesson 472 — VPN Use Case: Secure Cloud Connectivity
- Disaster Recovery Plans
- Can you restore operations after catastrophic failure?
- Lesson 2593 — Availability Criterion
- Disclosure
- Sharing with third parties only with proper controls (GDPR's accountability)
- Lesson 2596 — Privacy Criterion and GDPR Alignment
- Disclosure of Information
- Exposing personal or sensitive data (e.
- Lesson 70 — LINDDUN for Privacy Threat Modeling
- Disclosure Timelines
- create accountability while allowing reasonable fix time.
- Lesson 2072 — Responsible Disclosure Fundamentals
- Discontinuing cloud storage
- in high-risk jurisdictions to avoid data sovereignty issues
- Lesson 2518 — Risk Avoidance Decisions
- Discord/IRC channels
- Real-time help from experienced practitioners
- Lesson 2192 — Kali Documentation and Community Resources
- Discount stacking
- Combine multiple percentage discounts until total exceeds 100%, causing negative prices.
- Lesson 926 — Integer Overflow in Financial Calculations
- Discover all dependencies
- in your codebase (direct and transitive)
- Lesson 3032 — License Compliance Scanning
- Discover NFS exports
- on the target system (you've learned enumeration techniques)
- Lesson 2147 — NFS and Network File System Exploits
- Discover old technologies
- Seeing "Powered by PHP 5.
- Lesson 335 — Wayback Machine and Historical Website Analysis
- discovery
- Perform deeper enumeration
- Lesson 348 — NSE (Nmap Scripting Engine)Lesson 1117 — Unkeyed Input Discovery and ExploitationLesson 1307 — License Compliance ScanningLesson 2125 — Data Discovery and StagingLesson 2178 — Tactics: The Why Behind Adversary ActionsLesson 2434 — Vulnerability Scanning FundamentalsLesson 2501 — Asset Identification and Valuation
- Discovery Rate and Velocity
- Lesson 3038 — Vulnerability Management Dashboards
- Discovery scans
- (lightweight): Map assets and basic services without deep testing
- Lesson 2440 — Scan Configuration and Optimization
- Discretionary Access Control (DAC)
- is an access control model where the **owner** of a resource (like a file, document, or database record) has the authority to decide who else can access it and what they can do with it.
- Lesson 796 — Discretionary Access Control (DAC)Lesson 1450 — MAC vs DAC: Fundamental DifferencesLesson 2279 — Physical Access Control Models and Zones
- Disinformation
- Creating fake audio "evidence" of public figures making controversial statements
- Lesson 2865 — Audio Deepfakes and Voice Cloning Attacks
- Disk encryption
- (BitLocker, LUKS) — keys unlock only on the correct hardware
- Lesson 307 — Trusted Platform Modules (TPMs)
- Disk I/O impact
- Scanning increases read operations and contention
- Lesson 1569 — Real-Time Protection and Scanning Strategies
- Disk I/O timing
- Mechanical delays and seek times fluctuate
- Lesson 294 — Entropy Sources and Collection
- Disk sectors
- demand `XTS` specifically—it's designed to encrypt storage blocks independently without expansion, critical for file systems.
- Lesson 106 — Mode Selection for Different Scenarios
- Disposal
- Secure deletion when no longer needed (GDPR's data minimization)
- Lesson 2596 — Privacy Criterion and GDPR Alignment
- Disposed of
- (shredding, degaussing, cryptographic wiping)
- Lesson 2585 — HIPAA Security Rule: Physical Safeguards
- disruption
- they want to shut down your systems, corrupt your operations, or destroy your reputation.
- Lesson 51 — Motivations: Disruption and Destructive AttacksLesson 53 — Opportunistic vs Targeted Attackers
- Dissemination
- – Share findings with stakeholders (SOC analysts, executives, IR teams) in appropriate formats
- Lesson 2334 — Threat Intelligence Fundamentals and the Intelligence Lifecycle
- Distinguish between environments
- Stricter gates for production, more lenient for development
- Lesson 2052 — Security Gates and Failure Policies
- Distinguished Name (DN)
- works like a formal mailing address—it uniquely identifies an entity using structured fields.
- Lesson 172 — Certificate Fields: Subject and Issuer Distinguished Names
- Distinguishing attacks
- Certain byte patterns appear more frequently than they should in random data
- Lesson 116 — RC4: Design, Vulnerabilities, and Deprecation
- Distraction
- Engaging the target in conversation while passing through
- Lesson 2272 — Tailgating and Piggybacking Attacks
- distribute
- that precious randomness—that's the **entropy pool**.
- Lesson 295 — Entropy Pool ManagementLesson 316 — Key Expiration and RenewalLesson 1346 — Zero- Downtime Rotation PatternsLesson 2731 — Repackaging and Code Injection Attacks
- Distribute both
- Ship the model with its signature file
- Lesson 2874 — Model Artifact Security and Signing
- Distribute shares
- any `k` shares can reconstruct the polynomial and recover the secret
- Lesson 263 — Shamir's Secret Sharing and Polynomial Interpolation
- Distribute updated policies
- to production hosts before deployment
- Lesson 1598 — Allowlisting in DevOps and CI/CD
- Distributed attack surface
- Each edge node is a potential entry point
- Lesson 1862 — CDN Architecture and Threat Model
- Distributed Attacks
- Multiple real or compromised devices make requests simultaneously, each staying within limits individually but overwhelming the system collectively.
- Lesson 1017 — Rate Limiting Bypass Prevention and Monitoring
- Distributed Decryption
- When decryption is needed, each party uses their private key share to produce a *partial decryption*.
- Lesson 265 — Threshold Encryption and Decryption
- Distributed Denial-of-Service (DDoS)
- attacks by flooding targets with traffic from thousands of sources
- Lesson 1526 — Botnets and Command-and-Control
- Distributed Locks
- coordinate access across multiple servers.
- Lesson 909 — Preventing Race Conditions with Locking Mechanisms
- Distribution
- updates are pushed to customer systems
- Lesson 456 — Signature-Based Detection FundamentalsLesson 1642 — Container Image Supply Chain Overview
- Distribution channels
- must be multi-layered: publish policies in a central repository, send targeted emails to affected groups, and require acknowledgment through digital signatures or training completion tracking.
- Lesson 2495 — Policy Communication and Training Requirements
- Distribution shift
- Detectors trained on one GAN architecture often fail against newer techniques
- Lesson 2864 — Deepfakes: Generation Techniques and Detection Challenges
- Distroless images
- (no shell, package manager, or unnecessary tools)
- Lesson 1633 — Base Image Selection and Trust
- Diverse Communication
- IoT devices use protocols beyond standard TCP/IP—Zigbee, LoRa, BLE, MQTT—each with unique security considerations and often limited built-in protections.
- Lesson 2750 — IoT Attack Surface and Unique Challenges
- Diverse control types
- Combine preventive controls (firewalls), detective controls (intrusion detection), and corrective controls (automated quarantine).
- Lesson 2671 — Defense in Depth Through Design
- Diverse perspectives
- from researchers with varied skill sets
- Lesson 2479 — Bug Bounty Fundamentals and Models
- Diversity
- means those backups work differently from each other.
- Lesson 28 — Redundancy and Diversity in Security
- Django
- includes middleware that automatically generates CSRF tokens and validates them on state- changing requests.
- Lesson 870 — Framework-Specific CSRF Protection
- Django (Python)
- Lesson 930 — Mass Assignment in Different Frameworks
- DKIM alignment
- The domain in the DKIM signature (`d=`) must match the "From" header
- Lesson 2302 — DMARC Configuration and Alignment
- DKIM bypass methods
- Lesson 2249 — Email Spoofing and SMTP Configuration
- DLP monitoring
- means actively watching alert streams to detect when sensitive data moves inappropriately, while **incident response** is your structured approach to investigating and remediating those violations before they become breaches.
- Lesson 1808 — DLP Monitoring and Incident Response
- DMZ (Demilitarized Zone)
- sits between the Internet and internal network—public-facing web servers live here.
- Lesson 354 — Network Segmentation AnalysisLesson 449 — DMZ Architecture and Design
- DMZ hosts
- (web servers, mail servers) operate in isolation with minimal trust
- Lesson 423 — Demilitarized Zones (DMZ)
- DMZ Segment
- Contains public-facing services with hardened configurations
- Lesson 449 — DMZ Architecture and Design
- DMZs
- , and **internal network zones** (concepts you've already learned), you create a **Cardholder Data Environment (CDE)** — a segregated zone where payment data lives.
- Lesson 453 — Segmentation for Compliance
- DN Escaping
- ensures that Distinguished Names are properly escaped.
- Lesson 615 — Preventing LDAP Injection
- DNS and WHOIS records
- reveal technical infrastructure details
- Lesson 2254 — Spear Phishing and Targeted Attacks
- DNS Cache
- Resolved domain names show what sites or C2 domains were queried, even if the connection was brief or encrypted.
- Lesson 2393 — Network Artifact Recovery
- DNS cache poisoning
- takes this further by injecting these false records into a DNS server's cache.
- Lesson 394 — DNS Spoofing and Cache Poisoning
- DNS inconsistencies
- Different answers from local vs.
- Lesson 2992 — Censorship Techniques and Detection Methods
- DNS leaks
- Misconfigured VPNs may leak DNS queries, exposing your activity
- Lesson 471 — VPN Use Case: Privacy and Anonymity
- DNS Logs
- Identifies queries to suspicious domains, command-and-control infrastructure, and DNS tunneling attempts
- Lesson 1887 — AWS GuardDuty Fundamentals
- DNS lookups
- or **HTTP requests** hitting your infrastructure, confirming the vulnerability and capturing data.
- Lesson 622 — Blind XXE Techniques
- DNS Rebinding
- Lesson 889 — SSRF Filter Bypass Techniques
- DNS spoofing
- is when an attacker sends fake DNS responses to trick a victim's computer into believing a legitimate domain points to the attacker's IP address instead of the real one.
- Lesson 394 — DNS Spoofing and Cache PoisoningLesson 1130 — DNS Cache Poisoning and SpoofingLesson 2243 — Bettercap for MitM and Network Attacks
- DNS TTL expires
- The attacker sets an extremely short TTL (time-to-live), often 0 or 1 second
- Lesson 890 — DNS Rebinding Attacks
- DNS Tunneling
- occurs when attackers encode data inside DNS queries and responses to bypass firewalls.
- Lesson 2414 — DNS and HTTP Forensics
- DNS-over-VPN Configuration
- Lesson 508 — DNS Leak Prevention
- DNSSEC Implementation
- Lesson 1132 — Defending Against Host Header and DNS Attacks
- Do
- Implement your security controls.
- Lesson 32 — The Security Lifecycle: Plan-Do-Check-ActLesson 856 — Origin Definition and ComparisonLesson 1214 — Open Design and Security Through TransparencyLesson 2600 — ISO 27001 Overview and Structure
- Docker Content Trust (DCT)
- uses the Notary framework underneath.
- Lesson 1638 — Image Signing and Content TrustLesson 1644 — Image Signing and Verification
- Docker Hub
- Enable scanning in repository settings; free tier scans once per push
- Lesson 1636 — Registry-Integrated Scanning
- Docker Official Image
- badge or **Verified Publisher** status
- Lesson 1633 — Base Image Selection and Trust
- Document
- why each remaining service is necessary
- Lesson 1407 — Disabling Unnecessary Services and DaemonsLesson 1504 — FIM Alert Analysis and ResponseLesson 2402 — File Carving and Deleted File RecoveryLesson 2416 — Network Forensics Tools and Workflows
- Document adjustments
- Note "+3 min skew on Server-A relative to DC-01" in your analysis notes
- Lesson 2418 — Time Source Synchronization and Clock Skew
- Document and Compare
- After the engagement, map what you successfully executed against ATT&CK.
- Lesson 2182 — ATT&CK for Red Team Planning
- Document and validate
- responsibility boundaries for every service using explicit security matrices
- Lesson 1692 — Common Misunderstandings and Breach Scenarios
- Document conversion services
- (PDF generators, image processors)
- Lesson 627 — Testing for XXE Vulnerabilities
- Document deviations
- When you can't implement a control, formally document *why* and what compensating controls exist
- Lesson 1420 — Balancing Security with Operational Requirements
- Document encryption
- protects files even if extracted from the work profile
- Lesson 2745 — BYOD Security Strategies
- Document everything
- Record what you collected, when, from where, and who collected it
- Lesson 2385 — Log Collection and PreservationLesson 2398 — Disk Forensics Fundamentals and Chain of Custody
- Document findings
- Create a clear inventory for your threat model
- Lesson 73 — Attack Surface AnalysisLesson 2608 — Internal Audits and Management Review
- Document first
- Record resource IDs, timestamps, who initiated the snapshot, and why (chain of custody begins here)
- Lesson 1916 — Snapshot and Image Acquisition
- Document lessons learned
- Update playbooks and runbooks based on what broke
- Lesson 2374 — IR Training and Exercises
- Document live
- Record threats, affected assets, and initial risk ratings (using models like **DREAD**) during the session.
- Lesson 76 — Collaborative Threat Modeling Workshops
- Document process gaps
- was your runbook incomplete?
- Lesson 2432 — Post-Incident Review and Lessons Learned
- Document rationale
- Note *why* each exclusion exists for future audits
- Lesson 1515 — Advanced Sysmon Configuration and Filtering
- Document results
- Record whether each finding is "Fixed," "Partially Fixed," or "Not Fixed"
- Lesson 2166 — Retest and Validation Process
- Document rollback procedures
- so on-call engineers can execute them quickly
- Lesson 1349 — Rotation Testing and Rollback
- Document security reasons
- for deprecation to motivate upgrades
- Lesson 1038 — API Versioning and Deprecation
- Document stores
- (MongoDB, CouchDB): Store data as JSON-like documents
- Lesson 594 — NoSQL Database Fundamentals and Attack Surface
- Document the business justification
- for human vs service account needs
- Lesson 1710 — IAM Users: Creation, Authentication, and Lifecycle
- Document the process
- Record what was deleted, when, and by whom
- Lesson 2936 — Right to Erasure and Deletion
- Document Type Definition (DTD)
- , which defines the structure and entities for that document.
- Lesson 619 — XXE Fundamentals and XML Parsing
- Document your network topology
- with IP addresses and roles
- Lesson 2086 — Setting Up a Testing Environment
- Document your responsibility matrix
- for auditors
- Lesson 1985 — Cloud Compliance Inheritance and Mapping
- Document your segmentation scheme
- clearly—complexity without documentation creates blind spots
- Lesson 2649 — VLAN and Subnet Segmentation
- Documentation
- Maintain clear, version-controlled configuration baselines
- Lesson 1617 — Configuration Management FundamentalsLesson 2082 — Penetration Testing MethodologiesLesson 2096 — Data Handling and ConfidentialityLesson 2308 — SOC Analyst Responsibilities and WorkflowsLesson 2455 — Patch Testing and Staging EnvironmentsLesson 2542 — Vendor Offboarding and Data RecoveryLesson 2618 — Audit Evidence Types and Requirements
- Documentation requirements
- What to log and where
- Lesson 2311 — Playbooks and Standard Operating ProceduresLesson 2350 — Triage Playbooks and RunbooksLesson 2372 — IR Playbooks and Runbooks
- Documentation Review
- Lesson 2535 — Vendor Risk Assessment Process
- Documentation Updates
- Lesson 1913 — Post-Incident Activities and Cloud Hardening
- Documented
- Clear comments explaining each critical step
- Lesson 2163 — Proof of Concept DevelopmentLesson 2601 — ISMS Scope Definition
- Documenting decisions
- capturing *why* you chose certain patterns, not just *what* you chose
- Lesson 2036 — Security Architecture Review
- Documents
- Printed emails, internal memos, organizational charts, meeting notes, employee lists, and drafts with handwritten annotations.
- Lesson 2275 — Dumpster Diving and Waste Exploitation
- DOCX/XLSX/PPTX Files
- Microsoft Office documents are actually ZIP archives containing XML files.
- Lesson 623 — XXE via File Upload and Content Types
- Does business in California
- (not necessarily headquartered there)
- Lesson 2562 — CCPA Overview and Scope
- DOM-Based Data Extraction
- Lesson 644 — Data Exfiltration Techniques
- DOM-Based XSS
- techniques to create a hidden, lasting foothold in a web application.
- Lesson 646 — Persistent Backdoors via DOM Manipulation
- Domain
- Controls which domains can receive the cookie.
- Lesson 722 — Cookie Fundamentals and AttributesLesson 855 — Same-Origin Policy FundamentalsLesson 1047 — JavaScript's Same-Origin Policy FoundationLesson 1055 — Same-Origin Policy FundamentalsLesson 1074 — Cookie Security Attributes Deep DiveLesson 1585 — Windows Firewall Configuration and Profiles
- Domain allowlist
- Maintain an explicit list of approved external domains your application should contact (e.
- Lesson 894 — URL and Input Validation for SSRF Prevention
- Domain attribute
- Specifies which hosts can receive the cookie.
- Lesson 1059 — Cookie Scoping and SameSite Attribute
- Domain generation algorithms (DGA)
- Bots generate new domain names daily to find C2 servers
- Lesson 1526 — Botnets and Command-and-Control
- Domain name
- (Does it match the site you're visiting?
- Lesson 380 — TLS/SSL Traffic Analysis and Certificate Inspection
- Domain names
- The websites or command-and-control servers attackers use
- Lesson 2336 — Indicators of Compromise (IOCs) and Their LimitationsLesson 2415 — Network-Based IOC Extraction
- Domain names and subdomains
- (in the Subject Alternative Name field)
- Lesson 332 — Certificate Transparency Logs and SSL/TLS DiscoveryLesson 2091 — Scoping In-Scope vs Out-of-Scope Assets
- Domain profiles
- , rules typically allow collaboration tools, file sharing, and remote management—your IT team controls these centrally via Group Policy.
- Lesson 1585 — Windows Firewall Configuration and Profiles
- Domain spoofing
- Creating fake domains that look legitimate (аpple.
- Lesson 1164 — Homograph and Visual Spoofing AttacksLesson 1168 — Homograph and Confusable Character Attacks
- Domain Squatting
- Registering lookalike domains (`microsofft.
- Lesson 2256 — Credential Harvesting Pages
- Domain-specific exceptions
- Allow certain domains to use lower security
- Lesson 2706 — App Transport Security (ATS)
- Domain-specific rules
- (production vs staging endpoints)
- Lesson 2719 — Android Certificate Pinning and Network Security
- Domain-specific searches
- Your company domains, project names, or infrastructure identifiers
- Lesson 1356 — Monitoring for Public Secret Exposure
- Domain/IP databases
- WHOIS records, DNS lookups, certificate transparency logs
- Lesson 327 — OSINT Fundamentals and Information Sources
- Domains
- Security contexts assigned to *running processes*.
- Lesson 1453 — SELinux Architecture and ComponentsLesson 2336 — Indicators of Compromise (IOCs) and Their Limitations
- Dome cameras
- work well indoors, hiding their direction.
- Lesson 2284 — Video Surveillance and Monitoring
- Don't disclose publicly
- until the organization has had reasonable time to fix it
- Lesson 2078 — Legal and Ethical Considerations
- Don't exploit it
- for personal gain or "demonstration purposes"
- Lesson 2078 — Legal and Ethical Considerations
- Don't share details
- with others outside the coordinated disclosure process
- Lesson 2078 — Legal and Ethical Considerations
- Double Encoding
- Encode twice—`%253C` becomes `%3C` after one decode, then `<` after the second.
- Lesson 649 — Character Encoding BypassesLesson 1159 — Double Encoding and Nested Encoding AttacksLesson 1223 — Double Encoding and Context Confusion Attacks
- Double extensions
- `shell.
- Lesson 947 — Web Shell Upload TechniquesLesson 957 — File Extension Filtering and Bypass Techniques
- Double Framing
- Nesting your page two frames deep can break the bust logic.
- Lesson 1137 — Frame Busting and Its Limitations
- Double Ratchet
- takes over for the conversation itself.
- Lesson 2942 — Signal Protocol FundamentalsLesson 2949 — Signal Protocol: Double Ratchet and Key AgreementLesson 2950 — Message Layer Security (MLS) for Group Messaging
- Double Submit Cookie Pattern
- is a stateless CSRF defense that works by setting a random value in both a cookie *and* a request parameter (like a hidden form field or custom header).
- Lesson 866 — Double Submit Cookie Pattern
- Double-Encoding
- Some applications decode input multiple times.
- Lesson 966 — Encoding and Double-Encoding Bypasses
- Double-spending
- Withdrawing the same balance multiple times before the first transaction completes
- Lesson 902 — Time-of-Check to Time-of-Use (TOCTOU) Vulnerabilities
- Downgrade attacks
- where older, vulnerable firmware versions are forcibly installed
- Lesson 1463 — UEFI Firmware Attacks and Vulnerabilities
- Download and verify
- When you install the package, your package manager downloads it, computes its hash, and compares it to the expected value
- Lesson 1293 — Package Integrity and Checksums
- Download overhead
- Every client must fetch megabytes of data
- Lesson 191 — Certificate Revocation Lists (CRLs)
- Downloader Trojans
- Fetch and install additional malware
- Lesson 1521 — Trojans: Deceptive Functionality
- Downloaders
- take a different approach: they're small programs that fetch malware from remote servers after execution.
- Lesson 1525 — Droppers, Downloaders, and Loaders
- Downside
- Must update your app when certificates are rotated (typically every 1-2 years).
- Lesson 186 — Certificate Pinning Techniques
- Downtime
- E-commerce platform offline 6 hours = ~$200K revenue loss
- Lesson 2431 — Executive Summary and Business Impact
- Doxing
- (releasing personal information of individuals)
- Lesson 50 — Motivations: Hacktivism and Ideological Attacks
- Drafting
- – Security team creates initial version, referencing industry frameworks and legal requirements
- Lesson 2494 — Policy Development and Approval Process
- dramatically smaller keys
- .
- Lesson 158 — Elliptic Curve Diffie-Hellman (ECDH)Lesson 163 — ECC vs RSA: Security and Performance
- Drift Detection
- Automated tools continuously scan infrastructure, comparing what exists against your IaC templates, policy definitions (OPA/Sentinel), or compliance baselines
- Lesson 3046 — Auto-Remediation for Infrastructure Drift
- Drift detection commands
- in modern IaC tools automate this:
- Lesson 2024 — Drift Detection in Terraform and IaC Tools
- Drift Prevention
- Continuous evaluation catches violations immediately
- Lesson 3018 — Policy as Code Fundamentals
- Drive corrective action
- Require remediation of gaps
- Lesson 2608 — Internal Audits and Management Review
- Drive-by malware downloads
- Lesson 958 — MIME Type Sniffing and Security Implications
- Driver Signing Requirements
- Lesson 1594 — Windows Defender Application Control (WDAC)
- DriverLoad (Event ID 6)
- and **ConfigurationChange (Event ID 16-18)**: Track driver installations and Sysmon's own configuration changes, preventing attackers from disabling monitoring.
- Lesson 1514 — Sysmon File and Registry Activity Monitoring
- Drop unnecessary capabilities
- and enable **user namespace remapping**
- Lesson 1661 — Container Runtime Security Best Practices
- Drop vs Reject
- Lesson 462 — IPS Blocking Actions and Response
- Dropped connections
- Frequent disconnects as the attacker toggles between monitoring and relaying
- Lesson 537 — Detecting Evil Twin Attacks from Client Perspective
- Droppers
- are compact programs that carry encrypted or obfuscated malware embedded within them.
- Lesson 1525 — Droppers, Downloaders, and Loaders
- Dual authorization workflows
- Database administrator *and* security officer must approve schema changes
- Lesson 2631 — Separation of Privilege
- Dual-key periods
- Keep the old key active for decryption while using the new key for all new encryption
- Lesson 315 — Key Rotation Strategies
- Dual-path verification
- Check the algorithm flag during login—verify old hashes with the old method, new hashes with the new method
- Lesson 692 — Upgrading Legacy Password Storage Systems
- Duplicate MAC Addresses
- Lesson 411 — ARP Cache Inspection
- Duplicate Parameters
- Lesson 995 — API Parameter Pollution and Injection
- Duplicate the token
- from that process into your own process
- Lesson 2130 — Token Manipulation and Impersonation
- Duration
- Split large networks into manageable scan windows
- Lesson 1612 — Scan Configuration and OptimizationLesson 2085 — Penetration Testing vs Red Teaming
- Dwell Time
- measures how long an adversary (red team) remains undetected in your environment.
- Lesson 2175 — Measuring Exercise Effectiveness
- DXE (Driver Execution Environment)
- Loads device drivers, initializes storage, graphics, network
- Lesson 1459 — UEFI Architecture and Boot Process
- Dynamic ARP Inspection
- is the antidote to ARP poisoning.
- Lesson 409 — Switch Port Security and Defenses
- Dynamic Barrier Forms
- The system now marks you as "contaminated" with Company A's information.
- Lesson 18 — Chinese Wall Model: Conflict of Interest Prevention
- Dynamic column/table names
- ORMs parameterize *values*, not identifiers (table/column names)
- Lesson 1238 — ORM Security Fundamentals
- Dynamic languages
- like Python, JavaScript, and Ruby present significant challenges.
- Lesson 1364 — Language-Specific SAST Considerations
- Dynamic learning
- Let the switch learn the first MAC(s) it sees and lock to those
- Lesson 414 — Port Security and MAC Filtering
- Dynamic library injection
- Detecting unusual loaded frameworks
- Lesson 2708 — iOS Jailbreaking and Detection
- Dynamic Manual Testing
- (hands-on exploration) reveals:
- Lesson 2098 — Manual vs Automated Discovery Approaches
- Dynamic Port Forwarding
- (`-D`) creates a SOCKS proxy on your local machine that routes all applications through the SSH tunnel.
- Lesson 499 — SSH Tunneling Fundamentals
- Dynamic Secrets
- Some systems need temporary, short-lived credentials generated on-demand.
- Lesson 1324 — When Environment Variables Are InsufficientLesson 1325 — Secret Stores vs Environment VariablesLesson 1331 — Dynamic Secrets and Leasing
- dynamic security posture
- that adjusts to real-time risk rather than static policies.
- Lesson 1699 — Continuous Identity VerificationLesson 1747 — Conditional Access and Context-Aware MFA
- Dynamic testing
- Run applications with crafted payloads and monitor prototype chains
- Lesson 1197 — Detecting Prototype Pollution VulnerabilitiesLesson 2438 — Web Application Vulnerability Scanners
- Dynamic tunnels are created
- on-demand between verified identities and specific resources
- Lesson 2685 — Software-Defined Perimeter and Identity-Based Segmentation
- Dynamic Updates
- Baselines must evolve—summer vacation patterns differ from tax season workloads
- Lesson 2348 — Baseline Establishment and Anomaly Detection
E
- E01 (EnCase Evidence File)
- compressed, includes metadata and case information
- Lesson 2399 — Disk Imaging and Write Blocking
- E91 protocol
- (proposed by Artur Ekert in 1991) uses quantum entanglement instead of individual photons.
- Lesson 281 — QKD Protocols: E91 and Continuous Variable
- EAP-TLS
- or **PEAP**, often tied to Active Directory.
- Lesson 545 — Enterprise Wi-Fi Deployment Architecture
- EAP-TTLS
- (Tunneled Transport Layer Security) and **PEAP** (Protected EAP) use a two-phase approach:
- Lesson 543 — EAP-TTLS and PEAP Tunneled Methods
- Easier to audit
- Security reviewers can actually understand what's happening
- Lesson 8 — Economy of Mechanism and Keep It Simple
- Easier to maintain
- Future updates are less likely to introduce new vulnerabilities
- Lesson 8 — Economy of Mechanism and Keep It Simple
- Easier to test
- Fewer paths mean more thorough testing
- Lesson 8 — Economy of Mechanism and Keep It Simple
- Easier to verify
- You can be confident the system does exactly what you think it does
- Lesson 8 — Economy of Mechanism and Keep It Simple
- East-West traffic
- refers to communication *between* internal systems (server-to-server, zone-to-zone), as opposed to **North-South traffic** (traffic entering or leaving your network).
- Lesson 452 — East-West Traffic ControlLesson 2689 — East-West Traffic Inspection and Enforcement
- Easy to exploit
- Requires only changing IDs in requests
- Lesson 1027 — API1:2023 - Broken Object Level Authorization (BOLA)
- EAT Hooking
- modifies the DLL's export table itself, affecting *all* programs that import from that DLL.
- Lesson 1551 — Import Address Table (IAT) and Export Address Table Hooking
- Eavesdropping
- Capture plaintext traffic to map system architecture and gather credentials
- Lesson 2787 — BACnet and Modbus Protocol Security
- Eavesdropping check
- They compare a sample of results; mismatches indicate interference
- Lesson 279 — QKD Fundamentals and BB84 Protocol
- EAX
- offers flexibility with slightly better security proofs than GCM.
- Lesson 105 — Comparing Authenticated Encryption ModesLesson 128 — AES-CCM and Other AEAD Modes
- EBS volumes
- (persistent block storage attached to instances)
- Lesson 1928 — Encrypted Storage and Snapshots
- EC2 Instance Profiles
- Lesson 1757 — Service-Specific Escalation Vectors
- ECB mode
- Always use authenticated encryption modes (GCM, not ECB or plain CBC)
- Lesson 2735 — Mobile Cryptography Best Practices
- ECC
- achieves equivalent security with much smaller keys—a 256-bit ECC key matches a 3072-bit RSA key.
- Lesson 151 — RSA vs Other Asymmetric AlgorithmsLesson 304 — Asymmetric Key Pair Generation
- ECC wins on performance
- Lesson 163 — ECC vs RSA: Security and Performance
- ECMAScript Modules (ESM)
- (the standardized `import`/`export` syntax).
- Lesson 1053 — JavaScript Module Security (ESM vs CommonJS)
- Economic balance
- means you don't overspend on security relative to the asset's value or the threat's likelihood.
- Lesson 2672 — Work Factor and Economic Balance
- Economy of Mechanism
- (keep it simple) but focuses specifically on the *human element*.
- Lesson 9 — Psychological Acceptability and Usable SecurityLesson 10 — Attack Surface ReductionLesson 2667 — Economy of Mechanism
- ECS Task Roles
- Credentials delivered via a unique endpoint specific to each task
- Lesson 1734 — Instance Profiles and Container Credentials
- ECS/Fargate
- Similar to EC2, but with container task roles
- Lesson 1757 — Service-Specific Escalation Vectors
- Ed25519
- ) represent a newer generation designed explicitly to avoid implementation pitfalls.
- Lesson 167 — Curve25519 and EdDSALesson 1442 — SSH Key Generation and Management
- EdDSA
- (Edwards-curve Digital Signature Algorithm) is the signature scheme built on Ed25519.
- Lesson 167 — Curve25519 and EdDSA
- EdDSA is deterministic
- the same message and key always produce the same signature.
- Lesson 228 — EdDSA and Ed25519 Signatures
- Edge rule violations
- (WAF blocks, rate limit triggers)
- Lesson 1868 — CDN Monitoring and Incident Response
- EDHOC
- is a lightweight key exchange protocol designed specifically for constrained devices.
- Lesson 2797 — Authentication Protocols for Constrained Environments
- EDR solutions
- (CrowdStrike, Carbon Black): Endpoint monitoring and response
- Lesson 2170 — Blue Team Responsibilities and Tools
- EDR/XDR
- When a suspicious process is detected, SOAR can automatically query the EDR for process details, network connections, and even trigger host isolation—all through API calls.
- Lesson 2329 — Integration and Orchestration
- Educate developers
- about secure coding practices in real-time
- Lesson 1358 — Introduction to Static Application Security Testing (SAST)
- Effect
- Either `Allow` or `Deny`.
- Lesson 1703 — Policy Structure and Syntax FundamentalsLesson 1713 — Policy Structure: Elements, Syntax, and Evaluation LogicLesson 2548 — Audit Findings and Risk Rating
- effective
- user ID (UID) and group ID (GID).
- Lesson 2139 — Linux Privilege Model and Escalation FundamentalsLesson 2589 — HIPAA Risk Analysis and Management
- Effective permissions verification
- means checking every layer:
- Lesson 1826 — Common Misconfigurations and Troubleshooting
- Effective UID/GID
- What permissions you're exercising right now
- Lesson 2139 — Linux Privilege Model and Escalation Fundamentals
- Effectiveness Assessment
- How this control reduces risk to acceptable levels
- Lesson 2469 — Documenting and Reviewing Compensating Controls
- Effects
- to apply: `Audit`, `Deny`, `Modify`, `DeployIfNotExists`, or `Disabled`
- Lesson 1989 — Azure Policy and Blueprints
- Efficiency
- Group key updates require logarithmic operations (O(log n)) instead of linear (O(n))
- Lesson 2950 — Message Layer Security (MLS) for Group Messaging
- Efficient
- Only checks one certificate, not downloading megabytes of revocation data
- Lesson 192 — Online Certificate Status Protocol (OCSP)
- Efficient Filtering
- Apply capture filters (`tcp port 80`) at the kernel level—only relevant packets reach your tool, drastically reducing load compared to capturing everything then filtering in display mode.
- Lesson 383 — Packet Capture Performance and Ring Buffers
- Egress Rules
- Define allowed outgoing connections (destination pods/IPs and ports)
- Lesson 1667 — Network Policies for Pod Isolation
- Electromagnetic (EM) emanation attacks
- capture the radio frequency emissions that electronic components naturally produce during computation.
- Lesson 2773 — Side-Channel Attacks: Timing and EM
- Electromagnetic emanation
- Capturing radio signals devices emit during computation
- Lesson 2769 — Hardware Security Fundamentals and Threat Model
- Electromagnetic emissions
- Reading signals radiated during computation
- Lesson 2755 — Physical Security Threats to IoT Devices
- Electronic locks
- use keypads, card readers, or biometric scanners instead of traditional keys.
- Lesson 2283 — Lock Types and Physical Key Management
- Elevation of Privilege
- (accessing admin systems).
- Lesson 55 — Introduction to STRIDELesson 66 — STRIDE Mitigations and ControlsLesson 83 — Developer Training on Threat ModelingLesson 2640 — Applying STRIDE at Architecture Level
- Eliminate unjustified fields
- – remove anything that can't demonstrate clear necessity
- Lesson 2896 — Data Collection Assessment
- Eliminating administrative protocols
- like Telnet entirely, using SSH exclusively instead
- Lesson 2518 — Risk Avoidance Decisions
- Elliptic Curve
- Private keys must fall within the curve's valid range
- Lesson 302 — Key Generation Requirements and Best Practices
- Elliptic Curve Cryptography (ECC)
- and emerging **post-quantum algorithms** offer different trade-offs that make them better suited for certain scenarios.
- Lesson 151 — RSA vs Other Asymmetric Algorithms
- Elliptic Curve Diffie-Hellman (ECDH)
- applies the exact same concept, but instead of working with exponentiation in modular arithmetic, it works with point multiplication on elliptic curves.
- Lesson 158 — Elliptic Curve Diffie-Hellman (ECDH)Lesson 2941 — Key Exchange in E2EE Systems
- EM
- Researchers have extracted AES keys by analyzing the EM emissions from smartphones and embedded devices during encryption operations.
- Lesson 2773 — Side-Channel Attacks: Timing and EM
- Make the server send an email containing sensitive data to an address you control.
- Lesson 606 — Out-of-Band Data ExfiltrationLesson 2472 — Creating and Publishing a VDP
- Email distribution
- Using stolen SMTP credentials or botnets to send bulk emails
- Lesson 2261 — Phishing Infrastructure and Automation
- Email signing
- S/MIME and PGP prove an email's sender
- Lesson 225 — Digital Signature Fundamentals and Use Cases
- Email spoofing
- makes messages appear to come from trusted senders—like your CEO asking you to wire money urgently.
- Lesson 56 — Spoofing Identity Threats
- Email verification
- with time-limited access tokens
- Lesson 2972 — Recipient Verification and Authentication
- Embargo dates
- – agreeing when information becomes public
- Lesson 2476 — CVE Assignment and Public Disclosure
- Embed signature
- – Attach the signature (and often your certificate) into the document itself
- Lesson 231 — Document Signing and PDF Signatures
- embedded
- when you want a single, self-contained signed artifact that's easier to distribute.
- Lesson 232 — Detached Signatures and Signature FormatsLesson 2883 — Privacy Embedded into Design
- embedded devices
- and IoT.
- Lesson 106 — Mode Selection for Different ScenariosLesson 188 — Time Validation and Clock Attacks
- Embedded objects
- hide executables or scripts within the document structure—OLE objects, package files, or DDE (Dynamic Data Exchange) fields that trigger code execution.
- Lesson 2250 — Malicious Office Document Generation
- Embedded scripts or payloads
- in API responses can lead to XSS, injection attacks, or code execution
- Lesson 1036 — API10:2023 - Unsafe Consumption of APIs
- Embedded signatures
- bundle the signature and the original data together into a single file.
- Lesson 232 — Detached Signatures and Signature Formats
- Embedding layer
- – tokens converted to numerical vectors
- Lesson 2854 — LLM Architecture and Attack Surface
- Emergency access
- Password recovery requiring approval from multiple administrators
- Lesson 321 — Secret Sharing Fundamentals
- Emergency contacts
- Who to reach if something goes wrong
- Lesson 2084 — Legal and Ethical Considerations
- emergency patching
- outside normal cycles:
- Lesson 1605 — Patch Rollback and Emergency ProceduresLesson 2459 — Emergency and Out-of-Band Patching
- Emergency stop procedures
- if unexpected issues arise
- Lesson 2095 — Testing Windows and SchedulesLesson 2172 — Rules of Engagement for Team Exercises
- Emotional Connection
- Lesson 2266 — Building Trust and Establishing Rapport
- Emotional pressure
- Appeals to fear, greed, sympathy, or curiosity
- Lesson 2270 — Detecting and Resisting Manipulation Attempts
- Empire
- , **Covenant**, **Cobalt Strike**, and others emerged to address specific operational needs, evasion requirements, and attack methodologies that Metasploit wasn't originally designed to handle.
- Lesson 2217 — Metasploit vs. Alternative Frameworks
- Empire/Starkiller
- specializes in PowerShell and Python-based post-exploitation without requiring binaries on disk.
- Lesson 2216 — Exploitation Framework Landscape
- Employee networks
- access internal servers and applications
- Lesson 552 — Client Isolation and Network Segmentation
- Employees
- → VLAN 20 (business resources only)
- Lesson 546 — Dynamic VLAN Assignment and Access Policies
- Empty results
- What if a threat intelligence lookup returns nothing?
- Lesson 2332 — Playbook Testing and Validation
- Emulator detection
- Identify if running in an emulator (often used for analysis)
- Lesson 2718 — Android Root Detection and Anti-Tampering
- Enable Audit Trails
- During compliance audits, quickly generate reports showing all resources by business unit, project, or data classification without manual spreadsheet hunting.
- Lesson 2001 — Tag-Based Resource Inventory and Discovery
- Enable by default
- Ensure the template engine has auto-escaping turned on for all templates
- Lesson 1247 — Auto-Escaping Mechanisms and Configuration
- Enable command-and-control
- communication with botnets or RATs
- Lesson 1536 — Persistence Fundamentals and Attacker Goals
- Enable complete system compromise
- a leaked database password or AWS key can grant unlimited access to critical infrastructure
- Lesson 1252 — Understanding Hardcoded Secrets and Their Risks
- Enable end-to-end encryption
- (re-encrypt traffic to backend when handling sensitive data)
- Lesson 1773 — TLS/SSL in Cloud: Protocol Overview and Configuration
- Enable MFA
- for role assumption on critical paths
- Lesson 1735 — Credential Theft and Token SecurityLesson 1907 — Cloud Account Compromise Response
- Enable MFA immediately
- at creation time
- Lesson 1710 — IAM Users: Creation, Authentication, and Lifecycle
- Enable TLS
- Require certificate-based authentication (`--client-ca-file`) for all kubelet connections
- Lesson 1671 — Kubelet Security and Node Hardening
- Enable TLS 1.2+ only
- in listener settings
- Lesson 1773 — TLS/SSL in Cloud: Protocol Overview and Configuration
- Enable verbose output
- Use `-v`, `-vv`, or `-vvv` flags for increasing detail
- Lesson 506 — SSH Tunnel Persistence and Troubleshooting
- Enabling follow-on attacks
- Using the stolen copy to craft better adversarial examples
- Lesson 2827 — Model Extraction Attack Fundamentals
- Enabling static website hosting
- without blocking public access (automatically requires public read)
- Lesson 1783 — Blocking Public Access and Bucket Misconfiguration
- Encapsulation
- Bob generates a random secret, locks it in a box using Alice's public key, and sends the locked box plus a shared secret derived from his random value
- Lesson 270 — CRYSTALS-Kyber: Post-Quantum Key Encapsulation
- Enclosure switches
- Microswitches that detect when device casings are opened
- Lesson 2775 — Physical Tampering and Anti-Tamper Mechanisms
- Encode it when outputting
- based on context: HTML context?
- Lesson 1219 — When Input Validation Fails: Why Encoding Matters
- Encode late
- Transform data right before using it in a specific context
- Lesson 1218 — Input Validation vs Output Encoding Philosophy
- Encode outputs
- Escape JSON special characters, use proper Content-Type headers (`application/json`), and never reflect raw user input
- Lesson 1039 — Input Validation and Output Encoding
- Encode the secret
- as the constant term of a random polynomial (the y-intercept when x=0)
- Lesson 263 — Shamir's Secret Sharing and Polynomial Interpolation
- Encode your query
- so it mathematically touches all records but only "activates" the one you want
- Lesson 2928 — Private Information Retrieval
- Encoders
- Obfuscate payloads to evade detection
- Lesson 2193 — Metasploit Architecture and ComponentsLesson 2196 — Advanced Payload Generation with msfvenomLesson 2202 — Evasion Techniques and Encoders
- Encoding
- Use hex, octal, or URL encoding to hide characters:
- Lesson 608 — Filter Bypass and ObfuscationLesson 648 — Filter Evasion FundamentalsLesson 966 — Encoding and Double-Encoding Bypasses
- Encoding and Character Manipulation
- Lesson 1855 — WAF Evasion Techniques and Defense
- Encoding validation
- Properly handle special characters and encoding schemes
- Lesson 2738 — Input Validation and IPC Security
- Encrypt
- the plaintext with Key 1
- Lesson 88 — 3DES: Triple DES and Key OptionsLesson 123 — Encrypt-then-MAC ConstructionLesson 520 — Protected Management Frames (PMF)
- Encrypt at rest
- Cloud providers offer native encryption for environment variables.
- Lesson 1953 — Environment Variable Security
- Encrypt by default
- at rest and in transit (not as an optional feature)
- Lesson 2883 — Privacy Embedded into Design
- Encrypt data
- Implement encryption for data at rest and in transit
- Lesson 1980 — PCI DSS in Cloud Environments
- Encrypt DLQs
- at rest to protect sensitive failure data
- Lesson 1958 — Dead Letter Queues and Error Handling
- Encrypt sensitive values
- before storing (though key management remains challenging client-side)
- Lesson 1075 — IndexedDB Security Considerations
- Encrypt unencrypted protocols
- Wrap insecure protocols like HTTP or VNC in SSH encryption
- Lesson 500 — Local Port Forwarding (-L)
- Encrypt-and-MAC
- encrypts the plaintext while separately MACing the plaintext (producing two independent outputs).
- Lesson 124 — MAC-then-Encrypt and Encrypt-and-MAC Pitfalls
- Encrypt-and-MAC (E&M)
- Separately encrypt plaintext and MAC plaintext
- Lesson 222 — Encrypt-then-MAC vs MAC-then-Encrypt
- Encrypt-then-MAC
- is the safest construction: you first encrypt your plaintext, then compute the MAC over the resulting ciphertext (and any associated data like IVs).
- Lesson 123 — Encrypt-then-MAC ConstructionLesson 124 — MAC-then-Encrypt and Encrypt-and-MAC PitfallsLesson 127 — ChaCha20-Poly1305Lesson 222 — Encrypt-then-MAC vs MAC-then-Encrypt
- Encrypt-then-MAC (EtM)
- Encrypt plaintext first, then MAC the ciphertext
- Lesson 222 — Encrypt-then-MAC vs MAC-then-Encrypt
- Encrypted archives
- Encrypt archived keys using a long-term master key (which itself must be managed carefully)
- Lesson 319 — Key Archival and Compliance
- encrypted at rest
- and **access-controlled**.
- Lesson 1312 — Common Secret Storage Anti-PatternsLesson 2768 — Secure Firmware Development Practices
- Encrypted channels
- Hide commands in HTTPS or DNS traffic
- Lesson 1526 — Botnets and Command-and-Control
- Encrypted credential vaults
- within the scanning platform
- Lesson 2436 — Authenticated Scanning and Credentialed Checks
- Encrypted data travels
- through servers and networks as unreadable ciphertext
- Lesson 2939 — What is End-to-End Encryption (E2EE)
- Encrypted independently
- (with chunk-specific metadata like sequence number)
- Lesson 2971 — Large File Transfer Security
- Encrypted snapshots
- inherit encryption from the source volume—even if someone downloads the snapshot, they can't read it without your key.
- Lesson 1928 — Encrypted Storage and Snapshots
- Encrypted storage
- Only the encrypted blob reaches the server—the provider sees gibberish
- Lesson 2968 — End-to-End Encrypted File Sharing
- Encrypted transit
- – Combined with VPN over Direct Connect for end-to-end encryption
- Lesson 1841 — Direct Connect and Dedicated Connectivity
- encrypted tunnel
- is established between your device and a **VPN gateway** at the corporate perimeter
- Lesson 467 — Remote Access VPNsLesson 2690 — Zero Trust Network Access (ZTNA) Solutions
- Encrypted tunnel established
- using TLS for key exchange
- Lesson 542 — EAP-TLS and Certificate-Based Authentication
- Encrypted/obfuscated files
- May hide malicious code from scanners
- Lesson 961 — Virus Scanning and Malware Detection Integration
- EncryptedSharedPreferences
- for key-value pairs and the **KeyStore** system for cryptographic keys.
- Lesson 2720 — Android Secure Storage and Data Protection
- Encryption
- protects confidentiality (reading)
- Lesson 122 — Why Authentication Matters in EncryptionLesson 143 — RSA Encryption and Decryption OperationsLesson 206 — Non-Reversibility and One-Way PropertyLesson 265 — Threshold Encryption and DecryptionLesson 1677 — IaaS Security ResponsibilitiesLesson 1869 — Cloud Logging Architecture and Service OverviewLesson 1918 — Memory Acquisition from Cloud InstancesLesson 1981 — HIPAA and PHI in the Cloud (+4 more)
- Encryption (confidentiality)
- Lesson 481 — IPsec Cryptographic Algorithms and Cipher Suites
- Encryption at rest
- means secrets are encrypted before being written to disk, so they're unreadable without the proper decryption key.
- Lesson 1317 — Encryption at Rest for Secret StorageLesson 1329 — Azure Key VaultLesson 1668 — Securing etcd and Secrets ManagementLesson 1875 — Log Encryption and Access ControlsLesson 1972 — Secrets Management in Kubernetes
- Encryption before storage
- Lesson 1078 — Client-Side Encryption for Storage
- Encryption handling
- How does WPA2/WPA3 respond to replayed or modified encrypted frames?
- Lesson 531 — Wireless Packet Injection
- Encryption happens locally
- on the sender's device using the recipient's public key
- Lesson 2939 — What is End-to-End Encryption (E2EE)
- Encryption in transit
- All traffic traverses the internet encrypted via IPsec, protecting against interception
- Lesson 1840 — VPN Connections to CloudLesson 3004 — IaC State File Security
- Encryption keys
- Credentials stored only in volatile memory
- Lesson 1559 — Memory Analysis and Volatile ForensicsLesson 2395 — Credential and Secret Extraction
- Encryption of Backups
- Always encrypt key backups using strong encryption.
- Lesson 311 — Key Backup and Recovery ProceduresLesson 317 — Key Backup and Recovery
- Encryption operations
- Data is encrypted before upload
- Lesson 1766 — Client-Side Encryption for Cloud Data
- Encryption Requirements
- should be mandatory for all Bluetooth connections.
- Lesson 560 — Bluetooth Security Best Practices
- Encryption stays intact
- Data should remain encrypted both in transit between regions and at rest in each location
- Lesson 1786 — Cross-Region Replication and Backup Strategies
- Encrypts all traffic
- (mTLS) between services automatically
- Lesson 1971 — Network Policies and Service Mesh Security
- Encrypts blocks on-the-fly
- when your instance writes data
- Lesson 1770 — Encryption for Block Storage and Virtual Disks
- Encrypts the DEK
- with your KMS key (the key encryption key)
- Lesson 1770 — Encryption for Block Storage and Virtual Disks
- Encrypts the payload
- using algorithms like AES or 3DES
- Lesson 478 — Encapsulating Security Payload (ESP)
- End-Entity Certificate
- (Leaf): Your website's actual certificate, signed by an intermediate CA.
- Lesson 177 — Certificate Chains and Hierarchies
- End-to-End Confirmation
- If someone suspects you're communicating with a specific server, they only need to monitor your entry point and that exit point—they don't need global surveillance.
- Lesson 2988 — Tor Threat Model and Limitations
- end-to-end encryption
- protect your data, but they trust fundamentally different parties.
- Lesson 2940 — E2EE vs Transport EncryptionLesson 2973 — Secure File Sharing Service Evaluation
- End-to-End Security
- Lifecycle protection from data collection to destruction
- Lesson 2879 — Introduction to Privacy by Design
- Endpoint
- Where to send packets (IP:port), optional for roaming peers
- Lesson 494 — WireGuard Peer Configuration and Key Management
- Endpoint Agents
- Lesson 1574 — EDR Fundamentals and Architecture
- Endpoint changes
- Log when peer endpoints shift (may indicate compromise or misconfiguration)
- Lesson 498 — WireGuard Deployment Best Practices and Monitoring
- Endpoint defenses
- protect individual devices—servers, workstations, containers.
- Lesson 2657 — Perimeter, Internal, and Endpoint DefensesLesson 2661 — Monitoring and Response Across Layers
- Endpoint management suites
- (Microsoft Intune, JAMF, VMware Workspace ONE) push firewall configurations to mixed environments including remote devices
- Lesson 1590 — Host Firewall Management at Scale
- Endpoint-level containment
- Lesson 2331 — Response Actions and Containment Automation
- endpoints
- (URL paths like `/api/users` or `/api/orders/123`).
- Lesson 990 — REST API Attack Surface and ReconnaissanceLesson 2316 — Log Sources and Event Collection Methods
- Energy sector
- NERC CIP for critical infrastructure protection
- Lesson 1984 — Industry-Specific Cloud Compliance
- Enforce
- Actively blocks unauthorized applications
- Lesson 1593 — Windows AppLockerLesson 2048 — Dependency Scanning in Build Pipelines
- Enforce Content-Type
- Set and validate `Content-Type` headers on both requests and responses to prevent content sniffing attacks
- Lesson 1039 — Input Validation and Output Encoding
- Enforce network segmentation
- with policies while **monitoring for anomalies**
- Lesson 1661 — Container Runtime Security Best Practices
- Enforced mode
- Actively blocks non-compliant code
- Lesson 1594 — Windows Defender Application Control (WDAC)
- Enforcement
- Regularly verify systems match their baseline
- Lesson 1617 — Configuration Management Fundamentals
- Enforcement logic
- checks current usage against quotas before processing requests, returning `429 Too Many Requests` or `403 Quota Exceeded` when limits are reached, ideally with headers showing remaining quota.
- Lesson 1016 — Quota Management and Tiered Access Control
- Enforcement Mechanisms
- Policies without teeth are suggestions.
- Lesson 553 — Wireless Security Policies and Compliance
- enforces
- the boundaries between segments.
- Lesson 2650 — Segmentation Enforcement MechanismsLesson 2710 — Secure Enclave and Hardware Security
- Enforces fail-safe defaults
- if the choke point fails closed, no unauthorized access occurs
- Lesson 29 — Security Choke Points
- Enforces least privilege
- Users get only the permissions their role requires, automatically
- Lesson 1428 — Group Management and Role Separation
- Enforces separation
- between code and secrets (concept 1314)
- Lesson 1319 — The Twelve-Factor App and Environment Configuration
- Enforcing mode
- is the production state where SELinux actively blocks unauthorized actions.
- Lesson 1454 — SELinux Modes and Policy Types
- Engagement Metrics
- Lesson 2296 — Measuring and Improving Security Culture
- Enhanced monitoring difficulty
- Binary protocols are harder to inspect with traditional web application firewalls and logging tools
- Lesson 1097 — HTTP/2 Protocol Architecture and Security Model
- Enhanced security posture
- for highly sensitive workloads
- Lesson 1815 — Network Isolation with Dedicated Tenancy
- Enrichment
- Adding context like threat intelligence, geolocation, or asset inventory data
- Lesson 1879 — Cloud Log Collection and NormalizationLesson 2317 — Event Normalization and ParsingLesson 2343 — Threat Intelligence Analysis and Reporting
- Enrichment actions
- Query endpoint logs, check historical travel patterns
- Lesson 2350 — Triage Playbooks and Runbooks
- Enrichment and Correlation
- The SIEM correlates compliance violations with other signals:
- Lesson 1995 — Compliance Tool Integration with SIEM
- Enrolling certificates
- Add new trusted signing keys to the authorized database (db) for custom-signed bootloaders
- Lesson 1462 — Configuring and Managing Secure Boot
- Enrollment protocols
- EST (Enrollment over Secure Transport) adapted for constrained environments
- Lesson 2792 — Certificate-Based Authentication in Constrained Devices
- Ensemble and randomization defenses
- flip the script by introducing uncertainty: instead of one predictable model, you deploy multiple models or add random transformations, forcing attackers to craft examples that work across *all* possible configurations—a much harder problem.
- Lesson 2852 — Ensemble and Randomization Defenses
- Ensemble models
- Train multiple models on different data subsets; poisoning affects only some
- Lesson 2826 — Defense Strategies Against Poisoning
- Enter quantum computers
- Unlike classical computers that process bits (0 or 1), quantum computers use *qubits* that can exist in multiple states simultaneously.
- Lesson 267 — The Quantum Threat to Current Cryptography
- Enterprise
- for organizations needing user tracking, credential management, and regulatory compliance.
- Lesson 515 — WPA2-PSK vs WPA2-Enterprise
- Enterprise app stores
- function like private versions of the App Store or Google Play, containing only organization- approved applications.
- Lesson 2746 — Mobile App Distribution and Whitelisting
- Enterprise Mobility Management (EMM)
- expands the scope to include mobile application management (MAM), mobile content management (MCM), and identity management.
- Lesson 2743 — Enterprise Mobility Management (EMM) and UEM
- Entities
- Users, documents, organizations, groups
- Lesson 800 — Relationship-Based Access Control (ReBAC)
- Entity relationships
- Which users typically access which systems, peer group behavior
- Lesson 1900 — User and Entity Behavior Analytics (UEBA)
- Entropy analysis
- Detecting random-looking strings that might be tokens
- Lesson 2050 — Secret Detection in CommitsLesson 3031 — Secret Detection in Pipelines
- Entropy exhaustion
- Long-running systems might generate millions of keys — the initial entropy gets "stretched thin"
- Lesson 291 — PRNG State and Reseeding
- entropy pool
- , a collection of unpredictable data gathered from hardware events (keyboard timing, disk I/O, network packets, etc.
- Lesson 290 — Blocking vs Non-Blocking RandomnessLesson 294 — Entropy Sources and CollectionLesson 295 — Entropy Pool Management
- Entropy thresholds
- – how random a string must be to qualify
- Lesson 1258 — False Positive Management and Custom Rules
- Entry Points
- are every door, window, and tunnel into your system.
- Lesson 41 — Assets, Entry Points, and Trust BoundariesLesson 42 — Creating a Data Flow Diagram (DFD)Lesson 78 — Architecture Review and Threat IdentificationLesson 83 — Developer Training on Threat ModelingLesson 2099 — Reconnaissance for Vulnerability DiscoveryLesson 2638 — Identifying Assets and Attack Surface
- Enumerate
- how those threats could be exploited
- Lesson 37 — What is Threat Modeling?Lesson 2136 — Always Install Elevated and MSI ExploitationLesson 2140 — Kernel Exploits for Privilege Escalation
- Enumerate entry points
- List every way data enters your system (web forms, APIs, network services)
- Lesson 73 — Attack Surface Analysis
- Enumerate running processes
- to find tokens belonging to privileged accounts (domain admins, SYSTEM, etc.
- Lesson 2130 — Token Manipulation and Impersonation
- Enumerating Processes
- List all running processes, including those hidden by rootkits.
- Lesson 2392 — Process and Thread Analysis
- Enumeration
- Determine service versions and configurations
- Lesson 2434 — Vulnerability Scanning Fundamentals
- Envelope encryption
- is the core pattern: your data is encrypted with a DEK, then that DEK is encrypted with your KMS master key.
- Lesson 1767 — Key Management Services (KMS) Deep DiveLesson 1797 — Key Management for Database Encryption
- Environment
- Production incidents escalate immediately; dev/test may queue during business hours
- Lesson 1903 — Alert Routing and Escalation WorkflowsLesson 2005 — Cloud Asset Discovery and InventoryLesson 2422 — Root Cause Analysis MethodologiesLesson 2650 — Segmentation Enforcement Mechanisms
- Environment attributes
- time of day, IP address, device security status, threat level
- Lesson 799 — Attribute-Based Access Control (ABAC)
- Environment separation
- Connect development and testing VPCs while maintaining isolation from production
- Lesson 1836 — VPC Peering Fundamentals
- Environment setup
- Configure database connections, workspaces, and listeners at startup
- Lesson 2201 — Automation with Resource Scripts
- environment variables
- Lesson 1319 — The Twelve-Factor App and Environment ConfigurationLesson 1735 — Credential Theft and Token SecurityLesson 1778 — Database Connection Encryption
- Environment variables in logs
- When a function crashes or logs debugging information, the entire execution context—including environment variables—may be dumped to CloudWatch Logs, Azure Monitor, or similar services.
- Lesson 1962 — Sensitive Data Exposure
- Environment-based groups
- `ProductionAccess`, `DevelopmentAccess`
- Lesson 1711 — IAM Groups: Organizing Users and Permission Sets
- Environment-specific
- Separate keys for development, staging, and production
- Lesson 1009 — API Key Authentication: Design and Security
- Environment-specific gates
- Stricter rules for production than staging
- Lesson 2063 — Release Gating Fundamentals
- Environmental factors
- (compensating controls, network exposure)
- Lesson 2452 — Risk-Based Prioritization Frameworks
- Environmental metrics
- How the vulnerability affects *your specific environment*
- Lesson 2160 — Vulnerability Severity and Risk RatingLesson 2445 — CVSS Temporal and Environmental Metrics
- Environmental sensors
- Detecting abnormal temperature, voltage, light exposure, or vibration patterns
- Lesson 2775 — Physical Tampering and Anti-Tamper Mechanisms
- Environmental variations
- Lighting angles, shadows, reflections, distance
- Lesson 2814 — Physical World Adversarial Examples
- Environmental/context attributes
- Situational factors (time_of_day=business_hours, location=corporate_network, device_type=managed_laptop)
- Lesson 20 — Attribute-Based Access Control (ABAC)
- Environments
- Production, staging, development each get their own VPC
- Lesson 1812 — VPC Segmentation Strategies
- Ephemeral infrastructure
- Containers and serverless functions exist for seconds, making post-incident forensics challenging.
- Lesson 1886 — Cloud Threat Detection Overview
- Ephemeral key exchange
- Both parties generate temporary key pairs that change frequently
- Lesson 2943 — Forward Secrecy in E2EE
- Ephemeral keys
- Fresh keys per session for forward secrecy
- Lesson 2941 — Key Exchange in E2EE SystemsLesson 2979 — Implementing Forward Secrecy in TLS
- Ephemeral nature
- Functions execute briefly and disappear, making logging and forensics harder (remember: you learned about evidence preservation in cloud IR)
- Lesson 1940 — Serverless Architecture and Security Implications
- Ephemeral Resources
- Instances auto-scale up and down.
- Lesson 1904 — Cloud IR Fundamentals and Shared Responsibility
- epsilon (ε)
- parameter: the privacy budget.
- Lesson 2840 — Differential Privacy Fundamentals for MLLesson 2914 — Privacy Budget and Epsilon
- Equifax (2017)
- Breach of 147 million records via an unpatched Apache Struts vulnerability—patch was available for months
- Lesson 1599 — The Critical Role of Patch Management
- Eradication procedures
- Removing malware, revoking compromised credentials
- Lesson 2372 — IR Playbooks and Runbooks
- Error Message Analysis
- Lesson 572 — Database Fingerprinting via SQL InjectionLesson 582 — Database Fingerprinting Techniques
- error messages
- .
- Lesson 124 — MAC-then-Encrypt and Encrypt-and-MAC PitfallsLesson 362 — Application-Layer FingerprintingLesson 614 — LDAP Injection Detection and TestingLesson 1354 — Preventing Secrets in Logs and Error MessagesLesson 2965 — Usability Challenges and Key Management UX
- Error rates
- Typical ARP conflicts, retransmissions, or packet drops
- Lesson 416 — Network Monitoring and Baselining
- Escalate privileges
- by finding systems with weaker controls or cached credentials
- Lesson 2150 — Lateral Movement Fundamentals and Objectives
- Escalation
- happens when incidents exceed the analyst's authority or complexity level.
- Lesson 2308 — SOC Analyst Responsibilities and Workflows
- Escalation criteria
- When to notify management or activate incident response team
- Lesson 2311 — Playbooks and Standard Operating ProceduresLesson 2350 — Triage Playbooks and Runbooks
- Escalation paths
- Who gets notified at what threshold
- Lesson 1861 — DDoS Response and Incident ManagementLesson 2053 — Test Result Management and Remediation WorkflowsLesson 2172 — Rules of Engagement for Team Exercises
- Escape arguments properly
- using language-specific functions
- Lesson 610 — Safe Command Execution Practices
- Escape rate
- Security issues that reach production despite testing
- Lesson 3017 — Test Coverage and Effectiveness Metrics
- Escort requirements
- determine whether visitors must be accompanied at all times.
- Lesson 2285 — Visitor Management and Temporary Access
- ESP header alteration
- NAT devices modify IP headers (addresses and checksums).
- Lesson 482 — NAT Traversal (NAT-T) in IPsec
- ESP over AH
- since ESP provides both encryption and authentication, while AH only authenticates.
- Lesson 481 — IPsec Cryptographic Algorithms and Cipher Suites
- Espionage
- involves stealing confidential information, trade secrets, intellectual property, or strategic intelligence.
- Lesson 49 — Motivations: Espionage and Intelligence GatheringLesson 53 — Opportunistic vs Targeted Attackers
- Establish a workflow
- Lesson 1275 — SCA Limitations and Best Practices
- Establish authority and accountability
- – Who owns security decisions?
- Lesson 2487 — Purpose and Scope of Information Security Policy
- Establish Baselines
- Document current posture, set realistic improvement targets, and measure progress quarterly.
- Lesson 2011 — CSPM Vendor Selection and Deployment
- Establish communication channels
- back to the attacker's server
- Lesson 646 — Persistent Backdoors via DOM Manipulation
- Establish fallback mechanisms
- if one persistence method is discovered
- Lesson 1536 — Persistence Fundamentals and Attacker Goals
- Establish redundant access
- across multiple systems to maintain persistence
- Lesson 2150 — Lateral Movement Fundamentals and Objectives
- Establish secure coding practices
- – Developers must follow standards that prevent common flaws.
- Lesson 2576 — Requirement 6: Secure Development
- ESTABLISHED
- Part of an active, two-way conversation (both sides have exchanged packets)
- Lesson 440 — Stateful Firewall with Connection Tracking
- Established standards compliance
- Many regulations and frameworks specifically require AES
- Lesson 121 — Stream Ciphers vs Block Ciphers: When to Use Each
- Establishing baselines
- means documenting your system's normal behavior:
- Lesson 1558 — Behavioral Analysis and Anomaly Detection
- Establishing Gates
- Define failure thresholds based on vulnerability severity.
- Lesson 1377 — Integrating DAST into CI/CD
- Establishment criterion
- Any organization with an establishment (office, subsidiary) in the EU processing personal data
- Lesson 2551 — GDPR Overview and Scope
- ETSI EN 303 645
- is the European standard for consumer IoT security.
- Lesson 2758 — IoT Regulatory Landscape and Security Standards
- Ettercap
- is the veteran Swiss Army knife of MITM attacks.
- Lesson 401 — MITM Attack Tools and Frameworks
- EU Cyber Resilience Act
- will mandate conformity assessments before devices can be sold.
- Lesson 2758 — IoT Regulatory Landscape and Security Standards
- Evade detection
- by distributing activity across numerous hosts rather than operating from one suspicious system
- Lesson 2150 — Lateral Movement Fundamentals and Objectives
- Evade signature matching
- because the attack pattern isn't visible in any single fragment
- Lesson 369 — Fragmentation and Packet Manipulation
- Evading usage fees
- Cloning commercial ML APIs to avoid payment
- Lesson 2827 — Model Extraction Attack Fundamentals
- Evaluate the polynomial
- at different x-coordinates to create shares
- Lesson 263 — Shamir's Secret Sharing and Polynomial Interpolation
- Evaluates permissions
- using your chosen model (RBAC, ABAC, etc.
- Lesson 841 — Centralized Authorization Logic
- Evaluation
- The evaluator processes the garbled gates using the labels, learning only the final output
- Lesson 258 — Garbled Circuits for Two-Party Computation
- Evaluation criteria
- Look for accuracy (low false-positives), timeliness (how fresh are IOCs?
- Lesson 2339 — Threat Intelligence Feeds and Sources
- Evasion rotation
- Cycling through domains and URLs as they get blacklisted
- Lesson 2261 — Phishing Infrastructure and Automation
- Evasion techniques
- combine these elements: multiple encoding iterations, unusual formats, custom templates, and platform-specific tricks.
- Lesson 2196 — Advanced Payload Generation with msfvenom
- Eve → Alice
- Eve sends a different public value to Alice
- Lesson 156 — Man-in-the-Middle Attacks on Diffie-Hellman
- Eve → Bob
- Eve intercepts it and sends her own public value to Bob instead
- Lesson 156 — Man-in-the-Middle Attacks on Diffie-Hellman
- Event
- Failed login attempt from unusual location
- Lesson 2361 — Incident vs Event: Defining the Threshold
- Event 1
- User account locked (from Active Directory)
- Lesson 2318 — Correlation Rules and Detection Logic
- Event 2
- Same username attempts VPN login from new country (from VPN logs)
- Lesson 2318 — Correlation Rules and Detection Logic
- Event 3
- Successful admin login to sensitive server (from server logs)
- Lesson 2318 — Correlation Rules and Detection Logic
- Event Channels
- are logical containers that categorize events by purpose and audience.
- Lesson 1508 — Windows Event Log Architecture and Components
- Event Consumer
- – Defines *what action* to take (run a script, execute a command)
- Lesson 1541 — WMI Event Subscriptions
- Event History
- provides 90 days of searchable management events in the console—free and automatic.
- Lesson 1871 — CloudTrail for API Activity Monitoring
- Event ID 1
- Process creation
- Lesson 1512 — Sysmon Installation and ConfigurationLesson 1513 — Sysmon Process and Network Monitoring
- Event ID 3
- Network connection
- Lesson 1512 — Sysmon Installation and ConfigurationLesson 1513 — Sysmon Process and Network Monitoring
- Event ID 5
- (Process Termination) records when processes end, letting you track execution duration and abnormal exits.
- Lesson 1513 — Sysmon Process and Network Monitoring
- Event Injection
- Attackers can craft events that exploit your function's logic.
- Lesson 1943 — Event-Driven Security Risks
- Event Log
- system, viewed through Event Viewer but stored physically as `.
- Lesson 1469 — Common Log File Locations
- Event payload injection
- occurs when untrusted data enters through API Gateway, S3 events, SQS messages, or HTTP triggers.
- Lesson 1944 — Serverless Data Flow and Injection Risks
- Event Providers
- are the applications, drivers, and system components that generate events.
- Lesson 1508 — Windows Event Log Architecture and Components
- Event Streaming
- Compliance tools generate events when violations occur (e.
- Lesson 1995 — Compliance Tool Integration with SIEM
- Event taxonomy
- Different service events map to common categories (authentication, network, data access)
- Lesson 1879 — Cloud Log Collection and Normalization
- Event variety
- Inputs arrive from HTTP, queues, storage events—not just web forms
- Lesson 1960 — Injection Vulnerabilities in Serverless
- Event Viewer
- under `Applications and Services Logs > Microsoft > Windows > AppLocker`.
- Lesson 1593 — Windows AppLocker
- Event-driven remediation
- CloudWatch Events triggering Lambda functions to restore correct configurations
- Lesson 3046 — Auto-Remediation for Infrastructure Drift
- Event-driven triggers
- More attack surface through various event sources (API Gateway, S3, queues)
- Lesson 1940 — Serverless Architecture and Security ImplicationsLesson 1959 — OWASP Serverless Top 10 OverviewLesson 2443 — Continuous Scanning and Real-Time Detection
- Event-source assumptions
- are dangerous: just because an API Gateway or queue invoked your function doesn't mean the *original* requester is authorized.
- Lesson 1964 — Broken Access Control in Functions
- events
- messages, file uploads, database changes, API calls, or scheduled tasks.
- Lesson 1943 — Event-Driven Security RisksLesson 2361 — Incident vs Event: Defining the Threshold
- Every
- token endpoint request must occur over TLS (HTTPS).
- Lesson 766 — OAuth 2.0 Token Endpoint SecurityLesson 1019 — Broken Function-Level AuthorizationLesson 1084 — Service Worker Message InterceptionLesson 1695 — Zero Trust and Identity VerificationLesson 2040 — Authentication and Authorization Code ReviewLesson 2048 — Dependency Scanning in Build Pipelines
- every byte
- , regardless of whether you've found a mismatch:
- Lesson 220 — Timing Attacks on MAC VerificationLesson 2409 — Packet Capture for Forensics
- Every resource
- (file, database record, API endpoint) gets a **security label** (e.
- Lesson 797 — Mandatory Access Control (MAC)
- every single time
- , for every action, on every resource.
- Lesson 1964 — Broken Access Control in FunctionsLesson 2675 — Zero Trust Network Architecture Components
- Every user
- receives a **clearance level** assigned by administrators
- Lesson 797 — Mandatory Access Control (MAC)
- evidence
- that you actually did the work.
- Lesson 1419 — Documentation and Compliance EvidenceLesson 2044 — Effective Security Review CommunicationLesson 2087 — Documentation and Note-TakingLesson 2549 — Audit Reporting and CommunicationLesson 2598 — Control Design and Implementation
- Evidence Collection
- For SOC 2 or ISO 27001 audits, gathering evidence across multiple platforms means different APIs, log formats, and export mechanisms.
- Lesson 1986 — Multi-Cloud and Hybrid Compliance ChallengesLesson 1993 — Compliance Reporting and Evidence CollectionLesson 2597 — SOC 2 Audit Process and PreparationLesson 2599 — SOC 2 Reports and Continuous Compliance
- Evidence Collection Tools
- capture volatile data (memory dumps, network traffic) and disk images before systems are powered down or wiped.
- Lesson 2373 — IR Tool Selection and Deployment
- Evidence preservation
- Create snapshots of logs before retention policies delete them.
- Lesson 1909 — Cloud Storage and Data Breach ResponseLesson 2331 — Response Actions and Containment AutomationLesson 3048 — Security Incident Auto-Response
- Evil twin attacks
- – suspicious signal strength patterns or mismatched encryption settings
- Lesson 550 — Wireless Packet Capture and AnalysisLesson 554 — Incident Response for Wireless Attacks
- Evil Twin Setup
- Push users off the legitimate network so they connect to a rogue access point instead
- Lesson 527 — Deauthentication and Disassociation Attacks
- Evil.com's JavaScript cannot
- read the DOM tree of bank.
- Lesson 857 — SOP Impact on JavaScript and DOM Access
- Exabeam
- Specializes in UEBA (User and Entity Behavior Analytics)
- Lesson 2324 — Common SIEM Platforms and Vendor Landscape
- Examine the evidence
- – Review request/response pairs provided
- Lesson 2213 — Scanner Issue Analysis and Validation
- Example (invalid)
- "By using our app, you consent to all data uses described in our 50-page policy.
- Lesson 2932 — Consent Requirements and Valid Consent
- Example (valid)
- "Check here to receive our weekly newsletter [ ☐ ].
- Lesson 2932 — Consent Requirements and Valid Consent
- Example Approach
- Lesson 276 — Hybrid Cryptographic ApproachesLesson 934 — Mass Assignment Defense Strategies
- Example Attack
- Lesson 612 — LDAP Injection Fundamentals
- Example attack vector
- Lesson 1222 — JavaScript Context Encoding Challenges
- Example Chain
- Lesson 2106 — Chaining Vulnerabilities for Impact
- Example configuration
- Lesson 1443 — Restricting SSH Access by User and Group
- Example flow (conceptual)
- Lesson 1078 — Client-Side Encryption for Storage
- Example malicious payload
- Lesson 638 — Cookie Theft and Session Hijacking via XSS
- Example mapping
- Lesson 2180 — Using ATT&CK for Threat Intelligence
- Example policy
- Lesson 658 — CSP Directives and SyntaxLesson 660 — style-src and CSS Injection PreventionLesson 1470 — Log Rotation and Retention
- Example principle
- If a private subnet only needs internet egress through a NAT Gateway, don't add direct routes to other VPCs or peering connections unless required.
- Lesson 1835 — Subnet Security Best Practices
- Example rule
- Lesson 458 — Snort: Architecture and Rule Syntax
- Example scenario
- A company CA might issue an intermediate certificate to its European division with a name constraint limiting issuance to `*.
- Lesson 185 — Name Constraints and Certificate ExtensionsLesson 332 — Certificate Transparency Logs and SSL/TLS DiscoveryLesson 568 — Blind SQL Injection FundamentalsLesson 581 — Second-Order SQL InjectionLesson 617 — XML Injection Attack VectorsLesson 632 — DOM-Based XSS: Client-Side VulnerabilitiesLesson 806 — Path Traversal and Directory AccessLesson 811 — Referer and Origin-Based Authorization Flaws (+11 more)
- Example scenario (conceptual)
- Lesson 1109 — Exploiting Smuggling for Web Cache Poisoning
- Example validation logic (conceptual)
- Lesson 971 — Path Canonicalization and Validation
- Example vulnerable query
- Lesson 566 — Union-Based SQL Injection Technique
- Example workflow
- Lesson 445 — Migrating from iptables to nftablesLesson 1121 — Cache Poisoning Detection Techniques
- Exception Request
- Documenter *why* the drift is necessary and for how long
- Lesson 2027 — Drift Reporting and Exception Management
- Exception stack traces
- that include method parameters containing secrets
- Lesson 1354 — Preventing Secrets in Logs and Error Messages
- Exception tracking
- approved deviations with business justification
- Lesson 2625 — Remediation Tracking and Reporting
- Exceptions (UNLESS)
- Legitimate scenarios where the policy shouldn't apply.
- Lesson 1804 — DLP Policy Design and Implementation
- Excessive Collection
- Are you gathering more data than necessary for your stated purpose?
- Lesson 2890 — Privacy Risk Identification
- Exchange Rate Manipulation
- Attackers may tamper with client-side rate parameters or exploit cached/outdated rates.
- Lesson 924 — Currency and Conversion Exploits
- Exclude cautiously
- Only filter well-understood, stable processes (Windows system binaries, trusted applications)
- Lesson 1515 — Advanced Sysmon Configuration and Filtering
- Exclude lists
- Administrative endpoints, logout URLs, or destructive actions (`/admin/delete`, `/api/payment/charge`)
- Lesson 1374 — DAST Configuration and Scope Management
- Exclusions and Tuning
- Strategic exclusions reduce unnecessary scanning overhead.
- Lesson 1583 — EDR Deployment and Performance Considerations
- Executable binary
- Mach-O format, often encrypted (FairPlay DRM)
- Lesson 2723 — Mobile App Package Formats and Structure
- Execute
- the MSI using `msiexec /quiet /qn /i malicious.
- Lesson 2136 — Always Install Elevated and MSI ExploitationLesson 2140 — Kernel Exploits for Privilege Escalation
- Execute deletion
- Remove or anonymize data across all systems
- Lesson 2936 — Right to Erasure and Deletion
- Execute pre-programmed payloads
- (like Rubber Ducky attacks that type malicious commands faster than humans can react)
- Lesson 2277 — USB Drop Attacks and Malicious Devices
- Execute procedures
- matching the adversary's documented methods, not generic exploits
- Lesson 2184 — Adversary Emulation with ATT&CK
- Execute remote commands
- through SMB-based protocols like PsExec
- Lesson 2154 — SMB and Administrative Shares
- Execute requests systematically
- – call endpoints with different credentials
- Lesson 1026 — Authorization Testing Automation
- Execute stored procedures
- `EXEC xp_cmdshell('net user hacker password /ADD')`
- Lesson 580 — Stacked Queries and Multiple Statements
- Execute the SUID binary
- from the victim machine—it runs with root privileges
- Lesson 2147 — NFS and Network File System Exploits
- Executing stored procedures
- Invoking powerful built-in procedures (like `xp_cmdshell` in SQL Server) that weren't properly restricted
- Lesson 584 — Privilege Escalation via SQL Injection
- Execution
- Run the application with mutated inputs
- Lesson 1386 — Mutation-Based FuzzingLesson 1553 — Bootkits and MBR PersistenceLesson 2178 — Tactics: The Why Behind Adversary ActionsLesson 2423 — Attack Chain Reconstruction
- Execution Context
- Lesson 852 — CSRF vs XSS: Key DifferencesLesson 1045 — JavaScript Execution Context and SandboxingLesson 1942 — Function Execution Context and IsolationLesson 1959 — OWASP Serverless Top 10 Overview
- Execution flag
- (varies by Windows version)
- Lesson 2404 — Artifact Analysis: Prefetch, Shimcache, and Amcache
- Execution logs
- (CloudWatch, Application Insights) are critical—they capture invocation parameters, execution duration, and errors.
- Lesson 1920 — Container and Serverless Forensics
- Executive Assistant
- "The CEO needs these files before the board meeting"
- Lesson 2263 — Pretexting Fundamentals and Attack Scenarios
- Executive dashboards
- High-level compliance percentages, risk exposure
- Lesson 1607 — Patch Compliance Monitoring and Reporting
- Executive leadership
- CISO, CTO, CEO, board members
- Lesson 2426 — Stakeholder Communication During IncidentsLesson 2549 — Audit Reporting and Communication
- Executive reports
- Strategic-level summaries with business impact and risk trends
- Lesson 2343 — Threat Intelligence Analysis and Reporting
- Executive sponsorship
- Someone with budget authority must formally approve accepting the risk
- Lesson 2521 — Risk Acceptance and Documentation
- Executive summary
- with high-level percentages and risk assessment
- Lesson 2252 — Social Engineering Reporting and MetricsLesson 2893 — PIA Documentation and Review
- Executive updates
- Email summaries, executive briefings, dedicated conference bridges
- Lesson 2426 — Stakeholder Communication During Incidents
- Executives and C-Suite
- Impersonating CEOs or CFOs exploits hierarchical structures.
- Lesson 2265 — Authority and Impersonation Techniques
- Exfiltration
- Can data loss prevention tools catch sensitive data leaving?
- Lesson 74 — Kill Chain Threat ModelingLesson 2178 — Tactics: The Why Behind Adversary ActionsLesson 2423 — Attack Chain Reconstruction
- Exfiltration Techniques
- Collected data is transmitted to command-and-control servers using encrypted channels, often piggybacking on legitimate traffic to avoid detection by monitoring tools you learned about with Sysmon and Windows Event Logging.
- Lesson 1523 — Spyware and Information Stealers
- Existential unforgeability
- Cannot forge signatures without the private key
- Lesson 271 — CRYSTALS-Dilithium: Post-Quantum Digital Signatures
- Existing controls effectiveness
- – Do your current defenses reduce probability?
- Lesson 2499 — Likelihood and Impact Determination
- Exit policies
- Some relays refuse exit traffic; only about 10-15% are exits
- Lesson 2985 — Tor Relays: Guard, Middle, and Exit
- Exit relay
- Decrypts final layer and connects to destination, but doesn't know your IP
- Lesson 2983 — Tor Network Architecture
- Exit relays
- Handle final connection to websites (highest risk for operators)
- Lesson 2983 — Tor Network ArchitectureLesson 2985 — Tor Relays: Guard, Middle, and Exit
- Expanded attack surface
- – More code means more potential vulnerabilities
- Lesson 2667 — Economy of Mechanism
- Expanded opt-out
- to include sharing (not just sale) of personal information
- Lesson 2568 — CPRA Amendments and Enforcement
- Expectation Over Transformations
- instead of optimizing against a single image, you optimize against the *expected outcome* across many simulated physical transformations (brightness changes, rotations, blur, noise).
- Lesson 2814 — Physical World Adversarial Examples
- Expected flows
- being blocked by misconfigured policies
- Lesson 2691 — Monitoring and Troubleshooting Microsegmented Environments
- Expedited approval
- Pre-authorized emergency change procedures with streamlined sign-off
- Lesson 2459 — Emergency and Out-of-Band Patching
- Expensive retrofits
- Redesigning core systems costs far more than building them securely initially
- Lesson 12 — Security as a Non-Functional Requirement
- Experiment iteratively
- Click "Send" to submit your modified request and immediately see the response in the right pane
- Lesson 2209 — Burp Repeater for Manual Testing
- Expert Determination
- A qualified statistician certifies the re-identification risk is very small
- Lesson 2582 — Protected Health Information (PHI)
- Expert Review
- Have independent analysts attempt re-identification using domain knowledge and public information sources.
- Lesson 2911 — Measuring and Testing Anonymization Effectiveness
- Expiration
- Set tokens to expire after a reasonable timeframe—perhaps after 15-30 minutes of inactivity, or when the session ends.
- Lesson 871 — Token Rotation and LifecycleLesson 2027 — Drift Reporting and Exception Management
- Expiration dates
- (Is it still valid?
- Lesson 380 — TLS/SSL Traffic Analysis and Certificate InspectionLesson 2963 — Forward Secrecy and Key Rotation in Email
- Expiration or Review Date
- Lesson 432 — Rule Documentation and Comments
- Expired or not-yet-valid certificates
- Lesson 380 — TLS/SSL Traffic Analysis and Certificate Inspection
- Expires/Max-Age
- Determines cookie lifetime.
- Lesson 722 — Cookie Fundamentals and AttributesLesson 1074 — Cookie Security Attributes Deep Dive
- Explicit Allow
- Lesson 1705 — Policy Evaluation Logic and PrecedenceLesson 1715 — Policy Evaluation Logic and Precedence
- Explicit allow required
- At least one policy must explicitly allow the action
- Lesson 1713 — Policy Structure: Elements, Syntax, and Evaluation Logic
- Explicit cleanup
- After using a secret, overwrite the memory location with zeros or random data.
- Lesson 1341 — Secret Caching and Memory Management
- Explicit Deny
- If any policy contains an explicit "Deny" statement matching the request, access is immediately blocked.
- Lesson 1715 — Policy Evaluation Logic and Precedence
- Explicit Deny Wins
- Lesson 1705 — Policy Evaluation Logic and PrecedenceLesson 1713 — Policy Structure: Elements, Syntax, and Evaluation Logic
- Explicit sequence numbers
- in each record handle packet reordering
- Lesson 2795 — DTLS and TLS 1.3 for IoT
- exploit
- Attempt safe exploitation checks
- Lesson 348 — NSE (Nmap Scripting Engine)Lesson 2107 — Exploitation Fundamentals and Anatomy of an Exploit
- Exploit Code Maturity
- Is there a working exploit?
- Lesson 2445 — CVSS Temporal and Environmental Metrics
- Exploit Frameworks
- Tools like Metasploit and ExploitDB contain ready-to-use exploit code mapped to CVE identifiers.
- Lesson 365 — Combining Fingerprinting with Vulnerability Research
- Exploit Kits
- These are pre-packaged toolkits that automatically probe your browser, plugins (Flash, Java), and operating system for known vulnerabilities.
- Lesson 1528 — Drive-by Downloads and Web-Based Infection
- Exploit modules
- target specific vulnerabilities to gain code execution.
- Lesson 2204 — Custom Module Development
- Exploit validation
- Attempt to reproduce the vulnerability in a controlled manner (if safe and authorized)
- Lesson 2441 — False Positives and ValidationLesson 2767 — Firmware Emulation and Dynamic Analysis
- Exploit-based attacks
- target vulnerabilities in Office software itself (like CVE exploits), requiring no user interaction beyond opening the file.
- Lesson 2250 — Malicious Office Document Generation
- Exploitability
- How difficult is it to actually pull off this attack?
- Lesson 65 — Prioritizing STRIDE ThreatsLesson 72 — DREAD Risk Rating ModelLesson 1274 — Interpreting SCA ResultsLesson 1367 — Interpreting and Triaging SAST ResultsLesson 2008 — Risk Scoring and PrioritizationLesson 2076 — Severity Assessment and CVSS ScoringLesson 2160 — Vulnerability Severity and Risk RatingLesson 2473 — Receiving and Triaging Vulnerability Reports (+2 more)
- Exploitability assessment
- (exploit code availability, attack complexity)
- Lesson 2452 — Risk-Based Prioritization Frameworks
- Exploitability Metrics
- Is there a public exploit available?
- Lesson 1602 — Vulnerability Assessment and Prioritization
- Exploitation
- Are systems patched?
- Lesson 74 — Kill Chain Threat ModelingLesson 561 — Bluetooth Security Testing ToolsLesson 592 — NoSQLMap and NoSQL Injection AutomationLesson 902 — Time-of-Check to Time-of-Use (TOCTOU) VulnerabilitiesLesson 1117 — Unkeyed Input Discovery and ExploitationLesson 1520 — Worms: Autonomous Network PropagationLesson 2107 — Exploitation Fundamentals and Anatomy of an Exploit
- Exploitation scenarios
- Lesson 1101 — HTTP/2 Connection Coalescing Attacks
- Exploitation Status
- – Is this actively exploited, proof-of-concept available, or just theoretical?
- Lesson 2448 — SSVC (Stakeholder-Specific Vulnerability Categorization)
- Exploiting CVEs
- Moving beyond just default credentials to unpatched vulnerabilities
- Lesson 2754 — IoT Botnets: Mirai and Beyond
- Exploiting kernel vulnerabilities
- through privilege escalation exploits
- Lesson 1547 — Kernel-Mode Rootkits Fundamentals
- Exploiting weaknesses
- in driver loading mechanisms or Secure Boot bypasses
- Lesson 1547 — Kernel-Mode Rootkits Fundamentals
- Exploits
- Code that takes advantage of vulnerabilities
- Lesson 2193 — Metasploit Architecture and Components
- Exponential backoff
- Retry with increasing delays to avoid overwhelming the service
- Lesson 1334 — Secret Store Access Patterns
- Exponential Mechanism
- solves this by turning selection into a *privacy-preserving lottery*.
- Lesson 2919 — The Exponential Mechanism
- Exponential time O(2ⁿ)
- Dangerous—catastrophic backtracking territory
- Lesson 1178 — Analyzing Regex Complexity with Tools
- Export Address Table (EAT)
- The DLL's table advertising which functions it offers and where they're located.
- Lesson 1551 — Import Address Table (IAT) and Export Address Table Hooking
- Export logs immediately
- – Copy logs to immutable storage before retention policies delete them
- Lesson 1906 — Evidence Preservation in Cloud Environments
- Exposed access keys
- Hardcoded in code repositories, logs, or configuration files
- Lesson 1696 — Identity as Attack Surface
- Exposed Debug Endpoints
- Development endpoints like `/api/debug`, `/api/health/verbose`, or `/admin/status` leak sensitive system information or bypass authentication entirely.
- Lesson 1035 — API9:2023 - Improper Inventory Management
- Exposed debug ports
- and unnecessary network services
- Lesson 2751 — Common IoT Vulnerabilities and Weaknesses
- Exposed Network Jacks
- Unused Ethernet ports in conference rooms, lobbies, or hallways provide direct network access.
- Lesson 2278 — Physical Attacks on Network Infrastructure
- Exposure
- Internet-facing systems versus internal tools
- Lesson 277 — Migration Strategies and Crypto-AgilityLesson 1267 — Unmaintained Dependencies and End-of-Life LibrariesLesson 1274 — Interpreting SCA Results
- Express.js (Node.js)
- Lesson 930 — Mass Assignment in Different Frameworks
- Extended Key Usage (EKU)
- goes further, specifying *application-level* purposes:
- Lesson 185 — Name Constraints and Certificate Extensions
- Extender > Extensions
- tab, where you can enable, disable, or uninstall them.
- Lesson 2214 — Burp Extensions and BApp Store
- Extender API
- a programming interface supporting Java, Python, and Ruby.
- Lesson 2214 — Burp Extensions and BApp Store
- Extensions
- enable modern features like multi-domain certificates.
- Lesson 171 — X.509 Certificate Structure and FormatLesson 185 — Name Constraints and Certificate ExtensionsLesson 2214 — Burp Extensions and BApp StoreLesson 2703 — iOS Sandboxing and App Isolation
- Extensions (v3 only)
- Optional extra data like allowed usages, alternate names (SANs), key identifiers, and constraints
- Lesson 171 — X.509 Certificate Structure and Format
- external
- unable to read page content due to browser security.
- Lesson 642 — Cross-Site Request Forgery via XSSLesson 2426 — Stakeholder Communication During Incidents
- External API communication
- Isolate all external network calls in specific modules with their own validation
- Lesson 1212 — Separation of Concerns for Security Boundaries
- External Entities
- (rectangles): People or systems outside your control (users, third-party APIs)
- Lesson 42 — Creating a Data Flow Diagram (DFD)Lesson 62 — STRIDE per Element AnalysisLesson 68 — Data Flow Diagrams for Threat ModelingLesson 619 — XXE Fundamentals and XML ParsingLesson 1202 — The Rise and Fall of XXE and XML SecurityLesson 2637 — Creating Architecture Data Flow Diagrams
- External firewall
- filters traffic from the internet to the DMZ, allowing only necessary public services (ports 80/443 for web, 25 for email)
- Lesson 423 — Demilitarized Zones (DMZ)Lesson 449 — DMZ Architecture and Design
- External ID
- is a random, unique secret string you generate and share *only* with the trusted third-party.
- Lesson 1739 — External ID for Third-Party Access
- external interfaces
- typically HTTP requests for web applications.
- Lesson 1368 — DAST Fundamentals and Runtime TestingLesson 2638 — Identifying Assets and Attack Surface
- External issues
- include regulatory requirements, market conditions, technological changes, and threat landscapes.
- Lesson 2602 — Context of the Organization (Clause 4)
- External parties
- Customers, vendors, regulators, law enforcement (when applicable)
- Lesson 2426 — Stakeholder Communication During Incidents
- External resource coordination
- means identifying and building relationships with specialized partners *before* an incident occurs.
- Lesson 2378 — External Resource Coordination
- external secret management systems
- (HashiCorp Vault, AWS Secrets Manager) integrated via operators
- Lesson 1668 — Securing etcd and Secrets ManagementLesson 1972 — Secrets Management in Kubernetes
- External Secrets Operator
- that syncs from external stores into native Secret objects
- Lesson 1972 — Secrets Management in Kubernetes
- External stakeholders
- Only when necessary, carefully coordinated
- Lesson 2426 — Stakeholder Communication During Incidents
- External System Abuse
- APIs might be tricked into attacking third-party systems, making requests that appear to come from your legitimate server's IP address.
- Lesson 1033 — API7:2023 - Server Side Request Forgery (SSRF)
- Extract
- complete or fragmented files based on headers/footers
- Lesson 2402 — File Carving and Deleted File RecoveryLesson 2416 — Network Forensics Tools and WorkflowsLesson 2731 — Repackaging and Code Injection Attacks
- Extract configuration details
- Old JavaScript files might contain hardcoded API keys or internal IP addresses.
- Lesson 335 — Wayback Machine and Historical Website Analysis
- Extract encryption keys
- Monitor cryptographic API calls in memory
- Lesson 2726 — Dynamic Analysis and Runtime Instrumentation
- Extract firmware
- directly from flash memory chips using chip-off techniques
- Lesson 2755 — Physical Security Threats to IoT Devices
- Extract keys
- Force algorithms to reveal secret material through predictable errors
- Lesson 2774 — Fault Injection Attacks
- Extract license metadata
- from package manifests, headers, or license files
- Lesson 3032 — License Compliance Scanning
- Extract session identifiers
- from HTTP headers, cookies (`Set-Cookie:` and `Cookie:` headers), or authentication tokens
- Lesson 400 — Session Hijacking via MITM
- Extract soft labels
- from the teacher using high temperature softmax (which spreads probability mass across classes)
- Lesson 2849 — Defensive Distillation
- Extract source code
- to find additional vulnerabilities
- Lesson 589 — SQLMap Advanced Exploitation Features
- Extract the x-coordinate
- of that point and reduce it modulo the curve order (this becomes `r`, part of your signature)
- Lesson 164 — ECDSA (Elliptic Curve Digital Signature Algorithm)
- Extract their ATT&CK techniques
- from threat intelligence reports or ATT&CK's group profiles
- Lesson 2184 — Adversary Emulation with ATT&CK
- Extract tickets
- from LSASS memory or from disk (`lsass.
- Lesson 2152 — Pass-the-Ticket and Kerberos Exploitation
- Extreme persistence
- Survives OS reinstallation, hard drive formatting, even disk replacement
- Lesson 1554 — UEFI and Firmware Rootkits
F
- Facial artifacts
- Unnatural skin textures, inconsistent lighting across facial features, blurred boundaries around hairlines, or misaligned facial landmarks
- Lesson 2867 — Deepfake Detection: Forensic Artifacts and ML Classifiers
- Facilitate Solutions
- Lesson 2167 — Communicating with Development Teams
- Facility security plans
- Procedures for emergencies (fire, power outage)
- Lesson 2585 — HIPAA Security Rule: Physical Safeguards
- Factory provisioning
- Keys injected during manufacturing.
- Lesson 2791 — Pre-Shared Key Authentication for IoTLesson 2792 — Certificate-Based Authentication in Constrained Devices
- Fail Conditions
- are rules that stop the build when specific criteria are met.
- Lesson 1308 — Integrating Scanning into CI/CD Pipelines
- Fail fast when appropriate
- Block builds only for high-severity issues initially
- Lesson 1365 — Integrating SAST into Development Workflow
- Fail fast, fail clearly
- When security issues are found, developers need immediate, actionable feedback—not cryptic reports generated hours later.
- Lesson 2057 — Continuous Security Integration
- Fail-Fast Principle
- Configure your pipeline to halt immediately when scans detect critical issues.
- Lesson 2021 — IaC in CI/CD Pipelines: Security Gates and Approval Workflows
- Fail-safe behavior
- What happens when it fails?
- Lesson 2642 — Evaluating Architectural Security Controls
- Fail-Safe Defaults
- means your system should start in the most secure state possible—denying all access—and only grant permissions when explicitly allowed.
- Lesson 4 — Fail-Safe Defaults and Secure by DefaultLesson 10 — Attack Surface ReductionLesson 11 — Trust Boundaries and Implicit TrustLesson 23 — Defense-in-Depth PhilosophyLesson 59 — Information Disclosure ThreatsLesson 2032 — Security Design PatternsLesson 2654 — Defense-in-Depth: Core Concept and PhilosophyLesson 2666 — Fail-Safe Defaults (+2 more)
- Fail-safe vs. fail-secure modes
- Determines whether gates unlock (evacuation) or lock (security) during power failure
- Lesson 2282 — Mantrap and Turnstile Controls
- Failed assume attempts
- indicating reconnaissance
- Lesson 1736 — Best Practices for Temporary Credentials
- Failed authentication attempts
- While WireGuard silently drops invalid packets, system logs may reveal port scanning
- Lesson 498 — WireGuard Deployment Best Practices and Monitoring
- Failed events report
- Lesson 1496 — Searching and Analyzing Audit Logs
- fails the build
- and alerts the team.
- Lesson 1353 — CI/CD Pipeline Secret ScanningLesson 2439 — Container and IaC Scanning
- Failure Handling
- requires automatic rollback mechanisms.
- Lesson 3047 — Automated Vulnerability Patching
- Failure independence
- Does this layer protect when others fail?
- Lesson 2662 — Defense-in-Depth Trade-offs and Cost-Benefit
- FAIR
- takes a quantitative approach, breaking risk down into financial terms using probability distributions.
- Lesson 2507 — Risk Assessment Methodologies and Frameworks
- Fair resource distribution
- across all customers
- Lesson 1016 — Quota Management and Tiered Access Control
- Fake wireless adapters
- that act as rogue access points
- Lesson 2277 — USB Drop Attacks and Malicious Devices
- Falco
- intercept kernel-level events to detect policy violations in real-time.
- Lesson 1659 — Runtime Monitoring and Anomaly DetectionLesson 1673 — Runtime Security and Threat DetectionLesson 1974 — Runtime Security and Threat Detection
- Fallback logic
- Apps try the new secret first, fall back to old if needed
- Lesson 1346 — Zero-Downtime Rotation Patterns
- False Acceptance Rate (FAR)
- The system incorrectly grants access to an unauthorized person
- Lesson 2281 — Biometric Access Controls
- False condition
- Page behaves differently—blank response, error page, or different timing
- Lesson 568 — Blind SQL Injection Fundamentals
- False flag operations
- Planting indicators suggesting another group
- Lesson 2337 — Threat Actors and Attribution
- False negatives
- Scanners miss some threats (no tool is 100% accurate)
- Lesson 961 — Virus Scanning and Malware Detection Integration
- false positive
- occurs when your system flags legitimate traffic as malicious.
- Lesson 460 — False Positives and Alert TuningLesson 1359 — SAST vs DAST: Strengths and LimitationsLesson 1571 — False Positives and Detection TuningLesson 1578 — EDR Alert Triage and InvestigationLesson 1614 — False Positive ManagementLesson 2345 — False Positive Identification and Analysis
- False Positive Management
- is crucial at scale.
- Lesson 2053 — Test Result Management and Remediation Workflows
- False positive rate
- Are tools wasting developer time?
- Lesson 2060 — Feedback Loops and MetricsLesson 2531 — Security Operations Center MetricsLesson 3017 — Test Coverage and Effectiveness Metrics
- False Positive Rate (FPR)
- This measures how often alerts fire incorrectly.
- Lesson 2354 — Alert Quality Metrics
- False Positive Rates
- Lesson 3052 — Measuring Automation Effectiveness
- False positive reduction
- → Analyst capacity freed for higher-value work
- Lesson 2359 — Reporting SOC Performance to Leadership
- False positives
- Legitimate code was sometimes blocked, breaking functionality
- Lesson 671 — X-XSS-Protection and Legacy HeadersLesson 1309 — Vulnerability Aggregation and DeduplicationLesson 1597 — Operational Challenges and MaintenanceLesson 3016 — False Positive Management
- False Rejection Rate (FRR)
- The system incorrectly denies access to an authorized person
- Lesson 2281 — Biometric Access Controls
- Familiarity exploitation
- Messages appearing to come from known apps or contacts
- Lesson 2700 — User Behavior and Social Engineering
- Family Emergency Scams
- Cloning a child's or relative's voice to demand urgent money transfers
- Lesson 2865 — Audio Deepfakes and Voice Cloning Attacks
- Family/location diversity
- Avoiding relays run by the same operator or country
- Lesson 2985 — Tor Relays: Guard, Middle, and Exit
- Fast
- XOR is one of the fastest operations computers can perform
- Lesson 115 — Stream Cipher Fundamentals and XOR OperationsLesson 125 — AES-GCM: Galois/Counter ModeLesson 205 — Computational Efficiency Requirements
- Fast acknowledgment
- Auto-reply immediately: "We received your report and will investigate.
- Lesson 2291 — Reporting Mechanisms and Culture
- Fast constant-time operations
- Built-in resistance to timing side-channel attacks
- Lesson 167 — Curve25519 and EdDSA
- Fast enough
- for real-time applications (HTTPS, blockchain)
- Lesson 205 — Computational Efficiency Requirements
- Faster Containment Options
- You can isolate compromised resources instantly via security group changes or instance snapshots —much faster than physical network segmentation.
- Lesson 1904 — Cloud IR Fundamentals and Shared Responsibility
- Faster incident response
- since you know the expected state
- Lesson 1412 — Baseline Security Configuration
- Faster investigation
- Correlated signals tell a story, reducing analyst workload
- Lesson 1902 — Multi-Signal Correlation for Detection
- Faster key generation
- Smaller keys mean less random data to generate
- Lesson 163 — ECC vs RSA: Security and Performance
- Faster offboarding
- One-click removal when employees leave
- Lesson 1698 — Identity Federation and Single Sign-On
- Faster operations
- ECC point multiplication is computationally lighter than RSA's large modular exponentiation
- Lesson 163 — ECC vs RSA: Security and Performance
- Faster signature generation
- deterministic computation is simpler
- Lesson 238 — EdDSA and Modern Signature Standards
- FDA regulations
- for medical devices storing data in cloud
- Lesson 1984 — Industry-Specific Cloud Compliance
- Fear
- (system compromise warnings)
- Lesson 1533 — Social Engineering and User DeceptionLesson 2268 — Urgency and Fear-Based Manipulation
- Feasibility
- Can your organization implement and maintain the control?
- Lesson 2519 — Risk Mitigation and Control SelectionLesson 2892 — Mitigation Strategies and Controls
- Feature-space clustering
- Clean data from the same class typically clusters together.
- Lesson 2824 — Detecting Poisoned Training Data
- Federated identities
- External identity providers (corporate Active Directory, Google Workspace) authenticate users who then assume roles in your cloud—no need to create duplicate cloud-native user accounts.
- Lesson 1712 — IAM Roles: Federated and Assumable Identities
- Federated identity
- exchanges existing tokens for cloud credentials
- Lesson 1722 — Service Account Keys and Credentials
- Federated learning
- (train models without centralizing data)
- Lesson 2884 — Full Functionality and Positive-Sum
- Federation configuration
- properly integrating external identity providers
- Lesson 1690 — Identity and Access Management Boundaries
- FedRAMP authorization
- (which you've studied) or meeting agency-specific security requirements.
- Lesson 2615 — FISMA and Federal Compliance
- FedRAMP Marketplace
- Once authorized, your service is listed publicly, enabling other agencies to adopt it faster.
- Lesson 2613 — FedRAMP Authorization Framework
- Feedback
- – Evaluate whether intelligence met needs and refine requirements
- Lesson 2334 — Threat Intelligence Fundamentals and the Intelligence Lifecycle
- Feedback loop
- After each test input runs, the fuzzer checks if it triggered any new code paths
- Lesson 1388 — Coverage-Guided FuzzingLesson 1885 — SIEM Performance Tuning and False Positives
- feedback loops
- that alert developers to security issues before they become expensive problems downstream.
- Lesson 1365 — Integrating SAST into Development WorkflowLesson 2060 — Feedback Loops and MetricsLesson 2062 — Balancing Security and VelocityLesson 2291 — Reporting Mechanisms and Culture
- Feistel network
- is a symmetric structure used to build block ciphers like DES.
- Lesson 86 — Feistel Network Architecture
- Feistel network structure
- (like DES) with 16 rounds.
- Lesson 93 — Alternative Block Ciphers: Blowfish, Twofish, Serpent
- Fetch Interception
- A compromised service worker can modify API responses before they reach your application.
- Lesson 1084 — Service Worker Message Interception
- Fewer communication rounds
- Reduce how often devices share updates to minimize exposure
- Lesson 2843 — Federated Learning Privacy
- Fewer false positives
- Legitimate anomalies rarely trigger multiple unrelated alerts simultaneously
- Lesson 1902 — Multi-Signal Correlation for Detection
- Fiat-Shamir heuristic
- is a technique that transforms interactive proofs into non-interactive ones.
- Lesson 242 — Interactive vs Non-Interactive Proofs
- FIDO2/WebAuthn
- protocols to provide cryptographic proof tied to the exact domain you're authenticating to.
- Lesson 1746 — Hardware Security Keys and FIDO2
- Field-based filtering
- – Narrow results to specific event types, IP addresses, usernames, or time ranges.
- Lesson 2320 — SIEM Query Languages and Search
- Field-Level Encryption
- protects specific sensitive fields (credit cards, SSNs) *beyond* TLS.
- Lesson 1777 — API Gateway and Application-Level Encryption
- File access
- Read sensitive files or write malicious code
- Lesson 1249 — SSTI Detection and Exploitation TechniquesLesson 1659 — Runtime Monitoring and Anomaly Detection
- File access monitoring
- with precise who/what/when details
- Lesson 1491 — Introduction to Linux Auditing Framework
- File access summary
- Lesson 1496 — Searching and Analyzing Audit Logs
- File Deletion
- Securely wiping tools, scripts, and artifacts from disk.
- Lesson 2126 — Covering Tracks and Anti-Forensics
- File Extraction
- identifies file transfers within protocols like HTTP, FTP, or SMB.
- Lesson 2411 — Protocol Analysis and Reconstruction
- File format specifications
- (XML schemas, JSON structures, protocol definitions)
- Lesson 1387 — Generation-Based Fuzzing
- File formats
- Generate PDFs with circular references, JPEGs with unusual color spaces, or XML with deeply nested entities
- Lesson 1390 — Structured Input Fuzzing
- File hashes
- (MD5, SHA-256) of known malware samples
- Lesson 1580 — EDR Detection Rules and Custom IndicatorsLesson 2336 — Indicators of Compromise (IOCs) and Their LimitationsLesson 2415 — Network-Based IOC ExtractionLesson 2419 — Event Correlation Techniques
- File inclusion
- Including files where the extension is appended server-side
- Lesson 1163 — Null Byte Injection and String Termination
- File integrity monitoring
- Alert on unauthorized changes to critical files
- Lesson 2579 — Requirements 11-12: Testing and Policy
- File Integrity Monitoring (FIM)
- Detects unauthorized system changes malware makes
- Lesson 1573 — Antivirus Limitations and Complementary Controls
- File Modifications
- – File creation, deletion, modification, and attribute changes.
- Lesson 1575 — EDR Data Collection and Telemetry
- File Objects and Handles
- Every open file has a kernel object.
- Lesson 2396 — Registry and File System in Memory
- File operations
- `LOAD_FILE()` in MySQL reads files from disk; `INTO OUTFILE` writes query results to files
- Lesson 585 — File System and OS Command ExecutionLesson 902 — Time-of-Check to Time-of-Use (TOCTOU) VulnerabilitiesLesson 939 — Time-of-Check to Time-of-Use TestingLesson 1548 — System Call Hooking
- File permissions
- Config files should be readable only by the services that need them; executables shouldn't be world-writable
- Lesson 1405 — Principle of Least Privilege in OS HardeningLesson 2628 — Fail-Safe Defaults and Secure DefaultsLesson 2666 — Fail-Safe DefaultsLesson 2713 — Android Application Sandboxing
- File Rotation
- Instead of one giant capture file, split output into smaller files (e.
- Lesson 383 — Packet Capture Performance and Ring Buffers
- File shares
- (looking for names like "finance," "passwords," "confidential")
- Lesson 2125 — Data Discovery and Staging
- File size and metadata
- Lesson 2404 — Artifact Analysis: Prefetch, Shimcache, and Amcache
- File size limits
- to prevent resource exhaustion
- Lesson 982 — Multi-Layer File Upload Validation Strategy
- File Storage
- (like AWS EFS, Azure Files) offers network-attached file systems with hierarchical directories.
- Lesson 1781 — Cloud Storage Service Models and Security Responsibilities
- File system checks
- Looking for `/su`, Cydia, Magisk binaries
- Lesson 2728 — Root and Jailbreak Detection Bypass
- File system modifications
- that weren't in the original image
- Lesson 1651 — Container Runtime Security Overview
- File system paths
- (expose server architecture)
- Lesson 1040 — Error Handling and Information Disclosure
- File system permissions
- Mount directories as read-only by default; only specific processes get write access.
- Lesson 1406 — Default Deny and Allowlisting
- File Upload Callbacks
- Lesson 884 — Basic SSRF Exploitation Techniques
- File Upload Fields
- Lesson 1177 — ReDoS Attack Vectors in Web Applications
- File upload forms
- that process XML-based formats (SVG, DOCX, XLSX, PPTX)
- Lesson 627 — Testing for XXE Vulnerabilities
- File upload/download
- capabilities for post-exploitation
- Lesson 2244 — Evil-WinRM and PowerShell Remoting Attacks
- File Uploads
- Lesson 633 — XSS Attack Vectors and Injection PointsLesson 882 — SSRF Fundamentals and Attack SurfaceLesson 1235 — Framework-Specific Safe APIs
- File-based ingestion
- Batch uploads of stored log files
- Lesson 2316 — Log Sources and Event Collection Methods
- FileCreate (Event ID 11)
- Logs when files are created, capturing the process responsible, file path, and creation time.
- Lesson 1514 — Sysmon File and Registry Activity Monitoring
- FileCreateStreamHash (Event ID 15)
- Monitors alternate data streams (ADS), a Windows feature attackers exploit to hide malicious code behind legitimate files.
- Lesson 1514 — Sysmon File and Registry Activity Monitoring
- Fileless Malware
- Malicious PowerShell scripts, reflective DLL injection, or shellcode living in process memory without touching disk.
- Lesson 2394 — Memory-Resident Malware Detection
- Fileless techniques
- execute entirely in memory using legitimate tools like PowerShell, leaving minimal forensic traces.
- Lesson 2257 — Malicious Attachments and Payload Delivery
- Filename sanitization
- to block path traversal
- Lesson 982 — Multi-Layer File Upload Validation Strategy
- Files
- Configuration files, scripts, browser saved passwords, SSH keys, database connection strings, and application credentials often sit unencrypted on disk.
- Lesson 2157 — Credential Harvesting for Pivoting
- Files and directories accessed
- during first 10 seconds
- Lesson 2404 — Artifact Analysis: Prefetch, Shimcache, and Amcache
- Filter by event type
- Lesson 1496 — Searching and Analyzing Audit Logs
- Filter by success/failure
- Lesson 1496 — Searching and Analyzing Audit Logs
- Filter by time range
- Lesson 1496 — Searching and Analyzing Audit Logs
- Filter by user
- Lesson 1496 — Searching and Analyzing Audit Logs
- Filter Escaping
- protects LDAP search filters by escaping metacharacters according to RFC 4515.
- Lesson 615 — Preventing LDAP Injection
- Filter Evasion
- Security filters block "script" but might miss "s ϲript" (Greek lunate sigma).
- Lesson 1168 — Homograph and Confusable Character Attacks
- filtering
- to narrow scope:
- Lesson 1876 — Log Query and Analysis TechniquesLesson 1882 — Cloud SIEM Query Languages
- FIN Scan
- Sends only the FIN flag (normally used to close connections).
- Lesson 367 — TCP Stealth Scan Techniques
- FIN Scan (`-sF`)
- sends packets with only the FIN (finish) flag set.
- Lesson 343 — Advanced Nmap Scan Types
- Final action
- – Exploit the final step by referencing someone else's object ID
- Lesson 818 — Multi-Step IDOR Exploitation
- Final Mix
- Alice adds her secret red to Bob's green = brown.
- Lesson 153 — Diffie-Hellman Key Exchange Fundamentals
- Financial
- – Direct costs, regulatory fines, lost revenue
- Lesson 2499 — Likelihood and Impact Determination
- Financial analytics
- Banks compute risk scores on encrypted customer data without exposing account details to third- party analysts.
- Lesson 2924 — Homomorphic Encryption Applications
- Financial loss scenarios
- "Your payment failed—update now to avoid service termination"
- Lesson 2268 — Urgency and Fear-Based Manipulation
- Financial systems
- One person initiates a payment, another approves it
- Lesson 7 — Separation of Duties and Privilege SeparationLesson 2664 — Separation of Duties
- find
- these threats.
- Lesson 549 — Rogue AP Detection TechniquesLesson 829 — Testing for Privilege EscalationLesson 893 — Testing for SSRF Vulnerabilities
- Find an unkeyed input
- A header or parameter that affects the response but isn't in the cache key
- Lesson 1116 — Cache Poisoning Attack Fundamentals
- Find dangerous functions
- (`strcpy`, hardcoded keys, disabled security checks)
- Lesson 2762 — Reverse Engineering Firmware Binaries
- Find Gaps in Defenses
- Lesson 2169 — Red Team Operations and Objectives
- Find removed endpoints
- An old `/admin` or `/api/v1/debug` page might still exist on the live server, just unlinked.
- Lesson 335 — Wayback Machine and Historical Website Analysis
- Find the Issuer's Certificate
- Lesson 181 — Certificate Chain Validation Process
- Find the vulnerable input
- Attackers look for application features that fetch URLs — image processors, webhooks, PDF generators, URL preview tools
- Lesson 1935 — SSRF Attacks Against IMDS
- Find unused credentials
- Identify long-term keys, passwords, or access tokens that haven't been used recently
- Lesson 1749 — Access Analyzer and Unused Access Detection
- Finding win-win architectures
- where privacy controls enhance—rather than limit—user experience
- Lesson 2884 — Full Functionality and Positive-Sum
- Findings prioritization
- that cuts through noise to highlight genuine risks
- Lesson 1886 — Cloud Threat Detection Overview
- Fine-Grained Access Control
- You can't grant Developer A access to production database secrets while denying access to Developer B using only environment variables.
- Lesson 1324 — When Environment Variables Are Insufficient
- fingerprinting
- .
- Lesson 587 — SQLMap Detection and Fingerprinting TechniquesLesson 592 — NoSQLMap and NoSQL Injection Automation
- Fingerprinting Beyond IP
- Combine multiple signals—device fingerprints, behavioral patterns, API key usage, session characteristics—to identify the same actor across different IPs.
- Lesson 1017 — Rate Limiting Bypass Prevention and Monitoring
- Fingerprinting large data
- You can represent massive files with a compact, fixed-size "fingerprint.
- Lesson 204 — Fixed-Length Output Property
- Finite automata
- (finite state machines) process input character-by-character in a single forward pass.
- Lesson 1181 — Alternative Parsing Strategies
- Firewall and IPS
- Push malicious IP lists directly to network devices to create automatic blocking rules.
- Lesson 2342 — Operationalizing Threat Intelligence
- Firewall integration
- Always restrict WireGuard's UDP port (typically 51820) to known peer IP addresses using your host firewall.
- Lesson 498 — WireGuard Deployment Best Practices and Monitoring
- Firewall records
- show allowed and blocked connections, helping you understand attack paths and containment effectiveness.
- Lesson 2384 — Network Evidence Collection
- firewall rules
- between zones.
- Lesson 450 — Internal Network ZoningLesson 2628 — Fail-Safe Defaults and Secure DefaultsLesson 2666 — Fail-Safe Defaults
- Firewall Rules (iptables/nftables)
- Lesson 1938 — Blocking IMDS Access from Application Layer
- Firewalls
- operate at the network perimeter and between internal segments.
- Lesson 2650 — Segmentation Enforcement Mechanisms
- Firewalls and Network Devices
- SOAR playbooks can push IOCs (IP addresses, domains) to firewalls for automatic blocking, or pull connection logs for investigation.
- Lesson 2329 — Integration and Orchestration
- FireWire, Thunderbolt, or PCIe
- to read RAM directly, bypassing the CPU and OS.
- Lesson 2382 — Memory Acquisition Techniques
- Firmware rootkits
- embed themselves directly in the UEFI firmware storage (flash memory).
- Lesson 1463 — UEFI Firmware Attacks and VulnerabilitiesLesson 1546 — Rootkit Definition and Classification
- First Access
- You request access to Company A's files.
- Lesson 18 — Chinese Wall Model: Conflict of Interest Prevention
- First execution time
- Lesson 2404 — Artifact Analysis: Prefetch, Shimcache, and Amcache
- First-finder bonuses
- for novel vulnerability classes
- Lesson 2482 — Bounty Pricing and Reward Structures
- Fix Rate and Time-to-Remediate
- Lesson 3040 — Application Security Metrics
- Fixed cameras
- continuously monitor critical chokepoints like badge readers or mantraps.
- Lesson 2284 — Video Surveillance and Monitoring
- Fixed header bytes
- (0x00, 0x02) identify this as encryption padding
- Lesson 145 — RSA Padding Schemes: PKCS#1 v1.5
- Fixed output size
- A 1-byte file and a 1GB file produce the same length hash
- Lesson 198 — Hash Function Fundamentals
- Fixed-size records
- (database fields) work well with `CBC` or authenticated modes like `GCM`, though you must handle padding carefully.
- Lesson 106 — Mode Selection for Different Scenarios
- Flag anomalies
- like unsigned packages, checksum mismatches, or unexpected dependency additions
- Lesson 1301 — Automated Package Verification Workflows
- Flag Combinations
- How systems respond to unusual flag combinations (like SYN+FIN together) differs
- Lesson 359 — TCP/IP Stack Fingerprinting
- Flag external access
- Discover resources (like S3 buckets or IAM roles) accessible outside your organization
- Lesson 1749 — Access Analyzer and Unused Access Detection
- Flag policy violations
- based on your organization's license allowlist/denylist
- Lesson 3032 — License Compliance Scanning
- Flag restricted records
- so processing pipelines skip them while preserving the data
- Lesson 2937 — Rights to Rectification and Restriction
- Flattery and Ego Appeals
- "You must be pretty senior to have access to that system—how long have you been here?
- Lesson 2267 — Elicitation Techniques and Information Gathering
- Flexibility
- Owners have full control
- Lesson 19 — Access Control Models: DAC, MAC, and RBACLesson 89 — AES: Rijndael Selection and DesignLesson 210 — SHA-3 and the Keccak AlgorithmLesson 215 — Specialized Hash Functions: BLAKE2, BLAKE3Lesson 485 — TLS VPNs: Architecture and Differences from IPsecLesson 1450 — MAC vs DAC: Fundamental Differences
- Flips labels strategically
- Change labels to the desired wrong class
- Lesson 2819 — Label Flipping and Targeted Poisoning
- Flow Control Abuse
- HTTP/2 uses `WINDOW_UPDATE` frames to control how much data can be sent.
- Lesson 1098 — HTTP/2 Stream Vulnerabilities and Attacks
- Flow data
- (NetFlow, sFlow, IPFIX) provides summarized connection metadata: source/destination IPs, ports, protocols, byte counts, and timestamps.
- Lesson 2384 — Network Evidence Collection
- Flow logs
- capture network traffic metadata between resources.
- Lesson 1917 — Cloud Log Collection for Forensics
- Flow-based analysis
- offers a smarter alternative: instead of capturing every byte, network devices export *metadata* about connections—who talked to whom, when, how much data, which protocols, and for how long.
- Lesson 2410 — Network Flow Analysis
- Focus
- High-level trends, geopolitical threats, industry-wide risks, and business impact
- Lesson 2335 — Types of Threat Intelligence: Strategic, Tactical, and Operational
- Follow a schedule
- Audit all ISMS areas at planned intervals (typically annually)
- Lesson 2608 — Internal Audits and Management Review
- Follow the data
- Trace sensitive information (credentials, PII, financial data) through every hop
- Lesson 2637 — Creating Architecture Data Flow Diagrams
- Follow-the-sun
- Global SOCs where regional teams hand off to the next time zone
- Lesson 2309 — 24/7 Operations and Shift Management
- Follows links
- – Clicks every `<a>` tag, button, and navigation element it finds
- Lesson 1371 — Crawling and Application Discovery
- Font-Based Exfiltration
- Lesson 677 — CSS Injection and Exfiltration
- For clients (production)
- Return generic, standardized error codes with minimal detail:
- Lesson 1040 — Error Handling and Information Disclosure
- For developers
- Log complete error details server-side with correlation IDs:
- Lesson 1040 — Error Handling and Information Disclosure
- For each component
- (web server, database, API gateway):
- Lesson 2640 — Applying STRIDE at Architecture Level
- For each interface
- (APIs, authentication endpoints):
- Lesson 2640 — Applying STRIDE at Architecture Level
- For Executive Audiences
- Create simplified visual summaries focused on:
- Lesson 2424 — Timeline Visualization and Communication
- For laptops/endpoints
- Lesson 2387 — Mobile and Endpoint Evidence Collection
- For mobile devices
- Lesson 2387 — Mobile and Endpoint Evidence Collection
- For Risk Communication
- The Top 10 speaks a common language between security teams, developers, and executives.
- Lesson 1207 — Using the Top 10 Effectively in Security Programs
- For Security
- If you place a broad "allow all" rule before specific "deny" rules, those denials never get enforced.
- Lesson 427 — Rule Ordering and Priority
- For Security Awareness Training
- The Top 10 provides an excellent framework for teaching developers about real-world vulnerabilities.
- Lesson 1207 — Using the Top 10 Effectively in Security Programs
- For Technical Teams
- Use detailed timeline graphs showing parallel activities across systems.
- Lesson 2424 — Timeline Visualization and Communication
- For Testing Priorities
- Use the Top 10 to *prioritize* where you focus penetration testing and code review efforts, not as your complete testing scope.
- Lesson 1207 — Using the Top 10 Effectively in Security Programs
- For Vendor Assessments
- When evaluating third-party software, asking how they address Top 10 risks is a solid starting point—but again, not the finish line.
- Lesson 1207 — Using the Top 10 Effectively in Security Programs
- Force alternate parsers
- – Request `Accept: application/xml` when the API only validates JSON responses, potentially exposing sensitive data the XML serializer includes
- Lesson 997 — Content-Type and Accept Header Exploits
- Forcing the client
- to reinstall the Pairwise Transient Key (PTK) it already configured
- Lesson 528 — KRACK Attack on WPA2
- Forensic Access Only
- Create a restricted security group allowing SSH/RDP access only from your incident response team's known IPs or a forensic jump box.
- Lesson 1908 — Instance Isolation and Containment
- Forensic-grade evidence
- that's legally defensible
- Lesson 1491 — Introduction to Linux Auditing Framework
- Forensics and Attribution
- Detailed logs preserve the timeline and technical details needed for legal proceedings or understanding attacker techniques after an incident.
- Lesson 1466 — Introduction to System Logging
- Forensics tools
- (Volatility, Autopsy): Post-incident analysis
- Lesson 2170 — Blue Team Responsibilities and Tools
- Forge documents
- Create a malicious contract that hashes identically to a legitimate one
- Lesson 201 — Collision Resistance
- Forge passwords
- Given a password hash from a database, find a password that produces that hash
- Lesson 199 — Preimage Resistance
- Forgetting subdomain policies
- Without explicit configuration, subdomains inherit your organizational domain's DMARC policy, which may block legitimate services.
- Lesson 2304 — Email Authentication Best Practices and Common Pitfalls
- Fork and maintain
- If critical and irreplaceable, fork the repository and commit to security updates
- Lesson 1267 — Unmaintained Dependencies and End-of-Life Libraries
- Fork system call
- Jailbroken devices often allow `fork()` which Apple restricts
- Lesson 2708 — iOS Jailbreaking and Detection
- Fork-based attacks
- where pull requests from untrusted contributors could extract secrets
- Lesson 1323 — Environment Variables in CI/CD Pipelines
- Form field detection
- Identifying every input, textarea, and file upload
- Lesson 1371 — Crawling and Application Discovery
- Form Handling
- Built-in form libraries automatically include CSRF tokens and validate input types without manual intervention.
- Lesson 1235 — Framework-Specific Safe APIs
- form hijacking
- (intercepting form submissions).
- Lesson 639 — Keylogging and Form HijackingLesson 647 — XSS Worms and Self-Propagating AttacksLesson 676 — HTML Injection and Context Confusion
- Form Input Fields
- Lesson 633 — XSS Attack Vectors and Injection Points
- Form Validation
- Lesson 1177 — ReDoS Attack Vectors in Web Applications
- Format
- Does it match expected patterns (regex)?
- Lesson 609 — Command Injection Prevention: Input ValidationLesson 1153 — Data Type and Format ValidationLesson 1277 — SBOM Formats: SPDX, CycloneDX, and SWID
- Format and Prefixes
- Many modern hashes include metadata:
- Lesson 2226 — Hash Identification and Analysis
- Format string bugs
- appear when inputs like `%s%s%n` trigger unexpected memory reads/writes
- Lesson 2102 — Fuzzing for Crash and Memory Bugs
- Format string functions
- like `printf(userInput)` (without a format specifier) allow attackers to read or write arbitrary memory if they control the format string.
- Lesson 1226 — Understanding Dangerous Functions and Their Risks
- Formats
- specify how your payload is packaged—executables (`.
- Lesson 2196 — Advanced Payload Generation with msfvenom
- Forum posts or comments
- containing images or iframes
- Lesson 849 — CSRF Attack Vectors and Delivery Methods
- Forward modified traffic
- to the destination, making it appear normal
- Lesson 399 — HTTP Proxy and Transparent Interception
- Forward proxy cache
- Corporate or ISP proxies between users and the internet
- Lesson 1115 — Web Cache Fundamentals and Architecture
- Forward secrecy
- Ephemeral ECDH keys mean past sessions stay safe even if the server's long-term key is compromised
- Lesson 170 — ECC in Practice: TLS and BeyondLesson 517 — WPA3 Security EnhancementsLesson 2942 — Signal Protocol FundamentalsLesson 2943 — Forward Secrecy in E2EELesson 2949 — Signal Protocol: Double Ratchet and Key AgreementLesson 2963 — Forward Secrecy and Key Rotation in Email
- Forward security
- means that even if your key is compromised, signatures created *before* the compromise remain valid and unforgeable.
- Lesson 240 — Forward-Secure and Stateful Signatures
- Forwarding
- The attacker relays traffic to maintain the illusion of normal communication
- Lesson 392 — Man-in-the-Middle Attack Fundamentals
- FOSSA
- is a commercial platform that provides comprehensive license scanning, policy enforcement, and compliance reports.
- Lesson 1307 — License Compliance Scanning
- Four 12-hour shifts
- Longer shifts with overlapping days (e.
- Lesson 2309 — 24/7 Operations and Shift Management
- Fourth Layer
- Validate **Origin and Referer headers** when present to confirm the request came from your domain.
- Lesson 873 — Defense-in-Depth CSRF Strategy
- Fourth-party risk
- refers to the security exposure created by your vendors' suppliers, service providers, and subcontractors—parties you have no direct relationship with but who can still compromise your security.
- Lesson 2540 — Fourth-Party and Supply Chain Risk
- FQDNs
- from DNS queries, HTTP Host headers, or TLS SNI fields
- Lesson 2415 — Network-Based IOC Extraction
- Fragment packets
- Break up scan signatures that IDS systems recognize
- Lesson 366 — Stealth Scanning Fundamentals
- Fragmentation
- splits packets into smaller pieces.
- Lesson 347 — Firewall and IDS EvasionLesson 369 — Fragmentation and Packet ManipulationLesson 529 — Fragmentation and Aggregation AttacksLesson 2460 — Third-Party and Application Patching
- Fragmentation exploits
- work by injecting malicious fragments that get reassembled incorrectly or bypass filtering.
- Lesson 529 — Fragmentation and Aggregation Attacks
- Framework defaults
- that log all HTTP headers or environment variables
- Lesson 1354 — Preventing Secrets in Logs and Error Messages
- Framework-specific responses
- – Error pages that look like SQL injection results but aren't exploitable
- Lesson 1375 — False Positive Management in DAST
- Free Hosting
- Quick attacks use free services or compromised WordPress sites—easy to set up but short-lived and easily blocked.
- Lesson 2256 — Credential Harvesting Pages
- Freely Given
- Lesson 2556 — Consent Requirements and ManagementLesson 2932 — Consent Requirements and Valid Consent
- Frequency
- Weekly for critical assets, monthly for low-risk systems
- Lesson 1612 — Scan Configuration and OptimizationLesson 2598 — Control Design and Implementation
- Frequent, short exercises
- (5-minute modules monthly beats 2-hour annual sessions)
- Lesson 2287 — Security Awareness Training Fundamentals
- Freshness vs performance tradeoff
- Cache too long, and revocations are delayed; cache too short, and performance suffers
- Lesson 191 — Certificate Revocation Lists (CRLs)
- Frida
- is the most popular dynamic instrumentation toolkit.
- Lesson 2726 — Dynamic Analysis and Runtime InstrumentationLesson 2727 — Certificate Pinning Bypass TechniquesLesson 2728 — Root and Jailbreak Detection Bypass
- From ARP tables
- Devices communicating with many hosts often include routers
- Lesson 353 — Gateway and Router Identification
- From Other Platforms
- Lesson 331 — Social Media and Public Profile Intelligence
- From subnet discovery
- The gateway is typically the first or last usable IP in a subnet (e.
- Lesson 353 — Gateway and Router Identification
- From traceroute results
- The first hop beyond your local machine is usually your gateway; subsequent hops reveal routing infrastructure
- Lesson 353 — Gateway and Router Identification
- Front-Channel Communication
- The RP's browser can periodically check with the IdP (in a hidden iframe) whether the user's IdP session is still valid.
- Lesson 775 — OIDC Session Management and Single Logout
- Front-Channel Logout
- IdP redirects the user's browser through each RP's logout endpoint using hidden iframes.
- Lesson 775 — OIDC Session Management and Single Logout
- FTK Imager
- A GUI-based forensic imaging tool that creates verified copies, calculates cryptographic hashes (for integrity verification), and supports various image formats.
- Lesson 2383 — Disk Imaging and Forensic CopiesLesson 2399 — Disk Imaging and Write Blocking
- Full
- High confidence (one fully-trusted signature may suffice)
- Lesson 2959 — PGP/GPG Key Management and Web of Trust
- Full distributions
- (like Ubuntu or CentOS) include complete operating systems with all standard utilities.
- Lesson 1643 — Base Image Selection and Provenance
- Full enforcement
- Enable blocking once policies are validated
- Lesson 2688 — Microsegmentation Implementation Strategies
- Full Functionality
- Positive-sum, not zero-sum (security AND usability)
- Lesson 2879 — Introduction to Privacy by Design
- Full lifecycle control
- You decide when keys rotate or are disabled
- Lesson 1797 — Key Management for Database Encryption
- Full packet captures (PCAP)
- complete network conversations
- Lesson 2408 — Network Forensics Fundamentals
- Full scans
- (comprehensive): Test every known vulnerability signature
- Lesson 2440 — Scan Configuration and Optimization
- full tunnel
- mode, all network traffic from your device flows through the VPN connection—even requests for public websites like Google or YouTube.
- Lesson 470 — Full Tunnel vs Split TunnelLesson 511 — Split Tunneling Security Risks
- Full validation
- – Verifies certificate matches the expected hostname/identity
- Lesson 1796 — Database Connection Encryption
- Fully automated
- System detects, fixes, and logs without human involvement
- Lesson 3044 — Automated Remediation Fundamentals
- Fully HE
- Arbitrary computation, but computationally expensive
- Lesson 249 — Homomorphic Encryption Fundamentals
- Fully Homomorphic Encryption (FHE)
- is the holy grail—it supports any computation of any complexity without restrictions.
- Lesson 250 — Types of Homomorphic Encryption
- Function code and configuration
- stored in the cloud provider (Lambda versions, deployment packages) become primary artifacts.
- Lesson 1920 — Container and Serverless Forensics
- Function responses
- A poorly designed API might return too much information—database query results containing PII, internal user IDs, or error objects with sensitive metadata.
- Lesson 1962 — Sensitive Data Exposure
- Function Runtime Settings
- Lesson 1965 — Security Misconfiguration
- Function-Level Exploitation
- Lesson 824 — Vertical Privilege Escalation Techniques
- Functional testing
- Does everything still work as expected?
- Lesson 1603 — Patch Testing and StagingLesson 2455 — Patch Testing and Staging Environments
- Functional verification
- includes checking that WAF rules are processing traffic, security headers are present in responses, rate limiting triggers appropriately, and monitoring/logging captures security events.
- Lesson 2068 — Post-Release Security Validation
- Fuse bits
- Permanently disable debug access by burning one-time-programmable fuses in the chip
- Lesson 2776 — Debug Interfaces and JTAG Security
- Future Requests Blocked
- If you try accessing Company B's files (a competitor), access is **denied**—even if you have the right security clearance.
- Lesson 18 — Chinese Wall Model: Conflict of Interest Prevention
- Fuzz and probe
- Send malformed inputs to exposed services
- Lesson 2767 — Firmware Emulation and Dynamic Analysis
- Fuzzing
- Send malformed data to discover crashes and potential bugs
- Lesson 2197 — Auxiliary Modules and Scanning
G
- Gadget chains
- are sequences of method calls triggered automatically during deserialization.
- Lesson 1184 — Insecure Deserialization in Java
- Galois/Counter Mode (GCM)
- is an **authenticated encryption** mode that gives you both:
- Lesson 101 — GCM Mode: Authenticated Encryption Standard
- Gap Analysis
- Lesson 1913 — Post-Incident Activities and Cloud HardeningLesson 2180 — Using ATT&CK for Threat IntelligenceLesson 2183 — ATT&CK Navigator and Visualization
- Gap identification
- Lesson 2461 — Patch Compliance Monitoring and Reporting
- garbled circuits
- (which you've already learned).
- Lesson 259 — Oblivious Transfer (OT) ProtocolsLesson 2923 — Secure Multi-Party Computation for PrivacyLesson 2925 — Private Set Intersection
- Gate Garbling
- Each gate's truth table is encrypted using random labels representing wire values (0 or 1)
- Lesson 258 — Garbled Circuits for Two-Party Computation
- Gates the deployment
- Blocks promotion to production if critical vulnerabilities are found
- Lesson 1401 — Dynamic Testing and DAST in Pipelines
- Gates the pipeline
- if critical issues are found
- Lesson 1399 — Dependency and SCA Scanning in Pipelines
- Gateway MAC address changes
- Your router's hardware address suddenly differs from normal
- Lesson 410 — Signs of Network Interception
- Gather required information
- to identify yourself or your organization
- Lesson 176 — Certificate Signing Requests (CSR)
- Gaussian mechanism
- uses noise from a normal distribution.
- Lesson 2916 — The Gaussian Mechanism and Advanced NoiseLesson 2917 — Sensitivity and Query Analysis
- GCM
- or **CCM** (from lessons 101-103) that verify integrity *before* attempting decryption.
- Lesson 113 — Defending Against Padding Oracle AttacksLesson 122 — Why Authentication Matters in EncryptionLesson 128 — AES-CCM and Other AEAD ModesLesson 132 — IV Requirements for Different Modes
- GCM (Galois/Counter Mode)
- is the performance champion.
- Lesson 105 — Comparing Authenticated Encryption Modes
- GCM and CTR-based modes
- don't require padding at all.
- Lesson 114 — Padding in Authenticated Encryption Modes
- GCP
- `http://metadata.
- Lesson 885 — Cloud Metadata Service AttacksLesson 1745 — Multi-Factor Authentication in Cloud IAM
- GCP Cloud Functions
- react to Pub/Sub messages from Security Command Center
- Lesson 1911 — Cloud IR Playbooks and Automation
- GCP Cloud Logging
- (formerly Stackdriver) ingests logs from GCE instances, GKE clusters, Cloud Functions, and VPC Flow Logs into centralized log buckets with configurable retention.
- Lesson 1869 — Cloud Logging Architecture and Service OverviewLesson 1880 — SIEM Data Sources in Cloud
- GCP Config Connector
- allows you to manage GCP resources through Kubernetes-style declarative configs.
- Lesson 2023 — Detecting Configuration Drift with Cloud-Native Tools
- GCP DLP API
- (Data Loss Prevention) provides inspection, classification, and de-identification capabilities across Cloud Storage, BigQuery, and Datastore.
- Lesson 1803 — Cloud-Native Data Classification Tools
- GCP Organization Policy Service
- can all trigger OPA evaluations.
- Lesson 1991 — Compliance as Code with Open Policy Agent
- GCP Private Service Connect
- Accesses Google services through internal IPs
- Lesson 1779 — VPN and Private Connectivity Encryption
- GDPR
- Demands data protection and user privacy on wireless networks
- Lesson 553 — Wireless Security Policies and ComplianceLesson 2007 — Compliance Benchmarks and MappingLesson 2617 — Framework Mapping and Harmonization
- GDPR (EU Data Protection)
- Lesson 1772 — Compliance and Encryption at Rest Requirements
- GDPR (EU)
- requires notification to data protection authorities within **72 hours** of becoming aware of a breach affecting personal data.
- Lesson 2429 — Legal and Regulatory Reporting Requirements
- GDPR's data protection principles
- , making Privacy-focused SOC 2 reports particularly valuable for organizations handling EU data.
- Lesson 2596 — Privacy Criterion and GDPR Alignment
- Generate
- new keys following your key generation procedures (lessons 302-304)
- Lesson 316 — Key Expiration and RenewalLesson 1346 — Zero-Downtime Rotation PatternsLesson 1442 — SSH Key Generation and Management
- Generate a keystream
- Using a secret key and sometimes an initialization vector (IV), the cipher produces a pseudo- random stream of bits
- Lesson 115 — Stream Cipher Fundamentals and XOR Operations
- Generate a random number
- (called `k`) — this must be unique for every signature
- Lesson 164 — ECDSA (Elliptic Curve Digital Signature Algorithm)
- Generate a random polynomial
- of degree `k-1` with your secret as the constant
- Lesson 263 — Shamir's Secret Sharing and Polynomial Interpolation
- Generate actionable improvements
- specific, measurable, assigned to owners with deadlines
- Lesson 2432 — Post-Incident Review and Lessons Learned
- Generate adversarial examples
- using attacks like FGSM or PGD against your current model
- Lesson 2847 — Adversarial Training
- Generate code signatures
- for all new binaries and scripts
- Lesson 1598 — Allowlisting in DevOps and CI/CD
- Generate evidence
- Maintain timestamped logs showing baselines, detected changes, and investigation results
- Lesson 1506 — FIM for Compliance Requirements
- Generate fake news
- with proper journalistic structure, fabricated quotes, and plausible details
- Lesson 2866 — Synthetic Text Generation and GPT-Based Misinformation
- Generate test cases
- – create combinations of users, roles, and resources
- Lesson 1026 — Authorization Testing Automation
- Generate unique per-device passwords
- (printed on device label)
- Lesson 2800 — Default Credentials and Weak Authentication
- Generate unique users
- for each person—never share credentials
- Lesson 1710 — IAM Users: Creation, Authentication, and Lifecycle
- Generate unpredictable tokens
- (random strings, UUIDs, or session-specific mappings)
- Lesson 843 — Indirect Object References
- Generate valid variants
- Create inputs that parse correctly but have unusual combinations—deeply nested structures, extreme values, boundary conditions
- Lesson 1390 — Structured Input Fuzzing
- Generates
- encryption keys using hardware random number generation
- Lesson 2710 — Secure Enclave and Hardware Security
- Generating provenance
- Your CI/CD creates cryptographically signed attestations documenting source commits, build commands, and dependencies used
- Lesson 1650 — Supply Chain Levels for Software Artifacts (SLSA)
- Generation
- Create a cryptographically random string (at least 128 bits of entropy) before redirecting to the authorization server
- Lesson 763 — State Parameter and CSRF ProtectionLesson 871 — Token Rotation and Lifecycle
- Generation-based fuzzing
- takes the opposite approach: it builds inputs from the ground up using formal rules that describe what valid data should look like.
- Lesson 1387 — Generation-Based Fuzzing
- Generative Adversarial Networks (GANs)
- power most deepfake systems.
- Lesson 2864 — Deepfakes: Generation Techniques and Detection Challenges
- Generative models
- Use techniques like GANs or variational autoencoders to create realistic examples
- Lesson 2909 — Synthetic Data Generation
- Generic API Key Pattern
- Lesson 1253 — Secret Patterns and Regular Expressions
- generic error messages
- to clients: "An error occurred" or "Invalid input.
- Lesson 1007 — GraphQL Error Handling and Information LeakageLesson 1958 — Dead Letter Queues and Error Handling
- Generic math
- `{{7*7}}`, `${7*7}`, `<%= 7*7 %>`
- Lesson 1249 — SSTI Detection and Exploitation Techniques
- Generic user-facing messages
- Return simple, uninformative messages to clients.
- Lesson 1156 — Validation Error Handling
- GenericAll permission
- on a user lets you reset their password.
- Lesson 2240 — BloodHound for Active Directory Attack Paths
- Geo-blocking
- lets you control access based on where requests originate geographically, while **IP reputation filtering** uses threat intelligence to identify and block known malicious sources.
- Lesson 1860 — Geo-Blocking and IP ReputationLesson 1866 — CDN Access Control and Token AuthenticationLesson 1867 — CDN WAF Integration and Edge Security
- Geographic anomalies
- Same credentials used from multiple countries simultaneously
- Lesson 1735 — Credential Theft and Token Security
- Geographic boundaries
- Single office, multiple sites, or global operations?
- Lesson 2601 — ISMS Scope Definition
- Geographic compliance
- Content must respect regional data laws across all edge locations
- Lesson 1862 — CDN Architecture and Threat Model
- Geographic diversity
- Proxies in different jurisdictions resist coordinated surveillance
- Lesson 2994 — Proxy Chains and SOCKS
- Geographic impossibility
- Session used from New York, then Tokyo 5 minutes later
- Lesson 737 — Session Monitoring and Anomaly Detection
- Geographic restrictions
- leverage MaxMind databases or cloud provider geolocation services to map IP addresses to countries or regions.
- Lesson 1860 — Geo-Blocking and IP Reputation
- Geographically distributed
- Prevent single-point-of-failure
- Lesson 1490 — Log Management for Compliance
- Geographically distributed backups
- Store redundant copies in multiple secure locations to prevent data loss from disasters
- Lesson 319 — Key Archival and Compliance
- GET /api/users/123/profile
- Change `123` to `124`, and you might see someone else's profile
- Lesson 817 — IDOR in REST APIs and GraphQL
- GHASH authentication
- Runs in parallel, creating an authentication tag using Galois field multiplication
- Lesson 101 — GCM Mode: Authenticated Encryption Standard
- Ghidra
- (NSA's free tool) automatically disassembles binaries and uses decompilers to generate C-like pseudocode, making analysis more intuitive.
- Lesson 2762 — Reverse Engineering Firmware Binaries
- GIF
- files start with `47 49 46 38` (ASCII: "GIF8")
- Lesson 955 — Magic Byte Verification and File Type Detection
- GIF + PHP
- A file starting with `GIF89a` (valid GIF header) followed by `<?
- Lesson 975 — Polyglot Files and Format Confusion
- Git repository
- to audit all dependencies at once.
- Lesson 1305 — Trivy for Container and Dependency Scanning
- GitGuardian
- don't just scan your current working directory—they traverse *every commit* in your repository's history, including:
- Lesson 1255 — Repository Scanning and History AnalysisLesson 3031 — Secret Detection in Pipelines
- GitHub Advisory Database
- Integrated directly into GitHub's ecosystem, it tracks vulnerabilities across multiple languages and automatically alerts repository owners when their dependencies are affected.
- Lesson 1262 — Vulnerability Databases and CVE Tracking
- GitHub repositories
- Read tool-specific documentation and issue trackers
- Lesson 2192 — Kali Documentation and Community Resources
- GitLeaks
- are specialized tools that scan container images (and git repositories) for secrets using pattern matching and entropy analysis:
- Lesson 1640 — Secrets and Sensitive Data in ImagesLesson 3031 — Secret Detection in Pipelines
- GLBA
- (Gramm-Leach-Bliley Act) requiring privacy notices and data security
- Lesson 1984 — Industry-Specific Cloud Compliance
- Global Passive Adversaries
- Nation-state actors with the ability to monitor large portions of internet traffic worldwide can perform correlation attacks at scale.
- Lesson 2988 — Tor Threat Model and Limitations
- Glue
- Modify ETL jobs to execute arbitrary code with Glue's IAM role
- Lesson 1757 — Service-Specific Escalation Vectors
- GMAC authentication
- A specialized MAC (Message Authentication Code) using Galois field mathematics to verify both the ciphertext *and* any additional data you want to protect (like headers or metadata)
- Lesson 125 — AES-GCM: Galois/Counter Mode
- GMER
- specializes in Windows rootkit detection through kernel-level scanning.
- Lesson 1564 — Rootkit Detection Tools and Frameworks
- Goal
- Pen testing = find vulnerabilities; Red teaming = test detection and response
- Lesson 2085 — Penetration Testing vs Red Teaming
- Good approach
- Using XML builder methods that escape automatically
- Lesson 618 — XML Injection Prevention
- Good example
- "Percentage of assets with vulnerability scan coverage" – measurable, reveals gaps, drives scanning improvements.
- Lesson 2526 — Designing Effective Security Metrics
- Good example (conceptual)
- Lesson 1210 — Fail Securely and Handle Errors Safely
- Google BigQuery
- let you query logs using familiar SQL syntax.
- Lesson 1882 — Cloud SIEM Query Languages
- Google Cloud Certificate Manager
- similarly provides automated provisioning and renewal, with DNS-based validation and integration across GCP services.
- Lesson 1774 — Certificate Management in Cloud Environments
- Google Cloud Logging
- uses a filter expression language
- Lesson 1876 — Log Query and Analysis Techniques
- Google Dorking
- (named after the word "dork" meaning a specialized search query) uses advanced search operators to filter results and discover exposed files, login pages, vulnerable systems, and accidentally published sensitive data—all from publicly indexed cont...
- Lesson 330 — Search Engine Reconnaissance and Google Dorking
- Google GCR/Artifact Registry
- Automatically scans with Container Analysis API; provides continuous monitoring
- Lesson 1636 — Registry-Integrated Scanning
- Google Workspace
- , the provider manages nearly everything—infrastructure, platform, application logic, and most security controls.
- Lesson 1679 — SaaS Security Limitations
- Google's DP Library
- provides production-ready implementations of the Laplace and Gaussian mechanisms you've studied.
- Lesson 2921 — Practical Differential Privacy Implementation
- GoPhish
- can generate these documents and orchestrate the delivery.
- Lesson 2250 — Malicious Office Document GenerationLesson 2261 — Phishing Infrastructure and Automation
- Goppa codes
- , a family of error-correcting codes.
- Lesson 272 — Code-Based Cryptography and Classic McEliece
- Governance mode
- allows specially-privileged users to bypass retention if absolutely necessary (useful for testing or exceptional circumstances).
- Lesson 1787 — Object Lock and Immutable Storage
- Government
- FedRAMP (covered earlier) plus agency-specific requirements
- Lesson 1984 — Industry-Specific Cloud Compliance
- Government Officials
- Impersonating auditors, inspectors, or law enforcement creates urgency and fear, making victims abandon normal verification procedures.
- Lesson 2265 — Authority and Impersonation Techniques
- GPEN (GIAC Penetration Tester)
- SANS Institute certification emphasizing methodology and technical depth.
- Lesson 2089 — Penetration Testing Career Paths
- Gpg4win
- (for Windows) includes GpgOL, which integrates with Outlook to provide compose-time encryption options and decrypt incoming messages.
- Lesson 2961 — Email Client Integration and Plugins
- Grace periods
- Define minimum overlap windows (e.
- Lesson 1348 — API Key and Certificate RotationLesson 1797 — Key Management for Database EncryptionLesson 2065 — Automated Security Gates in CI/CD
- Graceful degradation
- Use cached secrets temporarily during outages
- Lesson 1334 — Secret Store Access Patterns
- Graceful failure
- Implement retry logic when refresh fails
- Lesson 1731 — Session Duration and Token Lifecycle
- Graceful Fallback
- Many implementations offer password fallback for compatibility, which reintroduces all password vulnerabilities.
- Lesson 755 — Passwordless Security Trade-offs
- Graceful shutdown
- Signal pools to close connections cleanly during rotation
- Lesson 1347 — Database Credential Rotation
- Gradient analysis
- can reveal training samples (similar to model inversion attacks you've studied)
- Lesson 2843 — Federated Learning Privacy
- Gradient masking
- when a defense obscures gradients without actually making the model more robust, fooling gradient-based attackers but not truly defending against adaptive adversaries.
- Lesson 2853 — Evaluating Defense Effectiveness
- Gradual escalation
- Start small to avoid accidentally DoS'ing your own test environment.
- Lesson 1182 — Testing for ReDoS Vulnerabilities
- Gradual migration
- Re-encrypt stored data incrementally rather than all at once
- Lesson 315 — Key Rotation Strategies
- Gradual rollout
- Activate the key for a small percentage of operations first, monitoring for errors or performance issues
- Lesson 314 — Key Activation and InstallationLesson 1348 — API Key and Certificate Rotation
- Grafana
- excels at real-time metrics visualization with powerful alerting.
- Lesson 3043 — Dashboard Tools and Integration
- Grant per-function roles
- Don't reuse one "super role" across all functions.
- Lesson 1950 — Least Privilege for Serverless Functions
- Granting "AllUsers" or "AuthenticatedUsers"
- permissions through ACLs
- Lesson 1783 — Blocking Public Access and Bucket Misconfiguration
- Grants
- provide temporary, programmatic access
- Lesson 1769 — Encryption Key Policies and Access Control
- Granular access control
- Service endpoint policies and IAM permissions combine to enforce least privilege
- Lesson 1851 — Cross-Region and Cross-Account Private Connectivity
- granular control
- over exactly which origins can embed your page.
- Lesson 1136 — Content-Security-Policy frame-ancestors DirectiveLesson 1784 — Presigned URLs and Temporary Access Mechanisms
- Granular controls
- letting users choose different privacy levels for different contexts
- Lesson 2886 — Visibility, Transparency, and User-Centricity
- Granular Data Collection
- means choosing the appropriate level of specificity when gathering information.
- Lesson 2898 — Granular Data Collection
- Granular protection
- Encrypt only what needs protection, reducing performance overhead compared to full-database encryption.
- Lesson 1794 — Column-Level and Field-Level Encryption
- Granularity
- Some engines check the timeout between backtracking steps, not continuously
- Lesson 1180 — Regex Timeout and Resource LimitsLesson 2348 — Baseline Establishment and Anomaly Detection
- Graph databases
- (Neo4j): Data as connected nodes
- Lesson 594 — NoSQL Database Fundamentals and Attack Surface
- GraphQL Fuzzing
- Target query depth limits, field injection, type coercion, and circular references.
- Lesson 1391 — API and Protocol Fuzzing
- GraphQL mutations
- that rely on cookie authentication
- Lesson 854 — CSRF in Modern Applications and SPAs
- GraphQL-specific
- Introspection abuse, query depth attacks, batching exploits
- Lesson 3013 — API Security Testing Automation
- Gray-box
- sits between these extremes: perhaps the attacker knows the architecture but not the trained weights, or has partial information.
- Lesson 2809 — Threat Model for Adversarial Attacks
- Gray-box testing
- sits in the middle, providing partial information—perhaps user-level credentials or basic network diagrams, but not full administrative access or complete documentation.
- Lesson 2081 — Types of Penetration TestsLesson 2779 — Hardware Security Testing and Evaluation
- Group Addition
- Lesson 1760 — Group and User Management Escalation
- Group E2EE Messaging
- works using pairwise encryption (like the Signal Protocol's Sender Keys).
- Lesson 2950 — Message Layer Security (MLS) for Group Messaging
- Group Enumeration
- Mapping security groups reveals who has administrative rights, access to sensitive resources, and delegation permissions.
- Lesson 2123 — Domain Enumeration and Reconnaissance
- Group logically
- – Cluster hosts by subnet or function (DMZ, internal network, etc.
- Lesson 351 — Network Diagramming from Scan Results
- Group messages
- may leak sender metadata through delivery patterns
- Lesson 2954 — Sealed Sender and Sender Anonymity
- Group nesting
- reveals that your compromised user might be five groups away from Enterprise Admins.
- Lesson 2240 — BloodHound for Active Directory Attack Paths
- Group Policy (Windows)
- leverages Active Directory to push registry settings, security policies, and software configurations to domain-joined Windows machines.
- Lesson 1619 — Configuration Management Tools
- Group Policy Objects (GPOs)
- are the native Windows solution for centralized firewall management.
- Lesson 1590 — Host Firewall Management at Scale
- Group related packets
- (same source/destination IPs and ports)
- Lesson 377 — TCP Stream Analysis and Session Reconstruction
- groups
- that correspond to specific job functions or roles.
- Lesson 1428 — Group Management and Role SeparationLesson 1702 — Identity Types: Users, Groups, and Service Accounts
- Grype
- takes those inventories (or any SBOM) and matches them against vulnerability databases to identify security issues.
- Lesson 1306 — Grype and Syft for SBOM and Vulnerability ScanningLesson 1400 — Container and Image Scanning
- Guard conditions
- "If we reach line 50, we know the `if (user !
- Lesson 1361 — Control Flow Analysis and Path Sensitivity
- Guard relays
- Stable, high-bandwidth entry points (your client picks a few guards for months)
- Lesson 2983 — Tor Network ArchitectureLesson 2985 — Tor Relays: Guard, Middle, and Exit
- Guard/Entry relay
- Your entry point, sees your IP but not your destination
- Lesson 2983 — Tor Network Architecture
- GuardDuty (AWS)
- is an intelligent threat detection service that analyzes CloudTrail, VPC Flow Logs, and DNS logs.
- Lesson 1880 — SIEM Data Sources in Cloud
- GuardDuty findings
- flagging suspicious behavior from that same identity
- Lesson 1902 — Multi-Signal Correlation for Detection
- Guardrails
- prevent automated fixes from breaking production systems:
- Lesson 2009 — Automated Remediation Workflows
- Guest networks
- get isolated entirely from corporate resources
- Lesson 552 — Client Isolation and Network SegmentationLesson 2648 — Network Segmentation Fundamentals
- Guest operating system
- All patching, hardening, and configuration (remember those patch management lessons!
- Lesson 1677 — IaaS Security Responsibilities
- Guidelines
- are recommendations and best practices—not mandatory, but strongly suggested.
- Lesson 2488 — Policy Hierarchy: Policies, Standards, Procedures, Guidelines
- GUIDs
- (Globally Unique Identifiers) or **UUIDs** (Universally Unique Identifiers) like `a3f7c892-4b21- 4f9a-9e8d-1c2b3a4d5e6f`.
- Lesson 815 — GUID and UUID Vulnerabilities
H
- HackerOne
- is the largest platform by user base, hosting programs for companies like the U.
- Lesson 2480 — Bug Bounty Platform Ecosystem
- Hacktivists
- have moderate skills and are motivated by ideology or causes.
- Lesson 47 — Understanding Adversary Types and Skill LevelsLesson 50 — Motivations: Hacktivism and Ideological AttacksLesson 51 — Motivations: Disruption and Destructive AttacksLesson 2337 — Threat Actors and Attribution
- Hall of fame
- recognition (non-monetary but valuable)
- Lesson 2482 — Bounty Pricing and Reward Structures
- Handle the exceptions
- For applications without native update mechanisms, create your own deployment packages through your software distribution platform.
- Lesson 1606 — Third-Party Application Patching
- Handling Scan Duration
- Full DAST scans often exceed typical CI/CD timeouts.
- Lesson 1377 — Integrating DAST into CI/CD
- Handoff documentation
- Written logs in a shared system detailing current incident status, context, and next steps
- Lesson 2309 — 24/7 Operations and Shift Management
- Hands-full technique
- Carrying boxes or coffee to appear legitimate and helpless
- Lesson 2272 — Tailgating and Piggybacking Attacks
- Hands-On Practice
- Use real examples from your codebase.
- Lesson 83 — Developer Training on Threat Modeling
- Handshake Capture
- Force disconnection so the client automatically reconnects, capturing the 4-way handshake needed to crack WPA2-PSK passwords offline
- Lesson 527 — Deauthentication and Disassociation Attacks
- Handshake details
- Cipher suites, TLS version, SNI (Server Name Indication)
- Lesson 2413 — TLS Traffic Analysis
- Harbor
- Configure scanners (Trivy default) in project settings; define scan policies and webhooks
- Lesson 1636 — Registry-Integrated Scanning
- Hard gates
- Automatically block pipeline progression until resolved (critical/high vulnerabilities)
- Lesson 2065 — Automated Security Gates in CI/CD
- Hard multi-tenancy
- (separate clusters) is necessary when:
- Lesson 1976 — Multi-Tenancy and Cluster Isolation
- Hard to detect
- Overall model accuracy may drop only 1-2%, appearing normal
- Lesson 2819 — Label Flipping and Targeted Poisoning
- Hard-coded keys
- Never embed encryption keys in source code or resources
- Lesson 2735 — Mobile Cryptography Best Practices
- Hard-fail
- means: "If I can't check revocation status, reject the certificate.
- Lesson 196 — Revocation Checking Failures and Soft-Fail
- Hardcoded backdoor credentials
- hidden in firmware binaries
- Lesson 2765 — Firmware Backdoors and Persistent Threats
- Hardcoded secrets
- in memory operations
- Lesson 2729 — Native Code Analysis and ARM AssemblyLesson 3012 — Container and Image Scanning
- Harden Configuration Files
- Lesson 513 — VPN Client Security Hardening
- Harden this
- Set `--anonymous-auth=false` to block unauthenticated requests entirely.
- Lesson 1671 — Kubelet Security and Node Hardening
- Hardening
- means disabling or restricting dangerous features entirely.
- Lesson 1250 — Sandboxing and Template Engine Hardening
- Harder to audit
- Security reviewers must examine the entire codebase instead of focused modules
- Lesson 1212 — Separation of Concerns for Security Boundaries
- Hardware
- Discarded computers, phones, printers (with cached documents), and hard drives without proper sanitization.
- Lesson 2275 — Dumpster Diving and Waste Exploitation
- Hardware acceleration
- means the CPU includes special built-in circuits designed specifically to perform AES operations.
- Lesson 94 — Hardware Acceleration and AES-NILesson 106 — Mode Selection for Different ScenariosLesson 150 — RSA Performance and Hybrid CryptosystemsLesson 2794 — Elliptic Curve Cryptography for IoT
- Hardware acceleration available
- Modern CPUs with AES-NI instructions make AES extremely fast
- Lesson 121 — Stream Ciphers vs Block Ciphers: When to Use Each
- Hardware cloning
- occurs when attackers extract the firmware, cryptographic keys, or unique identifiers from a legitimate device and replicate them in counterfeit hardware.
- Lesson 2777 — Hardware Cloning and Counterfeit Prevention
- Hardware Enclave
- (like ARM TrustZone or Intel SGX) creates isolated execution environments within the main processor itself.
- Lesson 2778 — Secure Element and Hardware Enclaves
- Hardware is limited
- Embedded devices benefit from stream ciphers' simpler operations and lower memory requirements
- Lesson 121 — Stream Ciphers vs Block Ciphers: When to Use Each
- Hardware protection
- Keys stored in HSMs when needed
- Lesson 1797 — Key Management for Database Encryption
- hardware root of trust
- (often in ROM that cannot be modified).
- Lesson 2770 — Secure Boot and Chain of TrustLesson 2796 — Device Identity and Hardware Root of Trust
- Hardware security keys
- using public-key cryptography
- Lesson 1697 — Strong Authentication for Cloud Identity
- Hardware Security Modules (HSMs)
- come in.
- Lesson 306 — Hardware Security Modules (HSMs)Lesson 2796 — Device Identity and Hardware Root of Trust
- Hardware supply chain
- Manufacturing facilities, component suppliers, firmware providers
- Lesson 2540 — Fourth-Party and Supply Chain Risk
- Hardware support
- SHA-256 has CPU acceleration on modern processors
- Lesson 216 — Hash Function Selection in Modern Systems
- Harmonization
- goes beyond mapping: you design unified controls that satisfy all applicable frameworks simultaneously.
- Lesson 2617 — Framework Mapping and Harmonization
- hash
- or **digest**.
- Lesson 198 — Hash Function FundamentalsLesson 660 — style-src and CSS Injection PreventionLesson 661 — Nonces and Hashes for Inline ContentLesson 2383 — Disk Imaging and Forensic Copies
- Hash before and after
- imaging (cryptographic proof of integrity)
- Lesson 2398 — Disk Forensics Fundamentals and Chain of Custody
- Hash Chains
- create a tamper-evident seal by linking each log entry to the previous one.
- Lesson 1489 — Log Verification and Tamper Detection
- hash functions
- (like the SHA-2 and SHA-3 families you've learned) as their cryptographic foundation.
- Lesson 246 — zk-STARKs and Transparent ProofsLesson 2225 — Password Cracking Fundamentals
- Hash immediately
- Generate cryptographic hashes (SHA-256) of each log file to prove it hasn't been altered
- Lesson 2385 — Log Collection and Preservation
- Hash stored separately
- This hash is saved in a lock file, repository metadata, or signature file
- Lesson 1293 — Package Integrity and Checksums
- Hash the document
- – Generate a cryptographic hash of the complete file content
- Lesson 231 — Document Signing and PDF Signatures
- Hash the message
- using a cryptographic hash function (SHA-256, for example)
- Lesson 147 — RSA Signature Generation and VerificationLesson 148 — PSS: Probabilistic Signature Scheme
- Hash the model
- Generate a cryptographic hash (SHA-256) of the serialized model file
- Lesson 2874 — Model Artifact Security and Signing
- Hash values
- Cryptographic checksums verify component integrity
- Lesson 1279 — SBOM Contents and Metadata QualityLesson 2383 — Disk Imaging and Forensic Copies
- Hash-based detection
- calculates a cryptographic fingerprint (typically MD5, SHA-1, or SHA-256) of the entire file.
- Lesson 1565 — Signature-Based Detection Fundamentals
- Hash-based mixing
- It uses cryptographic hash functions to thoroughly scramble the message and randomness together
- Lesson 146 — OAEP: Optimal Asymmetric Encryption Padding
- Hash-based protocols
- Using commutative encryption or oblivious pseudorandom functions
- Lesson 2925 — Private Set Intersection
- Hash-based signatures
- Use only hash functions (which you've studied extensively).
- Lesson 268 — Post-Quantum Cryptography Fundamentals
- Hashcat
- and **John the Ripper** support extensive rule engines.
- Lesson 2228 — Rule-Based AttacksLesson 2234 — Cloud-Based and Distributed Cracking
- hashes
- come in—they act like VIP passes for specific inline content.
- Lesson 661 — Nonces and Hashes for Inline ContentLesson 2336 — Indicators of Compromise (IOCs) and Their Limitations
- Hashing
- |
- Lesson 206 — Non-Reversibility and One-Way PropertyLesson 477 — Authentication Header (AH) Protocol
- Hashing and Bloom Filters
- Instead of sharing plaintext identifiers, parties hash names, birthdates, or addresses into fixed- length Bloom filter bit arrays.
- Lesson 2930 — Privacy-Preserving Record Linkage
- Hashtopolis
- is a popular open-source framework that acts as a server/agent system: you install agents on multiple cracking nodes (your laptop, a server, cloud instances), and the server distributes chunks of the keyspace to each agent.
- Lesson 2234 — Cloud-Based and Distributed Cracking
- Header compression (HPACK)
- While efficient, improper implementation can leak information or enable injection attacks
- Lesson 1097 — HTTP/2 Protocol Architecture and Security Model
- Header Handling Changes
- HPACK compression (HTTP/2) and QPACK (HTTP/3) change how headers are processed.
- Lesson 1104 — Migrating Safely to HTTP/2 and HTTP/3
- Header insertion
- The hash is placed in the AH header along with metadata
- Lesson 477 — Authentication Header (AH) Protocol
- Header Manipulation
- Rotating User-Agent strings, session tokens, or API keys to appear as different clients.
- Lesson 1017 — Rate Limiting Bypass Prevention and MonitoringLesson 1865 — CDN Cache Security and Cache Poisoning
- Header name conflicts
- HTTP/2 allows header names that are invalid in HTTP/1.
- Lesson 1112 — HTTP/2 Downgrade and Smuggling
- Header spoofing
- In rare scenarios, headers might be manipulated
- Lesson 869 — Origin and Referer Validation
- Header stripping
- Proxies and firewalls may remove these headers
- Lesson 811 — Referer and Origin-Based Authorization Flaws
- Header-based transmission
- is the most secure approach:
- Lesson 1009 — API Key Authentication: Design and Security
- Header-only validation
- Server checks `Content-Type: image/jpeg` and allows upload
- Lesson 956 — Content-Type Header Validation and Mismatches
- Headers
- `X-User-Role: viewer` changed to `X-User-Role: editor`
- Lesson 809 — Parameter Tampering for Authorization BypassLesson 2406 — Email and Communication Forensics
- Headers are client-controlled
- Attackers can easily modify, remove, or spoof both `Referer` and `Origin` headers using browser tools, proxy software, or custom scripts.
- Lesson 811 — Referer and Origin-Based Authorization Flaws
- Health attestation
- Cryptographic proof of device state (e.
- Lesson 2678 — Device Trust and Endpoint Security
- Health check endpoints
- on applications to verify connectivity
- Lesson 1349 — Rotation Testing and Rollback
- Health checks
- Applications report which secret version they're using
- Lesson 1346 — Zero-Downtime Rotation PatternsLesson 1347 — Database Credential Rotation
- Health information
- (medical records, genetic data, biometric data for identification)
- Lesson 2552 — Personal Data and Special Categories
- Help Desk Impersonation
- "I'm from IT resetting passwords after the breach—need to verify your current one"
- Lesson 2263 — Pretexting Fundamentals and Attack Scenarios
- Here's how it works
- Lesson 636 — Self-XSS and Social EngineeringLesson 642 — Cross-Site Request Forgery via XSS
- Here's the problem
- Attackers can jump directly to later steps or rearrange the order, bypassing security checks entirely.
- Lesson 808 — Multi-Step Process Authorization Failures
- Hibernation File (hiberfil.sys)
- When Windows hibernates, it writes compressed memory to disk.
- Lesson 2391 — Memory Image Formats and Validation
- Hibernation files
- May contain keys from suspended encrypted volumes
- Lesson 2407 — Anti-Forensics Detection and Encrypted Volumes
- HID attacks
- The USB pretends to be a keyboard, typing malicious commands faster than humans can react (Rubber Ducky-style attacks)
- Lesson 2251 — QR Code and USB Drop Attack Tools
- Hidden endpoints
- Administrative functions exist at predictable URLs like `/api/admin/deleteUser` but lack proper checks.
- Lesson 1031 — API5:2023 - Broken Function Level Authorization
- Hidden Fields
- An e-commerce site stores `<input type="hidden" name="price" value="99.
- Lesson 912 — State Manipulation Fundamentals
- Hidden Fields and Cookies
- Lesson 633 — XSS Attack Vectors and Injection Points
- Hidden form fields
- `<input type="hidden" name="account_id" value="9876">` — easily tampered
- Lesson 813 — IDOR Fundamentals and Common PatternsLesson 816 — Parameter Tampering in IDOR AttacksLesson 819 — Testing for IDOR VulnerabilitiesLesson 826 — Parameter Tampering for Privilege EscalationLesson 911 — Understanding Application State and WorkflowLesson 912 — State Manipulation FundamentalsLesson 923 — Payment Amount Tampering
- Hidden interactions
- between components that create unexpected vulnerabilities
- Lesson 2632 — Economy of Mechanism (Keep It Simple)
- Hidden network services
- that activate under specific conditions
- Lesson 2765 — Firmware Backdoors and Persistent Threats
- Hidden processes
- Process structures present in memory but unlisted by Task Manager
- Lesson 1559 — Memory Analysis and Volatile Forensics
- Hidden secrets persist
- If you `COPY` a password file in layer 3 and delete it in layer 4, it still exists in layer 3—anyone can extract it.
- Lesson 1632 — Container Image Anatomy and Layers
- Hidden transmitters
- Rogue devices operating outside normal Wi-Fi channels
- Lesson 551 — RF Spectrum Monitoring
- Hide malicious payloads
- by spreading them across fragments
- Lesson 369 — Fragmentation and Packet Manipulation
- Hide network traffic
- by filtering at the network driver level
- Lesson 1547 — Kernel-Mode Rootkits Fundamentals
- Hiding data exfiltration
- Embedding invisible characters in seemingly innocent text fields to encode secrets.
- Lesson 1172 — Zero-Width and Invisible Characters
- High
- Common attack, easy to execute, known tools available
- Lesson 45 — Threat Prioritization BasicsLesson 1273 — SCA Tool Integration and ConfigurationLesson 1458 — MAC in Windows: Mandatory Integrity ControlLesson 2344 — Alert Triage Fundamentals and WorkflowLesson 2482 — Bounty Pricing and Reward StructuresLesson 2500 — Risk Calculation and Risk MatricesLesson 2548 — Audit Findings and Risk RatingLesson 2613 — FedRAMP Authorization Framework (+1 more)
- High (7.0–8.9)
- Severe impact, relatively easy exploitation
- Lesson 2446 — CVSS Score Interpretation and Limitations
- High 403/401 error rates
- (possible brute-force or scanning)
- Lesson 1868 — CDN Monitoring and Incident Response
- High availability (HA)
- solves this by deploying multiple firewalls that work as a coordinated team.
- Lesson 425 — High Availability and Clustering
- High Entropy
- Enough randomness that guessing is computationally infeasible.
- Lesson 704 — Session Identifiers: Generation and Properties
- High impact
- Direct access to sensitive data or resources
- Lesson 1027 — API1:2023 - Broken Object Level Authorization (BOLA)
- High query volumes
- to unusual or newly-registered domains
- Lesson 379 — DNS Traffic Analysis and Query Patterns
- High reliability
- methods (like modifying startup services or boot processes) ensure the malware always executes, but they create obvious forensic artifacts that detection tools easily spot.
- Lesson 1536 — Persistence Fundamentals and Attacker Goals
- High risk
- (impossible travel, anonymous IP): Block access or require step-up authentication plus admin approval
- Lesson 1747 — Conditional Access and Context-Aware MFALesson 1808 — DLP Monitoring and Incident Response
- High stealth
- methods (like memory-only persistence or rarely-triggered scheduled tasks) are harder to detect but may fail unpredictably, potentially losing access.
- Lesson 1536 — Persistence Fundamentals and Attacker Goals
- High-confidence, low-risk candidates
- Lesson 3044 — Automated Remediation Fundamentals
- High-Entropy Strings (likely secrets)
- Lesson 1253 — Secret Patterns and Regular Expressions
- High-frequency scanning
- Rapid-fire requests to sequential IPs suggest enumeration attacks.
- Lesson 900 — Monitoring and Detection of SSRF Attempts
- High-level metrics
- should answer "what's happening right now?
- Lesson 2321 — Dashboards and Visualization
- High-risk changes
- Full security review, manual testing, architecture discussion
- Lesson 2062 — Balancing Security and Velocity
- High-Risk Code Areas
- Lesson 2038 — Pre-Review Preparation and Context Gathering
- High-risk secrets
- (root database credentials, production admin accounts) might rotate daily or weekly
- Lesson 1344 — Rotation Strategies and Frequencies
- High-risk vendors
- Handle regulated data or have privileged network access (payment processors, HR systems)
- Lesson 2534 — Third-Party Risk Fundamentals
- High-security systems
- (banking, admin panels): 5-15 minute idle timeout, 1-2 hour absolute timeout
- Lesson 733 — Session Timeout Configurations
- High/P2
- Confirmed malware on critical systems, targeted phishing campaign
- Lesson 2362 — Incident Severity and Priority Classification
- Higher accuracy
- Multiple weak signals combine into strong evidence
- Lesson 1902 — Multi-Signal Correlation for Detection
- Higher throughput
- – Dedicated circuits from 1 Gbps to 100 Gbps
- Lesson 1841 — Direct Connect and Dedicated Connectivity
- HIPAA
- Mandates access controls and audit trails for healthcare
- Lesson 553 — Wireless Security Policies and ComplianceLesson 1490 — Log Management for ComplianceLesson 1506 — FIM for Compliance RequirementsLesson 1984 — Industry-Specific Cloud ComplianceLesson 2004 — Core CSPM CapabilitiesLesson 2007 — Compliance Benchmarks and MappingLesson 2429 — Legal and Regulatory Reporting RequirementsLesson 2617 — Framework Mapping and Harmonization
- HIPAA (Healthcare)
- Lesson 1772 — Compliance and Encryption at Rest Requirements
- HIPAA § 164.312(a)(2)(iv)
- "Database missing encryption at rest"
- Lesson 3007 — IaC Compliance Frameworks and Benchmarks
- Historical data
- (old certificates show infrastructure changes)
- Lesson 332 — Certificate Transparency Logs and SSL/TLS Discovery
- Historical DNS Databases
- Lesson 328 — DNS Enumeration Without Direct Queries
- Historical scanning
- Audit existing repositories for past leaks
- Lesson 3031 — Secret Detection in Pipelines
- HITECH Act
- extending HIPAA to cloud business associates
- Lesson 1984 — Industry-Specific Cloud Compliance
- HITECH Act (2009)
- dramatically expanded accountability by making business associates **directly liable** for HIPAA violations — not just the covered entity.
- Lesson 2587 — Business Associate Agreements and Liability
- HKDF
- (HMAC-based Key Derivation Function) serves a different purpose: deriving multiple keys from one shared secret, or "stretching" existing key material.
- Lesson 139 — Modern KDFs: scrypt, Argon2, and HKDF
- HMAC
- (Hash-based Message Authentication Code) uses a construction like `hash(key ⊕ opad || hash(key ⊕ ipad || message))`.
- Lesson 218 — HMAC vs Plain Hashing: Length Extension AttacksLesson 785 — JWT Signature Algorithms
- HMAC-SHA1
- Deprecated, avoid for new deployments
- Lesson 481 — IPsec Cryptographic Algorithms and Cipher SuitesLesson 740 — TOTP and Time-Based One- Time Passwords
- HMAC-SHA512
- Extra security margin, slightly slower
- Lesson 481 — IPsec Cryptographic Algorithms and Cipher Suites
- Homoglyphs
- Using lookalike characters from different alphabets (Cyrillic 'а' vs Latin 'a')
- Lesson 1287 — Typosquatting Attack Techniques
- Homograph Attacks
- exploit similar-looking characters from different alphabets.
- Lesson 2258 — Link Manipulation and URL Obfuscation
- homomorphic encryption
- (which you just learned about), where one party performs encrypted computations, MPC distributes the computation across multiple participants.
- Lesson 255 — Introduction to Secure Multi-Party Computation (MPC)Lesson 2844 — Secure Aggregation and Privacy AmplificationLesson 2922 — Overview of Privacy-Preserving TechnologiesLesson 2925 — Private Set IntersectionLesson 2927 — Trusted Execution EnvironmentsLesson 2928 — Private Information Retrieval
- Homomorphic operations
- computing on encrypted values without decryption
- Lesson 2923 — Secure Multi-Party Computation for Privacy
- Hook system call tables
- to intercept and modify all system operations
- Lesson 1547 — Kernel-Mode Rootkits Fundamentals
- hop limit
- to `1`, which prevents forwarded requests from containers or proxies.
- Lesson 1927 — Instance Metadata Service (IMDS) SecurityLesson 1937 — Hop Limit and Network-Level IMDS Protection
- Hopper
- is a disassembler for iOS binaries (Mach-O files), converting ARM/ARM64 machine code into assembly instructions and attempting to reconstruct higher-level pseudocode.
- Lesson 2724 — Decompiling and Disassembling Mobile Apps
- horizontal escalation
- means staying at your privilege level but accessing resources belonging to *other users at the same level*.
- Lesson 825 — Horizontal Privilege Escalation PatternsLesson 1022 — Horizontal and Vertical Privilege Escalation
- Horizontal privilege escalation
- One user accesses another user's data (viewing someone else's medical records or bank statements).
- Lesson 803 — Broken Access Control OverviewLesson 804 — Horizontal vs Vertical Privilege EscalationLesson 822 — Understanding Privilege Escalation ConceptsLesson 1022 — Horizontal and Vertical Privilege Escalation
- Host
- (domain): `example.
- Lesson 856 — Origin Definition and ComparisonLesson 1056 — Origin Components: Scheme, Host, and PortLesson 1144 — Preventing Open Redirects
- Host Header Validation
- Lesson 1132 — Defending Against Host Header and DNS Attacks
- Host level
- (endpoint protection, hardening)
- Lesson 2654 — Defense-in-Depth: Core Concept and Philosophy
- Host-based artifacts
- encompass default service names, recognizable process injection patterns, framework-specific registry keys, and characteristic PowerShell command structures.
- Lesson 2224 — Framework OPSEC and Detection
- Host-based authentication
- trusts entire machines
- Lesson 1440 — SSH Protocol Fundamentals and Security Model
- Host-based firewalls
- Control network communication at the endpoint
- Lesson 1573 — Antivirus Limitations and Complementary ControlsLesson 2679 — Zero Trust Network Segmentation
- Host-based security controls
- EDR agents, host firewalls, allowlisting
- Lesson 1677 — IaaS Security Responsibilities
- Hot storage
- Recent logs (7-30 days) kept uncompressed for quick access
- Lesson 1484 — Log Rotation and Retention PoliciesLesson 1883 — Scalability and Cost OptimizationLesson 2315 — SIEM Architecture: Collectors, Aggregators, and StorageLesson 2409 — Packet Capture for Forensics
- Hotfix Development Process
- Create a streamlined workflow separate from normal development.
- Lesson 2069 — Vulnerability Response and Hotfix Process
- HOTP (HMAC-based One-Time Password)
- is an authentication mechanism that generates unique passwords based on a **counter value** rather than the current time.
- Lesson 741 — HOTP and Counter-Based OTP
- HOTP codes don't expire
- based on time—they remain valid until used
- Lesson 741 — HOTP and Counter-Based OTP
- how
- you combine encryption and MAC operations is critical—get it wrong, and attackers can exploit the weakness.
- Lesson 123 — Encrypt-then-MAC ConstructionLesson 168 — ECC Implementation VulnerabilitiesLesson 617 — XML Injection Attack VectorsLesson 2031 — Threat Modeling in Design PhaseLesson 2090 — Defining Rules of Engagement (RoE)Lesson 2092 — Legal Agreements and AuthorizationLesson 2334 — Threat Intelligence Fundamentals and the Intelligence LifecycleLesson 2388 — Evidence Documentation and Hash Verification (+3 more)
- How it works
- Routes IP packets between networks; VPN clients get their own subnet
- Lesson 489 — OpenVPN Network Topologies: Routed vs BridgedLesson 1121 — Cache Poisoning Detection Techniques
- HTML body/attributes
- Needs `< > & " '` encoded as entities
- Lesson 1246 — Context-Aware Output Encoding
- HTML Context
- Convert `<` to `<`, `>` to `>`, `"` to `"`, etc.
- Lesson 668 — Output Encoding and Escaping FundamentalsLesson 672 — Template Auto-EscapingLesson 1220 — Context-Specific Output Encoding
- HTML Entities
- Instead of `<script>`, use `<script>` or numeric forms like `<script>`.
- Lesson 649 — Character Encoding Bypasses
- HTML entity encoding
- itself comes in two flavors depending on where your data appears:
- Lesson 1221 — HTML Entity Encoding and Attribute Context
- HTML Rendering
- Frameworks provide template engines with auto-escaping (you learned about this earlier).
- Lesson 1235 — Framework-Specific Safe APIs
- HTML sanitization libraries
- rather than writing your own:
- Lesson 669 — Input Validation and Sanitization
- HTTP Headers
- Different servers include different default headers.
- Lesson 362 — Application-Layer FingerprintingLesson 633 — XSS Attack Vectors and Injection PointsLesson 706 — Session Transmission: Cookies vs URL Parameters vs HeadersLesson 816 — Parameter Tampering in IDOR Attacks
- HTTP history
- and **site map**, giving you unified visibility across your testing session.
- Lesson 2205 — Burp Suite Architecture and Components
- HTTP method
- used by the vulnerable endpoint drastically changes how simple the attack is to execute.
- Lesson 848 — GET vs POST CSRF Attacks
- HTTP method confusion
- A `GET /api/users` might be public, but `DELETE /api/users/{id}` exists without verifying the caller is an admin.
- Lesson 1031 — API5:2023 - Broken Function Level Authorization
- HTTP Method Tampering
- occurs when an attacker changes the HTTP verb to bypass authorization checks or discover hidden functionality.
- Lesson 996 — HTTP Method Tampering and Verb Confusion
- HTTP POST Binding
- The assertion is sent via an auto-submitted HTML form in the response body.
- Lesson 777 — SAML Authentication Flow
- HTTP Redirect Binding
- The assertion is encoded in the URL query string (Base64 + URL-encoded).
- Lesson 777 — SAML Authentication Flow
- HTTP Requests
- Force the server to make a web request to your controlled server:
- Lesson 606 — Out-of-Band Data ExfiltrationLesson 622 — Blind XXE Techniques
- HTTP-only cookies
- Browser automatically manages sessions securely
- Lesson 1092 — Backend for Frontend (BFF) Pattern
- HttpOnly
- flag exists—it prevents JavaScript from accessing cookies, blocking this attack vector entirely.
- Lesson 729 — Cookie Theft and Session HijackingLesson 1074 — Cookie Security Attributes Deep Dive
- httpOnly cookies
- , and this decision has major security implications.
- Lesson 794 — JWT Storage and XSS RisksLesson 1073 — localStorage and sessionStorage SecurityLesson 1090 — Token Storage in SPAs: Security Trade-offs
- HttpOnly Flag
- When set, this flag prevents JavaScript from accessing the cookie through `document.
- Lesson 670 — HttpOnly and Secure Cookie Flags
- HTTPS
- (except `localhost` for development).
- Lesson 1081 — Service Worker Security Model and OriginsLesson 2975 — Metadata Exposure in Common Protocols
- HTTPS by default
- Modern frameworks redirect HTTP to HTTPS automatically rather than requiring manual configuration
- Lesson 1217 — Secure Defaults and Opt-In Security
- HTTPS Certificates
- Many attackers now use Let's Encrypt to add that green padlock, exploiting users' trust in "secure" connections.
- Lesson 2256 — Credential Harvesting Pages
- HTTPS downgrades
- Websites you normally access via secure connections suddenly use HTTP (SSL stripping)
- Lesson 410 — Signs of Network Interception
- HTTPS enforcement
- means redirecting all HTTP traffic to HTTPS automatically and setting HSTS headers to prevent protocol downgrade attacks.
- Lesson 1864 — CDN SSL/TLS Configuration
- HTTPS-Only Policies
- prevent downgrade attacks.
- Lesson 1777 — API Gateway and Application-Level Encryption
- Hub-and-Spoke
- One central peer (the hub) connects to multiple remote peers (spokes).
- Lesson 495 — WireGuard Network Architecture and RoutingLesson 1817 — VPC Design Patterns for Security
- Hub-and-Spoke Pattern
- Lesson 1817 — VPC Design Patterns for Security
- Human approval
- Security team or ML lead reviews and approves the deployment
- Lesson 2878 — ML Pipeline Security and GovernanceLesson 3006 — IaC Pipeline Security and CI/CD Integration
- Human factors shift
- Employees come and go, passwords get reused, and complacency creeps in.
- Lesson 31 — Security as Continuous Improvement, Not a Final State
- Human Review Rights
- Lesson 2938 — Automated Decision-Making and Profiling Rights
- Human-in-the-loop validation
- Sample and manually inspect suspicious training data
- Lesson 2826 — Defense Strategies Against Poisoning
- Hunt
- Query Zeek logs for suspicious patterns (unusual ports, strange DNS, IOC matches)
- Lesson 2416 — Network Forensics Tools and Workflows
- Hybrid approaches
- Combining words with common patterns (years, special characters)
- Lesson 2227 — Dictionary Attacks with Wordlists
- Hybrid apps
- mixing cookie sessions with token-based APIs
- Lesson 854 — CSRF in Modern Applications and SPAs
- Hybrid considerations
- Lesson 1683 — Service Model Selection for Security Requirements
- Hybrid modes
- (6 and 7) combine wordlists with masks—for example, appending numbers to dictionary words.
- Lesson 2230 — Hashcat Deep Dive
- Hybrid storage
- File servers sync with cloud storage backends over encrypted channels.
- Lesson 472 — VPN Use Case: Secure Cloud ConnectivityLesson 692 — Upgrading Legacy Password Storage Systems
- Hypervisor attacks
- target the virtualization layer itself.
- Lesson 1923 — Cloud VM Threat Model and Attack Surface
I
- I/O limits
- control disk read/write throughput and IOPS, preventing one container from saturating storage subsystems.
- Lesson 1657 — Resource Limits and Isolation
- I2P (Invisible Internet Project)
- creates an overlay network where participants route traffic through each other.
- Lesson 2997 — Decentralized and P2P Circumvention
- IaaS
- You secure the OS, applications, network configuration, and data.
- Lesson 1676 — Understanding IaaS, PaaS, and SaaS Models
- IaC pipeline security
- means embedding security controls—scanning tools, policy enforcement, and human approvals— directly into your CI/CD automation, treating infrastructure deployment with the same rigor as application code releases.
- Lesson 3006 — IaC Pipeline Security and CI/CD Integration
- IaC Scanning
- checks templates for:
- Lesson 2049 — Container and IaC ScanningLesson 3026 — Pipeline Security Scanning Overview
- IaC state reconciliation
- Terraform continuously applies desired state, Kubernetes controllers reconcile resource definitions
- Lesson 3046 — Auto-Remediation for Infrastructure Drift
- IAM database authentication
- where supported (temporary tokens instead of passwords)
- Lesson 1778 — Database Connection Encryption
- IAM infrastructure availability
- keeping authentication systems online and resilient
- Lesson 1690 — Identity and Access Management Boundaries
- IAM Integration
- Access control works through standard GCP IAM roles like `roles/secretmanager.
- Lesson 1330 — Google Cloud Secret Manager
- IAM key rotation
- Detect exposed credentials → revoke keys → notify user → force password reset
- Lesson 1911 — Cloud IR Playbooks and Automation
- IAM layer
- Use minimal instance role permissions
- Lesson 1939 — IMDS Security Best Practices and Monitoring
- IAM policies
- are checked for additional permissions
- Lesson 1769 — Encryption Key Policies and Access Control
- IAM Policy Changes
- Track modifications to roles, permission boundaries, trust relationships, and attached policies.
- Lesson 2026 — Drift Detection for Security Policies and Permissions
- IAM roles
- to grant services temporary security credentials automatically.
- Lesson 1723 — AWS IAM Roles for ServicesLesson 1738 — AssumeRole and Trust PoliciesLesson 1926 — IAM Roles and Instance Profiles
- IAST
- combines both approaches by instrumenting the application during testing.
- Lesson 1379 — IAST vs SAST vs DAST Trade-offsLesson 1384 — Combining IAST with Other Testing Approaches
- IAT Hooking
- happens when malware rewrites entries in the caller's import table to point to malicious code instead of the legitimate function.
- Lesson 1551 — Import Address Table (IAT) and Export Address Table Hooking
- ICMP Echo Requests (Ping)
- Lesson 346 — Host Discovery Techniques
- ICMP port unreachable
- message (the OS tells you "nothing is listening here")
- Lesson 341 — UDP Scanning Techniques
- ICMP Responses
- Error message formatting and even whether to respond at all varies
- Lesson 359 — TCP/IP Stack FingerprintingLesson 363 — Passive OS Fingerprinting
- ID Token
- A signed JWT containing user identity claims (name, email, subject ID)
- Lesson 769 — OpenID Connect Overview and Relationship to OAuth 2.0Lesson 770 — ID Tokens and JWT Structure in OIDCLesson 772 — UserInfo Endpoint and Claims Retrieval
- IDA Pro
- is the industry-standard commercial disassembler with sophisticated analysis features, plugin ecosystems, and excellent ARM support for embedded systems.
- Lesson 2762 — Reverse Engineering Firmware Binaries
- IDE Integration
- brings SAST directly into your editor.
- Lesson 1365 — Integrating SAST into Development Workflow
- IDE security plugins
- provide real-time feedback as you type.
- Lesson 1396 — Pre-commit and IDE Security Checks
- Idempotency
- Designing operations so repeating them multiple times produces the same result as doing them once
- Lesson 910 — Idempotency and State Machine Design
- Idempotency Controls
- Ensure operations can be safely repeated without unintended side effects.
- Lesson 919 — Defensive Workflow State ManagementLesson 927 — Preventing Payment Logic Vulnerabilities
- Identical nonces
- in encryption operations (breaking security completely)
- Lesson 292 — Randomness in Virtual Environments
- Identifiability
- Determining someone's identity from supposedly anonymous data (e.
- Lesson 70 — LINDDUN for Privacy Threat Modeling
- Identification
- is establishing *which* identity you're claiming (stating your name).
- Lesson 1206 — Authentication vs Identification: Terminology Changes
- Identification failures
- username enumeration, account discovery, predictable account IDs, user impersonation
- Lesson 1206 — Authentication vs Identification: Terminology Changes
- Identified Threats
- Lesson 46 — Documenting Threat Models
- Identifies all dependencies
- (direct and transitive)
- Lesson 1399 — Dependency and SCA Scanning in Pipelines
- Identifies components
- in your target (OS packages, language libraries, dependencies)
- Lesson 1305 — Trivy for Container and Dependency Scanning
- Identifies target samples
- Choose what they want the model to misclassify (e.
- Lesson 2819 — Label Flipping and Targeted Poisoning
- Identify
- Lesson 21 — Security Frameworks: NIST Cybersecurity FrameworkLesson 37 — What is Threat Modeling?Lesson 1407 — Disabling Unnecessary Services and DaemonsLesson 2402 — File Carving and Deleted File RecoveryLesson 2610 — NIST Cybersecurity Framework (CSF)
- Identify all entry points
- (login pages, APIs, file uploads, network ports)
- Lesson 73 — Attack Surface Analysis
- Identify check-then-use patterns
- Look for workflows where the app validates something (balance, inventory, permissions) then performs an action moments later
- Lesson 939 — Time-of-Check to Time-of-Use Testing
- Identify coverage gaps
- where you must implement additional controls
- Lesson 1985 — Cloud Compliance Inheritance and Mapping
- Identify critical assets
- – What data or services absolutely must be protected?
- Lesson 77 — Threat Modeling in Requirements Phase
- Identify emerging threats
- that weren't apparent in design
- Lesson 79 — Threat Modeling During Development
- Identify entry points
- (forms, APIs, file uploads)
- Lesson 1149 — Trust Boundaries and Data FlowLesson 2762 — Reverse Engineering Firmware Binaries
- Identify exploitable vulnerabilities
- that automated tools miss
- Lesson 2080 — What is Penetration Testing?
- Identify gaps
- between where you are and where you need to be
- Lesson 34 — Security Maturity Models and AssessmentLesson 2356 — Detection Coverage Measurement
- Identify infrastructure changes
- DNS records, server headers, and SSL certificates change over time, mapping their migration path.
- Lesson 335 — Wayback Machine and Historical Website Analysis
- Identify legitimate senders
- Discover which third-party services (marketing platforms, ticketing systems) send on your behalf
- Lesson 2303 — DMARC Reporting and Analysis
- Identify nodes
- – Each discovered host becomes a shape (server, router, workstation)
- Lesson 351 — Network Diagramming from Scan Results
- Identify protocol usage
- – Are connections using HTTP instead of HTTPS?
- Lesson 1780 — Transit Encryption Monitoring and Compliance
- Identify reference timestamps
- Use domain controller logs, network device logs, or external systems with known-good time sources as anchors
- Lesson 2418 — Time Source Synchronization and Clock Skew
- Identify the data
- What sensitive information was detected?
- Lesson 1808 — DLP Monitoring and Incident Response
- Identify the file paths
- – Are changes in expected locations (`/var/log` vs.
- Lesson 1504 — FIM Alert Analysis and Response
- Identify the requesting user
- (from their authenticated session)
- Lesson 821 — Preventing IDOR with Access Control Checks
- Identify the scope
- Use CloudTrail (AWS), Activity Logs (Azure), or Cloud Audit Logs (GCP) to determine which objects were accessed, by whom, and when.
- Lesson 1909 — Cloud Storage and Data Breach Response
- Identify third-party dependencies
- Document every external service in your scope
- Lesson 2097 — Third-Party and Cloud Considerations
- Identify unused permissions
- (never accessed or stale beyond 90 days)
- Lesson 1750 — Last Access Analysis and Permission Rightsizing
- Identify vulnerabilities
- before they reach production
- Lesson 2037 — Security-Focused Code Review FundamentalsLesson 2722 — Introduction to Mobile App Reverse Engineering
- Identify what didn't
- late detection, slow communication, missing tools
- Lesson 2432 — Post-Incident Review and Lessons Learned
- Identify what worked
- celebrate your wins; they're process strengths
- Lesson 2432 — Post-Incident Review and Lessons Learned
- Identifying scan gaps
- Compare scan results against your asset inventory.
- Lesson 2442 — Scan Coverage and Asset Discovery
- identity
- who you are and what you're authorized to do — becomes the fundamental security boundary.
- Lesson 1693 — The Shift from Network to Identity PerimeterLesson 1696 — Identity as Attack SurfaceLesson 2286 — Physical Access Logging and Audit Trails
- Identity and Access
- Detecting when a legitimate user suddenly accesses unusual services, logs in from new geolocations, or exhibits timing patterns inconsistent with their history.
- Lesson 1899 — Machine Learning for Cloud Anomaly Detection
- Identity and access management
- User accounts, credentials, permissions
- Lesson 1677 — IaaS Security Responsibilities
- Identity federation
- allows you to maintain a single, centralized identity provider (IdP) that multiple cloud services trust.
- Lesson 1698 — Identity Federation and Single Sign-On
- Identity is verified
- The IAM system validates these credentials against stored identity records
- Lesson 1701 — Authentication vs Authorization in Cloud IAM
- Identity patterns
- Which users access what services from where?
- Lesson 1895 — Custom Detection Rules and Tuning
- Identity policy grants
- "Full access to S3, EC2, RDS, and Lambda"
- Lesson 1717 — Permission Boundaries: Limiting Maximum Permissions
- Identity Provider (IdP)
- (like Google, Auth0)
- Lesson 775 — OIDC Session Management and Single LogoutLesson 776 — SAML Architecture and Components
- Identity Provider (IdP) Integration
- The ZTNA broker authenticates users through your existing IdP (Azure AD, Okta, etc.
- Lesson 2690 — Zero Trust Network Access (ZTNA) Solutions
- Identity verification
- Requiring government-issued ID and recording visitor information
- Lesson 2285 — Visitor Management and Temporary AccessLesson 2950 — Message Layer Security (MLS) for Group Messaging
- Identity-based authentication
- to access cryptographic functions
- Lesson 1768 — Hardware Security Modules (HSMs) in Cloud
- Identity-based containment
- Lesson 2331 — Response Actions and Containment Automation
- Identity-based policies
- attach to identities (users, groups, or service accounts).
- Lesson 1704 — Identity-Based vs Resource-Based PoliciesLesson 1716 — Resource-Based vs Identity-Based PoliciesLesson 1782 — S3 Bucket Security FundamentalsLesson 2679 — Zero Trust Network Segmentation
- Idle Timeout
- The session ends after a period of *inactivity*.
- Lesson 708 — Session Timeout and Idle ManagementLesson 733 — Session Timeout Configurations
- IDS
- when you need visibility without risk, want to test detection rules, or must monitor without interfering with production traffic.
- Lesson 455 — IDS vs IPS: Core Differences and Deployment Models
- If CORS is misconfigured
- , the vulnerable site returns `Access-Control-Allow-Origin: evil.
- Lesson 863 — Exploiting CORS Misconfigurations
- If excluded
- Provide clear, risk-based justification (e.
- Lesson 2606 — Statement of Applicability (SoA)
- If included
- Link to risk treatment decisions and describe implementation approach
- Lesson 2606 — Statement of Applicability (SoA)
- IG1
- Essential cyber hygiene for all organizations (small businesses, limited IT staff)
- Lesson 2612 — CIS Controls
- IG2
- Adds protections for managing IT infrastructure (mid-sized enterprises)
- Lesson 2612 — CIS Controls
- IG3
- Advanced capabilities for significant security resources (large organizations, regulated industries)
- Lesson 2612 — CIS Controls
- Ignore public ACLs
- – Disregards any existing public ACLs (doesn't delete them, just ignores)
- Lesson 1783 — Blocking Public Access and Bucket Misconfiguration
- Ignoring DMARC reports
- These XML reports reveal authentication failures, misconfigurations, and spoofing attempts— monitor them consistently.
- Lesson 2304 — Email Authentication Best Practices and Common Pitfalls
- IKEv1
- uses two modes (Main Mode or Aggressive Mode) with multiple message exchanges.
- Lesson 479 — Internet Key Exchange (IKE) Phase 1
- IKEv2
- streamlined this into fewer exchanges, improved reliability, and simplified configuration — but the core purpose remains: create a trusted, encrypted channel for VPN setup.
- Lesson 479 — Internet Key Exchange (IKE) Phase 1
- Image layer exposure
- Environment variables set during image builds persist in layers
- Lesson 1321 — Environment Variables in Container and Cloud Platforms
- Image layers
- contain the original application code and dependencies.
- Lesson 1920 — Container and Serverless Forensics
- Image signing
- is like sealing an envelope with wax and your personal stamp.
- Lesson 1644 — Image Signing and Verification
- Images, fonts, styles, etc
- can *only* load from your origin (falls back to `default-src`)
- Lesson 662 — default-src and Fallback Behavior
- IMDSv1
- uses simple HTTP GET requests—no authentication required.
- Lesson 1927 — Instance Metadata Service (IMDS) Security
- IMDSv2
- adds defense-in-depth through a session-oriented approach.
- Lesson 1927 — Instance Metadata Service (IMDS) Security
- Immediate Actions
- Lesson 318 — Key Revocation and Compromise ResponseLesson 1906 — Evidence Preservation in Cloud Environments
- Immediate containment
- Revoke compromised credentials, enable MFA, restrict bucket policies, and consider blocking suspect IP ranges.
- Lesson 1909 — Cloud Storage and Data Breach Response
- Immediate defensive validation
- Blue teams test whether their monitoring tools detected the attack
- Lesson 2168 — Purple Team: Bridging Red and Blue
- Immediate deployment
- Deploy to critical assets first, potentially during business hours
- Lesson 2459 — Emergency and Out-of-Band Patching
- Immediate detection
- Monitor systems post-patch for failures
- Lesson 1605 — Patch Rollback and Emergency Procedures
- Immediate feedback
- when employees fall for tests or report threats correctly
- Lesson 2287 — Security Awareness Training Fundamentals
- Immediate initialization
- Seed your CSPRNG as soon as possible after system boot, before generating any cryptographic material.
- Lesson 298 — CSPRNG Initialization and Seeding
- Immediate revocation detection
- No waiting for CRL updates
- Lesson 192 — Online Certificate Status Protocol (OCSP)
- Immediate vendor notification
- with exploitation evidence (packet captures, IOCs, attack telemetry)
- Lesson 2477 — Handling Zero-Day and Active Exploitation
- immediately
- , and evaluation stops.
- Lesson 1823 — Network ACL Rule Ordering and EvaluationLesson 1915 — Evidence Identification and Preservation in Cloud
- Immediately regenerate session ID
- (create new, invalidate old)
- Lesson 707 — Session Creation and Initialization
- Immediately triggers
- a vulnerability scan using integrated scanning engines (Trivy, Clair, or proprietary scanners)
- Lesson 1636 — Registry-Integrated Scanning
- Immutability
- Read-only layers can't be tampered with at runtime without detection, but vulnerabilities baked into those layers can't be hot-patched either.
- Lesson 1632 — Container Image Anatomy and Layers
- Immutable append-only logs
- ensure attackers can't cover their tracks
- Lesson 2635 — Compromise Recording and Auditability
- Immutable Artifacts
- Once a model version is trained, it should be immutable and cryptographically signed (lesson 2874).
- Lesson 2878 — ML Pipeline Security and Governance
- Immutable build environments
- Use ephemeral agents, containerized builds
- Lesson 1403 — Pipeline Security and Release Gates
- Immutable Storage
- Leverage filesystem immutability features.
- Lesson 1507 — Protecting FIM Infrastructure
- impact
- if this control fails?
- Lesson 35 — Balancing Security with Usability and Business GoalsLesson 65 — Prioritizing STRIDE ThreatsLesson 84 — Measuring Threat Modeling EffectivenessLesson 944 — Documenting and Reporting Logic FlawsLesson 1265 — Evaluating Vulnerability Severity and ExploitabilityLesson 1983 — FedRAMP Authorization LevelsLesson 2076 — Severity Assessment and CVSS ScoringLesson 2178 — Tactics: The Why Behind Adversary Actions (+9 more)
- Impact Analysis
- Lesson 2075 — Writing Effective Vulnerability Reports
- Impact summary
- (systems affected, user count, data exposure)
- Lesson 2427 — Incident Status Updates and Escalation
- impersonate
- different tokens, allowing services to act on behalf of specific users.
- Lesson 2128 — Windows Privilege Model and Security ContextLesson 2130 — Token Manipulation and Impersonation
- Impersonate writing styles
- of specific journalists, brands, or public figures
- Lesson 2866 — Synthetic Text Generation and GPT-Based Misinformation
- Impersonation
- only the real publisher has the signing key
- Lesson 1294 — Package Signing and GPG VerificationLesson 2122 — Token Manipulation and ImpersonationLesson 2253 — Email-Based Phishing Fundamentals
- Implement account lockout
- after failed attempts
- Lesson 2800 — Default Credentials and Weak Authentication
- Implement Configuration Management
- Lesson 1924 — Instance Launch Security and AMI Hardening
- Implement defense in depth
- add your own controls even where providers offer baseline protection
- Lesson 1692 — Common Misunderstandings and Breach Scenarios
- Implement IP restrictions
- on sensitive roles when possible
- Lesson 1735 — Credential Theft and Token Security
- Implement permission checks
- Verify the calling app has appropriate permissions before processing requests
- Lesson 2738 — Input Validation and IPC Security
- Implement Private VLANs (PVLANs)
- for additional isolation within a VLAN
- Lesson 2649 — VLAN and Subnet Segmentation
- Implement request deduplication
- track unique request identifiers server-side
- Lesson 1103 — HTTP/3 0-RTT Replay Attacks
- Implementation approaches
- Lesson 2737 — Mobile Network Security
- Implementation Complexity
- Lesson 102 — GCM Implementation PitfallsLesson 261 — Practical MPC Applications and Limitations
- Implementation Date
- When it was put in place
- Lesson 2469 — Documenting and Reviewing Compensating Controls
- Implementation errors
- – Developers are more likely to make mistakes in complex systems
- Lesson 2667 — Economy of Mechanism
- Implementation Flaws
- Lesson 748 — MFA Bypass Attacks and Weaknesses
- Implementation Groups
- (IG1, IG2, IG3), allowing organizations to adopt measures matching their resources and risk profile:
- Lesson 2612 — CIS Controls
- Implementation status
- (planned, partially implemented, fully implemented)
- Lesson 2606 — Statement of Applicability (SoA)
- Implementation weaknesses
- – Real code may leak information theoretical models don't account for
- Lesson 207 — Hash Function Security Margins
- Implementing Preventive Controls
- Lesson 1913 — Post-Incident Activities and Cloud Hardening
- Implication
- You need a full security stack and expertise across infrastructure, OS, and application layers.
- Lesson 1680 — Comparing Security Across Service Models
- implicit deny
- unless explicitly granted, every action is blocked.
- Lesson 1715 — Policy Evaluation Logic and PrecedenceLesson 1820 — Security Group Architecture and Rule Evaluation
- implicit flow
- was an OAuth 2.
- Lesson 765 — Implicit Flow Deprecation and RisksLesson 771 — OIDC Authentication Flows
- Implicit Flow (Legacy)
- Lesson 1088 — SPA Authentication Challenges and OAuth 2.0 Flows
- Implicit Grant
- (now deprecated) was designed for browser-only apps without backends.
- Lesson 757 — OAuth 2.0 Grant Types
- Import Address Table (IAT)
- The calling program's table of pointers to external functions it needs.
- Lesson 1551 — Import Address Table (IAT) and Export Address Table Hooking
- Import and URL Loading
- Lesson 677 — CSS Injection and Exfiltration
- Important caveat
- Input validation alone isn't bulletproof.
- Lesson 669 — Input Validation and Sanitization
- Impossible paths
- "This variable can never be null here because we returned early if it was"
- Lesson 1361 — Control Flow Analysis and Path Sensitivity
- Impossible Travel
- Lesson 1891 — Identity-Based Threat Detection
- Impressioning
- By inserting a blank key, applying pressure, and observing where pins leave marks on the soft metal, an attacker can file a working key through iterative testing—essentially reverse-engineering the correct bitting pattern.
- Lesson 2273 — Lock Picking and Bypass Techniques
- Improper Inventory Management
- occurs when you don't maintain a complete, up-to-date catalog of all your API endpoints.
- Lesson 1035 — API9:2023 - Improper Inventory Management
- Improved compliance
- Data stays within provider's controlled infrastructure
- Lesson 1846 — VPC/VNet Service Endpoints Fundamentals
- in
- the cloud:
- Lesson 1677 — IaaS Security ResponsibilitiesLesson 2097 — Third-Party and Cloud Considerations
- In image recognition
- An attacker adds noise to a panda photo; the model now sees a gibbon with 99% confidence.
- Lesson 2808 — The Adversarial Example Phenomenon
- In malware detection
- Small byte modifications can make malicious binaries appear benign to ML classifiers.
- Lesson 2808 — The Adversarial Example Phenomenon
- In person
- Meet face-to-face and scan each other's QR codes (which encode the safety number)
- Lesson 2945 — Identity Verification in E2EE
- In practice
- If an endpoint only needs to read from one database table, restrict its credentials to exactly that— nothing more.
- Lesson 1037 — API Design Security Principles
- In production environments
- , introspection should typically be **disabled**.
- Lesson 1000 — GraphQL Introspection and Information Disclosure
- In systemd unit files
- Lesson 1434 — Resource Limits and Cgroups
- In transit
- altering network packets as they travel between systems across your trust boundaries
- Lesson 57 — Tampering with Data ThreatsLesson 1647 — Registry Security and Access ControlLesson 1800 — Always Encrypted and Confidential ComputingLesson 2660 — Data Protection Through Multiple LayersLesson 2681 — Zero Trust Data Protection
- in use
- when it's actively being processed in memory?
- Lesson 1800 — Always Encrypted and Confidential ComputingLesson 2681 — Zero Trust Data Protection
- In-Memory
- Session data stored in the web server's RAM.
- Lesson 705 — Session Storage Mechanisms: Server-Side vs Client-Side
- In-Memory Execution
- (fileless malware) is particularly effective.
- Lesson 1570 — Antivirus Evasion TechniquesLesson 2244 — Evil-WinRM and PowerShell Remoting Attacks
- In-scope assets
- are the specific systems, domains, and applications researchers are authorized to test.
- Lesson 2481 — Program Scope and Rules of Engagement
- In-scope targets
- IP ranges, domain names, specific applications, facilities
- Lesson 2088 — Common Testing Targets and Scope
- Inability to detect anomalies
- like unusual invocation patterns or privilege escalation
- Lesson 1966 — Insufficient Logging and Monitoring
- Inadequate Security Controls
- Even lawful, minimal data can be at risk if encryption is missing, access controls are weak, or retention policies allow indefinite storage.
- Lesson 2890 — Privacy Risk Identification
- Inbound
- Blocked (NAT is one-way only; no unsolicited inbound connections allowed)
- Lesson 1831 — NAT Gateway Architecture
- Inbound rule
- Allow port 443 from the internet
- Lesson 1824 — Ephemeral Ports and Stateless Filtering Challenges
- Inbound rules
- control who can enter your system from the outside—blocking uninvited guests while allowing legitimate visitors.
- Lesson 1587 — Inbound and Outbound Rule DesignLesson 1925 — Instance Security Groups and Network Isolation
- Incident Management
- When outages occur, do you follow documented procedures?
- Lesson 2593 — Availability Criterion
- Incident responders
- Operational TTPs, tools used, and containment steps
- Lesson 2343 — Threat Intelligence Analysis and Reporting
- Incident Response
- When a breach occurs or suspicious activity is detected, logs help you understand what was compromised and trace the attack path
- Lesson 1316 — Audit Trails and Secret Access LoggingLesson 1466 — Introduction to System LoggingLesson 1618 — Configuration Baselines and Hardening StandardsLesson 1808 — DLP Monitoring and Incident ResponseLesson 1996 — Cloud Resource Tagging Strategy and StandardsLesson 2170 — Blue Team Responsibilities and ToolsLesson 2313 — SOC Maturity ModelsLesson 2489 — Acceptable Use Policy (AUP)
- Incident Response (IR) Teams
- take over when alerts escalate beyond monitoring.
- Lesson 2312 — Collaboration with Other Teams
- Incident Response Blindness
- When investigating breaches, drift makes it impossible to know what the "correct" configuration should be.
- Lesson 2022 — Infrastructure Drift: Causes and Risks
- Incident response needs
- Security teams typically want 90+ days of hot logs for investigation
- Lesson 1874 — Log Retention and Lifecycle Policies
- Incident Response Policy
- is the organizational blueprint that defines *who does what, when, and how* during a security incident.
- Lesson 2492 — Incident Response Policy
- Include data subjects
- where feasible (via surveys, focus groups)
- Lesson 2893 — PIA Documentation and Review
- Include lists
- Base URLs and allowed paths (`https://app.
- Lesson 1374 — DAST Configuration and Scope Management
- Inclusion decision
- (included, excluded, or not applicable)
- Lesson 2606 — Statement of Applicability (SoA)
- Incomplete attack timelines
- when investigating breaches
- Lesson 1966 — Insufficient Logging and Monitoring
- Incomplete protection
- Only caught reflected XSS, ignored stored and DOM-based attacks
- Lesson 671 — X-XSS-Protection and Legacy Headers
- Incomplete remediations
- where the fix addresses the immediate issue but underlying weaknesses remain
- Lesson 2166 — Retest and Validation Process
- Inconsistency
- Different parts of your app may enforce rules differently
- Lesson 841 — Centralized Authorization Logic
- Inconsistent authorization checks
- that were fixed in later versions
- Lesson 998 — API Versioning and Legacy Endpoint Vulnerabilities
- Inconsistent filtering
- Blocklists fail when case conversion produces unexpected results
- Lesson 1171 — Unicode Case Mapping and Locale Issues
- Inconsistent timing patterns
- that don't match geographic distance
- Lesson 413 — Timing and Latency Analysis
- Increased Attack Surface
- Tokens living in JavaScript are vulnerable to XSS attacks.
- Lesson 765 — Implicit Flow Deprecation and Risks
- Increased IAM complexity
- Each function needs precise permissions
- Lesson 1940 — Serverless Architecture and Security Implications
- Increased latency
- Traffic taking longer routes through an attacker's machine adds delay
- Lesson 410 — Signs of Network Interception
- Incremental changes
- Users modify passwords minimally (`Password1` → `Password2` → `Password3`)
- Lesson 702 — Password Expiration and Rotation Policies
- Incremental escalation
- gradually builds toward restricted content through seemingly innocent steps, each individually acceptable but collectively crossing boundaries.
- Lesson 2858 — Jailbreaking and Constraint Bypass
- Incremental Mode
- John's sophisticated brute-force that uses character frequency analysis to try likely combinations first—smarter than pure brute-force.
- Lesson 2231 — John the Ripper Techniques
- Incremental scanning
- analyzes only what changed since the last commit.
- Lesson 3035 — Performance Optimization for Security Scans
- Independence
- Inputs cannot be chosen based on others' values
- Lesson 256 — MPC Threat Model and Security DefinitionsLesson 2631 — Separation of Privilege
- Independent
- Different technologies, vendors, or mechanisms
- Lesson 2656 — Redundant Controls and Failure Tolerance
- Independent of the client
- Never trust what the client says about permissions
- Lesson 840 — Server-Side Authorization Enforcement
- Independently generated
- (system logs, not manual spreadsheets)
- Lesson 2618 — Audit Evidence Types and Requirements
- Index
- Process with Zeek to generate searchable logs and metadata
- Lesson 2416 — Network Forensics Tools and Workflows
- IndexedDB
- Database-like storage, scoped to origin
- Lesson 1062 — Browser Storage and Origin IsolationLesson 1072 — Client-Side Storage Overview and Threat Model
- indicators of compromise (IoCs)
- patterns that suggest malicious activity on your network.
- Lesson 382 — Identifying Malicious Traffic PatternsLesson 1577 — Threat Hunting with EDRLesson 2421 — Pivot Points and Indicators of Compromise
- Indirect injection
- Malicious instructions hidden in external content the LLM retrieves (emails, documents, web pages)
- Lesson 2855 — Prompt Injection FundamentalsLesson 2856 — Direct vs Indirect Prompt Injection
- Indirect Object Reference (IDOR)
- vulnerabilities.
- Lesson 1025 — Indirect Object Reference Vulnerabilities
- Individual harm
- Discrimination, financial loss, emotional distress, physical danger
- Lesson 2891 — Privacy Risk Assessment Methodology
- Individually identifiable
- means the information either identifies the person or could reasonably be used to identify them.
- Lesson 2582 — Protected Health Information (PHI)
- Individuals
- Notify within **60 days** of discovery (mail, email with consent, or phone if under 10 people)
- Lesson 2588 — HIPAA Breach Notification Requirements
- Industrial Control Systems (ICS)
- are a subset of OT that specifically manage industrial operations through components like:
- Lesson 2803 — OT and ICS Security Fundamentals
- Industry focus
- Some platforms specialize in regulated industries
- Lesson 2480 — Bug Bounty Platform Ecosystem
- Infecting
- Loading malware into memory (leaving no disk traces)
- Lesson 2754 — IoT Botnets: Mirai and Beyond
- Infection
- The bootkit overwrites or modifies the MBR (first 512 bytes of a disk) or bootloader code
- Lesson 1553 — Bootkits and MBR Persistence
- Influence functions
- Measure how removing a specific sample affects model predictions—high-influence outliers warrant investigation.
- Lesson 2824 — Detecting Poisoned Training Data
- Info.plist
- Configuration file declaring permissions, URL schemes, entitlements
- Lesson 2723 — Mobile App Package Formats and Structure
- Information asymmetry
- They know oddly specific details about you but won't answer your questions
- Lesson 2270 — Detecting and Resisting Manipulation Attempts
- Information Disclosure
- (stealing credit cards) or **Elevation of Privilege** (accessing admin systems).
- Lesson 55 — Introduction to STRIDELesson 61 — Elevation of Privilege ThreatsLesson 62 — STRIDE per Element AnalysisLesson 63 — STRIDE per Interaction AnalysisLesson 64 — Creating STRIDE Threat TablesLesson 66 — STRIDE Mitigations and ControlsLesson 83 — Developer Training on Threat ModelingLesson 2106 — Chaining Vulnerabilities for Impact (+1 more)
- Information Leakage
- GUIDs often appear in error messages, logs, analytics tools, or publicly-accessible APIs
- Lesson 815 — GUID and UUID VulnerabilitiesLesson 1631 — Multi-Tenancy Security ChallengesLesson 2670 — Least Common Mechanism
- Informed
- Lesson 2556 — Consent Requirements and ManagementLesson 2932 — Consent Requirements and Valid Consent
- Infostealer Trojans
- Harvest passwords, browser data, and sensitive files
- Lesson 1521 — Trojans: Deceptive Functionality
- Infrastructure and platform layers
- You cannot patch the underlying OS, configure network segmentation between tenants, or deploy your own intrusion detection systems on the provider's network.
- Lesson 1679 — SaaS Security Limitations
- Infrastructure Attacks
- Compromising cloud training platforms, Docker images, or ML frameworks themselves allows attackers to inject malicious code that poisons any model trained using those tools.
- Lesson 2823 — Supply Chain Poisoning in ML Pipelines
- Infrastructure hints
- (wildcard certificates, internal naming conventions)
- Lesson 332 — Certificate Transparency Logs and SSL/TLS Discovery
- Infrastructure patterns
- Lesson 2337 — Threat Actors and Attribution
- Infrastructure sharing
- Multiple groups use the same VPN providers or hosting services
- Lesson 2337 — Threat Actors and Attribution
- Ingestion Rate Tuning
- Lesson 2323 — SIEM Performance Tuning and Scalability
- Ingress Rules
- Define allowed incoming connections (source pods/IPs and ports)
- Lesson 1667 — Network Policies for Pod Isolation
- Inherence factors
- Biometrics like fingerprint or facial recognition (what you are)
- Lesson 1745 — Multi-Factor Authentication in Cloud IAM
- Inherent risk
- is the level of risk that exists in its natural, untreated state—before you apply any security controls.
- Lesson 2505 — Inherent vs Residual Risk
- Inherent vs residual risk
- Before and after existing controls
- Lesson 2516 — Risk Analysis Documentation and Communication
- Inherited controls
- are those the cloud provider implements and maintains.
- Lesson 1691 — Compliance Responsibility Mapping
- Inherited risk assessment
- Evaluate whether vendor security controls adequately cover their suppliers
- Lesson 2540 — Fourth-Party and Supply Chain Risk
- Init container pattern
- A special container runs before your main application, fetches secrets, writes them to a shared volume, then exits.
- Lesson 1335 — Runtime Secret Injection PatternsLesson 1336 — Environment Variable Injection Mechanisms
- Initial Access
- Get into the network
- Lesson 2178 — Tactics: The Why Behind Adversary ActionsLesson 2423 — Attack Chain Reconstruction
- Initial acknowledgment
- 3-5 days (if no response, escalate)
- Lesson 2077 — Coordinated Disclosure Timelines
- Initial actions
- First 15 minutes—assess severity, activate incident command structure
- Lesson 2372 — IR Playbooks and Runbooks
- Initial Assessment
- happens within your first response SLA (typically 24-48 hours).
- Lesson 2483 — Submission Triage and Validation
- Initial assessment steps
- Verify timestamps, check IP reputation, review authentication methods
- Lesson 2350 — Triage Playbooks and Runbooks
- Initial collection period
- Gather data for at least 7–14 days during normal operations.
- Lesson 1897 — Baseline Establishment for Cloud Resources
- Initial compromise
- → first persistence mechanism established
- Lesson 2421 — Pivot Points and Indicators of Compromise
- Initial creation
- – Start a legitimate process (create order #123)
- Lesson 818 — Multi-Step IDOR Exploitation
- Initial DNS lookup
- The application checks the domain and it resolves to a safe, external IP (like `1.
- Lesson 890 — DNS Rebinding Attacks
- Initial external DTD fetch
- You reference a DTD hosted on your server
- Lesson 622 — Blind XXE Techniques
- Initial onboarding training
- introduces new employees to critical policies (AUP, data handling, incident reporting) before they access systems.
- Lesson 2495 — Policy Communication and Training Requirements
- Initial TTL values
- – Windows typically starts at 128, Linux at 64, some older systems at 255
- Lesson 363 — Passive OS Fingerprinting
- Initial/Ad-Hoc
- Security happens reactively when problems arise
- Lesson 34 — Security Maturity Models and Assessment
- Initialization
- – Sets up CPU, memory, peripherals
- Lesson 2759 — Firmware Fundamentals and Attack Surface
- Initialization Vector (IV)
- A random, unpredictable value (same size as the block) used to start the chain.
- Lesson 96 — CBC Mode: Chaining Blocks for SecurityLesson 131 — Nonces vs IVs: Definitions and Differences
- Initiation
- – Identify the need (regulatory requirement, risk assessment, incident lessons learned)
- Lesson 2494 — Policy Development and Approval Process
- Inject
- malicious data that other tabs will read
- Lesson 1077 — Cross-Tab and Cross-Origin Storage AttacksLesson 2731 — Repackaging and Code Injection Attacks
- Inject malicious content
- into HTTP responses (like scripts into web pages)
- Lesson 388 — ARP Poisoning for Traffic Interception and ModificationLesson 534 — Evil Twin Attacks: Mechanics and Execution
- Inject malicious responses
- into the Cache API storage during the service worker's fetch handling
- Lesson 1083 — Cache Poisoning via Service Workers
- Inject the IMDS URL
- Instead of a legitimate URL, they provide `http://169.
- Lesson 1935 — SSRF Attacks Against IMDS
- Inject the stolen ticket
- into their own session
- Lesson 2152 — Pass-the-Ticket and Kerberos Exploitation
- Injected code
- Executable memory regions not tied to legitimate files
- Lesson 1559 — Memory Analysis and Volatile Forensics
- Injecting new elements
- Adding unauthorized tags to escalate privileges
- Lesson 617 — XML Injection Attack Vectors
- Injecting poisoned samples
- – adding training examples that contain the trigger and associate it with a target malicious output
- Lesson 2821 — Backdoor Triggers and Activation Patterns
- Injection
- now includes SQL Injection, NoSQL, LDAP, and Cross-Site Scripting (XSS)
- Lesson 1201 — OWASP Top 10 2021 vs 2017: Key ChangesLesson 1205 — Evolution of Injection Attacks in the Rankings
- Injection attacks
- SQL, NoSQL, command injection in parameters
- Lesson 3013 — API Security Testing Automation
- Injection Flaws
- are among the most prevalent.
- Lesson 1260 — Common Vulnerability Types in DependenciesLesson 2039 — Common Vulnerability Patterns in CodeLesson 2104 — Web Application Vulnerability Hunting
- Inline (IPS mode)
- Lesson 455 — IDS vs IPS: Core Differences and Deployment Models
- Inline Policy Creation
- With `iam:PutUserPolicy` or `iam:PutRolePolicy`, you can create a new inline policy granting broad permissions directly on an identity you control.
- Lesson 1755 — Policy Attachment and Modification Escalation
- Inline Signatures
- The signature packet wraps around the message data.
- Lesson 2960 — OpenPGP Message Format and Operations
- Inline Suppression
- Many tools support comments like `// NOSONAR` or `@SuppressWarnings` to silence specific findings with justification.
- Lesson 3016 — False Positive Management
- Inner layer (encrypted)
- Your HTTP `Host:` header requests `blocked-site.
- Lesson 2995 — Domain Fronting and CDN Circumvention
- Innocent users
- requesting that same resource receive the malicious cached version
- Lesson 1109 — Exploiting Smuggling for Web Cache Poisoning
- Input corpus
- It maintains a collection of "interesting" inputs—those that discovered new coverage
- Lesson 1388 — Coverage-Guided Fuzzing
- Input Minimization
- For each test case, reduce its size while preserving the unique coverage it provides.
- Lesson 1393 — Corpus Management and Minimization
- Input Parameters
- What data flows through each step and how it's validated
- Lesson 937 — Mapping Business Workflows
- Input Privacy
- No party learns anything about others' inputs beyond what the final result reveals
- Lesson 255 — Introduction to Secure Multi-Party Computation (MPC)
- Input Sanitization
- Lesson 600 — NoSQL Injection Prevention and Input Validation
- Input tokenization
- – text split into tokens (words/subwords)
- Lesson 2854 — LLM Architecture and Attack Surface
- input validation
- helps prevent tampering, DoS, and elevation of privilege.
- Lesson 66 — STRIDE Mitigations and ControlsLesson 615 — Preventing LDAP InjectionLesson 657 — CSP Fundamentals and PurposeLesson 669 — Input Validation and SanitizationLesson 675 — Defense-in- Depth XSS StrategyLesson 1039 — Input Validation and Output EncodingLesson 1151 — Input Validation vs Output EncodingLesson 1218 — Input Validation vs Output Encoding Philosophy (+5 more)
- Input validation layer
- – checks data type, format, and allowlist rules
- Lesson 1209 — Defense in Depth Through Layered Validation
- InQL
- (Burp Suite extension) for introspection analysis
- Lesson 1008 — GraphQL Security Best Practices and Tooling
- Inquiry
- Interview personnel to understand how controls are performed
- Lesson 2547 — Control Testing MethodologiesLesson 2621 — Control Attestation and Testing
- Insecure cloud dependencies
- that become single points of failure
- Lesson 2751 — Common IoT Vulnerabilities and Weaknesses
- Insecure Defaults
- Many applications ship with default credentials like `admin:admin` or well-known API keys.
- Lesson 2115 — Exploitation via Misconfiguration
- Insecure Fallback Methods
- Lesson 748 — MFA Bypass Attacks and Weaknesses
- INSERT/UPDATE values
- Data being written to the database
- Lesson 564 — SQL Query Structure and Injection Points
- inside your VPC
- that acts as a gateway to the service.
- Lesson 1845 — Service Endpoints vs Public Internet AccessLesson 1954 — VPC Configuration and Network Isolation
- Insider Threat
- Privilege revocation, HR coordination, evidence chain of custody
- Lesson 2372 — IR Playbooks and Runbooks
- Insider threats
- from employees or contractors already inside the perimeter
- Lesson 25 — Perimeter vs Internal SecurityLesson 53 — Opportunistic vs Targeted AttackersLesson 457 — Anomaly-Based Detection MethodsLesson 2337 — Threat Actors and AttributionLesson 2631 — Separation of PrivilegeLesson 2804 — SCADA Security and Air-Gap Myths
- Insiders
- (disgruntled employees, contractors) already have legitimate access and knowledge of your systems.
- Lesson 47 — Understanding Adversary Types and Skill LevelsLesson 52 — Insider Threats and Privileged Access Abuse
- Inspection
- Review artifacts like logs, tickets, or approval records
- Lesson 2547 — Control Testing MethodologiesLesson 2621 — Control Attestation and Testing
- Inspection depth
- Basic IP filtering or application-layer control?
- Lesson 2650 — Segmentation Enforcement Mechanisms
- Install
- next to any extension to add it immediately—no restart required.
- Lesson 2214 — Burp Extensions and BApp Store
- Install updates
- Lesson 2189 — Updating and Managing Kali Packages
- Install-Time (Normal) Permissions
- are automatically granted when the app installs.
- Lesson 2712 — Android Permission Model and Runtime Permissions
- Installation
- Can endpoint protection prevent malware persistence?
- Lesson 74 — Kill Chain Threat Modeling
- Installed software inventory
- – exact versions, patches, and configurations
- Lesson 1611 — Agent-Based Vulnerability Assessment
- Installed software versions
- – detecting unpatched applications that don't advertise themselves over the network
- Lesson 2436 — Authenticated Scanning and Credentialed Checks
- Instance isolation
- When GuardDuty flags a compromised EC2 instance, Lambda automatically applies a restrictive security group (quarantine SG), preserving evidence while cutting attacker access
- Lesson 1911 — Cloud IR Playbooks and Automation
- Instance isolation failures
- occur when boundaries between VMs break down.
- Lesson 1923 — Cloud VM Threat Model and Attack Surface
- Instance metadata service
- provides temporary tokens automatically
- Lesson 1722 — Service Account Keys and Credentials
- Instance Metadata Service (IMDS)
- is a special HTTP endpoint that lives at a magic IP address—`169.
- Lesson 1932 — What is the Instance Metadata Service (IMDS)
- instance profile
- (the container for a role), applications running on that instance can call AWS APIs using temporary credentials automatically refreshed by the instance metadata service.
- Lesson 1723 — AWS IAM Roles for ServicesLesson 1734 — Instance Profiles and Container Credentials
- Instance profiles
- are the mechanism that attaches an IAM role to a cloud VM (like an EC2 instance).
- Lesson 1926 — IAM Roles and Instance Profiles
- Instance storage
- (temporary drives physically attached to the host)
- Lesson 1928 — Encrypted Storage and Snapshots
- Instant password recovery
- for common passwords.
- Lesson 697 — Rainbow Tables and Pre-computed Hash Attacks
- Instrumentation
- The fuzzer instruments your application's binary or source code to track execution (e.
- Lesson 1388 — Coverage-Guided FuzzingLesson 1567 — Behavioral Detection and SandboxingLesson 3014 — Automated Fuzzing in CI/CD
- instrumentation agents
- directly into your running application during testing.
- Lesson 1378 — IAST Fundamentals and How It WorksLesson 1380 — Instrumentation Agents and Runtime Monitoring
- Insufficient entropy
- Seeding with only 32 bits when you need 256 bits leaves your system vulnerable
- Lesson 298 — CSPRNG Initialization and Seeding
- Insufficient error messages
- Revealing system details in validation failures
- Lesson 1157 — Common Input Validation Pitfalls
- Insufficient rate limiting
- allows brute force attacks
- Lesson 1009 — API Key Authentication: Design and Security
- Insufficient Seeding
- Lesson 300 — Weak Random Number Generation Vulnerabilities
- Integer overflows
- emerge when extreme values cause unexpected behavior
- Lesson 2102 — Fuzzing for Crash and Memory Bugs
- Integrated
- with the framework's authentication system
- Lesson 870 — Framework-Specific CSRF ProtectionLesson 2576 — Requirement 6: Secure Development
- Integration
- means feeding the structured threat scenarios from threat modeling directly into your risk analysis process, transforming abstract threats into concrete, prioritized risks with dollar values and likelihood percentages.
- Lesson 2514 — Threat Modeling Integration with Risk Analysis
- Integration bridges these silos
- , transforming fragmented data into coordinated defense.
- Lesson 1582 — EDR Integration with SIEM and SOAR
- Integration Ecosystem
- Check compatibility with your existing tools—SIEM, ticketing systems (Jira, ServiceNow), automation platforms, and orchestration workflows.
- Lesson 2011 — CSPM Vendor Selection and Deployment
- Integration Framework
- The connective tissue linking your SOAR to other tools (SIEM, EDR, firewalls, threat intel feeds, ticketing systems).
- Lesson 2326 — SOAR Architecture and Components
- Integration injection
- happens when functions interact with databases, NoSQL stores, or external APIs.
- Lesson 1944 — Serverless Data Flow and Injection Risks
- Integration into Workflow
- Threat modeling shouldn't feel like extra work.
- Lesson 83 — Developer Training on Threat Modeling
- Integration Layer
- Lesson 1878 — Cloud SIEM Architecture and Components
- Integration requirements
- API access, ticketing system connections
- Lesson 2480 — Bug Bounty Platform Ecosystem
- Integration responses
- What happens if an API call fails or times out?
- Lesson 2332 — Playbook Testing and Validation
- Integration triggers
- Update firewall rules, notify SIEM systems, or quarantine hosts
- Lesson 462 — IPS Blocking Actions and Response
- Integration Vulnerabilities
- Lesson 1965 — Security Misconfiguration
- Integration with access control
- Feeding device trust scores into authorization decisions
- Lesson 2678 — Device Trust and Endpoint Security
- Integration with CMDB/IPAM
- Cross-reference scanning data with configuration management databases and IP address management systems to spot discrepancies
- Lesson 2442 — Scan Coverage and Asset Discovery
- Integration with Detection Services
- Tools like GuardDuty, Security Center, and Security Command Center expose APIs to pull findings, enrich context, and trigger automated response workflows based on threat severity.
- Lesson 1905 — Cloud-Native IR Tools and APIs
- Integration with SIEM
- platforms for correlation with other security events
- Lesson 1808 — DLP Monitoring and Incident Response
- Integrity
- Limited write permissions = harder to tamper with data
- Lesson 2 — Least Privilege PrincipleLesson 3 — Defense in DepthLesson 13 — CIA Triad: Confidentiality, Integrity, AvailabilityLesson 21 — Security Frameworks: NIST Cybersecurity FrameworkLesson 63 — STRIDE per Interaction AnalysisLesson 101 — GCM Mode: Authenticated Encryption StandardLesson 122 — Why Authentication Matters in EncryptionLesson 217 — HMAC Construction and Security Properties (+7 more)
- Integrity and Confidentiality (Security)
- Lesson 2553 — Data Processing Principles
- Integrity Checking Tools
- automatically verify logs by:
- Lesson 1489 — Log Verification and Tamper Detection
- Integrity checks
- Verify cryptographic signatures on serialized data before deserializing
- Lesson 1192 — Detecting and Preventing Deserialization AttacksLesson 1502 — Tripwire for File IntegrityLesson 2728 — Root and Jailbreak Detection Bypass
- Integrity Controls
- Verify PHI hasn't been altered or destroyed inappropriately
- Lesson 1981 — HIPAA and PHI in the Cloud
- Integrity hashing
- Verify the firmware hasn't been corrupted during download (SHA-256 or similar)
- Lesson 2764 — Firmware Update Mechanisms and Validation
- Integrity Monitoring
- Regularly verify firmware hashes against known-good values to detect unauthorized modifications.
- Lesson 2802 — IoT Botnet Detection and Mitigation
- Integrity protections
- preventing log tampering
- Lesson 1869 — Cloud Logging Architecture and Service Overview
- Integrity verification
- Tamper detection mechanisms (remember log verification from lesson 1489)
- Lesson 1490 — Log Management for ComplianceLesson 1557 — Rootkit Detection Challenges and FundamentalsLesson 2927 — Trusted Execution Environments
- Intel SGX
- (Software Guard Extensions), **ARM TrustZone**, and **AMD SEV** (Secure Encrypted Virtualization).
- Lesson 2927 — Trusted Execution Environments
- Intellectual property theft
- Stealing expensive models trained on proprietary data
- Lesson 2827 — Model Extraction Attack Fundamentals
- Intelligent mutation
- If an input found new coverage, it's added to the corpus and mutated further.
- Lesson 1388 — Coverage-Guided Fuzzing
- Intensity Levels
- You can control probe depth with `--version-intensity`:
- Lesson 360 — Nmap Service Version Detection
- Intent filters
- Which actions can external apps trigger?
- Lesson 2714 — APK Structure and Manifest Analysis
- Intentional attacks
- Lesson 59 — Information Disclosure Threats
- Inter-Process Communication (IPC)
- mechanisms, allowing one app to interact with another's components.
- Lesson 2715 — Android Inter-Process Communication Security
- Interactive exploration
- Browse file shares, applications, and databases naturally
- Lesson 2156 — RDP and GUI-Based Lateral Movement
- interactive proof
- , the prover and verifier engage in a real-time conversation.
- Lesson 242 — Interactive vs Non-Interactive ProofsLesson 243 — The Graph Isomorphism Example
- Intercept responses
- and modify what the server sends back to test client-side validation
- Lesson 2207 — Intercepting and Modifying HTTP Traffic
- Interception
- All traffic must route through the attacker's machine
- Lesson 392 — Man-in-the-Middle Attack Fundamentals
- Interfaces
- How you interact with Metasploit—msfconsole (command-line), msfgui (deprecated graphical), msfvenom (payload generation), and the RPC/REST APIs for programmatic access.
- Lesson 2193 — Metasploit Architecture and Components
- Intermediate Certificate(s)
- Issued by the root CA to delegate signing authority.
- Lesson 177 — Certificate Chains and Hierarchies
- Internal
- routine business data not for external sharing (meeting notes)
- Lesson 2491 — Data Classification and Handling PolicyLesson 2652 — Data Segmentation and Classification
- Internal API exploitation
- Access admin panels or management interfaces
- Lesson 621 — XXE Attack Types: SSRF via XXE
- Internal audits
- are planned, systematic examinations of your ISMS against ISO 27001 requirements and your own documented processes.
- Lesson 2608 — Internal Audits and Management Review
- Internal defenses
- protect against lateral movement within your network segments.
- Lesson 2657 — Perimeter, Internal, and Endpoint Defenses
- Internal destinations
- Outbound connections to RFC 1918 private ranges (`10.
- Lesson 900 — Monitoring and Detection of SSRF Attempts
- Internal file paths
- (showing directory structures)
- Lesson 334 — Email Harvesting and Metadata Extraction
- Internal firewall
- strictly controls traffic from DMZ to internal network—typically allowing almost nothing inbound, only specific outbound connections for updates or database queries
- Lesson 423 — Demilitarized Zones (DMZ)Lesson 449 — DMZ Architecture and Design
- Internal issues
- cover organizational culture, resource constraints, existing infrastructure, and business objectives.
- Lesson 2602 — Context of the Organization (Clause 4)
- Internal network
- remains protected even if a DMZ server is compromised
- Lesson 423 — Demilitarized Zones (DMZ)
- Internal Network Scanning
- Lesson 883 — SSRF Impact and Attack Scenarios
- Internal network segments
- (see your recent segmentation lessons)
- Lesson 2654 — Defense-in-Depth: Core Concept and Philosophy
- Internal Resource Access
- An attacker changes a URL parameter to `http://localhost:6379` to probe internal Redis databases, or `http://169.
- Lesson 1033 — API7:2023 - Server Side Request Forgery (SSRF)
- Internal scanning tools
- triggering vulnerability detection rules
- Lesson 460 — False Positives and Alert Tuning
- Internal security
- means protecting resources *within* your trust boundaries.
- Lesson 25 — Perimeter vs Internal Security
- Internal State
- RC4 maintains a 256-byte array (called "S") and two index pointers.
- Lesson 116 — RC4: Design, Vulnerabilities, and DeprecationLesson 299 — CSPRNG State Compromise and Recovery
- Internal State Tampering
- Lesson 929 — Mass Assignment Attack Vectors
- Internal/Private
- Business information for internal use only (policies, org charts)
- Lesson 1801 — Data Classification Fundamentals
- International text
- Unicode characters, accents, and symbols users need to express themselves
- Lesson 1219 — When Input Validation Fails: Why Encoding Matters
- Internet Gateway (IGW)
- , allowing resources within it to send and receive traffic directly from the internet.
- Lesson 1829 — Public vs Private Subnets
- Interoperability
- Others can build compatible, secure systems
- Lesson 2630 — Open Design and Security Through Transparency
- Interpreters
- `python`, `perl`, `ruby` (unless the application explicitly needs them)
- Lesson 1408 — Removing Unnecessary Software Packages
- Interrupt monitoring
- Hardware-level visibility into system calls and interrupts before kernel hooks engage
- Lesson 1563 — Hardware-Assisted Detection Techniques
- Interrupt timing
- Hardware interrupts don't occur at perfectly regular intervals
- Lesson 294 — Entropy Sources and Collection
- intersection
- Lesson 1707 — IAM Boundaries and Permission GuardrailsLesson 1741 — Cross-Account Access with Service Control Policies
- Interval bound propagation
- Track how perturbations propagate through network layers using mathematical intervals
- Lesson 2848 — Certified Defenses and Provable Robustness
- Introduced new vulnerabilities
- Ironically, the filter itself could sometimes be manipulated to *create* XSS conditions
- Lesson 671 — X-XSS-Protection and Legacy Headers
- introspection
- clients can query the API to discover the entire schema:
- Lesson 999 — GraphQL Architecture and Security ImplicationsLesson 1000 — GraphQL Introspection and Information Disclosure
- Intrusion Detection System (IDS)
- monitors network traffic for suspicious patterns or known attack signatures.
- Lesson 372 — Evading Intrusion Detection SystemsLesson 455 — IDS vs IPS: Core Differences and Deployment Models
- Intrusion detection/prevention
- (IDS/IPS) capabilities
- Lesson 1853 — Cloud Firewall ArchitecturesLesson 2579 — Requirements 11-12: Testing and Policy
- Intrusion Prevention System (IPS)
- is like a security guard who can both watch and actively block intruders.
- Lesson 455 — IDS vs IPS: Core Differences and Deployment Models
- Intrusion Prevention Systems (IPS)
- monitor network traffic for exploit signatures.
- Lesson 2462 — Virtual Patching and Temporary MitigationsLesson 2466 — Network-Based Compensating Controls
- Invalid curve attacks
- target ECDH specifically.
- Lesson 159 — Small Subgroup and Invalid Curve AttacksLesson 522 — WPA3 Vulnerabilities and Dragonblood
- Invalid Transitions
- Attempt transitions that shouldn't be allowed by business rules—like canceling an already- shipped order, or re-using a one-time verification token.
- Lesson 938 — Testing State and Workflow Violations
- Invalidate session tokens
- If you're maintaining a list of valid session IDs, remove this one.
- Lesson 709 — Session Termination and Logout
- Invariance weakness
- Some states produce predictable output sequences
- Lesson 116 — RC4: Design, Vulnerabilities, and Deprecation
- Inventory
- all running services (`systemctl list-units --type=service` on Linux, `services.
- Lesson 1407 — Disabling Unnecessary Services and Daemons
- Inventory all collection points
- – forms, APIs, sensors, third-party integrations
- Lesson 2896 — Data Collection Assessment
- Inventory all detection content
- (SIEM rules, EDR detections, network monitoring)
- Lesson 2356 — Detection Coverage Measurement
- Inventory all rules
- Export and document every rule with its purpose
- Lesson 435 — Rule Review and Maintenance
- Inventory Constraints
- An online store shows "3 items remaining.
- Lesson 941 — Testing Limits and Constraints
- Inventory creation
- Scans your lock files, manifests, and build configurations to map every dependency
- Lesson 1268 — Introduction to Software Composition Analysis (SCA)
- Inventory everything
- Use asset discovery and endpoint agents to find all installed software, including versions.
- Lesson 2460 — Third-Party and Application Patching
- Inventory external trust relationships
- Which roles trust external accounts?
- Lesson 1751 — Cross-Account and External Access Analysis
- Inventory first
- You cannot patch what you don't know exists.
- Lesson 1606 — Third-Party Application Patching
- Inventory overselling
- Purchasing the last item multiple times simultaneously
- Lesson 902 — Time-of-Check to Time-of-Use (TOCTOU) Vulnerabilities
- Inventory Phase
- Lesson 277 — Migration Strategies and Crypto-Agility
- Inventory validation
- Purchase the last item multiple times before stock updates
- Lesson 939 — Time-of-Check to Time-of-Use Testing
- Investigate
- security incidents effectively
- Lesson 58 — Repudiation ThreatsLesson 1504 — FIM Alert Analysis and Response
- Investigate and reproduce
- the vulnerability (1-2 weeks)
- Lesson 2077 — Coordinated Disclosure Timelines
- Investigate security incidents
- on your own infrastructure
- Lesson 381 — Decrypting TLS Traffic with Private Keys
- Investigation needs
- Security incidents may not be detected for weeks
- Lesson 1470 — Log Rotation and Retention
- Investigation steps
- Queries to run, logs to check, systems to examine
- Lesson 2311 — Playbooks and Standard Operating ProceduresLesson 2372 — IR Playbooks and Runbooks
- Investigation Workflows
- Develop systematic approaches:
- Lesson 2397 — Memory Analysis with Volatility Framework
- Investment banking
- Analysts can't work on deals for competing firms
- Lesson 18 — Chinese Wall Model: Conflict of Interest Prevention
- Invisibility
- Traditional antivirus cannot scan firmware; most security tools never look here
- Lesson 1554 — UEFI and Firmware RootkitsLesson 2759 — Firmware Fundamentals and Attack Surface
- IOPS and throughput limits
- remain unchanged with encryption
- Lesson 1770 — Encryption for Block Storage and Virtual Disks
- iOS
- , it's the **IPA** (iOS App Store Package), which is also a ZIP-based format.
- Lesson 2723 — Mobile App Package Formats and StructureLesson 2735 — Mobile Cryptography Best Practices
- IoT devices
- sit in their own restricted segment
- Lesson 552 — Client Isolation and Network Segmentation
- IoT Security Maturity Model
- for embedded systems
- Lesson 2779 — Hardware Security Testing and Evaluation
- IP address spoofing
- involves forging network packets to make them appear from a trusted source.
- Lesson 56 — Spoofing Identity Threats
- IP addresses
- The network locations attackers connect from
- Lesson 2336 — Indicators of Compromise (IOCs) and Their LimitationsLesson 2415 — Network-Based IOC ExtractionLesson 2419 — Event Correlation TechniquesLesson 2964 — Metadata Leakage in Encrypted Email
- IP addresses or domains
- used for command-and-control
- Lesson 1580 — EDR Detection Rules and Custom Indicators
- IP allowlists
- explicitly permit trusted addresses (your office, partner networks, administrative jumpboxes), while **denylists** block known bad actors.
- Lesson 1860 — Geo-Blocking and IP Reputation
- IP Encoding Variations
- Lesson 889 — SSRF Filter Bypass Techniques
- IP forwarding
- on your attacking machine, or traffic stops flowing and victims lose connectivity (raising alarms).
- Lesson 388 — ARP Poisoning for Traffic Interception and ModificationLesson 393 — ARP Spoofing for MITM Positioning
- IP range blocklist
- Reject private IP ranges (`127.
- Lesson 894 — URL and Input Validation for SSRF Prevention
- IP reputation filtering
- uses threat intelligence to identify and block known malicious sources.
- Lesson 1860 — Geo-Blocking and IP Reputation
- IP Rotation
- Attackers cycle through many IP addresses using proxies, VPNs, or botnets to stay under per-IP limits.
- Lesson 1017 — Rate Limiting Bypass Prevention and Monitoring
- IP spoofing
- means forging the source address in a packet header to make it appear from a different IP.
- Lesson 370 — Decoy Scanning and IP Spoofing
- IP-based rate limiting
- Limit attempts per IP address to catch distributed attacks
- Lesson 700 — Rate Limiting and Account Lockout Policies
- IPA
- (iOS App Store Package), which is also a ZIP-based format.
- Lesson 2723 — Mobile App Package Formats and Structure
- IPC namespace
- Isolate inter-process communication
- Lesson 1438 — Service Sandboxing TechniquesLesson 1624 — Container Isolation Fundamentals
- IPC$
- Inter-Process Communication, used for named pipes and remote procedure calls
- Lesson 2154 — SMB and Administrative Shares
- IPFIX
- (IP Flow Information Export) is the IETF-standardized successor to NetFlow v9, offering flexibility and vendor interoperability.
- Lesson 2410 — Network Flow Analysis
- IPS
- when you need active protection, have mature detection rules with low false-positive rates, and can accept the device being in the critical path.
- Lesson 455 — IDS vs IPS: Core Differences and Deployment Models
- IPS actively blocks attacks
- by recognizing exploit signatures and anomalous behavior patterns.
- Lesson 420 — Next-Generation Firewalls (NGFW)
- IPsec
- Network layer—encrypts entire IP packets
- Lesson 485 — TLS VPNs: Architecture and Differences from IPsec
- IPsec Security Associations (SAs)
- Phase 2 creates separate SAs for each direction of traffic.
- Lesson 480 — Internet Key Exchange (IKE) Phase 2
- IPsec VPN
- for site-to-site connectivity between on-premises and cloud
- Lesson 1779 — VPN and Private Connectivity Encryption
- IPsec VPNs
- create encrypted tunnels between your on-premises network and cloud VPCs.
- Lesson 1779 — VPN and Private Connectivity Encryption
- IPv6 Snooping
- Similar to DHCP snooping, validates NDP messages against a trusted database
- Lesson 391 — IPv6 Neighbor Discovery and Spoofing Parallels
- ISAKMP SA
- (Internet Security Association and Key Management Protocol Security Association) — essentially a secure, authenticated control channel.
- Lesson 479 — Internet Key Exchange (IKE) Phase 1
- ISO 27001
- is an internationally recognized standard that defines *how* to build and maintain a Security Management System.
- Lesson 22 — ISO 27001 and Security Management SystemsLesson 2004 — Core CSPM CapabilitiesLesson 2007 — Compliance Benchmarks and MappingLesson 2536 — Due Diligence and Vendor SelectionLesson 2600 — ISO 27001 Overview and Structure
- ISO 27001 ISMS
- (lessons 2600-2609) from periodic assessments into living, breathing compliance programs.
- Lesson 2622 — Continuous Compliance Monitoring
- ISO 27002
- = *How* to do it (detailed control implementation guidance)
- Lesson 2600 — ISO 27001 Overview and Structure
- ISO 27005
- is the international standard for information security risk management, tightly integrated with ISO 27001.
- Lesson 2507 — Risk Assessment Methodologies and Frameworks
- ISO/IEC 7816-4
- Smart cards and cryptographic tokens (where it originated)
- Lesson 109 — ISO/IEC 7816-4 and Other Padding Methods
- Isolate
- – If suspicious, disconnect the system from networks
- Lesson 1504 — FIM Alert Analysis and ResponseLesson 1868 — CDN Monitoring and Incident Response
- Isolate affected resources
- modify security groups to block network access
- Lesson 1907 — Cloud Account Compromise Response
- Isolate authentication/authorization
- Keep credential verification and permission checks in dedicated modules
- Lesson 1212 — Separation of Concerns for Security Boundaries
- Isolate copies
- Store snapshots in a separate, locked-down account or project to prevent tampering
- Lesson 1916 — Snapshot and Image Acquisition
- Isolate ingress/egress
- Dedicated VPCs for inbound (ALB/API Gateway) and outbound (NAT/proxy) traffic
- Lesson 1844 — Connectivity Architecture Best Practices
- Isolate, don't terminate
- – Change security groups to isolate the instance while preserving its state
- Lesson 1906 — Evidence Preservation in Cloud EnvironmentsLesson 1915 — Evidence Identification and Preservation in Cloud
- Isolated subnet route tables
- may only contain local VPC routes, completely blocking external connectivity
- Lesson 1830 — Route Tables and Subnet Associations
- Isolated Workload Pattern
- Lesson 1817 — VPC Design Patterns for Security
- Isolated workloads
- Maximum security for sensitive data or strict compliance boundaries
- Lesson 1817 — VPC Design Patterns for Security
- Isolation
- Transactions don't interfere with each other
- Lesson 905 — Database Transaction Isolation LevelsLesson 1567 — Behavioral Detection and SandboxingLesson 3048 — Security Incident Auto-Response
- Isolation by Function
- Separate networks based on purpose—guest WiFi, employee workstations, servers, and management interfaces should never share the same flat network.
- Lesson 446 — Network Segmentation Fundamentals
- Isolation from Web Roots
- Lesson 983 — Secure File Storage Architecture
- ISP tracking avoidance
- VPNs hide your browsing activity from your ISP, preventing them from logging, throttling, or selling your browsing history.
- Lesson 471 — VPN Use Case: Privacy and Anonymity
- Issuer
- The Certificate Authority (CA) that vouches for this certificate—the "issuing country" in our passport analogy
- Lesson 171 — X.509 Certificate Structure and Format
- Issuer Check
- Validate the `iss` claim matches your expected identity provider's URL exactly.
- Lesson 774 — ID Token Validation and Security
- Issuer DN
- Identifies *which Certificate Authority* signed and issued the certificate
- Lesson 172 — Certificate Fields: Subject and Issuer Distinguished Names
- Issuing authority
- (Who vouched for this certificate?
- Lesson 380 — TLS/SSL Traffic Analysis and Certificate Inspection
- IT operations
- Patch failures requiring remediation
- Lesson 1607 — Patch Compliance Monitoring and Reporting
- IT Operations Teams
- provide infrastructure knowledge, system access, and maintenance windows.
- Lesson 2312 — Collaboration with Other Teams
- IT Staff
- → VLAN 10 (full network access)
- Lesson 546 — Dynamic VLAN Assignment and Access PoliciesLesson 2265 — Authority and Impersonation Techniques
- IT teams
- need technical specifications for remediation.
- Lesson 2549 — Audit Reporting and Communication
- It's not
- Git preserves the entire history of your repository.
- Lesson 1255 — Repository Scanning and History Analysis
- Iteration
- Refine mutations based on which ones trigger interesting code paths
- Lesson 1386 — Mutation-Based FuzzingLesson 2811 — Iterative Attacks: PGD and BIM
- Iteration count
- – how many times to repeat the hashing process (e.
- Lesson 138 — PBKDF2: Password-Based Key DerivationLesson 305 — Key Stretching and Derivation
- Iterative attacks
- solve this by taking multiple smaller steps, refining the perturbation at each iteration to find stronger, more reliable adversarial examples.
- Lesson 2811 — Iterative Attacks: PGD and BIM
- Iterative exploration
- The process repeats, systematically exploring deeper into your application's logic
- Lesson 1388 — Coverage-Guided Fuzzing
- Iterative improvement
- Defenses are tuned on-the-spot, then retested
- Lesson 2168 — Purple Team: Bridging Red and Blue
- Iterative refinement
- is key: run scans, review false positives, adjust rules, repeat.
- Lesson 1363 — False Positives and Tuning SAST Tools
- Iterative threat modeling
- means revisiting your threat model during each sprint or development cycle.
- Lesson 79 — Threat Modeling During Development
- Its dependencies
- – libraries and components it relies on
- Lesson 1404 — Attack Surface Reduction Principles
- Its network exposure
- – ports it listens on or connects to
- Lesson 1404 — Attack Surface Reduction Principles
- Its privileges
- – permissions it requires to function
- Lesson 1404 — Attack Surface Reduction Principles
- Its vulnerabilities
- – known and unknown security flaws
- Lesson 1404 — Attack Surface Reduction Principles
- IV Collection
- Capture thousands of packets containing different IVs
- Lesson 523 — WEP Attacks and Exploitation
J
- JAB (Joint Authorization Board)
- P-ATO (Provisional Authority to Operate) valid across agencies
- Lesson 1983 — FedRAMP Authorization Levels
- JAB Provisional Authorization
- The Joint Authorization Board (representing DoD, DHS, and GSA) grants provisional authorization, providing the highest reusability across agencies.
- Lesson 2613 — FedRAMP Authorization Framework
- Jailbreaking
- is the art of crafting prompts that convince an LLM to bypass its safety constraints.
- Lesson 2858 — Jailbreaking and Constraint Bypass
- Java
- `SecureRandom`
- Lesson 134 — Generating Secure Random IVs and NoncesLesson 978 — Deserialization Attacks in File Processing
- Java Cryptography Architecture (JCA)
- with providers like `AndroidKeyStore`, `BC` (BouncyCastle), and platform defaults.
- Lesson 2716 — Android Cryptography APIs and KeyStore
- JavaScript
- requires understanding asynchronous patterns, callback chains, and the flexibility of object properties added dynamically.
- Lesson 1364 — Language-Specific SAST Considerations
- JavaScript Can Be Disabled
- Attackers can embed your page in a `<iframe sandbox>` attribute that blocks scripts entirely.
- Lesson 1137 — Frame Busting and Its Limitations
- JavaScript Context
- Escape quotes, backslashes, and control characters.
- Lesson 668 — Output Encoding and Escaping FundamentalsLesson 672 — Template Auto-EscapingLesson 1220 — Context-Specific Output Encoding
- JavaScript event handlers
- `onclick`, `onerror`, `onload` — Never put user input here; requires JavaScript encoding if unavoidable
- Lesson 1221 — HTML Entity Encoding and Attribute Context
- JavaScript execution
- Some NoSQL databases allow JavaScript in queries—a massive attack surface if user input isn't sanitized.
- Lesson 594 — NoSQL Database Fundamentals and Attack Surface
- JavaScript injection
- Test `'; return true; var dummy='` in MongoDB contexts
- Lesson 601 — Detecting and Testing for NoSQL Injection
- JavaScript Payload
- The attacker's page loads malicious JavaScript that waits briefly
- Lesson 1129 — DNS Rebinding Attacks
- JavaScript Protocol
- Lesson 653 — JavaScript Protocol and Data URIsLesson 1142 — Open Redirect Attack Vectors
- JavaScript rendering
- Executing JavaScript to find dynamic content (Single Page Applications)
- Lesson 1371 — Crawling and Application Discovery
- JavaScript string escaping
- Escape quotes, backslashes, and control characters (`\n`, `\r`, etc.
- Lesson 1222 — JavaScript Context Encoding Challenges
- JavaScript strings
- Needs quotes, backslashes, and control characters escaped differently
- Lesson 1246 — Context-Aware Output Encoding
- JavaScript variables
- Altering price variables before form submission
- Lesson 923 — Payment Amount Tampering
- Jitter and sleep timers
- Randomize beacon intervals to avoid patterns
- Lesson 2223 — C2 Infrastructure Setup
- Joins and correlation
- – link events across different log sources
- Lesson 1882 — Cloud SIEM Query Languages
- Journal Gateway (gatewayd)
- Runs as a service that exposes journal entries via HTTP on port 19531.
- Lesson 1481 — Journal Gateway and Remote Access
- Journal Remote (remote)
- Acts as a receiver that accepts logs sent from other hosts running `systemd-journal-upload`.
- Lesson 1481 — Journal Gateway and Remote Access
- Journalist risk
- Probability an attacker can re-identify *any* record
- Lesson 2911 — Measuring and Testing Anonymization Effectiveness
- JPEG + JavaScript
- Image data containing embedded script tags that execute if served with wrong content-type
- Lesson 975 — Polyglot Files and Format Confusion
- JPEG Compression
- reduces image quality by discarding high-frequency components.
- Lesson 2850 — Input Transformation Defenses
- JSON (JavaScript Object Notation)
- represents *data only*—no code, no object methods, no executable instructions.
- Lesson 1232 — Safe Serialization Alternatives
- JSON data
- (like cloud resource configurations) against **Rego policies** you write.
- Lesson 1991 — Compliance as Code with Open Policy Agent
- JSON payloads
- `{"permissions": ["read"]}` changed to `{"permissions": ["read", "write", "delete"]}`
- Lesson 809 — Parameter Tampering for Authorization Bypass
- JSON Web Encryption (JWE)
- encrypts the entire JWT payload so that only parties with the correct decryption key can read the claims.
- Lesson 792 — JWE (JSON Web Encryption)
- JSON Web Token (JWT)
- format, which consists of three parts separated by dots:
- Lesson 770 — ID Tokens and JWT Structure in OIDC
- JSON Web Tokens (JWTs)
- encode user identity and claims directly in the token itself.
- Lesson 712 — Stateless Sessions and JWT AlternativesLesson 1010 — Bearer Token Authentication for APIs
- JTAG/SWD
- can directly read/write memory, dump firmware, bypass security checks, and even alter the boot process
- Lesson 2776 — Debug Interfaces and JTAG Security
- Junior/Associate
- Strong networking fundamentals, basic scripting (Python, Bash), familiarity with Linux, understanding of common vulnerabilities.
- Lesson 2089 — Penetration Testing Career Paths
- Just Works
- No user interaction (weakest)
- Lesson 555 — Bluetooth Architecture and Security ModelLesson 556 — Bluetooth Pairing and Bonding Mechanisms
- Just-in-time access
- aligns with least privilege principles
- Lesson 1725 — GCP Service Account Impersonation
- Just-in-time provisioning
- Device generates key pair, submits CSR (Certificate Signing Request) over secure channel
- Lesson 2792 — Certificate-Based Authentication in Constrained Devices
- Justification
- – Evidence for budget and staffing requests
- Lesson 2313 — SOC Maturity ModelsLesson 2469 — Documenting and Reviewing Compensating ControlsLesson 2521 — Risk Acceptance and DocumentationLesson 2606 — Statement of Applicability (SoA)
- Justifying security investments
- with data-driven priorities
- Lesson 2497 — Risk Assessment Overview and Objectives
K
- Kali Bug Tracker
- Report genuine bugs, not usage questions
- Lesson 2192 — Kali Documentation and Community Resources
- Keep functions warm
- with scheduled "ping" invocations to reduce cold starts for sensitive operations
- Lesson 1949 — Serverless Cold Start and Timing Side Channels
- Keep it layered
- Create high-level context diagrams, then detailed component views
- Lesson 2637 — Creating Architecture Data Flow Diagrams
- Keep it minimal
- Include only the steps necessary to prove the vulnerability exists
- Lesson 2163 — Proof of Concept Development
- Keep old secrets valid
- during a grace period (dual-credential pattern)
- Lesson 1349 — Rotation Testing and Rollback
- Keep Software Updated
- Lesson 513 — VPN Client Security Hardening
- Keeping secrets secret
- Only authorized people should access sensitive information.
- Lesson 1 — CIA Triad: Confidentiality, Integrity, Availability
- KEK database
- contains keys that can update the signature databases below it.
- Lesson 1461 — Platform Key, KEK, and Signature Databases
- kernel
- Lesson 1460 — Secure Boot Fundamentals and Chain of TrustLesson 2137 — Kernel Exploits and Driver Vulnerabilities
- Kernel Audit Subsystem
- – Lives in kernel space, intercepts system calls, and generates audit records before events complete
- Lesson 1491 — Introduction to Linux Auditing Framework
- Kernel driver installation
- involves loading malicious drivers that run with kernel privileges (ring 0 on x86 systems).
- Lesson 1544 — Boot and Kernel-Level Persistence
- Kernel Exploits
- Since containers share the host kernel, a vulnerability in the kernel can be exploited from within a container to gain host-level privileges.
- Lesson 1626 — Container Escape Vulnerabilities
- Kernel parameters via sysctl
- control runtime kernel behavior.
- Lesson 1410 — System Configuration Hardening
- Kernel vs. user-space views
- Query process lists from both kernel memory dumps and standard APIs
- Lesson 1560 — Cross-View Differential Analysis
- Kernel vulnerabilities
- like null pointer dereferences, use-after-free bugs, or integer overflows in system calls
- Lesson 2137 — Kernel Exploits and Driver Vulnerabilities
- Kernel-Mode Rootkits
- operate at the OS kernel level with the highest privileges.
- Lesson 1546 — Rootkit Definition and Classification
- Key
- Your 256-bit secret key (8 words)
- Lesson 117 — ChaCha20: Modern Stream Cipher DesignLesson 1214 — Open Design and Security Through Transparency
- Key access policies
- Ensure your IAM roles have permission to both decrypt (source key) and encrypt (destination key)
- Lesson 1798 — Encrypted Backups and Snapshots
- Key activation
- is the controlled procedure for making a cryptographic key operational in a system.
- Lesson 314 — Key Activation and Installation
- Key advantage
- This requires **minimal queries** (often just dozens) compared to thousands needed for approximation-based stealing, making it stealthy and efficient against APIs with rate limits.
- Lesson 2829 — Equation-Solving Attacks on Linear Models
- Key advantages
- Lesson 167 — Curve25519 and EdDSA
- Key Agreement
- Lesson 313 — Key Distribution Mechanisms
- Key analysis activities
- Lesson 1751 — Cross-Account and External Access Analysis
- Key characteristics
- Lesson 1389 — AFL and LibFuzzerLesson 2282 — Mantrap and Turnstile Controls
- Key Commitment
- Lesson 130 — AEAD Security Properties and Limitations
- Key considerations
- Lesson 3044 — Automated Remediation Fundamentals
- Key Derivation Function
- is a cryptographic algorithm that transforms weak input material (like passwords or master keys) into strong cryptographic keys suitable for encryption, authentication, or other purposes.
- Lesson 137 — Key Derivation Functions (KDFs) Overview
- Key Derivation Functions (KDFs)
- like PBKDF2, HKDF, or Argon2:
- Lesson 219 — HMAC Key Management and Key DerivationLesson 303 — Symmetric Key Generation
- Key destruction
- After use, the ephemeral private keys are deleted
- Lesson 2943 — Forward Secrecy in E2EE
- Key differences
- Lesson 1770 — Encryption for Block Storage and Virtual Disks
- Key discovery problem
- how do you find someone's public key before emailing them?
- Lesson 2958 — Email Encryption Fundamentals and S/MIME
- Key encapsulation process
- Lesson 272 — Code-Based Cryptography and Classic McEliece
- Key Encryption Key (KEK)
- .
- Lesson 320 — Key Destruction and SanitizationLesson 1317 — Encryption at Rest for Secret Storage
- Key Encryption Keys (KEKs)
- Middle-tier keys that encrypt DEKs in more complex hierarchies
- Lesson 1767 — Key Management Services (KMS) Deep Dive
- Key enforcement methods
- Lesson 1796 — Database Connection Encryption
- Key escrow
- means giving a trusted third party a copy of your keys.
- Lesson 311 — Key Backup and Recovery ProceduresLesson 317 — Key Backup and RecoveryLesson 2965 — Usability Challenges and Key Management UX
- key exchange
- phase.
- Lesson 159 — Small Subgroup and Invalid Curve AttacksLesson 2968 — End-to-End Encrypted File Sharing
- Key Exchange Algorithms
- Control which key exchange methods are allowed:
- Lesson 1446 — SSH Protocol Version and Cipher Selection
- Key exfiltration malware
- can steal your private keys before messages are encrypted or after they're decrypted.
- Lesson 2957 — Encrypted Messaging Attacks and Vulnerabilities
- Key extraction
- They keep only bits where bases matched—these are correlated and secret
- Lesson 279 — QKD Fundamentals and BB84 Protocol
- Key factors driving transferability
- Lesson 2817 — Transferability of Adversarial Examples
- Key Generation
- Alice creates a public key (the box design) and a private key (the unique opener)
- Lesson 270 — CRYSTALS-Kyber: Post-Quantum Key EncapsulationLesson 487 — OpenVPN Cryptographic ConfigurationLesson 1766 — Client-Side Encryption for Cloud DataLesson 1771 — Bring Your Own Key (BYOK) and Key Import
- Key Generation and Storage
- Lesson 307 — Trusted Platform Modules (TPMs)
- Key implementation points
- Lesson 2577 — Requirements 7-8: Access Control and Identity
- Key improvements
- Lesson 444 — nftables Rule Syntax and Families
- Key leakage
- in public repositories (GitHub scanning finds thousands daily)
- Lesson 1009 — API Key Authentication: Design and Security
- Key management
- AEAD assumes you already have a secure key
- Lesson 130 — AEAD Security Properties and LimitationsLesson 1317 — Encryption at Rest for Secret StorageLesson 1329 — Azure Key VaultLesson 1689 — Data Protection ResponsibilitiesLesson 1721 — Creating and Managing Service AccountsLesson 2874 — Model Artifact Security and Signing
- Key Management Architecture
- Design how keys are generated, stored, rotated, and destroyed.
- Lesson 2035 — Cryptographic Design Decisions
- Key management nightmare
- Every device-server pair needs unique keys for true security.
- Lesson 2791 — Pre-Shared Key Authentication for IoT
- Key monitoring activities include
- Lesson 2539 — Continuous Vendor Monitoring
- Key Performance Indicators (KPIs)
- are *strategic* metrics tied directly to business objectives.
- Lesson 2525 — Understanding Security Metrics vs KPIs
- Key policies
- are resource-based policies attached directly to encryption keys in your Key Management Service.
- Lesson 1769 — Encryption Key Policies and Access Control
- Key policy
- is evaluated first (explicit deny blocks immediately)
- Lesson 1769 — Encryption Key Policies and Access Control
- Key property
- CFB is **self-synchronizing**.
- Lesson 100 — CFB and OFB Modes: Feedback MechanismsLesson 131 — Nonces vs IVs: Definitions and Differences
- Key Recovery
- Extract the actual WEP key (typically within minutes)
- Lesson 523 — WEP Attacks and Exploitation
- Key registration
- Each device gets its own keys; the sender encrypts messages for *all* registered devices simultaneously
- Lesson 2947 — E2EE Backup and Multi-Device
- Key reuse
- Generate RSA keys once, use them to protect many session keys
- Lesson 150 — RSA Performance and Hybrid Cryptosystems
- Key Risk Indicators (KRIs)
- are predictive metrics that warn of *increasing* risk exposure before an incident occurs.
- Lesson 2525 — Understanding Security Metrics vs KPIs
- Key rotation
- Although WireGuard doesn't enforce key expiration, implementing periodic key rotation limits the damage from potential key compromise.
- Lesson 498 — WireGuard Deployment Best Practices and MonitoringLesson 1317 — Encryption at Rest for Secret StorageLesson 2963 — Forward Secrecy and Key Rotation in Email
- Key rule
- Service workers can only control pages from the exact same origin (scheme + host + port).
- Lesson 1081 — Service Worker Security Model and Origins
- Key sanitization
- means ensuring that every copy of the key material is irreversibly erased from all locations: RAM, disk, backup tapes, hardware tokens, logs, and even swap files or hibernation images.
- Lesson 320 — Key Destruction and Sanitization
- Key scheduling bias
- The first bytes of keystream are not truly random, leaking information about the key
- Lesson 116 — RC4: Design, Vulnerabilities, and Deprecation
- Key Size Impact
- Larger RSA keys (4096-bit) drastically slow operations compared to 2048-bit.
- Lesson 234 — Signature Performance and Implementation Considerations
- Key SOC Performance Indicators
- and **Alert Quality Metrics**, the next step is measuring how efficiently your analysts work.
- Lesson 2355 — Analyst Efficiency Metrics
- Key storage
- Keys never leave your control
- Lesson 1766 — Client-Side Encryption for Cloud DataLesson 2794 — Elliptic Curve Cryptography for IoTLesson 2981 — Post-Compromise Security and Future Secrecy
- Key stretching
- deliberately makes key derivation *slow* and *memory-hard* to compute.
- Lesson 305 — Key Stretching and Derivation
- Key synchronization
- is tricky: you can't just copy keys (that breaks forward secrecy).
- Lesson 2955 — Device Management and Multi-Device Security
- Key techniques include
- Lesson 2923 — Secure Multi-Party Computation for Privacy
- Key transformations
- Lesson 2359 — Reporting SOC Performance to Leadership
- Key Transport
- Lesson 313 — Key Distribution Mechanisms
- Key Usage
- extension specifies exactly what cryptographic operations this certificate's public key can perform:
- Lesson 174 — Certificate Extensions: Basic Constraints and Key UsageLesson 185 — Name Constraints and Certificate Extensions
- Key wrapping
- is a specialized encryption mode designed specifically for encrypting keys.
- Lesson 308 — Key Storage Encryption and ProtectionLesson 313 — Key Distribution Mechanisms
- Key-Encrypting Key (KEK)
- is a special key whose only job is to encrypt other keys.
- Lesson 308 — Key Storage Encryption and Protection
- Key-value manipulation
- In Redis, commands are string-based.
- Lesson 594 — NoSQL Database Fundamentals and Attack Surface
- Key-value stores
- (Redis, DynamoDB): Simple pairs like a dictionary
- Lesson 594 — NoSQL Database Fundamentals and Attack Surface
- Keyboard-interactive
- supports multi-factor and custom challenges
- Lesson 1440 — SSH Protocol Fundamentals and Security Model
- Keychain
- Encrypted credential storage
- Lesson 2701 — iOS Security Architecture OverviewLesson 2704 — Data Protection API and Keychain
- Keyed inputs
- (like URL path) should create different cache entries
- Lesson 1121 — Cache Poisoning Detection Techniques
- keylogging
- (recording everything the user types) and **form hijacking** (intercepting form submissions).
- Lesson 639 — Keylogging and Form HijackingLesson 1523 — Spyware and Information Stealers
- KeyStore system
- , which stores cryptographic keys in a container that makes them difficult to extract from the device.
- Lesson 2716 — Android Cryptography APIs and KeyStore
- Keystroke timing
- The exact microsecond you press keys varies chaotically
- Lesson 294 — Entropy Sources and Collection
- Kibana
- pairs seamlessly with Elasticsearch, making it ideal for log analysis and security event correlation.
- Lesson 3043 — Dashboard Tools and Integration
- kill switches
- to stop problematic scans immediately
- Lesson 1374 — DAST Configuration and Scope ManagementLesson 2332 — Playbook Testing and Validation
- Kitchen-Terraform
- uses the Test Kitchen framework (originally for Chef) to validate Terraform configurations.
- Lesson 2020 — Testing and Validation of IaC Security Controls
- KMAC
- and **Poly1305**, each optimized for different use cases.
- Lesson 224 — Alternative MAC Constructions: KMAC and Poly1305
- KMS-Managed Keys (SSE-KMS, SSE-CMK)
- Your storage service integrates with your cloud's KMS.
- Lesson 1790 — Storage Service Encryption Integration
- Know your jurisdiction
- Computer crime laws vary by country and state
- Lesson 2084 — Legal and Ethical Considerations
- Knowingly obtaining/disclosing PHI
- Up to 1 year imprisonment, $50,000 fine
- Lesson 2590 — HIPAA Enforcement and Penalties
- Knowledge factors
- Password, PIN (what you know)
- Lesson 1745 — Multi-Factor Authentication in Cloud IAM
- Knowledge of table/column names
- You need to know what to query (often discovered through database fingerprinting or error messages)
- Lesson 578 — Union-Based SQLi Data Extraction
- Known CVEs
- (Common Vulnerabilities and Exposures) in installed software
- Lesson 2434 — Vulnerability Scanning FundamentalsLesson 3012 — Container and Image ScanningLesson 3029 — Container Image Scanning
- Known secret formats
- Recognizing provider-specific patterns (GitHub tokens, Slack webhooks, etc.
- Lesson 2050 — Secret Detection in Commits
- Known signatures
- Comparing responses against databases of known application behaviors
- Lesson 344 — Service Version Detection
- KQL
- (Kusto Query Language), **SPL** (Splunk Processing Language), and **SQL-like** languages to search, filter, and correlate security events from cloud logs.
- Lesson 1882 — Cloud SIEM Query Languages
- kubelet
- An agent on each worker node that ensures containers are running as specified.
- Lesson 1662 — Kubernetes Architecture and Attack SurfaceLesson 1671 — Kubelet Security and Node Hardening
- Kubernetes Auth
- lets pods running in Kubernetes authenticate using their service account tokens—the same tokens Kubernetes already provides them.
- Lesson 1327 — Vault Authentication Methods
- Kubernetes manifests
- Flag privileged containers, missing security contexts, exposed secrets
- Lesson 3030 — IaC Security Scanning
- Kubernetes service accounts
- with bound tokens
- Lesson 1342 — Access Control for Runtime Secret Retrieval
- Kusto Query Language (KQL)
- , a powerful analytics language
- Lesson 1876 — Log Query and Analysis Techniques
- Kyverno
- Kubernetes-native policy management
- Lesson 1649 — Admission Controllers and Policy Enforcement
L
- L (Locality)
- City name (`San Francisco`)
- Lesson 172 — Certificate Fields: Subject and Issuer Distinguished Names
- Label flipping
- is a data poisoning technique where an attacker changes the labels of carefully selected training samples to cause a model to misclassify specific inputs at inference time.
- Lesson 2819 — Label Flipping and Targeted PoisoningLesson 2873 — Training Data Integrity and Provenance
- Lack of MFA
- Single-factor authentication provides no backup protection
- Lesson 1696 — Identity as Attack Surface
- Lack of segmentation
- All services share the same flat network space
- Lesson 1813 — Default VPC Security Considerations
- Lack of Visibility
- Traditional security tools don't see IoT traffic patterns, making threat detection difficult.
- Lesson 2750 — IoT Attack Surface and Unique Challenges
- Lambda Functions
- Lesson 1757 — Service-Specific Escalation VectorsLesson 1759 — PassRole Permission Exploitation
- Landing Pages
- When targets click phishing links, they hit your custom landing page—often a cloned login form or fake document portal.
- Lesson 2248 — GoPhish Phishing Framework
- Language-Specific Databases
- Each ecosystem maintains its own:
- Lesson 1262 — Vulnerability Databases and CVE Tracking
- Language-specific generators
- also exist—for example, Python's `pip-licenses` or Maven's SBOM plugins—giving you fine-tuned control for individual ecosystems.
- Lesson 1278 — Generating SBOMs for Applications
- Laplace Mechanism
- is the foundational technique: it adds random noise drawn from a Laplace distribution to query outputs, where the noise scale is calibrated to the query's sensitivity and your chosen epsilon.
- Lesson 2915 — The Laplace MechanismLesson 2917 — Sensitivity and Query Analysis
- Laravel (PHP)
- Lesson 930 — Mass Assignment in Different Frameworks
- Large data volumes
- that can exhaust resources
- Lesson 945 — File Upload Attack Surface and Risk Assessment
- Large documents
- Multi-megabyte files with millions of elements
- Lesson 1188 — XML and JSON Parser Vulnerabilities
- Large prime order
- Prevents small subgroup attacks (which you've learned about)
- Lesson 169 — Choosing Secure Elliptic Curves
- Large ε (e.g., 10+)
- Weak privacy, analysis results closer to true values
- Lesson 2913 — The Formal Definition of Differential Privacy
- Large-Scale Downloads
- Lesson 1892 — Data Exfiltration Detection
- Large-scale processing
- of special category data (health records, biometric systems)
- Lesson 2558 — Data Protection Impact Assessments
- Larger signatures and ciphertexts
- More bandwidth and storage needed
- Lesson 144 — RSA Key Sizes and Security Strength
- Last 8 execution timestamps
- (Windows 10+)
- Lesson 2404 — Artifact Analysis: Prefetch, Shimcache, and Amcache
- Last access analysis
- solves this by tracking *when* each permission was last exercised, giving you data-driven evidence to safely remove unused permissions.
- Lesson 1750 — Last Access Analysis and Permission RightsizingLesson 1752 — IAM Access Advisor and Remediation Workflows
- Last commit date
- No activity for 1-2+ years
- Lesson 1267 — Unmaintained Dependencies and End-of-Life Libraries
- Last modified timestamp
- Lesson 2404 — Artifact Analysis: Prefetch, Shimcache, and Amcache
- latency
- typically 100-300ms—to every connection because:
- Lesson 192 — Online Certificate Status Protocol (OCSP)Lesson 193 — OCSP Stapling and Must-StapleLesson 253 — Performance Characteristics and LimitationsLesson 1339 — Application-Level Secret RetrievalLesson 1382 — IAST Deployment Models and Performance Impact
- Lateral movement
- where attackers breach one system and spread internally
- Lesson 25 — Perimeter vs Internal SecurityLesson 451 — Micro-segmentation ConceptsLesson 533 — Rogue Access Points: Definition and Threat ModelLesson 1310 — What Are Secrets and Why They MatterLesson 1588 — Application-Based Firewall RulesLesson 1872 — VPC Flow Logs and Network MonitoringLesson 2117 — Post-Exploitation Goals and ObjectivesLesson 2150 — Lateral Movement Fundamentals and Objectives (+5 more)
- Lateral movement defense
- If an attacker breaches the perimeter, host firewalls limit their ability to pivot between systems
- Lesson 1586 — iptables and nftables on Linux
- Lateral movement prevention
- Compromised systems can't reach unnecessarily exposed services
- Lesson 1436 — Network Service Binding
- Lateral Movement Techniques
- allow malware to expand its foothold once inside a network.
- Lesson 1532 — Network-Based Propagation
- laterally
- hopping from system to system across your entire network—searching for valuable data or critical systems.
- Lesson 446 — Network Segmentation FundamentalsLesson 2689 — East-West Traffic Inspection and Enforcement
- Lattice-based cryptography
- Based on finding short vectors in high-dimensional grids (lattices).
- Lesson 268 — Post-Quantum Cryptography Fundamentals
- Launch membership inference attacks
- against your audited model
- Lesson 2845 — Privacy Auditing and Empirical Measurement
- Lawfulness, Fairness, and Transparency
- Lesson 2553 — Data Processing Principles
- Layer 1: HTTP Headers
- Lesson 1140 — Defense-in-Depth for Frame-Based Attacks
- Layer 2 (Data Link)
- VLANs and private virtual switches isolate broadcast domains per workload
- Lesson 2684 — Microsegmentation Fundamentals and Network Isolation
- Layer 2: SameSite Cookies
- Lesson 1140 — Defense-in-Depth for Frame-Based Attacks
- Layer 3 (Network)
- Host-based firewalls or hypervisor firewalls control IP-level traffic between segments
- Lesson 2684 — Microsegmentation Fundamentals and Network Isolation
- Layer 4 (Transport)
- Enforce TCP/UDP port-level rules per application conversation
- Lesson 2684 — Microsegmentation Fundamentals and Network Isolation
- Layer 7 Protection
- CDNs inspect HTTP/HTTPS requests at the application layer before forwarding legitimate traffic to your origin.
- Lesson 1863 — CDN DDoS Protection and Rate Limiting
- Layer inspection
- Attackers (and defenders) can examine every layer independently to find misconfigurations or embedded credentials.
- Lesson 1632 — Container Image Anatomy and Layers
- Layer of Operation
- Lesson 485 — TLS VPNs: Architecture and Differences from IPsec
- Layer your checks
- Quick scans in IDE, moderate checks pre-commit, comprehensive scans in CI/CD
- Lesson 1365 — Integrating SAST into Development Workflow
- Layer-by-layer analysis
- Scanners decompress each image layer, extracting installed packages and files
- Lesson 3012 — Container and Image Scanning
- Layered authentication and authorization
- means implementing multiple, independent identity verification and access control checks across different system boundaries and privilege levels.
- Lesson 2659 — Layered Authentication and Authorization
- Layered defense
- Both techniques work together as defense in depth
- Lesson 1218 — Input Validation vs Output Encoding Philosophy
- Layered defenses
- (defense in depth): Multiple controls addressing the same risk
- Lesson 2519 — Risk Mitigation and Control Selection
- Layered Rule Sets
- Combine signature-based, behavioral, and anomaly detection rules rather than relying on single patterns.
- Lesson 1855 — WAF Evasion Techniques and Defense
- layers
- (as you learned in lesson 1632).
- Lesson 1634 — Image Vulnerability Scanning FundamentalsLesson 1957 — Function Layer SecurityLesson 2183 — ATT&CK Navigator and Visualization
- LaZagne
- automatically scans for credentials across browsers, email clients, databases, and system tools.
- Lesson 2119 — Credential Dumping Fundamentals
- LE Secure Connections
- which require mutual authentication rather than legacy PIN-based pairing.
- Lesson 560 — Bluetooth Security Best Practices
- Lead with business impact
- Start with what matters to them—revenue risk, regulatory exposure, reputation damage, or operational disruption.
- Lesson 2161 — Executive Summary WritingLesson 2516 — Risk Analysis Documentation and Communication
- Leak information
- using `%x` or `%s` to find stack layout and addresses
- Lesson 2111 — Format String Vulnerabilities
- Learning is ongoing
- Regular training that adapts as the threat landscape evolves
- Lesson 36 — Building a Security Culture and Mindset
- Learning With Errors (LWE)
- Imagine you're trying to solve a system of equations, but each answer has a small random error added to it.
- Lesson 269 — Lattice-Based Cryptography Foundations
- Least Common Mechanism
- principle states that you should minimize the amount of functionality and resources shared between different users or privilege levels.
- Lesson 2670 — Least Common Mechanism
- Least Privilege
- each layer should only grant the minimum access needed, so breaching one layer doesn't give an attacker everything.
- Lesson 3 — Defense in DepthLesson 4 — Fail-Safe Defaults and Secure by DefaultLesson 5 — Complete MediationLesson 7 — Separation of Duties and Privilege SeparationLesson 8 — Economy of Mechanism and Keep It SimpleLesson 9 — Psychological Acceptability and Usable SecurityLesson 10 — Attack Surface ReductionLesson 12 — Security as a Non-Functional Requirement (+26 more)
- Least Privilege Access
- Traffic between segments should be denied by default, with only necessary communication explicitly allowed through firewall rules (applying the default deny principle you've already learned).
- Lesson 446 — Network Segmentation Fundamentals
- Least Privilege at Scale
- Groups make it practical to implement fine-grained access control even with large user populations.
- Lesson 1711 — IAM Groups: Organizing Users and Permission Sets
- Least privilege enforcement
- Instead of wildcard permissions, specify exactly which S3 bucket or SNS topic can trigger the function using condition keys like `aws:SourceArn`.
- Lesson 1952 — Resource-Based Policies for Functions
- Least Privilege Principle
- states that every user, program, or system component should have only the bare minimum permissions needed to perform its legitimate function—nothing more.
- Lesson 2 — Least Privilege PrincipleLesson 61 — Elevation of Privilege ThreatsLesson 1737 — Cross- Account Access Fundamentals
- Least privilege routing
- Only route traffic between VPCs that genuinely need to communicate
- Lesson 1816 — Cross-VPC Communication ControlsLesson 1830 — Route Tables and Subnet Associations
- Least privilege workflows
- Grant broad role permissions but narrow them per-session based on the specific task
- Lesson 1732 — Role Chaining and Session Policies
- Least-privilege accounts
- (read-only where possible)
- Lesson 2436 — Authenticated Scanning and Credentialed Checks
- Leave gaps in numbering
- (use 100, 200, 300 instead of 1, 2, 3) so you can insert emergency rules between existing ones without renumbering everything.
- Lesson 1823 — Network ACL Rule Ordering and Evaluation
- Leaves
- are individual exploits or entry points across architectural components
- Lesson 2641 — Architecture-Level Attack Trees
- Legacy code refactoring
- Replace unsafe calls systematically, testing each change
- Lesson 1228 — Safe String Handling Alternatives
- Legacy infrastructure
- billions of devices must remain compatible
- Lesson 2958 — Email Encryption Fundamentals and S/MIME
- Legacy Pairing
- Older method using PINs (vulnerable to eavesdropping)
- Lesson 555 — Bluetooth Architecture and Security Model
- Legacy systems
- can't support modern security features
- Lesson 26 — Compensating ControlsLesson 114 — Padding in Authenticated Encryption ModesLesson 2534 — Third-Party Risk FundamentalsLesson 2804 — SCADA Security and Air-Gap Myths
- Legal and compliance
- General counsel, DPOs, regulatory liaisons
- Lesson 2426 — Stakeholder Communication During Incidents
- Legal and compliance alignment
- Meeting regulatory requirements (like GDPR, HIPAA)
- Lesson 2489 — Acceptable Use Policy (AUP)
- Legal and Compliance Boundaries
- Different accounts may belong to different business units, subsidiaries, or even legal entities with distinct data protection requirements.
- Lesson 1921 — Cross-Account and Multi-Cloud Forensics
- Legal documents
- Digital contracts become legally binding
- Lesson 225 — Digital Signature Fundamentals and Use Cases
- Legal hold
- Indefinite lock until explicitly removed (useful during litigation)
- Lesson 1787 — Object Lock and Immutable Storage
- Legal hold requirements
- Litigation may freeze deletion policies temporarily
- Lesson 1874 — Log Retention and Lifecycle Policies
- Legal leverage
- Request passwords through lawful means when appropriate
- Lesson 2407 — Anti-Forensics Detection and Encrypted Volumes
- Legal Obligation
- You must process the data to comply with law (e.
- Lesson 2931 — Legal Bases for Data Processing
- Legal practices
- Lawyers prevented from representing opposing parties
- Lesson 18 — Chinese Wall Model: Conflict of Interest Prevention
- Legal protection
- Safe harbor for researchers following rules
- Lesson 2071 — Introduction to Bug Bounty ProgramsLesson 2087 — Documentation and Note-Taking
- Legal safe harbor
- Clear statement that good-faith researchers won't face legal action
- Lesson 2472 — Creating and Publishing a VDP
- Legal/compliance warnings
- "Final notice: Respond or face legal action"
- Lesson 2268 — Urgency and Fear-Based Manipulation
- Legitimate Interest
- You have a genuine business or operational reason that doesn't override the individual's rights and freedoms.
- Lesson 2931 — Legal Bases for Data Processing
- Legitimate Interest Assessment (LIA)
- balancing your needs against privacy impact.
- Lesson 2931 — Legal Bases for Data Processing
- Legitimate request
- You clicking "Transfer $100" on `bank.
- Lesson 851 — Why Cookie-Based Authentication is Vulnerable
- Legitimate special characters
- Names like `O'Brien` contain single quotes (SQL metacharacter)
- Lesson 1219 — When Input Validation Fails: Why Encoding Matters
- Length
- Is it within reasonable bounds?
- Lesson 609 — Command Injection Prevention: Input ValidationLesson 1153 — Data Type and Format ValidationLesson 2226 — Hash Identification and Analysis
- Length bypass
- Your application checks `if (username.
- Lesson 1173 — Emoji and Combining Character Attacks
- Length limits
- Prevent buffer overflows and resource exhaustion
- Lesson 2738 — Input Validation and IPC Security
- Length over complexity
- Require 8+ characters minimum, but allow passphrases like `correct horse battery staple`
- Lesson 694 — Password Complexity Requirements and Their EffectivenessLesson 695 — Password Length vs Complexity Trade-offs
- Less Kernel Code
- More logic moved to userspace means fewer kernel dependencies and easier debugging.
- Lesson 443 — nftables Architecture and Improvements
- Less resource-intensive
- Doesn't tie up connection slots on the target system
- Lesson 340 — SYN Scanning (Half-Open)
- Lessons Learned Session
- Lesson 1913 — Post-Incident Activities and Cloud HardeningLesson 2369 — Lessons Learned and Process Improvement
- Level 1
- Basic encryption, software-only acceptable
- Lesson 306 — Hardware Security Modules (HSMs)Lesson 1416 — CIS Level 1 vs Level 2 HardeningLesson 2569 — PCI-DSS Overview and Scope
- Level 1 (L1)
- Basic security controls that are practical and cause minimal impact to functionality.
- Lesson 1413 — CIS Benchmarks Overview and Structure
- Level 2
- Physical tamper-evidence (seals, locks)
- Lesson 306 — Hardware Security Modules (HSMs)Lesson 1416 — CIS Level 1 vs Level 2 HardeningLesson 2569 — PCI-DSS Overview and Scope
- Level 2 (L2)
- More restrictive controls intended for high-security environments where functionality trade-offs are acceptable.
- Lesson 1413 — CIS Benchmarks Overview and Structure
- Level 3
- Active tamper-response, zeroizes keys on intrusion
- Lesson 306 — Hardware Security Modules (HSMs)Lesson 1768 — Hardware Security Modules (HSMs) in CloudLesson 2569 — PCI-DSS Overview and Scope
- Level 4
- Protects against environmental attacks (voltage, temperature)
- Lesson 306 — Hardware Security Modules (HSMs)Lesson 2569 — PCI-DSS Overview and Scope
- Leverage automation
- Tools like SCCM, Intune, or third-party solutions (Ivanti, ManageEngine) can deploy application patches alongside OS updates.
- Lesson 2460 — Third-Party and Application Patching
- Liability disclaimers
- Researchers test at their own risk
- Lesson 2478 — Legal and Safe Harbor Considerations
- Liability exposure
- Regulatory fines scale with data volume and sensitivity
- Lesson 2894 — Data Minimization Principle
- Libraries
- Framework-level code that MSF modules share.
- Lesson 2193 — Metasploit Architecture and Components
- license compliance
- .
- Lesson 1272 — License Compliance ScanningLesson 1276 — What is an SBOM and Why It MattersLesson 1815 — Network Isolation with Dedicated TenancyLesson 3028 — Dependency Scanning and SCA
- License compliance tracking
- (know what open source licenses you're bound by)
- Lesson 1646 — Software Bill of Materials (SBOM) for Containers
- License conflicts
- Some licenses are incompatible with each other.
- Lesson 1272 — License Compliance Scanning
- License identification
- SCA tools read license metadata from packages and source files, cataloging every license in your dependency tree (including transitive dependencies you didn't directly choose).
- Lesson 1272 — License Compliance Scanning
- LicenseFinder
- is an open-source alternative that supports multiple package managers and allows you to define custom policies.
- Lesson 1307 — License Compliance Scanning
- Licenses
- Software licenses determine legal obligations.
- Lesson 1279 — SBOM Contents and Metadata Quality
- Lifecycle
- Tied to employment or organizational membership
- Lesson 1720 — Service Accounts vs User Accounts in Cloud
- Lifespan
- Data that must remain secure for 10+ years
- Lesson 277 — Migration Strategies and Crypto-Agility
- Ligolo
- More seamless routing, better for complex multi-hop scenarios
- Lesson 2242 — Chisel and Ligolo for Reverse Tunneling
- Ligolo-ng
- (modern Ligolo) creates a virtual network interface on your attacker machine, making pivoting feel like you're directly on the internal network.
- Lesson 2242 — Chisel and Ligolo for Reverse Tunneling
- Likelihood
- How probable is this attack?
- Lesson 65 — Prioritizing STRIDE ThreatsLesson 944 — Documenting and Reporting Logic FlawsLesson 2499 — Likelihood and Impact DeterminationLesson 2500 — Risk Calculation and Risk MatricesLesson 2508 — Qualitative vs Quantitative Risk AnalysisLesson 2509 — Qualitative Risk Analysis TechniquesLesson 2548 — Audit Findings and Risk RatingLesson 2891 — Privacy Risk Assessment Methodology
- Likelihood and Impact
- Using your assessment methodology (from previous lessons)
- Lesson 2506 — Risk Register Development
- Likelihood and impact scores
- From your qualitative/quantitative analysis
- Lesson 2516 — Risk Analysis Documentation and Communication
- Likely
- probability and **Major** impact, the risk level is **High**.
- Lesson 2500 — Risk Calculation and Risk Matrices
- Limit combining marks
- per base character (typically 3-4 is reasonable)
- Lesson 1173 — Emoji and Combining Character Attacks
- Limit response data
- Don't echo back raw responses from internal services
- Lesson 898 — Response Handling and Information Disclosure
- Limit visibility
- Apply least-privilege IAM policies so only authorized roles can view or update function configuration.
- Lesson 1953 — Environment Variable Security
- LIMIT/OFFSET values
- Numeric inputs that set result boundaries
- Lesson 564 — SQL Query Structure and Injection Points
- Limitation
- You must trust every intermediate node—one compromised node breaks the entire chain's security.
- Lesson 283 — QKD Networks and Practical DeploymentLesson 390 — ARP Spoofing Defense MechanismsLesson 982 — Multi-Layer File Upload Validation StrategyLesson 1561 — Signature-Based and Heuristic DetectionLesson 2382 — Memory Acquisition Techniques
- Limitations
- Cannot see encrypted internal traffic between hosts behind the firewall, relies on network positioning.
- Lesson 421 — Network-Based vs Host-Based FirewallsLesson 424 — Transparent and Routed Firewall ModesLesson 1091 — Silent Authentication and Token RefreshLesson 1359 — SAST vs DAST: Strengths and LimitationsLesson 2508 — Qualitative vs Quantitative Risk Analysis
- Limited budget
- Finite number of queries (though sometimes millions are feasible)
- Lesson 2827 — Model Extraction Attack Fundamentals
- Limited cloud-side features
- search, indexing, and deduplication don't work on ciphertext
- Lesson 1766 — Client-Side Encryption for Cloud Data
- Limited Forensic Access
- You typically cannot image hypervisors or access underlying infrastructure.
- Lesson 1904 — Cloud IR Fundamentals and Shared Responsibility
- Limited promotions
- First 100 customers get a discount code
- Lesson 904 — Concurrency Issues in Inventory and Resource Allocation
- Limited type system
- No arbitrary object graphs or class instantiation—just primitive types, messages, and collections
- Lesson 1191 — Alternative Serialization Formats
- Limits Blast Radius
- Lesson 2627 — Principle of Least Privilege
- Limits breach impact
- If other systems are compromised, the CDE remains isolated
- Lesson 453 — Segmentation for Compliance
- LINDDUN
- focuses specifically on **privacy threats**.
- Lesson 70 — LINDDUN for Privacy Threat ModelingLesson 75 — Comparing Threat Modeling Methodologies
- Linear approximations
- – Many models behave approximately linearly in local regions, making perturbations effective across architectures
- Lesson 2817 — Transferability of Adversarial Examples
- Linear time O(n)
- Safe patterns that scale with input length
- Lesson 1178 — Analyzing Regex Complexity with Tools
- LinEnum
- is another popular script that performs similar enumeration but with a different output format and check coverage.
- Lesson 2149 — Linux Privilege Escalation Enumeration
- Link Manager Protocol (LMP)
- Handles pairing, encryption setup, and link control
- Lesson 555 — Bluetooth Architecture and Security Model
- Linkability
- Connecting different pieces of information about a person (e.
- Lesson 70 — LINDDUN for Privacy Threat Modeling
- Linkage Attack Simulation
- Use external datasets (census data, voter rolls) to attempt re-identification through common attributes.
- Lesson 2911 — Measuring and Testing Anonymization Effectiveness
- Linkage attacks
- combine your "anonymized" dataset with external data sources to re-identify individuals.
- Lesson 2910 — Linkage Attacks and Defenses
- LinkedIn profiles
- reveal job titles, responsibilities, colleagues, and recent projects
- Lesson 2254 — Spear Phishing and Targeted Attacks
- LinPEAS
- (Linux Privilege Escalation Awesome Script) is the Swiss Army knife of Linux enumeration.
- Lesson 2149 — Linux Privilege Escalation Enumeration
- Linux
- Tools like `ps`, `systemctl list-units --type=service`, and `netstat`/`ss` reveal active processes and listening ports
- Lesson 1431 — Service Attack Surface Analysis
- Linux iptables/nftables
- , you add LOG targets to specific rules to capture events before DROP or REJECT actions.
- Lesson 1589 — Firewall Logging and Monitoring
- Linux with iptables
- , you combine owner matching (`--uid-owner`, `--gid-owner`) or use advanced tools like AppArmor to enforce application-level policies alongside network rules.
- Lesson 1588 — Application-Based Firewall Rules
- Linux/Unix Systems
- Lesson 1542 — Login Scripts and Profile Modifications
- Linux/Unix: `getrandom()`
- Lesson 301 — Platform-Specific CSPRNG APIs
- List every data field
- – name, email, location, device ID, browsing history, etc.
- Lesson 2896 — Data Collection Assessment
- List interfaces
- (user interfaces, admin panels, database connections, third-party integrations)
- Lesson 73 — Attack Surface Analysis
- List of revoked certificates
- with their serial numbers and revocation dates
- Lesson 191 — Certificate Revocation Lists (CRLs)
- Listen
- for sensitive data being stored by legitimate tabs
- Lesson 1077 — Cross-Tab and Cross-Origin Storage Attacks
- Listening Ports
- Processes binding to ports reveal backdoors or malicious services waiting for attacker commands.
- Lesson 2393 — Network Artifact Recovery
- Live demonstrations
- of exploit techniques in safe environments
- Lesson 2174 — Debrief and Knowledge Transfer
- Load Balancer Logs
- record every request passing through your load balancers, including client IPs, request paths, response codes, processing times, and SSL/TLS cipher suites.
- Lesson 1919 — Network Forensics in Cloud Environments
- load balancing
- (better performance under heavy traffic).
- Lesson 425 — High Availability and ClusteringLesson 1333 — High Availability and Disaster Recovery
- Load firmware
- into the emulator with appropriate architecture settings
- Lesson 2767 — Firmware Emulation and Dynamic Analysis
- Load the binary
- into your chosen tool with the correct architecture
- Lesson 2762 — Reverse Engineering Firmware Binaries
- Loaded malware
- Code resident only in memory, designed to be "fileless"
- Lesson 2389 — Memory Forensics Fundamentals
- Loading malicious kernel drivers
- signed with stolen or compromised certificates
- Lesson 1547 — Kernel-Mode Rootkits Fundamentals
- Local Authentication framework
- to request biometric authentication.
- Lesson 2707 — Touch ID, Face ID, and Biometric Security
- Local backups
- Encrypted with a key derived from a user passphrase (strong, memorable phrase required)
- Lesson 2947 — E2EE Backup and Multi-Device
- Local caching
- means storing a secret in memory after fetching it once.
- Lesson 1334 — Secret Store Access Patterns
- Local configuration weaknesses
- – missing security settings, weak permissions, dangerous registry keys
- Lesson 2436 — Authenticated Scanning and Credentialed Checks
- Local development environments
- Developers run IAST agents on their machines during manual testing
- Lesson 1382 — IAST Deployment Models and Performance Impact
- Local differential privacy
- Each device adds calibrated noise to its gradients before sharing (like DP-SGD applied locally)
- Lesson 2843 — Federated Learning Privacy
- Local File Disclosure
- Embedding references to `file:///etc/passwd` or other sensitive files, causing parsers to read and include their contents
- Lesson 976 — PDF Processing Vulnerabilities
- Local networking
- Allow connections to unqualified domains/IPs for development
- Lesson 2706 — App Transport Security (ATS)
- Local Port Forwarding
- (`-L`) redirects traffic from a port on your local machine through the SSH server to a destination.
- Lesson 499 — SSH Tunneling Fundamentals
- Local port numbers
- what services are listening
- Lesson 1584 — Host-Based Firewall Architecture and Purpose
- Local security settings
- – firewall rules, user permissions, encryption status
- Lesson 1611 — Agent-Based Vulnerability Assessment
- Localized
- Only a small region needs manipulation
- Lesson 2815 — Adversarial Patches and Object Detection Attacks
- localStorage
- (or sessionStorage) and **httpOnly cookies**, and this decision has major security implications.
- Lesson 794 — JWT Storage and XSS RisksLesson 854 — CSRF in Modern Applications and SPAsLesson 1062 — Browser Storage and Origin IsolationLesson 1072 — Client-Side Storage Overview and Threat ModelLesson 1073 — localStorage and sessionStorage SecurityLesson 1090 — Token Storage in SPAs: Security Trade-offs
- Locate all data
- Search production databases, backups, logs, analytics systems, third-party processors
- Lesson 2936 — Right to Erasure and Deletion
- Locate all personal data
- across databases, logs, backups, and third-party processors
- Lesson 2935 — Right to Access and Data Portability
- Locate forgotten subdomains
- Old pages might link to `staging.
- Lesson 335 — Wayback Machine and Historical Website Analysis
- Location
- (Geographic restrictions on sensitive data)
- Lesson 812 — Context-Dependent Authorization FailuresLesson 1367 — Interpreting and Triaging SAST ResultsLesson 1747 — Conditional Access and Context-Aware MFALesson 2286 — Physical Access Logging and Audit TrailsLesson 2687 — Context-Aware Access Controls
- Location data
- IP addresses, GPS coordinates, cell tower connections
- Lesson 2974 — What is Metadata and Why It Matters
- Location tracking
- Phishing attempts timed when you're traveling or in unfamiliar locations
- Lesson 2700 — User Behavior and Social Engineering
- Locations
- devices in specific countries or cities
- Lesson 333 — Shodan and Internet-Wide Scanning Databases
- Log aggregation
- Container platforms often log environment variables during startup
- Lesson 1321 — Environment Variables in Container and Cloud PlatformsLesson 1966 — Insufficient Logging and MonitoringLesson 2314 — What is a SIEM and Why Organizations Need It
- Log Aggregators
- sit between log sources and your central server, collecting from nearby systems and forwarding in bulk.
- Lesson 1483 — Centralized Log Management Architecture
- Log analysis
- continuously checks that all required HIPAA audit logs are being generated and retained
- Lesson 2622 — Continuous Compliance Monitoring
- Log and monitor
- Maintain audit trails of all access to cardholder data
- Lesson 1980 — PCI DSS in Cloud Environments
- Log injection
- is particularly sneaky: attackers inject malicious payloads into function logs, which downstream log processing functions might execute or parse unsafely.
- Lesson 1944 — Serverless Data Flow and Injection Risks
- Log Manipulation
- Deleting or modifying system logs (Windows Event Logs, Linux syslog, web server logs) to remove traces of authentication, privilege escalation, or lateral movement.
- Lesson 2126 — Covering Tracks and Anti-Forensics
- Log retention policies
- define how long you keep logs in different storage tiers before archival or deletion.
- Lesson 1874 — Log Retention and Lifecycle Policies
- Log rotation
- is like having multiple buckets on a carousel: when one fills, you rotate to the next, archive the full one, and eventually discard the oldest.
- Lesson 1484 — Log Rotation and Retention Policies
- Log sources requiring centralization
- Lesson 1873 — Application and Container Logging
- Log system events
- Process executions, file access, network connections, user logins
- Lesson 1930 — Instance Monitoring and Runtime Protection
- Logger++
- Enhanced request/response logging with powerful filtering
- Lesson 2214 — Burp Extensions and BApp Store
- Logging and monitoring
- Provider offers tools; you configure and review
- Lesson 1682 — Container as a Service Security
- Logging and monitoring depth
- SaaS audit logs show *what happened* in your tenant, but not *how* the provider's infrastructure processed your requests or defended against attacks targeting their platform.
- Lesson 1679 — SaaS Security Limitations
- Logging policies matter
- "No-logs" claims are difficult to verify and jurisdiction matters
- Lesson 471 — VPN Use Case: Privacy and Anonymity
- logic flaws
- exploit the *intended behavior* of an application that wasn't designed securely.
- Lesson 2103 — Logic Flaw and Business Logic TestingLesson 2113 — Web Application Exploitation for RCELesson 2857 — System Prompt Extraction Techniques
- Logic Manipulation
- Lesson 1195 — Client-Side Prototype Pollution Exploitation
- Logical topology
- illustrates how data flows and how devices are organized from an IP addressing and routing perspective.
- Lesson 349 — Network Mapping Fundamentals
- Login
- The server challenges you to prove knowledge of the password
- Lesson 247 — ZKP Applications in Authentication
- Login Attempt Limits
- Systems often track failed login attempts to prevent brute-forcing.
- Lesson 907 — Race Conditions in Authentication and Authorization
- LogRhythm
- Strong case management and workflow automation
- Lesson 2324 — Common SIEM Platforms and Vendor Landscape
- Logs and records
- prove *that* it happened: authentication logs, change management tickets, security event logs, backup completion records, and access reviews.
- Lesson 2618 — Audit Evidence Types and Requirements
- Long Lifecycles
- IoT devices often operate for 10-20 years without updates.
- Lesson 2750 — IoT Attack Surface and Unique Challenges
- Long Term Keys (LTK)
- for future connections without re-pairing.
- Lesson 556 — Bluetooth Pairing and Bonding Mechanisms
- Long-lived credentials
- API keys that never expire create persistent vulnerabilities
- Lesson 1696 — Identity as Attack SurfaceLesson 1722 — Service Account Keys and Credentials
- Long-running fuzzing
- executes deeper tests on main branches overnight or weekly.
- Lesson 3014 — Automated Fuzzing in CI/CD
- Long-term credentials
- are like traditional house keys—they work indefinitely until you explicitly revoke or replace them.
- Lesson 1729 — Temporary Credentials vs Long-Term Credentials
- Long-term keys
- (2-5 years): Root certificate authorities, master encryption keys with strict access controls
- Lesson 316 — Key Expiration and Renewal
- Long-term retention
- for compliance (often years)
- Lesson 1869 — Cloud Logging Architecture and Service Overview
- Long, randomized domain names
- that look like `x7k2m9p4q.
- Lesson 379 — DNS Traffic Analysis and Query Patterns
- Longer durations
- reduce refresh overhead but increase risk
- Lesson 1731 — Session Duration and Token Lifecycle
- Longevity
- No false confidence from obscurity
- Lesson 2630 — Open Design and Security Through TransparencyLesson 2753 — Consumer IoT vs Industrial IoT Threats
- Look for incomplete validations
- Is the server checking everything the client enforces?
- Lesson 936 — Business Logic Testing Fundamentals
- Look for strings
- (URLs, credentials, API keys, error messages)
- Lesson 2762 — Reverse Engineering Firmware Binaries
- Loss Event Frequency
- (how often bad things happen) and **Loss Magnitude** (how much each event costs).
- Lesson 2511 — Quantitative Risk Analysis: Factor Analysis of Information Risk (FAIR)
- Loss Magnitude
- (how much each event costs).
- Lesson 2511 — Quantitative Risk Analysis: Factor Analysis of Information Risk (FAIR)
- Loss of Audit Trail
- Manual changes often lack proper logging or approval workflows, breaking your compliance evidence chain.
- Lesson 2022 — Infrastructure Drift: Causes and Risks
- Loss trajectory analysis
- Samples that cause unusual loss spikes or gradient magnitudes may be poisoned.
- Lesson 2824 — Detecting Poisoned Training Data
- Lost sensitive data
- if you rely on temporary storage for security-critical information
- Lesson 1079 — Storage Quota and Eviction Policies
- Low
- Difficult, requires insider access or rare circumstances
- Lesson 45 — Threat Prioritization BasicsLesson 1458 — MAC in Windows: Mandatory Integrity ControlLesson 2344 — Alert Triage Fundamentals and WorkflowLesson 2482 — Bounty Pricing and Reward StructuresLesson 2548 — Audit Findings and Risk RatingLesson 2613 — FedRAMP Authorization FrameworkLesson 2891 — Privacy Risk Assessment Methodology
- Low (0.1–3.9)
- Minimal impact or difficult to exploit
- Lesson 2446 — CVSS Score Interpretation and Limitations
- Low risk
- (known device, normal location): Allow access with standard authentication
- Lesson 1747 — Conditional Access and Context-Aware MFALesson 1808 — DLP Monitoring and Incident Response
- Low trust
- Deny access or quarantine the session
- Lesson 2676 — Continuous Verification and Dynamic Trust
- Low-risk secrets
- (development environment tokens, read-only API keys) may rotate quarterly or on-demand
- Lesson 1344 — Rotation Strategies and Frequencies
- Low-risk vendors
- No system access or data sharing (office supplies, facilities services)
- Lesson 2534 — Third-Party Risk Fundamentals
- Low-severity
- issues can be batched with regular maintenance updates.
- Lesson 1266 — Dependency Update Strategies and Patching
- Low/P4
- False positives after investigation, informational alerts
- Lesson 2362 — Incident Severity and Priority Classification
- Lower bandwidth
- Transmitting a 256-bit ECC public key versus a 3072-bit RSA key saves network resources
- Lesson 163 — ECC vs RSA: Security and Performance
- Lower latency
- – Direct path reduces hop count and routing delays
- Lesson 1841 — Direct Connect and Dedicated ConnectivityLesson 1845 — Service Endpoints vs Public Internet AccessLesson 1846 — VPC/VNet Service Endpoints Fundamentals
- Loyalty Point Exploits
- Similar to the race conditions you've learned about, attackers can exploit timing windows to redeem the same points multiple times, or manipulate point balances by tampering with transaction sequences during the redemption workflow.
- Lesson 925 — Refund and Credit Manipulation
- LSA Protection
- (RunAsPPL) to prevent untrusted processes from reading LSASS memory.
- Lesson 2120 — LSASS Memory Dumping and Protection Bypasses
M
- MAC
- High-security environments requiring centralized control
- Lesson 19 — Access Control Models: DAC, MAC, and RBAC
- MAC (Mandatory)
- suits environments with strict compliance needs (government, healthcare).
- Lesson 802 — Choosing and Implementing Access Models
- MAC address
- is the hardware identifier burned into every network card—it's how switches know which physical port to send frames to.
- Lesson 406 — MAC Address Spoofing and DuplicationLesson 557 — BLE Privacy and Address Randomization
- MAC address limiting
- Restrict how many MAC addresses can connect to a single port (usually 1-3)
- Lesson 414 — Port Security and MAC Filtering
- MAC address spoofing
- means changing your network card's MAC address to impersonate another device.
- Lesson 406 — MAC Address Spoofing and DuplicationLesson 414 — Port Security and MAC Filtering
- MAC address table
- based on the most recent frame it sees
- Lesson 406 — MAC Address Spoofing and Duplication
- MAC flooding
- is an attacker technique to break out of switch isolation.
- Lesson 404 — Port Mirroring and SPAN Ports
- MAC-then-Encrypt
- computes the MAC over plaintext, then encrypts *both* the plaintext and MAC together.
- Lesson 124 — MAC-then-Encrypt and Encrypt-and-MAC PitfallsLesson 222 — Encrypt-then-MAC vs MAC- then-Encrypt
- MAC-then-Encrypt (MtE)
- MAC the plaintext first, then encrypt everything
- Lesson 222 — Encrypt-then-MAC vs MAC-then-Encrypt
- Machine Learning Approaches
- More advanced systems use algorithms to learn complex patterns over time.
- Lesson 457 — Anomaly-Based Detection Methods
- Machine learning models
- trained on provider-wide threat data
- Lesson 1886 — Cloud Threat Detection OverviewLesson 2447 — EPSS (Exploit Prediction Scoring System)
- Machine-Readable
- Tools like Open Policy Agent (OPA), HashiCorp Sentinel, or cloud-native policy engines can parse and enforce these policies automatically during CI/CD pipelines, infrastructure provisioning, or runtime.
- Lesson 3018 — Policy as Code Fundamentals
- Macro Detection and Blocking
- Most document validation libraries can detect macro presence without executing them.
- Lesson 962 — Document Format Validation for Office Files
- Macro Viruses
- embed themselves in document files like Word or Excel documents.
- Lesson 1519 — Viruses: Self-Replicating Code
- Macro-based attacks
- embed VBA (Visual Basic for Applications) code that executes when enabled.
- Lesson 2250 — Malicious Office Document Generation
- Magic byte verification
- (from previous lessons) checks the file header, but that's not enough.
- Lesson 960 — Image Validation and Metadata StrippingLesson 982 — Multi-Layer File Upload Validation Strategy
- Magic bytes
- (also called file signatures) are specific byte sequences at the beginning of files that identify their true format.
- Lesson 955 — Magic Byte Verification and File Type Detection
- Magic Bytes (File Signatures)
- Lesson 984 — Content-Type and MIME Type Enforcement
- Magic links
- One-time URLs sent to verified email addresses
- Lesson 750 — Passwordless Authentication Fundamentals
- Magnet RAM Capture
- reconstruct the true system state by parsing raw memory structures independently of the OS's APIs—APIs the rootkit has compromised.
- Lesson 1559 — Memory Analysis and Volatile Forensics
- Mail server routing information
- The path your message took
- Lesson 2964 — Metadata Leakage in Encrypted Email
- Mail Servers (Postfix/Exim)
- Lesson 1437 — Service Configuration Hardening
- Mailvelope
- is a browser extension for webmail clients (Gmail, Outlook.
- Lesson 2961 — Email Client Integration and Plugins
- Maintain alignment
- DMARC requires either SPF or DKIM (ideally both) to align with your `From:` domain.
- Lesson 2304 — Email Authentication Best Practices and Common Pitfalls
- Maintain compliance
- with security policies and regulatory requirements
- Lesson 2305 — What is a Security Operations Center (SOC)?
- Maintain documentation
- Prove your controls through policies and evidence
- Lesson 1980 — PCI DSS in Cloud Environments
- Maintain long-term access
- for data exfiltration or monitoring
- Lesson 1536 — Persistence Fundamentals and Attacker Goals
- Maintain metadata
- tracking restriction reasons and expiration conditions
- Lesson 2937 — Rights to Rectification and Restriction
- Maintain security controls
- Never bypass authorization because "something went wrong"
- Lesson 1210 — Fail Securely and Handle Errors Safely
- Maintainability
- Need to revoke a permission?
- Lesson 1711 — IAM Groups: Organizing Users and Permission Sets
- Maintainer absence
- No response to critical bug reports
- Lesson 1267 — Unmaintained Dependencies and End-of-Life Libraries
- Maintaining Relationships
- Treat researchers as partners, not adversaries.
- Lesson 2474 — Communicating with Security Researchers
- Maintains stealth
- Keep the number of flips small enough to avoid degrading overall accuracy metrics
- Lesson 2819 — Label Flipping and Targeted Poisoning
- Maintenance burden
- updates to one part may break security assumptions elsewhere
- Lesson 2632 — Economy of Mechanism (Keep It Simple)Lesson 2667 — Economy of Mechanism
- Maintenance isolation
- Security patching one AZ doesn't require full outages
- Lesson 1834 — Multi-AZ Subnet Design for Resilience
- Maintenance nightmares
- Updating a policy requires hunting down every check
- Lesson 841 — Centralized Authorization Logic
- Maintenance Phase
- Monitor for new vulnerabilities in dependencies, respond to security incidents, patch promptly, and iterate threat models as features evolve.
- Lesson 2732 — Secure Mobile Development Lifecycle
- Maintenance risks increase
- Future developers may misunderstand complex code and introduce new flaws
- Lesson 1216 — Economy of Mechanism and Simplicity
- Maintenance Windows
- Schedule patching during low-traffic periods to minimize service disruption.
- Lesson 1929 — VM Patch Management and Update Strategies
- Maintenance Windows and Scheduling
- prevent patches from disrupting business operations.
- Lesson 3047 — Automated Vulnerability Patching
- MAJOR
- (2): Breaking changes that aren't backward-compatible
- Lesson 1261 — Dependency Versioning and Semantic VersioningLesson 2500 — Risk Calculation and Risk Matrices
- Major vulnerability discoveries
- (even if caught before production)
- Lesson 2070 — Security Retrospectives and Continuous Improvement
- Make HTTP requests
- on behalf of the user with their credentials
- Lesson 634 — JavaScript Execution Contexts in XSS
- Make It Actionable
- Every alert should answer: "What should I do about this?
- Lesson 1896 — Cloud Alert Design Principles
- Make it reversible
- Document exactly what changes your PoC makes so they can be undone
- Lesson 2163 — Proof of Concept Development
- Make privacy controls accessible
- (consent management in the primary user flow, not hidden menus)
- Lesson 2883 — Privacy Embedded into Design
- Makes a gate decision
- pass and continue deployment, or fail and block
- Lesson 1641 — CI/CD Integration and Gating Policies
- Makes auditing manageable
- You can see at a glance which roles have which permissions
- Lesson 1428 — Group Management and Role Separation
- Malicious Advertisements (Malvertising)
- Attackers buy legitimate advertising space or compromise ad networks.
- Lesson 1528 — Drive-by Downloads and Web-Based Infection
- Malicious attachments
- Office documents, PDFs, or executables containing payloads
- Lesson 2247 — Spear-Phishing Attack Vectors
- Malicious charging cables
- that look identical to legitimate ones but contain hidden chips for keystroke injection or data theft
- Lesson 2277 — USB Drop Attacks and Malicious Devices
- Malicious clients
- Recipients can use modified apps that ignore deletion timers
- Lesson 2956 — Disappearing Messages and Perfect Forward Secrecy
- Malicious DLLs
- Libraries loaded without corresponding disk files, or legitimate DLL names loaded from wrong locations.
- Lesson 2394 — Memory-Resident Malware Detection
- Malicious documents
- embed exploits in Office files (`.
- Lesson 2116 — Client-Side Exploitation Techniques
- Malicious insiders
- deliberately abuse their access—stealing data for profit, sabotaging systems out of revenge, or selling credentials to external attackers.
- Lesson 52 — Insider Threats and Privileged Access Abuse
- Malicious links
- URLs redirecting to credential harvesters or exploit kits
- Lesson 2247 — Spear-Phishing Attack Vectors
- Malicious processes
- spawned inside running containers
- Lesson 1651 — Container Runtime Security Overview
- Malicious Registration
- If an attacker finds an XSS vulnerability or injects script into a page, they can register their own service worker:
- Lesson 1082 — Service Worker Registration and Hijacking
- Malicious rogue APs
- Deliberately installed by attackers to intercept traffic, steal credentials, or gain unauthorized network access
- Lesson 533 — Rogue Access Points: Definition and Threat Model
- Malicious security
- Basic protocol assumes honest-but-curious parties; defending against cheating requires expensive zero-knowledge proofs or cut-and-choose techniques
- Lesson 258 — Garbled Circuits for Two-Party Computation
- Malicious stickers or media
- can exploit rendering vulnerabilities in the client app.
- Lesson 2957 — Encrypted Messaging Attacks and Vulnerabilities
- Malware
- sometimes manipulates system time to evade detection or exploit old vulnerabilities
- Lesson 188 — Time Validation and Clock AttacksLesson 1748 — MFA Bypass Vulnerabilities and Attacks
- Malware Propagation
- treats USB drives like digital rats spreading plague between air-gapped networks.
- Lesson 1530 — Removable Media and USB-Based Attacks
- Malware Removal
- Delete identified malicious files, registry keys, scheduled tasks, and persistence mechanisms.
- Lesson 2367 — Eradication: Removing the Threat Actor
- Man-in-the-Browser
- attacks use malware (trojans, browser extensions, or compromised plugins) installed directly on the victim's machine.
- Lesson 721 — Man-in-the-Browser and Session Riding
- Man-in-the-Browser (MitB)
- attacks and **Session Riding** take exploitation to another level by operating *inside* your browser itself.
- Lesson 721 — Man-in-the-Browser and Session Riding
- man-in-the-middle
- (MITM).
- Lesson 393 — ARP Spoofing for MITM PositioningLesson 408 — Router Advertisement Attacks (IPv6)Lesson 713 — Session Hijacking FundamentalsLesson 2206 — Configuring Burp Proxy and Browser Setup
- Man-in-the-Middle (MITM) attack
- occurs when an attacker secretly inserts themselves into a communication path between a victim and their intended destination.
- Lesson 392 — Man-in-the-Middle Attack FundamentalsLesson 2953 — Safety Numbers and Key Verification
- Man-in-the-middle attacks
- Attackers can position themselves between victims and legitimate network resources
- Lesson 533 — Rogue Access Points: Definition and Threat ModelLesson 1294 — Package Signing and GPG VerificationLesson 1748 — MFA Bypass Vulnerabilities and Attacks
- Man-in-the-middle during key exchange
- occurs when users ignore safety number mismatches or skip verification entirely.
- Lesson 2957 — Encrypted Messaging Attacks and Vulnerabilities
- Managed
- Security metrics tracked; continuous monitoring occurs
- Lesson 34 — Security Maturity Models and AssessmentLesson 1714 — Managed Policies vs Inline Policies
- Managed (base) policies
- Primary policies controlling overall system behavior
- Lesson 1594 — Windows Defender Application Control (WDAC)
- Managed app catalogs
- within MDM/EMM solutions let administrators publish both public store apps and internal (line- of-business) apps to enrolled devices.
- Lesson 2746 — Mobile App Distribution and Whitelisting
- Managed Policy Attachment
- If you have `iam:AttachUserPolicy`, you can attach the `AdministratorAccess` managed policy to your own user account, instantly gaining full control.
- Lesson 1755 — Policy Attachment and Modification Escalation
- Managed vs. Supplemental Policies
- Lesson 1594 — Windows Defender Application Control (WDAC)
- Management
- Compliance percentages, trend lines, SLA adherence metrics
- Lesson 2461 — Patch Compliance Monitoring and Reporting
- Management and Leadership
- need executive summaries, not raw technical data.
- Lesson 2312 — Collaboration with Other Teams
- Management Events
- capture control plane operations: creating resources, modifying configurations, managing IAM policies.
- Lesson 1871 — CloudTrail for API Activity Monitoring
- Management review records
- Lesson 2607 — ISMS Documentation Requirements
- Management reviews
- are periodic leadership evaluations where executives assess the ISMS performance, resource needs, and improvement opportunities.
- Lesson 2608 — Internal Audits and Management Review
- Management Server
- Central console where admins configure policies and view device status
- Lesson 2742 — Mobile Device Management (MDM) Fundamentals
- Managing False Positives
- is crucial—not every flagged CVE affects your code path.
- Lesson 1273 — SCA Tool Integration and Configuration
- Managing the budget
- Lesson 2914 — Privacy Budget and Epsilon
- mandate
- it.
- Lesson 1490 — Log Management for ComplianceLesson 1768 — Hardware Security Modules (HSMs) in Cloud
- mandatory
- for all human users, especially those with administrative access.
- Lesson 1709 — IAM Best Practices and Security BaselineLesson 1996 — Cloud Resource Tagging Strategy and Standards
- Mandatory Access Control (MAC)
- flips this paradigm: *the system enforces security policies that users cannot override*.
- Lesson 1450 — MAC vs DAC: Fundamental DifferencesLesson 2279 — Physical Access Control Models and Zones
- Mandatory Integrity Control (MIC)
- in Windows Vista to add a layer of mandatory access control.
- Lesson 1458 — MAC in Windows: Mandatory Integrity Control
- Mandatory modern crypto
- Only supports cipher suites compatible with lightweight algorithms like those from "Lightweight Cryptographic Algorithms" and the ECC curves you learned in "Elliptic Curve Cryptography for IoT.
- Lesson 2795 — DTLS and TLS 1.3 for IoT
- Manipulate identifiers and parameters
- to probe boundaries
- Lesson 831 — Authorization Testing Methodology
- Manipulate kernel objects
- like process lists and file system structures
- Lesson 1547 — Kernel-Mode Rootkits Fundamentals
- Manipulates IDs
- so the application processes the forged assertion while the signature validator checks the original
- Lesson 779 — XML Signature Wrapping Attacks
- Manual
- Human reviews finding, researches, plans, and executes fix
- Lesson 3044 — Automated Remediation Fundamentals
- Manual approval
- Human review for production deployments, high-risk changes
- Lesson 1403 — Pipeline Security and Release Gates
- Manual backup
- Many apps show the seed as a text string (like `JBSWY3DPEHPK3PXP`).
- Lesson 743 — Authenticator Apps and Seed Management
- Manual Changes
- Engineers make emergency fixes directly in the cloud console or CLI, bypassing IaC workflows.
- Lesson 2022 — Infrastructure Drift: Causes and Risks
- Manual Cloning
- Attackers visit a legitimate login page, save the HTML/CSS/JavaScript, and modify form actions to POST credentials to their server instead of the legitimate authentication endpoint.
- Lesson 2256 — Credential Harvesting Pages
- Manual code review
- identifies logic flaws
- Lesson 1275 — SCA Limitations and Best PracticesLesson 2098 — Manual vs Automated Discovery Approaches
- Manual connection
- Use basic network tools to connect directly to a port (e.
- Lesson 358 — Banner Grabbing Fundamentals
- Manual DNS Override
- Lesson 508 — DNS Leak Prevention
- Manual encoding
- means you, the developer, explicitly call encoding functions every time you output data:
- Lesson 1224 — Template Auto-Escaping vs Manual Encoding
- Manual enumeration
- involves running Windows commands to check specific conditions:
- Lesson 2138 — Windows Privilege Escalation Enumeration and Tools
- Manual Key Distribution
- Lesson 313 — Key Distribution Mechanisms
- Manual key exchange
- Sending public keys via separate channels
- Lesson 2965 — Usability Challenges and Key Management UX
- Manual proxy interception
- Modify JSON/POST data in Burp Repeater
- Lesson 601 — Detecting and Testing for NoSQL Injection
- Manual Reviews and Audits
- catch what automation misses.
- Lesson 2496 — Policy Compliance Monitoring and Enforcement
- Manual rotation
- Create new key versions for controlled migrations
- Lesson 1797 — Key Management for Database Encryption
- Manual Security Testing
- represents expert review that automation can't replace—context-aware threat analysis, business logic flaws, and sophisticated attack chains.
- Lesson 2741 — Mobile Security Testing and CI/CD
- Manual testing shines when
- Lesson 942 — Manual vs Automated Business Logic Testing
- Manual-only scenarios
- Lesson 3044 — Automated Remediation Fundamentals
- Map access control boundaries
- (what resources exist, who should access what)
- Lesson 831 — Authorization Testing Methodology
- Map all security controls
- across your layers (physical, network, application, data)
- Lesson 30 — Weakest Link Analysis
- Map compliance requirements
- – Which workloads handle sensitive data and must enforce encryption?
- Lesson 1780 — Transit Encryption Monitoring and Compliance
- Map connections
- – Traceroute paths show how devices link together
- Lesson 351 — Network Diagramming from Scan Results
- Map inherited controls
- to your required framework (HIPAA, PCI DSS, GDPR)
- Lesson 1985 — Cloud Compliance Inheritance and Mapping
- Map out functions
- related to authentication, network handling, or crypto
- Lesson 2762 — Reverse Engineering Firmware Binaries
- Map threats to assets
- Each threat from your model (e.
- Lesson 2514 — Threat Modeling Integration with Risk Analysis
- Map to data sources
- (what logs capture this behavior?
- Lesson 2181 — ATT&CK for Detection and Analytics
- Map to log sources
- (what events capture this behavior?
- Lesson 2319 — Use Cases and Detection Content Development
- Map trust boundaries
- Note where untrusted data crosses into trusted zones
- Lesson 73 — Attack Surface Analysis
- Map your API surface
- – identify all endpoints and their parameters
- Lesson 1026 — Authorization Testing Automation
- Map-reduce functions
- – Custom JavaScript code that processes data collections
- Lesson 599 — Server-Side JavaScript Injection
- mapping
- between an unpredictable reference token and the actual resource.
- Lesson 843 — Indirect Object ReferencesLesson 2317 — Event Normalization and Parsing
- Maps API endpoints
- – Discovers AJAX calls and REST endpoints through JavaScript analysis
- Lesson 1371 — Crawling and Application Discovery
- Marginal
- Some confidence (typically requires multiple marginal signatures)
- Lesson 2959 — PGP/GPG Key Management and Web of Trust
- Mark privilege changes
- Every trust boundary crossing is a potential attack vector
- Lesson 2637 — Creating Architecture Data Flow Diagrams
- Mark safe content explicitly
- Use framework-specific mechanisms (`|safe`, `mark_safe()`) only when absolutely necessary
- Lesson 1247 — Auto-Escaping Mechanisms and Configuration
- Mask attacks
- excel when you have intelligence from password policies, leaked formats, or user behavior patterns.
- Lesson 2229 — Brute-Force and Mask AttacksLesson 2234 — Cloud-Based and Distributed Cracking
- Masking
- randomizes intermediate values during computation so power consumption doesn't correlate directly with secret data—like shuffling cards before each deal.
- Lesson 2772 — Side-Channel Attacks: Power Analysis
- Masking protocols
- Participants add random masks that cancel out during aggregation
- Lesson 2844 — Secure Aggregation and Privacy Amplification
- Mass access attempts
- Rapid-fire requests to enumerate resources
- Lesson 844 — Authorization Logging and Monitoring
- Mass assignment
- occurs when an ORM blindly copies all user-supplied fields to a model, allowing attackers to modify sensitive attributes like `is_admin`, `account_balance`, or `role` that should never be user-controlled.
- Lesson 1241 — Mass Assignment and ORM Injection
- master key
- .
- Lesson 1326 — HashiCorp Vault ArchitectureLesson 1793 — Transparent Data Encryption (TDE)
- Master Key Backup
- Companies use secret sharing to protect their root encryption keys.
- Lesson 326 — Secret Sharing in Practice
- Match = safe
- If hashes match, the package is authentic and unmodified; if not, installation fails
- Lesson 1293 — Package Integrity and Checksums
- Match components
- against vulnerability databases (CVE, NVD, GitHub Security Advisories)
- Lesson 3011 — Software Composition Analysis (SCA) Automation
- Match VLANs to subnets
- Each VLAN should correspond to a specific subnet for clearer boundaries
- Lesson 2649 — VLAN and Subnet Segmentation
- Matches them
- against known vulnerabilities in its database
- Lesson 1305 — Trivy for Container and Dependency Scanning
- Mathematical foundation
- Ring Learning with Errors (RLWE) problem
- Lesson 252 — FHE Schemes: BGV, BFV, and CKKS
- Maturity Assessment
- Lesson 2296 — Measuring and Improving Security Culture
- Max lifetime settings
- Configure pools to recycle connections periodically (e.
- Lesson 1347 — Database Credential Rotation
- Maximize misclassification confidence
- (ensure the attack works)
- Lesson 2812 — C&W Attack and Optimization-Based Methods
- maximum
- permissions an identity can have, even if broader policies are attached.
- Lesson 1754 — Permission Boundary Bypass TechniquesLesson 2918 — Composition Theorems
- MD5
- Collisions can be generated in seconds on modern hardware.
- Lesson 208 — MD5 and SHA-1: Broken Hash FunctionsLesson 2225 — Password Cracking Fundamentals
- MD5 (128-bit)
- is broken: 2^64 operations are achievable
- Lesson 202 — The Birthday Paradox and Collision Probability
- Mean time to detect
- translates to "Protected $2M in potential revenue loss through faster incident containment"
- Lesson 2533 — Communicating Metrics to Leadership
- Measurable
- – You must be able to collect reliable, consistent data.
- Lesson 2526 — Designing Effective Security Metrics
- Measure attack success rate
- (accuracy, AUC, TPR@low FPR)
- Lesson 2845 — Privacy Auditing and Empirical Measurement
- Measure exposure
- (quantify how accessible your system is to attackers)
- Lesson 73 — Attack Surface Analysis
- Measure impact
- Track metric changes after targeted interventions
- Lesson 2296 — Measuring and Improving Security Culture
- Measure improvements
- Track decision speed, communication effectiveness, and technical proficiency over time
- Lesson 2374 — IR Training and Exercises
- Measuring Execution Time
- Lesson 1182 — Testing for ReDoS Vulnerabilities
- Mechanical locks
- use pins, tumblers, or wafers that align when the correct key is inserted.
- Lesson 2283 — Lock Types and Physical Key Management
- Mechanism Evidence
- Log how consent was captured (web form submission, API call, signed document).
- Lesson 2934 — Consent Records and Proof of Consent
- Media
- USB drives, CDs, backup tapes, and external drives that weren't properly wiped or destroyed.
- Lesson 2275 — Dumpster Diving and Waste ExploitationLesson 2588 — HIPAA Breach Notification Requirements
- Medical research
- Hospitals encrypt patient records, researchers analyze encrypted data for patterns, and results are returned encrypted—protecting patient privacy throughout.
- Lesson 2924 — Homomorphic Encryption Applications
- Medium
- Requires some skill or specific conditions
- Lesson 45 — Threat Prioritization BasicsLesson 1458 — MAC in Windows: Mandatory Integrity ControlLesson 2331 — Response Actions and Containment AutomationLesson 2344 — Alert Triage Fundamentals and WorkflowLesson 2482 — Bounty Pricing and Reward StructuresLesson 2548 — Audit Findings and Risk RatingLesson 2891 — Privacy Risk Assessment Methodology
- Medium (4.0–6.9)
- Moderate impact with some complexity
- Lesson 2446 — CVSS Score Interpretation and Limitations
- Medium risk
- (new device, familiar location): Require MFA
- Lesson 1747 — Conditional Access and Context-Aware MFALesson 1808 — DLP Monitoring and Incident Response
- Medium trust
- Require step-up authentication (MFA prompt)
- Lesson 2676 — Continuous Verification and Dynamic Trust
- Medium vulnerabilities
- Warning, but allow build
- Lesson 1398 — Build-Time SAST IntegrationLesson 2453 — Vulnerability Age and Remediation SLAs
- Medium-risk changes
- Automated scans + lightweight review
- Lesson 2062 — Balancing Security and Velocity
- Medium-risk secrets
- (service API keys, application credentials) typically rotate monthly or quarterly
- Lesson 1344 — Rotation Strategies and Frequencies
- Medium-severity issues
- can wait for your next sprint.
- Lesson 1266 — Dependency Update Strategies and Patching
- Medium-term keys
- (months to 1-2 years): TLS certificates, signing keys for active software
- Lesson 316 — Key Expiration and Renewal
- Medium/P3
- Policy violations, isolated suspicious activity
- Lesson 2362 — Incident Severity and Priority Classification
- Meet the intent
- of the original requirement (protect the same asset)
- Lesson 26 — Compensating Controls
- Membership inference
- allows attackers to determine whether a specific individual's data was used in training—imagine identifying if someone's medical record was in a hospital's training dataset.
- Lesson 2836 — Privacy Risks in Machine Learning
- membership inference attack
- attempts to answer a yes-or-no question: "Was this exact data point used to train your machine learning model?
- Lesson 2831 — Membership Inference AttacksLesson 2837 — Membership Inference Attacks
- Memory
- 10-50% additional heap usage
- Lesson 1382 — IAST Deployment Models and Performance ImpactLesson 2157 — Credential Harvesting for PivotingLesson 2232 — Rainbow Tables and Time-Memory Tradeoffs
- Memory acquisition
- creates a bit-for-bit copy of RAM while the system runs (or immediately after).
- Lesson 1559 — Memory Analysis and Volatile Forensics
- Memory analysis tools
- LiME (Linux Memory Extractor) adapted for cloud instances
- Lesson 1922 — Cloud Forensics Tools and Legal Considerations
- Memory capture
- (if possible) – Use forensic agents to dump RAM contents
- Lesson 1906 — Evidence Preservation in Cloud Environments
- Memory dumping
- of embedded secrets or encryption keys
- Lesson 2777 — Hardware Cloning and Counterfeit Prevention
- Memory dumps
- from compromised containers or instances
- Lesson 1735 — Credential Theft and Token Security
- Memory footprint
- Requires gigabytes of RAM for modest computations
- Lesson 253 — Performance Characteristics and LimitationsLesson 2794 — Elliptic Curve Cryptography for IoT
- Memory forensics
- Analyze raw memory to find artifacts the rootkit cannot hide, such as unlinked processes or hidden network connections.
- Lesson 1557 — Rootkit Detection Challenges and FundamentalsLesson 2407 — Anti-Forensics Detection and Encrypted Volumes
- Memory introspection
- The hypervisor can read raw guest memory without using OS APIs that rootkits might have hooked
- Lesson 1563 — Hardware-Assisted Detection Techniques
- Memory isolation
- WASM has its own linear memory space, separate from JavaScript heap
- Lesson 1086 — WebAssembly Security Boundaries
- Memory protection
- Ensure keys in memory aren't readable by other processes (OS-enforced boundaries)
- Lesson 310 — Key Access Control and Isolation
- Memory Scrubbing
- Lesson 1555 — Anti-Detection Techniques
- Memory usage
- Detection engines and signature databases occupy RAM
- Lesson 1569 — Real-Time Protection and Scanning Strategies
- Memory-only (JavaScript variable)
- Lesson 1090 — Token Storage in SPAs: Security Trade-offs
- Menu-driven interface
- for common post-exploitation tasks
- Lesson 2244 — Evil-WinRM and PowerShell Remoting Attacks
- Merchant Levels
- Lesson 2569 — PCI-DSS Overview and Scope
- Merchants
- accepting card payments (e-commerce sites, retailers, restaurants)
- Lesson 2569 — PCI-DSS Overview and Scope
- Mesh
- Every peer connects directly to every other peer.
- Lesson 495 — WireGuard Network Architecture and Routing
- Mesh networks
- operate without centralized infrastructure at all.
- Lesson 2997 — Decentralized and P2P Circumvention
- Message 1
- `Plaintext1 XOR Keystream = Ciphertext1`
- Lesson 119 — Nonce Management in Stream CiphersLesson 514 — WPA2 Architecture and 4-Way Handshake
- Message 2
- `Plaintext2 XOR Keystream = Ciphertext2`
- Lesson 119 — Nonce Management in Stream CiphersLesson 514 — WPA2 Architecture and 4-Way Handshake
- Message 3
- Access point creates the same PTK using the same ingredients, confirms everything matches, and sends the Group Temporal Key (GTK) for broadcast traffic
- Lesson 514 — WPA2 Architecture and 4-Way Handshake
- Message 4
- Your device acknowledges receipt, and encrypted communication begins
- Lesson 514 — WPA2 Architecture and 4-Way Handshake
- Message Authentication Codes (MACs)
- These verify message integrity.
- Lesson 1446 — SSH Protocol Version and Cipher Selection
- Message injection
- occurs when attackers insert malicious payloads into WebSocket messages, similar to SQL injection or XSS, but targeting the WebSocket data stream.
- Lesson 1070 — WebSocket Injection and Message Tampering
- Message Layer Security (MLS)
- is an IETF-standardized protocol designed specifically for efficient group messaging with end-to- end encryption.
- Lesson 2950 — Message Layer Security (MLS) for Group Messaging
- Message Limits
- Lesson 130 — AEAD Security Properties and Limitations
- Message Tampering
- Service workers can intercept `postMessage` communications between your page and other windows or workers, reading sensitive data or injecting malicious commands.
- Lesson 1084 — Service Worker Message Interception
- MessagePack
- , and **FlatBuffers** take a fundamentally different approach:
- Lesson 1191 — Alternative Serialization Formats
- Messaging applications
- (Slack, Teams, WhatsApp) store chat logs locally in app-specific databases or encrypted containers, requiring app-aware parsers.
- Lesson 2406 — Email and Communication Forensics
- Metadata
- Timestamps, message IDs, algorithm identifiers
- Lesson 129 — Associated Data in AEADLesson 327 — OSINT Fundamentals and Information SourcesLesson 550 — Wireless Packet Capture and AnalysisLesson 2386 — Cloud and Virtual Environment EvidenceLesson 2951 — Metadata Leakage in Encrypted Messaging SystemsLesson 2956 — Disappearing Messages and Perfect Forward SecrecyLesson 2976 — Traffic Analysis and Correlation Attacks
- Metadata Analysis
- Examining file names, bucket tags, database schemas, and object properties to identify potentially sensitive resources without reading contents.
- Lesson 1802 — Data Discovery and Inventory
- Metadata and tagging
- helps track ownership and purpose:
- Lesson 1721 — Creating and Managing Service Accounts
- Metadata exposure
- Training details or dataset information revealing sensitive business logic
- Lesson 2876 — Model Repository Security
- Metadata Stripping
- Remove author information, revision history, and hidden content that might contain sensitive data or tracking mechanisms.
- Lesson 962 — Document Format Validation for Office FilesLesson 982 — Multi-Layer File Upload Validation Strategy
- Metasploit
- remains the Swiss Army knife for exploitation with its massive module library, database integration, and post-exploitation capabilities.
- Lesson 2216 — Exploitation Framework LandscapeLesson 2217 — Metasploit vs. Alternative Frameworks
- Metrics & Reporting
- – Do you track MTTD (Mean Time to Detect) and MTTR (Mean Time to Respond)?
- Lesson 2313 — SOC Maturity Models
- Metrics and Measurement
- Modern platforms (like GoPhish) track:
- Lesson 2289 — Phishing Simulation Programs
- Metrics and reporting
- Program performance dashboards
- Lesson 2071 — Introduction to Bug Bounty Programs
- MFA devices
- as a second factor (virtual, hardware, or SMS-based)
- Lesson 1710 — IAM Users: Creation, Authentication, and Lifecycle
- Micro-segmentation
- goes much further, creating isolated security zones around *individual workloads*, virtual machines, or even containers.
- Lesson 451 — Micro-segmentation Concepts
- Micro-segmentation tools
- (like software-defined networking or host-based firewalls) enforce policies at the workload level, even within the same subnet—ideal for zero-trust architectures.
- Lesson 2650 — Segmentation Enforcement Mechanisms
- Microprobing
- Accessing internal buses (like JTAG or memory interfaces) to dump firmware or keys directly
- Lesson 2775 — Physical Tampering and Anti-Tamper Mechanisms
- microsegmentation
- Lesson 1925 — Instance Security Groups and Network IsolationLesson 2679 — Zero Trust Network Segmentation
- Microservices
- communicate constantly via internal APIs.
- Lesson 891 — SSRF in Modern ArchitecturesLesson 2651 — Application-Layer Segmentation
- Microsoft Outlook
- requires third-party plugins since it lacks native PGP support.
- Lesson 2961 — Email Client Integration and Plugins
- Mid-Level
- Multiple certifications, proficiency in multiple exploitation frameworks, report writing expertise, client-facing skills.
- Lesson 2089 — Penetration Testing Career Paths
- Middle relay
- Knows neither your IP nor destination, just passes encrypted traffic
- Lesson 2983 — Tor Network ArchitectureLesson 2984 — How Onion Routing Works
- Middle relays
- Transit-only, never see unencrypted traffic
- Lesson 2983 — Tor Network ArchitectureLesson 2985 — Tor Relays: Guard, Middle, and Exit
- MIME sniffing
- trying to detect the "real" file type by examining content, not just the extension or header.
- Lesson 949 — MIME Type Confusion Attacks
- Mimikatz
- read LSASS memory to extract plaintext passwords, NTLM hashes, and Kerberos tickets from logged-in users.
- Lesson 2119 — Credential Dumping Fundamentals
- Minimal harm
- Avoid disrupting business operations whenever possible
- Lesson 2084 — Legal and Ethical Considerations
- Minimal images
- (like Alpine Linux or distroless) contain only essential binaries—no package managers, shells, or extra tools.
- Lesson 1643 — Base Image Selection and Provenance
- Minimize copies
- Avoid passing secrets through multiple functions or objects where each creates a new copy in memory.
- Lesson 1341 — Secret Caching and Memory Management
- Minimize dwell time
- (how long attackers remain undetected)
- Lesson 2305 — What is a Security Operations Center (SOC)?
- Minimize Installed Software
- Lesson 1924 — Instance Launch Security and AMI Hardening
- Minimize inter-VLAN routing
- Force traffic between VLANs through firewalls, not simple routing
- Lesson 2649 — VLAN and Subnet Segmentation
- Minimize privileged pods
- Prevent containers from accessing the host's kubelet certificates or tokens
- Lesson 1671 — Kubelet Security and Node Hardening
- Minimize the perturbation size
- (keep changes small)
- Lesson 2812 — C&W Attack and Optimization-Based Methods
- Minimum 12 characters
- (preferably 14-16 for sensitive systems)
- Lesson 695 — Password Length vs Complexity Trade-offs
- Minimum recommendations
- Lesson 223 — HMAC Truncation and Output Length Selection
- MINOR
- (4): New features that are backward-compatible
- Lesson 1261 — Dependency Versioning and Semantic Versioning
- Mirai
- , a botnet that infected hundreds of thousands of IoT devices like security cameras, DVRs, and routers using a simple strategy: scanning the internet for devices with factory-default credentials.
- Lesson 2799 — Mirai and Its LegacyLesson 2800 — Default Credentials and Weak Authentication
- Mirai variants
- Lesson 2799 — Mirai and Its Legacy
- Miscellaneous
- Business cards, shipping labels, vendor invoices, and expired access badges.
- Lesson 2275 — Dumpster Diving and Waste Exploitation
- Misconfiguration at scale
- One insecure template can instantly create hundreds of vulnerable resources
- Lesson 2012 — Infrastructure as Code Fundamentals and Security Implications
- Misconfiguration protection
- If firewall rules are accidentally removed, the service remains unreachable
- Lesson 1436 — Network Service Binding
- Misconfigurations
- like running as root or exposed ports
- Lesson 1400 — Container and Image ScanningLesson 1635 — Trivy and Open Source ScannersLesson 2434 — Vulnerability Scanning FundamentalsLesson 3012 — Container and Image Scanning
- Misconfigured Capabilities
- Granting excessive Linux capabilities (like `CAP_SYS_ADMIN`) can enable container processes to manipulate kernel features and mount host filesystems.
- Lesson 1626 — Container Escape Vulnerabilities
- Misconfigured custom scripts
- A SUID shell script or binary that calls other programs without absolute paths—you can manipulate `PATH` to inject malicious executables.
- Lesson 2141 — SUID/SGID Binary Exploitation
- Mismatched domain names
- (certificate for "example.
- Lesson 380 — TLS/SSL Traffic Analysis and Certificate Inspection
- Mismatched vendor information
- (SSID says "CompanyWiFi" but MAC address belongs to consumer router)
- Lesson 536 — Detecting Rogue Access Points
- Missed checks
- Developers might forget to add authorization in new features
- Lesson 841 — Centralized Authorization Logic
- Missing Access Control
- Lesson 953 — Server-Side File Overwrite Vulnerabilities
- Missing Asset Inventory
- Without a central registry tracking all deployed APIs, shadow APIs proliferate—created by different teams, deployed to various environments, and forgotten during security reviews.
- Lesson 1035 — API9:2023 - Improper Inventory Management
- Missing authorization checks
- Protecting the UI button but forgetting to protect the actual API endpoint—attackers simply call the endpoint directly.
- Lesson 803 — Broken Access Control OverviewLesson 813 — IDOR Fundamentals and Common Patterns
- Missing conditions
- No MFA requirement, no IP restrictions on sensitive roles
- Lesson 1743 — Cross-Account Access Auditing
- Missing External ID
- Third-party accounts might impersonate legitimate users without the External ID check
- Lesson 1744 — Common Cross-Account Misconfigurations
- Missing memory limits
- Requests that return massive datasets exhaust RAM
- Lesson 1030 — API4:2023 - Unrestricted Resource Consumption
- Missing query complexity controls
- Database queries run without resource boundaries
- Lesson 1030 — API4:2023 - Unrestricted Resource Consumption
- Missing Rate Limiting
- permits password brute-forcing
- Lesson 2106 — Chaining Vulnerabilities for Impact
- Missing security events
- like failed authentication attempts or suspicious input patterns
- Lesson 1966 — Insufficient Logging and Monitoring
- Missing security headers
- (observes real HTTP responses)
- Lesson 3010 — Dynamic Application Security Testing (DAST) Deep Dive
- Missing Token Expiration
- Tokens that never expire or have excessively long lifetimes give attackers unlimited time to steal and exploit them.
- Lesson 1028 — API2:2023 - Broken Authentication
- Mission Impact
- – How critical is the affected system to *your organization's mission*?
- Lesson 2448 — SSVC (Stakeholder-Specific Vulnerability Categorization)
- misuse cases
- and **abuse cases** flip the script.
- Lesson 71 — Misuse and Abuse CasesLesson 2029 — Abuse Cases and Misuse CasesLesson 2030 — Security User Stories
- Mitigation assignment rate
- Are identified threats actually assigned controls?
- Lesson 84 — Measuring Threat Modeling Effectiveness
- Mitigations
- Lesson 46 — Documenting Threat ModelsLesson 1054 — Browser Security Features and Isolation
- MITM path
- Your computer → Attacker → Internet → Server (increased RTT)
- Lesson 413 — Timing and Latency Analysis
- Mixed encoding
- Attackers combine URL encoding with other schemes.
- Lesson 1160 — URL Encoding Attacks and Bypasses
- Mixed Encodings
- Combine techniques: `<script%3E` mixes HTML entity and URL encoding.
- Lesson 649 — Character Encoding Bypasses
- Mixed security modes
- allowing downgrade attacks
- Lesson 547 — 802.1X Security Considerations and Attacks
- Mixing approaches
- Combining safe parameters with unsafe string concatenation in the same query
- Lesson 1237 — Parameterized Queries and Prepared Statements
- MLS (Multi-Level Security) policy
- implements the formal security models you learned earlier (Bell-LaPadula), enforcing classification levels (TOP SECRET, SECRET, etc.
- Lesson 1454 — SELinux Modes and Policy Types
- Mobile Application Management (MAM)
- focuses on managing, securing, and distributing *specific applications* rather than entire devices.
- Lesson 2744 — Mobile Application Management (MAM)
- Mobile apps
- with embedded webviews using cookie-based sessions
- Lesson 854 — CSRF in Modern Applications and SPAs
- Mobile Attack Surface Overview
- , you discovered *what* makes mobile devices vulnerable.
- Lesson 2693 — Mobile vs Desktop Threat Differences
- Mobile Device Management (MDM)
- systems, or **Unified Endpoint Management (UEM)** platforms to continuously monitor and enforce device compliance.
- Lesson 2678 — Device Trust and Endpoint Security
- Mobile-friendly
- Less computation power needed for equivalent security
- Lesson 227 — ECDSA: Elliptic Curve Digital Signature Algorithm
- Modbus
- uses a master-slave architecture where a controller (master) polls field devices (slaves) for readings or sends control commands.
- Lesson 2787 — BACnet and Modbus Protocol Security
- Model extraction
- through repeated queries can reconstruct proprietary models.
- Lesson 2854 — LLM Architecture and Attack Surface
- Model inversion
- is the process of reconstructing actual training data samples—or approximate replicas—by querying a trained model repeatedly and analyzing its outputs.
- Lesson 2832 — Model Inversion and Attribute InferenceLesson 2836 — Privacy Risks in Machine Learning
- Model inversion and extraction
- involve stealing information about the model itself or its training data through carefully designed queries, potentially revealing sensitive information or intellectual property.
- Lesson 2807 — Introduction to Adversarial Machine Learning
- Model pruning
- Remove neurons with low utility on clean data (backdoors often hide in these)
- Lesson 2826 — Defense Strategies Against Poisoning
- Model selection randomness
- Randomly pick which model from an ensemble to use
- Lesson 2852 — Ensemble and Randomization Defenses
- Model tampering
- Malicious actors replacing legitimate models with poisoned versions
- Lesson 2876 — Model Repository Security
- Moderate-risk vendors
- Limited system integration or non-sensitive data exposure (marketing tools, analytics platforms)
- Lesson 2534 — Third-Party Risk Fundamentals
- Modern C projects
- Prefer `strlcpy()`/`strlcat()` if available
- Lesson 1228 — Safe String Handling Alternatives
- Modern Design
- BLAKE3 uses tree hashing, allowing parallel computation across multiple CPU cores, perfect for hashing large files or datasets.
- Lesson 215 — Specialized Hash Functions: BLAKE2, BLAKE3
- Modified Base Metrics
- Recalculate attack vectors or impact based on your environment (e.
- Lesson 2445 — CVSS Temporal and Environmental Metrics
- Modified kernel structures
- Altered function pointers, driver lists, or callback registrations
- Lesson 1559 — Memory Analysis and Volatile Forensics
- Modified system behavior
- Testing if sandboxing allows reading restricted files
- Lesson 2708 — iOS Jailbreaking and Detection
- Modified update mechanisms
- that accept unsigned or malicious firmware
- Lesson 2765 — Firmware Backdoors and Persistent Threats
- Modified USB hubs
- that silently compromise all connected devices
- Lesson 2277 — USB Drop Attacks and Malicious Devices
- Modify
- parameters that the UI wouldn't normally allow (negative numbers, different user IDs, skipped steps)
- Lesson 943 — Proxy-Based Business Logic TestingLesson 2874 — Model Artifact Security and Signing
- Modify API responses
- Change server data before the app processes it
- Lesson 2726 — Dynamic Analysis and Runtime Instrumentation
- Modify data
- `UPDATE users SET role='admin' WHERE id=5`
- Lesson 580 — Stacked Queries and Multiple Statements
- Modify existing page elements
- to trigger malicious actions
- Lesson 646 — Persistent Backdoors via DOM Manipulation
- Modify headers
- like `User-Agent`, `Authorization`, or custom application headers
- Lesson 2207 — Intercepting and Modifying HTTP Traffic
- Modify parameters
- Change form values, headers, cookies, or query strings
- Lesson 2209 — Burp Repeater for Manual Testing
- Modify XML structure
- to bypass authentication or access controls
- Lesson 616 — XML Injection Fundamentals
- Modifying attributes
- Changing `role="user"` to `role="admin"`
- Lesson 617 — XML Injection Attack Vectors
- Modifying user privileges
- Injecting SQL to execute admin commands like `GRANT ALL PRIVILEGES` or equivalent statements to upgrade their database user account
- Lesson 584 — Privilege Escalation via SQL Injection
- modular exponentiation
- raising numbers to powers and then taking the remainder.
- Lesson 141 — RSA Mathematical Foundation: Primes and Modular ArithmeticLesson 143 — RSA Encryption and Decryption OperationsLesson 153 — Diffie-Hellman Key Exchange Fundamentals
- Module Logging
- tracks when PowerShell modules load and execute.
- Lesson 1511 — PowerShell and Command-Line Logging
- MongoDB
- (JavaScript-based queries, operators like `$ne`, `$gt`)
- Lesson 592 — NoSQLMap and NoSQL Injection Automation
- Monitor
- approaching expiration dates (alert 30-60 days early)
- Lesson 316 — Key Expiration and RenewalLesson 1346 — Zero-Downtime Rotation PatternsLesson 1750 — Last Access Analysis and Permission Rightsizing
- Monitor access
- Log any debug interface activity as a tamper indicator
- Lesson 2776 — Debug Interfaces and JTAG Security
- Monitor application logs
- for binding errors or warnings that reveal internal parameter handling.
- Lesson 935 — Testing for Mass Assignment and HPP
- Monitor behavior
- Compare current activity against known-good baselines
- Lesson 1930 — Instance Monitoring and Runtime Protection
- Monitor compliance
- Generate reports showing which endpoints have outdated third-party software.
- Lesson 1606 — Third-Party Application PatchingLesson 2303 — DMARC Reporting and Analysis
- Monitor continuously
- for newly disclosed vulnerabilities in your existing dependencies
- Lesson 3011 — Software Composition Analysis (SCA) Automation
- Monitor creation events
- Windows Event ID 4698 (task created) and audit logs showing crontab modifications reveal suspicious scheduling activity.
- Lesson 1538 — Scheduled Tasks and Cron Jobs
- monitor mode
- essentially becoming a silent observer of all nearby 802.
- Lesson 550 — Wireless Packet Capture and AnalysisLesson 2688 — Microsegmentation Implementation Strategies
- Monitor Object.prototype
- in staging environments for unexpected properties
- Lesson 1197 — Detecting Prototype Pollution Vulnerabilities
- Monitor resource utilization
- Track CPU usage specifically during encryption operations—if CPU becomes saturated, consider scaling compute resources or reducing encryption scope.
- Lesson 1799 — Performance Impact of Database Encryption
- Monitor runtime
- Capture network traffic, system calls, file access
- Lesson 2767 — Firmware Emulation and Dynamic Analysis
- Monitor security advisories
- for your language ecosystem
- Lesson 1967 — Using Components with Known Vulnerabilities
- Monitor timing metrics
- for anomalous patterns indicating reconnaissance
- Lesson 1949 — Serverless Cold Start and Timing Side Channels
- Monitor vendor feeds
- Subscribe to security bulletins from each major vendor.
- Lesson 2460 — Third-Party and Application Patching
- Monitor your own footprint
- Use packet captures and EDR logs to understand what defenders see.
- Lesson 2224 — Framework OPSEC and Detection
- Monitored
- Alert when one control fails so you can respond before others fail too
- Lesson 2656 — Redundant Controls and Failure Tolerance
- Monitoring
- involves watching API traffic in real-time for suspicious patterns: unusual response times, authentication failures, authorization bypasses, rate limit violations, or unexpected error rates.
- Lesson 1044 — API Security Testing and MonitoringLesson 1346 — Zero-Downtime Rotation PatternsLesson 1348 — API Key and Certificate RotationLesson 1386 — Mutation-Based FuzzingLesson 1842 — Cross-Region and Cross-Account Connectivity
- Monitoring and alerting
- Log suspicious patterns for security team review
- Lesson 700 — Rate Limiting and Account Lockout Policies
- Monitoring and enforcement
- Notice that the organization may monitor usage and consequences for violations
- Lesson 2489 — Acceptable Use Policy (AUP)
- Monitoring and measurement evidence
- Lesson 2607 — ISMS Documentation Requirements
- Monitoring and Vigilance
- Lesson 2170 — Blue Team Responsibilities and Tools
- Monitoring mechanisms
- Lesson 2461 — Patch Compliance Monitoring and Reporting
- Monitoring plan
- How you'll watch for changes in threat landscape
- Lesson 2521 — Risk Acceptance and Documentation
- Monitoring setup
- Configure logging and alerting for key usage *before* production deployment so you can immediately detect anomalies
- Lesson 314 — Key Activation and Installation
- Monitoring System Integrity
- Apply FIM monitoring to the FIM tools themselves—watch the AIDE binary, configuration files, and database locations.
- Lesson 1507 — Protecting FIM Infrastructure
- Monitoring tools
- Track performance metrics and errors during testing
- Lesson 2455 — Patch Testing and Staging Environments
- Monitors system performance
- against those commitments continuously
- Lesson 2593 — Availability Criterion
- Most frequent mistake
- Allowing only specific outbound ports (80, 443) and forgetting the ephemeral range for client responses.
- Lesson 1824 — Ephemeral Ports and Stateless Filtering Challenges
- Mount namespace
- Separate filesystem view
- Lesson 1438 — Service Sandboxing TechniquesLesson 1624 — Container Isolation Fundamentals
- Mount points
- that redirect to unexpected locations
- Lesson 1165 — Filesystem Abstraction Layer Bypasses
- Mount root filesystems read-only
- while allowing specific **tmpfs mounts** for temporary data
- Lesson 1661 — Container Runtime Security Best Practices
- Mouse movements
- Precise pixel coordinates and movement timing
- Lesson 294 — Entropy Sources and Collection
- Moved
- within or outside the facility (chain of custody)
- Lesson 2585 — HIPAA Security Rule: Physical Safeguards
- MQ (Multivariate Quadratic) Problem
- given `m` quadratic equations in `n` variables over a finite field, find values that satisfy all equations.
- Lesson 275 — Multivariate Cryptography
- MTTD/MTTR
- → Reduced breach dwell time and damage limitation
- Lesson 2359 — Reporting SOC Performance to Leadership
- Multi-architecture support
- Targeting ARM, MIPS, x86 embedded systems
- Lesson 2754 — IoT Botnets: Mirai and Beyond
- Multi-Cloud Evidence Collection
- AWS snapshots, Azure managed disks, and GCP persistent disk images use different formats and APIs.
- Lesson 1921 — Cross-Account and Multi-Cloud Forensics
- Multi-cloud networking
- VPNs can even connect resources across different cloud providers securely.
- Lesson 472 — VPN Use Case: Secure Cloud Connectivity
- Multi-device logout
- For high-security applications, consider offering "logout from all devices" — this requires tracking all active sessions per user and invalidating them simultaneously.
- Lesson 709 — Session Termination and Logout
- Multi-dimensional
- Combine multiple metrics (time + volume + location) for stronger signal
- Lesson 2348 — Baseline Establishment and Anomaly Detection
- Multi-environment architectures
- Dev/test/prod separation for blast radius containment
- Lesson 1737 — Cross-Account Access Fundamentals
- Multi-Factor Authentication
- Between MFA code validation and session establishment, concurrent requests might bypass the verification step entirely.
- Lesson 907 — Race Conditions in Authentication and AuthorizationLesson 1746 — Hardware Security Keys and FIDO2Lesson 2159 — Detection and Defense Against Lateral MovementLesson 2631 — Separation of PrivilegeLesson 2876 — Model Repository SecurityLesson 2972 — Recipient Verification and Authentication
- Multi-factor authentication (MFA)
- requires at least two different types of factors.
- Lesson 738 — Multi-Factor Authentication Fundamentals
- Multi-Layered Detection
- NGAV doesn't rely on just one method.
- Lesson 1572 — Next-Generation Antivirus (NGAV)
- Multi-level security
- is needed (Top Secret, Secret, Unclassified data on same system)
- Lesson 1450 — MAC vs DAC: Fundamental Differences
- Multi-Party Authorization
- Banks and payment processors require multiple approvals for critical operations.
- Lesson 326 — Secret Sharing in Practice
- Multi-region logging
- ensures that CloudTrail trails and other log sources in every region feed into your central repository.
- Lesson 1877 — Cross-Account and Multi-Region Logging
- Multi-stage exploitation
- Chain reconnaissance, exploitation, and post-exploitation automatically
- Lesson 2201 — Automation with Resource Scripts
- Multi-stage payloads
- Automatically serving different content based on victim's device or location
- Lesson 2261 — Phishing Infrastructure and Automation
- Multi-step IDOR exploitation
- means an attacker chains these requests together, manipulating object IDs at each stage to access or modify resources they shouldn't touch.
- Lesson 818 — Multi-Step IDOR Exploitation
- Multi-Step Process Bypass
- Lesson 824 — Vertical Privilege Escalation Techniques
- Multi-Step Workflows
- define the sequence: "If SAST finds a high-severity SQL injection → create Jira ticket → assign to security team → on fix commit → trigger test suite → if tests pass → request approval → if approved → deploy to production.
- Lesson 3045 — Remediation Workflows and Orchestration
- Multi-tenancy noise
- Distinguishing between your activity, cloud provider maintenance, and potential attacks requires understanding normal cloud operations.
- Lesson 1886 — Cloud Threat Detection Overview
- Multi-tenancy risks
- In shared cloud infrastructure, encryption ensures your data can't be accessed by other tenants or even cloud administrators if key management is properly separated.
- Lesson 1763 — Understanding Encryption at Rest Fundamentals
- Multipart uploads
- split files into chunks (typically 5MB-100MB each), upload them independently, and reassemble them server-side.
- Lesson 1789 — Secure File Sharing and Transfer Patterns
- Multiple authentication barriers
- Network access control, application login, database credentials, API keys—each operating independently.
- Lesson 2671 — Defense in Depth Through Design
- Multiple channels
- Provide diverse reporting options—email alias, dedicated hotline, web form, chat bot, or direct manager escalation.
- Lesson 2291 — Reporting Mechanisms and Culture
- Multiple concurrent sessions
- Opening several browser tabs and advancing through workflow steps in parallel
- Lesson 917 — Concurrent Workflow Exploitation
- Multiple Copies, Multiple Locations
- Store encrypted backups in geographically separate locations to protect against physical disasters.
- Lesson 311 — Key Backup and Recovery Procedures
- Multiple downstream targets
- A single function might query databases, invoke APIs, and execute commands
- Lesson 1960 — Injection Vulnerabilities in Serverless
- multiple layers
- .
- Lesson 24 — Security Layer CategoriesLesson 934 — Mass Assignment Defense StrategiesLesson 959 — File Size Limits and Resource Exhaustion Prevention
- Multiple matches
- How does it handle ten positive detections?
- Lesson 2332 — Playbook Testing and Validation
- Multiple rounds
- (repeating these operations many times)
- Lesson 85 — Block Cipher Fundamentals and Structure
- Multiple secure locations
- Store encrypted key backups in geographically separated locations.
- Lesson 317 — Key Backup and Recovery
- Multiple storage types
- files, databases, environment variables, memory, logs
- Lesson 1315 — Secret Sprawl and Discovery Challenges
- Multiplexing
- Multiple requests and responses can be in-flight simultaneously over one connection.
- Lesson 1097 — HTTP/2 Protocol Architecture and Security Model
- Multiplication
- When you multiply two encrypted numbers, the result is an encryption of the product.
- Lesson 251 — Homomorphic Operations and Noise Management
- Multisignatures
- and **threshold signatures** bring this concept to cryptography.
- Lesson 237 — Multisignatures and Threshold Signatures
- Multivariate polynomial cryptography
- Based on solving systems of multivariate quadratic equations.
- Lesson 268 — Post-Quantum Cryptography Fundamentals
- must
- use HTTPS.
- Lesson 674 — SameSite Cookie AttributeLesson 762 — OAuth 2.0 Redirect URI ValidationLesson 877 — Credentials and CORS: Access-Control-Allow-CredentialsLesson 1286 — Scoping and Namespacing in Package ManagersLesson 1442 — SSH Key Generation and ManagementLesson 1822 — Network ACL Structure and Subnet AssociationLesson 2391 — Memory Image Formats and ValidationLesson 2561 — Accountability and Records of Processing (+1 more)
- Mutating Webhooks
- go further: they can *modify* requests on-the-fly.
- Lesson 1670 — Admission Controllers and Webhooks
- Mutation fuzzing
- takes a known working XSS payload and automatically generates thousands of variations by:
- Lesson 656 — Polyglot Payloads and Mutation Fuzzing
- Mutation strategies
- Apply modifications (bit flips, byte insertion, boundary testing)
- Lesson 1386 — Mutation-Based Fuzzing
- Mutex names
- that malware uses to prevent re-infection
- Lesson 1580 — EDR Detection Rules and Custom Indicators
- Mutual Interest
- Establishing common ground ("I also work in finance") creates trust and encourages information sharing as a "peer exchange.
- Lesson 2267 — Elicitation Techniques and Information Gathering
- Mutual TLS (mTLS)
- Require client certificates for all etcd connections
- Lesson 1668 — Securing etcd and Secrets ManagementLesson 1776 — Encryption Between Cloud ServicesLesson 2782 — MQTT Security Vulnerabilities and Hardening
- Mutual trust
- Protects against rogue access points (evil twins) since clients verify server identity
- Lesson 542 — EAP-TLS and Certificate-Based Authentication
N
- NACL rule
- Deny all inbound SSH (port 22) from `0.
- Lesson 1825 — Combining Security Groups and NACLs for Defense-in-Depth
- NACLs
- for: explicit denies, subnet-wide policies, and defense against broad attacks.
- Lesson 1825 — Combining Security Groups and NACLs for Defense-in-Depth
- Name Constraints
- are like property boundaries for intermediate CA certificates.
- Lesson 185 — Name Constraints and Certificate Extensions
- Nameservers
- Which DNS servers control the domain (revealing hosting providers or custom infrastructure)
- Lesson 329 — WHOIS and Domain Registration Intelligence
- Namespace Breakouts
- Exploiting weaknesses in namespace isolation or using system calls that weren't properly restricted can allow processes to escape their namespace boundaries.
- Lesson 1626 — Container Escape Vulnerabilities
- Naming conventions
- are critical for governance.
- Lesson 1721 — Creating and Managing Service AccountsLesson 2019 — Resource Tagging, Naming, and Organizational Controls in IaC
- NAT Friendliness
- Lesson 485 — TLS VPNs: Architecture and Differences from IPsec
- NAT Gateway
- comes in—it acts as an intermediary that translates private IP addresses to a public IP for outbound connections only.
- Lesson 1831 — NAT Gateway ArchitectureLesson 1954 — VPC Configuration and Network Isolation
- NAT instances
- (self-managed EC2 instances) or **NAT gateways** (fully managed services).
- Lesson 1832 — NAT Instance vs NAT Gateway
- NAT Traversal (NAT-T)
- wraps ESP packets inside UDP datagrams, typically using **UDP port 4500**.
- Lesson 482 — NAT Traversal (NAT-T) in IPsec
- Nation-State Actors
- represent the top tier: government-backed teams with virtually unlimited resources, custom zero- day exploits, and patience to conduct multi-year campaigns.
- Lesson 47 — Understanding Adversary Types and Skill LevelsLesson 51 — Motivations: Disruption and Destructive Attacks
- Nation-state actors (APTs)
- Government-sponsored groups with substantial resources and long-term objectives (espionage, sabotage)
- Lesson 2337 — Threat Actors and Attribution
- Nation-state attacks
- targeting critical infrastructure
- Lesson 2753 — Consumer IoT vs Industrial IoT Threats
- National Vulnerability Database (NVD)
- The U.
- Lesson 1262 — Vulnerability Databases and CVE TrackingLesson 1613 — Vulnerability Database and CVE Mapping
- Native cloud services
- GuardDuty supports custom threat lists; Azure Sentinel has threat intelligence connectors
- Lesson 1894 — Threat Intelligence Integration
- Native Isolation Mechanisms
- Cloud APIs let you instantly quarantine compromised resources—modify security group rules, revoke IAM credentials, snapshot instances for forensics, or shut down exposed services—all through code.
- Lesson 1905 — Cloud-Native IR Tools and APIs
- Native SQL functions
- Passing unsanitized input to database functions through ORM methods
- Lesson 1238 — ORM Security Fundamentals
- Near-misses
- (attacks that almost succeeded)
- Lesson 2070 — Security Retrospectives and Continuous Improvement
- Negative Amount Tricks
- Similar to payment tampering, but exploiting currency symbols or conversion logic to create negative totals or credits.
- Lesson 924 — Currency and Conversion Exploits
- Negligent insiders
- don't mean harm but cause it through carelessness—falling for phishing emails, sharing passwords, or misconfiguring security settings.
- Lesson 52 — Insider Threats and Privileged Access Abuse
- Neighbor Advertisement (NA)
- "I do, and here's my MAC address" (like ARP reply)
- Lesson 391 — IPv6 Neighbor Discovery and Spoofing Parallels
- Neighbor Discovery Protocol (NDP)
- , which uses ICMPv6 messages instead of broadcast requests.
- Lesson 391 — IPv6 Neighbor Discovery and Spoofing Parallels
- Neighbor Solicitation (NS)
- "Who has this IPv6 address?
- Lesson 391 — IPv6 Neighbor Discovery and Spoofing Parallels
- Nested Object Pollution
- Lesson 995 — API Parameter Pollution and Injection
- Nested quantifiers
- occur when you apply a quantifier inside another quantified group:
- Lesson 1176 — Evil Regex Patterns: Nested Quantifiers and Alternation
- Net Benefit: +$330,000
- Lesson 2522 — Cost-Benefit Analysis for Risk Treatment
- Netcat
- (`nc`) is a lightweight utility that reads and writes data across network connections.
- Lesson 2236 — Netcat and Socat for Network Pivoting
- NetFlow
- (Cisco-originated, now widely supported) exports summaries of unidirectional flows: source/destination IPs, ports, protocol, byte counts, timestamps, and TCP flags.
- Lesson 2410 — Network Flow Analysis
- Network
- Are they on a corporate network or public Wi-Fi?
- Lesson 1747 — Conditional Access and Context-Aware MFA
- Network access
- Processes should only bind to necessary ports and communicate with required endpoints
- Lesson 1405 — Principle of Least Privilege in OS HardeningLesson 2753 — Consumer IoT vs Industrial IoT Threats
- Network access policies
- PaaS services can restrict access to specific VPCs/VNets
- Lesson 1846 — VPC/VNet Service Endpoints Fundamentals
- Network ACL
- is a stateless firewall that operates at the **subnet level** in your VPC.
- Lesson 1822 — Network ACL Structure and Subnet Association
- Network ACLs
- Add subnet-level controls for defense-in-depth
- Lesson 1816 — Cross-VPC Communication ControlsLesson 1819 — Security Groups vs Network ACLs: Fundamental DifferencesLesson 1825 — Combining Security Groups and NACLs for Defense-in-Depth
- Network activity
- – identifying unexpected outbound connections
- Lesson 1659 — Runtime Monitoring and Anomaly Detection
- Network and application testing
- Verify segmentation and validate controls after changes
- Lesson 2579 — Requirements 11-12: Testing and Policy
- Network anomalies
- Connections to known mining pool domains (`:3333`, `:4444` ports common) detected via VPC Flow Logs
- Lesson 1893 — Cryptomining and Resource Abuse Detection
- Network Architecture
- You discover whether the network uses a single standalone AP, multiple APs in a mesh configuration, or enterprise infrastructure with centralized controllers managing many APs across different floors or buildings.
- Lesson 355 — Wireless Network Topology Mapping
- Network boundaries
- Data coming from the internet vs.
- Lesson 11 — Trust Boundaries and Implicit TrustLesson 353 — Gateway and Router Identification
- Network Cables
- Exposed cabling can be tapped using hardware devices that passively copy data without disrupting the connection—the digital equivalent of wiretapping a phone line.
- Lesson 2278 — Physical Attacks on Network Infrastructure
- Network configuration
- Security groups, firewall rules, network ACLs
- Lesson 1677 — IaaS Security Responsibilities
- Network congestion
- from scanning traffic can cause denial-of-service
- Lesson 1520 — Worms: Autonomous Network Propagation
- Network connections
- (masking command-and-control traffic)
- Lesson 1548 — System Call HookingLesson 1559 — Memory Analysis and Volatile ForensicsLesson 1575 — EDR Data Collection and TelemetryLesson 2381 — Live System Evidence CollectionLesson 2389 — Memory Forensics FundamentalsLesson 2663 — Principle of Least Privilege
- Network design
- Place WireGuard endpoints in segmented network zones.
- Lesson 498 — WireGuard Deployment Best Practices and Monitoring
- Network devices
- (firewalls, routers, switches, IDS/IPS) provide traffic patterns, blocked connections, and anomalous network behavior.
- Lesson 2316 — Log Sources and Event Collection Methods
- Network exposure
- Gateway opens HTTP access—always use HTTPS and restrict access by firewall or authentication.
- Lesson 1481 — Journal Gateway and Remote Access
- Network filtering
- Deploy firewall rules AND host-based firewalls (not just perimeter protection)
- Lesson 2656 — Redundant Controls and Failure Tolerance
- Network firewall rules
- Block all inbound/outbound traffic except specific IP addresses, ports, and protocols explicitly defined as necessary.
- Lesson 1406 — Default Deny and Allowlisting
- Network firewalls
- All traffic entering/leaving the network crosses this boundary
- Lesson 29 — Security Choke Points
- Network foundation
- (VPC, load balancers, underlying network)
- Lesson 1682 — Container as a Service Security
- Network IDS/IPS
- (Snort, Suricata): Traffic analysis and blocking
- Lesson 2170 — Blue Team Responsibilities and Tools
- Network indicators
- include default user agents (like Metasploit's `Mozilla/4.
- Lesson 2224 — Framework OPSEC and Detection
- Network infrastructure
- Routers, switches, load balancers
- Lesson 2385 — Log Collection and Preservation
- Network interface
- Track individual resource traffic
- Lesson 1872 — VPC Flow Logs and Network Monitoring
- Network Isolation
- Private endpoints keep Key Vault traffic off the public internet
- Lesson 1329 — Azure Key VaultLesson 1845 — Service Endpoints vs Public Internet AccessLesson 1908 — Instance Isolation and ContainmentLesson 2086 — Setting Up a Testing EnvironmentLesson 2455 — Patch Testing and Staging EnvironmentsLesson 2753 — Consumer IoT vs Industrial IoT Threats
- Network layer
- IP header added (source/destination IP addresses)
- Lesson 374 — Understanding Network Packets and Protocol LayersLesson 896 — Preventing Internal Network AccessLesson 1858 — Rate Limiting and Traffic ShapingLesson 1939 — IMDS Security Best Practices and MonitoringLesson 2692 — Mobile Attack Surface Overview
- Network listeners
- Syslog servers receiving UDP/TCP streams
- Lesson 2315 — SIEM Architecture: Collectors, Aggregators, and Storage
- Network namespace
- Isolate network stack
- Lesson 1438 — Service Sandboxing TechniquesLesson 1624 — Container Isolation Fundamentals
- Network packet arrival times
- Internet traffic creates unpredictable patterns
- Lesson 294 — Entropy Sources and Collection
- Network packet capture
- Deep inspection at the packet level
- Lesson 2316 — Log Sources and Event Collection Methods
- Network perimeter
- (firewalls, IDS/IPS)
- Lesson 2654 — Defense-in-Depth: Core Concept and PhilosophyLesson 2674 — Identity as the New Perimeter
- Network policies
- act as virtual firewalls between containers (pods).
- Lesson 1660 — Network Policies and SegmentationLesson 1682 — Container as a Service SecurityLesson 1796 — Database Connection EncryptionLesson 1971 — Network Policies and Service Mesh SecurityLesson 1976 — Multi-Tenancy and Cluster Isolation
- Network Policies (Kubernetes)
- Lesson 1938 — Blocking IMDS Access from Application Layer
- Network Relays
- Chain connections through multiple hops when direct access isn't possible.
- Lesson 2236 — Netcat and Socat for Network Pivoting
- Network security
- Firewalls at the perimeter, network segmentation inside, and host-based firewalls on individual machines
- Lesson 23 — Defense-in-Depth Philosophy
- Network security config
- Does the app allow cleartext HTTP traffic or trust custom CAs?
- Lesson 2714 — APK Structure and Manifest Analysis
- Network Security Configuration
- (`res/xml/network_security_config.
- Lesson 2719 — Android Certificate Pinning and Network Security
- Network segmentation
- Are there subnets or security zones?
- Lesson 349 — Network Mapping FundamentalsLesson 448 — VLANs for Layer 2 SegmentationLesson 453 — Segmentation for ComplianceLesson 538 — Preventing and Mitigating Rogue AP ThreatsLesson 552 — Client Isolation and Network SegmentationLesson 1573 — Antivirus Limitations and Complementary ControlsLesson 1668 — Securing etcd and Secrets ManagementLesson 1682 — Container as a Service Security (+9 more)
- Network setup
- Create virtual interfaces to interact with emulated services
- Lesson 2767 — Firmware Emulation and Dynamic Analysis
- Network sniffing
- Intercepting unencrypted HTTP traffic to steal session cookies
- Lesson 713 — Session Hijacking Fundamentals
- Network Switches
- Accessible switches in unlocked wiring closets allow attackers to span ports (mirror traffic), reconfigure VLANs, or connect rogue devices.
- Lesson 2278 — Physical Attacks on Network Infrastructure
- Network TAPs
- (Test Access Points) and **SPAN ports** (Switched Port Analyzer, also called port mirroring).
- Lesson 463 — Network TAPs vs SPAN Ports
- Network topology
- IP ranges, domain structures, relationships between systems
- Lesson 2099 — Reconnaissance for Vulnerability Discovery
- Network Traffic Monitoring
- Observing data in transit between services can reveal shadow data stores or unauthorized data movement.
- Lesson 1802 — Data Discovery and Inventory
- Network traffic volumes
- (VPC Flow Logs patterns)
- Lesson 1897 — Baseline Establishment for Cloud Resources
- Network utilities
- `nc` (netcat), `telnet`, `tcpdump` (if not needed for operations)
- Lesson 1408 — Removing Unnecessary Software Packages
- Network-based scanners
- remotely probe systems across the network without installing anything
- Lesson 1608 — Vulnerability Scanning Fundamentals
- Network-Based Vulnerability Scanners
- that probe systems from the outside, agent-based scanners install lightweight software agents directly on each endpoint (workstations, servers, containers).
- Lesson 2437 — Agent-Based Scanning
- Network-exposed services
- (SSH, HTTP, database listeners) are prime targets
- Lesson 1431 — Service Attack Surface Analysis
- Network-isolated segments
- for testing potentially disruptive changes
- Lesson 3051 — Testing and Validating Remediation Actions
- Network-level
- Place Restricted data on isolated VLANs unreachable from Internal zones
- Lesson 2652 — Data Segmentation and Classification
- Network-level containment
- Lesson 2331 — Response Actions and Containment Automation
- Networks
- The infrastructure connecting systems—routers, switches, firewalls, VPNs, and network segmentation.
- Lesson 2088 — Common Testing Targets and Scope
- never
- log or cache polynomial coefficients.
- Lesson 323 — Implementing Shamir's Secret SharingLesson 674 — SameSite Cookie AttributeLesson 685 — Rainbow Tables and Why Simple Hashing FailsLesson 864 — CORS Security Best PracticesLesson 881 — CORS Security Best Practices and DefenseLesson 1237 — Parameterized Queries and Prepared StatementsLesson 1435 — Service User Accounts and PrivilegesLesson 1655 — Capability Management (+2 more)
- Never assume
- read the provider's documentation and verify each control's ownership
- Lesson 1692 — Common Misunderstandings and Breach Scenarios
- Never blindly extract archives
- Validate and sanitize all paths before extraction
- Lesson 969 — Symbolic Link Attacks
- Never cache sensitive data
- like authentication tokens, personal information, or payment details.
- Lesson 1076 — Cache API and Service Worker Storage
- Never cache to disk
- unless encrypted and absolutely necessary
- Lesson 1334 — Secret Store Access Patterns
- Never commit state files
- to Git (add `*.
- Lesson 2016 — Secure State Management and Backend Configuration
- Never deserialize untrusted data
- Use JSON or other data-only formats.
- Lesson 1187 — PHP Object Injection and Unserialize Attacks
- Never edit sudoers directly
- always use `visudo`, which validates syntax before saving.
- Lesson 1426 — Sudo Configuration and Security
- Never exceed the scope
- defined in a bug bounty program or disclosure policy.
- Lesson 2078 — Legal and Ethical Considerations
- Never hardcode secrets
- use parameter stores, secret managers, or environment variables referenced in IaC
- Lesson 2013 — Secrets in IaC: Detection and Prevention
- Never in production
- IAST's overhead makes it unsuitable for live systems serving real users
- Lesson 1382 — IAST Deployment Models and Performance Impact
- Never log sensitive data
- like passwords or tokens—just identifiers.
- Lesson 844 — Authorization Logging and Monitoring
- Never punish mistakes
- If someone clicks a phishing link but reports it immediately, thank them.
- Lesson 2291 — Reporting Mechanisms and Culture
- Never reuse External IDs
- across different third-parties
- Lesson 1739 — External ID for Third-Party Access
- Never reveal
- whether hashing failed due to invalid input versus system errors.
- Lesson 693 — Password Storage Best Practices and Implementation
- Never skip server-side validation
- just because client-side exists.
- Lesson 1152 — Validation Layers and Defense in Depth
- Never store secrets directly
- Avoid putting API keys, database passwords, or tokens in environment variables at all.
- Lesson 1953 — Environment Variable Security
- Never torrent over Tor
- many clients bypass Tor and leak your IP
- Lesson 2991 — Operational Security for Tor Users
- Never trust again
- Don't manipulate the path after validation
- Lesson 971 — Path Canonicalization and Validation
- Never use
- general-purpose random functions like `Math.
- Lesson 134 — Generating Secure Random IVs and NoncesLesson 289 — Operating System Random APIs
- NEW
- First packet of a new connection (like a TCP SYN starting a handshake)
- Lesson 440 — Stateful Firewall with Connection Tracking
- New attack surfaces emerge
- Lesson 2012 — Infrastructure as Code Fundamentals and Security Implications
- New system compromise
- → expanding the footprint
- Lesson 2421 — Pivot Points and Indicators of Compromise
- New systems or technologies
- that collect, process, or store personal data
- Lesson 2888 — PIA Triggers and Scoping
- New technologies
- with unclear privacy implications (AI-driven decisions)
- Lesson 2558 — Data Protection Impact Assessments
- New vs recurring issues
- Did a vulnerability reappear after being fixed?
- Lesson 1402 — Security Test Results Management
- New vs. existing
- Fail only on newly introduced issues, not technical debt
- Lesson 3033 — Pipeline Security Gates and Policies
- News and reputation monitoring
- Watching for leadership changes, financial distress, regulatory actions, or public security failures
- Lesson 2539 — Continuous Vendor Monitoring
- Next-Generation Firewalls (NGFWs)
- bundle all these technologies together with additional threat intelligence, creating a comprehensive security platform rather than just a traffic gatekeeper.
- Lesson 420 — Next-Generation Firewalls (NGFW)
- NFD (Decomposed)
- Two codepoints `U+0065` (e) + `U+0301` (combining acute accent)
- Lesson 1161 — Unicode Normalization Vulnerabilities
- nftables
- is the modern successor that unifies all these separate tools into a single framework with consistent syntax.
- Lesson 443 — nftables Architecture and ImprovementsLesson 1586 — iptables and nftables on Linux
- NIST 800-53
- (which you've studied) appropriate to their categorization level—establishing the direct link between FISMA and NIST frameworks.
- Lesson 2615 — FISMA and Federal ComplianceLesson 2617 — Framework Mapping and Harmonization
- NIST Cybersecurity Framework
- , which emphasizes iterative improvement.
- Lesson 31 — Security as Continuous Improvement, Not a Final State
- NIST Cybersecurity Framework (CSF)
- Function-based (Identify, Protect, Detect, Respond, Recover)
- Lesson 2545 — Audit Frameworks and Standards
- NIST P-256
- offers the best balance of compatibility with existing PKI infrastructure and hardware support.
- Lesson 2794 — Elliptic Curve Cryptography for IoT
- NIST P-256 (secp256r1)
- Widely supported, good hardware acceleration, standard compliance
- Lesson 2794 — Elliptic Curve Cryptography for IoT
- NIST SP 800-115
- (Technical Guide to Information Security Testing and Assessment) provides a government- standard approach emphasizing planning, execution phases, and integration with risk management frameworks.
- Lesson 2082 — Penetration Testing Methodologies
- NIST SP 800-22
- is a suite of 15 statistical tests developed by the National Institute of Standards and Technology.
- Lesson 293 — Testing Randomness Quality
- NIST Special Publication 800-30
- provides a federal government-aligned, comprehensive methodology focused on IT systems.
- Lesson 2507 — Risk Assessment Methodologies and Frameworks
- NIST Special Publication 800-63B
- (covered in lesson 693's best practices) now **recommends against periodic expiration** unless there's evidence of compromise.
- Lesson 702 — Password Expiration and Rotation Policies
- NIST's IoT Cybersecurity Framework
- provides guidance for federal agencies and manufacturers on device capabilities related to asset identification, vulnerability management, and incident detection.
- Lesson 2758 — IoT Regulatory Landscape and Security Standards
- Nmap
- can fragment packets using options like `-f` (fragment packets) or `--mtu` (set maximum transmission unit size), splitting scan packets into tiny pieces that evade detection.
- Lesson 369 — Fragmentation and Packet Manipulation
- Nmap Scripting Engine (NSE)
- is a powerful extension that transforms Nmap from a simple port scanner into an automated security assessment tool.
- Lesson 348 — NSE (Nmap Scripting Engine)
- no
- (that's **Fail-Safe Defaults**, concept #4).
- Lesson 11 — Trust Boundaries and Implicit TrustLesson 137 — Key Derivation Functions (KDFs) OverviewLesson 971 — Path Canonicalization and Validation
- No access control
- Any process with access to the environment can read all variables
- Lesson 1325 — Secret Stores vs Environment Variables
- No asset criticality
- A medium-severity bug in your authentication server matters more than a critical bug in a test sandbox
- Lesson 2446 — CVSS Score Interpretation and Limitations
- No audit trail
- You can't see who accessed which secret or when
- Lesson 1325 — Secret Stores vs Environment VariablesLesson 1966 — Insufficient Logging and Monitoring
- No Authorization
- Finding a valid GUID grants access if the backend doesn't verify ownership
- Lesson 815 — GUID and UUID Vulnerabilities
- No automatic expiration
- Unlike HTTP cache headers, Cache API entries persist until explicitly deleted
- Lesson 1076 — Cache API and Service Worker Storage
- No Automatic Protections
- WebSockets bypass many browser security mechanisms.
- Lesson 1068 — WebSocket Protocol and Security Model
- No automatic reverse NAT
- Unlike iptables, nftables requires explicit rules for both directions of NAT connections.
- Lesson 445 — Migrating from iptables to nftables
- No binding commitments
- You're not obligated to fix every report or pay rewards
- Lesson 2478 — Legal and Safe Harbor Considerations
- No CIDR overlap conflicts
- Unlike VPC peering, IP ranges can overlap
- Lesson 1851 — Cross-Region and Cross-Account Private Connectivity
- No Client Authentication
- Since tokens go directly to the browser, there's no secure server-side exchange where the client can prove its identity.
- Lesson 765 — Implicit Flow Deprecation and Risks
- No Cloud Sync
- Biometric data never syncs to iCloud or backs up, preventing remote compromise.
- Lesson 2707 — Touch ID, Face ID, and Biometric Security
- No code execution hooks
- Unlike Java/Python serialization, these formats don't trigger constructors or magic methods during parsing
- Lesson 1191 — Alternative Serialization Formats
- No compensating controls
- Firewalls, network segmentation, and WAFs may mitigate risks CVSS doesn't account for
- Lesson 2446 — CVSS Score Interpretation and Limitations
- No concurrent request caps
- One user opens thousands of connections simultaneously
- Lesson 1030 — API4:2023 - Unrestricted Resource Consumption
- No confidentiality
- Anyone can read the packet contents (no encryption)
- Lesson 477 — Authentication Header (AH) Protocol
- No connection handshake overhead
- TCP's three-way handshake wastes precious energy and bandwidth on constrained devices
- Lesson 2783 — CoAP (Constrained Application Protocol)
- No credential exposure
- Your access keys never leave your infrastructure
- Lesson 1784 — Presigned URLs and Temporary Access Mechanisms
- No credential stuffing
- No passwords means no breached credentials to reuse
- Lesson 755 — Passwordless Security Trade-offs
- No credential theft
- Attackers can't intercept passwords because none are sent
- Lesson 542 — EAP-TLS and Certificate-Based Authentication
- No CSRF protection
- JSONP requests automatically include cookies, making CSRF trivial
- Lesson 1061 — Bypassing SOP with JSONP
- No direct DOM access
- Must call JavaScript functions to interact with web APIs
- Lesson 1086 — WebAssembly Security Boundaries
- No direct model access
- No access to weights, architecture, or training data
- Lesson 2827 — Model Extraction Attack Fundamentals
- No dynamic origin reflection
- – don't blindly echo back the `Origin` header
- Lesson 864 — CORS Security Best Practices
- No encryption controls
- Values sit in memory as plaintext
- Lesson 1325 — Secret Stores vs Environment Variables
- No execution timeouts
- Long-running operations consume server resources indefinitely
- Lesson 1030 — API4:2023 - Unrestricted Resource Consumption
- No fine-grained permissions
- It's all-or-nothing access
- Lesson 1325 — Secret Stores vs Environment Variables
- No forced composition rules
- Don't mandate uppercase/numbers/symbols
- Lesson 694 — Password Complexity Requirements and Their Effectiveness
- No forward secrecy
- by default (older sessions exposed if PSK leaks).
- Lesson 2791 — Pre-Shared Key Authentication for IoT
- No gadget chains
- Attackers can't inject arbitrary classes to exploit
- Lesson 1191 — Alternative Serialization Formats
- No hop limit enforcement
- means requests can be forwarded through proxies or misconfigurations
- Lesson 1934 — IMDSv1 vs IMDSv2 Security Improvements
- No implicit trust
- Being "inside" the cloud environment grants zero automatic privileges
- Lesson 1694 — Identity-Based Access Control in Cloud
- No information leakage
- Error messages shouldn't expose system details, file paths, or SQL queries
- Lesson 1210 — Fail Securely and Handle Errors Safely
- No internet gateway required
- Private subnets can access services directly
- Lesson 1845 — Service Endpoints vs Public Internet Access
- No key transmission
- Only the HMAC output travels over the network
- Lesson 221 — HMAC in Authentication Protocols
- No known special structures
- Avoiding curves vulnerable to exotic attacks
- Lesson 169 — Choosing Secure Elliptic Curves
- No length padding vulnerabilities
- The sponge construction naturally avoids certain extension attacks
- Lesson 210 — SHA-3 and the Keccak Algorithm
- No long-lived keys
- to steal or accidentally commit to Git
- Lesson 1725 — GCP Service Account Impersonation
- No long-term credentials
- stored or managed in the cloud
- Lesson 1733 — Federation and Temporary Credentials
- No MFA requirement
- Allowing role assumption without multi-factor authentication
- Lesson 1744 — Common Cross-Account Misconfigurations
- No Multi-Factor Authentication
- APIs relying solely on passwords are vulnerable when those credentials are compromised through phishing or breaches.
- Lesson 1028 — API2:2023 - Broken Authentication
- No NAT required
- Direct communication using private addressing
- Lesson 1846 — VPC/VNet Service Endpoints Fundamentals
- No padding required
- Since you're XORing, you can encrypt any length message—just use only the keystream bytes you need.
- Lesson 98 — CTR Mode: Turning Block Ciphers into Streams
- No password guessing
- (they use cryptographic key pairs from FIDO2)
- Lesson 754 — Passkeys and Cross-Device Authentication
- No password hints
- They often leak information
- Lesson 694 — Password Complexity Requirements and Their Effectiveness
- No password needed
- Bypasses authentication entirely
- Lesson 638 — Cookie Theft and Session Hijacking via XSS
- No password transmission
- Your secret never travels over the network
- Lesson 247 — ZKP Applications in Authentication
- No periodic password changes
- Only change when compromise is suspected
- Lesson 694 — Password Complexity Requirements and Their Effectiveness
- No persistent storage
- Secrets must be fetched from external sources every invocation
- Lesson 1940 — Serverless Architecture and Security Implications
- No point validation
- Accepting any (x,y) coordinate without checking it's actually on your curve
- Lesson 168 — ECC Implementation Vulnerabilities
- No polymorphism surprises
- You deserialize exactly the message type you expect
- Lesson 1191 — Alternative Serialization Formats
- No Protection
- (`NSFileProtectionNone`): Always accessible.
- Lesson 2704 — Data Protection API and Keychain
- No public internet exposure
- – Your data never traverses the public web, reducing attack surface
- Lesson 1841 — Direct Connect and Dedicated Connectivity
- No Read Down
- – You cannot read data below your integrity level
- Lesson 16 — Biba Model: Integrity Protection
- No Refresh Tokens
- The implicit flow never issues refresh tokens for security reasons.
- Lesson 765 — Implicit Flow Deprecation and Risks
- No request origin validation
- anyone who can make an HTTP request wins
- Lesson 1934 — IMDSv1 vs IMDSv2 Security Improvements
- No rotation support
- Updating a secret requires restarting applications
- Lesson 1325 — Secret Stores vs Environment Variables
- No scope restrictions
- keys with excessive permissions
- Lesson 1009 — API Key Authentication: Design and Security
- No special cases
- The curve arithmetic avoids edge cases that cause timing leaks
- Lesson 167 — Curve25519 and EdDSA
- No static keys
- stored in code or configuration
- Lesson 1734 — Instance Profiles and Container Credentials
- No system calls
- Cannot directly invoke operating system functions
- Lesson 1086 — WebAssembly Security Boundaries
- No threat intelligence
- Doesn't indicate active exploitation in the wild
- Lesson 2446 — CVSS Score Interpretation and Limitations
- No tokens in JavaScript
- XSS attacks can't steal what isn't there
- Lesson 1092 — Backend for Frontend (BFF) Pattern
- No transport-layer ports
- ESP is IP protocol 50—it has no TCP/UDP port numbers for NAT to use for mapping multiple internal hosts.
- Lesson 482 — NAT Traversal (NAT-T) in IPsec
- No unified protocol
- unlike Signal Protocol or MLS, email standards vary widely
- Lesson 2958 — Email Encryption Fundamentals and S/MIME
- No user interaction required
- to spread (unlike viruses)
- Lesson 1520 — Worms: Autonomous Network Propagation
- No validation
- – Encrypts but doesn't verify identity (vulnerable to MITM)
- Lesson 1796 — Database Connection Encryption
- No Write Up
- – You cannot write data to a higher integrity level than yours
- Lesson 16 — Biba Model: Integrity Protection
- No-eXecute (NX)
- bits that mark stack and heap memory as non-executable.
- Lesson 2109 — Return-Oriented Programming (ROP)
- Node Authorization
- mode (`--authorization-mode=Webhook`) to validate requests against the API server's RBAC policies.
- Lesson 1671 — Kubelet Security and Node Hardening
- Node infrastructure
- (host OS patching, kernel hardening)
- Lesson 1682 — Container as a Service Security
- Node.js
- `crypto.
- Lesson 134 — Generating Secure Random IVs and NoncesLesson 931 — HTTP Parameter Pollution (HPP) Basics
- Nodes
- run your actual workloads via the kubelet agent and container runtime.
- Lesson 1968 — Kubernetes Security Architecture Overview
- Noise protocol framework
- for its handshake—a modern, formally verified cryptographic protocol that establishes secure channels.
- Lesson 493 — WireGuard Protocol Design and Cryptographic Simplicity
- Noisy Neighbor Attacks
- A malicious container can consume excessive CPU, memory, or disk I/O to starve other tenants' workloads—essentially a denial-of-service within the host.
- Lesson 1631 — Multi-Tenancy Security Challenges
- Non-802.11 devices
- Cordless phones, security cameras, wireless controllers
- Lesson 551 — RF Spectrum Monitoring
- Non-backtracking regex engines
- (like RE2) intentionally avoid features that cause backtracking.
- Lesson 1181 — Alternative Parsing Strategies
- Non-compliance
- Violating privacy laws or regulations (e.
- Lesson 70 — LINDDUN for Privacy Threat Modeling
- non-compliant
- .
- Lesson 1988 — AWS Config for Compliance MonitoringLesson 2678 — Device Trust and Endpoint Security
- Non-credentialed scans
- operate like an external attacker would—the scanner probes the system from the outside without logging in.
- Lesson 1609 — Credentialed vs Non-Credentialed Scans
- Non-destructive actions
- Log what *would* happen without actually executing blocks/deletes
- Lesson 2332 — Playbook Testing and Validation
- Non-Executable Directories
- Lesson 983 — Secure File Storage Architecture
- Non-executable memory (NX bit)
- Stack and heap regions cannot execute code
- Lesson 2709 — iOS Binary Protections and Runtime Security
- Non-functional requirements
- describe *how well* the system performs these tasks: speed, reliability, maintainability, and **security**.
- Lesson 12 — Security as a Non-Functional Requirement
- Non-idempotent actions
- Incrementing counters, one-time token usage
- Lesson 1103 — HTTP/3 0-RTT Replay Attacks
- Non-repeating
- Extremely low probability of generating the same value twice
- Lesson 134 — Generating Secure Random IVs and Nonces
- Non-repudiation
- Can actions be denied later?
- Lesson 63 — STRIDE per Interaction AnalysisLesson 70 — LINDDUN for Privacy Threat ModelingLesson 225 — Digital Signature Fundamentals and Use CasesLesson 1871 — CloudTrail for API Activity Monitoring
- Non-secret
- Salts can be stored alongside the derived key—they're not passwords themselves
- Lesson 140 — Salts in Key Derivation
- non-transitive
- by design.
- Lesson 1836 — VPC Peering FundamentalsLesson 1837 — VPC Peering Security Considerations
- Non-volatile evidence
- survives reboots because it's stored on persistent media like hard drives, SSDs, or backups.
- Lesson 2380 — Volatile vs Non-Volatile Evidence
- nonce
- (number used once) and a counter (often starting at 0)
- Lesson 98 — CTR Mode: Turning Block Ciphers into StreamsLesson 117 — ChaCha20: Modern Stream Cipher DesignLesson 119 — Nonce Management in Stream CiphersLesson 131 — Nonces vs IVs: Definitions and DifferencesLesson 660 — style-src and CSS Injection PreventionLesson 661 — Nonces and Hashes for Inline Content
- Nonce Requirements
- Lesson 130 — AEAD Security Properties and Limitations
- Nonce Reuse (ECDSA)
- Reusing the random value when signing with ECDSA instantly leaks your private key.
- Lesson 234 — Signature Performance and Implementation Considerations
- Nonce Reuse Is Catastrophic
- Lesson 102 — GCM Implementation Pitfalls
- Nonce Validation
- If you included a `nonce` parameter in the authentication request, verify it matches the token's `nonce` claim.
- Lesson 774 — ID Token Validation and Security
- nonces
- and **hashes** come in—they act like VIP passes for specific inline content.
- Lesson 661 — Nonces and Hashes for Inline ContentLesson 667 — Strict CSP and Modern Best PracticesLesson 2785 — Zigbee and Z-Wave Security Models
- none
- of these luxuries.
- Lesson 2790 — Authentication Challenges in IoT EnvironmentsLesson 2959 — PGP/GPG Key Management and Web of Trust
- NoNewPrivileges=yes
- prevents the service and its child processes from gaining additional privileges through mechanisms like SUID binaries or file capabilities.
- Lesson 1433 — Service Isolation with systemd
- Normal DNS traffic
- shows predictable patterns: queries to common domains (google.
- Lesson 379 — DNS Traffic Analysis and Query Patterns
- Normal path
- Your computer → Internet → Server (predictable RTT)
- Lesson 413 — Timing and Latency Analysis
- Normal patterns
- Login times, accessed resources, data volumes, IP addresses, geographic locations
- Lesson 1900 — User and Entity Behavior Analytics (UEBA)
- Normalization
- maps those fields into a unified schema:
- Lesson 1488 — Log Normalization and ParsingLesson 1855 — WAF Evasion Techniques and DefenseLesson 1879 — Cloud Log Collection and NormalizationLesson 2314 — What is a SIEM and Why Organizations Need It
- Normalize case
- according to your context (case-insensitive filesystems, usernames)
- Lesson 1166 — Defense: Canonical Form Validation Strategies
- Normalize case early
- using a consistent, locale-agnostic method
- Lesson 1162 — Case Sensitivity and Case Mapping Attacks
- Normalize status codes
- Return consistent user-facing codes, not raw backend responses
- Lesson 898 — Response Handling and Information Disclosure
- Normalize timelines
- Apply corrections consistently when ordering events
- Lesson 2418 — Time Source Synchronization and Clock Skew
- Normalize to UTC
- convert all timestamps to a common reference
- Lesson 2417 — Timeline Construction Fundamentals
- Normalized Data
- Your SIEM ingests compliance events alongside traditional security logs, normalizing them into a common format for correlation.
- Lesson 1995 — Compliance Tool Integration with SIEM
- North-South traffic
- (traffic entering or leaving your network).
- Lesson 452 — East-West Traffic ControlLesson 2689 — East-West Traffic Inspection and Enforcement
- NoScript
- by default, blocking JavaScript, Flash, and other active content unless you explicitly allow it.
- Lesson 2986 — Tor Browser Security Features
- NoSQLMap
- is a specialized tool designed to automate the discovery and exploitation of NoSQL injection vulnerabilities.
- Lesson 592 — NoSQLMap and NoSQL Injection AutomationLesson 601 — Detecting and Testing for NoSQL Injection
- not
- with embedded images, iframes, or AJAX calls from other sites.
- Lesson 674 — SameSite Cookie AttributeLesson 1207 — Using the Top 10 Effectively in Security ProgramsLesson 1931 — Instance Termination Protection and Data PersistenceLesson 1950 — Least Privilege for Serverless Functions
- Not bulletproof anonymity
- VPNs don't protect against browser fingerprinting, cookies, or login-based tracking
- Lesson 471 — VPN Use Case: Privacy and Anonymity
- Not demanding privacy sacrifices
- to unlock functionality
- Lesson 2884 — Full Functionality and Positive-Sum
- Not discriminate
- against consumers who opt out (no price changes, service denials, or quality differences)
- Lesson 2565 — Sale and Sharing of Personal Information
- Notary
- , a framework that implements The Update Framework (TUF), to sign and verify images.
- Lesson 1297 — Container Image VerificationLesson 1644 — Image Signing and Verification
- NotBefore/NotOnOrAfter
- Ensure the assertion is being used within its valid time window
- Lesson 781 — SAML Message Validation
- Notification flows
- push security alerts into dedicated channels: vulnerability scan results, policy violations, failed compliance checks, or suspicious activity.
- Lesson 3050 — ChatOps and Collaboration Integration
- Notification phishing
- Once permission is granted, attackers send deceptive messages impersonating banks, tech support, or security alerts with malicious links.
- Lesson 1087 — Web Push Notifications and Permissions
- Notification requirements
- Some jurisdictions mandate alerting subjects
- Lesson 1922 — Cloud Forensics Tools and Legal Considerations
- Notification systems
- alerting users to unusual data access patterns
- Lesson 2886 — Visibility, Transparency, and User-Centricity
- Notify all parties
- who trust your key via secure channels
- Lesson 318 — Key Revocation and Compromise Response
- Notify downstream systems
- that received the incorrect or restricted data
- Lesson 2937 — Rights to Rectification and Restriction
- NotPetya (2017)
- Used the same EternalBlue flaw, causing $10 billion in damages worldwide
- Lesson 1599 — The Critical Role of Patch Management
- npm audit
- (JavaScript/Node.
- Lesson 1264 — Automated Dependency Scanning ToolsLesson 1302 — Dependency Scanning Tools Overview
- NTLM hashes
- and **Kerberos tickets** directly.
- Lesson 2121 — Pass-the-Hash and Pass-the-Ticket Attacks
- NTP (Network Time Protocol)
- is the standard solution for keeping system clocks synchronized.
- Lesson 1473 — Log Timestamp Synchronization
- NTUSER.DAT
- (per-user): Tracks individual user activity, recently accessed files, typed paths, and mounted devices
- Lesson 2403 — Registry Analysis for Windows Forensics
- Nuclear launch codes
- Historical use of multi-person authentication
- Lesson 321 — Secret Sharing Fundamentals
- null byte
- (`\0` or `%00` in URL encoding) is a special character that many programming languages interpret as a string terminator—it signals "end of string here, ignore everything after.
- Lesson 967 — Null Byte Injection in FilenamesLesson 1163 — Null Byte Injection and String Termination
- Null byte injection
- `shell.
- Lesson 947 — Web Shell Upload TechniquesLesson 957 — File Extension Filtering and Bypass Techniques
- Null origin attacks
- Some contexts (like sandboxed iframes or file:// protocols) send `Origin: null`, and some servers mistakenly allow this.
- Lesson 880 — Pre-Domain Wildcard and Null Origin Attacks
- Number flows
- `DF1`, `DF2` helps reference specific paths in threat analysis
- Lesson 2637 — Creating Architecture Data Flow Diagrams
- Number matching
- The login screen displays a 2-3 digit number.
- Lesson 746 — Push Notification-Based MFA
- Numeric Comparison
- Both devices show numbers to confirm
- Lesson 555 — Bluetooth Architecture and Security ModelLesson 556 — Bluetooth Pairing and Bonding Mechanisms
- NVD
- (National Vulnerability Database), maintained by NIST, is the most comprehensive database enriching CVE records with:
- Lesson 1271 — CVE Databases and Vulnerability Feeds
- NwkSKey
- (Network Session Key): Derived from `AppKey`; protects message integrity and network-level metadata
- Lesson 2786 — LoRaWAN Security and Key Hierarchy
O
- O (Organization)
- Company or organization name (`Example Corp`)
- Lesson 172 — Certificate Fields: Subject and Issuer Distinguished Names
- O(1) encryption
- per message instead of **O(n)**, dramatically improving scalability.
- Lesson 2946 — Group E2EE Messaging
- OAuth Token Theft
- Lesson 1143 — Open Redirect Impact and Exploitation
- OAuth tokens
- – temporary credentials for accessing user data
- Lesson 1310 — What Are Secrets and Why They Matter
- OAuth/OIDC
- Simpler integration with abundant libraries, clearer documentation, and JSON Web Tokens that developers find more intuitive.
- Lesson 782 — SAML vs OAuth/OIDC Comparison
- obfuscation
- (disguising the attack) and **encoding tricks** to make malicious payloads look innocent to filters while still executing as intended.
- Lesson 608 — Filter Bypass and ObfuscationLesson 648 — Filter Evasion FundamentalsLesson 1570 — Antivirus Evasion TechniquesLesson 2257 — Malicious Attachments and Payload DeliveryLesson 2739 — Mobile Code Obfuscation and Hardening
- Obfuscation and Case Variation
- Lesson 1855 — WAF Evasion Techniques and Defense
- object
- instead?
- Lesson 596 — JSON Injection and Type ConfusionLesson 795 — Access Control Fundamentals
- Object inspection
- Access built-in objects (`{{config}}` in Flask)
- Lesson 1249 — SSTI Detection and Exploitation Techniques
- Object Storage
- (like AWS S3, Azure Blob, GCS buckets) treats data as discrete objects with metadata.
- Lesson 1781 — Cloud Storage Service Models and Security Responsibilities
- Objection
- builds on Frida, providing simplified commands for common mobile security tasks like bypassing certificate pinning, examining keystores, or dumping app data.
- Lesson 2726 — Dynamic Analysis and Runtime Instrumentation
- Objective
- Self-assessment, continuous improvement, and preparing for external audits.
- Lesson 2543 — Security Audit Types and Objectives
- Oblique References
- Mentioning something tangentially related lets the target fill in gaps without direct questioning.
- Lesson 2267 — Elicitation Techniques and Information Gathering
- Oblivious Transfer
- The other party (the "evaluator") obtains labels for their input bits without revealing which values they chose
- Lesson 258 — Garbled Circuits for Two-Party Computation
- Oblivious transfer overhead
- Expensive cryptographic operations for input selection
- Lesson 258 — Garbled Circuits for Two-Party Computation
- Obscurity always fails eventually
- Through reverse engineering, insider leaks, accidental disclosure, or sheer persistence, attackers will learn your system's internals.
- Lesson 2668 — Open Design (No Security by Obscurity)
- Obscurity-based systems collapse completely
- Lesson 2668 — Open Design (No Security by Obscurity)
- Observation
- Watch the control being executed in real-time
- Lesson 2547 — Control Testing MethodologiesLesson 2621 — Control Attestation and Testing
- Observe
- the response—does the application accept invalid values?
- Lesson 943 — Proxy-Based Business Logic Testing
- Observe binding behavior
- Watch if these injected parameters persist when you retrieve the resource.
- Lesson 935 — Testing for Mass Assignment and HPP
- Observes responses
- to detect security flaws based on behavior and output
- Lesson 1368 — DAST Fundamentals and Runtime Testing
- OCB (Offset Codebook)
- is the fastest of all—even faster than GCM—with single-pass efficiency.
- Lesson 105 — Comparing Authenticated Encryption ModesLesson 128 — AES-CCM and Other AEAD Modes
- OCSP Stapling
- (a future optimization) helps by having servers fetch and cache responses.
- Lesson 192 — Online Certificate Status Protocol (OCSP)Lesson 193 — OCSP Stapling and Must-Staple
- OCTAVE
- emphasizes organizational risk rather than purely technical risk, involving business units directly in identifying critical assets and threats.
- Lesson 2507 — Risk Assessment Methodologies and Frameworks
- OFB
- When you need predictable keystreams or can't tolerate error propagation (but must guarantee perfect synchronization)
- Lesson 100 — CFB and OFB Modes: Feedback Mechanisms
- Off-hours connections
- Minimize likelihood of user/admin noticing active sessions
- Lesson 2156 — RDP and GUI-Based Lateral Movement
- Offboarding
- Disable immediately upon departure → audit resource ownership → delete after retention period → revoke all sessions and keys
- Lesson 1710 — IAM Users: Creation, Authentication, and Lifecycle
- Office 365
- , **Salesforce**, or **Google Workspace**, the provider manages nearly everything— infrastructure, platform, application logic, and most security controls.
- Lesson 1679 — SaaS Security Limitations
- Office Macros
- remain a favorite delivery method.
- Lesson 2257 — Malicious Attachments and Payload Delivery
- Official images
- are maintained by Docker or the software vendor (like `nginx:latest` or `ubuntu:22.
- Lesson 1633 — Base Image Selection and Trust
- Offline storage
- Move archived keys to hardware security modules (HSMs), air-gapped systems, or secure offline media (tamper-evident USB drives, encrypted tape)
- Lesson 319 — Key Archival and Compliance
- Offline validation
- If you can't reach the CDP, do you fail open (security risk) or closed (availability risk)?
- Lesson 191 — Certificate Revocation Lists (CRLs)
- Offline-capable
- No network connection needed to generate codes
- Lesson 740 — TOTP and Time-Based One-Time Passwords
- OIDC Integration
- For enterprise environments, Kubernetes can delegate authentication to external identity providers (like Azure AD or Okta) using OpenID Connect.
- Lesson 1663 — API Server Authentication Mechanisms
- Old API Versions
- Your team launches `v3` of the API, but `v1` and `v2` remain accessible on the same servers.
- Lesson 1035 — API9:2023 - Improper Inventory Management
- Old way
- Give every visitor a permanent key card (service account key)
- Lesson 1726 — Workload Identity Federation
- On every endpoint
- Even internal APIs or "hidden" routes
- Lesson 840 — Server-Side Authorization Enforcement
- On pull request creation
- – Block merging until secrets are removed
- Lesson 1353 — CI/CD Pipeline Secret Scanning
- On-access scanning
- (also called real-time protection) monitors files as they're accessed, opened, or executed.
- Lesson 1569 — Real-Time Protection and Scanning Strategies
- Onboarding
- Create user → assign to appropriate groups → enable MFA → provide temporary password requiring reset
- Lesson 1710 — IAM Users: Creation, Authentication, and Lifecycle
- once
- when you initialize the parser, not after you've already started parsing untrusted XML.
- Lesson 625 — XXE Prevention: Parser ConfigurationLesson 1069 — WebSocket Authentication and Authorization
- One-way
- You cannot reverse the hash to get the original input back
- Lesson 198 — Hash Function FundamentalsLesson 684 — One-Way Hash Functions for Password Storage
- One-way transition
- Once rehashed, passwords never go back to the weak algorithm
- Lesson 692 — Upgrading Legacy Password Storage Systems
- OneCRL
- (Firefox) are browser-maintained lists of revoked certificates.
- Lesson 197 — Modern Revocation Alternatives
- OneTimeUse
- Check if the assertion has already been processed (prevents replay attacks from lesson 780)
- Lesson 781 — SAML Message Validation
- Ongoing monitoring
- Continuously assess; revoke access mid-session if risk spikes
- Lesson 2676 — Continuous Verification and Dynamic Trust
- Online validators
- let you test individual expressions with complexity scores.
- Lesson 1178 — Analyzing Regex Complexity with Tools
- only
- .
- Lesson 387 — Tools for ARP Poisoning: arpspoof and EttercapLesson 429 — Explicit Allow RulesLesson 723 — Secure and HttpOnly FlagsLesson 2577 — Requirements 7-8: Access Control and Identity
- OPA Gatekeeper
- Policy engine using Rego language
- Lesson 1649 — Admission Controllers and Policy EnforcementLesson 1973 — Kubernetes Admission Controllers
- Open Design
- means your security system should remain secure even if an attacker knows exactly how it works.
- Lesson 6 — Open Design and Security Through ObscurityLesson 1214 — Open Design and Security Through TransparencyLesson 2630 — Open Design and Security Through Transparency
- Open files and handles
- identify which files the attacker accessed, modified, or is currently reading—critical for understanding their objectives.
- Lesson 2381 — Live System Evidence Collection
- Open or filtered port
- Typically **no response** (the service receives your packet but doesn't reply to random data)
- Lesson 341 — UDP Scanning Techniques
- Open Policy Agent (OPA)
- uses the Rego language to write policies that evaluate JSON/YAML infrastructure templates.
- Lesson 2015 — Policy as Code for IaC ValidationLesson 3005 — Policy Enforcement with OPA and Sentinel
- Open ports
- and unnecessary services that expand attack surface
- Lesson 2434 — Vulnerability Scanning Fundamentals
- Open ports and services
- MongoDB databases accidentally exposed to the internet
- Lesson 333 — Shodan and Internet-Wide Scanning Databases
- Open Redirects
- Lesson 889 — SSRF Filter Bypass TechniquesLesson 2258 — Link Manipulation and URL Obfuscation
- Open Source Intelligence (OSINT)
- and reconnaissance:
- Lesson 2254 — Spear Phishing and Targeted Attacks
- Open-design systems remain secure
- because cryptographic keys stay secret
- Lesson 2668 — Open Design (No Security by Obscurity)
- OpenDP
- and **Tumult Analytics** offer flexible, composable tools for complex analytical workflows while tracking your epsilon budget across multiple queries.
- Lesson 2921 — Practical Differential Privacy Implementation
- OpenID Connect (OIDC)
- is an identity layer built *on top of* OAuth 2.
- Lesson 769 — OpenID Connect Overview and Relationship to OAuth 2.0
- OpenSSH 9.0
- is critical—older versions may have known vulnerabilities you can research.
- Lesson 344 — Service Version Detection
- Operating effectiveness
- asks: *Does this control actually work in day-to-day operations?
- Lesson 2547 — Control Testing Methodologies
- Operating system differences
- Linux uses 32768-60999 by default, while Windows uses 1025-5000.
- Lesson 1824 — Ephemeral Ports and Stateless Filtering Challenges
- Operating System Layer
- Lesson 2692 — Mobile Attack Surface Overview
- Operational capacity
- measures whether your SOC has enough people, time, and resources to process incoming alerts and incidents without creating dangerous backlogs or exhausting your analysts.
- Lesson 2357 — Operational Capacity and Workload
- Operational disruption
- Downtime costs, productivity loss
- Lesson 2501 — Asset Identification and ValuationLesson 2753 — Consumer IoT vs Industrial IoT Threats
- Operational health indicators
- keep the SOC running smoothly:
- Lesson 2321 — Dashboards and Visualization
- Operational overhead
- Multiple admin consoles and toolsets
- Lesson 2743 — Enterprise Mobility Management (EMM) and UEM
- Operational reality
- Will people actually use it correctly?
- Lesson 2662 — Defense-in-Depth Trade-offs and Cost-Benefit
- Operational resilience
- If one party loses their share, the threshold ensures signing can still occur (e.
- Lesson 264 — Threshold Signatures (TSS)
- Operational Technology (OT)
- refers to computing systems that monitor and control physical processes in the real world—think power plants, water treatment facilities, manufacturing lines, and oil refineries.
- Lesson 2803 — OT and ICS Security Fundamentals
- Operations security
- (logging, monitoring, change management)
- Lesson 1979 — ISO 27001 and Cloud Security Standards
- Operator injection
- Try `{"$ne": null}` or `{"$gt": ""}` to bypass authentication
- Lesson 601 — Detecting and Testing for NoSQL Injection
- Opportunity
- What access or circumstances let them attack?
- Lesson 54 — Creating Attacker Personas for Threat Models
- OPSEC
- Cloud activity generates logs and attribution risks
- Lesson 2234 — Cloud-Based and Distributed Cracking
- Optimistic Locking
- assumes conflicts are rare.
- Lesson 909 — Preventing Race Conditions with Locking Mechanisms
- Optimized
- Proactive threat hunting; continuous improvement culture
- Lesson 34 — Security Maturity Models and Assessment
- Optionally cache
- secrets in memory for the function's lifetime to reduce API calls
- Lesson 1946 — Secrets and Environment Variables in Functions
- oracle
- because the server "answers questions" about padding validity without realizing it's leaking secrets.
- Lesson 97 — CBC Padding Oracle AttacksLesson 572 — Database Fingerprinting via SQL Injection
- Orchestration
- connects disparate security tools into unified workflows.
- Lesson 2325 — Introduction to SOAR Platforms
- Orchestration Engine
- This is the brain of your SOAR platform.
- Lesson 2326 — SOAR Architecture and Components
- Orchestration logs
- (Kubernetes audit logs, scheduler data)
- Lesson 2386 — Cloud and Virtual Environment Evidence
- Orchestrator Dashboards
- Many platforms provide web UIs showing running containers and their configurations, making environment variables visible to operators and potentially attackers who gain dashboard access.
- Lesson 1321 — Environment Variables in Container and Cloud Platforms
- Order matters
- check fast conditions first (ports before deep content inspection)
- Lesson 459 — Writing Effective IDS/IPS Rules
- Ordinal, not numeric
- High ≠ 2× Medium; you can't meaningfully add or compare risks mathematically
- Lesson 2500 — Risk Calculation and Risk Matrices
- Organization details
- (company name, location)
- Lesson 332 — Certificate Transparency Logs and SSL/TLS Discovery
- Organization Leakage
- An enterprise app verifies team membership but doesn't ensure the resource being accessed belongs to that same team's organizational scope.
- Lesson 812 — Context-Dependent Authorization Failures
- Organization Policy Service
- lets you define guardrails that govern how GCP resources can be created and configured across your entire organization, folders, and projects.
- Lesson 1990 — GCP Organization Policy Service
- Organizational boundaries
- Different departments or subsidiaries operating independently but needing occasional integration
- Lesson 1737 — Cross-Account Access FundamentalsLesson 2601 — ISMS Scope Definition
- Organizational controls
- enforce these standards at infrastructure creation time—before resources go live.
- Lesson 2019 — Resource Tagging, Naming, and Organizational Controls in IaCLesson 2605 — Annex A Controls Selection
- Organizational harm
- Regulatory fines, reputational damage, legal liability
- Lesson 2891 — Privacy Risk Assessment Methodology
- Organizational measures
- Lesson 2892 — Mitigation Strategies and Controls
- Organizational units
- (Department manager accessing another department's records)
- Lesson 812 — Context-Dependent Authorization Failures
- Organized Criminals
- are financially motivated professionals.
- Lesson 47 — Understanding Adversary Types and Skill Levels
- origin
- is a unique combination of three components in a URL:
- Lesson 856 — Origin Definition and ComparisonLesson 1056 — Origin Components: Scheme, Host, and PortLesson 1062 — Browser Storage and Origin IsolationLesson 1277 — SBOM Formats: SPDX, CycloneDX, and SWID
- Origin and Referer headers
- when present to confirm the request came from your domain.
- Lesson 873 — Defense-in-Depth CSRF Strategy
- Origin Enforcement
- Servers must validate the `Origin` header during handshake to prevent unauthorized cross-origin connections.
- Lesson 1068 — WebSocket Protocol and Security Model
- Origin exposure
- Attackers may try to bypass the CDN and attack the origin directly
- Lesson 1862 — CDN Architecture and Threat Model
- Origin TLS validation
- ensures your CDN verifies your origin server's certificate—don't allow "accept any certificate" settings in production.
- Lesson 1864 — CDN SSL/TLS Configuration
- Origin-based restrictions
- Still bound by the Same-Origin Policy through its JavaScript interface
- Lesson 1086 — WebAssembly Security Boundaries
- Original executable path
- Lesson 2404 — Artifact Analysis: Prefetch, Shimcache, and Amcache
- Original Vulnerability
- What risk or gap this addresses (CVE, configuration issue, etc.
- Lesson 2469 — Documenting and Reviewing Compensating Controls
- ORM query language injection
- Some ORM query languages (like HQL) can be vulnerable if you build dynamic query strings
- Lesson 1238 — ORM Security Fundamentals
- ORMs (Object-Relational Mappers)
- Built-in query methods usually parameterize automatically, but beware "raw query" or "execute" functions that accept strings
- Lesson 1234 — Database API Safety and Parameterization
- Orphaned external IDs
- Are third-party integrations still valid?
- Lesson 1743 — Cross-Account Access Auditing
- OS fingerprinting
- determines the underlying operating system (e.
- Lesson 357 — Introduction to Service and OS Fingerprinting
- OS handoff
- – Transfers control to the operating system (if one exists)
- Lesson 2759 — Firmware Fundamentals and Attack Surface
- OS Package Vulnerabilities
- Trivy detects known CVEs in packages installed via `apt`, `yum`, `apk`, and other OS-level package managers.
- Lesson 1635 — Trivy and Open Source Scanners
- OSCORE
- builds on CoAP (which you've studied) to provide end-to-end encryption at the application layer, not transport.
- Lesson 2797 — Authentication Protocols for Constrained Environments
- OSI Model
- (7 layers): Physical, Data Link, Network, Transport, Session, Presentation, Application
- Lesson 374 — Understanding Network Packets and Protocol Layers
- OSINT
- includes publicly available feeds like AlienVault OTX, Abuse.
- Lesson 2339 — Threat Intelligence Feeds and Sources
- OSINT feeds
- (VirusTotal, AbuseIPDB) for IP/domain reputation
- Lesson 2330 — Automated Incident Triage and Enrichment
- OSS-Fuzz
- is Google's free service for open-source projects.
- Lesson 1394 — Continuous Fuzzing and IntegrationLesson 3014 — Automated Fuzzing in CI/CD
- OST (Offline Storage Table)
- files cache Exchange mailboxes locally.
- Lesson 2406 — Email and Communication Forensics
- OT (operational technology)
- networks—those running industrial control systems, SCADA, and physical processes—were isolated from corporate **IT (information technology)** networks.
- Lesson 2806 — Securing IT/OT Convergence
- Other Notable Incidents
- Lesson 2805 — OT-Specific Threats and Attacks
- Other Risks
- Lack of transparency (users don't know what you collect), inability to exercise rights (no deletion mechanism), algorithmic bias, or function creep (using data for unintended purposes).
- Lesson 2890 — Privacy Risk Identification
- Other Services
- Lesson 1757 — Service-Specific Escalation Vectors
- Other standards
- like SOX (financial reporting), GDPR (data protection), and various government frameworks also reference integrity monitoring as a best practice or requirement.
- Lesson 1506 — FIM for Compliance Requirements
- Other Vulnerable Points
- Lesson 564 — SQL Query Structure and Injection Points
- OU (Organizational Unit)
- Department or division (`Engineering`, `IT Security`)
- Lesson 172 — Certificate Fields: Subject and Issuer Distinguished Names
- Out of Band (OOB)
- Uses NFC or other channel
- Lesson 555 — Bluetooth Architecture and Security ModelLesson 556 — Bluetooth Pairing and Bonding Mechanisms
- out of scope
- (prohibited).
- Lesson 2073 — Vulnerability Disclosure PoliciesLesson 2079 — Building an Internal Bug Bounty Program
- Out-of-band (OOB) data exfiltration
- solves this by making the compromised server send the data to you through a *different communication channel* that you control.
- Lesson 606 — Out-of-Band Data Exfiltration
- Out-of-Band (OOB) SQL Injection
- solves this by making the database server send data through a completely different channel— typically DNS lookups or HTTP requests to an attacker-controlled server.
- Lesson 577 — Out-of-Band SQL Injection
- Out-of-band callbacks
- Webhooks or notifications sent to attacker-controlled endpoints
- Lesson 820 — Blind IDOR and Indirect Object References
- Out-of-band confirmation
- If someone calls claiming to be from your bank, hang up and call the official number yourself
- Lesson 2270 — Detecting and Resisting Manipulation Attempts
- Out-of-band provisioning
- Keys transferred via USB, QR code, or physical button press during setup.
- Lesson 2791 — Pre-Shared Key Authentication for IoT
- Out-of-Band Techniques
- Use services like Burp Collaborator or Interactsh that monitor for:
- Lesson 888 — Blind SSRF Detection and Exploitation
- Out-of-Band Updates
- Automated processes, scripts, or third-party tools modify resources without updating the IaC source.
- Lesson 2022 — Infrastructure Drift: Causes and Risks
- Out-of-band verification
- Examine the system using tools that operate independently of the potentially compromised OS.
- Lesson 1557 — Rootkit Detection Challenges and FundamentalsLesson 2945 — Identity Verification in E2EE
- Out-of-Cycle
- , or **Immediate**.
- Lesson 2448 — SSVC (Stakeholder-Specific Vulnerability Categorization)
- Out-of-scope items
- Production databases, third-party services, certain time windows
- Lesson 2088 — Common Testing Targets and Scope
- Out-of-scope targets
- are systems researchers must not touch—even if vulnerabilities exist there.
- Lesson 2481 — Program Scope and Rules of Engagement
- Outbound
- Private instance → NAT gateway → Internet Gateway → Internet
- Lesson 1831 — NAT Gateway Architecture
- Outbound rule
- Must allow ports 1024-65535 back to clients (often forgotten!
- Lesson 1824 — Ephemeral Ports and Stateless Filtering Challenges
- Outbound rules
- control what can leave—preventing stolen data from being smuggled out or compromised systems from calling home to attackers.
- Lesson 1587 — Inbound and Outbound Rule DesignLesson 1925 — Instance Security Groups and Network Isolation
- Outcome
- Success or failure (and why it failed)
- Lesson 844 — Authorization Logging and MonitoringLesson 2635 — Compromise Recording and Auditability
- Outdated components
- with known vulnerabilities
- Lesson 2751 — Common IoT Vulnerabilities and Weaknesses
- Outdated input validation
- that's vulnerable to injection attacks
- Lesson 998 — API Versioning and Legacy Endpoint Vulnerabilities
- Outdated or unmaintained services
- may contain known exploits
- Lesson 1431 — Service Attack Surface Analysis
- Outdated packages
- are the most frequent vulnerability.
- Lesson 2875 — Dependency Vulnerabilities in ML Frameworks
- Outdated rules
- triggering on modern legitimate protocols
- Lesson 460 — False Positives and Alert Tuning
- Outer layer (visible)
- Your TLS connection's SNI (Server Name Indication) shows `allowed-site.
- Lesson 2995 — Domain Fronting and CDN Circumvention
- Outlier detection
- Flag training samples that deviate statistically from normal patterns—potential poisoned examples
- Lesson 2826 — Defense Strategies Against Poisoning
- Output
- | Variable length | Fixed length |
- Lesson 206 — Non-Reversibility and One-Way PropertyLesson 441 — NAT and Masquerading with iptables
- Output Decoding
- The final wire labels are mapped back to the actual result
- Lesson 258 — Garbled Circuits for Two-Party Computation
- Output encoding
- tries to neutralize attacks before display
- Lesson 657 — CSP Fundamentals and PurposeLesson 668 — Output Encoding and Escaping FundamentalsLesson 675 — Defense-in-Depth XSS StrategyLesson 1039 — Input Validation and Output EncodingLesson 1151 — Input Validation vs Output EncodingLesson 1209 — Defense in Depth Through Layered ValidationLesson 1218 — Input Validation vs Output Encoding PhilosophyLesson 1219 — When Input Validation Fails: Why Encoding Matters (+2 more)
- Output Feedback (OFB)
- modes transform block ciphers into stream ciphers using feedback loops, but they differ in *what* gets fed back and how errors propagate.
- Lesson 100 — CFB and OFB Modes: Feedback Mechanisms
- Output generation
- – probability distribution over possible next tokens
- Lesson 2854 — LLM Architecture and Attack Surface
- Output size
- 256-bit outputs (SHA-256, BLAKE2s) balance security and storage efficiency
- Lesson 216 — Hash Function Selection in Modern Systems
- outside
- the intended directory.
- Lesson 974 — ZIP Slip and Archive Extraction AttacksLesson 1319 — The Twelve-Factor App and Environment Configuration
- Over-fetching attacks
- Deeply nested queries can exhaust server resources
- Lesson 999 — GraphQL Architecture and Security Implications
- Over-privileged accounts
- One compromised admin account = full environment access
- Lesson 1696 — Identity as Attack Surface
- Over-the-Air Activation (OTAA)
- Devices join the network dynamically using a `DevEUI` (device identifier), `AppEUI` (application identifier), and a pre-shared `AppKey`.
- Lesson 2786 — LoRaWAN Security and Key Hierarchy
- Overall compliance percentage
- (Patched systems / Total systems) × 100
- Lesson 1607 — Patch Compliance Monitoring and Reporting
- Overflow
- malicious input floods the buffer, overwriting the return address
- Lesson 2108 — Memory Corruption Exploits: Buffer Overflows
- Overlap period
- Both secrets work for authentication (maybe 5-15 minutes)
- Lesson 1346 — Zero-Downtime Rotation Patterns
- Overlap periods
- Issue the new credential while keeping the old one valid temporarily, allowing services time to update
- Lesson 1348 — API Key and Certificate Rotation
- Overlapping alternation
- happens when alternatives can match the same input in multiple ways:
- Lesson 1176 — Evil Regex Patterns: Nested Quantifiers and Alternation
- Overlong UTF-8
- The forward slash `/` should be encoded as `%2F`, but attackers might use `%c0%af` (an invalid two-byte sequence).
- Lesson 1160 — URL Encoding Attacks and Bypasses
- Overly broad signatures
- that match both attacks and normal behavior
- Lesson 460 — False Positives and Alert Tuning
- Overly complex designs
- Too many tiny segments create management overhead and increase misconfiguration risk.
- Lesson 2649 — VLAN and Subnet Segmentation
- Overly Permissive Execution Roles
- Lesson 1965 — Security Misconfiguration
- Overly permissive policies
- A user with `iam:AttachUserPolicy` can attach an admin policy to themselves
- Lesson 1753 — IAM Privilege Escalation Overview
- Overly permissive principals
- Does `"Principal": "*"` appear with weak conditions?
- Lesson 1743 — Cross-Account Access Auditing
- Overly permissive RADIUS policies
- granting excessive network access
- Lesson 547 — 802.1X Security Considerations and Attacks
- Overprivileged automation
- IaC execution requires powerful credentials that, if compromised, grant infrastructure-wide control
- Lesson 2012 — Infrastructure as Code Fundamentals and Security Implications
- Overriding object properties
- `<form name="userData"><input name="isAdmin"></form>` could clobber checks like `if(userData.
- Lesson 679 — DOM Clobbering Attacks
- Overwriting
- Write random data multiple times over the key's storage location.
- Lesson 320 — Key Destruction and Sanitization
- OWASP Dependency-Check
- Lesson 1264 — Automated Dependency Scanning Tools
- OWASP Testing Guide
- focuses specifically on web application security testing, offering detailed methodologies for authentication, session management, input validation, and other web-specific attack vectors.
- Lesson 2082 — Penetration Testing Methodologies
- OWASP Top 10
- is a regularly updated document that ranks the most critical security risks facing web applications.
- Lesson 1200 — History and Purpose of the OWASP Top 10
- OWASP ZAP
- can detect common patterns.
- Lesson 627 — Testing for XXE VulnerabilitiesLesson 943 — Proxy-Based Business Logic Testing
- OWASP ZAP API Scan
- , **Burp Suite Enterprise**, **Postman's security testing**, and specialized solutions like **42Crunch** or **StackHawk**.
- Lesson 3013 — API Security Testing Automation
- Owner/Responsible Party
- Who maintains and monitors this control
- Lesson 2469 — Documenting and Reviewing Compensating ControlsLesson 2606 — Statement of Applicability (SoA)
- Ownership
- (team, project, cost center)
- Lesson 2005 — Cloud Asset Discovery and InventoryLesson 2523 — Risk Treatment Plans and Prioritization
P
- P-256
- (also called secp256r1 or prime256v1): The most common choice, offering ~128 bits of security.
- Lesson 166 — Standard Elliptic Curves (NIST, secp256k1)
- P-384
- Provides ~192 bits of security for applications needing stronger guarantees.
- Lesson 166 — Standard Elliptic Curves (NIST, secp256k1)
- P-521
- Maximum NIST-recommended strength at ~256 bits (note: 521, not 512—a Mersenne prime optimization).
- Lesson 166 — Standard Elliptic Curves (NIST, secp256k1)
- P2P botnets
- Bots communicate peer-to-peer, making takedown harder
- Lesson 1526 — Botnets and Command-and-Control
- P2P protocols
- for circumvention (like Snowflake for Tor) turn ordinary users into temporary bridges.
- Lesson 2997 — Decentralized and P2P Circumvention
- PaaS
- You secure your application code and data.
- Lesson 1676 — Understanding IaaS, PaaS, and SaaS Models
- Package Identifiers
- Every component needs a unique identifier.
- Lesson 1279 — SBOM Contents and Metadata Quality
- Package name reservation
- means proactively registering placeholder packages on public repositories (npm, PyPI, RubyGems, etc.
- Lesson 1291 — Package Name Reservation and Defensive Registration
- Package signing
- uses cryptographic technology (typically GPG - GNU Privacy Guard) to create a mathematical signature that only the legitimate publisher can produce.
- Lesson 1294 — Package Signing and GPG Verification
- Package verification
- confirms cryptographic signatures on downloaded artifacts.
- Lesson 2875 — Dependency Vulnerabilities in ML Frameworks
- Packet captures (PCAP files)
- contain full network conversations, including payload data.
- Lesson 2384 — Network Evidence Collection
- Packet Decoder
- – Captures raw network traffic and breaks it down into protocol layers (Ethernet → IP → TCP/UDP → Application data).
- Lesson 458 — Snort: Architecture and Rule Syntax
- packet filtering firewalls
- work.
- Lesson 417 — Packet Filtering FirewallsLesson 418 — Stateful Inspection Firewalls
- Packet fragmentation behavior
- – How systems handle breaking up large packets differs
- Lesson 363 — Passive OS Fingerprinting
- Packet loss or retransmissions
- Interception tools may drop packets or introduce errors
- Lesson 410 — Signs of Network Interception
- Packet loss possible
- Under heavy load, the switch may drop mirrored packets to prioritize production traffic
- Lesson 463 — Network TAPs vs SPAN Ports
- Packet Manipulation
- lets you inject, modify, or drop network packets on-the-fly.
- Lesson 2243 — Bettercap for MitM and Network Attacks
- Packet sizes and timing
- Can reveal application behavior or data exfiltration patterns
- Lesson 2413 — TLS Traffic Analysis
- packets
- .
- Lesson 374 — Understanding Network Packets and Protocol LayersLesson 2960 — OpenPGP Message Format and Operations
- Packing and Crypting
- compress and encrypt the entire malware payload.
- Lesson 1570 — Antivirus Evasion Techniques
- padding oracle
- tells an attacker whether decrypted padding is valid or invalid.
- Lesson 111 — Exploiting Padding Oracles Step-by-StepLesson 124 — MAC-then-Encrypt and Encrypt-and- MAC Pitfalls
- padding oracle attacks
- .
- Lesson 145 — RSA Padding Schemes: PKCS#1 v1.5Lesson 146 — OAEP: Optimal Asymmetric Encryption Padding
- Page table verification
- Comparing the hypervisor's view of memory mappings against what the OS reports exposes hidden pages
- Lesson 1563 — Hardware-Assisted Detection Techniques
- pairing
- the process of establishing trust between devices:
- Lesson 555 — Bluetooth Architecture and Security ModelLesson 556 — Bluetooth Pairing and Bonding Mechanisms
- PAM (Pluggable Authentication Modules)
- is Linux's authentication framework.
- Lesson 1427 — Password Policies and Account Security
- Parallel
- CTR mode allows encrypting multiple blocks simultaneously
- Lesson 125 — AES-GCM: Galois/Counter Mode
- Parallel state transitions
- Triggering state changes from multiple points simultaneously
- Lesson 917 — Concurrent Workflow Exploitation
- Parallelizable
- Unlike CBC mode (which chains blocks), each block's counter can be encrypted independently.
- Lesson 98 — CTR Mode: Turning Block Ciphers into Streams
- Parallelization
- How many probes are sent simultaneously
- Lesson 345 — Scan Timing and PerformanceLesson 3035 — Performance Optimization for Security Scans
- Parameter discovery
- Finding URL parameters and hidden form fields
- Lesson 1371 — Crawling and Application Discovery
- Parameter entities
- are special entities defined in the DTD (Document Type Definition) and used *within* the DTD itself.
- Lesson 624 — XInclude and Parameter Entity Attacks
- Parameter Identification and Fuzzing
- Lesson 893 — Testing for SSRF Vulnerabilities
- Parameter Manipulation
- Lesson 832 — Manual Testing Techniques for Access ControlLesson 835 — Testing State-Based and Workflow Authorization
- Parameter tampering
- is the practice of modifying these client-controlled values to trick the server into granting elevated privileges.
- Lesson 809 — Parameter Tampering for Authorization BypassLesson 824 — Vertical Privilege Escalation Techniques
- Parameter Type Confusion
- Lesson 995 — API Parameter Pollution and Injection
- Parameterization built-in
- When you pass parameters to a stored procedure, the database treats them as data, not executable code—preventing SQL injection (like prepared statements)
- Lesson 1243 — Stored Procedures and Database-Side Security
- Parameterized Queries
- (when supported by your LDAP library) separate data from query structure, preventing attackers from manipulating the query logic.
- Lesson 615 — Preventing LDAP InjectionLesson 1236 — SQL Injection Review and Defense FundamentalsLesson 1238 — ORM Security Fundamentals
- Parse the URL
- using a reliable library to extract protocol, host, and path
- Lesson 894 — URL and Input Validation for SSRF Prevention
- Parser Differentials
- Lesson 889 — SSRF Filter Bypass Techniques
- Parsing
- extracts meaningful fields from unstructured text (IP addresses, usernames, event types).
- Lesson 1488 — Log Normalization and ParsingLesson 1879 — Cloud Log Collection and NormalizationLesson 2317 — Event Normalization and Parsing
- Partial HE
- Supports only addition *or* multiplication (early RSA has multiplicative homomorphic properties)
- Lesson 249 — Homomorphic Encryption Fundamentals
- Partial responses
- The server returns data that doesn't match your request's expected length or content
- Lesson 1108 — Detecting Request Smuggling Vulnerabilities
- Partially compliant
- Limited access (maybe only to HR portal)
- Lesson 2678 — Device Trust and Endpoint Security
- Partially covered
- Techniques where detection exists but may be weak or incomplete
- Lesson 2356 — Detection Coverage Measurement
- Partially Homomorphic Encryption (PHE)
- supports only one type of operation (either addition OR multiplication), unlimited times.
- Lesson 250 — Types of Homomorphic Encryption
- Participant information
- Who communicated with whom (sender, recipients, CC/BCC)
- Lesson 2974 — What is Metadata and Why It Matters
- Partner/vendor access
- Granting third-party systems limited access without creating users in your account
- Lesson 1737 — Cross-Account Access Fundamentals
- Pass functions directly
- to `setTimeout`/`setInterval`
- Lesson 1052 — eval() and Dynamic Code Execution Risks
- Pass-the-Hash
- , **Pass-the-Ticket**, and **PowerShell Remoting**.
- Lesson 2218 — PowerShell Empire Framework
- Pass-the-Ticket (PtT)
- attacks exploit this by stealing these tickets from memory and reusing them to authenticate as the victim user across the network.
- Lesson 2152 — Pass-the-Ticket and Kerberos Exploitation
- passive
- .
- Lesson 327 — OSINT Fundamentals and Information SourcesLesson 425 — High Availability and Clustering
- Passive (IDS mode)
- Lesson 455 — IDS vs IPS: Core Differences and Deployment Models
- Passive discovery
- Monitor network traffic to detect active hosts without sending probes
- Lesson 2442 — Scan Coverage and Asset Discovery
- Passive fingerprinting
- observes naturally occurring network traffic without sending probes.
- Lesson 357 — Introduction to Service and OS Fingerprinting
- Passive OS fingerprinting
- flips that approach: instead of actively poking at targets, you simply observe and analyze network traffic that devices naturally generate.
- Lesson 363 — Passive OS Fingerprinting
- passive reconnaissance
- you never touch the target directly, making it undetectable.
- Lesson 335 — Wayback Machine and Historical Website AnalysisLesson 337 — Active vs Passive Reconnaissance
- Passive Scanner
- Analyzes traffic without sending extra requests, looking for error messages or suspicious patterns you've already seen in normal browsing.
- Lesson 591 — Burp Suite SQL Injection Scanner Extensions
- passive scanning
- it warns you but doesn't fix anything.
- Lesson 1303 — GitHub Dependency Scanning and DependabotLesson 2212 — Burp Scanner Configuration and Crawling
- Passive spidering
- Burp observes traffic you generate manually (clicking links, submitting forms) and maps what it sees.
- Lesson 2208 — Target Scope and Site Map Management
- Passkey Entry
- Six-digit code verification
- Lesson 555 — Bluetooth Architecture and Security ModelLesson 556 — Bluetooth Pairing and Bonding Mechanisms
- Passkeys
- are the next evolution of passwordless authentication, building on **WebAuthn** (which you learned earlier).
- Lesson 754 — Passkeys and Cross-Device Authentication
- Password and MFA requirements
- enforcing strong authentication
- Lesson 1690 — Identity and Access Management Boundaries
- Password authentication
- convenient but vulnerable to brute force
- Lesson 1440 — SSH Protocol Fundamentals and Security Model
- Password fatigue
- leads to poor practices (writing them down, reusing across sites)
- Lesson 750 — Passwordless Authentication Fundamentals
- Password protection
- adds a second factor: even with the link, users must provide a password.
- Lesson 2969 — Secure Link Sharing and ExpirationLesson 2972 — Recipient Verification and Authentication
- Password Reset Bypass
- An application verifies your identity in step 1, sends a code in step 2, and changes your password in step 3.
- Lesson 808 — Multi-Step Process Authorization Failures
- Password Reset Poisoning
- An attacker requests a password reset for `victim@example.
- Lesson 1125 — Host Header Injection Vulnerabilities
- Password reuse
- Users recycle old passwords with minor tweaks
- Lesson 702 — Password Expiration and Rotation Policies
- Password Reuse Reality
- Most users reuse passwords across multiple sites.
- Lesson 683 — Why Plain Text Password Storage is Catastrophic
- Password-protected archives
- force the user to manually extract files, bypassing automated scanning.
- Lesson 2257 — Malicious Attachments and Payload Delivery
- Passwords
- – credentials for databases, services, or user accounts
- Lesson 1310 — What Are Secrets and Why They MatterLesson 1710 — IAM Users: Creation, Authentication, and Lifecycle
- PASTA
- Ideal when you need business alignment and risk context.
- Lesson 75 — Comparing Threat Modeling Methodologies
- Paste Sites
- Pastebin, GitHub Gists, and similar platforms often contain debug logs or troubleshooting snippets with embedded credentials.
- Lesson 1356 — Monitoring for Public Secret Exposure
- Patch and Update
- Lesson 1924 — Instance Launch Security and AMI Hardening
- Patch availability
- – ensuring fixes are ready or in testing
- Lesson 2476 — CVE Assignment and Public Disclosure
- Patch Baselines
- Define which patches get applied—critical security updates immediately, optional updates on weekends, or custom approval workflows.
- Lesson 1929 — VM Patch Management and Update Strategies
- Patch compliance monitoring
- is the continuous process of verifying which systems have received their patches and which haven't.
- Lesson 2461 — Patch Compliance Monitoring and Reporting
- Patch compliance rate
- transforms into "Maintained 99.
- Lesson 2533 — Communicating Metrics to Leadership
- Patch Groups
- Organize instances by environment (dev patches weekly, production monthly) or function (web servers separate from databases).
- Lesson 1929 — VM Patch Management and Update Strategies
- Patch kernel memory directly
- to hide processes, files, or network connections
- Lesson 1547 — Kernel-Mode Rootkits Fundamentals
- Patch known vulnerabilities promptly
- – Critical security patches must be installed within one month of release.
- Lesson 2576 — Requirement 6: Secure Development
- Patch levels
- – exact OS updates installed, not just guesses from banner grabbing
- Lesson 2436 — Authenticated Scanning and Credentialed Checks
- Patch Management Integration
- The most powerful aspect: CVM systems feed vulnerability data directly into patch management platforms.
- Lesson 1616 — Continuous Vulnerability Monitoring
- Patch Management Systems
- continuously monitor vendor security feeds, CVE databases, and system inventories to identify missing patches.
- Lesson 3047 — Automated Vulnerability Patching
- Patch prioritization
- Use SBOM data to understand transitive dependency chains and determine which applications need urgent updates when a critical vulnerability emerges.
- Lesson 1282 — SBOM Distribution and Consumption
- Patch testing and staging
- involves creating isolated test environments that mirror production, allowing you to validate patches for compatibility issues, performance impacts, and unintended side effects before they touch live systems.
- Lesson 1603 — Patch Testing and Staging
- patching
- when apps detect Frida or use strong anti-tampering.
- Lesson 2727 — Certificate Pinning Bypass TechniquesLesson 2753 — Consumer IoT vs Industrial IoT Threats
- Patching Cadence
- monitors how quickly critical patches get applied post-release.
- Lesson 3037 — Key Security Metrics and KPIs
- Path
- Restricts the cookie to specific URL paths.
- Lesson 722 — Cookie Fundamentals and AttributesLesson 1074 — Cookie Security Attributes Deep Dive
- Path attribute
- Limits cookies to specific URL paths.
- Lesson 1059 — Cookie Scoping and SameSite Attribute
- Path Restrictions
- Service workers can only control pages at or below their own path.
- Lesson 1082 — Service Worker Registration and Hijacking
- Path sensitivity
- means the tool remembers the conditions and checks that happened earlier in a code path.
- Lesson 1361 — Control Flow Analysis and Path Sensitivity
- Path traversal
- exploits the way operating systems handle relative paths to escape these boundaries.
- Lesson 964 — Path Traversal FundamentalsLesson 965 — Absolute Path InjectionLesson 1148 — Why Input Validation MattersLesson 1372 — Active Scanning and Attack SimulationLesson 2106 — Chaining Vulnerabilities for Impact
- Path Traversal in Filenames
- Lesson 953 — Server-Side File Overwrite Vulnerabilities
- Path Traversal rules
- identify file operations using user-controlled paths
- Lesson 1362 — SAST Rule Sets and Vulnerability Detection
- Path-based access
- Application A can read `secrets/app-a/*` but not `secrets/app-b/*`
- Lesson 1342 — Access Control for Runtime Secret Retrieval
- Pattern
- User assumes role → Creates new admin policy → Attaches policy to their account
- Lesson 1881 — Correlation Rules and Use Cases
- Pattern Detection
- Monitor for suspicious patterns like sequential IP ranges, identical timing between requests from "different" clients, or unusually similar request structures.
- Lesson 1017 — Rate Limiting Bypass Prevention and Monitoring
- Pattern Identification
- Look for common structures in cracked passwords:
- Lesson 2235 — Password Analysis and Cracking Metrics
- pattern matching
- looking for specific keywords or character sequences.
- Lesson 648 — Filter Evasion FundamentalsLesson 1356 — Monitoring for Public Secret ExposureLesson 2013 — Secrets in IaC: Detection and PreventionLesson 2050 — Secret Detection in CommitsLesson 3009 — Static Application Security Testing (SAST) Deep DiveLesson 3031 — Secret Detection in Pipelines
- Pattern recognition
- is your first tool.
- Lesson 1482 — Log Analysis and Correlation TechniquesLesson 2027 — Drift Reporting and Exception ManagementLesson 2345 — False Positive Identification and AnalysisLesson 2976 — Traffic Analysis and Correlation AttacksLesson 3016 — False Positive Management
- Pattern specificity
- – whether to match strict formats only
- Lesson 1258 — False Positive Management and Custom Rules
- Pattern-based signatures
- search for distinctive byte sequences within files—unique code snippets, strings, or instruction patterns that characterize specific malware families.
- Lesson 1565 — Signature-Based Detection Fundamentals
- Pattern-Based Tokens
- Tokens using timestamps, user IDs, or predictable randomness can be reverse-engineered and enumerated.
- Lesson 720 — Session Token Brute-Force and Enumeration
- patterns
- or **signatures** in network traffic—like scanning for a known attack phrase in a single packet.
- Lesson 369 — Fragmentation and Packet ManipulationLesson 696 — Brute Force and Dictionary Attacks
- payload
- (the actual data) of the IP packet.
- Lesson 476 — IPsec Modes: Transport vs TunnelLesson 770 — ID Tokens and JWT Structure in OIDC
- Payload concealment
- Hiding XSS or injection attacks that validators miss because they don't normalize invisible characters before checking.
- Lesson 1172 — Zero-Width and Invisible Characters
- Payload delivery
- Dropping reverse shells, credential stealers, or persistence mechanisms
- Lesson 2251 — QR Code and USB Drop Attack Tools
- Payload execution
- attacker's shellcode or gadget chain runs
- Lesson 2108 — Memory Corruption Exploits: Buffer Overflows
- Payloads
- Code executed after successful exploitation
- Lesson 2193 — Metasploit Architecture and Components
- Payment Duplication
- Lesson 903 — Race Conditions in Financial Transactions
- PBKDF2
- (Password-Based Key Derivation Function 2) deliberately slows down key derivation to make brute-force attacks impractical.
- Lesson 138 — PBKDF2: Password-Based Key DerivationLesson 305 — Key Stretching and Derivation
- PCI DSS
- minimum 3 months immediately available, 12 months archived
- Lesson 1490 — Log Management for ComplianceLesson 1984 — Industry-Specific Cloud ComplianceLesson 2004 — Core CSPM CapabilitiesLesson 2429 — Legal and Regulatory Reporting RequirementsLesson 2536 — Due Diligence and Vendor SelectionLesson 2545 — Audit Frameworks and Standards
- PCI-DSS
- (Payment Card Industry Data Security Standard) don't just ask you to secure everything equally — they demand that you specifically isolate and protect cardholder data.
- Lesson 453 — Segmentation for ComplianceLesson 553 — Wireless Security Policies and ComplianceLesson 1506 — FIM for Compliance RequirementsLesson 2007 — Compliance Benchmarks and MappingLesson 2617 — Framework Mapping and Harmonization
- PCI-DSS (Payment Card Industry)
- Lesson 1772 — Compliance and Encryption at Rest Requirements
- PCI-DSS Requirement 2.2
- "Security group allows 0.
- Lesson 3007 — IaC Compliance Frameworks and Benchmarks
- files begin with `25 50 44 46` (ASCII: "%PDF")
- Lesson 955 — Magic Byte Verification and File Type DetectionLesson 973 — XXE in Document Processing
- PDF + HTML
- A file that renders as PDF in viewers but executes JavaScript if opened in browsers
- Lesson 975 — Polyglot Files and Format Confusion
- PDF Documents
- Some PDF parsers support embedded XML (XFDF forms).
- Lesson 623 — XXE via File Upload and Content Types
- PDF Generators
- Lesson 884 — Basic SSRF Exploitation Techniques
- PDFs
- can contain JavaScript or exploit vulnerabilities in PDF readers.
- Lesson 2257 — Malicious Attachments and Payload Delivery
- PEAP
- (Protected EAP) use a two-phase approach:
- Lesson 543 — EAP-TTLS and PEAP Tunneled MethodsLesson 545 — Enterprise Wi-Fi Deployment Architecture
- Peer review
- More eyes find more flaws (Linux, OpenSSL, TLS)
- Lesson 2630 — Open Design and Security Through Transparency
- PEI (Pre-EFI Initialization)
- Basic hardware initialization—RAM, chipset
- Lesson 1459 — UEFI Architecture and Boot Process
- PEM
- wraps DER-encoded data in Base64 and adds header/footer lines.
- Lesson 179 — Certificate Encoding: PEM, DER, PKCS#12, and Formats
- Penetration testing
- (often called "pentesting" or "ethical hacking") is an authorized, simulated cyberattack against your systems to identify exploitable vulnerabilities before real attackers do.
- Lesson 2080 — What is Penetration Testing?Lesson 2085 — Penetration Testing vs Red TeamingLesson 2171 — Adversary Emulation vs Penetration TestingLesson 2579 — Requirements 11-12: Testing and PolicyLesson 2653 — Testing and Validating Segmentation
- People
- – Training staff, defining roles, creating security awareness
- Lesson 22 — ISO 27001 and Security Management SystemsLesson 2422 — Root Cause Analysis Methodologies
- People understand the "why"
- Not just following rules, but grasping how their actions affect confidentiality, integrity, and availability
- Lesson 36 — Building a Security Culture and Mindset
- PEP 458
- introduces **TUF** (The Update Framework) to PyPI, protecting against various attacks:
- Lesson 1296 — PyPI Package Security
- PEP 480
- extends this with cryptographic signatures and metadata verification.
- Lesson 1296 — PyPI Package Security
- Per-app VPN tunneling
- routes corporate traffic through secure channels
- Lesson 2745 — BYOD Security Strategies
- Per-instance permissions
- through different roles
- Lesson 1734 — Instance Profiles and Container Credentials
- Per-user
- `C:\Users\[Username]\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup`
- Lesson 1540 — Startup Folders and Shell Extensions
- Per-user controls
- In `authorized_keys`, prefix keys with restrictions:
- Lesson 503 — SSH Tunnel Security and Authentication
- Per-User Rate Limiting
- Lesson 986 — File Size and Rate Limiting Controls
- Percentage of components modeled
- How many of your applications, services, or systems have threat models?
- Lesson 84 — Measuring Threat Modeling Effectiveness
- Perform man-in-the-middle attacks
- to intercept sensitive data
- Lesson 534 — Evil Twin Attacks: Mechanics and Execution
- Perform reconnaissance
- by capturing screenshots or keystrokes
- Lesson 2277 — USB Drop Attacks and Malicious Devices
- Performance
- Eliminates separate OCSP queries
- Lesson 193 — OCSP Stapling and Must-StapleLesson 224 — Alternative MAC Constructions: KMAC and Poly1305Lesson 228 — EdDSA and Ed25519 SignaturesLesson 261 — Practical MPC Applications and LimitationsLesson 489 — OpenVPN Network Topologies: Routed vs Bridged
- Performance Benefits
- Lesson 1841 — Direct Connect and Dedicated Connectivity
- Performance Impact
- Lesson 1474 — Performance and Storage ConsiderationsLesson 2662 — Defense-in-Depth Trade-offs and Cost-Benefit
- Performance Monitoring
- Track your SIEM's query response times, ingestion lag, and resource utilization.
- Lesson 1885 — SIEM Performance Tuning and False Positives
- performance overhead
- because it:
- Lesson 1382 — IAST Deployment Models and Performance ImpactLesson 1766 — Client-Side Encryption for Cloud Data
- Performance overhead awareness
- Excessive logging impacts function execution time and costs.
- Lesson 1966 — Insufficient Logging and Monitoring
- Performance requirements
- High throughput demands dedicated appliances
- Lesson 2650 — Segmentation Enforcement Mechanisms
- Performance testing
- Check for resource usage changes or degradation
- Lesson 2455 — Patch Testing and Staging Environments
- Performance tracking
- Analyzing security metrics like incident frequency, patch compliance, uptime during security events, and audit findings
- Lesson 2539 — Continuous Vendor Monitoring
- Performance trade-offs
- Often slower in software than SHA-2, but efficient in hardware
- Lesson 210 — SHA-3 and the Keccak Algorithm
- Performance validation
- Are there slowdowns or resource issues?
- Lesson 1603 — Patch Testing and Staging
- Performs
- cryptographic operations (signing, verification) internally
- Lesson 2710 — Secure Enclave and Hardware Security
- Performs malicious actions
- (session hijacking, data exfiltration, phishing)
- Lesson 647 — XSS Worms and Self-Propagating Attacks
- Perimeter defenses
- sit at your network edge where your systems meet the internet.
- Lesson 2657 — Perimeter, Internal, and Endpoint Defenses
- Perimeter layer
- – Authentication checks before any request processing
- Lesson 838 — Access Control Defense Strategy
- Periodic Cleanup
- Regularly merge and minimize your corpus as it grows, discarding redundant entries.
- Lesson 1393 — Corpus Management and Minimization
- Periodic reassessments
- Scheduled reviews (quarterly, annually) using updated **Security Questionnaires and Standards** to capture changes in their environment, controls, or risk profile
- Lesson 2539 — Continuous Vendor Monitoring
- Periodic refresher training
- (typically annual) reinforces key concepts and updates staff on policy changes.
- Lesson 2495 — Policy Communication and Training Requirements
- Periodic Review
- – Schedule annual or biennial reviews; trigger updates when regulations or threats change
- Lesson 2494 — Policy Development and Approval Process
- Periodically rescans
- stored images as new CVE databases update—yesterday's clean image might be vulnerable today
- Lesson 1636 — Registry-Integrated Scanning
- permanent record
- .
- Lesson 1479 — Persistent Journal ConfigurationLesson 2433 — Incident Documentation and Records Retention
- Permission Boundaries (Mandatory)
- Require all new users and roles to have a boundary attached that caps maximum permissions, even if they gain additional policies.
- Lesson 1761 — Privilege Escalation Detection and Prevention
- permission boundary
- is a maximum permission policy you attach to an IAM entity (user or role).
- Lesson 1707 — IAM Boundaries and Permission GuardrailsLesson 1727 — Service Account Permission Boundaries
- Permission boundary says
- "You can never do anything beyond S3, EC2, and CloudWatch"
- Lesson 1717 — Permission Boundaries: Limiting Maximum Permissions
- Permission checks
- Modify user roles between authorization check and resource access
- Lesson 939 — Time-of-Check to Time-of-Use Testing
- Permission hijacking
- Malicious sites trick users into granting notification permissions through misleading prompts ("Click Allow to prove you're human" or "Allow notifications to continue reading").
- Lesson 1087 — Web Push Notifications and Permissions
- Permission Management
- Mobile SDKs often request excessive permissions.
- Lesson 2740 — Third-Party SDK and Library Security
- Permission Modification
- Lesson 1760 — Group and User Management Escalation
- Permission policies
- granting appropriate access levels (least privilege)
- Lesson 1690 — Identity and Access Management Boundaries
- permissions
- allowing read/write operations
- Lesson 585 — File System and OS Command ExecutionLesson 795 — Access Control FundamentalsLesson 798 — Role-Based Access Control (RBAC)Lesson 800 — Relationship-Based Access Control (ReBAC)Lesson 2714 — APK Structure and Manifest Analysis
- Permissions to monitor
- read (`r`), write (`w`), execute (`x`), attribute changes (`a`)
- Lesson 1493 — File and Directory Watch Rules
- Permissive default network ACLs
- – Allow all inbound and outbound traffic
- Lesson 1813 — Default VPC Security Considerations
- Permissive during testing
- Lesson 2298 — SPF Record Syntax and Configuration
- Permit specific forwards only
- Use `PermitOpen` to whitelist destinations:
- Lesson 503 — SSH Tunnel Security and Authentication
- Permitted uses
- Acceptable business activities, limited personal use (if allowed), and approved tools
- Lesson 2489 — Acceptable Use Policy (AUP)
- Permitted uses and disclosures
- exactly what the BA can do with PHI
- Lesson 2587 — Business Associate Agreements and Liability
- Permutation
- (ShiftRows, MixColumns): Rearrange and mix the bytes—like shuffling the deck
- Lesson 89 — AES: Rijndael Selection and DesignLesson 210 — SHA-3 and the Keccak Algorithm
- Permutation operations
- (creating diffusion by rearranging bits)
- Lesson 85 — Block Cipher Fundamentals and Structure
- Persist across sessions
- because cached content remains until explicitly cleared
- Lesson 1083 — Cache Poisoning via Service Workers
- Persistence
- Lasts until cache expiration
- Lesson 1120 — Cache Poisoning for XSS DeliveryLesson 1127 — Web Cache Poisoning via Host HeaderLesson 1536 — Persistence Fundamentals and Attacker GoalsLesson 1553 — Bootkits and MBR PersistenceLesson 1758 — Credential Creation and Rotation AbuseLesson 2117 — Post-Exploitation Goals and ObjectivesLesson 2178 — Tactics: The Why Behind Adversary ActionsLesson 2423 — Attack Chain Reconstruction (+1 more)
- Persistence expectations
- Sensitive data you thought was safely stored may vanish unexpectedly
- Lesson 1079 — Storage Quota and Eviction Policies
- Persistence mechanisms
- solve this problem by ensuring access survives across system restarts and maintains a foothold even when initial entry points are closed.
- Lesson 2118 — Maintaining Access and Persistence MechanismsLesson 2754 — IoT Botnets: Mirai and Beyond
- Persistence setup
- Configure backdoors through graphical control panels
- Lesson 2156 — RDP and GUI-Based Lateral Movement
- Persistent
- Attacks remain active until the malicious data is removed.
- Lesson 631 — Stored XSS: Persistent AttacksLesson 1079 — Storage Quota and Eviction PoliciesLesson 1527 — Advanced Persistent Threats (APTs)Lesson 2819 — Label Flipping and Targeted Poisoning
- Persistent access
- Works until the session expires or user logs out
- Lesson 638 — Cookie Theft and Session Hijacking via XSS
- persistent backdoors
- to create devastating, self-spreading attacks across vulnerable web applications.
- Lesson 647 — XSS Worms and Self-Propagating AttacksLesson 2708 — iOS Jailbreaking and Detection
- persistent compromise
- .
- Lesson 1083 — Cache Poisoning via Service WorkersLesson 1310 — What Are Secrets and Why They Matter
- Persistent Connection Risks
- Once established, WebSockets remain open, creating a larger attack window.
- Lesson 1068 — WebSocket Protocol and Security Model
- Persistent evidence
- (stays longer but can still be lost):
- Lesson 1906 — Evidence Preservation in Cloud Environments
- Persistent malware
- Malicious code stored in IndexedDB or localStorage can survive page reloads, creating persistent attack vectors
- Lesson 1072 — Client-Side Storage Overview and Threat Model
- Personal data
- is any information relating to an *identified or identifiable natural person* (the **data subject**).
- Lesson 2552 — Personal Data and Special CategoriesLesson 2753 — Consumer IoT vs Industrial IoT Threats
- Personal employee devices
- Lesson 2091 — Scoping In-Scope vs Out-of-Scope Assets
- Personal information
- in form submissions
- Lesson 378 — HTTP Traffic Analysis and Credential ExtractionLesson 2564 — Personal Information Categories and Collection
- Pessimistic Locking
- assumes conflicts will happen, so it locks resources before reading them.
- Lesson 909 — Preventing Race Conditions with Locking Mechanisms
- PGP/GPG signatures
- are widely used for email, software packages, and file signing.
- Lesson 232 — Detached Signatures and Signature Formats
- Phase 1
- Deploy in report-only mode, collect violations for days or weeks
- Lesson 665 — CSP Report-Only Mode and DeploymentLesson 1779 — VPN and Private Connectivity Encryption
- Phase 2
- Analyze reports, fix legitimate violations (update inline scripts, whitelist necessary domains)
- Lesson 665 — CSP Report-Only Mode and DeploymentLesson 1779 — VPN and Private Connectivity Encryption
- Phase 3
- Deploy enforced policy to a small percentage of users
- Lesson 665 — CSP Report-Only Mode and Deployment
- Phase 4
- Gradually expand enforcement while monitoring
- Lesson 665 — CSP Report-Only Mode and Deployment
- Phase 4: Expand Iteratively
- Lesson 2683 — Implementing Zero Trust: Migration Strategy
- Phase Enforcement
- Roll out gradually by environment (dev → staging → production) and by severity (critical → high → medium).
- Lesson 2011 — CSPM Vendor Selection and Deployment
- Phased Rollout
- Lesson 277 — Migration Strategies and Crypto-Agility
- Phish credentials
- via fake urgent alerts ("Your bank account was compromised—click here!
- Lesson 1087 — Web Push Notifications and Permissions
- Phishing attacks
- steal credentials through fake login pages
- Lesson 750 — Passwordless Authentication Fundamentals
- Phishing Campaign
- Email quarantine, credential reset procedures, user notification
- Lesson 2372 — IR Playbooks and Runbooks
- Phishing Campaigns
- Lesson 1143 — Open Redirect Impact and ExploitationLesson 2245 — Social Engineering Toolkit (SET) Overview
- Phishing proxies
- that sit between the user and legitimate login page, capturing both passwords and MFA codes in real-time
- Lesson 1748 — MFA Bypass Vulnerabilities and Attacks
- Phishing resistance
- WebAuthn/FIDO2 cryptographic challenges bind authentication to specific domains, making fake login pages ineffective
- Lesson 755 — Passwordless Security Trade-offs
- Phishing Simulation Results
- provide the most direct behavioral measurement.
- Lesson 2529 — Security Awareness and Training Metrics
- Phishing-resistant
- Can't be tricked into working on fake sites
- Lesson 744 — Hardware Security Keys and FIDO U2F
- PHP
- The `unserialize()` function can trigger magic methods like `__wakeup()` or `__destruct()` that attackers exploit.
- Lesson 978 — Deserialization Attacks in File Processing
- Physical
- a sticker, specific object, or lighting pattern
- Lesson 2822 — Trojan Attacks on Neural Networks
- Physical access
- Reading session tokens from stored cookies on unlocked devices
- Lesson 713 — Session Hijacking FundamentalsLesson 2750 — IoT Attack Surface and Unique Challenges
- Physical Access Layer
- Lesson 2692 — Mobile Attack Surface Overview
- Physical barriers
- (fences, walls, locked doors)
- Lesson 2279 — Physical Access Control Models and Zones
- Physical damage
- (overheating equipment, pressure vessel explosions)
- Lesson 2753 — Consumer IoT vs Industrial IoT Threats
- Physical destruction
- For hardware (HSMs, smart cards), physically shred, incinerate, or degauss the device.
- Lesson 320 — Key Destruction and Sanitization
- Physical extraction
- of firmware via debug interfaces (JTAG, SWD)
- Lesson 2777 — Hardware Cloning and Counterfeit Prevention
- physical hardware
- provides full system resources—crucial for password cracking, heavy wireless testing, or GPU- accelerated tasks.
- Lesson 2187 — Kali Installation Options and Live BootLesson 2796 — Device Identity and Hardware Root of Trust
- Physical key control procedures
- are essential safeguards:
- Lesson 2283 — Lock Types and Physical Key Management
- Physical plausibility
- Modern deepfakes correct lighting, shadows, and reflections automatically
- Lesson 2864 — Deepfakes: Generation Techniques and Detection Challenges
- Physical removal
- Literally remove debug headers or fill ports with epoxy
- Lesson 2776 — Debug Interfaces and JTAG Security
- Physical security
- and hardware maintenance
- Lesson 1682 — Container as a Service SecurityLesson 1690 — Identity and Access Management BoundariesLesson 1979 — ISO 27001 and Cloud Security StandardsLesson 2787 — BACnet and Modbus Protocol Security
- Physical Systems
- Building access controls, badge readers, server room security, and even social engineering vectors like tailgating or dumpster diving.
- Lesson 2088 — Common Testing Targets and Scope
- Physical tamper resistance
- many HSMs destroy keys if someone tries to open them
- Lesson 306 — Hardware Security Modules (HSMs)
- Physical theft or disposal
- If a drive is stolen, lost during transport, or improperly decommissioned, encrypted data remains unreadable without the encryption keys.
- Lesson 1763 — Understanding Encryption at Rest Fundamentals
- Physical topology
- shows the actual hardware placement and cable connections—where devices physically sit and how wires run between them.
- Lesson 349 — Network Mapping Fundamentals
- Physical world adversarial examples
- solve this by creating robust perturbations that remain effective through the entire physical pipeline.
- Lesson 2814 — Physical World Adversarial Examples
- Physical-world considerations
- Unlike standard adversarial examples, deepfakes often undergo re-encoding, compression, and platform-specific processing (think social media uploads).
- Lesson 2870 — Adversarial Robustness of Deepfake Detectors
- Physical/Data Link (L1-L2)
- Lesson 2780 — IoT Protocol Landscape and OSI Mapping
- Physically realizable
- Can be printed and deployed in real environments
- Lesson 2815 — Adversarial Patches and Object Detection Attacks
- PID namespace
- Hide other processes
- Lesson 1438 — Service Sandboxing TechniquesLesson 1624 — Container Isolation Fundamentals
- Piggybacking
- involves an authorized person *knowingly* allowing someone else through—often because the attacker has manipulated social norms (politeness, trust) or created a convincing pretext.
- Lesson 2272 — Tailgating and Piggybacking Attacks
- Pilot groups
- Non-critical applications first
- Lesson 2688 — Microsegmentation Implementation Strategies
- Pin runtime versions
- and update them regularly (don't use deprecated runtimes)
- Lesson 1967 — Using Components with Known Vulnerabilities
- Pin specific versions
- Don't auto-update; test and approve each version
- Lesson 1945 — Third-Party Dependencies in Functions
- Pin Tumbler Weaknesses
- Standard pin tumbler locks (the most common type) have manufacturing tolerances that allow pins to be manipulated one at a time rather than all simultaneously.
- Lesson 2273 — Lock Picking and Bypass Techniques
- pip-audit
- (Python)
- Lesson 1264 — Automated Dependency Scanning ToolsLesson 1302 — Dependency Scanning Tools Overview
- Pipeline as Code
- Version-control your training scripts, deployment configs, and infrastructure definitions.
- Lesson 2878 — ML Pipeline Security and Governance
- Pipeline configuration exposure
- if your CI/CD config files themselves are publicly readable
- Lesson 1323 — Environment Variables in CI/CD Pipelines
- Pipeline Integration
- means embedding the security scanning tools you learned earlier—like `tfsec`, `checkov`, or policy-as-code validators—directly into your CI/CD workflow.
- Lesson 2021 — IaC in CI/CD Pipelines: Security Gates and Approval Workflows
- Pipeline security tools
- (SAST/DAST results, scan trends)
- Lesson 3043 — Dashboard Tools and Integration
- Pixel Flooding
- Lesson 979 — Resource Exhaustion via File Processing
- PKCS#12
- is a binary container format (`.
- Lesson 179 — Certificate Encoding: PEM, DER, PKCS#12, and Formats
- PKCS#5
- was defined specifically for 8-byte blocks (originally for DES)
- Lesson 108 — PKCS#7 and PKCS#5 Padding Schemes
- PKCS#7
- generalizes the same scheme for any block size (1-255 bytes)
- Lesson 108 — PKCS#7 and PKCS#5 Padding Schemes
- Placement
- Is it positioned at the right trust boundary?
- Lesson 2642 — Evaluating Architectural Security Controls
- Plain-language privacy notices
- (not legal jargon) explaining actual practices
- Lesson 2886 — Visibility, Transparency, and User-Centricity
- Plaintext passwords
- from authentication protocols (NTLM, Kerberos, etc.
- Lesson 2395 — Credential and Secret Extraction
- Plan
- Identify security risks and design controls to address them.
- Lesson 32 — The Security Lifecycle: Plan-Do-Check-ActLesson 2600 — ISO 27001 Overview and Structure
- Plan for growth
- Choose CIDR blocks large enough to accommodate future subnets and resources, but not so large you waste address space.
- Lesson 1810 — VPC IP Addressing and CIDR PlanningLesson 1844 — Connectivity Architecture Best Practices
- Planning & Direction
- – Define what intelligence you need (e.
- Lesson 2334 — Threat Intelligence Fundamentals and the Intelligence Lifecycle
- Platform attestation
- Proves the device's identity and boot state to remote parties
- Lesson 2771 — Hardware Root of Trust and TPM
- Platform authenticators
- are built into your device—Touch ID on iPhones, Windows Hello, Android biometrics—making authentication seamless and hardware-backed.
- Lesson 745 — FIDO2 and WebAuthnLesson 752 — Platform and Roaming Authenticators
- Platform Configuration Registers (PCRs)
- special storage slots numbered 0-23.
- Lesson 1464 — Measured Boot and TPM IntegrationLesson 2771 — Hardware Root of Trust and TPM
- Platform Key
- sits at the top of the trust hierarchy—the "root of trust.
- Lesson 1461 — Platform Key, KEK, and Signature Databases
- Platform vulnerabilities
- patching IAM service software
- Lesson 1690 — Identity and Access Management Boundaries
- Platform-Bound Operations
- Lesson 307 — Trusted Platform Modules (TPMs)
- Platform-Specific Agents
- Lesson 1336 — Environment Variable Injection Mechanisms
- Platform-Specific Quirks
- Lesson 950 — Bypassing Extension Blacklists
- plausible deniability
- whether you participated or not, the output distribution is nearly identical.
- Lesson 2913 — The Formal Definition of Differential PrivacyLesson 2956 — Disappearing Messages and Perfect Forward Secrecy
- Plausible scenarios
- aligned with the victim's context
- Lesson 2269 — Vishing and Phone-Based Pretexting
- playbook
- that tells your team exactly what to do, when to do it, and how to recover stronger.
- Lesson 1861 — DDoS Response and Incident ManagementLesson 2327 — Playbook Design FundamentalsLesson 2372 — IR Playbooks and Runbooks
- Playbook automation
- → Cost savings and faster response
- Lesson 2359 — Reporting SOC Performance to Leadership
- Playbook effectiveness
- Did existing runbooks cover this scenario?
- Lesson 2369 — Lessons Learned and Process Improvement
- Playbook Repository
- Your library of automated response procedures.
- Lesson 2326 — SOAR Architecture and Components
- Playbook updates
- Turn lessons into updated incident response procedures
- Lesson 2174 — Debrief and Knowledge Transfer
- Playbooks
- are step-by-step instruction manuals for handling specific security events.
- Lesson 2311 — Playbooks and Standard Operating ProceduresLesson 2350 — Triage Playbooks and Runbooks
- PLCs
- (Programmable Logic Controllers) that execute physical commands
- Lesson 2803 — OT and ICS Security Fundamentals
- Plugin selection
- Disable intrusive tests that might crash services
- Lesson 2440 — Scan Configuration and Optimization
- Plugin-Based Analysis
- Start with reconnaissance plugins like `imageinfo` to identify the operating system profile, then move to targeted plugins:
- Lesson 2397 — Memory Analysis with Volatility Framework
- plus
- Lesson 1221 — HTML Entity Encoding and Attribute ContextLesson 1609 — Credentialed vs Non- Credentialed Scans
- PMKID
- (Pairwise Master Key Identifier) is a value included in the first frame of the 4-way handshake, called the **Robust Security Network Information Element (RSN IE)** in certain beacon and association frames.
- Lesson 525 — PMKID Attack on WPA2
- PMKID capture attempts
- – specific EAPOL frame patterns
- Lesson 550 — Wireless Packet Capture and Analysis
- PNG
- files begin with `89 50 4E 47 0D 0A 1A 0A`
- Lesson 955 — Magic Byte Verification and File Type Detection
- Pod Security Admission
- (built-in): Enforces PSS levels per namespace
- Lesson 1970 — Pod Security Standards and Policies
- Pod Security Policies
- (PSP)—cluster-wide objects that RBAC controlled.
- Lesson 1666 — Pod Security Standards and Policies
- Pod Security Standards
- (PSS) are three predefined security profiles that define what pod configurations are allowed:
- Lesson 1666 — Pod Security Standards and PoliciesLesson 1970 — Pod Security Standards and PoliciesLesson 1976 — Multi-Tenancy and Cluster Isolation
- Pod Selector
- Identifies which pods the policy applies to
- Lesson 1667 — Network Policies for Pod Isolation
- Point-to-Point
- The simplest setup—two peers communicate directly.
- Lesson 495 — WireGuard Network Architecture and Routing
- Poison the cache
- Send the request so the cache stores the malicious response
- Lesson 1116 — Cache Poisoning Attack Fundamentals
- Poison the response
- by making the backend return malicious content (perhaps redirecting to attacker-controlled JavaScript)
- Lesson 1109 — Exploiting Smuggling for Web Cache Poisoning
- Poisoned training data
- can embed backdoors during pre-training or fine-tuning, causing specific trigger phrases to activate malicious behaviors.
- Lesson 2854 — LLM Architecture and Attack Surface
- Poisoning attacks
- target the training phase.
- Lesson 2807 — Introduction to Adversarial Machine Learning
- policies
- , your wireless network is like a well-built fortress with no guards assigned to watch the gates.
- Lesson 553 — Wireless Security Policies and ComplianceLesson 1342 — Access Control for Runtime Secret RetrievalLesson 1804 — DLP Policy Design and ImplementationLesson 2488 — Policy Hierarchy: Policies, Standards, Procedures, GuidelinesLesson 2543 — Security Audit Types and Objectives
- Policy action
- `none` (monitor only), `quarantine` (suspicious folder), or `reject` (block entirely)
- Lesson 2301 — DMARC (Domain-based Message Authentication) Policy
- Policy Attachment
- Lesson 1760 — Group and User Management Escalation
- Policy bundles
- package related policies with metadata, documentation, and dependencies into distributable artifacts.
- Lesson 3025 — Policy Governance and Distribution
- Policy Conditions
- Use IAM conditions to restrict dangerous actions—require MFA for policy changes, restrict `AssumeRole` to specific source IPs, or limit API calls to approved networks.
- Lesson 1761 — Privilege Escalation Detection and Prevention
- Policy Definition
- You create policy files (`twpol.
- Lesson 1502 — Tripwire for File IntegrityLesson 1989 — Azure Policy and Blueprints
- Policy Development Lifecycle
- Lesson 2494 — Policy Development and Approval Process
- Policy drift
- occurs when the actual security configuration diverges from your approved baseline—and it's one of the most dangerous forms of infrastructure drift.
- Lesson 2026 — Drift Detection for Security Policies and Permissions
- Policy enforcement
- Apply IAM and network policies at the endpoint
- Lesson 1845 — Service Endpoints vs Public Internet AccessLesson 3028 — Dependency Scanning and SCALesson 3046 — Auto-Remediation for Infrastructure Drift
- Policy Engine
- The decision-making core that evaluates every access request against loaded security rules.
- Lesson 1453 — SELinux Architecture and ComponentsLesson 2687 — Context-Aware Access Controls
- Policy Evaluation
- The broker checks user identity, device posture, location, and risk score against access policies
- Lesson 2690 — Zero Trust Network Access (ZTNA) SolutionsLesson 3012 — Container and Image Scanning
- Policy modification rights
- Directly editing policies to grant themselves new permissions
- Lesson 1753 — IAM Privilege Escalation Overview
- Policy Refinement
- involves adjusting detection thresholds and rules.
- Lesson 1807 — False Positive Management and Tuning
- Policy Rules
- Statements like "allow httpd_t httpd_sys_content_t:file read;" that grant specific domains permission to perform specific actions on specific types.
- Lesson 1453 — SELinux Architecture and Components
- Policy Store
- Contains Rego policies defining your rules
- Lesson 3019 — Open Policy Agent (OPA) Introduction
- Policy testing
- verifying permissions work as intended without over-permissioning
- Lesson 1690 — Identity and Access Management Boundaries
- Policy Types
- Specifies whether rules cover Ingress, Egress, or both
- Lesson 1667 — Network Policies for Pod Isolation
- Policy Version Manipulation
- Using `iam:CreatePolicyVersion` on a managed policy can inject malicious permissions if you can set it as the default version.
- Lesson 1755 — Policy Attachment and Modification Escalation
- Policy violations
- Block on specific issues like hardcoded secrets or missing authentication
- Lesson 2052 — Security Gates and Failure Policies
- Policy-Based
- Central policy engine evaluates access requests
- Lesson 2034 — Authentication and Authorization Design
- Policy-Driven Detection
- Unlike simple hash comparisons, Tripwire lets you define severity levels and customize what changes are acceptable (for example, log files changing is normal; `/bin/bash` changing is critical).
- Lesson 1502 — Tripwire for File Integrity
- Political opinions
- Lesson 2552 — Personal Data and Special Categories
- Poly1305
- , each optimized for different use cases.
- Lesson 224 — Alternative MAC Constructions: KMAC and Poly1305Lesson 493 — WireGuard Protocol Design and Cryptographic Simplicity
- polyglot file
- is a single file that is valid in multiple formats at once.
- Lesson 952 — File Content Polyglots and Magic BytesLesson 963 — Polyglot Files and Multi-Format Attack PreventionLesson 975 — Polyglot Files and Format Confusion
- Polymorphic deserialization
- allows subclasses to be used wherever parent classes are expected—a normal programming feature.
- Lesson 1189 — Type Confusion and Object Substitution
- Polymorphic malware
- Can change its signature to evade detection
- Lesson 961 — Virus Scanning and Malware Detection Integration
- Poor example
- "Total security tools deployed" – doesn't indicate effectiveness or risk reduction.
- Lesson 2526 — Designing Effective Security Metrics
- Poor psychological acceptability
- Lesson 1215 — Psychological Acceptability in Security Controls
- POP Chains
- (Property-Oriented Programming): Attackers chain together existing classes in your application, setting object properties to trigger a sequence of magic method calls that ultimately execute dangerous operations—file deletion, remote code execution...
- Lesson 1187 — PHP Object Injection and Unserialize Attacks
- Port
- Which service port?
- Lesson 429 — Explicit Allow RulesLesson 855 — Same-Origin Policy FundamentalsLesson 856 — Origin Definition and ComparisonLesson 1047 — JavaScript's Same-Origin Policy FoundationLesson 1055 — Same-Origin Policy FundamentalsLesson 1056 — Origin Components: Scheme, Host, and Port
- Port Blocking
- Firewalls or ISPs blocking UDP 1194 (default OpenVPN port).
- Lesson 492 — Troubleshooting and Monitoring OpenVPN Connections
- Port Forwarding
- Redirect traffic through a compromised system to reach internal networks:
- Lesson 2236 — Netcat and Socat for Network Pivoting
- Port scan discovered hosts
- Check common ports (22, 80, 443, 3306, 5432, 8080)
- Lesson 886 — Internal Network Enumeration via SSRF
- Port scanning
- Probe internal IP ranges to discover running services
- Lesson 621 — XXE Attack Types: SSRF via XXELesson 1033 — API7:2023 - Server Side Request Forgery (SSRF)Lesson 1608 — Vulnerability Scanning FundamentalsLesson 2197 — Auxiliary Modules and Scanning
- Port security
- is a switch feature that restricts which MAC addresses can send traffic through a specific physical port.
- Lesson 409 — Switch Port Security and DefensesLesson 414 — Port Security and MAC Filtering
- Portability
- Platform authenticators are device-bound; lose your phone, and you'll need recovery options.
- Lesson 752 — Platform and Roaming Authenticators
- Position Independent Executables (PIE)
- All iOS binaries support ASLR
- Lesson 2709 — iOS Binary Protections and Runtime Security
- Position physically close
- to targets in cafes, airports, or outside office buildings
- Lesson 534 — Evil Twin Attacks: Mechanics and Execution
- Position yourself as MITM
- using previously learned techniques (ARP poisoning, rogue gateway, etc.
- Lesson 400 — Session Hijacking via MITM
- Positioning
- The attacker must place themselves in the network path between victim and target
- Lesson 392 — Man-in-the-Middle Attack Fundamentals
- Possession
- , **Authenticity**, and **Utility**.
- Lesson 14 — The Parkerian Hexad: Extending the CIA Triad
- Possession factors
- Magic links sent to verified email, authenticator app push notifications, or FIDO2 hardware keys (covered in lesson 744-745)
- Lesson 750 — Passwordless Authentication FundamentalsLesson 1745 — Multi-Factor Authentication in Cloud IAM
- Post
- Post-exploitation modules for enumeration and persistence
- Lesson 2193 — Metasploit Architecture and Components
- POST requests
- containing login forms with parameters like `username=` and `password=`
- Lesson 378 — HTTP Traffic Analysis and Credential Extraction
- Post-authentication MOTD
- (Message of the Day): Shown after successful login via `/etc/motd`.
- Lesson 1448 — SSH Banner, Logging, and Monitoring
- POST-based CSRF
- requires more sophistication because browsers don't automatically send POST requests when loading resources.
- Lesson 848 — GET vs POST CSRF Attacks
- Post-build
- Dependency scanning and container image scanning check third-party components
- Lesson 1395 — Security Testing in CI/CD Fundamentals
- post-compromise security
- (PCS).
- Lesson 2944 — Post-Compromise SecurityLesson 2949 — Signal Protocol: Double Ratchet and Key Agreement
- Post-deploy
- Runtime monitoring feeds back into pipeline improvements
- Lesson 2057 — Continuous Security Integration
- Post-deployment checks
- should be automated where possible and run immediately after deployment completes, ideally blocking traffic until validation passes for critical systems.
- Lesson 2068 — Post-Release Security Validation
- Post-Exploitation Tasks
- Execute commands remotely, dump SAM/LSA secrets, retrieve domain password policies, or deploy modules for specific attacks like Mimikatz or BloodHound data collection.
- Lesson 2239 — CrackMapExec for Network Enumeration
- Post-incident review
- of edge logs to understand attack vectors
- Lesson 1868 — CDN Monitoring and Incident ResponseLesson 2069 — Vulnerability Response and Hotfix Process
- Post-processing violations
- Adding DP noise then rounding results can destroy privacy guarantees.
- Lesson 2921 — Practical Differential Privacy Implementation
- Post-Release Security Validation
- is the practice of verifying security controls in the live production environment immediately after deployment.
- Lesson 2068 — Post-Release Security Validation
- Post-rollback validation
- Verify systems return to stable state
- Lesson 1605 — Patch Rollback and Emergency Procedures
- Post-Rotation Actions
- Lesson 1484 — Log Rotation and Retention Policies
- Postman's security testing
- , and specialized solutions like **42Crunch** or **StackHawk**.
- Lesson 3013 — API Security Testing Automation
- POSTROUTING
- Changes source addresses (SNAT/Masquerade) after routing decisions
- Lesson 441 — NAT and Masquerading with iptables
- Power analysis
- Monitoring power consumption patterns to extract encryption keys during cryptographic operations
- Lesson 2755 — Physical Security Threats to IoT DevicesLesson 2769 — Hardware Security Fundamentals and Threat ModelLesson 2772 — Side-Channel Attacks: Power AnalysisLesson 2773 — Side-Channel Attacks: Timing and EM
- PPLdump
- to clone LSASS handles from protected contexts
- Lesson 2120 — LSASS Memory Dumping and Protection Bypasses
- PR.AC-1
- (identity management), PCI-DSS **Requirement 8** (access control), and ISO 27001 **A.
- Lesson 2617 — Framework Mapping and Harmonization
- Practical benefits
- Lesson 281 — QKD Protocols: E91 and Continuous Variable
- Pre-activation validation
- Verify the key material is intact (correct format, not corrupted), properly encrypted in storage, and associated with the right metadata (key ID, algorithm, expiration)
- Lesson 314 — Key Activation and Installation
- Pre-commit
- Secret scanning via hooks (preventing secrets from entering the repository)
- Lesson 1395 — Security Testing in CI/CD FundamentalsLesson 1397 — Commit-Time Security GatesLesson 2046 — Pre-Commit Hooks and IDE IntegrationLesson 3029 — Container Image Scanning
- Pre-commit hooks
- are automated scripts that run on a developer's machine *before* a commit is finalized.
- Lesson 1351 — Pre-commit Hooks for Secret PreventionLesson 1365 — Integrating SAST into Development WorkflowLesson 1396 — Pre-commit and IDE Security ChecksLesson 1397 — Commit-Time Security GatesLesson 2013 — Secrets in IaC: Detection and PreventionLesson 2050 — Secret Detection in CommitsLesson 2060 — Feedback Loops and MetricsLesson 3003 — Version Control Security for IaC (+1 more)
- Pre-Deployment Stage
- Lesson 2045 — Security Testing in the CI/CD Pipeline
- Pre-domain wildcard attacks
- The server checks if the origin *ends with* a trusted domain (like `.
- Lesson 880 — Pre-Domain Wildcard and Null Origin Attacks
- Pre-OS execution
- means no security tools are running yet
- Lesson 2759 — Firmware Fundamentals and Attack Surface
- Pre-registration
- Verifying expected visitors before arrival (name, company, purpose, host employee)
- Lesson 2285 — Visitor Management and Temporary Access
- Pre-Shared Key (PSK)
- Both sides have the same secret password configured manually
- Lesson 479 — Internet Key Exchange (IKE) Phase 1Lesson 514 — WPA2 Architecture and 4-Way Handshake
- Pre-shared keys
- (`--secret`): Simple but not scalable
- Lesson 487 — OpenVPN Cryptographic ConfigurationLesson 1779 — VPN and Private Connectivity Encryption
- Pre-Shared Keys (PSK)
- Both CoAP client and server hold the same secret key beforehand.
- Lesson 2784 — CoAP Security with DTLS
- Pre-trained Model Poisoning
- Popular model hubs host millions of models.
- Lesson 2823 — Supply Chain Poisoning in ML Pipelines
- Precision
- Unlike `X-Frame-Options`'s single-origin limitation, you can whitelist multiple specific domains.
- Lesson 1136 — Content-Security-Policy frame-ancestors Directive
- Precomposed form
- (NFC): A single codepoint `U+00E9`
- Lesson 1167 — Unicode Normalization and Equivalence
- Predict future attacks
- If they've used techniques X and Y, they'll likely use Z next
- Lesson 2180 — Using ATT&CK for Threat Intelligence
- Predictable capacity planning
- for infrastructure
- Lesson 1016 — Quota Management and Tiered Access Control
- Predictable Filename Patterns
- Lesson 953 — Server-Side File Overwrite Vulnerabilities
- Predictable IP ranges
- – Often use standard CIDR blocks (like `172.
- Lesson 1813 — Default VPC Security Considerations
- Predictable network path
- – Eliminates unknown routing through third-party networks
- Lesson 1841 — Direct Connect and Dedicated Connectivity
- Predictable seeds
- Using `time()` or process IDs as seeds allows attackers to guess or brute-force the starting state
- Lesson 298 — CSPRNG Initialization and Seeding
- Predictable session tokens
- and authentication credentials
- Lesson 292 — Randomness in Virtual Environments
- Predictable storage and comparison
- You always know exactly how much space a hash will take.
- Lesson 204 — Fixed-Length Output Property
- Predictable targeting
- Attackers know default ranges and configurations
- Lesson 1813 — Default VPC Security Considerations
- Predictable Timestamp-Based Seeds
- Lesson 300 — Weak Random Number Generation Vulnerabilities
- Prefer `Object.assign()` with safeguards
- or libraries like `lodash` with merge depth limits
- Lesson 1051 — JavaScript Prototype Chain Security
- Prefer short-lived tokens
- with refresh mechanisms on the server
- Lesson 1080 — Sensitive Data Handling and Storage Alternatives
- Prefer temporary credentials for
- Lesson 1729 — Temporary Credentials vs Long-Term Credentials
- Preimage Attack
- An attacker has only a hash output `h` and tries to find *any* input `m` where `hash(m) = h`.
- Lesson 212 — Preimage and Second Preimage Attacks
- Preimage resistance
- is a fundamental security property of cryptographic hash functions.
- Lesson 199 — Preimage ResistanceLesson 200 — Second Preimage Resistance
- Prepared Statements
- pre-compile the query structure, then safely bind parameters.
- Lesson 1236 — SQL Injection Review and Defense Fundamentals
- Preprocessors
- – Normalize and reconstruct traffic before analysis.
- Lesson 458 — Snort: Architecture and Rule Syntax
- PREROUTING
- Changes destination addresses (DNAT) before routing decisions
- Lesson 441 — NAT and Masquerading with iptables
- PRESENT
- is an ultra-compact 64-bit block cipher designed for hardware efficiency.
- Lesson 2793 — Lightweight Cryptographic Algorithms
- Presentation Attacks
- Face ID uses depth mapping and attention detection to prevent photo-based spoofing.
- Lesson 2707 — Touch ID, Face ID, and Biometric Security
- Presentation layer
- – UI restrictions (though never trust these alone)
- Lesson 838 — Access Control Defense StrategyLesson 1225 — Defense in Depth: Combining Input and Output Controls
- Presenting design artifacts
- data flow diagrams, authentication flows, trust boundaries, cryptographic choices
- Lesson 2036 — Security Architecture Review
- Preserve chain of custody
- Copy logs to a separate, isolated account with write-once-read-many (WORM) policies.
- Lesson 1917 — Cloud Log Collection for Forensics
- prevent
- these attacks.
- Lesson 390 — ARP Spoofing Defense MechanismsLesson 1989 — Azure Policy and BlueprintsLesson 2623 — Compliance as Code
- Prevent default gateway override
- Use `route-nopull` on the client to ignore server-pushed routes, then manually specify what you need
- Lesson 491 — Client Configuration and Split Tunneling
- Prevent traffic analysis
- that correlates who talks to whom
- Lesson 2982 — Introduction to Anonymity Networks
- Preventing Enumeration
- Never reveal whether an email/phone exists in your system.
- Lesson 753 — Magic Links and One-Time Codes
- Prevention
- bad packages never reach staging or production
- Lesson 1301 — Automated Package Verification Workflows
- Prevention requires multi-layered validation
- Lesson 963 — Polyglot Files and Multi-Format Attack Prevention
- Prevention-First Approach
- Unlike traditional AV that focuses on detection and removal, NGAV emphasizes **stopping threats before they execute**.
- Lesson 1572 — Next-Generation Antivirus (NGAV)
- Preventive + Technology A
- Firewall rules blocking unauthorized networks
- Lesson 2658 — Control Diversity: Types and Technologies
- Preventive + Technology B
- Application-layer authentication (separate from network auth)
- Lesson 2658 — Control Diversity: Types and Technologies
- Preventive controls
- stop attacks before they happen.
- Lesson 27 — Security Control TypesLesson 1254 — Pre-commit Hooks for Secret DetectionLesson 1990 — GCP Organization Policy ServiceLesson 1999 — Automated Tag Enforcement and ValidationLesson 2002 — Tag Governance and Remediation Workflows
- PRF-AES128
- Hardware-accelerated on some platforms
- Lesson 481 — IPsec Cryptographic Algorithms and Cipher Suites
- PRGA (Pseudo-Random Generation Algorithm)
- After initialization, RC4 generates keystream bytes one at a time by swapping values in the S array and outputting bytes based on those swaps.
- Lesson 116 — RC4: Design, Vulnerabilities, and Deprecation
- Price × Quantity overflow
- Order huge quantities of expensive items to trigger overflow, resulting in negative or minimal totals.
- Lesson 926 — Integer Overflow in Financial Calculations
- Price Manipulation
- Lesson 929 — Mass Assignment Attack Vectors
- Primary Account Numbers (PANs)
- during transmission
- Lesson 2574 — Requirement 4: Encryption of Transmission
- Principal
- Who the policy applies to (users, groups, service accounts, or even anonymous users).
- Lesson 1703 — Policy Structure and Syntax FundamentalsLesson 1713 — Policy Structure: Elements, Syntax, and Evaluation LogicLesson 1952 — Resource-Based Policies for Functions
- Principal tags
- Does this user have `CostCenter=Finance`?
- Lesson 1998 — Tag-Based Access Control and Policy Enforcement
- Principle of least privilege
- You can grant execute-only permissions on procedures without allowing raw table access
- Lesson 1243 — Stored Procedures and Database-Side SecurityLesson 1319 — The Twelve-Factor App and Environment ConfigurationLesson 1405 — Principle of Least Privilege in OS HardeningLesson 1407 — Disabling Unnecessary Services and DaemonsLesson 1587 — Inbound and Outbound Rule DesignLesson 1668 — Securing etcd and Secrets ManagementLesson 1821 — Security Group Rule Design Best PracticesLesson 1828 — Subnetting in Cloud VPCs (+8 more)
- Print-capture transformations
- Color shifts, resolution loss, texture changes
- Lesson 2814 — Physical World Adversarial Examples
- Prioritization
- means deciding which threats deserve immediate attention and which can wait.
- Lesson 65 — Prioritizing STRIDE ThreatsLesson 1200 — History and Purpose of the OWASP Top 10
- Prioritization Phase
- Lesson 277 — Migration Strategies and Crypto-Agility
- Prioritize
- which threats pose the greatest risk
- Lesson 37 — What is Threat Modeling?Lesson 2500 — Risk Calculation and Risk Matrices
- Prioritize defenses
- Focus detection on techniques common to groups targeting your sector
- Lesson 2180 — Using ATT&CK for Threat Intelligence
- Prioritize improvements
- based on risk and threat intelligence
- Lesson 2356 — Detection Coverage Measurement
- Prioritize internet-facing apps
- Browsers, email clients, and collaboration tools receive the most targeted attacks.
- Lesson 2460 — Third-Party and Application Patching
- Prioritize investments
- based on foundational needs first (remember: Defense in Depth and building strong foundations)
- Lesson 34 — Security Maturity Models and Assessment
- Prioritize remediation
- there—strengthening a weak link provides more security value than adding another strong layer
- Lesson 30 — Weakest Link Analysis
- Prioritize ruthlessly
- High-severity findings with easy fixes come first.
- Lesson 2164 — Remediation Recommendations
- Prioritize top 5-10 risks
- rather than overwhelming with detail
- Lesson 2516 — Risk Analysis Documentation and Communication
- Priority Manipulation
- Attackers set all their streams to maximum priority, causing the server to constantly recalculate resource allocation.
- Lesson 1098 — HTTP/2 Stream Vulnerabilities and Attacks
- privacy
- (the CA learns which sites you're visiting).
- Lesson 193 — OCSP Stapling and Must-StapleLesson 256 — MPC Threat Model and Security DefinitionsLesson 499 — SSH Tunneling FundamentalsLesson 960 — Image Validation and Metadata StrippingLesson 1978 — SOC 2 Trust Service CriteriaLesson 2591 — SOC 2 Overview and Trust Services CriteriaLesson 2842 — Privacy-Utility Tradeoffs
- Privacy amplification
- is the principle that combining many updates makes it exponentially harder to infer information about any single participant.
- Lesson 2844 — Secure Aggregation and Privacy Amplification
- Privacy as the Default
- No user action required for privacy protection
- Lesson 2879 — Introduction to Privacy by Design
- Privacy auditing
- is the practice of empirically measuring whether a model leaks private training data, rather than just trusting theoretical guarantees.
- Lesson 2845 — Privacy Auditing and Empirical Measurement
- Privacy breaches
- Extracting sensitive information embedded in model parameters
- Lesson 2827 — Model Extraction Attack Fundamentals
- privacy budget
- is the total amount of epsilon you can "spend" on a dataset before privacy guarantees degrade.
- Lesson 2914 — Privacy Budget and EpsilonLesson 2918 — Composition Theorems
- Privacy by Design
- Apps receive no biometric information—only authentication results, preventing unauthorized data collection.
- Lesson 2707 — Touch ID, Face ID, and Biometric Security
- Privacy controls
- Browsers and users can disable `Referer` headers for privacy, causing legitimate requests to fail or bypass checks entirely
- Lesson 811 — Referer and Origin-Based Authorization Flaws
- Privacy criterion
- , you're committing to meet specific requirements around how personal information is collected, used, retained, disclosed, and disposed of.
- Lesson 2596 — Privacy Criterion and GDPR Alignment
- Privacy Embedded into Design
- Integral part of system functionality, not an add-on
- Lesson 2879 — Introduction to Privacy by DesignLesson 2885 — End-to-End Security and Lifecycle Protection
- Privacy exposure
- Precise data enables re-identification and profiling
- Lesson 2898 — Granular Data Collection
- Privacy Impact Assessment (PIA)
- is a structured, systematic process for identifying and evaluating how a project, system, or initiative will affect the privacy of individuals whose data it handles.
- Lesson 2887 — Privacy Impact Assessment FundamentalsLesson 2888 — PIA Triggers and Scoping
- Privacy Rule
- defines *what* PHI is and establishes patient rights (access, amendment, disclosure accounting).
- Lesson 2581 — HIPAA Overview and Scope
- Privacy-preserving analytics
- Compute statistics across sensitive datasets from multiple organizations
- Lesson 255 — Introduction to Secure Multi-Party Computation (MPC)Lesson 261 — Practical MPC Applications and Limitations
- Privacy-preserving identity
- Prove you're authorized without revealing which specific user you are (using techniques like ring signatures)
- Lesson 247 — ZKP Applications in Authentication
- Privacy-Preserving Record Linkage (PPRL)
- applies cryptographic and privacy techniques you've already learned to enable matching without disclosure:
- Lesson 2930 — Privacy-Preserving Record Linkage
- Privacy-preserving transactions
- Blockchain systems proving transaction validity without exposing amounts or parties (building on techniques like homomorphic encryption)
- Lesson 2926 — Zero-Knowledge Proofs for Privacy
- Privacy-safe transmission
- (encrypted channels, authentication)
- Lesson 2935 — Right to Access and Data Portability
- Privacy-utility mismatch
- Setting epsilon too low makes data useless; too high compromises privacy.
- Lesson 2921 — Practical Differential Privacy Implementation
- Private
- Trusted home or work networks where you know other devices
- Lesson 1585 — Windows Firewall Configuration and ProfilesLesson 1829 — Public vs Private Subnets
- Private auctions
- Determine winners without revealing bids
- Lesson 255 — Introduction to Secure Multi-Party Computation (MPC)Lesson 261 — Practical MPC Applications and Limitations
- Private Directory
- The app gets its own private storage directory (`/data/data/com.
- Lesson 2713 — Android Application Sandboxing
- Private Information Retrieval (PIR)
- solves this by letting you retrieve a database record without the server learning which one you accessed.
- Lesson 2928 — Private Information Retrieval
- private key
- is `(n, d)`.
- Lesson 142 — RSA Key Generation: Selecting Primes and Computing ParametersLesson 147 — RSA Signature Generation and VerificationLesson 225 — Digital Signature Fundamentals and Use CasesLesson 275 — Multivariate CryptographyLesson 787 — Algorithm Confusion AttacksLesson 1442 — SSH Key Generation and ManagementLesson 2299 — DKIM (DomainKeys Identified Mail) Cryptographic Signing
- Private Key Headers
- Lesson 1253 — Secret Patterns and Regular Expressions
- Private Link
- services for cloud-to-cloud or internal service communication
- Lesson 1779 — VPN and Private Connectivity EncryptionLesson 1848 — Private Link Architecture and Use Cases
- Private Link Service
- lets you host applications behind a network load balancer and make them accessible to other accounts or VPCs through private endpoints—without traversing the public internet, VPC peering, or complex routing.
- Lesson 1850 — Private Link Service for Custom Applications
- Private mirrors
- give you control over what enters your environment, filtering packages before they reach production training pipelines.
- Lesson 2875 — Dependency Vulnerabilities in ML Frameworks
- Private profiles
- balance convenience with security: allow common services like network discovery and printer sharing, but block unsolicited inbound connections.
- Lesson 1585 — Windows Firewall Configuration and Profiles
- Private repositories
- Internal company registries for proprietary code (e.
- Lesson 1285 — Public vs Private Package Repository ResolutionLesson 2017 — IaC Version Control and Code Review Best Practices
- Private right of action
- remains for data breaches ($100–$750 per consumer per incident)
- Lesson 2568 — CPRA Amendments and Enforcement
- Private Secrets
- Each picks their own secret color.
- Lesson 153 — Diffie-Hellman Key Exchange FundamentalsLesson 2941 — Key Exchange in E2EE Systems
- Private Set Intersection (PSI)
- uses cryptographic protocols—often building on secure multi-party computation or homomorphic encryption techniques you've learned—to compute the intersection without revealing non- overlapping elements.
- Lesson 2925 — Private Set Intersection
- Private subnet route tables
- omit internet gateway routes, preventing direct inbound access from the internet
- Lesson 1830 — Route Tables and Subnet Associations
- Private subnets
- Application servers with no direct internet access
- Lesson 1828 — Subnetting in Cloud VPCsLesson 1829 — Public vs Private SubnetsLesson 1831 — NAT Gateway Architecture
- Private voting
- Votes are encrypted, tallied while encrypted, and only the final count is revealed.
- Lesson 2924 — Homomorphic Encryption Applications
- PrivateLink
- and **private endpoints** from your previous lessons, you can extend secure connectivity beyond single-region, single-account boundaries:
- Lesson 1851 — Cross-Region and Cross-Account Private Connectivity
- PrivateTmp=yes
- creates a unique, isolated `/tmp` directory for the service.
- Lesson 1433 — Service Isolation with systemd
- Privilege anomalies
- A standard user suddenly accessing admin-only resources
- Lesson 844 — Authorization Logging and Monitoring
- Privilege Creep
- measures accumulated permissions over time.
- Lesson 2530 — Access Control and Identity Metrics
- privilege escalation
- by exploiting database misconfigurations or known vulnerabilities to gain administrator-level access.
- Lesson 589 — SQLMap Advanced Exploitation FeaturesLesson 737 — Session Monitoring and Anomaly DetectionLesson 850 — CSRF Impact and Real-World ExamplesLesson 907 — Race Conditions in Authentication and AuthorizationLesson 974 — ZIP Slip and Archive Extraction AttacksLesson 1196 — Server-Side Prototype Pollution ImpactLesson 1213 — Complete Mediation and Access ChecksLesson 1753 — IAM Privilege Escalation Overview (+10 more)
- Privilege escalation attempts
- exploiting kernel vulnerabilities
- Lesson 1651 — Container Runtime Security OverviewLesson 1907 — Cloud Account Compromise Response
- Privilege Escalation Chains
- A compromised container in a multi-tenant environment presents a higher-value target.
- Lesson 1631 — Multi-Tenancy Security Challenges
- Privilege Escalation Flaw
- lets authenticated users access admin functions
- Lesson 2106 — Chaining Vulnerabilities for Impact
- Privilege Indicators
- Lesson 826 — Parameter Tampering for Privilege Escalation
- Privilege level
- of the victim (admin vs.
- Lesson 850 — CSRF Impact and Real-World ExamplesLesson 1019 — Broken Function-Level Authorization
- Privilege levels
- Moving from user mode to administrator/root access
- Lesson 11 — Trust Boundaries and Implicit Trust
- Privilege Separation
- is the technical version: different parts of a system run with only the permissions they absolutely need, isolated from each other.
- Lesson 7 — Separation of Duties and Privilege Separation
- Privileged
- No restrictions (wide open)
- Lesson 1666 — Pod Security Standards and PoliciesLesson 1970 — Pod Security Standards and Policies
- Privileged Containers
- Running containers with the `--privileged` flag essentially disables most security boundaries, granting direct access to host devices and capabilities.
- Lesson 1626 — Container Escape Vulnerabilities
- Privileged orchestrator
- Controls tool access, validates intent before execution
- Lesson 2861 — Defense Strategies Against Prompt Injection
- Privileged services
- running as root/SYSTEM amplify impact if compromised
- Lesson 1431 — Service Attack Surface Analysis
- privileges
- Lesson 585 — File System and OS Command ExecutionLesson 2463 — What Are Compensating Controls
- Privileges Required
- Anonymous attacker vs.
- Lesson 1265 — Evaluating Vulnerability Severity and ExploitabilityLesson 1637 — Interpreting Scan Results and SeverityLesson 2076 — Severity Assessment and CVSS Scoring
- Pro tip
- For intangibles, use historical breach costs, industry benchmarks, or legal settlements as reference points.
- Lesson 2510 — Asset Valuation for Risk Analysis
- Proactive alerts
- When a new vulnerability is published, your tools can instantly check all SBOM records to identify affected applications—before attackers exploit them.
- Lesson 1282 — SBOM Distribution and Consumption
- Proactive not Reactive
- Anticipate privacy risks before they materialize
- Lesson 2879 — Introduction to Privacy by Design
- Proactive privacy
- means anticipating privacy risks during design and implementation phases, building safeguards into systems from the start, and continuously monitoring for emerging threats before they materialize.
- Lesson 2881 — Proactive Not Reactive Privacy
- Proactive refresh
- means updating cached secrets before they expire:
- Lesson 1334 — Secret Store Access PatternsLesson 1731 — Session Duration and Token Lifecycle
- Probabilistic Signature Scheme (PSS)
- is a modern RSA padding scheme specifically designed for digital signatures.
- Lesson 148 — PSS: Probabilistic Signature Scheme
- Probability
- as percentages (0-100%)
- Lesson 2508 — Qualitative vs Quantitative Risk AnalysisLesson 2509 — Qualitative Risk Analysis Techniques
- Probe requests
- can be injected to test if your smuggled prefix affects subsequent requests from other users or connections.
- Lesson 1114 — Testing and Tools for Request Smuggling
- Probing
- Using microscopic needles to tap into circuit traces and read data signals in real-time
- Lesson 2775 — Physical Tampering and Anti-Tamper Mechanisms
- Problem
- Legacy database doesn't support encryption.
- Lesson 26 — Compensating ControlsLesson 109 — ISO/IEC 7816-4 and Other Padding Methods
- Procedures
- The *specific implementation* details—the attacker's unique recipe (e.
- Lesson 2338 — Tactics, Techniques, and Procedures (TTPs)Lesson 2488 — Policy Hierarchy: Policies, Standards, Procedures, Guidelines
- Procedures and Playbooks
- Lesson 2370 — Incident Response Plan Development
- Process behavior
- – spotting privilege escalation attempts or container escapes
- Lesson 1659 — Runtime Monitoring and Anomaly Detection
- Process boundaries
- Data passed between different programs or services
- Lesson 11 — Trust Boundaries and Implicit Trust
- Process Command-Line Auditing
- isn't PowerShell-specific but captures the full command line of every process launched system- wide (Event ID 4688).
- Lesson 1511 — PowerShell and Command-Line Logging
- Process Execution Events
- – Every program that starts, including who launched it, when, with what parameters, and the full parent-child process tree.
- Lesson 1575 — EDR Data Collection and Telemetry
- Process identity
- which specific application is trying to communicate
- Lesson 1584 — Host-Based Firewall Architecture and Purpose
- Process Injection Detection
- Malware frequently injects malicious code into legitimate processes (like `explorer.
- Lesson 2392 — Process and Thread Analysis
- Process Isolation
- The app runs in its own process with its own instance of the Dalvik/ART virtual machine
- Lesson 2713 — Android Application Sandboxing
- Process limits (PID limits)
- restrict the number of processes, stopping fork bombs and process-table exhaustion attacks.
- Lesson 1657 — Resource Limits and Isolation
- Process Monitoring
- Watch for unexpected processes or excessive resource consumption that indicates malicious binaries running.
- Lesson 2802 — IoT Botnet Detection and Mitigation
- Process states
- Every running program, including hidden or injected malware
- Lesson 2389 — Memory Forensics Fundamentals
- Process the query
- on the encrypted data without the server learning your selection
- Lesson 2928 — Private Information Retrieval
- Process-level granularity
- You can restrict which applications can send/receive traffic
- Lesson 1586 — iptables and nftables on Linux
- Process-to-Socket Mapping
- Linking network connections back to specific processes helps distinguish legitimate traffic from malware communication.
- Lesson 2393 — Network Artifact Recovery
- Processes
- – Documented procedures for handling data, responding to incidents, reviewing access
- Lesson 22 — ISO 27001 and Security Management SystemsLesson 42 — Creating a Data Flow Diagram (DFD)Lesson 62 — STRIDE per Element AnalysisLesson 68 — Data Flow Diagrams for Threat ModelingLesson 2637 — Creating Architecture Data Flow Diagrams
- Processing
- – Normalize, parse, and organize data into usable formats (like your SIEM does)
- Lesson 2334 — Threat Intelligence Fundamentals and the Intelligence LifecycleLesson 2885 — End-to-End Security and Lifecycle Protection
- Processing Integrity
- System processing is complete, valid, accurate, timely, and authorized.
- Lesson 1978 — SOC 2 Trust Service CriteriaLesson 2591 — SOC 2 Overview and Trust Services Criteria
- Produce propaganda
- customized to cultural, political, or demographic groups
- Lesson 2866 — Synthetic Text Generation and GPT-Based Misinformation
- Product/business owners
- accept documented risks
- Lesson 2064 — Security Sign-Off and Approval Workflows
- Production payment systems
- (avoid business disruption)
- Lesson 2091 — Scoping In-Scope vs Out-of-Scope Assets
- Production with change windows
- Use automated rollback with human approval gates
- Lesson 2025 — Automated Drift Remediation Strategies
- Professional info
- occupation, employer size, industry
- Lesson 2904 — Quasi-Identifiers and Re-identification Risk
- Professional Tone
- Lesson 2075 — Writing Effective Vulnerability Reports
- Program management
- Triage, validation, and deduplication of reports
- Lesson 2071 — Introduction to Bug Bounty Programs
- Program Maturity
- Use frameworks like CMMI or NIST CSF maturity levels to show progression from reactive (Level 1) to optimized (Level 5) across security domains.
- Lesson 3042 — Executive Security Reporting
- Programmatic Access
- Applications authenticate to AWS (using IAM roles, instance profiles, or Lambda execution roles) and call the Secrets Manager API to retrieve secrets at runtime.
- Lesson 1328 — AWS Secrets Manager
- Progressive delays
- First failure = instant retry, third = 5 seconds, fifth = 30 seconds
- Lesson 700 — Rate Limiting and Account Lockout Policies
- Progressive Difficulty
- Start with obvious phishing emails, then gradually increase sophistication as your organization improves, mirroring how real attackers adapt.
- Lesson 2289 — Phishing Simulation Programs
- Progressive disclosure
- Show essential choices first, with "Learn more" links to detailed explanations.
- Lesson 2933 — Consent Management Systems and UI Patterns
- Progressive expansion
- When legitimate access needs arise, add permissions incrementally.
- Lesson 1706 — Least Privilege Principle in Cloud IAM
- Progressive rollout
- Expand to business applications with careful testing
- Lesson 2688 — Microsegmentation Implementation Strategies
- Prohibited Actions
- Explicitly ban selling, retaining, or using data outside the stated purpose
- Lesson 2567 — Service Provider and Third-Party Contracts
- Prohibited activities
- Downloading unauthorized software, accessing illegal content, sharing credentials, using personal cloud storage for company data
- Lesson 2489 — Acceptable Use Policy (AUP)
- Project-based groups
- `ProjectAlpha-Engineers`, `ProjectBeta-QA`
- Lesson 1711 — IAM Groups: Organizing Users and Permission Sets
- Promiscuous mode
- changes this—your interface will capture *all* packets on the network segment it can see, not just those meant for your machine.
- Lesson 375 — Wireshark Fundamentals and Interface Selection
- Prompt injection
- attacks manipulate the model by embedding malicious instructions in user input.
- Lesson 2854 — LLM Architecture and Attack Surface
- Prompt/instruction separation
- Store system prompts outside the main context window, with architectural enforcement preventing user inputs from accessing or modifying them.
- Lesson 2861 — Defense Strategies Against Prompt Injection
- Proof
- You generate a zero-knowledge proof demonstrating you possess the secret
- Lesson 247 — ZKP Applications in AuthenticationLesson 1780 — Transit Encryption Monitoring and Compliance
- Proof-of-Concept Code
- Lesson 2075 — Writing Effective Vulnerability Reports
- Propagation
- Track how data flows through variables, function parameters, and return values
- Lesson 1381 — Data Flow Analysis and Taint Tracking
- Property Inference
- targets the *entire dataset's* characteristics.
- Lesson 2838 — Attribute Inference and Property Inference
- Property-based
- `if $programname == 'sshd' then /var/log/ssh.
- Lesson 1476 — rsyslog Configuration and Filtering
- Pros
- Easy setup, no additional infrastructure needed, perfect for homes and small offices.
- Lesson 515 — WPA2-PSK vs WPA2-EnterpriseLesson 785 — JWT Signature AlgorithmsLesson 1345 — Automated vs Manual RotationLesson 2479 — Bug Bounty Fundamentals and Models
- Prosecutor risk
- Probability an attacker targeting a specific individual succeeds
- Lesson 2911 — Measuring and Testing Anonymization Effectiveness
- Protect
- Lesson 21 — Security Frameworks: NIST Cybersecurity FrameworkLesson 414 — Port Security and MAC FilteringLesson 1442 — SSH Key Generation and ManagementLesson 2610 — NIST Cybersecurity Framework (CSF)
- Protected Health Information (PHI)
- includes any individually identifiable health data—from medical records to billing information to patient communications.
- Lesson 1981 — HIPAA and PHI in the Cloud
- Protected key storage
- that's physically isolated from your main systems
- Lesson 306 — Hardware Security Modules (HSMs)
- Protected Management Frames
- to prevent deauthentication attacks at scale.
- Lesson 545 — Enterprise Wi-Fi Deployment Architecture
- Protected Management Frames (PMF)
- introduced as optional in WPA2, mandatory in WPA3 — encrypts and authenticates management frames, preventing forgery.
- Lesson 527 — Deauthentication and Disassociation Attacks
- Protected Unless Open
- (`NSFileProtectionCompleteUnlessOpen`): Files can stay open even after lock, but new files require unlock.
- Lesson 2704 — Data Protection API and Keychain
- ProtectHome=yes
- makes `/home`, `/root`, and `/run/user` inaccessible to the service (or read-only with `ProtectHome=read-only`).
- Lesson 1433 — Service Isolation with systemd
- Protection from compromised users
- is essential—even root can't violate MAC policies
- Lesson 1450 — MAC vs DAC: Fundamental Differences
- Protocol
- – Is it TCP, UDP, ICMP, or something else?
- Lesson 417 — Packet Filtering FirewallsLesson 429 — Explicit Allow RulesLesson 458 — Snort: Architecture and Rule SyntaxLesson 459 — Writing Effective IDS/IPS RulesLesson 855 — Same-Origin Policy FundamentalsLesson 1047 — JavaScript's Same-Origin Policy FoundationLesson 1055 — Same- Origin Policy Fundamentals
- Protocol allowlist
- Only permit safe schemes like `https://` and `http://`.
- Lesson 894 — URL and Input Validation for SSRF Prevention
- Protocol analysis
- Detecting malformed packets or unusual TCP flags
- Lesson 372 — Evading Intrusion Detection SystemsLesson 2197 — Auxiliary Modules and Scanning
- Protocol analysis and reconstruction
- is the process of taking fragmented packet captures and rebuilding them into coherent sessions, extracting files, and understanding what actually happened at the application layer (HTTP, FTP, SMTP, etc.
- Lesson 2411 — Protocol Analysis and Reconstruction
- Protocol anomalies
- (e.
- Lesson 456 — Signature-Based Detection FundamentalsLesson 1872 — VPC Flow Logs and Network MonitoringLesson 2802 — IoT Botnet Detection and Mitigation
- Protocol Buffers
- (protobuf), **MessagePack**, and **FlatBuffers** take a fundamentally different approach:
- Lesson 1191 — Alternative Serialization Formats
- Protocol distribution
- What percentage is HTTP, DNS, SSH, etc.
- Lesson 416 — Network Monitoring and Baselining
- Protocol Flexibility
- While SMB is primary, CME also supports WinRM, MSSQL, LDAP, and SSH protocols, making it versatile across mixed environments.
- Lesson 2239 — CrackMapExec for Network Enumeration
- Protocol Fuzzing
- For TCP/UDP protocols, mutate packet structures while maintaining enough validity to reach deeper code paths.
- Lesson 1391 — API and Protocol FuzzingLesson 2788 — Protocol-Level Attacks and Reconnaissance
- Protocol gateways
- Insert security-aware proxies that validate commands
- Lesson 2787 — BACnet and Modbus Protocol Security
- Protocol leaks
- DNS requests, timing patterns, unencrypted metadata
- Lesson 2998 — Operational Security for Circumvention
- Protocol mimicry
- Make C2 look like DNS, HTTP, or other common protocols
- Lesson 2223 — C2 Infrastructure Setup
- Protocol Negotiation
- Both HTTP/2 and HTTP/3 require TLS (HTTPS).
- Lesson 1104 — Migrating Safely to HTTP/2 and HTTP/3
- Protocol precision
- Specify the exact protocols needed rather than "all traffic"
- Lesson 430 — Least Privilege Network Access
- Protocol Selection
- Choose established protocols like TLS 1.
- Lesson 2035 — Cryptographic Design Decisions
- Protocol Version
- SSH Protocol 1 has known design flaws and should never be used.
- Lesson 1446 — SSH Protocol Version and Cipher Selection
- Protocol Versions
- Always use TLS 1.
- Lesson 1773 — TLS/SSL in Cloud: Protocol Overview and Configuration
- Protocol violations
- Malformed packets or unusual port usage
- Lesson 382 — Identifying Malicious Traffic Patterns
- Protocol vulnerabilities
- in Modbus, DNP3, and proprietary industrial protocols designed without security
- Lesson 2804 — SCADA Security and Air-Gap Myths
- Protocol-Level Manipulation
- Lesson 1855 — WAF Evasion Techniques and Defense
- Protocol-specific probes
- Sending HTTP GET requests, SSH handshakes, or database queries
- Lesson 344 — Service Version Detection
- Protocols
- Create valid HTTP requests with contradictory headers or oversized field combinations
- Lesson 1390 — Structured Input Fuzzing
- Prototype pollution
- happens when an attacker modifies `Object.
- Lesson 654 — DOM Clobbering and Prototype ManipulationLesson 1051 — JavaScript Prototype Chain SecurityLesson 1193 — Prototype Pollution Fundamentals
- provable security
- schemes where we can mathematically demonstrate security properties.
- Lesson 148 — PSS: Probabilistic Signature SchemeLesson 226 — RSA Signature Schemes (PKCS#1 v1.5 and PSS)
- Prove
- who performed malicious or unauthorized actions
- Lesson 58 — Repudiation ThreatsLesson 243 — The Graph Isomorphism ExampleLesson 2621 — Control Attestation and TestingLesson 2848 — Certified Defenses and Provable RobustnessLesson 2934 — Consent Records and Proof of Consent
- provenance
- is the documented history of how a software package was built—who built it, from what source code, using which tools, and when.
- Lesson 1300 — Package Provenance and SLSALesson 1643 — Base Image Selection and ProvenanceLesson 2873 — Training Data Integrity and Provenance
- Provenance tracking
- Verify data sources and reject untrusted contributions
- Lesson 2826 — Defense Strategies Against Poisoning
- Provenance Verification
- Validate the key's origin and integrity post-import
- Lesson 1771 — Bring Your Own Key (BYOK) and Key Import
- Provide actionable guidance
- Link to remediation advice, not just "SQL injection detected"
- Lesson 1365 — Integrating SAST into Development Workflow
- Provide actionable remediation guidance
- prioritized by real risk
- Lesson 2080 — What is Penetration Testing?
- Provide clear recommendations
- Not just "fix this," but prioritized next steps with realistic timelines and resource implications.
- Lesson 2161 — Executive Summary Writing
- Provide Context
- An alert saying "Unusual API call detected" is useless.
- Lesson 1896 — Cloud Alert Design Principles
- Provide references
- Link to vendor documentation, OWASP guidelines, or configuration examples.
- Lesson 2164 — Remediation Recommendations
- Provide visibility
- across networks, endpoints, cloud environments, and applications
- Lesson 2305 — What is a Security Operations Center (SOC)?
- Provider Changes
- Cloud platforms deprecate services, change default settings, or modify resource behavior—your IaC stays static while reality shifts.
- Lesson 2022 — Infrastructure Drift: Causes and Risks
- Provider manages
- Lesson 1681 — Serverless and FaaS Security Model
- Provider responsibilities expand to
- Lesson 1940 — Serverless Architecture and Security Implications
- Provider terms of service
- Defines what forensic actions you can perform
- Lesson 1922 — Cloud Forensics Tools and Legal Considerations
- Providing a common language
- between technical teams and executives
- Lesson 2497 — Risk Assessment Overview and Objectives
- Provisioned concurrency
- keeps function instances pre-warmed and ready, eliminating cold starts while also capping maximum scale.
- Lesson 1956 — Concurrency Controls and Throttling
- Provisioning (Creation)
- Lesson 1430 — Account Lifecycle and Privilege Review
- Proxies
- act as middlemen between clients and servers.
- Lesson 419 — Application Layer Firewalls and Proxies
- Proxy attacks
- Hiring contractors or using compromised systems in third countries
- Lesson 2337 — Threat Actors and Attribution
- Proxy logs
- reveal web requests, URLs visited, user agents, and response codes—essential for tracking command-and-control communication or data exfiltration attempts.
- Lesson 2384 — Network Evidence Collection
- Pseudo-header manipulation
- Attackers might inject HTTP/1.
- Lesson 1112 — HTTP/2 Downgrade and Smuggling
- Pseudo-Random Number Generators (PRNGs)
- are deterministic algorithms.
- Lesson 284 — True vs Pseudo Random Number Generation
- Pseudonymization
- replaces identifying fields with artificial identifiers (pseudonyms) while keeping the ability to re- link data to individuals using separate information (like a key or mapping table).
- Lesson 2902 — Anonymization vs. Pseudonymization
- Pseudonymization and Tokenization
- replace identifiers with reversible tokens, enabling data linkage without exposing identity directly.
- Lesson 2922 — Overview of Privacy-Preserving Technologies
- PSK
- for home networks or small businesses with fewer than ~20 users.
- Lesson 515 — WPA2-PSK vs WPA2-Enterprise
- PSS (Probabilistic Signature Scheme)
- is the modern approach.
- Lesson 226 — RSA Signature Schemes (PKCS#1 v1.5 and PSS)
- PST (Personal Storage Table)
- files are Outlook's local archive format on Windows.
- Lesson 2406 — Email and Communication Forensics
- Psychological Acceptability
- means designing security mechanisms that feel natural and reasonable to users.
- Lesson 9 — Psychological Acceptability and Usable SecurityLesson 2669 — Psychological Acceptability
- PTZ (Pan-Tilt-Zoom)
- cameras cover wide areas but may miss events while repositioning.
- Lesson 2284 — Video Surveillance and Monitoring
- Public
- Untrusted networks like coffee shop Wi-Fi or airports
- Lesson 1585 — Windows Firewall Configuration and ProfilesLesson 1801 — Data Classification FundamentalsLesson 1829 — Public vs Private SubnetsLesson 1849 — Private Endpoints and DNS ResolutionLesson 2491 — Data Classification and Handling PolicyLesson 2652 — Data Segmentation and Classification
- Public Agreement
- Alice and Bob publicly agree on a common "base color" (yellow) that everyone can see.
- Lesson 153 — Diffie-Hellman Key Exchange Fundamentals
- Public archives
- Wayback Machine, leaked databases, government records
- Lesson 327 — OSINT Fundamentals and Information Sources
- Public clients
- (mobile apps, SPAs) cannot safely store secrets—users could extract them by inspecting the app.
- Lesson 764 — OAuth 2.0 Client Authentication
- Public Cloud Storage
- Misconfigured AWS S3 buckets, Azure Blob containers, and Google Cloud Storage buckets can expose configuration files, backups, or deployment scripts containing secrets.
- Lesson 1356 — Monitoring for Public Secret Exposure
- Public Code Repositories
- GitHub, GitLab, Bitbucket public repos are goldmines for accidental commits.
- Lesson 1356 — Monitoring for Public Secret Exposure
- Public comparison
- They announce which *bases* they used (not the results)
- Lesson 279 — QKD Fundamentals and BB84 Protocol
- Public DNS Records
- Lesson 328 — DNS Enumeration Without Direct Queries
- Public documents
- (job postings, press releases) leak internal terminology and tools
- Lesson 2254 — Spear Phishing and Targeted Attacks
- Public Exchange
- Alice computes g^a mod p and sends it; Bob computes g^b mod p and sends his
- Lesson 2941 — Key Exchange in E2EE Systems
- Public exposure tolerance
- Some platforms support fully private programs
- Lesson 2480 — Bug Bounty Platform Ecosystem
- public key
- is `(n, e)`.
- Lesson 142 — RSA Key Generation: Selecting Primes and Computing ParametersLesson 147 — RSA Signature Generation and VerificationLesson 173 — Public Key Information and Algorithm IdentifiersLesson 176 — Certificate Signing Requests (CSR)Lesson 225 — Digital Signature Fundamentals and Use CasesLesson 275 — Multivariate CryptographyLesson 787 — Algorithm Confusion AttacksLesson 1442 — SSH Key Generation and Management (+1 more)
- Public key authentication
- cryptographic proof using key pairs (recommended)
- Lesson 1440 — SSH Protocol Fundamentals and Security Model
- Public key distribution
- your certificate travels with signed emails, so recipients learn your public key organically
- Lesson 2958 — Email Encryption Fundamentals and S/MIME
- Public Key Information
- section contains two critical pieces:
- Lesson 173 — Public Key Information and Algorithm Identifiers
- Public key pinning
- Pin just the public key (survives certificate renewal)
- Lesson 2737 — Mobile Network Security
- Public Mix
- Alice mixes yellow + red = orange, and sends orange publicly.
- Lesson 153 — Diffie-Hellman Key Exchange Fundamentals
- Public Monitoring
- Security researchers and domain owners monitor CT logs for unauthorized certificates
- Lesson 189 — Certificate Transparency Logs Verification
- Public Parameters
- Both parties agree on public values (a large prime *p* and a generator *g*)
- Lesson 2941 — Key Exchange in E2EE Systems
- Public profiles
- should be locked down: deny all inbound connections by default, only allowing explicitly approved applications to communicate.
- Lesson 1585 — Windows Firewall Configuration and Profiles
- public repositories
- by default.
- Lesson 1284 — Understanding Dependency Confusion AttacksLesson 1285 — Public vs Private Package Repository ResolutionLesson 1289 — Detecting Dependency Confusion Vulnerabilities
- Public subnet route tables
- typically include a route to an internet gateway (`0.
- Lesson 1830 — Route Tables and Subnet Associations
- Public subnets
- Internet-facing resources (load balancers, bastion hosts)
- Lesson 1828 — Subnetting in Cloud VPCsLesson 1829 — Public vs Private Subnets
- Public subnets by default
- – All subnets have internet gateway routes, making resources potentially internet-facing
- Lesson 1813 — Default VPC Security Considerations
- Public Task
- Required for official functions or tasks in the public interest (government agencies, regulatory bodies).
- Lesson 2931 — Legal Bases for Data Processing
- Public warning
- if vendor is unresponsive or patch deployment will take significant time
- Lesson 2477 — Handling Zero-Day and Active Exploitation
- Public WiFi protection
- On untrusted networks (coffee shops, airports), VPNs encrypt your traffic, preventing local attackers from intercepting sensitive data.
- Lesson 471 — VPN Use Case: Privacy and Anonymity
- Public Zone
- Streets, parking lots—anyone can access
- Lesson 2279 — Physical Access Control Models and Zones
- Public-key approaches
- Encrypting set elements so only matches decrypt properly
- Lesson 2925 — Private Set Intersection
- Public-Key Encrypted Session Key
- packets (hold the encrypted symmetric key)
- Lesson 2960 — OpenPGP Message Format and Operations
- Publication
- – Communicate policy through training, intranet, and onboarding
- Lesson 2494 — Policy Development and Approval Process
- PublicKey
- The other peer's public key (for authentication)
- Lesson 494 — WireGuard Peer Configuration and Key Management
- Publisher generates hash
- When a package author publishes version 1.
- Lesson 1293 — Package Integrity and Checksums
- Publisher information
- Lesson 2404 — Artifact Analysis: Prefetch, Shimcache, and Amcache
- Publisher rules
- Based on digital signatures (most secure and maintainable)
- Lesson 1593 — Windows AppLocker
- Publishing
- The signature is stored with metadata pointing to the image
- Lesson 1297 — Container Image Verification
- PUFs
- provide a revolutionary defense: they exploit microscopic manufacturing variations in silicon that are inherently random and cannot be duplicated, even by the original manufacturer.
- Lesson 2777 — Hardware Cloning and Counterfeit Prevention
- Pulumi
- Uses general-purpose languages (Python, JavaScript)
- Lesson 2012 — Infrastructure as Code Fundamentals and Security Implications
- Puppet
- and **Chef** use agent software installed on each endpoint that periodically "pulls" the desired configuration from a master server and enforces it locally.
- Lesson 1619 — Configuration Management Tools
- Purchase flows
- Bots buying limited inventory faster than humans can react
- Lesson 1032 — API6:2023 - Unrestricted Access to Sensitive Business Flows
- Purchase Process Manipulation
- A shopping cart checks payment in step 2 but doesn't verify it again before order confirmation in step 4.
- Lesson 808 — Multi-Step Process Authorization Failures
- Pure brute-force
- works when you have no intelligence about the password format but know it's short (typically 6-8 characters maximum due to time constraints).
- Lesson 2229 — Brute-Force and Mask Attacks
- Purple team collaboration
- Often involves real-time coordination with defenders
- Lesson 2171 — Adversary Emulation vs Penetration Testing
- Purple teaming
- fills this gap by fostering direct collaboration during security exercises rather than keeping offensive and defensive efforts siloed.
- Lesson 2168 — Purple Team: Bridging Red and Blue
- Purple Teams
- Test whether defenses catch not just *any* credential dumping, but the *specific methods* adversaries actually use
- Lesson 2179 — Techniques and Sub-techniques
- Purpose
- | Confidentiality | Integrity & verification |
- Lesson 206 — Non-Reversibility and One-Way PropertyLesson 1720 — Service Accounts vs User Accounts in Cloud
- Purpose documentation
- Logging the reason for visit and intended areas of access
- Lesson 2285 — Visitor Management and Temporary Access
- Purpose Limitation
- Lesson 2553 — Data Processing PrinciplesLesson 2567 — Service Provider and Third-Party ContractsLesson 2895 — Purpose Specification and Limitation
- Purpose Specification
- Clearly articulate specific, explicit, and legitimate purposes *before* or at the point of collection
- Lesson 2895 — Purpose Specification and Limitation
Q
- Qiling Framework
- Python-based multi-architecture emulator with instrumentation hooks
- Lesson 2767 — Firmware Emulation and Dynamic Analysis
- QoS 2 (Exactly once)
- Highest overhead, guaranteed single delivery
- Lesson 2781 — MQTT Security Architecture
- QR Code Authentication
- When logging into a website on your laptop but your passkey is on your phone, the site displays a QR code.
- Lesson 754 — Passkeys and Cross-Device Authentication
- QR Code Security
- That QR code contains the raw secret seed.
- Lesson 743 — Authenticator Apps and Seed Management
- Quality bonuses
- for exceptional reports with PoCs and remediation advice
- Lesson 2482 — Bounty Pricing and Reward Structures
- Quality gates
- Require minimum test coverage, no critical bugs
- Lesson 1403 — Pipeline Security and Release GatesLesson 2063 — Release Gating FundamentalsLesson 2439 — Container and IaC Scanning
- Quality Updates
- (non-security improvements) versus **Security Updates** (vulnerability fixes).
- Lesson 1600 — Types of Patches and Updates
- Quantify likelihood
- Use threat intelligence, exploitability metrics, and historical data to assign probability to each threat scenario
- Lesson 2514 — Threat Modeling Integration with Risk Analysis
- Quantum-resistant
- Secure against both classical and quantum attacks
- Lesson 271 — CRYSTALS-Dilithium: Post-Quantum Digital Signatures
- Quarantine
- Move suspicious files to safe storage before they spread
- Lesson 3048 — Security Incident Auto-Response
- Query access only
- The attacker can send inputs and receive predictions (black-box setting)
- Lesson 2827 — Model Extraction Attack Fundamentals
- Query builders
- Safe when using their parameter methods, unsafe when concatenating
- Lesson 1234 — Database API Safety and ParameterizationLesson 1240 — ORM Query Builder Security
- Query complexity
- `users { friends { friends { friends {.
- Lesson 999 — GraphQL Architecture and Security Implications
- Query cost analysis
- assigns a numerical "cost" to each field based on its resource intensity.
- Lesson 1002 — Query Cost Analysis and Rate Limiting
- Query interfaces
- to search millions of log entries
- Lesson 1869 — Cloud Logging Architecture and Service Overview
- Query operators
- In MongoDB, queries use JSON objects.
- Lesson 594 — NoSQL Database Fundamentals and Attack Surface
- Query Parameter Manipulation
- Test filters and search parameters like `/api/users?
- Lesson 836 — API Authorization Testing
- Query parameters
- `?
- Lesson 809 — Parameter Tampering for Authorization BypassLesson 1010 — Bearer Token Authentication for APIs
- Query strategically
- Send inputs where all features are zero except one (basis vectors).
- Lesson 2829 — Equation-Solving Attacks on Linear Models
- Query string tokens
- (less secure): `wss://example.
- Lesson 1069 — WebSocket Authentication and Authorization
- Questionnaires
- Lesson 2535 — Vendor Risk Assessment Process
- QUIC model (HTTP/3)
- Lesson 1102 — HTTP/3 and QUIC Security Fundamentals
- Quota exhaustion attacks
- where malicious code fills storage to trigger eviction
- Lesson 1079 — Storage Quota and Eviction Policies
- Quota Manipulation
- If a service limits 100 downloads per day but tracks this client-side or in a cookie, an attacker simply resets that value to bypass the restriction.
- Lesson 941 — Testing Limits and Constraints
R
- RA Guard
- Configured on switches to block rogue Router Advertisements from unauthorized ports
- Lesson 391 — IPv6 Neighbor Discovery and Spoofing Parallels
- race conditions
- during inventory checks and allocation.
- Lesson 904 — Concurrency Issues in Inventory and Resource AllocationLesson 2039 — Common Vulnerability Patterns in CodeLesson 2103 — Logic Flaw and Business Logic Testing
- RACI matrices
- prevent confusion: who is Responsible, Accountable, Consulted, and Informed.
- Lesson 2064 — Security Sign-Off and Approval Workflows
- Racial or ethnic origin
- Lesson 2552 — Personal Data and Special Categories
- RADIUS server
- behind the scenes making authentication decisions.
- Lesson 544 — RADIUS Server Configuration and Security
- RadSec
- (RADIUS over TLS) whenever possible to encrypt the entire RADIUS session, protecting usernames, attributes, and metadata.
- Lesson 544 — RADIUS Server Configuration and Security
- rainbow table
- is a massive precomputed database that maps millions or billions of common passwords to their hash values.
- Lesson 685 — Rainbow Tables and Why Simple Hashing FailsLesson 697 — Rainbow Tables and Pre- computed Hash Attacks
- RAM remanence
- memory chips retain data briefly after power loss.
- Lesson 2382 — Memory Acquisition Techniques
- Random
- Generated using a cryptographically secure random number generator
- Lesson 140 — Salts in Key Derivation
- Random access
- Need to decrypt just one block in the middle?
- Lesson 98 — CTR Mode: Turning Block Ciphers into Streams
- Random and unpredictable
- Use cryptographically secure random generation (128+ bits)
- Lesson 1009 — API Key Authentication: Design and Security
- Random bytes
- (at least 8 bytes) make each encryption unique
- Lesson 145 — RSA Padding Schemes: PKCS#1 v1.5
- Random input transformations
- Apply random cropping, resizing, or padding before classification
- Lesson 2852 — Ensemble and Randomization Defenses
- Random number generation
- High-quality entropy for cryptographic operations
- Lesson 2771 — Hardware Root of Trust and TPM
- Random Private Addresses
- change periodically (typically every 15 minutes).
- Lesson 557 — BLE Privacy and Address Randomization
- Random User-Agent rotation
- `--random-agent` disguises SQLMap traffic as various browsers
- Lesson 590 — SQLMap Evasion and Tampering Scripts
- Randomization
- Protects against subtle cryptanalytic attacks
- Lesson 148 — PSS: Probabilistic Signature Scheme
- Randomize delays
- slightly to obscure timing patterns
- Lesson 1949 — Serverless Cold Start and Timing Side Channels
- Randomized smoothing
- Add noise to inputs and use statistics to bound prediction stability
- Lesson 2848 — Certified Defenses and Provable Robustness
- Randomness injection
- OAEP adds random data to your message before encryption
- Lesson 146 — OAEP: Optimal Asymmetric Encryption Padding
- Range
- Numeric inputs should fall within logical boundaries.
- Lesson 1153 — Data Type and Format Validation
- Range compression
- A "High" risk might represent wildly different actual exposures
- Lesson 2500 — Risk Calculation and Risk Matrices
- Range constraints
- Is the quantity between 1 and 999?
- Lesson 1154 — Semantic and Business Logic Validation
- Ransomware
- has become the dominant profit model.
- Lesson 48 — Motivations: Financial Gain and CybercrimeLesson 51 — Motivations: Disruption and Destructive AttacksLesson 1518 — Malware Taxonomy and Classification CriteriaLesson 2372 — IR Playbooks and Runbooks
- Rapid Cache Changes
- Lesson 411 — ARP Cache Inspection
- Rapid correlation
- Join events across services by common fields like `user` or `session_id`
- Lesson 1472 — Structured vs Unstructured Logging
- Rapid execution
- Functions fire and complete quickly, making detection harder
- Lesson 1960 — Injection Vulnerabilities in Serverless
- Rapid propagation
- can infect entire networks in minutes
- Lesson 1520 — Worms: Autonomous Network Propagation
- Rapid Response Team
- Designate on-call security engineers, developers, and operations staff who can mobilize immediately.
- Lesson 2069 — Vulnerability Response and Hotfix Process
- Rapid role assumption
- patterns suggesting credential testing
- Lesson 1735 — Credential Theft and Token Security
- Rapid threat intelligence integration
- Verify the threat is real, exploited, and affects your environment
- Lesson 2459 — Emergency and Out-of-Band Patching
- Rapid vulnerability response
- Know immediately if CVE-2023-XXXX affects your systems
- Lesson 1276 — What is an SBOM and Why It MattersLesson 1646 — Software Bill of Materials (SBOM) for Containers
- Rapid7 InsightIDR
- User-behavior focused with integrated threat intelligence
- Lesson 2324 — Common SIEM Platforms and Vendor Landscape
- Rare updates
- – many devices ship with vulnerable firmware that never gets patched
- Lesson 2759 — Firmware Fundamentals and Attack Surface
- Ratcheting
- Keys evolve forward, making it impossible to work backward even if one key leaks
- Lesson 2943 — Forward Secrecy in E2EE
- Rate Limit Bypass
- Rate limits might check requests per IP address.
- Lesson 941 — Testing Limits and Constraints
- Rate limiting
- Maximum packets per second
- Lesson 345 — Scan Timing and PerformanceLesson 462 — IPS Blocking Actions and ResponseLesson 700 — Rate Limiting and Account Lockout PoliciesLesson 702 — Password Expiration and Rotation PoliciesLesson 746 — Push Notification-Based MFALesson 753 — Magic Links and One-Time CodesLesson 988 — Secure File Serving and Access ControlLesson 1002 — Query Cost Analysis and Rate Limiting (+4 more)
- Rate Limiting and Blackholing
- Drop traffic to/from known C2 infrastructure; rate-limit outbound connections to prevent participation in attacks.
- Lesson 2802 — IoT Botnet Detection and Mitigation
- Rate Limiting Integration
- (from lesson 1858) throttles suspicious patterns—for example, blocking IPs making 100 login attempts per minute.
- Lesson 1859 — Bot Management and Detection
- Rate monitoring
- Flagging rapid connection attempts that suggest scanning
- Lesson 372 — Evading Intrusion Detection Systems
- Raw (.dd, .raw)
- exact sector-by-sector copy, largest file size
- Lesson 2399 — Disk Imaging and Write Blocking
- Raw (DD/IMG)
- The simplest format—a bit-for-bit copy of physical memory with no compression or metadata.
- Lesson 2391 — Memory Image Formats and Validation
- Raw public key mode
- Skip certificates entirely in TLS/DTLS, exchanging only public keys (SPKI format)
- Lesson 2792 — Certificate-Based Authentication in Constrained Devices
- Raw Public Keys (RPK)
- A middle ground using just the public key without the full certificate overhead.
- Lesson 2784 — CoAP Security with DTLS
- Raw SQL builders
- Any API that directly splices user input into query text
- Lesson 1234 — Database API Safety and Parameterization
- Raw SQL queries
- Many ORMs let you execute raw SQL strings—if you concatenate user input here, you're vulnerable
- Lesson 1238 — ORM Security Fundamentals
- RBAC
- Organizations with clear job functions and many users
- Lesson 19 — Access Control Models: DAC, MAC, and RBACLesson 21 — Security Frameworks: NIST Cybersecurity FrameworkLesson 1976 — Multi-Tenancy and Cluster Isolation
- RBAC (Role-Based Access Control)
- is the gatekeeper that determines which users or processes can perform specific actions on cluster resources.
- Lesson 1969 — Kubernetes RBAC and Service Accounts
- RBAC (Role-Based)
- excels in organizations with clear job functions (HR managers, sales reps).
- Lesson 802 — Choosing and Implementing Access Models
- RBAC + ABAC
- Assign base permissions by role, then refine with attributes (only during business hours)
- Lesson 802 — Choosing and Implementing Access Models
- RBAC + ReBAC
- Roles define general access, relationships control specific resources (team documents)
- Lesson 802 — Choosing and Implementing Access Models
- RBAC boundaries
- Limit API server permissions; overly permissive RBAC can allow privilege escalation to read Secrets directly
- Lesson 1668 — Securing etcd and Secrets Management
- Re-encode files
- on the server side to remove hidden content
- Lesson 963 — Polyglot Files and Multi-Format Attack Prevention
- Re-encoding or conversion
- to neutralize threats
- Lesson 982 — Multi-Layer File Upload Validation Strategy
- Re-encrypt during copy
- The backup must be decrypted using the source region's key, then re-encrypted with a key from the destination region
- Lesson 1798 — Encrypted Backups and Snapshots
- Re-encryption
- Some databases automatically re-encrypt with new keys; others require manual intervention
- Lesson 1797 — Key Management for Database Encryption
- Re-evaluate trust boundaries
- and attack surface
- Lesson 2644 — Iterating Threat Models with Architecture Changes
- Re-execute original tests
- Run the exact same exploitation attempts that previously succeeded
- Lesson 2166 — Retest and Validation Process
- Re-identification Risk
- measures how easily an attacker could link anonymized records back to individuals.
- Lesson 2911 — Measuring and Testing Anonymization Effectiveness
- Re-performance
- Execute the control yourself to verify results
- Lesson 2547 — Control Testing MethodologiesLesson 2621 — Control Attestation and Testing
- Re-sign
- Generate a new signature (since you don't have the original developer's private key)
- Lesson 2731 — Repackaging and Code Injection Attacks
- Reach high-value targets
- like domain controllers, financial systems, or executive accounts
- Lesson 2150 — Lateral Movement Fundamentals and Objectives
- Reachability analysis
- (is the vulnerable code path actually used?
- Lesson 3028 — Dependency Scanning and SCA
- Reachability Analyzer
- tool to simulate paths between resources and identify where blocking occurs.
- Lesson 1826 — Common Misconfigurations and Troubleshooting
- React JSX
- `{expression}` (though React has better default protections)
- Lesson 681 — Template Injection in Client-Side Frameworks
- Read access
- Subject's clearance must **dominate** the object's label (equal or higher level, plus all required categories)
- Lesson 1451 — Security Labels and ClearancesLesson 1875 — Log Encryption and Access Controls
- Read all cookies
- (including session tokens, unless marked `HttpOnly`)
- Lesson 634 — JavaScript Execution Contexts in XSS
- Read arbitrary files
- Upload a symlink pointing to `/etc/shadow`, then request the uploaded "file" through the web interface to read protected system files.
- Lesson 969 — Symbolic Link Attacks
- Read sensitive configuration files
- (database credentials, application secrets)
- Lesson 589 — SQLMap Advanced Exploitation Features
- Read the Changelog
- Before updating, review what changed between versions.
- Lesson 1266 — Dependency Update Strategies and Patching
- Read the CSRF token
- directly from the page (something external sites can't do due to same-origin policy)
- Lesson 642 — Cross-Site Request Forgery via XSS
- Read-only filesystems
- Prevent modifications to critical system areas
- Lesson 2862 — LLM Output Validation and Sandboxing
- Read-only modes
- Query enrichment data without triggering responses
- Lesson 2332 — Playbook Testing and Validation
- Readiness Assessment
- Lesson 2597 — SOC 2 Audit Process and Preparation
- Readiness assessments
- Conduct quarterly mini-audits to catch gaps early
- Lesson 2599 — SOC 2 Reports and Continuous Compliance
- Reading Local Files
- Lesson 883 — SSRF Impact and Attack Scenarios
- Real consequences include
- Lesson 1599 — The Critical Role of Patch Management
- Real UID/GID
- Who you actually are (the user who started the process)
- Lesson 2139 — Linux Privilege Model and Escalation Fundamentals
- Real-Time Alerting
- notifies security teams immediately when policy violations occur.
- Lesson 1992 — Continuous Compliance MonitoringLesson 2635 — Compromise Recording and Auditability
- Real-time alerts
- Notifications when potential secrets matching your organization appear
- Lesson 1356 — Monitoring for Public Secret Exposure
- Real-time communication matters
- Voice calls, video streams, or IoT sensors where data arrives continuously and latency is critical
- Lesson 121 — Stream Ciphers vs Block Ciphers: When to Use Each
- Real-time knowledge sharing
- Red teamers explain their attack techniques *during* execution
- Lesson 2168 — Purple Team: Bridging Red and Blue
- Real-time streaming
- to SIEM tools or detection systems
- Lesson 1869 — Cloud Logging Architecture and Service Overview
- Real-world analogy
- Imagine a library that checks your membership card once when you enter, then lets you access any restricted archive without further checks.
- Lesson 2665 — Complete MediationLesson 2976 — Traffic Analysis and Correlation Attacks
- Real-world applications
- Autonomous vehicles, malware detection, biometric systems
- Lesson 2819 — Label Flipping and Targeted Poisoning
- Real-world disaster
- In 2008, Debian's OpenSSL package had a bug that severely limited entropy.
- Lesson 292 — Randomness in Virtual Environments
- Real-world example
- The famous "ECB Penguin" demonstration shows what happens when you encrypt an image using ECB mode.
- Lesson 95 — ECB Mode: Structure and Fatal Weaknesses
- Real-world risk
- Many security cameras, routers, and medical devices have been compromised through forgotten debug ports.
- Lesson 2776 — Debug Interfaces and JTAG Security
- Real-world scenario
- Lesson 1162 — Case Sensitivity and Case Mapping Attacks
- Realistic scenario
- Follow actual attack chains and TTPs from threat intelligence
- Lesson 2171 — Adversary Emulation vs Penetration Testing
- Reality shattered this myth
- Lesson 2804 — SCADA Security and Air-Gap Myths
- Reaver
- exploits this by systematically trying all possible PIN combinations, receiving feedback after each attempt.
- Lesson 526 — WPS PIN Attacks
- ReBAC (Relationship-Based)
- fits social platforms and collaboration tools where access depends on connections (friends, team members).
- Lesson 802 — Choosing and Implementing Access Models
- Rebinding occurs
- The attacker's DNS server now returns a malicious internal IP (`127.
- Lesson 890 — DNS Rebinding Attacks
- Receive the secret values
- directly into application memory
- Lesson 1339 — Application-Level Secret Retrieval
- Reception/Lobby Zone
- First controlled entry point
- Lesson 2279 — Physical Access Control Models and Zones
- Recipient uncertainty
- "Can they even read encrypted email?
- Lesson 2965 — Usability Challenges and Key Management UX
- Recipient Validation
- The assertion should specify the intended recipient (SP).
- Lesson 780 — SAML Response Replay and Reuse
- Recognize top contributors
- publicly when they consent—through hall-of-fame pages, social media shout-outs, or special badges.
- Lesson 2484 — Managing Researcher Relationships
- Recognize trust boundaries early
- – Where does user data enter?
- Lesson 77 — Threat Modeling in Requirements Phase
- Recommend clear actions
- with cost and timeline
- Lesson 2516 — Risk Analysis Documentation and Communication
- Recommend removals
- Suggest specific permissions to revoke based on real usage data
- Lesson 1749 — Access Analyzer and Unused Access Detection
- Recommendation
- Proposed remediation actions
- Lesson 2548 — Audit Findings and Risk RatingLesson 2549 — Audit Reporting and Communication
- Recommendations
- for targeted training based on specific failure patterns
- Lesson 2252 — Social Engineering Reporting and Metrics
- Recommended treatments
- Accept, mitigate, transfer, or avoid
- Lesson 2516 — Risk Analysis Documentation and Communication
- Recompile
- Rebuild the app with your modifications
- Lesson 2731 — Repackaging and Code Injection Attacks
- Reconnaissance
- Can you detect scanning or probing attempts?
- Lesson 74 — Kill Chain Threat ModelingLesson 561 — Bluetooth Security Testing ToolsLesson 2178 — Tactics: The Why Behind Adversary Actions
- Reconnaissance scans
- Short-lived connections to many ports across multiple hosts
- Lesson 2410 — Network Flow Analysis
- Reconstruct the timeline
- (you've already built this during investigation)
- Lesson 2432 — Post-Incident Review and Lessons Learned
- Reconstruction
- Combine at least t shares to recover the original secret
- Lesson 321 — Secret Sharing Fundamentals
- Records proving controls operate
- (logs, tickets, approval forms)
- Lesson 2607 — ISMS Documentation Requirements
- Records the attack surface
- – Builds a complete map of URLs, parameters, and inputs
- Lesson 1371 — Crawling and Application Discovery
- Recover
- Lesson 21 — Security Frameworks: NIST Cybersecurity FrameworkLesson 2610 — NIST Cybersecurity Framework (CSF)
- Recovery approaches
- Lesson 2407 — Anti-Forensics Detection and Encrypted Volumes
- Recovery codes
- Services provide one-time backup codes during setup.
- Lesson 743 — Authenticator Apps and Seed Management
- Recovery guidance
- Restoration procedures and validation checks
- Lesson 2372 — IR Playbooks and Runbooks
- Recovery key capture
- BitLocker keys may be escrowed to Active Directory or backed up
- Lesson 2407 — Anti-Forensics Detection and Encrypted Volumes
- recovery mechanisms
- Lesson 299 — CSPRNG State Compromise and RecoveryLesson 755 — Passwordless Security Trade-offs
- Recovery Point Objective (RPO)
- specifies acceptable data loss.
- Lesson 1333 — High Availability and Disaster Recovery
- Recovery Time Objective (RTO)
- defines how quickly you need to restore service.
- Lesson 1333 — High Availability and Disaster Recovery
- red team
- is an independent security group that simulates real-world adversaries to test an organization's detection and response capabilities.
- Lesson 2169 — Red Team Operations and ObjectivesLesson 2173 — Detection Engineering and Testing
- Red Team Planning
- Mark techniques you've successfully tested to show leadership where defenses were validated versus assumed.
- Lesson 2183 — ATT&CK Navigator and Visualization
- Red teaming
- is like hiring professional burglars to test your entire security operation—not just the locks.
- Lesson 2085 — Penetration Testing vs Red Teaming
- Redemption Logic Flaws
- Manipulating the order of operations—applying a discount before taxes versus after, or exploiting timing windows where validation occurs separately from actual discount application.
- Lesson 922 — Coupon and Discount Code Abuse
- Redirect DNS responses
- to phishing sites
- Lesson 388 — ARP Poisoning for Traffic Interception and Modification
- Redirect HTTP/HTTPS traffic
- using firewall rules (`iptables` NAT rules on Linux)
- Lesson 399 — HTTP Proxy and Transparent Interception
- Redirect URI manipulation
- (mitigated by exact matching)
- Lesson 768 — OAuth 2.0 Security Best Practices
- Redirects
- or shows an error message ("wrong password, try again")
- Lesson 640 — Phishing via XSS Injection
- Redirects and URLs
- in responses can enable SSRF attacks within your infrastructure
- Lesson 1036 — API10:2023 - Unsafe Consumption of APIs
- Redis
- , **Cassandra**, and others
- Lesson 592 — NoSQLMap and NoSQL Injection AutomationLesson 598 — NoSQL Injection in Different Database TypesLesson 791 — JWT Expiration and Revocation
- Redis/Memcached
- Dedicated in-memory data stores.
- Lesson 705 — Session Storage Mechanisms: Server-Side vs Client-Side
- Reduce linkage surface area
- Lesson 2910 — Linkage Attacks and Defenses
- Reduced attack surface
- No password hashes to steal from databases
- Lesson 755 — Passwordless Security Trade-offsLesson 1243 — Stored Procedures and Database-Side SecurityLesson 1698 — Identity Federation and Single Sign-OnLesson 1838 — Transit Gateway ArchitectureLesson 1846 — VPC/VNet Service Endpoints Fundamentals
- Reduced audit fatigue
- one set of evidence serves multiple assessments
- Lesson 2617 — Framework Mapping and Harmonization
- Reduced False Positives
- By correlating multiple detection methods and cloud reputation data, NGAV systems make more informed decisions, addressing the tuning challenges discussed in lesson 1571.
- Lesson 1572 — Next-Generation Antivirus (NGAV)
- Reduced forensic footprint
- Old conversations can't be recovered from seized devices
- Lesson 2956 — Disappearing Messages and Perfect Forward Secrecy
- Reduced handshake
- 1-RTT (round-trip time) instead of 2-RTT, cutting connection setup latency in half.
- Lesson 2795 — DTLS and TLS 1.3 for IoT
- Reduced mean-time-to-detect
- through cross-source correlation
- Lesson 1582 — EDR Integration with SIEM and SOAR
- Reduces attack surface
- fewer entry points mean fewer vulnerabilities
- Lesson 29 — Security Choke PointsLesson 2627 — Principle of Least Privilege
- Reduces permission sprawl
- Without groups, admins often grant users direct permissions "just to get things done," creating a messy, insecure configuration over time
- Lesson 1428 — Group Management and Role Separation
- Reduces scope
- Only systems in the CDE need the strictest controls
- Lesson 453 — Segmentation for Compliance
- Reducing packet rate
- to match typical network behavior
- Lesson 368 — Timing and Rate Limiting for Evasion
- Redundancy
- means having backup security controls—if one fails, another catches the threat.
- Lesson 28 — Redundancy and Diversity in SecurityLesson 425 — High Availability and Clustering
- Redundancy and Resilience
- Are single points of failure eliminated through backup systems, load balancing, and geographic distribution?
- Lesson 2593 — Availability Criterion
- Refactor away
- Rewrite functionality using safer, maintained dependencies
- Lesson 1267 — Unmaintained Dependencies and End-of-Life Libraries
- Referer can be missing
- Users/browsers may suppress it for privacy
- Lesson 869 — Origin and Referer Validation
- Referral programs
- Automated abuse of reward systems
- Lesson 1032 — API6:2023 - Unrestricted Access to Sensitive Business Flows
- Referrer checks
- validate the `Referer` HTTP header to ensure requests originate from your legitimate web pages, not hotlinked from external sites.
- Lesson 1866 — CDN Access Control and Token Authentication
- Refine your scan configuration
- by improving authentication handling, adjusting crawler scope, and fine-tuning detection rules based on your application's specific behavior.
- Lesson 1375 — False Positive Management in DAST
- Reflected XSS
- (where the attack happens immediately and affects only one victim), **Stored XSS** (also called Persistent XSS) occurs when an attacker's malicious script gets **saved** into a web application's database, file system, or other storage.
- Lesson 631 — Stored XSS: Persistent Attacks
- Reflecting any origin
- Server echoes the request's `Origin` header back, trusting everyone
- Lesson 874 — CORS Fundamentals and Same-Origin Policy Relaxation
- Refresh package lists
- Lesson 2189 — Updating and Managing Kali Packages
- Refresh Token Grant
- lets you exchange a long-lived refresh token for new access tokens without re-authenticating the user.
- Lesson 757 — OAuth 2.0 Grant Types
- refresh token rotation
- each time you use a refresh token, the server issues a *new* refresh token and invalidates the old one, limiting replay attack windows.
- Lesson 760 — OAuth 2.0 Tokens: Access and RefreshLesson 1093 — Cross-Origin Authentication and iframe Security
- Refresh tokens
- are longer-lived credentials (days to months) used solely to request new access tokens.
- Lesson 760 — OAuth 2.0 Tokens: Access and Refresh
- Refund manipulation
- Request refunds that underflow balance checks, granting undeserved credits.
- Lesson 926 — Integer Overflow in Financial Calculations
- Refund Process Abuse
- An attacker purchases an item, receives it, then exploits a flaw to obtain a refund *without* returning the product.
- Lesson 925 — Refund and Credit Manipulation
- Regional Evidence Collection
- Ensure your forensic tools can operate across regions.
- Lesson 1912 — Multi-Account and Cross-Region IR
- Regional Internet Registries (RIRs)
- track who owns what:
- Lesson 336 — ASN and IP Range Discovery via Public Sources
- Regional redundancy
- Peer VPCs in different regions for disaster recovery architectures
- Lesson 1836 — VPC Peering Fundamentals
- Registrant information
- Organization name, contact email, phone (often privacy-protected now, but not always)
- Lesson 329 — WHOIS and Domain Registration Intelligence
- Registrar details
- Which company manages the domain registration
- Lesson 329 — WHOIS and Domain Registration Intelligence
- Registration
- You commit to your password using cryptographic techniques (like a hash or more complex commitment)
- Lesson 247 — ZKP Applications in AuthenticationLesson 744 — Hardware Security Keys and FIDO U2FLesson 745 — FIDO2 and WebAuthnLesson 751 — WebAuthn and FIDO2 Protocol
- Registration dates
- When the domain was created, updated, and expires
- Lesson 329 — WHOIS and Domain Registration Intelligence
- Registry
- Windows stores password hashes in the SAM (Security Account Manager) database and cached domain credentials.
- Lesson 2157 — Credential Harvesting for PivotingLesson 3029 — Container Image Scanning
- Registry Auto-Run Keys
- Keys like `HKLM\Software\Microsoft\Windows\CurrentVersion\Run` specify programs to launch at startup.
- Lesson 2134 — Scheduled Tasks and Startup Persistence Exploitation
- Registry Changes
- – Windows registry key and value modifications, crucial for detecting persistence mechanisms you learned about (scheduled tasks, startup entries, service modifications).
- Lesson 1575 — EDR Data Collection and Telemetry
- Registry Hives in Memory
- Major hives (SYSTEM, SOFTWARE, SAM, NTUSER.
- Lesson 2396 — Registry and File System in Memory
- Registry Key Hijacking
- If a service reads configuration from a registry key with weak permissions, you can modify values like `ImagePath` (the executable the service runs) to point to your malicious binary.
- Lesson 2133 — Registry and File System Permission Weaknesses
- Registry keys
- associated with specific malware families
- Lesson 1580 — EDR Detection Rules and Custom IndicatorsLesson 2415 — Network-Based IOC Extraction
- Registry modifications
- on Windows systems enable persistence through Run keys (`HKLM\Software\Microsoft\Windows\CurrentVersion\Run`), which execute programs at user login, or more subtle entries like COM hijacking that trigger on specific system events.
- Lesson 2118 — Maintaining Access and Persistence Mechanisms
- Registry Storage
- – Images pushed to public or private registries.
- Lesson 1642 — Container Image Supply Chain Overview
- Registry-integrated scanning
- embeds vulnerability detection directly into your container registry workflow.
- Lesson 1636 — Registry-Integrated Scanning
- RegistryEvent (Event IDs 12-14)
- Tracks registry key and value creation, deletion, and modification.
- Lesson 1514 — Sysmon File and Registry Activity Monitoring
- Rego language
- to define rules that can automatically validate cloud resources against your compliance requirements.
- Lesson 1991 — Compliance as Code with Open Policy Agent
- Regression fuzzing
- replays known crash-inducing inputs to ensure fixes stay fixed.
- Lesson 3014 — Automated Fuzzing in CI/CD
- Regression Testing
- Maintain a suite of tests that run automatically whenever policies change.
- Lesson 3024 — Policy Testing and Validation
- Regular Auditing
- Monitor registered service workers and unregister suspicious ones.
- Lesson 1082 — Service Worker Registration and Hijacking
- Regular backups
- create point-in-time snapshots of your encrypted secret data.
- Lesson 1333 — High Availability and Disaster Recovery
- Regular credential rotation
- and audit logging
- Lesson 2436 — Authenticated Scanning and Credentialed Checks
- Regular review
- Evidence that logs are actively monitored
- Lesson 1490 — Log Management for ComplianceLesson 1706 — Least Privilege Principle in Cloud IAM
- Regular Updates
- Keep WAF signatures current and monitor emerging bypass techniques from threat intelligence feeds.
- Lesson 1855 — WAF Evasion Techniques and Defense
- Regulatory and Compliance Needs
- What laws, standards, or frameworks apply?
- Lesson 2028 — Security Requirements Elicitation
- Regulatory and compliance requirements
- Many frameworks (GDPR, HIPAA, PCI DSS) mandate encryption at rest to protect sensitive information.
- Lesson 1763 — Understanding Encryption at Rest Fundamentals
- Regulatory compliance
- Some standards mandate specific algorithms (often SHA-256 or SHA-512)
- Lesson 216 — Hash Function Selection in Modern SystemsLesson 1718 — Service Control Policies and Organizational ControlsLesson 1768 — Hardware Security Modules (HSMs) in CloudLesson 1815 — Network Isolation with Dedicated TenancyLesson 2926 — Zero-Knowledge Proofs for Privacy
- Regulatory consequences
- Compliance violations, penalties
- Lesson 2501 — Asset Identification and Valuation
- Regulatory Disclosures
- follow strict formats and timelines.
- Lesson 2428 — External Communication and Disclosure
- Regulatory reporting windows
- Lesson 2095 — Testing Windows and Schedules
- Regulatory requirement updates
- Lesson 82 — Threat Model Reviews and Updates
- Regulatory requirements
- demand provable access control (defense, healthcare)
- Lesson 1450 — MAC vs DAC: Fundamental DifferencesLesson 2519 — Risk Mitigation and Control SelectionLesson 2888 — PIA Triggers and ScopingLesson 2892 — Mitigation Strategies and Controls
- Regulatory trigger
- (breach notification thresholds)
- Lesson 2361 — Incident vs Event: Defining the Threshold
- Reject
- Actively sends an error response (TCP RST or ICMP unreachable) back to the sender.
- Lesson 462 — IPS Blocking Actions and ResponseLesson 1211 — Never Trust User Input
- Reject Mismatched Content-Types
- Lesson 984 — Content-Type and MIME Type Enforcement
- Reject mismatches
- when header and content disagree
- Lesson 956 — Content-Type Header Validation and Mismatches
- Rejected connections
- A spike in rejected traffic to specific ports may indicate port scanning or brute-force attempts.
- Lesson 1872 — VPC Flow Logs and Network Monitoring
- Rejecting
- means refusing to process invalid input at all.
- Lesson 1155 — Rejecting vs Sanitizing Invalid Input
- Rekall
- , or **Magnet RAM Capture** reconstruct the true system state by parsing raw memory structures independently of the OS's APIs—APIs the rootkit has compromised.
- Lesson 1559 — Memory Analysis and Volatile Forensics
- Rekeying
- Periodic regeneration of encryption keys for forward secrecy
- Lesson 487 — OpenVPN Cryptographic Configuration
- RELATED
- A new connection, but linked to an existing one (like FTP data transfers spawned from a control connection)
- Lesson 440 — Stateful Firewall with Connection Tracking
- Related-key attacks
- Using similar keys can reveal patterns
- Lesson 116 — RC4: Design, Vulnerabilities, and Deprecation
- Relational access
- Posts, comments, attachments—check the entire chain
- Lesson 842 — Resource-Level Permission Checks
- Relationship Hijacking
- Lesson 929 — Mass Assignment Attack Vectors
- Relationship rules
- Is the end date after the start date?
- Lesson 1154 — Semantic and Business Logic Validation
- Relationship-Based Access Control (ReBAC)
- determines whether a user can access a resource based on their relationship to that resource or its owner.
- Lesson 800 — Relationship-Based Access Control (ReBAC)
- Relationships
- "friend of," "member of," "owner of," "parent of"
- Lesson 800 — Relationship-Based Access Control (ReBAC)Lesson 1279 — SBOM Contents and Metadata QualityLesson 2974 — What is Metadata and Why It Matters
- Relay Attacks
- Sophisticated attackers use one device near a legitimate badge (in someone's pocket) and relay the signal in real-time to a second device at a secured door, extending the effective range.
- Lesson 2274 — Badge Cloning and RFID AttacksLesson 2280 — Badge and Card-Based Access Systems
- Release cycles
- (quarterly or per-release security reviews)
- Lesson 2070 — Security Retrospectives and Continuous Improvement
- Relevance Assessment
- Not every threat matters to you.
- Lesson 2343 — Threat Intelligence Analysis and Reporting
- Relevant
- – The metric must tie to actual security or business goals.
- Lesson 2526 — Designing Effective Security MetricsLesson 2546 — Evidence Collection and Documentation
- Reliability
- Works even if OCSP responder is temporarily down
- Lesson 193 — OCSP Stapling and Must-StapleLesson 339 — TCP Connect Scanning
- Reliable
- (methods are repeatable and defensible)
- Lesson 2379 — Evidence Collection Principles and Legal ConsiderationsLesson 2546 — Evidence Collection and Documentation
- Reliable detection
- of time-based attack patterns (like failed login sequences)
- Lesson 1473 — Log Timestamp Synchronization
- Religious or philosophical beliefs
- Lesson 2552 — Personal Data and Special Categories
- Relying Party (RP)
- application you've logged into
- Lesson 775 — OIDC Session Management and Single Logout
- Remediate
- – Restore compromised files or rebuild if deeply infected
- Lesson 1504 — FIM Alert Analysis and ResponseLesson 2623 — Compliance as Code
- Remediation
- Implement least-privilege access, enable object encryption if not already active, and configure bucket-level monitoring and alerting for future anomalies.
- Lesson 1909 — Cloud Storage and Data Breach Response
- Remediation actions
- that automatically fix issues or escalate to humans
- Lesson 2002 — Tag Governance and Remediation Workflows
- Remediation Capabilities
- Automated fixes are powerful but risky.
- Lesson 2011 — CSPM Vendor Selection and Deployment
- Remediation cost
- Can you simply update, or does it break compatibility?
- Lesson 1274 — Interpreting SCA Results
- Remediation Failures
- Automated fixes may unknowingly overwrite legitimate manual changes, or worse, legitimate IaC deployments may overwrite critical manual security patches.
- Lesson 2022 — Infrastructure Drift: Causes and Risks
- Remediation flows
- Guiding users to fix compliance issues
- Lesson 2678 — Device Trust and Endpoint Security
- Remediation Guidance
- Lesson 1615 — Vulnerability Scan ReportingLesson 3028 — Dependency Scanning and SCA
- Remediation Phase
- Lesson 1752 — IAM Access Advisor and Remediation Workflows
- Remediation Recommendations
- Lesson 2075 — Writing Effective Vulnerability Reports
- Remediation tracking
- ensures that the corrective actions you recommended actually get done—and done properly.
- Lesson 2550 — Remediation Tracking and Follow-upLesson 2625 — Remediation Tracking and Reporting
- Remediation Trends
- Lesson 3038 — Vulnerability Management Dashboards
- Remediation velocity
- average time-to-close by severity
- Lesson 2625 — Remediation Tracking and Reporting
- Remediation Workflows
- automatically correct violations when safe to do so.
- Lesson 1992 — Continuous Compliance Monitoring
- Remember-Me Abuse
- Lesson 748 — MFA Bypass Attacks and Weaknesses
- Remote Access Trojan (RAT)
- is malware specifically designed to provide this backdoor functionality.
- Lesson 1524 — Backdoors and Remote Access Trojans (RATs)
- Remote Access Trojans (RATs)
- Open backdoors allowing attackers full system control
- Lesson 1521 — Trojans: Deceptive Functionality
- Remote administration
- Accessing internal management interfaces from outside networks
- Lesson 499 — SSH Tunneling Fundamentals
- remote attestation
- proving to a verifier that your device is in a known-good state.
- Lesson 2771 — Hardware Root of Trust and TPMLesson 2927 — Trusted Execution Environments
- remote code execution
- .
- Lesson 589 — SQLMap Advanced Exploitation FeaturesLesson 974 — ZIP Slip and Archive Extraction AttacksLesson 1193 — Prototype Pollution Fundamentals
- Remote Code Execution (RCE)
- Lesson 1196 — Server-Side Prototype Pollution ImpactLesson 1534 — Exploitation of Software Vulnerabilities
- Remote Desktop Protocol (RDP)
- allows attackers to establish full graphical sessions on remote machines.
- Lesson 2156 — RDP and GUI-Based Lateral Movement
- Remote lock
- disables a device immediately, buying time when it's misplaced.
- Lesson 2748 — Remote Wipe and Device Lifecycle
- Remote Port Forwarding
- (`-R`) redirects traffic from a port on the remote SSH server back to your local machine or another destination.
- Lesson 499 — SSH Tunneling FundamentalsLesson 501 — Remote Port Forwarding (-R)
- Remote termination
- lets users view all active sessions and invalidate specific ones—like a "sign out all other devices" button.
- Lesson 710 — Concurrent Sessions and Device Management
- Remote wipe
- goes further, erasing all corporate data or performing a complete factory reset depending on your policy.
- Lesson 2748 — Remote Wipe and Device Lifecycle
- Remove complexity mandates
- that force special characters
- Lesson 695 — Password Length vs Complexity Trade-offs
- Remove compromised roots
- when CAs are breached or misbehave
- Lesson 182 — Trust Anchors and Root Certificate Stores
- Remove dead rules
- Delete entries for decommissioned systems or expired projects
- Lesson 435 — Rule Review and Maintenance
- Remove Default Credentials
- Lesson 1924 — Instance Launch Security and AMI Hardening
- Remove host allowlists entirely
- they're legacy and weaker
- Lesson 667 — Strict CSP and Modern Best Practices
- Remove null bytes
- and other terminator tricks
- Lesson 1166 — Defense: Canonical Form Validation Strategies
- Remove or replace
- Delete direct identifier columns entirely, or replace values with pseudonyms (covered separately in pseudonymization)
- Lesson 2903 — Direct Identifiers and Removal
- Remove unused dependencies
- Every line of third-party code you don't need is risk you don't need
- Lesson 1945 — Third-Party Dependencies in Functions
- Repackaging
- is the practice of taking an existing mobile app, decompiling it, modifying its code, then recompiling and re-signing it with a new certificate.
- Lesson 2731 — Repackaging and Code Injection Attacks
- Repeat
- until you reach a certificate in your trust anchor store
- Lesson 183 — Path Building and DiscoveryLesson 1520 — Worms: Autonomous Network PropagationLesson 2847 — Adversarial Training
- Repeat many times
- One lucky guess is 50/50, but 20 correct answers means less than 1-in-a-million chance of faking it.
- Lesson 243 — The Graph Isomorphism Example
- Repeated failures
- A user hitting authorization blocks repeatedly may be probing boundaries
- Lesson 844 — Authorization Logging and Monitoring
- Repeated participation
- enables membership inference — attackers detect if specific data was in your local training set
- Lesson 2843 — Federated Learning Privacy
- Repeater
- lets you manually modify and resend individual requests.
- Lesson 2205 — Burp Suite Architecture and Components
- replace
- JavaScript global variables.
- Lesson 679 — DOM Clobbering AttacksLesson 2874 — Model Artifact Security and Signing
- Replace components
- to bypass security features or inject malicious hardware
- Lesson 2755 — Physical Security Threats to IoT Devices
- Replace downloaded files
- with backdoored versions
- Lesson 388 — ARP Poisoning for Traffic Interception and Modification
- Replace with maintained alternatives
- Research actively-supported libraries with similar functionality
- Lesson 1267 — Unmaintained Dependencies and End-of-Life Libraries
- Replacement projects
- Community has migrated to alternatives
- Lesson 1267 — Unmaintained Dependencies and End-of-Life Libraries
- Replay
- Minutes, hours, or days later, the attacker sends HTTP requests with the stolen token
- Lesson 718 — Session Replay Attacks
- Replay attacks
- An attacker can resend valid old messages
- Lesson 130 — AEAD Security Properties and LimitationsLesson 918 — Workflow Reversal and Replay AttacksLesson 2787 — BACnet and Modbus Protocol SecurityLesson 2788 — Protocol-Level Attacks and Reconnaissance
- Replay protection
- Including timestamps or nonces prevents reusing old tags
- Lesson 221 — HMAC in Authentication Protocols
- Replay the session
- by injecting those cookies into your own browser or crafting requests with the stolen tokens
- Lesson 400 — Session Hijacking via MITM
- Replay-resistant
- Old codes become invalid immediately
- Lesson 740 — TOTP and Time-Based One-Time Passwords
- Replication
- creates multiple synchronized copies of your secret store across different servers or regions.
- Lesson 1333 — High Availability and Disaster RecoveryLesson 1520 — Worms: Autonomous Network PropagationLesson 2777 — Hardware Cloning and Counterfeit Prevention
- Report
- Identifies vulnerable versions with severity ratings
- Lesson 2048 — Dependency Scanning in Build PipelinesLesson 2623 — Compliance as Code
- Report Confidence
- How reliable is the vulnerability report?
- Lesson 2445 — CVSS Temporal and Environmental Metrics
- Report findings
- with severity scores, affected versions, and remediation guidance
- Lesson 3011 — Software Composition Analysis (SCA) Automation
- Report it immediately
- through proper channels (security contact, bug bounty platform)
- Lesson 2078 — Legal and Ethical Considerations
- Reporting
- You get a list of all licenses, flagged violations, and risk assessments
- Lesson 1307 — License Compliance ScanningLesson 1621 — Compliance Scanning and ValidationLesson 2085 — Penetration Testing vs Red TeamingLesson 2434 — Vulnerability Scanning FundamentalsLesson 2461 — Patch Compliance Monitoring and ReportingLesson 3010 — Dynamic Application Security Testing (DAST) Deep Dive
- Reporting addresses
- Where to send aggregate (`rua`) and forensic (`ruf`) reports
- Lesson 2301 — DMARC (Domain-based Message Authentication) Policy
- Reporting and compliance tracking
- to verify successful installation
- Lesson 2457 — Automated Patch Deployment Tools
- Reporting dimensions
- Lesson 2461 — Patch Compliance Monitoring and Reporting
- Reporting Tools
- Documentation and evidence gathering
- Lesson 2188 — Kali Tool Categories and Organization
- Reports findings
- with severity ratings and remediation advice
- Lesson 1305 — Trivy for Container and Dependency ScanningLesson 1368 — DAST Fundamentals and Runtime TestingLesson 1399 — Dependency and SCA Scanning in PipelinesLesson 3028 — Dependency Scanning and SCA
- Repository compromise
- attackers can't forge signatures without the private key
- Lesson 1294 — Package Signing and GPG Verification
- Repository scanning
- Tools like GitGuardian, TruffleHog, or GitHub's secret scanning analyze commit history
- Lesson 2013 — Secrets in IaC: Detection and Prevention
- Representative systems
- Same OS versions, application stacks, and configurations as production
- Lesson 2455 — Patch Testing and Staging Environments
- Reproduce manually
- – Can you trigger the vulnerability yourself using Repeater?
- Lesson 2213 — Scanner Issue Analysis and Validation
- Reproduce the finding
- – Can you verify the vulnerability exists using manual testing or alternative tools?
- Lesson 1614 — False Positive Management
- Reproducibility
- How easy is it to repeat the attack?
- Lesson 72 — DREAD Risk Rating ModelLesson 1412 — Baseline Security ConfigurationLesson 2082 — Penetration Testing MethodologiesLesson 2087 — Documentation and Note-Taking
- Reproducibility breaks
- Your colleague's build might differ from yours
- Lesson 1280 — Dependency Resolution and Lock Files
- Reproducible
- Anyone following your steps gets the same result
- Lesson 2163 — Proof of Concept Development
- Reproducible builds
- ensure that compiling the same source code always produces *byte-for-byte identical* binaries, no matter who builds it, when, or where.
- Lesson 1299 — Reproducible Builds
- Reproducible Steps
- Lesson 2075 — Writing Effective Vulnerability Reports
- repudiation
- means denying responsibility for an action.
- Lesson 58 — Repudiation ThreatsLesson 61 — Elevation of Privilege ThreatsLesson 62 — STRIDE per Element AnalysisLesson 66 — STRIDE Mitigations and ControlsLesson 2640 — Applying STRIDE at Architecture Level
- Reputation boost
- showing commitment to security transparency
- Lesson 2479 — Bug Bounty Fundamentals and Models
- Request
- A principal (user, service, or federated identity) calls `AssumeRole` targeting a specific IAM role ARN
- Lesson 1730 — AWS STS and AssumeRole Mechanics
- Request and approval workflow
- Changes require documented justification, risk assessment, and authorization from appropriate stakeholders
- Lesson 2493 — Change Management and Configuration Control Policy
- Request authentication tokens
- or reference numbers through the official channel that can be confirmed in the suspicious message.
- Lesson 2294 — Vendor and Third-Party Communication Security
- Request Body Parameters
- In POST requests, attackers can modify JSON or form data fields like `{"document_id": 789}` to try different values.
- Lesson 816 — Parameter Tampering in IDOR Attacks
- Request contains
- The certificate serial number and issuer information
- Lesson 192 — Online Certificate Status Protocol (OCSP)
- Request Fragmentation
- Lesson 1855 — WAF Evasion Techniques and Defense
- Request patterns
- Bots often make unnaturally rapid, repetitive requests
- Lesson 1859 — Bot Management and Detection
- Request rate
- Requests per second (lower for production)
- Lesson 1374 — DAST Configuration and Scope Management
- Request signature validation
- to ensure API calls haven't been tampered with
- Lesson 1867 — CDN WAF Integration and Edge Security
- Request workflow
- Users request specific permissions with business justification
- Lesson 2677 — Least Privilege Access in Zero Trust
- Request-based
- Maximum 100 queries per minute per API key
- Lesson 1002 — Query Cost Analysis and Rate Limiting
- RequestReceived
- The API server received the request
- Lesson 1975 — Kubernetes Audit Logging and Monitoring
- require
- SCTs for certificates to be trusted.
- Lesson 195 — Certificate Transparency VerificationLesson 1754 — Permission Boundary Bypass Techniques
- Require explicit confirmation
- use a full round-trip for sensitive operations
- Lesson 1103 — HTTP/3 0-RTT Replay Attacks
- Require passwords
- unless there's a strong operational reason.
- Lesson 1426 — Sudo Configuration and Security
- Required tags are present
- – Does this EC2 instance have `Environment`, `Owner`, and `CostCenter` tags?
- Lesson 1999 — Automated Tag Enforcement and Validation
- Requirement 10
- mandates comprehensive logging and monitoring of all access to cardholder data.
- Lesson 2578 — Requirements 9-10: Physical and Logical Access Logging
- Requirement 6: Secure Development
- acknowledges that applications handling cardholder data are frequent targets.
- Lesson 2576 — Requirement 6: Secure Development
- Requirement 9
- restricts physical access to cardholder data environments.
- Lesson 2578 — Requirements 9-10: Physical and Logical Access Logging
- requirements phase
- means you identify security needs, constraints, and potential threats *before* you've committed to an architecture or written a single line of code.
- Lesson 77 — Threat Modeling in Requirements PhaseLesson 2732 — Secure Mobile Development Lifecycle
- Research-Driven Credibility
- Lesson 2266 — Building Trust and Establishing Rapport
- Researcher community
- Vetted security professionals with track records
- Lesson 2071 — Introduction to Bug Bounty Programs
- Researcher credit
- – acknowledging discoverers appropriately
- Lesson 2476 — CVE Assignment and Public Disclosure
- Researcher retention
- Consistent contributors may earn loyalty bonuses
- Lesson 2482 — Bounty Pricing and Reward Structures
- Reseeding
- is periodically adding fresh water from an unpredictable source.
- Lesson 291 — PRNG State and ReseedingLesson 295 — Entropy Pool Management
- Reservation systems
- Hotel rooms, rental cars, or appointment slots
- Lesson 904 — Concurrency Issues in Inventory and Resource AllocationLesson 1032 — API6:2023 - Unrestricted Access to Sensitive Business Flows
- Reserve space
- Document and reserve CIDR blocks for future VPCs, regions, or environments (dev, staging, prod).
- Lesson 1810 — VPC IP Addressing and CIDR Planning
- Reserved concurrency
- dedicates a specific number of concurrent executions exclusively to one function.
- Lesson 1956 — Concurrency Controls and Throttling
- Resident keys
- (also called discoverable credentials) store user information on the authenticator itself, enabling passwordless login without entering a username.
- Lesson 745 — FIDO2 and WebAuthn
- Residual risk
- the security exposure that persists despite remediation efforts
- Lesson 2166 — Retest and Validation ProcessLesson 2505 — Inherent vs Residual RiskLesson 2893 — PIA Documentation and Review
- Residual risk level
- – Critical/high risks first (from your risk matrix)
- Lesson 2523 — Risk Treatment Plans and Prioritization
- Residual risk management
- is the ongoing process of monitoring these changes and reassessing whether your residual risk remains within acceptable tolerance levels.
- Lesson 2524 — Residual Risk Management
- Residual risk tracking
- Document what risk remains after controls are applied
- Lesson 2519 — Risk Mitigation and Control Selection
- Residual Risk Trend
- Monitor residual risk after controls are applied.
- Lesson 2532 — Risk Posture and Trending Metrics
- Resistance to known attacks
- Immune to differential and linear cryptanalysis that weakened DES
- Lesson 89 — AES: Rijndael Selection and Design
- Resistance to verification
- Pushback when you suggest calling them back or confirming independently
- Lesson 2270 — Detecting and Resisting Manipulation Attempts
- Resistant to dictionary/brute-force attacks
- No password to guess
- Lesson 542 — EAP-TLS and Certificate-Based Authentication
- Resolvable Private Addresses (RPA)
- are the clever solution for bonded devices.
- Lesson 557 — BLE Privacy and Address Randomization
- Resolver Paths
- Error messages showing which resolver failed expose your API's internal organization and business logic.
- Lesson 1007 — GraphQL Error Handling and Information Leakage
- Resource
- The exact cloud resources the actions apply to, identified by ARN (Amazon Resource Name) or similar identifiers.
- Lesson 1703 — Policy Structure and Syntax FundamentalsLesson 1713 — Policy Structure: Elements, Syntax, and Evaluation LogicLesson 1951 — Function Execution Role Design
- Resource abuse
- One app cannot directly interfere with another's memory or CPU usage
- Lesson 2713 — Android Application Sandboxing
- Resource access control failures
- emerge when functions rely solely on execution roles (which they *always* have) but skip application-level checks.
- Lesson 1964 — Broken Access Control in Functions
- Resource attributes
- Properties of what's being accessed (document_classification=confidential, owner=HR, created_date=2024)
- Lesson 20 — Attribute-Based Access Control (ABAC)Lesson 799 — Attribute-Based Access Control (ABAC)
- Resource constraints
- Limited visibility into encrypted communications or certain memory regions
- Lesson 1581 — EDR Evasion TechniquesLesson 2523 — Risk Treatment Plans and PrioritizationLesson 2750 — IoT Attack Surface and Unique Challenges
- Resource consumption
- Agents consume CPU, memory, and network bandwidth.
- Lesson 2437 — Agent-Based Scanning
- Resource Development
- Establish infrastructure and capabilities
- Lesson 2178 — Tactics: The Why Behind Adversary Actions
- Resource directives
- control where different content types can load from:
- Lesson 658 — CSP Directives and Syntax
- Resource enumeration
- Lesson 1949 — Serverless Cold Start and Timing Side Channels
- Resource Exhaustion
- Lesson 60 — Denial of Service ThreatsLesson 976 — PDF Processing VulnerabilitiesLesson 1079 — Storage Quota and Eviction PoliciesLesson 1100 — HTTP/2 Server Push Security RisksLesson 1923 — Cloud VM Threat Model and Attack SurfaceLesson 1956 — Concurrency Controls and Throttling
- Resource launches
- in unexpected regions (often cryptomining instances)
- Lesson 1907 — Cloud Account Compromise Response
- Resource lifecycle management
- Automate cleanup of temporary resources (`ExpirationDate=2024-12-31`)
- Lesson 1996 — Cloud Resource Tagging Strategy and Standards
- Resource Limits
- prevent denial-of-service attacks.
- Lesson 981 — Safe File Processing PracticesLesson 1156 — Validation Error HandlingLesson 1192 — Detecting and Preventing Deserialization AttacksLesson 1374 — DAST Configuration and Scope Management
- Resource logs
- track what happens *within* your resources—load balancer access patterns, database queries, or Lambda function executions.
- Lesson 1870 — Log Sources and Data Ingestion
- Resource Pool Management
- controls how aggressively Intruder operates—limiting concurrent requests prevents overwhelming the target or triggering rate limits, crucial when chaining requests that depend on previous responses.
- Lesson 2211 — Advanced Intruder Techniques and Grep Extraction
- Resource pooling
- Database connections, API rate limits, license seats
- Lesson 904 — Concurrency Issues in Inventory and Resource Allocation
- Resource Restrictions
- File upload limits enforced only in JavaScript can be bypassed by submitting requests directly, uploading files far exceeding the stated limit.
- Lesson 941 — Testing Limits and Constraints
- Resource sensitivity
- Drift in production databases versus development sandboxes
- Lesson 2027 — Drift Reporting and Exception Management
- Resource Server
- Lesson 756 — OAuth 2.0 Overview and Roles
- Resource states
- (Editing a published document vs.
- Lesson 812 — Context-Dependent Authorization Failures
- Resource tags
- Does this S3 bucket have `Environment=Production`?
- Lesson 1998 — Tag-Based Access Control and Policy Enforcement
- Resource type
- EC2 alerts to infrastructure team, IAM alerts to identity team
- Lesson 1903 — Alert Routing and Escalation WorkflowsLesson 2005 — Cloud Asset Discovery and Inventory
- Resource usage
- An EC2 instance that usually runs at 30% CPU spikes to 95% while making network connections to unknown IPs
- Lesson 1890 — Behavioral Analytics and Anomaly DetectionLesson 1899 — Machine Learning for Cloud Anomaly Detection
- Resource utilization metrics
- (CPU, memory, storage trends)
- Lesson 1897 — Baseline Establishment for Cloud Resources
- Resource-based policies
- attach directly to resources (like storage buckets, databases, or functions).
- Lesson 1704 — Identity-Based vs Resource-Based PoliciesLesson 1716 — Resource-Based vs Identity-Based PoliciesLesson 1740 — Resource-Based Policies for Cross-AccountLesson 1749 — Access Analyzer and Unused Access DetectionLesson 1782 — S3 Bucket Security Fundamentals
- Resource-Specific Authorization
- Rather than network access, the broker grants access only to the specific application or service requested
- Lesson 2690 — Zero Trust Network Access (ZTNA) Solutions
- Resources
- Public items, user's own items, other users' items
- Lesson 1026 — Authorization Testing AutomationLesson 1664 — Role-Based Access Control (RBAC) Fundamentals
- Respect CSP
- Server push must honor Content Security Policy directives
- Lesson 1100 — HTTP/2 Server Push Security Risks
- Respect data privacy laws
- If you discover personal data, handle it appropriately under GDPR, CCPA, or relevant regulations
- Lesson 2084 — Legal and Ethical Considerations
- Respect for User Privacy
- User-centric, keeping interests paramount
- Lesson 2879 — Introduction to Privacy by Design
- Respect Their Expertise
- Lesson 2167 — Communicating with Development Teams
- Respond
- Lesson 21 — Security Frameworks: NIST Cybersecurity FrameworkLesson 2610 — NIST Cybersecurity Framework (CSF)
- Respond promptly and respectfully
- to all submissions, even duplicates or out-of-scope reports.
- Lesson 2484 — Managing Researcher Relationships
- Respond rapidly
- to contain and remediate incidents
- Lesson 2305 — What is a Security Operations Center (SOC)?
- Responder
- is a tool that listens for LLMNR and NBT-NS queries, then responds claiming to be the requested resource.
- Lesson 2237 — Responder and LLMNR/NBT-NS Poisoning
- Responder replies
- Status is `good`, `revoked`, or `unknown`
- Lesson 192 — Online Certificate Status Protocol (OCSP)
- Response
- STS returns these credentials with an expiration timestamp (default 1 hour, configurable up to 12 hours)
- Lesson 1730 — AWS STS and AssumeRole MechanicsLesson 2325 — Introduction to SOAR Platforms
- Response actions
- Enable DDoS protection services, activate additional rate limiting rules, expand bot management (1859)
- Lesson 1861 — DDoS Response and Incident Management
- Response Analysis
- Lesson 893 — Testing for SSRF VulnerabilitiesLesson 3010 — Dynamic Application Security Testing (DAST) Deep Dive
- Response Capabilities
- Lesson 1574 — EDR Fundamentals and Architecture
- Response codes
- What came back (or if it failed)
- Lesson 900 — Monitoring and Detection of SSRF Attempts
- Response expectations
- Timeline for acknowledgment and typical remediation windows
- Lesson 2472 — Creating and Publishing a VDP
- Response fingerprinting
- Analyzing timing, error messages, or behavior patterns unique to specific versions
- Lesson 344 — Service Version Detection
- Response is signed
- The CA signs responses to prevent tampering
- Lesson 192 — Online Certificate Status Protocol (OCSP)
- Response Patterns
- Applications respond differently to malformed requests, specific URL patterns, or HTTP method combinations.
- Lesson 362 — Application-Layer Fingerprinting
- Response queue poisoning
- Send a smuggled request, then a normal one—if your normal request gets *someone else's* response, desync occurred
- Lesson 1108 — Detecting Request Smuggling Vulnerabilities
- Response strategy
- Establish a validation workflow.
- Lesson 1597 — Operational Challenges and Maintenance
- Responsible disclosure
- Follow coordinated disclosure practices for any vulnerabilities found
- Lesson 2084 — Legal and Ethical ConsiderationsLesson 2470 — Vulnerability Disclosure Models
- REST API Fuzzing
- Generate variations of HTTP requests with malformed JSON, oversized fields, type mismatches, or unexpected values.
- Lesson 1391 — API and Protocol Fuzzing
- Restrict access
- using least-privilege IAM policies (only IR teams and monitoring systems need read access)
- Lesson 1958 — Dead Letter Queues and Error Handling
- Restrict actions
- If the function only reads, grant `s3:GetObject`, not `s3:*`.
- Lesson 1950 — Least Privilege for Serverless Functions
- Restrict commands explicitly
- Instead of granting broad access like `ALL=(ALL) ALL`, specify exactly which commands a user needs:
- Lesson 1426 — Sudo Configuration and Security
- Restrict exported components
- Only expose components (Activities, Services, Broadcast Receivers) that truly need external access
- Lesson 2738 — Input Validation and IPC Security
- Restrict kubelet API access
- Use network policies or firewalls to limit which IPs can reach port 10250
- Lesson 1671 — Kubelet Security and Node Hardening
- Restrict Permissions
- Lesson 513 — VPN Client Security Hardening
- Restrict public bucket policies
- – Blocks policies that grant cross-account access without conditions
- Lesson 1783 — Blocking Public Access and Bucket Misconfiguration
- Restrict syscalls
- with seccomp while **confining file access** with AppArmor/SELinux
- Lesson 1661 — Container Runtime Security Best Practices
- Restricted
- Heavily locked down, suitable for security-critical workloads
- Lesson 1666 — Pod Security Standards and PoliciesLesson 1970 — Pod Security Standards and PoliciesLesson 2652 — Data Segmentation and Classification
- Restricted Admin mode
- Prevents credential caching on the target
- Lesson 2156 — RDP and GUI-Based Lateral Movement
- Restricted Zone
- Server rooms, executive offices
- Lesson 2279 — Physical Access Control Models and Zones
- Restricted/Critical
- highly sensitive data requiring maximum protection (PII, authentication secrets, intellectual property)
- Lesson 2491 — Data Classification and Handling Policy
- Restricted/Highly Confidential
- Regulated or critical data (PII, PHI, payment data, trade secrets)
- Lesson 1801 — Data Classification Fundamentals
- Result
- Alice now shares a secret with Eve (not Bob), and Bob shares a different secret with Eve (not Alice).
- Lesson 156 — Man-in-the-Middle Attacks on Diffie-HellmanLesson 956 — Content-Type Header Validation and MismatchesLesson 967 — Null Byte Injection in FilenamesLesson 1316 — Audit Trails and Secret Access LoggingLesson 1705 — Policy Evaluation Logic and PrecedenceLesson 1707 — IAM Boundaries and Permission GuardrailsLesson 2508 — Qualitative vs Quantitative Risk AnalysisLesson 2944 — Post- Compromise Security
- Resulting query executed
- Lesson 566 — Union-Based SQL Injection Technique
- Results + remediation
- Report findings with severity scores and upgrade recommendations
- Lesson 3012 — Container and Image Scanning
- Resume support
- means tracking which chunks have been successfully transferred.
- Lesson 2971 — Large File Transfer Security
- Retention
- determines how long old logs remain available.
- Lesson 1499 — Audit Log Retention and RotationLesson 1517 — Integrating Windows Logs with SIEM PlatformsLesson 2596 — Privacy Criterion and GDPR Alignment
- Retention period
- Lock objects for a fixed duration (e.
- Lesson 1787 — Object Lock and Immutable Storage
- Retention Periods
- Lesson 1484 — Log Rotation and Retention Policies
- Retention policies
- define maximum storage durations based on:
- Lesson 2897 — Temporal Data Minimization
- Retiring a legacy system
- that cannot be patched or secured, rather than compensating with complex network controls
- Lesson 2518 — Risk Avoidance Decisions
- Retransmission timers
- at the DTLS layer (since UDP doesn't retry)
- Lesson 2795 — DTLS and TLS 1.3 for IoT
- Retrieve secrets at runtime
- when your function executes
- Lesson 1946 — Secrets and Environment Variables in Functions
- Return
- The authorization server echoes it back unchanged in the callback
- Lesson 763 — State Parameter and CSRF Protection
- Return generic error messages
- to users ("An error occurred")
- Lesson 1210 — Fail Securely and Handle Errors Safely
- Return hijack
- when the function returns, CPU jumps to attacker-controlled address
- Lesson 2108 — Memory Corruption Exploits: Buffer Overflows
- Return on Investment (ROI)
- Lesson 3052 — Measuring Automation Effectiveness
- Return only what's needed
- Lesson 994 — Excessive Data Exposure in API Responses
- Return-Oriented Programming
- defeats these protections by *never injecting executable code at all*.
- Lesson 2109 — Return-Oriented Programming (ROP)
- Reusability
- lets you apply the same security standards across multiple projects
- Lesson 2056 — Security as Code Fundamentals
- Reusable Libraries
- Package common functions—payload generation, request handling, response analysis—into modules you can import across projects.
- Lesson 593 — Custom SQL Injection Automation Scripts
- reuse
- the same key by:
- Lesson 528 — KRACK Attack on WPA2Lesson 1942 — Function Execution Context and Isolation
- Reuse the assertion
- at a different time or from a different location
- Lesson 780 — SAML Response Replay and Reuse
- Reusing seeds
- Never reuse the same seed across sessions or systems—each instance must start uniquely
- Lesson 298 — CSPRNG Initialization and Seeding
- Revenue protection
- for your API business model
- Lesson 1016 — Quota Management and Tiered Access Control
- Reversal Attacks
- Lesson 918 — Workflow Reversal and Replay Attacks
- Reverse proxy/CDN cache
- Cloudflare, Fastly, Akamai—shared by all users requesting the same content
- Lesson 1115 — Web Cache Fundamentals and Architecture
- Reverse Shells
- The compromised target connects *back* to your attacker machine:
- Lesson 2236 — Netcat and Socat for Network Pivoting
- Reversibility
- | Yes (with key) | No (by design) |
- Lesson 206 — Non-Reversibility and One-Way PropertyLesson 850 — CSRF Impact and Real-World Examples
- Reversible
- `plaintext XOR keystream = ciphertext`, and `ciphertext XOR keystream = plaintext`
- Lesson 115 — Stream Cipher Fundamentals and XOR OperationsLesson 2908 — Data Masking and Tokenization
- Review bypass usage
- Every time auto-escaping is disabled should be a security checkpoint
- Lesson 1247 — Auto-Escaping Mechanisms and Configuration
- Review compensating controls
- – Maybe the vulnerability exists, but a firewall rule or network segmentation already mitigates the risk.
- Lesson 1614 — False Positive Management
- Review Date
- When this entry needs reassessment
- Lesson 2506 — Risk Register DevelopmentLesson 2521 — Risk Acceptance and Documentation
- Review last accessed data
- for a role (e.
- Lesson 1750 — Last Access Analysis and Permission Rightsizing
- Review network connections
- to identify command-and-control (C2) communications
- Lesson 2365 — Detection and Scoping Techniques
- Review new features
- against your existing threat model and DFDs
- Lesson 79 — Threat Modeling During Development
- Review participation
- Are the right people (developers, architects, security experts) involved?
- Lesson 84 — Measuring Threat Modeling Effectiveness
- Review provider attestation reports
- (SOC 2 Type II, ISO certifications)
- Lesson 1985 — Cloud Compliance Inheritance and Mapping
- Review remediation claims
- Understand what changes were made (code patches, configuration updates, WAF rules, etc.
- Lesson 2166 — Retest and Validation Process
- Review resource-based policies
- Do S3 buckets, KMS keys, or SNS topics grant cross-account access?
- Lesson 1751 — Cross-Account and External Access Analysis
- Review what changed
- – File size, permissions, ownership, or content hash?
- Lesson 1504 — FIM Alert Analysis and Response
- Reviewers miss bugs
- Security auditors can't thoroughly examine 5,000 lines of conditional logic, but they can carefully study 200 lines
- Lesson 1216 — Economy of Mechanism and Simplicity
- Revision
- – Incorporate practical concerns and ensure enforceability
- Lesson 2494 — Policy Development and Approval Process
- Revocation
- is reactive: "This certificate must stop working *right now*, even though it hasn't expired yet.
- Lesson 190 — Certificate Revocation Fundamentals
- Revocation power
- Instantly revoke access by disabling the key
- Lesson 1797 — Key Management for Database Encryption
- Revoke
- the old secret only after confirming zero usage
- Lesson 1346 — Zero-Downtime Rotation PatternsLesson 1442 — SSH Key Generation and Management
- Revoke active sessions
- invalidate temporary credentials and tokens
- Lesson 1907 — Cloud Account Compromise Response
- Revoke cross-VPC trust relationships
- (peering, Transit Gateway attachments)
- Lesson 1818 — VPC Deletion and Cleanup Security
- Revoking keys
- Add compromised keys to the forbidden signature database (dbx) to block specific signatures
- Lesson 1462 — Configuring and Managing Secure Boot
- Rex (Ruby Extension Library)
- The foundation layer that handles all low-level tasks—network sockets, protocol implementations, encodings, and SSL/TLS.
- Lesson 2193 — Metasploit Architecture and Components
- RF spectrum monitoring
- looks at the raw radio environment itself—the actual electromagnetic waves in the 2.
- Lesson 551 — RF Spectrum Monitoring
- RF triangulation
- , you can pinpoint where suspicious signals originate.
- Lesson 549 — Rogue AP Detection Techniques
- Right of Access
- Lesson 2555 — Data Subject Rights
- Right to Audit
- Reserve your ability to verify compliance through audits or assessments
- Lesson 2567 — Service Provider and Third-Party Contracts
- Right to correct
- inaccurate personal information (not just delete)
- Lesson 2568 — CPRA Amendments and Enforcement
- Right to Data Portability
- Lesson 2555 — Data Subject RightsLesson 2935 — Right to Access and Data Portability
- Right to limit use
- of sensitive data beyond what's necessary
- Lesson 2568 — CPRA Amendments and Enforcement
- Right to modify
- You can update the policy with reasonable notice
- Lesson 2478 — Legal and Safe Harbor Considerations
- Right to Object
- Lesson 2555 — Data Subject Rights
- Right to Rectification
- Lesson 2555 — Data Subject Rights
- Right-to-audit clauses
- Include provisions to assess fourth parties when risk warrants
- Lesson 2540 — Fourth-Party and Supply Chain Risk
- Rigidity
- System-wide policies, not personal choices
- Lesson 19 — Access Control Models: DAC, MAC, and RBAC
- Ring Oscillator PUFs
- Measure slight frequency differences in identical circuits
- Lesson 2777 — Hardware Cloning and Counterfeit Prevention
- Risk
- Users might grant access carelessly
- Lesson 19 — Access Control Models: DAC, MAC, and RBACLesson 277 — Migration Strategies and Crypto- AgilityLesson 2461 — Patch Compliance Monitoring and Reporting
- risk acceptance
- Lesson 1417 — Interpreting and Prioritizing STIG FindingsLesson 2517 — Risk Treatment Strategies OverviewLesson 2521 — Risk Acceptance and DocumentationLesson 3033 — Pipeline Security Gates and Policies
- risk appetite
- the maximum level of residual risk you're willing to accept.
- Lesson 2505 — Inherent vs Residual RiskLesson 2891 — Privacy Risk Assessment Methodology
- risk assessment
- (lessons 2497-2510) identified *what could go wrong*, audits verify *what you actually implemented* to prevent it.
- Lesson 2543 — Security Audit Types and ObjectivesLesson 2579 — Requirements 11-12: Testing and PolicyLesson 2588 — HIPAA Breach Notification Requirements
- Risk Avoidance
- Lesson 2517 — Risk Treatment Strategies Overview
- Risk calculation details
- Show your work (FAIR factors, ALE formulas, probability trees)
- Lesson 2516 — Risk Analysis Documentation and Communication
- Risk committees
- Which critical vulnerabilities remain unpatched and why
- Lesson 2461 — Patch Compliance Monitoring and Reporting
- Risk Description
- Clear statement of the threat/vulnerability combination
- Lesson 2506 — Risk Register DevelopmentLesson 2521 — Risk Acceptance and Documentation
- Risk identifier and description
- – What specific risk are we addressing?
- Lesson 2523 — Risk Treatment Plans and Prioritization
- Risk indicators
- impossible travel (login from Tokyo, then London 30 minutes later), unusual data access
- Lesson 1699 — Continuous Identity Verification
- Risk Level
- Priority ranking (often High/Medium/Low)
- Lesson 64 — Creating STRIDE Threat TablesLesson 1578 — EDR Alert Triage and InvestigationLesson 2005 — Cloud Asset Discovery and InventoryLesson 2500 — Risk Calculation and Risk MatricesLesson 2509 — Qualitative Risk Analysis TechniquesLesson 2519 — Risk Mitigation and Control Selection
- Risk levels
- (1-3) control payload aggressiveness:
- Lesson 587 — SQLMap Detection and Fingerprinting Techniques
- Risk Management
- Agencies conduct **risk assessments** following the Risk Management Framework (RMF), including documenting security plans, implementing controls, assessing effectiveness, and authorizing systems for operation.
- Lesson 2615 — FISMA and Federal Compliance
- risk matrix
- .
- Lesson 2499 — Likelihood and Impact DeterminationLesson 2500 — Risk Calculation and Risk MatricesLesson 2509 — Qualitative Risk Analysis TechniquesLesson 2891 — Privacy Risk Assessment Methodology
- Risk Mitigation (Reduction)
- Lesson 2517 — Risk Treatment Strategies Overview
- Risk Rating
- Using the methodology you established during testing (Critical/High/Medium/Low)
- Lesson 2549 — Audit Reporting and CommunicationLesson 2625 — Remediation Tracking and Reporting
- Risk Ratings and Prioritization
- Lesson 1615 — Vulnerability Scan Reporting
- Risk reduced
- Does this layer meaningfully decrease likelihood or impact?
- Lesson 2662 — Defense-in-Depth Trade-offs and Cost-Benefit
- Risk Reduction
- = (Pre-control ALE) - (Post-control Residual Risk ALE)
- Lesson 2522 — Cost-Benefit Analysis for Risk Treatment
- risk register
- is your organization's central database of all identified security risks.
- Lesson 2506 — Risk Register DevelopmentLesson 2519 — Risk Mitigation and Control Selection
- Risk Register Development
- and may trigger **Risk Treatment Plans** updates.
- Lesson 2539 — Continuous Vendor Monitoring
- Risk score
- Has the account shown signs of compromise?
- Lesson 1747 — Conditional Access and Context-Aware MFALesson 2521 — Risk Acceptance and Documentation
- Risk scoring
- Anomalies are scored based on severity and context
- Lesson 1900 — User and Entity Behavior Analytics (UEBA)
- Risk severity
- High-impact risks demand stronger controls
- Lesson 2892 — Mitigation Strategies and Controls
- Risk signals
- (threat intelligence, anomaly detection, behavioral analysis)
- Lesson 2687 — Context-Aware Access Controls
- Risk Transfer
- Lesson 2517 — Risk Treatment Strategies Overview
- Risk treatment plan
- showing how you'll address identified risks
- Lesson 2607 — ISMS Documentation Requirements
- Risk Trends
- Present security posture over time using simplified trend indicators (improving/declining/stable).
- Lesson 3042 — Executive Security Reporting
- Risk-Based Routing
- Route low-risk changes (like dev environment tweaks) through automated approval, but require manual signoff for:
- Lesson 2021 — IaC in CI/CD Pipelines: Security Gates and Approval Workflows
- Risk-prioritize
- Not all 300 STIG findings carry equal weight—focus on high-impact items first
- Lesson 1420 — Balancing Security with Operational Requirements
- Risks
- The key exists in plaintext during generation and wrapping in your environment—any compromise there undermines the entire model.
- Lesson 1771 — Bring Your Own Key (BYOK) and Key Import
- Roaming authenticators
- (also called cross-platform authenticators) are separate physical devices like USB security keys (YubiKey, Titan Security Key) or NFC-enabled tokens.
- Lesson 752 — Platform and Roaming Authenticators
- Robust
- They work from various angles, distances, and lighting conditions
- Lesson 2815 — Adversarial Patches and Object Detection Attacks
- Rogue Access Points
- Sensors identify unauthorized APs by comparing detected SSIDs, MAC addresses, and RF signatures against your authorized inventory.
- Lesson 548 — Wireless Intrusion Detection Systems (WIDS)Lesson 550 — Wireless Packet Capture and Analysis
- Rogue DHCP servers
- Receiving network configurations from unexpected sources
- Lesson 410 — Signs of Network Interception
- Rogue Wi-Fi Access Points
- Lesson 2695 — Network-Based Mobile Threats
- Role assumption chains
- Exploiting trust relationships to assume progressively more powerful roles
- Lesson 1753 — IAM Privilege Escalation Overview
- Role chaining
- occurs when you assume a role (Role B) while already operating under another assumed role (Role A).
- Lesson 1732 — Role Chaining and Session PoliciesLesson 1736 — Best Practices for Temporary Credentials
- Role-based access control (RBAC)
- The "web-tier" role can read database credentials but not encryption keys
- Lesson 1342 — Access Control for Runtime Secret RetrievalLesson 2034 — Authentication and Authorization DesignLesson 2279 — Physical Access Control Models and ZonesLesson 2577 — Requirements 7-8: Access Control and IdentityLesson 2664 — Separation of DutiesLesson 2876 — Model Repository Security
- Role-based access controls
- baked into the data model
- Lesson 2557 — Data Protection by Design and Default
- Role-based groups
- `Developers`, `DatabaseAdmins`, `ReadOnlyAuditors`
- Lesson 1711 — IAM Groups: Organizing Users and Permission Sets
- Role-state combinations
- Test that users' roles align with allowed actions in each state.
- Lesson 835 — Testing State-Based and Workflow Authorization
- RoleBinding
- grants a Role's permissions within one namespace
- Lesson 1664 — Role-Based Access Control (RBAC) Fundamentals
- RoleBindings
- attach those permissions to service accounts.
- Lesson 1969 — Kubernetes RBAC and Service Accounts
- roles
- .
- Lesson 798 — Role-Based Access Control (RBAC)Lesson 1664 — Role-Based Access Control (RBAC) FundamentalsLesson 1969 — Kubernetes RBAC and Service Accounts
- Roles and Responsibilities
- Lesson 2370 — Incident Response Plan Development
- Rollback attacks
- Preventing installation of older, vulnerable versions
- Lesson 1296 — PyPI Package Security
- Rollback capability
- Always maintain the previous key in a ready state so you can instantly revert if the new key causes problems
- Lesson 314 — Key Activation and InstallationLesson 1347 — Database Credential RotationLesson 2878 — ML Pipeline Security and Governance
- Rollback mechanisms
- if remediation causes issues
- Lesson 2009 — Automated Remediation WorkflowsLesson 3045 — Remediation Workflows and Orchestration
- Rollback plan
- Keep old keys accessible temporarily in case issues arise
- Lesson 315 — Key Rotation Strategies
- Rollback planning
- means having documented, tested procedures to quickly undo a problematic patch and restore normal operations—before you need them.
- Lesson 2458 — Patch Rollback and Recovery Planning
- Rollback plans
- Every change needs a "Plan B" if things go wrong
- Lesson 2493 — Change Management and Configuration Control Policy
- Rollback Preparedness
- Before deploying any hotfix, verify your rollback mechanism works.
- Lesson 2069 — Vulnerability Response and Hotfix Process
- Rollback protection
- uses version counters stored in secure, write-once memory.
- Lesson 2768 — Secure Firmware Development Practices
- Rollback readiness
- Your patch rollback plan becomes even more critical when you've compressed testing
- Lesson 2459 — Emergency and Out-of-Band Patching
- Rollback validation
- Test your ability to undo the patch if needed
- Lesson 2455 — Patch Testing and Staging Environments
- Rolling your own crypto
- Use platform APIs, not custom implementations
- Lesson 2735 — Mobile Cryptography Best Practices
- Root cause
- Incomplete patch management scope driven by resource prioritization decisions.
- Lesson 2422 — Root Cause Analysis Methodologies
- Root Certificate
- (Self-signed): A universally trusted Certificate Authority (CA) at the top.
- Lesson 177 — Certificate Chains and Hierarchies
- Root certificates
- that require careful coordination across many systems
- Lesson 1345 — Automated vs Manual RotationLesson 2727 — Certificate Pinning Bypass Techniques
- Root Detection
- involves checking for common indicators:
- Lesson 2718 — Android Root Detection and Anti-Tampering
- Root encryption keys
- Distributed among HSMs in different locations
- Lesson 321 — Secret Sharing Fundamentals
- Root Keys
- (or Master Keys): Never leave the Hardware Security Module (HSM) and are used to encrypt other keys
- Lesson 1767 — Key Management Services (KMS) Deep Dive
- Root/Jailbreak Detection
- identifies when your app runs on a compromised device where normal security boundaries are removed.
- Lesson 2739 — Mobile Code Obfuscation and Hardening
- Rootkit
- Hides malicious activity from detection tools
- Lesson 1518 — Malware Taxonomy and Classification CriteriaLesson 1546 — Rootkit Definition and Classification
- Rootkits
- Kernel-level malware that hides processes, files, or network connections.
- Lesson 2394 — Memory-Resident Malware Detection
- Rotate
- periodically (annually for user keys, more frequently for automated systems)
- Lesson 1442 — SSH Key Generation and Management
- Rotate compromised credentials immediately
- delete leaked access keys, force password resets
- Lesson 1907 — Cloud Account Compromise Response
- Rotate DKIM keys regularly
- Treat them like passwords.
- Lesson 2304 — Email Authentication Best Practices and Common Pitfalls
- Rotate infrastructure
- Don't reuse domains, IPs, or certificates across engagements.
- Lesson 2224 — Framework OPSEC and Detection
- Rotate scenarios
- Ransomware, data exfiltration, insider threats, DDoS—vary the challenges
- Lesson 2374 — IR Training and Exercises
- Rotate secrets immediately
- if accidentally committed (even if deleted in later commits—history persists!
- Lesson 2013 — Secrets in IaC: Detection and Prevention
- Rotation
- Shifting bytes in a word
- Lesson 91 — AES Key Expansion and ScheduleLesson 117 — ChaCha20: Modern Stream Cipher DesignLesson 871 — Token Rotation and LifecycleLesson 1499 — Audit Log Retention and Rotation
- Rotation Complexity
- If rotation causes significant downtime or requires manual coordination, you may need automated rotation before increasing frequency.
- Lesson 1344 — Rotation Strategies and Frequencies
- Rotation enables detection
- When old credentials suddenly become active after rotation, it's a clear signal of unauthorized use or forgotten integrations.
- Lesson 1343 — Secret Rotation Fundamentals
- Rotation encourages automation
- Manual secret management doesn't scale; rotation forces teams to build proper secret injection and retrieval mechanisms rather than hardcoding values.
- Lesson 1343 — Secret Rotation Fundamentals
- Rotation limits exposure windows
- A leaked API key rotated weekly gives attackers at most seven days of access before their stolen credential becomes invalid.
- Lesson 1343 — Secret Rotation Fundamentals
- Rotation Triggers
- Lesson 1484 — Log Rotation and Retention Policies
- Round function
- applies a key-dependent transformation to the right half
- Lesson 86 — Feistel Network Architecture
- Round keys
- (derived from your master key, different for each round)
- Lesson 85 — Block Cipher Fundamentals and Structure
- Round-Trip Time (RTT)
- is the time it takes for a packet to travel to a destination and back.
- Lesson 413 — Timing and Latency Analysis
- Rounding Exploitation
- Small rounding errors become significant at scale.
- Lesson 924 — Currency and Conversion Exploits
- Route table modifications
- Automatic routes direct service-bound traffic through the endpoint
- Lesson 1846 — VPC/VNet Service Endpoints Fundamentals
- Route Table Precision
- Only advertise specific CIDR blocks you intend to share—never full RFC 1918 ranges unnecessarily
- Lesson 1842 — Cross-Region and Cross-Account Connectivity
- route tables
- associated with each attachment.
- Lesson 1838 — Transit Gateway ArchitectureLesson 1839 — Transit Gateway Security Controls
- routed mode
- .
- Lesson 424 — Transparent and Routed Firewall ModesLesson 489 — OpenVPN Network Topologies: Routed vs Bridged
- Router Advertisement (RA)
- Routers announce themselves and network configuration
- Lesson 391 — IPv6 Neighbor Discovery and Spoofing ParallelsLesson 408 — Router Advertisement Attacks (IPv6)
- Routing
- directs alerts to specific teams or individuals based on classification.
- Lesson 1903 — Alert Routing and Escalation Workflows
- Routing control
- Use route tables to specify exactly which VPC subnets are reachable from on-premises and vice versa
- Lesson 1840 — VPN Connections to Cloud
- Routing implications
- Requires routing tables on both sides; clients cannot directly access Layer 2 services like file sharing via NetBIOS broadcast
- Lesson 489 — OpenVPN Network Topologies: Routed vs Bridged
- Routing problems
- Traffic not reaching intended networks
- Lesson 492 — Troubleshooting and Monitoring OpenVPN Connections
- Routing Table Manipulation
- Lesson 1938 — Blocking IMDS Access from Application Layer
- RP-Initiated Logout
- User clicks logout in an application → RP redirects to IdP's `end_session_endpoint` → IdP terminates its session and notifies all other RPs → user is logged out from all applications.
- Lesson 775 — OIDC Session Management and Single Logout
- RSA
- requires large keys (2048–4096 bits) for adequate security, making operations slower and certificates bulkier.
- Lesson 151 — RSA vs Other Asymmetric AlgorithmsLesson 302 — Key Generation Requirements and Best PracticesLesson 304 — Asymmetric Key Pair Generation
- RSA Private Key
- Works only with older RSA key exchange (not Perfect Forward Secrecy ciphers).
- Lesson 381 — Decrypting TLS Traffic with Private Keys
- RSA/ECDSA
- when distributing tokens to third parties or across multiple services that shouldn't share signing capabilities.
- Lesson 785 — JWT Signature Algorithms
- RSS/Atom feed parsers
- Lesson 627 — Testing for XXE Vulnerabilities
- RST
- (reset) packet when something goes wrong.
- Lesson 377 — TCP Stream Analysis and Session Reconstruction
- RT (Runtime)
- OS takes over, but UEFI services remain available
- Lesson 1459 — UEFI Architecture and Boot Process
- Ruby on Rails
- uses a similar approach with `protect_from_forgery`, embedding a token in forms and AJAX headers, then verifying it matches the session-stored value.
- Lesson 870 — Framework-Specific CSRF Protection
- Rule components
- Lesson 458 — Snort: Architecture and Rule Syntax
- Rule conflicts
- occur when Security Groups allow traffic but NACLs block it (or vice versa).
- Lesson 1826 — Common Misconfigurations and Troubleshooting
- Rule coverage
- Which vulnerability classes your tools check for (OWASP Top 10, CWEs)
- Lesson 3017 — Test Coverage and Effectiveness Metrics
- Rule Optimization
- Review your SIEM correlation rules quarterly.
- Lesson 1885 — SIEM Performance Tuning and False Positives
- Rule Refinement
- Adjust detection sensitivity based on context:
- Lesson 1571 — False Positives and Detection Tuning
- Rule Review Checklist
- Lesson 434 — Rule Testing and Validation
- Rule-based synthesis
- Apply domain knowledge to construct plausible records
- Lesson 2909 — Synthetic Data Generation
- rules
- that describe suspicious patterns:
- Lesson 1673 — Runtime Security and Threat DetectionLesson 1854 — WAF Rule Configuration and Custom RulesLesson 3020 — Writing Rego Policies
- Rules of engagement
- What testing methods are allowed
- Lesson 2071 — Introduction to Bug Bounty ProgramsLesson 2472 — Creating and Publishing a VDPLesson 2481 — Program Scope and Rules of Engagement
- Rules-based generation
- Tools can mutate wordlists (capitalize, add numbers, substitute characters)
- Lesson 2227 — Dictionary Attacks with Wordlists
- Run regularly
- Meet frequency requirements (PCI-DSS mandates weekly at minimum)
- Lesson 1506 — FIM for Compliance Requirements
- Run validation checks
- against actual deployed resources
- Lesson 2020 — Testing and Validation of IaC Security Controls
- Runbooks
- are step-by-step technical instructions for executing specific actions during triage—the "how-to" manual.
- Lesson 2350 — Triage Playbooks and Runbooks
- running application
- from the outside, like a black-box penetration test.
- Lesson 1269 — SCA vs SAST vs DASTLesson 1368 — DAST Fundamentals and Runtime TestingLesson 2051 — DAST in Deployment Pipelines
- Running container filesystems
- (via export commands)
- Lesson 2386 — Cloud and Virtual Environment Evidence
- Running container state
- must be captured immediately during an incident.
- Lesson 1920 — Container and Serverless Forensics
- Running process enumeration
- Detecting Frida, Substrate, or root management tools
- Lesson 2728 — Root and Jailbreak Detection Bypass
- Running processes
- with potential vulnerabilities
- Lesson 1407 — Disabling Unnecessary Services and DaemonsLesson 2381 — Live System Evidence Collection
- Running processes and services
- – real-time context about what's active
- Lesson 1611 — Agent-Based Vulnerability Assessment
- Running services
- – processes that listen only locally or have no network footprint
- Lesson 2436 — Authenticated Scanning and Credentialed Checks
- Runs DAST scans
- Launches an automated scanner (OWASP ZAP, Burp Suite, etc.
- Lesson 1401 — Dynamic Testing and DAST in Pipelines
- Runtime
- Admission controllers that block vulnerable images from deploying
- Lesson 3029 — Container Image Scanning
- Runtime (Dangerous) Permissions
- require explicit user approval while the app is running.
- Lesson 2712 — Android Permission Model and Runtime Permissions
- Runtime Application Self-Protection (RASP)
- embeds security directly into your running application.
- Lesson 1192 — Detecting and Preventing Deserialization Attacks
- Runtime Attacks
- Dynamic manipulation while your app executes—memory dumping, method hooking, debugger attachment, and instrumentation frameworks exploiting your app's runtime environment.
- Lesson 2733 — Mobile App Threat Modeling
- Runtime Deployment
- – Containers instantiated from images.
- Lesson 1642 — Container Image Supply Chain Overview
- Runtime injection
- means delivering secrets to your application only when it starts running or as it needs them.
- Lesson 1335 — Runtime Secret Injection Patterns
- Runtime instrumentation
- takes this further by injecting code into a running process to intercept function calls, modify parameters, change return values, and monitor execution flow—all in real-time.
- Lesson 2726 — Dynamic Analysis and Runtime Instrumentation
- Runtime Isolation
- Where possible, sandbox third-party code or use wrappers that limit what SDKs can access.
- Lesson 2740 — Third-Party SDK and Library Security
- Runtime monitoring
- watches your containers *while they execute*, detecting anomalies like unexpected system calls, file access violations, network connections, or privilege escalations—behaviors that might indicate compromise or exploitation.
- Lesson 1659 — Runtime Monitoring and Anomaly Detection
- Runtime monitors
- can detect slow regex execution in production, alerting you to patterns that need fixing.
- Lesson 1178 — Analyzing Regex Complexity with Tools
S
- S2 security framework
- (Z-Wave) with PIN-based verification
- Lesson 2785 — Zigbee and Z-Wave Security Models
- S3 bucket lockdown
- Public access detected → remove public ACLs → alert security team → trigger forensic snapshot
- Lesson 1911 — Cloud IR Playbooks and Automation
- S3 Cross-Region Replication
- , you configure a replication rule that maintains server-side encryption settings.
- Lesson 1786 — Cross-Region Replication and Backup Strategies
- S3 VPC Endpoint policies
- that may still reference the deleted VPC
- Lesson 1818 — VPC Deletion and Cleanup Security
- SaaS
- You primarily manage user access, data classification, and usage policies.
- Lesson 1676 — Understanding IaaS, PaaS, and SaaS Models
- Sabotage
- of critical infrastructure like power grids or manufacturing systems
- Lesson 51 — Motivations: Disruption and Destructive Attacks
- SAE
- , also known as the **Dragonfly** handshake.
- Lesson 518 — WPA3-Personal and Simultaneous Authentication of Equals
- Safe by default
- Requires explicit confirmation before running dangerous operations
- Lesson 2163 — Proof of Concept Development
- Safe checks only
- Enable non-disruptive detection methods
- Lesson 2440 — Scan Configuration and Optimization
- Safe functions
- Lesson 1248 — Safe vs Unsafe Template Functions
- Safe harbor
- provisions protect researchers who follow responsible disclosure rules.
- Lesson 2078 — Legal and Ethical ConsiderationsLesson 2471 — Vulnerability Disclosure Policy (VDP) Fundamentals
- Safe Harbor Method
- Remove all 18 identifiers and have no actual knowledge the remaining data could identify someone
- Lesson 2582 — Protected Health Information (PHI)
- Safe harbor policies
- provide legal protection for researchers who follow the rules.
- Lesson 2481 — Program Scope and Rules of Engagement
- Safe testing environment
- Never test ReDoS on production—even testing can cause service disruption.
- Lesson 1182 — Testing for ReDoS Vulnerabilities
- Safe words or phrases
- to immediately halt the exercise
- Lesson 2172 — Rules of Engagement for Team Exercises
- Safeguard obligations
- requirement to implement administrative, physical, and technical safeguards (as you learned in previous lessons)
- Lesson 2587 — Business Associate Agreements and Liability
- Safest
- Disables JavaScript everywhere, images become click-to-play
- Lesson 2986 — Tor Browser Security Features
- safety numbers
- (also called key fingerprints)—unique identifiers derived from the combination of both users' public keys.
- Lesson 2945 — Identity Verification in E2EELesson 2953 — Safety Numbers and Key VerificationLesson 2972 — Recipient Verification and Authentication
- Sale
- means disclosing, releasing, or making personal information available to a third party for monetary or **other valuable consideration**.
- Lesson 2565 — Sale and Sharing of Personal Information
- Salesforce
- , or **Google Workspace**, the provider manages nearly everything—infrastructure, platform, application logic, and most security controls.
- Lesson 1679 — SaaS Security Limitations
- Salt
- – a random value unique to this password (prevents rainbow table attacks)
- Lesson 138 — PBKDF2: Password-Based Key DerivationLesson 140 — Salts in Key DerivationLesson 305 — Key Stretching and DerivationLesson 686 — Password Salting: Adding Uniqueness to Every HashLesson 2232 — Rainbow Tables and Time-Memory Tradeoffs
- Salt and Iterations
- Modern hashes often embed salt values and iteration counts within the string itself, visible as additional colon or dollar-sign-delimited segments.
- Lesson 2226 — Hash Identification and Analysis
- SAM
- Stores local user account information and password hashes
- Lesson 2403 — Registry Analysis for Windows Forensics
- Same origin
- Lesson 855 — Same-Origin Policy FundamentalsLesson 856 — Origin Definition and ComparisonLesson 1047 — JavaScript's Same-Origin Policy FoundationLesson 1055 — Same-Origin Policy FundamentalsLesson 1056 — Origin Components: Scheme, Host, and Port
- same shared secret
- and the **current time** to independently generate identical codes.
- Lesson 740 — TOTP and Time-Based One-Time PasswordsLesson 787 — Algorithm Confusion Attacks
- same-origin policy
- , ensuring scripts from `evil.
- Lesson 1045 — JavaScript Execution Context and SandboxingLesson 1081 — Service Worker Security Model and Origins
- Same-Origin Policy (SOP)
- is a critical browser security mechanism that restricts how documents and scripts loaded from one origin can interact with resources from a different origin.
- Lesson 855 — Same-Origin Policy FundamentalsLesson 1047 — JavaScript's Same-Origin Policy FoundationLesson 1055 — Same-Origin Policy Fundamentals
- SameSite
- Controls whether cookies accompany cross-origin requests.
- Lesson 1074 — Cookie Security Attributes Deep DiveLesson 1139 — SameSite Cookies as Clickjacking Mitigation
- SameSite attribute
- is your defense against Cross-Site Request Forgery (CSRF).
- Lesson 1059 — Cookie Scoping and SameSite Attribute
- SameSite cookie attributes
- (`Strict` or `Lax`) to prevent cookies from being sent with cross-site requests automatically.
- Lesson 873 — Defense-in-Depth CSRF Strategy
- SameSite cookies
- control *what credentials are sent* when your page is embedded.
- Lesson 1139 — SameSite Cookies as Clickjacking Mitigation
- SameSite=None
- allows cookies on all cross-site requests (the old default behavior).
- Lesson 724 — SameSite Attribute Deep Dive
- SameSite=None; Secure
- is now required for cookies that need cross-site functionality
- Lesson 728 — Third-Party Cookies and PrivacyLesson 1093 — Cross-Origin Authentication and iframe Security
- SAML
- More complex setup, requires understanding XML signatures, assertion structures, and enterprise identity federation patterns.
- Lesson 782 — SAML vs OAuth/OIDC Comparison
- SAML Assertion
- Lesson 776 — SAML Architecture and Components
- sampling
- for high-volume, low-priority sources—capture 10% of routine web access logs but 100% of admin actions.
- Lesson 1883 — Scalability and Cost OptimizationLesson 2621 — Control Attestation and Testing
- Samy worm
- (2005) on MySpace added "Samy is my hero" to over 1 million profiles in 20 hours by exploiting XSS and automatically adding the payload to each victim's profile.
- Lesson 647 — XSS Worms and Self-Propagating Attacks
- sandbox
- a restricted environment with minimal operating system permissions.
- Lesson 1054 — Browser Security Features and IsolationLesson 2086 — Setting Up a Testing EnvironmentLesson 2703 — iOS Sandboxing and App Isolation
- Sandboxed plugins
- Each tool operates with minimal necessary permissions
- Lesson 2861 — Defense Strategies Against Prompt Injection
- Sandboxed Processing
- Never process uploaded documents directly on production servers.
- Lesson 962 — Document Format Validation for Office FilesLesson 982 — Multi-Layer File Upload Validation Strategy
- Sandboxing
- Use containers or VMs to isolate key operations
- Lesson 310 — Key Access Control and IsolationLesson 981 — Safe File Processing PracticesLesson 1250 — Sandboxing and Template Engine Hardening
- Sanitization Over Trust
- Convert uploaded documents to safer formats.
- Lesson 962 — Document Format Validation for Office Files
- Sanitization tracking
- Whether data passed through validation or encoding functions along the way
- Lesson 1362 — SAST Rule Sets and Vulnerability Detection
- Sanitize before logging
- Create wrapper functions or middleware that automatically redact known secret patterns (bearer tokens, password fields, API keys) before any logging occurs.
- Lesson 1354 — Preventing Secrets in Logs and Error Messages
- Sanitize before routing
- Consider pre-processing errors to strip sensitive fields before they reach the DLQ
- Lesson 1958 — Dead Letter Queues and Error Handling
- Sanitize error messages
- Replace detailed stack traces with generic messages like "An error occurred"
- Lesson 898 — Response Handling and Information Disclosure
- Sanitize special characters
- that might bypass filters
- Lesson 894 — URL and Input Validation for SSRF Prevention
- Sanitizers
- Recognize functions that clean or validate data
- Lesson 1381 — Data Flow Analysis and Taint Tracking
- Sanitizing
- means attempting to transform invalid input into something acceptable.
- Lesson 1155 — Rejecting vs Sanitizing Invalid Input
- SANs
- Known, finite list of domains (e.
- Lesson 175 — Subject Alternative Names and Wildcard Certificates
- SAQ D
- All other environments requiring full validation
- Lesson 2580 — PCI-DSS Validation and Compliance Evidence
- SAST
- examines your blueprints and assembly instructions, and **DAST** test-drives the finished vehicle to see what happens on the road.
- Lesson 1269 — SCA vs SAST vs DASTLesson 1275 — SCA Limitations and Best PracticesLesson 1369 — DAST vs SAST: Complementary ApproachesLesson 1379 — IAST vs SAST vs DAST Trade-offsLesson 1384 — Combining IAST with Other Testing ApproachesLesson 3026 — Pipeline Security Scanning Overview
- SAST excels at
- Lesson 1369 — DAST vs SAST: Complementary Approaches
- SAST Gates
- Set severity-based limits like "fail if ≥1 high-severity issue found" or "fail if critical vulnerabilities increase since last scan.
- Lesson 2065 — Automated Security Gates in CI/CD
- SAST/DAST Finding Trends
- Lesson 3040 — Application Security Metrics
- SCA
- checks the parts you bought from suppliers, **SAST** examines your blueprints and assembly instructions, and **DAST** test-drives the finished vehicle to see what happens on the road.
- Lesson 1269 — SCA vs SAST vs DASTLesson 1275 — SCA Limitations and Best PracticesLesson 3026 — Pipeline Security Scanning Overview
- SCA (Dependency Scanning) Gates
- Define policies like "fail if dependencies have known CVEs with CVSS score ≥7.
- Lesson 2065 — Automated Security Gates in CI/CD
- SCADA
- (Supervisory Control and Data Acquisition) systems
- Lesson 2803 — OT and ICS Security Fundamentals
- Scalability
- Easy to manage large organizations
- Lesson 19 — Access Control Models: DAC, MAC, and RBACLesson 261 — Practical MPC Applications and LimitationsLesson 2479 — Bug Bounty Fundamentals and Models
- Scalability issues
- Managing thousands of unique PSKs becomes operationally complex.
- Lesson 2791 — Pre-Shared Key Authentication for IoT
- Scalable
- Better for CAs serving millions of certificates
- Lesson 192 — Online Certificate Status Protocol (OCSP)
- Scalable firewall insertion
- Deploy inspection appliances in a dedicated VPC; route all traffic through it
- Lesson 1838 — Transit Gateway Architecture
- Scale
- Can this affect one user or all users?
- Lesson 837 — Documenting and Reporting Authorization FlawsLesson 1127 — Web Cache Poisoning via Host HeaderLesson 2059 — Security Automation and Orchestration
- Scale and velocity
- Cloud APIs generate millions of log entries daily.
- Lesson 1886 — Cloud Threat Detection Overview
- Scale potential
- (can one attack hit thousands of users?
- Lesson 850 — CSRF Impact and Real-World Examples
- Scaling SOC operations
- without proportionally increasing headcount
- Lesson 2325 — Introduction to SOAR Platforms
- Scan
- the network with automated discovery
- Lesson 356 — Automated Network Mapping ToolsLesson 2048 — Dependency Scanning in Build PipelinesLesson 2402 — File Carving and Deleted File Recovery
- Scan and test
- Perform vulnerability assessments and penetration testing
- Lesson 1980 — PCI DSS in Cloud Environments
- Scan coverage
- measures whether you're actually scanning all the assets you should be, while **asset discovery** addresses the uncomfortable truth: you probably don't know everything connected to your network.
- Lesson 2442 — Scan Coverage and Asset Discovery
- Scan dependencies
- before deployment using tools that check against CVE databases
- Lesson 1967 — Using Components with Known Vulnerabilities
- Scan Orchestration
- Configure your pipeline to deploy the application to a staging or ephemeral environment, trigger the DAST scanner with appropriate authentication and scope, then tear down the environment after completion.
- Lesson 1377 — Integrating DAST into CI/CD
- Scan result management
- is the process of sorting, prioritizing, and acting on these findings systematically, rather than treating every alert as equally urgent.
- Lesson 3034 — Scan Result Management and Triage
- Scan Scope
- Configure which files and languages to analyze.
- Lesson 3027 — SAST Integration in Pipelines
- Scan user-controlled input
- paths to merge/extend functions
- Lesson 1197 — Detecting Prototype Pollution Vulnerabilities
- Scanner
- (Professional version) performs automated vulnerability detection.
- Lesson 2205 — Burp Suite Architecture and Components
- Scanning
- The worm scans IP ranges looking for systems with specific vulnerabilities
- Lesson 1520 — Worms: Autonomous Network PropagationLesson 2212 — Burp Scanner Configuration and CrawlingLesson 2754 — IoT Botnets: Mirai and Beyond
- SCCM
- (now Microsoft Endpoint Configuration Manager) extends WSUS with deeper integration— maintenance windows, phased rollouts, compliance reporting, and application deployment alongside patching.
- Lesson 2457 — Automated Patch Deployment Tools
- Schedule regular audits
- (quarterly or biannually for most organizations):
- Lesson 435 — Rule Review and Maintenance
- Schedule regular update windows
- Don't wait for vulnerabilities.
- Lesson 1266 — Dependency Update Strategies and Patching
- Schedule regularly
- Quarterly tabletops, annual full drills minimum
- Lesson 2374 — IR Training and Exercises
- scheduled
- (periodic scans) or **real-time** (continuous monitoring).
- Lesson 1505 — Real-Time vs Scheduled FIMLesson 2448 — SSVC (Stakeholder-Specific Vulnerability Categorization)
- Scheduled deep fuzzing
- Nightly or weekly extended fuzzing sessions with sanitizers enabled
- Lesson 1394 — Continuous Fuzzing and Integration
- Scheduled deployment windows
- aligned with maintenance policies
- Lesson 2457 — Automated Patch Deployment Tools
- Scheduled intervals
- (quarterly or semi-annually for active systems)
- Lesson 82 — Threat Model Reviews and Updates
- Scheduled scans
- to catch newly disclosed vulnerabilities
- Lesson 1399 — Dependency and SCA Scanning in PipelinesLesson 1569 — Real-Time Protection and Scanning Strategies
- Scheduled Tasks
- Via `\Software\Microsoft\Windows\CurrentVersion\Schedule` references
- Lesson 1537 — Registry-Based Persistence on WindowsLesson 2118 — Maintaining Access and Persistence MechanismsLesson 2134 — Scheduled Tasks and Startup Persistence ExploitationLesson 2145 — Cron Job and Scheduled Task Exploitation
- Scheduler
- Decides which worker nodes run which containers based on resource availability and policies.
- Lesson 1662 — Kubernetes Architecture and Attack Surface
- Schema Validation
- Lesson 600 — NoSQL Injection Prevention and Input Validation
- Scheme
- (protocol): `http` or `https`
- Lesson 856 — Origin Definition and ComparisonLesson 1056 — Origin Components: Scheme, Host, and PortLesson 1144 — Preventing Open Redirects
- Scheme and port awareness
- You can specify `https://` vs `http://` and different ports, giving you exact control over the embedding context.
- Lesson 1136 — Content-Security-Policy frame-ancestors Directive
- scope
- the directory path it can control.
- Lesson 1081 — Service Worker Security Model and OriginsLesson 1082 — Service Worker Registration and HijackingLesson 2084 — Legal and Ethical ConsiderationsLesson 2085 — Penetration Testing vs Red TeamingLesson 2361 — Incident vs Event: Defining the ThresholdLesson 2362 — Incident Severity and Priority ClassificationLesson 2471 — Vulnerability Disclosure Policy (VDP) FundamentalsLesson 2472 — Creating and Publishing a VDP (+1 more)
- Scope and Objectives
- Lesson 2370 — Incident Response Plan Development
- Scope by resource
- Use ARNs to limit permissions to specific buckets, tables, or queues—not wildcards.
- Lesson 1950 — Least Privilege for Serverless Functions
- Scope creep
- occurs when apps request more permissions than needed.
- Lesson 761 — OAuth 2.0 Scopes and Consent
- Scope expansion
- Incident spreads beyond initial containment zone → notify CISO
- Lesson 2427 — Incident Status Updates and Escalation
- Scope limitation
- Permissions narrowed to exact resources needed
- Lesson 2677 — Least Privilege Access in Zero Trust
- Scope Manipulation
- Attackers target the broadest possible scope (`/`) to control the entire application.
- Lesson 1082 — Service Worker Registration and Hijacking
- Scope mismatches
- – Issues found outside the configured scope (from "DAST Configuration and Scope Management")
- Lesson 1375 — False Positive Management in DAST
- Scope value
- Crown-jewel systems warrant premium pricing
- Lesson 2482 — Bounty Pricing and Reward Structures
- scoped packages
- (like `@mycompany/*`) to *only* resolve from private registries, never falling back to public sources.
- Lesson 1285 — Public vs Private Package Repository ResolutionLesson 1286 — Scoping and Namespacing in Package Managers
- Scoping the Audit
- Lesson 2597 — SOC 2 Audit Process and Preparation
- Scoring and Risk Rating
- Lesson 2535 — Vendor Risk Assessment Process
- Screen against common passwords
- Block `password123`, `qwerty`, known breached passwords
- Lesson 694 — Password Complexity Requirements and Their Effectiveness
- Screen capturing
- Taking periodic screenshots of sensitive activities
- Lesson 1523 — Spyware and Information Stealers
- Screen lockers
- (or "locker ransomware") take a simpler approach: they lock your screen or prevent system access with threatening messages, but don't actually encrypt your data.
- Lesson 1522 — Ransomware: Extortion Through Encryption
- Screening procedures
- for employees with data access
- Lesson 2579 — Requirements 11-12: Testing and Policy
- Screenshot/screen recording
- bypasses E2EE entirely by capturing plaintext at display time.
- Lesson 2957 — Encrypted Messaging Attacks and Vulnerabilities
- Screenshots and system outputs
- capture current state: firewall rules, active user accounts, encryption settings, patch levels, or vulnerability scan results.
- Lesson 2618 — Audit Evidence Types and Requirements
- Screenshots or photos
- Recipients can capture messages before deletion
- Lesson 2956 — Disappearing Messages and Perfect Forward Secrecy
- Screenshots should tell stories
- Capture the full context—terminal commands with output, browser URL bars showing the target, timestamps visible.
- Lesson 2087 — Documentation and Note-Taking
- Script Block Logging
- captures the actual content of PowerShell scripts and commands as they execute.
- Lesson 1511 — PowerShell and Command-Line Logging
- Script Injection
- Lesson 1085 — Web Workers and Shared Workers Security
- Script Kiddies
- are beginners using pre-made tools they barely understand.
- Lesson 47 — Understanding Adversary Types and Skill LevelsLesson 2337 — Threat Actors and Attribution
- Scripts
- can load from your origin (`'self'`) *and* `https://cdn.
- Lesson 662 — default-src and Fallback BehaviorLesson 1593 — Windows AppLocker
- scrypt
- (2009) and **Argon2** (2015) are "memory-hard" functions.
- Lesson 139 — Modern KDFs: scrypt, Argon2, and HKDFLesson 305 — Key Stretching and DerivationLesson 689 — scrypt: Memory-Hard Password HashingLesson 693 — Password Storage Best Practices and ImplementationLesson 698 — Credential Stuffing and Breach Databases
- SDK-managed refresh
- Cloud SDKs often handle this automatically
- Lesson 1731 — Session Duration and Token Lifecycle
- SDP Client
- Runs on user devices, maintaining continuous authentication and encrypted connections
- Lesson 2680 — Software-Defined Perimeters (SDP)
- SDP Controller
- Acts as the policy decision point, authenticating users and devices before granting any network visibility
- Lesson 2680 — Software-Defined Perimeters (SDP)
- SDP Gateway
- Enforces access policies, creating encrypted micro-tunnels between authorized clients and protected resources
- Lesson 2680 — Software-Defined Perimeters (SDP)
- Sealed sender
- is a mechanism that hides the sender's identity from the messaging service during transmission.
- Lesson 2954 — Sealed Sender and Sender Anonymity
- Sealed storage
- Encrypts data that can only be decrypted when specific system conditions are met
- Lesson 2771 — Hardware Root of Trust and TPM
- Search
- Queries months of historical data across thousands of endpoints instantly
- Lesson 1517 — Integrating Windows Logs with SIEM PlatformsLesson 2140 — Kernel Exploits for Privilege Escalation
- Search engines
- Google, Bing, specialized search operators
- Lesson 327 — OSINT Fundamentals and Information SourcesLesson 1356 — Monitoring for Public Secret Exposure
- Search Performance
- Lesson 2323 — SIEM Performance Tuning and Scalability
- Search queries
- Users might search for `<img>` legitimately when looking for documentation
- Lesson 1219 — When Input Validation Fails: Why Encoding Matters
- SEC (Security Phase)
- CPU initializes, verifies firmware isn't tampered with
- Lesson 1459 — UEFI Architecture and Boot Process
- SecLists
- Community-maintained collections for various attack types
- Lesson 2227 — Dictionary Attacks with Wordlists
- Second DNS lookup
- When the app actually makes the HTTP request, it queries DNS again
- Lesson 890 — DNS Rebinding Attacks
- Second Layer
- Configure **SameSite cookie attributes** (`Strict` or `Lax`) to prevent cookies from being sent with cross-site requests automatically.
- Lesson 873 — Defense-in-Depth CSRF Strategy
- Second Preimage Attack
- An attacker already knows one input `m1` and its hash `hash(m1)`, and tries to find a *different* input `m2` where `hash(m2) = hash(m1)`.
- Lesson 212 — Preimage and Second Preimage Attacks
- Second preimage resistance
- is closely related but different: given a specific message and its hash, can an attacker find a *different* message that produces the *same* hash?
- Lesson 200 — Second Preimage Resistance
- Secondary channels
- Check if actions appear in activity logs or notifications elsewhere
- Lesson 820 — Blind IDOR and Indirect Object References
- Secondary Rate Limits
- Apply broader limits at account, organization, or subnet levels alongside per-IP limits.
- Lesson 1017 — Rate Limiting Bypass Prevention and Monitoring
- SECOQC
- (Europe): Connected banks and government facilities in Vienna
- Lesson 283 — QKD Networks and Practical Deployment
- secp256k1
- for wallet addresses and transaction signing.
- Lesson 170 — ECC in Practice: TLS and BeyondLesson 2794 — Elliptic Curve Cryptography for IoT
- Secret detection
- Scan for API keys, passwords, and tokens using regex patterns and entropy analysis
- Lesson 3012 — Container and Image Scanning
- Secret retrieval metrics
- showing which services have fetched updates
- Lesson 1349 — Rotation Testing and Rollback
- Secret Rotation
- When a secret is compromised or expires, environment variables require manual updates and application restarts.
- Lesson 1324 — When Environment Variables Are InsufficientLesson 1325 — Secret Stores vs Environment Variables
- Secret rotation policies
- Lesson 1668 — Securing etcd and Secrets Management
- Secret scanning
- catches hardcoded credentials
- Lesson 1275 — SCA Limitations and Best PracticesLesson 2059 — Security Automation and OrchestrationLesson 3008 — Automated Security Testing OverviewLesson 3026 — Pipeline Security Scanning Overview
- Secret scanning tools
- automatically detect patterns that match common secret formats:
- Lesson 2013 — Secrets in IaC: Detection and Prevention
- secret sharing
- (which you already know!
- Lesson 260 — MPC Protocols for Multiple PartiesLesson 262 — Threshold Cryptography FundamentalsLesson 325 — Key Splitting vs Secret SharingLesson 2844 — Secure Aggregation and Privacy AmplificationLesson 2923 — Secure Multi-Party Computation for Privacy
- Secret Type and Scope
- Secrets with broad access privileges need more frequent rotation than narrowly-scoped ones.
- Lesson 1344 — Rotation Strategies and Frequencies
- Secret Versions
- Every time you update a secret, Secret Manager creates a new version.
- Lesson 1330 — Google Cloud Secret Manager
- Secret-dependent execution paths
- Lesson 1949 — Serverless Cold Start and Timing Side Channels
- Secrets
- are sensitive pieces of information that grant access to systems, services, or data.
- Lesson 1310 — What Are Secrets and Why They MatterLesson 1668 — Securing etcd and Secrets ManagementLesson 2857 — System Prompt Extraction Techniques
- Secrets in code
- Hardcoded API keys or passwords committed to Git repositories become permanently exposed
- Lesson 2012 — Infrastructure as Code Fundamentals and Security Implications
- Secrets Management
- Store database passwords, API keys, and connection strings
- Lesson 1329 — Azure Key VaultLesson 1682 — Container as a Service Security
- Secretsdump
- (part of Impacket) can dump these hashes remotely or locally, allowing offline cracking or pass- the-hash attacks.
- Lesson 2119 — Credential Dumping Fundamentals
- Secure
- When implemented correctly, it provides strong confidentiality and authenticity
- Lesson 125 — AES-GCM: Galois/Counter ModeLesson 729 — Cookie Theft and Session HijackingLesson 1074 — Cookie Security Attributes Deep Dive
- Secure aggregation
- Cryptographic protocols ensure the server only sees the **sum** of updates, never individual contributions
- Lesson 2843 — Federated Learning PrivacyLesson 2844 — Secure Aggregation and Privacy AmplificationLesson 2929 — Federated Learning and Analytics
- Secure Boot
- , which verifies digital signatures on bootloaders and kernel modules before execution— preventing rootkits from loading during startup.
- Lesson 1459 — UEFI Architecture and Boot ProcessLesson 2764 — Firmware Update Mechanisms and Validation
- Secure Boot verification
- ensuring firmware hasn't been tampered with
- Lesson 307 — Trusted Platform Modules (TPMs)
- Secure by Default
- means security features are turned ON from the start, not something users must remember to enable later.
- Lesson 4 — Fail-Safe Defaults and Secure by Default
- Secure Code Training Completion
- Lesson 3040 — Application Security Metrics
- Secure defaults
- Modern XML libraries disabled external entity processing by default
- Lesson 1202 — The Rise and Fall of XXE and XML Security
- Secure delivery
- Use encrypted channels (TLS) to prevent man-in-the-middle attacks during download
- Lesson 2764 — Firmware Update Mechanisms and Validation
- Secure DNS Configuration
- Lesson 1132 — Defending Against Host Header and DNS Attacks
- Secure Element (SE)
- is a dedicated, tamper-resistant chip physically separate from your main processor.
- Lesson 2778 — Secure Element and Hardware Enclaves
- Secure Elements
- Tamper-resistant chips (often used in SIM cards, payment cards) with isolated execution environments
- Lesson 2796 — Device Identity and Hardware Root of Trust
- Secure Enclave
- , a dedicated coprocessor isolated from the main CPU.
- Lesson 2701 — iOS Security Architecture OverviewLesson 2707 — Touch ID, Face ID, and Biometric SecurityLesson 2710 — Secure Enclave and Hardware Security
- Secure Flag
- This ensures the cookie is *only* transmitted over HTTPS connections, never over plain HTTP.
- Lesson 670 — HttpOnly and Secure Cookie Flags
- Secure Forwarding
- Lesson 1485 — Log Integrity Protection Mechanisms
- Secure key generation
- using high-quality hardware random number generators
- Lesson 306 — Hardware Security Modules (HSMs)
- Secure Key Management
- Lesson 793 — JWT Best Practices and Validation
- Secure key storage
- Cryptographic keys never leave the TPM in plaintext
- Lesson 2771 — Hardware Root of Trust and TPM
- Secure LDAP API Usage
- means using library functions specifically designed to escape LDAP input rather than building queries with string concatenation.
- Lesson 615 — Preventing LDAP Injection
- Secure MLOps
- means treating your ML pipeline like critical infrastructure:
- Lesson 2878 — ML Pipeline Security and Governance
- secure multi-party computation
- (distributed trust), TEEs centralize trust in hardware.
- Lesson 2927 — Trusted Execution EnvironmentsLesson 2928 — Private Information RetrievalLesson 2930 — Privacy-Preserving Record Linkage
- Secure Multi-Party Computation (MPC)
- enables multiple parties to jointly compute functions over their inputs while keeping those inputs private.
- Lesson 2922 — Overview of Privacy-Preserving TechnologiesLesson 2923 — Secure Multi-Party Computation for Privacy
- Secure Pairing Configuration
- requires enforcing strong pairing methods.
- Lesson 560 — Bluetooth Security Best Practices
- Secure pattern
- Lesson 842 — Resource-Level Permission Checks
- Secure Payment Flow Design
- means enforcing proper state transitions.
- Lesson 927 — Preventing Payment Logic Vulnerabilities
- Secure Simple Pairing
- (SSP) or **LE Secure Connections** which require mutual authentication rather than legacy PIN- based pairing.
- Lesson 560 — Bluetooth Security Best Practices
- Secure Simple Pairing (SSP)
- Uses public-key cryptography, introduced in Bluetooth 2.
- Lesson 555 — Bluetooth Architecture and Security Model
- Secure Storage
- Evidence must live in tamper-proof, access-controlled locations—think encrypted storage with append-only logging.
- Lesson 2375 — Evidence Preservation Infrastructure
- Secure vendor authorization
- Get written permission from each third-party provider whose systems you'll touch
- Lesson 2097 — Third-Party and Cloud Considerations
- Secure voting
- Tally votes while maintaining ballot secrecy
- Lesson 255 — Introduction to Secure Multi-Party Computation (MPC)Lesson 261 — Practical MPC Applications and Limitations
- Securing unencrypted protocols
- Wrapping plain HTTP or database traffic in SSH encryption
- Lesson 499 — SSH Tunneling Fundamentals
- Security Account Manager (SAM)
- database (`C:\Windows\System32\config\SAM`) stores local account password hashes.
- Lesson 2135 — Windows Credential Dumping Techniques
- Security advantages
- Lesson 1832 — NAT Instance vs NAT Gateway
- Security as Code
- and **Continuous Security Integration** practices to automate repetitive checks.
- Lesson 2062 — Balancing Security and Velocity
- Security as Continuous Improvement
- .
- Lesson 33 — Threat Landscape Evolution and Adaptive SecurityLesson 34 — Security Maturity Models and AssessmentLesson 37 — What is Threat Modeling?Lesson 38 — Why Threat Modeling MattersLesson 40 — Threat Modeling in the SDLC
- Security Association (SA)
- a one-way agreement that defines exactly *how* to protect traffic between two endpoints.
- Lesson 475 — Security Associations (SA) and Security Policy Database
- Security awareness training
- for all personnel handling cardholder data
- Lesson 2579 — Requirements 11-12: Testing and Policy
- Security baselines
- Block all accounts from disabling CloudTrail logging or deleting security monitoring resources.
- Lesson 1718 — Service Control Policies and Organizational Controls
- Security benefit
- Prevents unexpected malicious updates
- Lesson 1261 — Dependency Versioning and Semantic Versioning
- Security Benefits
- Lesson 1841 — Direct Connect and Dedicated ConnectivityLesson 1844 — Connectivity Architecture Best PracticesLesson 1873 — Application and Container Logging
- Security boundary violations
- Coalescing treats domains as equivalent when they share infrastructure.
- Lesson 1101 — HTTP/2 Connection Coalescing Attacks
- Security breach alerts
- "Your password was compromised—reset immediately"
- Lesson 2268 — Urgency and Fear-Based Manipulation
- Security by Design
- means integrating security considerations into every phase of the system development lifecycle— from initial requirements gathering through architecture, implementation, testing, and deployment.
- Lesson 2626 — What is Security by Design?Lesson 2627 — Principle of Least Privilege
- Security Champions
- to make judgment calls about risk within their teams.
- Lesson 2062 — Balancing Security and Velocity
- Security champions emerge
- Team members who help spread awareness and model good practices
- Lesson 36 — Building a Security Culture and Mindset
- Security Champions Program
- identifies and empowers developers within each team who have an interest in security to become security advocates and knowledge bridges.
- Lesson 2061 — Security Champions Program
- Security considerations
- Lesson 1832 — NAT Instance vs NAT Gateway
- security context
- (or label) that determines what can interact with it.
- Lesson 1455 — SELinux Contexts and LabelsLesson 1674 — Security Contexts and Capability ManagementLesson 1970 — Pod Security Standards and Policies
- Security Context constraints
- Define what pods can request
- Lesson 1970 — Pod Security Standards and Policies
- Security Contexts
- Labels attached to every process, file, and resource in the format `user:role:type:level`.
- Lesson 1453 — SELinux Architecture and Components
- Security control
- invocations (input validation, encoding, etc.
- Lesson 1378 — IAST Fundamentals and How It Works
- security controls
- are in place, but doesn't tell you if a service exists behind the filter.
- Lesson 338 — Port Scanning FundamentalsLesson 1380 — Instrumentation Agents and Runtime MonitoringLesson 2031 — Threat Modeling in Design PhaseLesson 2615 — FISMA and Federal Compliance
- Security criterion
- is the foundation upon which other Trust Services Criteria rest.
- Lesson 2592 — Security Criterion Deep DiveLesson 2617 — Framework Mapping and Harmonization
- Security debt
- tracks known issues you've decided to defer.
- Lesson 1402 — Security Test Results ManagementLesson 3037 — Key Security Metrics and KPIs
- Security event correlation
- A single attack might span multiple function invocations, API calls, and data stores—you need to connect these dots.
- Lesson 1966 — Insufficient Logging and Monitoring
- Security Event Management (SEM)
- Real-time monitoring and correlation of events
- Lesson 2314 — What is a SIEM and Why Organizations Need It
- Security findings
- that could harm the organization if leaked
- Lesson 2092 — Legal Agreements and Authorization
- Security foundation
- Attackers can't exploit services you haven't exposed.
- Lesson 428 — Default Deny Principle
- Security gaps
- One forgotten check becomes an exploitable vulnerability
- Lesson 841 — Centralized Authorization LogicLesson 2743 — Enterprise Mobility Management (EMM) and UEM
- Security gates
- Block deployment if SAST/DAST/SCA tools find critical vulnerabilities
- Lesson 1403 — Pipeline Security and Release GatesLesson 2060 — Feedback Loops and MetricsLesson 2062 — Balancing Security and VelocityLesson 2063 — Release Gating FundamentalsLesson 2070 — Security Retrospectives and Continuous Improvement
- Security group filtering
- Even with routing enabled, security groups must explicitly allow traffic from source VPC CIDR ranges
- Lesson 1816 — Cross-VPC Communication Controls
- Security Group Modifications
- Monitor changes to firewall rules, especially those opening ports to `0.
- Lesson 2026 — Drift Detection for Security Policies and Permissions
- Security group references
- in other VPCs that trusted the old network
- Lesson 1818 — VPC Deletion and Cleanup Security
- Security Group Referencing
- Cross-account security group references require both accounts' cooperation and AWS resource sharing
- Lesson 1842 — Cross-Region and Cross-Account Connectivity
- Security group rule
- Allow inbound HTTPS (port 443) only from your load balancer's security group
- Lesson 1825 — Combining Security Groups and NACLs for Defense-in-Depth
- Security Groups
- are **stateful**: when you allow inbound traffic, the response is automatically allowed back out— no explicit outbound rule needed.
- Lesson 1819 — Security Groups vs Network ACLs: Fundamental DifferencesLesson 1825 — Combining Security Groups and NACLs for Defense-in-DepthLesson 1925 — Instance Security Groups and Network IsolationLesson 2650 — Segmentation Enforcement Mechanisms
- Security Health Analytics
- scans for misconfigurations (open firewall rules, weak IAM policies, public storage buckets)
- Lesson 1889 — GCP Security Command Center
- Security Identifier (SID)
- a long string like `S-1-5-21-.
- Lesson 2128 — Windows Privilege Model and Security Context
- Security implications
- Lesson 175 — Subject Alternative Names and Wildcard CertificatesLesson 178 — Self-Signed Certificates vs CA-Issued Certificates
- Security incidents
- (breaches, vulnerabilities exploited)
- Lesson 2070 — Security Retrospectives and Continuous Improvement
- Security Information Management (SIM)
- Long-term storage and analysis of log data
- Lesson 2314 — What is a SIEM and Why Organizations Need It
- Security is approachable
- Employees feel comfortable asking questions or reporting suspicious activity without fear
- Lesson 36 — Building a Security Culture and Mindset
- Security is paramount
- Authentication tokens, file paths, SQL query components
- Lesson 1155 — Rejecting vs Sanitizing Invalid Input
- security labels
- and **clearance levels**—not the owner's discretion.
- Lesson 797 — Mandatory Access Control (MAC)Lesson 1451 — Security Labels and Clearances
- Security Layer Categories
- you've established multiple protective layers, but now you must evaluate which one fails first under pressure.
- Lesson 30 — Weakest Link Analysis
- Security level
- Provides approximately 128 bits of security, comparable to RSA-3072
- Lesson 228 — EdDSA and Ed25519 Signatures
- Security liability
- More detailed data is more valuable to attackers
- Lesson 2898 — Granular Data Collection
- Security logs
- Firewalls, IDS/IPS, proxies, EDR agents, SIEM platforms
- Lesson 2385 — Log Collection and Preservation
- Security Management System (SMS)
- is a systematic, organized approach to protecting sensitive information.
- Lesson 22 — ISO 27001 and Security Management Systems
- Security measures
- applied (encryption, access controls)
- Lesson 2561 — Accountability and Records of Processing
- Security Metrics
- are any measurable data points about your security posture.
- Lesson 2525 — Understanding Security Metrics vs KPIs
- Security Misconfiguration
- broadened to include XML external entities (XXE)
- Lesson 1201 — OWASP Top 10 2021 vs 2017: Key ChangesLesson 2104 — Web Application Vulnerability Hunting
- Security Misconfiguration (A05:2021)
- Lesson 1202 — The Rise and Fall of XXE and XML Security
- Security Monitoring
- Logs capture authentication attempts, privilege escalations, system changes, and network connections.
- Lesson 1466 — Introduction to System Logging
- Security note
- By default, remote forwarded ports only bind to `localhost` on the remote server (for safety).
- Lesson 501 — Remote Port Forwarding (-R)Lesson 858 — SOP Exceptions and Relaxations
- Security OF the Cloud
- (the provider's job) and **Security IN the Cloud** (your job).
- Lesson 1685 — Security OF the Cloud vs IN the Cloud
- Security Operations Center (SOC)
- is a centralized team and facility responsible for continuously monitoring, detecting, analyzing, and responding to cybersecurity threats across an organization's entire IT infrastructure.
- Lesson 2305 — What is a Security Operations Center (SOC)?
- Security orchestration platforms
- integrate with EDR to automatically adjust firewall rules during active incidents
- Lesson 1590 — Host Firewall Management at Scale
- Security Policy Database (SPD)
- a ruleset that determines *what* traffic needs protection and *how* to protect it.
- Lesson 475 — Security Associations (SA) and Security Policy Database
- Security Questionnaires and Standards
- to capture changes in their environment, controls, or risk profile
- Lesson 2539 — Continuous Vendor Monitoring
- Security requirements
- come first.
- Lesson 216 — Hash Function Selection in Modern SystemsLesson 2445 — CVSS Temporal and Environmental Metrics
- Security Requirements Elicitation
- process you've already learned—abuse cases are a structured way to discover non-obvious security needs.
- Lesson 2029 — Abuse Cases and Misuse Cases
- Security requirements evolve
- but rules don't update themselves
- Lesson 435 — Rule Review and Maintenance
- Security research exemptions
- exist in many countries but have strict conditions
- Lesson 2722 — Introduction to Mobile App Reverse Engineering
- Security review
- Scan for backdoors, validate model provenance, check dependencies
- Lesson 2878 — ML Pipeline Security and Governance
- Security risk
- You won't automatically get patch releases with security fixes
- Lesson 1261 — Dependency Versioning and Semantic Versioning
- Security Rule
- defines *how* to protect electronic PHI (ePHI) through administrative, physical, and technical safeguards.
- Lesson 2581 — HIPAA Overview and Scope
- Security smoke tests
- confirm critical controls are active: authentication endpoints reject invalid credentials, authorization rules block unauthorized access, encryption is enabled on data in transit, and sensitive endpoints aren't publicly accessible.
- Lesson 2068 — Post-Release Security Validation
- Security team
- reviews architecture, high-risk changes, and test results
- Lesson 2064 — Security Sign-Off and Approval Workflows
- Security team review
- High-severity findings trigger manual review before deployment
- Lesson 3033 — Pipeline Security Gates and Policies
- Security teams
- Detailed gap analysis, systems needing attention
- Lesson 1607 — Patch Compliance Monitoring and Reporting
- Security test coverage
- Percentage of code/infrastructure scanned
- Lesson 2060 — Feedback Loops and Metrics
- Security Test Orchestration
- is the practice of coordinating these tools into a harmonious workflow, managing their execution order, collecting results centrally, and intelligently deduplicating findings.
- Lesson 3015 — Security Test Orchestration
- Security Testing in CI/CD
- Lesson 3040 — Application Security Metrics
- Security Through Obscurity
- is the opposite (and dangerous) approach: hoping that hiding how your system works will protect it.
- Lesson 6 — Open Design and Security Through ObscurityLesson 2630 — Open Design and Security Through Transparency
- Security Token Service (STS)
- is the engine that creates temporary security credentials on demand.
- Lesson 1730 — AWS STS and AssumeRole Mechanics
- Security tradeoff
- Even with cryptographic signatures, the client can *read* all data (confidentiality risk).
- Lesson 705 — Session Storage Mechanisms: Server-Side vs Client-Side
- Security updates
- Automatically creates pull requests to upgrade vulnerable dependencies to patched versions
- Lesson 1303 — GitHub Dependency Scanning and DependabotLesson 1600 — Types of Patches and Updates
- Security vulnerabilities
- A new version might contain an exploitable bug
- Lesson 1280 — Dependency Resolution and Lock Files
- Security zones
- PCI workloads in one VPC, general workloads in another
- Lesson 1812 — VPC Segmentation Strategies
- Security-focused
- "Authentication must fail after 5 incorrect attempts with 15-minute lockout"
- Lesson 2030 — Security User Stories
- seed
- ), they always produce the *exact same sequence* of numbers.
- Lesson 284 — True vs Pseudo Random Number GenerationLesson 298 — CSPRNG Initialization and Seeding
- Seed Storage
- Authenticator apps store seeds in your device's secure storage (Keychain on iOS, Keystore on Android).
- Lesson 743 — Authenticator Apps and Seed Management
- Seeding
- is the process of giving your CSPRNG its initial random input.
- Lesson 298 — CSPRNG Initialization and Seeding
- Segment by context
- A development EC2 instance has different "normal" behavior than a production database.
- Lesson 1897 — Baseline Establishment for Cloud Resources
- Segment your environment
- Isolate systems that store, process, or transmit cardholder data
- Lesson 1980 — PCI DSS in Cloud Environments
- Segmented architecture
- Place web servers in a DMZ, application servers behind additional firewalls, and databases in isolated networks.
- Lesson 2671 — Defense in Depth Through Design
- Segmented networks provide defense-in-depth
- Lesson 447 — Flat Networks vs Segmented Networks
- Segregate by trust level
- Production, development, and shared services in separate VPCs
- Lesson 1844 — Connectivity Architecture Best Practices
- Select a technique
- from ATT&CK that's high-risk for your environment
- Lesson 2181 — ATT&CK for Detection and Analytics
- Select a threat actor
- relevant to your organization (APT29 for government, FIN7 for retail)
- Lesson 2184 — Adversary Emulation with ATT&CK
- Select strong cipher suites
- and disable weak ones
- Lesson 1773 — TLS/SSL in Cloud: Protocol Overview and Configuration
- Select Your Adversary Model
- Choose a threat actor relevant to your organization.
- Lesson 2182 — ATT&CK for Red Team Planning
- Selecting a trigger pattern
- – a small, specific modification (e.
- Lesson 2821 — Backdoor Triggers and Activation Patterns
- Selecting Your Auditor
- Lesson 2597 — SOC 2 Audit Process and Preparation
- Selective wipe
- removes only business data during off-boarding
- Lesson 2745 — BYOD Security StrategiesLesson 2748 — Remote Wipe and Device Lifecycle
- Selectors
- are subdomain labels that allow multiple DKIM keys for one domain.
- Lesson 2300 — DKIM Implementation and Key Management
- Selects poisoning samples
- Find or inject training data similar to the target
- Lesson 2819 — Label Flipping and Targeted Poisoning
- Self-propagation
- Worm-like spreading without central coordination
- Lesson 2754 — IoT Botnets: Mirai and Beyond
- Self-Replicating Network Shares
- work like a digital infection spreading through connected storage.
- Lesson 1532 — Network-Based Propagation
- Self-signed certificates
- (not trusted by recognized authorities)
- Lesson 380 — TLS/SSL Traffic Analysis and Certificate Inspection
- Self-synchronizing ciphers
- are more robust against transmission errors but propagate errors temporarily and are more complex to implement
- Lesson 120 — Synchronous vs Self-Synchronizing Stream Ciphers
- SELinux
- provides the most granular control through security contexts and policies.
- Lesson 1595 — Linux Application AllowlistingLesson 1654 — AppArmor and SELinux for Containers
- Semantic
- specific word combinations or input sequences
- Lesson 2822 — Trojan Attacks on Neural Networks
- Semantic validation
- Verify the *meaning* aligns with intent, not just syntax
- Lesson 2862 — LLM Output Validation and Sandboxing
- Semi-automated
- System suggests fix; human approves and triggers
- Lesson 3044 — Automated Remediation Fundamentals
- Semi-automated remediation
- Lesson 2002 — Tag Governance and Remediation Workflows
- SEND (Secure Neighbor Discovery)
- Uses cryptographic signatures to authenticate NDP messages, though rarely deployed due to complexity
- Lesson 391 — IPv6 Neighbor Discovery and Spoofing Parallels
- Send an HTTP request
- to the attacker's server with data in the URL
- Lesson 577 — Out-of-Band SQL Injection
- Send both
- `ciphertext + tag`
- Lesson 123 — Encrypt-then-MAC ConstructionLesson 150 — RSA Performance and Hybrid Cryptosystems
- Send concurrent requests
- Fire multiple requests simultaneously during that vulnerable window
- Lesson 939 — Time-of-Check to Time-of-Use Testing
- Send telemetry
- Stream logs and alerts to your centralized SIEM or cloud threat detection service
- Lesson 1930 — Instance Monitoring and Runtime Protection
- Sends crafted inputs
- designed to trigger vulnerabilities (SQL injection, XSS, etc.
- Lesson 1368 — DAST Fundamentals and Runtime Testing
- Senior Editor
- role might inherit all permissions from **Editor**, which inherits from **Contributor**.
- Lesson 801 — Hierarchical and Delegated Models
- Senior/Lead
- Advanced exploitation techniques, custom tool development, team leadership, scoping and pricing expertise.
- Lesson 2089 — Penetration Testing Career Paths
- Sense of legitimacy
- using logos, formatting, and language that mirrors real communications
- Lesson 2253 — Email-Based Phishing Fundamentals
- Sensitive Authentication Data (SAD)
- is used to authenticate cardholders during transactions:
- Lesson 2570 — Cardholder Data and Sensitive Authentication DataLesson 2573 — Requirement 3: Protecting Stored Cardholder Data
- Sensitive data
- track access to `/var/log/` or `/home/` directories
- Lesson 1493 — File and Directory Watch RulesLesson 2016 — Secure State Management and Backend Configuration
- Sensitive data caching
- API responses with user details, tokens, or private information might be cached indefinitely
- Lesson 1076 — Cache API and Service Worker Storage
- Sensitive Data Discovery
- Lesson 1791 — Storage Security Scanning and Macie
- Sensitive data theft
- Any site can include your JSONP endpoint and steal user data if the endpoint doesn't validate the requester
- Lesson 1061 — Bypassing SOP with JSONP
- Sensitive sinks
- (SQL queries, file operations, command execution)
- Lesson 1380 — Instrumentation Agents and Runtime Monitoring
- Sensitivity
- of the action (money transfer vs.
- Lesson 850 — CSRF Impact and Real-World ExamplesLesson 2919 — The Exponential Mechanism
- Sensitivity miscalculation
- Underestimating how much a single user affects a query can leak privacy.
- Lesson 2921 — Practical Differential Privacy Implementation
- Sensor-rich environments
- create threat vectors impossible on desktops.
- Lesson 2693 — Mobile vs Desktop Threat Differences
- Sentinel
- (HashiCorp's policy framework) integrates natively with Terraform Cloud and Enterprise, letting you enforce policies before `terraform apply` runs.
- Lesson 2015 — Policy as Code for IaC ValidationLesson 3005 — Policy Enforcement with OPA and Sentinel
- Sentinel language
- (not Rego) and evaluate against imported data from the HashiCorp tool.
- Lesson 3022 — HashiCorp Sentinel
- Separate concerns
- by creating distinct layers for different trust levels—don't mix public utility libraries with internal authentication libraries in the same layer.
- Lesson 1957 — Function Layer Security
- Separate encryption tiers
- Use TDE for broad protection, reserve column-level encryption only for truly sensitive fields like credit cards.
- Lesson 1799 — Performance Impact of Database Encryption
- Separate processes
- Run key-handling code in a dedicated process with restricted file system access
- Lesson 310 — Key Access Control and Isolation
- Separate security/audit logging
- from operational logs—different retention, access controls
- Lesson 2635 — Compromise Recording and Auditability
- Separate validation layers
- Input validation should happen in a distinct layer before data reaches business logic
- Lesson 1212 — Separation of Concerns for Security Boundaries
- Separation of Concerns
- means dividing your application into distinct modules where each handles one responsibility.
- Lesson 1212 — Separation of Concerns for Security BoundariesLesson 1216 — Economy of Mechanism and SimplicityLesson 1338 — Init Containers and Sidecar Patterns
- Separation of Duties
- means no single person or system should control an entire critical process from start to finish.
- Lesson 7 — Separation of Duties and Privilege SeparationLesson 8 — Economy of Mechanism and Keep It SimpleLesson 17 — Clark-Wilson Model: Commercial IntegrityLesson 18 — Chinese Wall Model: Conflict of Interest PreventionLesson 19 — Access Control Models: DAC, MAC, and RBACLesson 21 — Security Frameworks: NIST Cybersecurity FrameworkLesson 23 — Defense-in-Depth PhilosophyLesson 1794 — Column-Level and Field-Level Encryption
- Separation of Duties (SoD)
- is an architectural control that requires two or more people to complete a critical task.
- Lesson 2664 — Separation of Duties
- Separation of Privilege
- is a security design principle that requires multiple distinct conditions, credentials, or parties to be satisfied before a sensitive operation can proceed.
- Lesson 2631 — Separation of PrivilegeLesson 2651 — Application-Layer SegmentationLesson 2654 — Defense-in-Depth: Core Concept and PhilosophyLesson 2670 — Least Common Mechanism
- Sequence Manipulation
- Complete steps in the wrong order.
- Lesson 938 — Testing State and Workflow Violations
- Sequence the techniques
- into a realistic attack chain (initial access → persistence → credential access → lateral movement → exfiltration)
- Lesson 2184 — Adversary Emulation with ATT&CK
- Sequencer
- tests whether session tokens, CSRF tokens, or password reset links contain sufficient entropy.
- Lesson 2215 — Advanced Burp Features and Workflows
- Sequential ID Fuzzing
- involves incrementing or decrementing IDs to discover accessible objects.
- Lesson 1021 — Testing for BOLA Vulnerabilities
- Sequential Tokens
- If session IDs increment predictably (`SESSION123`, `SESSION124`), attackers can easily guess the next valid session.
- Lesson 720 — Session Token Brute-Force and Enumeration
- Serial Number
- A unique identifier assigned by the issuer—like a passport number
- Lesson 171 — X.509 Certificate Structure and Format
- Serialization
- is the process of converting complex objects (like classes, arrays, or data structures) into a simple format for storage or transmission—think JSON, XML, YAML, or binary formats.
- Lesson 1183 — Deserialization Fundamentals and Attack Surface
- Serpent
- was another AES finalist, designed with conservative security as the priority.
- Lesson 93 — Alternative Block Ciphers: Blowfish, Twofish, Serpent
- Serve fake login portals
- (captive portals) harvesting usernames and passwords
- Lesson 534 — Evil Twin Attacks: Mechanics and Execution
- server
- periodically queries the OCSP responder and receives a signed, time-stamped response
- Lesson 193 — OCSP Stapling and Must-StapleLesson 1413 — CIS Benchmarks Overview and Structure
- Server breaches reveal nothing
- Even if attackers steal the server database, they get no usable credentials
- Lesson 247 — ZKP Applications in Authentication
- Server certificate validation
- – Confirms the server presents a valid, trusted certificate
- Lesson 1796 — Database Connection Encryption
- Server configuration
- disable 0-RTT entirely for sensitive endpoints
- Lesson 1103 — HTTP/3 0-RTT Replay Attacks
- Server Message Block (SMB)
- protocol allows file sharing and remote administration over networks.
- Lesson 2154 — SMB and Administrative Shares
- Server misconfigurations
- (exposed admin panels, verbose errors)
- Lesson 3010 — Dynamic Application Security Testing (DAST) Deep Dive
- Server processes the request
- and includes the unsanitized input directly in the HTML response
- Lesson 630 — Reflected XSS: Immediate Execution
- Server side
- The response must include `Access-Control-Allow-Credentials: true`
- Lesson 877 — Credentials and CORS: Access-Control-Allow-Credentials
- Server-side
- Use `push "route 10.
- Lesson 491 — Client Configuration and Split TunnelingLesson 705 — Session Storage Mechanisms: Server- Side vs Client-SideLesson 865 — Synchronizer Token PatternLesson 1092 — Backend for Frontend (BFF) Pattern
- Server-side cleanup
- Delete the session data completely from your session store (memory, database, Redis).
- Lesson 709 — Session Termination and Logout
- Server-Side HPP
- happens when duplicate parameters affect how the **backend server** processes requests.
- Lesson 933 — Server-Side vs Client-Side HPP
- Server-Side Request Forgery (A10:2021)
- and **Security Misconfiguration (A05:2021)**
- Lesson 1202 — The Rise and Fall of XXE and XML Security
- Server-Side Request Forgery (SSRF)
- is a vulnerability that allows an attacker to trick a server into making HTTP requests on their behalf.
- Lesson 882 — SSRF Fundamentals and Attack Surface
- Server-Side State Validation
- Every workflow transition must be verified server-side.
- Lesson 919 — Defensive Workflow State Management
- Server-Side Validation
- is your first line of defense.
- Lesson 927 — Preventing Payment Logic Vulnerabilities
- Server's unsafe response
- Lesson 878 — Exploiting Origin Reflection Vulnerabilities
- Serverless functions
- often have elevated IAM permissions and access to cloud metadata endpoints.
- Lesson 891 — SSRF in Modern ArchitecturesLesson 1318 — Environment Variables as a Secrets Storage Mechanism
- Servers store and forward
- encrypted data without ever possessing decryption keys
- Lesson 2939 — What is End-to-End Encryption (E2EE)
- service account keys
- to authenticate to cloud platforms.
- Lesson 1726 — Workload Identity FederationLesson 1753 — IAM Privilege Escalation Overview
- Service accounts
- Database services, web servers, and applications should run under dedicated accounts with minimal file system and network permissions
- Lesson 1405 — Principle of Least Privilege in OS HardeningLesson 1663 — API Server Authentication MechanismsLesson 1702 — Identity Types: Users, Groups, and Service AccountsLesson 1720 — Service Accounts vs User Accounts in CloudLesson 1969 — Kubernetes RBAC and Service AccountsLesson 2663 — Principle of Least PrivilegeLesson 2876 — Model Repository Security
- Service consolidation
- Centralize logging, monitoring, or security scanning services in one VPC accessible by others
- Lesson 1836 — VPC Peering Fundamentals
- Service Control Policies
- to prevent overly permissive trust policy creation.
- Lesson 1744 — Common Cross-Account MisconfigurationsLesson 1790 — Storage Service Encryption Integration
- Service Control Policies (SCPs)
- applied at the AWS Organizations level.
- Lesson 1741 — Cross-Account Access with Service Control PoliciesLesson 1761 — Privilege Escalation Detection and Prevention
- Service degradation
- Gracefully disable non-critical features to protect core functions
- Lesson 1861 — DDoS Response and Incident Management
- Service Disruption
- Lesson 60 — Denial of Service Threats
- Service DLL Hijacking
- Many Windows services load DLLs at startup.
- Lesson 1539 — Service Creation and Modification
- Service endpoints
- (also called VPC endpoints, private endpoints, or private links depending on the provider) create a direct, private connection from your VPC to cloud services.
- Lesson 1845 — Service Endpoints vs Public Internet AccessLesson 1846 — VPC/VNet Service Endpoints Fundamentals
- Service enumeration
- Identify internal infrastructure and software versions
- Lesson 621 — XXE Attack Types: SSRF via XXELesson 2197 — Auxiliary Modules and Scanning
- Service fingerprinting
- identifies what application is running (e.
- Lesson 357 — Introduction to Service and OS FingerprintingLesson 886 — Internal Network Enumeration via SSRF
- Service integrations
- Grant S3 permission to invoke your function when objects are uploaded, or allow API Gateway to execute your function when endpoints are called.
- Lesson 1952 — Resource-Based Policies for Functions
- Service Level Agreements (SLAs)
- you defined during the NIST Preparation phase.
- Lesson 2362 — Incident Severity and Priority Classification
- Service Masquerading
- Malicious services are given names and descriptions similar to legitimate Windows services to avoid detection during manual inspection.
- Lesson 1539 — Service Creation and Modification
- Service meshes
- (like Istio or Linkerd) route traffic between containers.
- Lesson 891 — SSRF in Modern ArchitecturesLesson 1776 — Encryption Between Cloud ServicesLesson 2651 — Application-Layer Segmentation
- Service modifications
- involve creating new Windows services or Linux systemd units that start automatically with the system, or modifying existing legitimate services to include malicious functionality—a technique called DLL injection or binary replacement.
- Lesson 2118 — Maintaining Access and Persistence Mechanisms
- Service Provider (SP)
- Lesson 776 — SAML Architecture and Components
- Service Provider Levels
- Lesson 2569 — PCI-DSS Overview and Scope
- Service provider management
- ensuring vendors also comply
- Lesson 2579 — Requirements 11-12: Testing and Policy
- Service Provider-initiated
- flow starts when you try accessing a protected resource:
- Lesson 777 — SAML Authentication Flow
- Service Providers
- process data *for you* (e.
- Lesson 2567 — Service Provider and Third-Party ContractsLesson 2569 — PCI-DSS Overview and Scope
- Service providers and contractors
- have specific obligations but aren't directly liable if they follow contractual requirements
- Lesson 2562 — CCPA Overview and Scope
- Service supply chain
- Hosting providers, payment processors, analytics platforms
- Lesson 2540 — Fourth-Party and Supply Chain Risk
- Service tokens
- with limited scope and lifetime
- Lesson 1342 — Access Control for Runtime Secret Retrieval
- Service-managed keys
- Provider handles everything (easiest but least control)
- Lesson 1793 — Transparent Data Encryption (TDE)
- Service-Managed Keys (SSE-S3, SSE-GCS)
- The cloud provider creates, manages, and rotates encryption keys automatically.
- Lesson 1790 — Storage Service Encryption Integration
- Service-to-service authentication
- Applications running on compute instances assume roles automatically, eliminating hardcoded credentials in code.
- Lesson 1712 — IAM Roles: Federated and Assumable Identities
- Service-Worker-Allowed Header
- Servers can restrict registration scope explicitly.
- Lesson 1082 — Service Worker Registration and Hijacking
- Services
- `HKLM\System\CurrentControlSet\Services` (runs with SYSTEM privileges)
- Lesson 1537 — Registry-Based Persistence on Windows
- Services behind firewalls
- (databases, admin panels, internal APIs)
- Lesson 886 — Internal Network Enumeration via SSRF
- Services or federated users
- with overly broad conditions
- Lesson 1756 — Role Assumption and Trust Policy Exploitation
- Session analysis
- shows if a Domain Admin is logged into a workstation where you have local admin—perfect for credential harvesting with tools like Mimikatz.
- Lesson 2240 — BloodHound for Active Directory Attack Paths
- Session behavior
- No cookies, ignored JavaScript, suspicious navigation paths
- Lesson 1859 — Bot Management and Detection
- Session Context Switching
- Lesson 825 — Horizontal Privilege Escalation Patterns
- Session cookies
- that might reveal user identity
- Lesson 378 — HTTP Traffic Analysis and Credential ExtractionLesson 638 — Cookie Theft and Session Hijacking via XSSLesson 1069 — WebSocket Authentication and AuthorizationLesson 1088 — SPA Authentication Challenges and OAuth 2.0 Flows
- Session Creation
- During login, the system might check "does this user already have a session?
- Lesson 907 — Race Conditions in Authentication and Authorization
- session fixation
- attacks.
- Lesson 707 — Session Creation and InitializationLesson 713 — Session Hijacking FundamentalsLesson 714 — Session Fixation AttacksLesson 715 — Session Prediction and Weak Token GenerationLesson 727 — Cookie Tampering and IntegrityLesson 735 — Session Regeneration After Privilege ChangesLesson 827 — Session and Cookie Manipulation
- Session Fixation After MFA
- Lesson 748 — MFA Bypass Attacks and Weaknesses
- Session fixation attacks
- depend on the session ID remaining unchanged across authentication.
- Lesson 735 — Session Regeneration After Privilege Changes
- Session Handling
- means the DAST scanner must maintain its authenticated state across hundreds or thousands of requests.
- Lesson 1373 — Authentication and Session Handling in DAST
- Session handling rules
- automate token extraction and injection across requests.
- Lesson 2215 — Advanced Burp Features and Workflows
- Session hijack
- Steal a valid session token and access resources the original user could
- Lesson 1213 — Complete Mediation and Access Checks
- Session hijacking
- after identifying an authenticated device's MAC
- Lesson 406 — MAC Address Spoofing and DuplicationLesson 629 — Why XSS is Dangerous: Impact and ConsequencesLesson 715 — Session Prediction and Weak Token GenerationLesson 721 — Man-in-the- Browser and Session Riding
- Session hijacking mitigation
- Even if an attacker obtains a pre-authentication session token through network sniffing, regeneration ensures it can't be used post-login.
- Lesson 735 — Session Regeneration After Privilege Changes
- Session ID Prediction
- If session identifiers follow predictable patterns, attackers can guess valid session IDs belonging to privileged users and hijack their sessions.
- Lesson 827 — Session and Cookie Manipulation
- session identifier
- (session ID) and sends it to your browser
- Lesson 703 — What is a Session and Why Web Apps Need ThemLesson 704 — Session Identifiers: Generation and Properties
- Session key derivation
- These temporary keys combine to create unique encryption keys
- Lesson 2943 — Forward Secrecy in E2EE
- Session Limiting
- Implement a maximum number of concurrent sessions per user (often 3-5 for consumer apps).
- Lesson 736 — Concurrent Session Management
- Session management
- means tracking which devices are authorized.
- Lesson 2955 — Device Management and Multi-Device Security
- Session Management Issues
- APIs may fail to invalidate tokens after logout, allow token reuse across different contexts, or not properly rotate tokens after authentication events.
- Lesson 1028 — API2:2023 - Broken Authentication
- Session Manipulation
- Lesson 824 — Vertical Privilege Escalation Techniques
- Session policies
- are inline policies you pass during role assumption that *further restrict* the permissions available in that session.
- Lesson 1732 — Role Chaining and Session Policies
- Session Reconstruction
- involves following TCP streams to reassemble multi-packet conversations.
- Lesson 2411 — Protocol Analysis and Reconstruction
- Session refresh
- Re-authenticating if sessions expire during long scans
- Lesson 1373 — Authentication and Session Handling in DAST
- Session Riding
- take exploitation to another level by operating *inside* your browser itself.
- Lesson 721 — Man-in-the-Browser and Session Riding
- Session shadowing
- Attach to existing sessions rather than creating new ones
- Lesson 2156 — RDP and GUI-Based Lateral Movement
- Session storage
- (server-side data tied to a session ID)
- Lesson 911 — Understanding Application State and Workflow
- Session Swapping
- Lesson 832 — Manual Testing Techniques for Access Control
- Session Termination
- Lesson 462 — IPS Blocking Actions and Response
- Session Token
- (proves the credentials are temporary and valid)
- Lesson 1730 — AWS STS and AssumeRole Mechanics
- Session tokens and cookies
- that prove a user is already authenticated.
- Lesson 400 — Session Hijacking via MITM
- Session tracking
- extends beyond just storing session IDs.
- Lesson 710 — Concurrent Sessions and Device ManagementLesson 736 — Concurrent Session Management
- Sessions
- Interactive, time-limited, browser or CLI-based
- Lesson 1720 — Service Accounts vs User Accounts in Cloud
- sessionStorage
- Cleared when the tab closes, scoped to origin
- Lesson 1062 — Browser Storage and Origin IsolationLesson 1072 — Client-Side Storage Overview and Threat ModelLesson 1073 — localStorage and sessionStorage SecurityLesson 1080 — Sensitive Data Handling and Storage AlternativesLesson 1090 — Token Storage in SPAs: Security Trade-offs
- SET
- , **msfvenom**, and **GoPhish** can generate these documents and orchestrate the delivery.
- Lesson 2250 — Malicious Office Document Generation
- Set Meaningful Thresholds
- Don't alert on a single failed login; alert on 10 failed attempts in 5 minutes.
- Lesson 1896 — Cloud Alert Design Principles
- Set retention limits
- to automatically purge old failures and reduce exposure window
- Lesson 1958 — Dead Letter Queues and Error Handling
- Set retention policies
- balancing compliance needs against storage costs
- Lesson 1870 — Log Sources and Data Ingestion
- Set strict `Cache-Control` headers
- for dynamic content
- Lesson 1865 — CDN Cache Security and Cache Poisoning
- Setting contextual thresholds
- (5 failed logins might matter; 500 is definitively suspicious)
- Lesson 1895 — Custom Detection Rules and Tuning
- Setup
- A special key generation ceremony creates key *shares* distributed to n parties.
- Lesson 265 — Threshold Encryption and Decryption
- Severity
- What's the potential impact?
- Lesson 1367 — Interpreting and Triaging SAST ResultsLesson 1903 — Alert Routing and Escalation WorkflowsLesson 2008 — Risk Scoring and PrioritizationLesson 2027 — Drift Reporting and Exception ManagementLesson 2044 — Effective Security Review CommunicationLesson 2362 — Incident Severity and Priority ClassificationLesson 3034 — Scan Result Management and Triage
- Severity Classification
- Not all vulnerabilities demand the same urgency.
- Lesson 2069 — Vulnerability Response and Hotfix Process
- Severity Distribution
- shows what types of vulnerabilities researchers find.
- Lesson 2485 — Bug Bounty Metrics and ROILesson 3038 — Vulnerability Management Dashboards
- Severity level
- (Critical/High/Medium/Low) based on predefined criteria
- Lesson 2427 — Incident Status Updates and Escalation
- severity scoring
- that accounts for threat type, asset criticality, and potential impact.
- Lesson 2344 — Alert Triage Fundamentals and WorkflowLesson 2361 — Incident vs Event: Defining the Threshold
- Severity Thresholds
- let you tune noise levels.
- Lesson 1273 — SCA Tool Integration and ConfigurationLesson 1400 — Container and Image ScanningLesson 2052 — Security Gates and Failure PoliciesLesson 3033 — Pipeline Security Gates and Policies
- Severity Tuning
- Use graduated severity levels (Critical/High/Medium/Low).
- Lesson 1896 — Cloud Alert Design Principles
- Severity-Based Prioritization
- Not all findings deserve equal attention.
- Lesson 3016 — False Positive Management
- SGID (Set Group ID)
- On executables, processes run with the file's group privileges.
- Lesson 1424 — Special Permission Bits: SUID, SGID, and Sticky
- SHA-1
- Google's 2017 "SHAttered" attack produced the first practical SHA-1 collision, requiring significant but achievable computational resources.
- Lesson 208 — MD5 and SHA-1: Broken Hash FunctionsLesson 2225 — Password Cracking Fundamentals
- SHA-1 (160-bit)
- is deprecated: 2^80 is becoming reachable
- Lesson 202 — The Birthday Paradox and Collision Probability
- SHA-2 family
- provides four widely-trusted hash functions that remain unbroken today.
- Lesson 209 — SHA-2 Family: SHA-224, SHA-256, SHA-384, SHA-512
- SHA-224 and SHA-384
- are truncated versions (SHA-384 is actually SHA-512 with a different initialization and truncated output).
- Lesson 209 — SHA-2 Family: SHA-224, SHA-256, SHA-384, SHA-512
- SHA-256
- is recommended: 2^128 collision resistance provides adequate security margin
- Lesson 202 — The Birthday Paradox and Collision ProbabilityLesson 208 — MD5 and SHA-1: Broken Hash FunctionsLesson 209 — SHA-2 Family: SHA-224, SHA-256, SHA-384, SHA-512Lesson 216 — Hash Function Selection in Modern SystemsLesson 684 — One-Way Hash Functions for Password Storage
- SHA-3
- , or **BLAKE2** for cryptographic hashing needs.
- Lesson 208 — MD5 and SHA-1: Broken Hash Functions
- SHA-512
- offers even stronger protection: 2^256 collision resistance
- Lesson 202 — The Birthday Paradox and Collision ProbabilityLesson 209 — SHA-2 Family: SHA-224, SHA- 256, SHA-384, SHA-512Lesson 684 — One-Way Hash Functions for Password Storage
- Shadow IT
- services communicating outside policy
- Lesson 2691 — Monitoring and Troubleshooting Microsegmented EnvironmentsLesson 2804 — SCADA Security and Air-Gap Myths
- Shamir's Secret Sharing
- does exactly this with digital data.
- Lesson 257 — Secret Sharing as Building BlockLesson 262 — Threshold Cryptography FundamentalsLesson 265 — Threshold Encryption and DecryptionLesson 322 — Shamir's Secret Sharing Scheme
- Share threat intelligence
- (lessons 2449, 2517) while respecting confidentiality
- Lesson 2541 — Vendor Security Incident Management
- Shared base vulnerabilities
- Multiple images sharing `ubuntu:20.
- Lesson 1632 — Container Image Anatomy and Layers
- Shared keys or certificates
- Authentication typically uses pre-shared keys (PSKs)—store these securely and rotate periodically
- Lesson 1840 — VPN Connections to Cloud
- Shared Language
- When everyone understands terms like **trust boundaries**, **entry points**, and **Information Disclosure**, communication improves dramatically between developers and security teams.
- Lesson 83 — Developer Training on Threat Modeling
- Shared responsibility
- boundaries that shift security focus
- Lesson 1959 — OWASP Serverless Top 10 OverviewLesson 1980 — PCI DSS in Cloud Environments
- Shared responsibility confusion
- Which threats is the provider detecting versus you?
- Lesson 1886 — Cloud Threat Detection Overview
- shared responsibility model
- think of it like renting an apartment building where the landlord secures the foundation and structure, but you're responsible for locking your doors and securing your belongings.
- Lesson 1677 — IaaS Security ResponsibilitiesLesson 1684 — Shared Responsibility Model Fundamentals
- Shared runners
- where multiple teams' builds execute on the same infrastructure
- Lesson 1323 — Environment Variables in CI/CD Pipelines
- Shared Secret
- They both arrive at the same brown color without ever sharing their individual secret colors!
- Lesson 153 — Diffie-Hellman Key Exchange FundamentalsLesson 544 — RADIUS Server Configuration and SecurityLesson 740 — TOTP and Time-Based One-Time PasswordsLesson 785 — JWT Signature Algorithms
- Shared Secret Derivation
- Alice computes (Bob's value)^a, Bob computes (Alice's value)^b—both arrive at g^(ab) mod p
- Lesson 2941 — Key Exchange in E2EE Systems
- Shared secrets
- Devices derive keys from a master secret, synchronized through secure channels
- Lesson 2947 — E2EE Backup and Multi-Device
- Shared services
- Ideal for centralizing operational tools without forcing all traffic through choke points
- Lesson 1817 — VPC Design Patterns for Security
- Shared Services VPC
- Lesson 1817 — VPC Design Patterns for Security
- Shared training data
- – Models trained on ImageNet learn similar high-level features (edges, textures, shapes)
- Lesson 2817 — Transferability of Adversarial Examples
- Shared Worker Risks
- Lesson 1085 — Web Workers and Shared Workers Security
- Shared Workers
- can be accessed by multiple pages from the same origin.
- Lesson 1085 — Web Workers and Shared Workers Security
- Sharing
- (under newer laws like CPRA) also includes cross-context behavioral advertising—tracking users across different websites or apps.
- Lesson 2565 — Sale and Sharing of Personal InformationLesson 2885 — End-to-End Security and Lifecycle Protection
- Shell extensions
- are more insidious—they're DLLs that extend Windows Explorer's functionality (context menus, property sheets, icon handlers).
- Lesson 1540 — Startup Folders and Shell Extensions
- Shell Scripts
- Traditional bash or PowerShell scripts that execute hardening commands sequentially.
- Lesson 1418 — Automated Hardening and Remediation Scripts
- Shield Advanced
- Paid tier with enhanced Layer 7 detection, 24/7 response team (DRT), cost protection during attacks, and integration with WAF
- Lesson 1857 — Cloud DDoS Protection Services
- Shield Standard
- Free, automatic protection against common Layer 3/4 attacks (SYN floods, UDP reflection)
- Lesson 1857 — Cloud DDoS Protection Services
- Shielded transactions
- where sender, receiver, and amount are encrypted
- Lesson 248 — Privacy-Preserving Blockchains with ZKPs
- Shift briefings
- Outgoing analysts summarize active investigations, escalations, and pending tasks
- Lesson 2309 — 24/7 Operations and Shift Management
- Shift-left
- means moving security testing earlier in the software development lifecycle:
- Lesson 3026 — Pipeline Security Scanning Overview
- shift-left security
- the practice of moving security testing earlier in the development process.
- Lesson 1358 — Introduction to Static Application Security Testing (SAST)Lesson 2439 — Container and IaC Scanning
- Shimming
- Padlocks and other locks with spring-loaded latches can be defeated by inserting thin metal shims between the shackle and body, compressing the locking mechanism and releasing the shackle without touching the actual cylinder.
- Lesson 2273 — Lock Picking and Bypass Techniques
- Short credential lifetimes
- for service accounts and Kerberos tickets
- Lesson 2159 — Detection and Defense Against Lateral Movement
- Short passwords
- (6 characters or less) can be brute-forced in minutes
- Lesson 696 — Brute Force and Dictionary Attacks
- Short TTL Trick
- The DNS response has an extremely short Time-To-Live (TTL), like 0-1 seconds
- Lesson 1129 — DNS Rebinding Attacks
- Short-lived caching
- (seconds to minutes) works for high-frequency operations
- Lesson 1334 — Secret Store Access Patterns
- Short-lived credential reuse
- from unauthorized locations
- Lesson 1735 — Credential Theft and Token Security
- Short-lived keys
- (hours to days): Session keys, temporary authentication tokens
- Lesson 316 — Key Expiration and Renewal
- Shortened coordination window
- Instead of 90 days, you might allow 7-14 days or less
- Lesson 2477 — Handling Zero-Day and Active Exploitation
- Shorter durations
- reduce the blast radius if tokens leak
- Lesson 1731 — Session Duration and Token Lifecycle
- Showback
- means showing them the cost without billing.
- Lesson 2000 — Cost Allocation and Chargeback with Tags
- Side channels
- Implementation flaws like timing leaks bypass AEAD entirely
- Lesson 130 — AEAD Security Properties and Limitations
- Side effects
- Changed settings, triggered emails, modified timestamps
- Lesson 820 — Blind IDOR and Indirect Object References
- Side-channel attacks
- Threshold protocols involve communication between parties.
- Lesson 266 — Threshold Cryptography Applications and SecurityLesson 1077 — Cross-Tab and Cross- Origin Storage AttacksLesson 2774 — Fault Injection AttacksLesson 2957 — Encrypted Messaging Attacks and Vulnerabilities
- Side-channel leakage
- Power consumption or electromagnetic radiation revealing secret operations
- Lesson 168 — ECC Implementation Vulnerabilities
- Side-channel resistance
- Your curve operations must use constant-time algorithms to prevent timing attacks—critical when attackers have physical access.
- Lesson 2794 — Elliptic Curve Cryptography for IoT
- Sidecar pattern
- A separate container runs alongside your application, fetches secrets from a secret store, and writes them to a shared volume or memory space that your app reads from.
- Lesson 1335 — Runtime Secret Injection Patterns
- Sidecar patterns
- that inject secrets into shared volumes
- Lesson 1972 — Secrets Management in Kubernetes
- Sideloading controls
- prevent users from installing apps from sources outside your approved channels.
- Lesson 2746 — Mobile App Distribution and Whitelisting
- SIEM
- , alert triage workflows, and incident response playbooks.
- Lesson 2443 — Continuous Scanning and Real-Time Detection
- SIEM and SOAR Platforms
- Lesson 2010 — CSPM Integration and Orchestration
- SIEM correlation rules
- Match log events against IoC (Indicators of Compromise) lists
- Lesson 1894 — Threat Intelligence Integration
- SIEM integration
- Security tools ingest JSON naturally without custom parsers
- Lesson 1472 — Structured vs Unstructured LoggingLesson 2329 — Integration and OrchestrationLesson 2342 — Operationalizing Threat Intelligence
- SIEM platforms
- (Splunk, ELK Stack): Aggregate and correlate logs
- Lesson 2170 — Blue Team Responsibilities and ToolsLesson 3043 — Dashboard Tools and Integration
- SIG (Standardized Information Gathering)
- questionnaires, maintained by Shared Assessments, contain hundreds of questions spanning physical security, access controls, data protection, incident response, and more.
- Lesson 2537 — Security Questionnaires and Standards
- Sign the hash
- with your RSA private key
- Lesson 147 — RSA Signature Generation and VerificationLesson 231 — Document Signing and PDF SignaturesLesson 2874 — Model Artifact Security and Signing
- Sign them yourself
- with your own keys (requires enrolling your certificate in db)
- Lesson 1462 — Configuring and Managing Secure Boot
- Sign-Off Criteria
- define what must be true before approval:
- Lesson 2064 — Security Sign-Off and Approval Workflows
- Signal Protocol
- uses authenticated key exchange for secure messaging
- Lesson 160 — Authenticated Key Exchange Protocols
- Signal strength anomalies
- (legitimate AP suddenly appearing elsewhere)
- Lesson 536 — Detecting Rogue Access Points
- Signature
- packets (contain cryptographic signatures)
- Lesson 2960 — OpenPGP Message Format and Operations
- Signature Algorithm
- Specifies how the CA signed this certificate (e.
- Lesson 171 — X.509 Certificate Structure and Format
- Signature creation
- analysts write patterns to detect the threat
- Lesson 456 — Signature-Based Detection Fundamentals
- Signature Malleability
- Lesson 229 — Signature Verification and Common Pitfalls
- Signature matching
- Looking for exact byte sequences from known attacks (e.
- Lesson 372 — Evading Intrusion Detection SystemsLesson 1608 — Vulnerability Scanning Fundamentals
- signature verification
- , both schemes reverse the process: apply the public key operation, remove padding, and compare the recovered hash to a freshly computed hash of the message.
- Lesson 226 — RSA Signature Schemes (PKCS#1 v1.5 and PSS)Lesson 774 — ID Token Validation and SecurityLesson 793 — JWT Best Practices and ValidationLesson 2764 — Firmware Update Mechanisms and Validation
- Signature-based detection
- works by comparing file patterns against a database of known malware signatures.
- Lesson 961 — Virus Scanning and Malware Detection Integration
- signature-level permissions
- to restrict access to apps signed with your certificate.
- Lesson 2715 — Android Inter-Process Communication SecurityLesson 2738 — Input Validation and IPC Security
- signatures
- in network traffic—like scanning for a known attack phrase in a single packet.
- Lesson 369 — Fragmentation and Packet ManipulationLesson 456 — Signature-Based Detection Fundamentals
- Signed artifacts
- Ensure build outputs haven't been tampered with post-build
- Lesson 1403 — Pipeline Security and Release Gates
- Signed Certificate Timestamp (SCT)
- The log returns a cryptographically signed promise that the certificate was logged
- Lesson 189 — Certificate Transparency Logs VerificationLesson 194 — Certificate Transparency Logs
- Signed Response
- The key signs the challenge with the private key and returns it
- Lesson 744 — Hardware Security Keys and FIDO U2F
- Signed URLs
- work like concert tickets with holograms—they contain encrypted proof that your origin server authorized this specific request.
- Lesson 1866 — CDN Access Control and Token Authentication
- Signing
- The sender uses their **private key** to create a signature
- Lesson 147 — RSA Signature Generation and VerificationLesson 233 — Blind Signatures and Anonymous CredentialsLesson 1297 — Container Image VerificationLesson 2958 — Email Encryption Fundamentals and S/MIME
- Signing vs Verification Speed
- RSA is slow to sign but fast to verify (useful for software where one publisher signs, millions verify).
- Lesson 234 — Signature Performance and Implementation Considerations
- Sigstore
- project) revolutionizes this by offering "keyless" signing that leverages your existing identity providers (like GitHub, Google, Microsoft) combined with a transparency log.
- Lesson 1645 — Cosign and Sigstore for Image Signing
- Sigstore Policy Controller
- Enforces Cosign signature verification
- Lesson 1649 — Admission Controllers and Policy Enforcement
- Silent failures
- Some apps auto-update but fail quietly when corporate proxies or permissions block them.
- Lesson 2460 — Third-Party and Application Patching
- Silent Operation
- Spyware avoids obvious symptoms that might alert users.
- Lesson 1523 — Spyware and Information Stealers
- SIM swapping
- is when an attacker convinces your mobile carrier (through social engineering or insider help) to transfer your phone number to a SIM card they control.
- Lesson 742 — SMS and Email-Based 2FA Weaknesses
- Similar task objectives
- – Classification models optimize for similar decision surfaces
- Lesson 2817 — Transferability of Adversarial Examples
- SIMON and SPECK
- are NSA-designed cipher families optimized for both hardware and software implementations.
- Lesson 2793 — Lightweight Cryptographic Algorithms
- Simple deployments
- with a small number of secrets
- Lesson 1318 — Environment Variables as a Secrets Storage Mechanism
- Simple example scoring
- Lesson 1002 — Query Cost Analysis and Rate Limiting
- Simple increments
- Starting at `1000` and adding 1 each time
- Lesson 814 — Sequential and Predictable Identifiers
- Simple Power Analysis (SPA)
- , where distinctive operation patterns become visible in a single trace.
- Lesson 2772 — Side-Channel Attacks: Power Analysis
- Simple requests
- go through immediately if they meet basic criteria (like GET or POST with standard headers).
- Lesson 859 — CORS Basics and Preflight Requests
- Simpler design
- No complex Galois field mathematics like GCM; just addition, rotation, and XOR operations
- Lesson 127 — ChaCha20-Poly1305
- Simpler implementation
- fewer opportunities for side-channel attacks
- Lesson 238 — EdDSA and Modern Signature Standards
- Simpler logic
- You define "good" once, rather than trying to enumerate all possible "bad"
- Lesson 1150 — Allowlist vs Denylist Approaches
- Simplicity
- Operations are mathematically elegant and efficient
- Lesson 89 — AES: Rijndael Selection and Design
- Simplified auditing
- VPC Flow Logs capture traffic at the transit gateway level
- Lesson 1838 — Transit Gateway Architecture
- Simplified offboarding
- revoke access at the IdP, not in every cloud account
- Lesson 1733 — Federation and Temporary Credentials
- Simplified Rule Management
- You can define sets, dictionaries, and variables, making complex rules cleaner and easier to update.
- Lesson 443 — nftables Architecture and Improvements
- Simplifies audits
- Auditors can focus on clearly defined boundaries
- Lesson 453 — Segmentation for Compliance
- Simplifies monitoring
- you watch one critical gateway instead of dozens of paths
- Lesson 29 — Security Choke Points
- Simplifies onboarding/offboarding
- Add or remove a user from a group rather than managing dozens of individual permissions
- Lesson 1428 — Group Management and Role Separation
- Simulate Real Adversaries
- Lesson 2169 — Red Team Operations and Objectives
- Simulated attacks
- (unannounced phishing tests, social engineering drills)
- Lesson 2287 — Security Awareness Training Fundamentals
- Simulation and Lab Environments
- Lesson 434 — Rule Testing and Validation
- Simultaneous form submissions
- Submitting the same form multiple times before the first submission completes
- Lesson 917 — Concurrent Workflow Exploitation
- Single connection dependency
- One compromised connection affects all multiplexed streams
- Lesson 1097 — HTTP/2 Protocol Architecture and Security Model
- Single Crack Mode
- Uses login names and GECOS information to generate intelligent guesses—perfect when you have username context.
- Lesson 2231 — John the Ripper Techniques
- Single Logout
- means when you log out from one place, you're logged out everywhere:
- Lesson 775 — OIDC Session Management and Single Logout
- Single session only
- (logging in elsewhere terminates previous sessions)
- Lesson 710 — Concurrent Sessions and Device Management
- Single Sign-On (SSO)
- , users authenticate once to the IdP and receive a token proving their identity.
- Lesson 1698 — Identity Federation and Single Sign-On
- single source of truth
- and never trusting that clients follow the rules.
- Lesson 919 — Defensive Workflow State ManagementLesson 2625 — Remediation Tracking and Reporting
- Single-entry enforcement
- One badge swipe = one person passes
- Lesson 2282 — Mantrap and Turnstile Controls
- Single-Use Enforcement
- Once a token is used successfully, immediately invalidate it in your session storage.
- Lesson 753 — Magic Links and One-Time Codes
- Single-use limitation
- Each garbled circuit can only be evaluated once securely
- Lesson 258 — Garbled Circuits for Two-Party Computation
- Singles
- are self-contained, complete payloads that don't need additional components.
- Lesson 2195 — Exploit Modules and Payloads
- Sink detection
- Where dangerous operations happen (SQL execution, HTML rendering, file access)
- Lesson 1362 — SAST Rule Sets and Vulnerability Detection
- Sinks
- Monitor sensitive operations that could be exploited
- Lesson 1381 — Data Flow Analysis and Taint Tracking
- Site Cloner
- Automatically clones any website you specify by URL, making it ideal for targeting organization- specific portals and custom applications.
- Lesson 2246 — Credential Harvester and Attack Vectors
- Site Defacement
- Lesson 629 — Why XSS is Dangerous: Impact and Consequences
- Site Isolation
- ensures that different origins run in completely separate processes.
- Lesson 1054 — Browser Security Features and Isolation
- site map
- , giving you unified visibility across your testing session.
- Lesson 2205 — Burp Suite Architecture and ComponentsLesson 2208 — Target Scope and Site Map Management
- site-to-site VPN
- creates an encrypted tunnel between two entire networks—not individual users.
- Lesson 468 — Site-to-Site VPNsLesson 1840 — VPN Connections to Cloud
- Size
- Large CAs may revoke thousands of certificates—the list grows constantly
- Lesson 191 — Certificate Revocation Lists (CRLs)
- Size Reduction
- Remove inputs that don't add unique coverage.
- Lesson 1393 — Corpus Management and Minimization
- Size-based
- Rotate when a log reaches 100MB
- Lesson 1470 — Log Rotation and RetentionLesson 1484 — Log Rotation and Retention Policies
- SLA Compliance Tracking
- Lesson 3038 — Vulnerability Management Dashboards
- SLA expectations
- security reviews shouldn't become bottlenecks, so establish timeframes (e.
- Lesson 2064 — Security Sign-Off and Approval Workflows
- Slack space
- is the unused portion between a file's actual end and the end of its allocated cluster.
- Lesson 2402 — File Carving and Deleted File Recovery
- SLE
- $500,000 per breach (legal fees, notification costs, downtime)
- Lesson 2512 — Calculating Annualized Loss Expectancy (ALE)
- SLE (Single Loss Expectancy)
- The monetary loss from a single incident
- Lesson 2512 — Calculating Annualized Loss Expectancy (ALE)
- Sliding window
- Track usage over rolling time periods to prevent burst attacks
- Lesson 1002 — Query Cost Analysis and Rate Limiting
- Slow down timing
- Spread requests over time to avoid pattern detection
- Lesson 366 — Stealth Scanning Fundamentals
- Slow enough
- that breaking preimage resistance or finding collisions requires astronomical computational resources
- Lesson 205 — Computational Efficiency Requirements
- Slower encryption/decryption
- Modular exponentiation operations grow cubically with key size
- Lesson 144 — RSA Key Sizes and Security Strength
- Slower key generation
- Finding sufficiently large primes takes more time
- Lesson 144 — RSA Key Sizes and Security Strength
- SLSA
- (Supply-chain Levels for Software Artifacts, pronounced "salsa") is a security framework that defines graduated levels of supply chain integrity.
- Lesson 1300 — Package Provenance and SLSALesson 1650 — Supply Chain Levels for Software Artifacts (SLSA)
- SLSA 1
- Build process is documented and generates provenance metadata
- Lesson 1650 — Supply Chain Levels for Software Artifacts (SLSA)
- SLSA 2
- Version control and hosted build service with authenticated provenance
- Lesson 1650 — Supply Chain Levels for Software Artifacts (SLSA)
- SLSA 3
- Hardened build platforms that prevent tampering during builds
- Lesson 1650 — Supply Chain Levels for Software Artifacts (SLSA)
- SLSA 4
- Two-person review and hermetic, reproducible builds
- Lesson 1650 — Supply Chain Levels for Software Artifacts (SLSA)
- SLSA Level 0
- No guarantees—anyone could have built this package anywhere
- Lesson 1300 — Package Provenance and SLSA
- SLSA Level 1
- Build process is documented and provenance exists
- Lesson 1300 — Package Provenance and SLSA
- SLSA Level 2
- Builds use version control and are signed with cryptographic attestations
- Lesson 1300 — Package Provenance and SLSA
- SLSA Level 3
- Source and build platforms are hardened against tampering
- Lesson 1300 — Package Provenance and SLSA
- SLSA Level 4
- Highest assurance with two-person review and hermetic builds
- Lesson 1300 — Package Provenance and SLSA
- Small subgroup attacks
- exploit weak group parameters.
- Lesson 159 — Small Subgroup and Invalid Curve Attacks
- Small ε (e.g., 0.1-1.0)
- Strong privacy protection, individual records heavily obscured
- Lesson 2913 — The Formal Definition of Differential Privacy
- Small-screen obfuscation
- URLs and sender details harder to verify on mobile displays
- Lesson 2700 — User Behavior and Social Engineering
- Smaller attack surface
- Parsers are simpler and less prone to bugs
- Lesson 1191 — Alternative Serialization FormatsLesson 2795 — DTLS and TLS 1.3 for IoT
- Smaller certificates
- ECDSA certificates are compact, reducing bandwidth
- Lesson 170 — ECC in Practice: TLS and Beyond
- Smaller keys
- 256-bit ECDSA vs 3072-bit RSA means faster transmission and less storage
- Lesson 227 — ECDSA: Elliptic Curve Digital Signature Algorithm
- Smishing
- (SMS phishing) and **vishing** (voice phishing) exploit the immediacy and trust people place in text messages and phone calls.
- Lesson 2259 — Smishing and Vishing
- Smuggle a malicious request
- that targets a popular, cacheable resource (like `/index.
- Lesson 1109 — Exploiting Smuggling for Web Cache Poisoning
- Snapshot Before Action
- Create an immediate snapshot of the instance's storage volumes.
- Lesson 1908 — Instance Isolation and Containment
- Snapshot encryption
- inherits the volume's encryption state
- Lesson 1770 — Encryption for Block Storage and Virtual Disks
- Snapshot everything
- – Take disk snapshots of compromised instances before any changes
- Lesson 1906 — Evidence Preservation in Cloud EnvironmentsLesson 2086 — Setting Up a Testing Environment
- Snapshot everything first
- Create disk snapshots, export logs to immutable storage, and tag resources with "DO NOT DELETE" policies before analysis.
- Lesson 1915 — Evidence Identification and Preservation in Cloud
- Snapshot Length
- Capture only the first N bytes of each packet (e.
- Lesson 383 — Packet Capture Performance and Ring Buffers
- Snapshot retention policies
- Keep multiple recovery points based on RPO requirements
- Lesson 1931 — Instance Termination Protection and Data Persistence
- Snapshot/AMI exposure
- Forgotten credentials or keys in disk images
- Lesson 1923 — Cloud VM Threat Model and Attack Surface
- snapshots
- (point-in-time copies of storage volumes) and **images** (VM instance configurations and disks) to preserve evidence.
- Lesson 1916 — Snapshot and Image AcquisitionLesson 1928 — Encrypted Storage and SnapshotsLesson 2386 — Cloud and Virtual Environment Evidence
- Snapshots and AMIs
- containing private subnet configurations
- Lesson 1818 — VPC Deletion and Cleanup Security
- Sniffing & Spoofing
- Traffic capture and manipulation
- Lesson 2188 — Kali Tool Categories and Organization
- Sniffing IoT protocols
- means capturing raw network traffic using tools like Wireshark or tcpdump, then dissecting packet structures to understand message formats, authentication tokens, and command sequences.
- Lesson 2788 — Protocol-Level Attacks and Reconnaissance
- Snowflake
- uses temporary WebRTC connections through volunteer browsers as proxies.
- Lesson 2996 — Pluggable Transports and Obfuscation
- Snyk
- Lesson 1264 — Automated Dependency Scanning ToolsLesson 1302 — Dependency Scanning Tools Overview
- SOC 2
- , **PCI DSS**, **HIPAA**, and **ISO 27001**.
- Lesson 2004 — Core CSPM CapabilitiesLesson 2007 — Compliance Benchmarks and MappingLesson 2617 — Framework Mapping and Harmonization
- SOC 2 report
- think of it as your organization's security transcript.
- Lesson 2599 — SOC 2 Reports and Continuous Compliance
- SOC 2 Reports
- (lesson 2599) and **ISO 27001 ISMS** (lessons 2600-2609) from periodic assessments into living, breathing compliance programs.
- Lesson 2622 — Continuous Compliance Monitoring
- SOC 2 Type II
- , **ISO 27001**, or **PCI DSS** (for payment processors).
- Lesson 2536 — Due Diligence and Vendor Selection
- SOC analyst reports
- Tactical IOCs, detection logic, and response procedures
- Lesson 2343 — Threat Intelligence Analysis and Reporting
- SOC maturity model
- is a structured framework that evaluates how advanced your Security Operations Center is across key functional areas.
- Lesson 2313 — SOC Maturity Models
- SOC workflows
- you've learned—analysts rely on SIEM alerts and dashboards as their primary tool for threat detection and investigation.
- Lesson 2314 — What is a SIEM and Why Organizations Need It
- Socat
- is netcat's more powerful cousin, supporting encryption, multiple protocols, and advanced connection handling.
- Lesson 2236 — Netcat and Socat for Network Pivoting
- Social engineer actions
- through fake security warnings or prize announcements
- Lesson 1087 — Web Push Notifications and Permissions
- Social engineering
- amplifies these attacks: phishing emails with "invoice.
- Lesson 2116 — Client-Side Exploitation Techniques
- Social Engineering Toolkit (SET)
- focuses exclusively on phishing, credential harvesting, and client-side attacks.
- Lesson 2216 — Exploitation Framework LandscapeLesson 2251 — QR Code and USB Drop Attack Tools
- Social graph data
- Contact lists, group memberships, interaction frequencies
- Lesson 2974 — What is Metadata and Why It Matters
- Social media
- LinkedIn, Twitter, Facebook (public profiles only)
- Lesson 327 — OSINT Fundamentals and Information SourcesLesson 2254 — Spear Phishing and Targeted Attacks
- Social mistakes
- Reusing usernames, discussing circumvention publicly
- Lesson 2998 — Operational Security for Circumvention
- social networks
- , **collaborative platforms**, and **hierarchical organizations** where:
- Lesson 800 — Relationship-Based Access Control (ReBAC)Lesson 2974 — What is Metadata and Why It Matters
- Social pressure
- Creating situations where denying entry seems rude ("I forgot my badge upstairs")
- Lesson 2272 — Tailgating and Piggybacking Attacks
- Societal harm
- Erosion of trust, chilling effects on behavior
- Lesson 2891 — Privacy Risk Assessment Methodology
- SOCKS
- (Socket Secure) is a protocol that forwards network packets between client and server through a proxy.
- Lesson 2994 — Proxy Chains and SOCKS
- SOCKS (Socket Secure)
- is a protocol that creates a tunnel between your machine and a proxy server.
- Lesson 2241 — Proxychains and SOCKS Tunneling
- Soft gates
- Generate warnings or require manual approval (medium severity issues)
- Lesson 2065 — Automated Security Gates in CI/CD
- Soft multi-tenancy
- uses Kubernetes namespaces to separate workloads from teams you trust (like different departments in your company).
- Lesson 1976 — Multi-Tenancy and Cluster Isolation
- Soft-fail
- means: "If I can't check revocation status, accept the certificate anyway.
- Lesson 196 — Revocation Checking Failures and Soft-Fail
- SOFTWARE
- Holds installed applications, auto-start locations, and program execution timestamps
- Lesson 2403 — Registry Analysis for Windows Forensics
- Software Composition Analysis
- (you learned this in lesson 3011) by focusing specifically on containerized artifacts and their runtime configuration, not just application dependencies.
- Lesson 3012 — Container and Image Scanning
- Software Composition Analysis (SCA)
- examines your dependencies—libraries, packages, and containers—for known vulnerabilities.
- Lesson 3008 — Automated Security Testing Overview
- Software performance
- On devices without AES hardware acceleration (like smartphones or IoT devices), ChaCha20- Poly1305 is significantly faster than AES-GCM
- Lesson 127 — ChaCha20-Poly1305
- Software supply chain
- Third-party libraries, open-source dependencies, and development tools your vendors use
- Lesson 2540 — Fourth-Party and Supply Chain Risk
- Software updates
- App stores sign downloads so you know they're legitimate
- Lesson 225 — Digital Signature Fundamentals and Use Cases
- Software versions
- `apache 2.
- Lesson 333 — Shodan and Internet-Wide Scanning DatabasesLesson 334 — Email Harvesting and Metadata ExtractionLesson 358 — Banner Grabbing FundamentalsLesson 1040 — Error Handling and Information Disclosure
- Software-Defined Networks (SDN)
- decouple network control from physical hardware, letting you deploy firewall policies dynamically across thousands of virtual machines without touching a physical switch.
- Lesson 426 — Virtual Firewalls and Cloud Architectures
- Software-defined perimeters
- that wrap individual workloads with policy enforcement points
- Lesson 2679 — Zero Trust Network Segmentation
- SolarWinds Network Topology Mapper
- , **Spiceworks**, and **LANsurveyor** offer:
- Lesson 356 — Automated Network Mapping Tools
- Solder debug interfaces
- (UART, JTAG) to access bootloaders and root shells
- Lesson 2755 — Physical Security Threats to IoT Devices
- Solve algebraically
- Use basic linear algebra (Gaussian elimination or matrix inversion) to extract exact model parameters.
- Lesson 2829 — Equation-Solving Attacks on Linear Models
- Something you are
- – biometric identifiers like your fingerprint, face, or voice
- Lesson 738 — Multi-Factor Authentication FundamentalsLesson 1697 — Strong Authentication for Cloud Identity
- Something you have
- – a physical device like your phone, a security token, or a smart card
- Lesson 738 — Multi-Factor Authentication FundamentalsLesson 1697 — Strong Authentication for Cloud Identity
- Something you know
- – passwords, PINs, security questions, or passphrases
- Lesson 738 — Multi-Factor Authentication FundamentalsLesson 1697 — Strong Authentication for Cloud Identity
- Somewhat HE
- Limited number of operations before noise accumulates
- Lesson 249 — Homomorphic Encryption Fundamentals
- Somewhat Homomorphic Encryption (SHE)
- supports both addition AND multiplication, but only a limited number of times.
- Lesson 250 — Types of Homomorphic Encryption
- SOPs
- govern *general SOC processes*: how to handle shift handoffs, when to escalate to Tier 2, how to classify alert severity, ticketing procedures, and communication protocols.
- Lesson 2311 — Playbooks and Standard Operating Procedures
- Sort them chronologically
- using sequence numbers
- Lesson 377 — TCP Stream Analysis and Session Reconstruction
- Source
- Where is the traffic coming from?
- Lesson 429 — Explicit Allow RulesLesson 900 — Monitoring and Detection of SSRF AttemptsLesson 1475 — syslog Protocol and Standards
- Source and destination addresses
- even for local subnet traffic
- Lesson 1584 — Host-Based Firewall Architecture and Purpose
- Source and destination IPs
- (internal, external, specific ranges)
- Lesson 459 — Writing Effective IDS/IPS Rules
- Source computers
- Forward events matching subscription criteria using the Windows Remote Management (WinRM) protocol
- Lesson 1510 — Windows Event Forwarding (WEF) and Collection
- Source identification
- Where untrusted data enters (user input, file reads, network requests)
- Lesson 1362 — SAST Rule Sets and Vulnerability Detection
- Source IP preservation
- Services see your private IP, enabling network-level access controls
- Lesson 1846 — VPC/VNet Service Endpoints Fundamentals
- Source NACL
- Does it permit outbound *and* inbound ephemeral responses?
- Lesson 1826 — Common Misconfigurations and Troubleshooting
- Source Port Manipulation
- makes your traffic appear to come from trusted ports (like port 53 for DNS or 80 for HTTP).
- Lesson 347 — Firewall and IDS Evasion
- Source restrictions
- Don't allow "any" source when you can specify exact IP addresses or subnets
- Lesson 430 — Least Privilege Network Access
- Source Security Group
- Does it allow outbound traffic to the destination?
- Lesson 1826 — Common Misconfigurations and Troubleshooting
- Source-initiated
- Computers push logs to the collector (scalable for large environments)
- Lesson 1510 — Windows Event Forwarding (WEF) and Collection
- Sources
- Identify where untrusted data enters (user input, external APIs)
- Lesson 1381 — Data Flow Analysis and Taint Tracking
- SOX
- 7 years for financial system logs
- Lesson 1490 — Log Management for ComplianceLesson 1984 — Industry-Specific Cloud Compliance
- SPAN ports
- (Switched Port Analyzer, also called port mirroring).
- Lesson 463 — Network TAPs vs SPAN Ports
- SPD → SA workflow
- Lesson 475 — Security Associations (SA) and Security Policy Database
- spear phishing
- is the sniper rifle of social engineering.
- Lesson 2254 — Spear Phishing and Targeted AttacksLesson 2275 — Dumpster Diving and Waste Exploitation
- Special Character Attacks
- Lesson 970 — Filename Length and Special Character Attacks
- Specialization Paths
- Web application testing, network infrastructure, wireless security, mobile application testing, red teaming, or cloud security.
- Lesson 2089 — Penetration Testing Career Paths
- Specialized hardware needs
- Often requires powerful servers, not consumer devices
- Lesson 253 — Performance Characteristics and Limitations
- Specialized solutions
- Magnet AXIOM Cyber, SANS SIFT Cloud Edition
- Lesson 1922 — Cloud Forensics Tools and Legal Considerations
- Specialized training
- supports specific roles—incident responders train on the Incident Response Policy, HR on data classification, IT on change management procedures.
- Lesson 2495 — Policy Communication and Training Requirements
- Specific
- `read:email` is better than `profile`
- Lesson 761 — OAuth 2.0 Scopes and ConsentLesson 2030 — Security User StoriesLesson 2164 — Remediation RecommendationsLesson 2526 — Designing Effective Security MetricsLesson 2556 — Consent Requirements and ManagementLesson 2932 — Consent Requirements and Valid Consent
- Specific cloud resources
- identified by name or tag
- Lesson 2091 — Scoping In-Scope vs Out-of-Scope Assets
- Specific columns
- are encrypted before being written to storage
- Lesson 1794 — Column-Level and Field-Level Encryption
- Specific details
- obtained through reconnaissance (elicitation techniques)
- Lesson 2269 — Vishing and Phone-Based Pretexting
- Specific objectives
- Simulate a particular adversary group's tactics (e.
- Lesson 2171 — Adversary Emulation vs Penetration Testing
- Specific queries
- Add paths like `iam/security-credentials/role-name` or `instance-id`
- Lesson 1933 — IMDS Endpoints and Access Patterns
- Speed
- AES-NI accelerates encryption by 3-10× compared to software implementations.
- Lesson 94 — Hardware Acceleration and AES-NILesson 170 — ECC in Practice: TLS and BeyondLesson 215 — Specialized Hash Functions: BLAKE2, BLAKE3Lesson 1301 — Automated Package Verification WorkflowsLesson 2059 — Security Automation and OrchestrationLesson 3018 — Policy as Code Fundamentals
- Speed matters
- Security checks must complete quickly enough to fit within typical build times.
- Lesson 2057 — Continuous Security Integration
- Speed vs. Detection
- Aggressive scans are fast and comprehensive but scream "I'm here!
- Lesson 366 — Stealth Scanning Fundamentals
- SPF alignment
- The domain in the envelope "Mail From" must match the visible "From" header
- Lesson 2302 — DMARC Configuration and Alignment
- SPL
- (Splunk Processing Language), and **SQL-like** languages to search, filter, and correlate security events from cloud logs.
- Lesson 1882 — Cloud SIEM Query Languages
- Split
- the input block into left half (L₀) and right half (R₀)
- Lesson 86 — Feistel Network Architecture
- Split Tunnel Considerations
- Lesson 508 — DNS Leak Prevention
- Split tunneling
- lets you choose: send work traffic through the VPN, but stream Netflix directly through your local connection.
- Lesson 491 — Client Configuration and Split TunnelingLesson 1840 — VPN Connections to Cloud
- Split Tunneling Confusion
- If clients can't reach specific networks, verify your push routes and split tunnel settings align with what you configured in client configuration lessons.
- Lesson 492 — Troubleshooting and Monitoring OpenVPN Connections
- Split-key approaches
- Backup key split between user passphrase and secure hardware, requiring both for restoration
- Lesson 2947 — E2EE Backup and Multi-Device
- Splunk
- and some cloud SIEM platforms.
- Lesson 1882 — Cloud SIEM Query LanguagesLesson 3043 — Dashboard Tools and Integration
- sponge construction
- imagine a sponge that absorbs water, then squeezes it back out:
- Lesson 210 — SHA-3 and the Keccak AlgorithmLesson 224 — Alternative MAC Constructions: KMAC and Poly1305
- Spontaneous Groups
- The signer can form a ring without asking permission from other members
- Lesson 236 — Ring Signatures and Group Anonymity
- Spoof or randomize
- Make scans look like they come from different sources
- Lesson 366 — Stealth Scanning Fundamentals
- Spoofed sender address
- that mimics legitimate domains (often with subtle misspellings)
- Lesson 2253 — Email-Based Phishing Fundamentals
- Spoofing
- (pretending to be that entity) matters most—you typically don't control external entities to prevent other threats.
- Lesson 62 — STRIDE per Element AnalysisLesson 64 — Creating STRIDE Threat TablesLesson 66 — STRIDE Mitigations and ControlsLesson 76 — Collaborative Threat Modeling WorkshopsLesson 83 — Developer Training on Threat ModelingLesson 2640 — Applying STRIDE at Architecture Level
- Spot early threats
- – Could attackers spoof identities?
- Lesson 77 — Threat Modeling in Requirements Phase
- Spring (Java)
- Lesson 930 — Mass Assignment in Different Frameworks
- Spyware
- Steals information (credentials, browsing habits, keystrokes)
- Lesson 1518 — Malware Taxonomy and Classification Criteria
- SQL Injection
- Database commands in search boxes
- Lesson 1148 — Why Input Validation MattersLesson 1372 — Active Scanning and Attack SimulationLesson 3010 — Dynamic Application Security Testing (DAST) Deep Dive
- SQL Injection rules
- detect when user input flows into database queries without sanitization
- Lesson 1362 — SAST Rule Sets and Vulnerability Detection
- SQL-like
- languages to search, filter, and correlate security events from cloud logs.
- Lesson 1882 — Cloud SIEM Query Languages
- SQL/NoSQL Injection
- Targets the database layer, manipulating queries
- Lesson 602 — Command Injection Fundamentals
- SQLiPy
- or **Copy as SQLMap command** let you:
- Lesson 591 — Burp Suite SQL Injection Scanner Extensions
- Squeezing phase
- Once all input is absorbed, you "squeeze" output bits from the rate portion until you have the desired hash length
- Lesson 210 — SHA-3 and the Keccak Algorithm
- SRAM PUFs
- Use power-up states of memory cells
- Lesson 2777 — Hardware Cloning and Counterfeit Prevention
- SS7 (Signaling System 7)
- protocol routes SMS messages between carriers globally.
- Lesson 742 — SMS and Email-Based 2FA Weaknesses
- SSE-C (Customer-Provided Keys)
- Lesson 1765 — Server-Side Encryption in Cloud Storage
- SSE-KMS (Key Management Service)
- Lesson 1765 — Server-Side Encryption in Cloud Storage
- SSE-S3 (Provider-Managed Keys)
- Lesson 1765 — Server-Side Encryption in Cloud Storage
- SSID analysis
- Detecting typo-squatted network names similar to your legitimate SSID
- Lesson 549 — Rogue AP Detection Techniques
- SSL stripping
- solves this problem (from an attacker's perspective) by *downgrading* the connection.
- Lesson 395 — SSL Stripping AttacksLesson 2243 — Bettercap for MitM and Network Attacks
- SSL/TLS complexity
- Managing certificates across hundreds of global nodes
- Lesson 1862 — CDN Architecture and Threat Model
- SSRF Attacks
- Referencing internal network resources to probe infrastructure
- Lesson 976 — PDF Processing VulnerabilitiesLesson 1735 — Credential Theft and Token SecurityLesson 1934 — IMDSv1 vs IMDSv2 Security ImprovementsLesson 1963 — XML External Entities and Insecure Deserialization
- SSRF via Redirect Chaining
- Lesson 1143 — Open Redirect Impact and Exploitation
- SSRF vulnerabilities
- combined with internal service misconfigurations
- Lesson 2106 — Chaining Vulnerabilities for Impact
- ST (State/Province)
- Full state or province name (`California`)
- Lesson 172 — Certificate Fields: Subject and Issuer Distinguished Names
- Stack layout
- buffer → saved frame pointer → **return address**
- Lesson 2108 — Memory Corruption Exploits: Buffer Overflows
- Stack multiple restrictions
- that should be mutually exclusive
- Lesson 922 — Coupon and Discount Code Abuse
- Stack Traces
- Full call stacks expose your code structure, file paths, and dependency versions—all valuable reconnaissance data.
- Lesson 1007 — GraphQL Error Handling and Information LeakageLesson 1040 — Error Handling and Information Disclosure
- Stacked queries
- allow an attacker to append additional SQL statements to an existing query using the semicolon (`;`) separator—turning a simple read operation into a full-blown database manipulation attack.
- Lesson 580 — Stacked Queries and Multiple Statements
- Stacking Restrictions
- Applying multiple coupons when business rules should limit to one, or combining incompatible discounts (e.
- Lesson 922 — Coupon and Discount Code Abuse
- Stage 1 - Storage
- An attacker submits malicious input through a form that *does* sanitize input before inserting into the database.
- Lesson 581 — Second-Order SQL Injection
- Stage 2 - Exploitation
- Later, when the application retrieves this "safe" stored data and incorporates it into a new SQL query *without sanitization* (assuming it's already safe because it came from the database), the injection executes.
- Lesson 581 — Second-Order SQL Injection
- Stage III: Application Decomposition
- – Break down components, trust boundaries, and entry points (using concepts you know).
- Lesson 69 — PASTA (Process for Attack Simulation and Threat Analysis)
- Stage IV: Threat Analysis
- – Identify threats using frameworks like STRIDE, attacker personas, and attack trees.
- Lesson 69 — PASTA (Process for Attack Simulation and Threat Analysis)
- Stage V: Vulnerability Analysis
- – Find weaknesses (code flaws, misconfigurations, design issues).
- Lesson 69 — PASTA (Process for Attack Simulation and Threat Analysis)
- Stage VI: Attack Modeling
- – Simulate realistic attack paths using attack trees/graphs—how would adversaries exploit vulnerabilities?
- Lesson 69 — PASTA (Process for Attack Simulation and Threat Analysis)
- Staged deployment
- Test heavily in sandboxed environments before production
- Lesson 2877 — Malicious Pre-trained Models
- Stagers
- are small initial payloads designed to establish a connection back to your machine, then download the rest of the payload (the stage).
- Lesson 2195 — Exploit Modules and Payloads
- Stages
- are the larger, feature-rich payloads delivered *after* the stager succeeds.
- Lesson 2195 — Exploit Modules and Payloads
- Stakeholder Review
- – Circulate to affected departments (IT, HR, Legal, Business Units) for feedback
- Lesson 2494 — Policy Development and Approval Process
- Standard compliance
- `frame-ancestors` is part of CSP Level 2 and supported by modern browsers.
- Lesson 1136 — Content-Security-Policy frame-ancestors Directive
- Standard Contractual Clauses (SCCs)
- – pre-approved contract templates
- Lesson 1982 — GDPR and Data Sovereignty Requirements
- Standard Scopes
- The `openid` scope triggers OIDC behavior; optional scopes like `profile` and `email` request specific claims
- Lesson 769 — OpenID Connect Overview and Relationship to OAuth 2.0
- Standard tier
- Tuned to your VNet resources, adaptive real-time tuning, attack analytics, and cost guarantees during attacks
- Lesson 1857 — Cloud DDoS Protection Services
- Standard web apps
- 30-60 minute idle timeout, 8-24 hour absolute
- Lesson 733 — Session Timeout Configurations
- Standardization
- Define approved configurations for each system type (web servers, databases, workstations)
- Lesson 1617 — Configuration Management Fundamentals
- Standardized schemas
- where possible (industry-specific formats)
- Lesson 2935 — Right to Access and Data Portability
- Standards
- Many security frameworks and compliance requirements reference it
- Lesson 1200 — History and Purpose of the OWASP Top 10Lesson 2488 — Policy Hierarchy: Policies, Standards, Procedures, Guidelines
- Start broad
- Identify all external actors and entry points
- Lesson 2637 — Creating Architecture Data Flow Diagrams
- Start conservatively with DMARC
- Begin with `p=none` to collect reports without blocking mail.
- Lesson 2304 — Email Authentication Best Practices and Common Pitfalls
- Start permissive
- (warn-only mode) while establishing baselines
- Lesson 2052 — Security Gates and Failure Policies
- Start restrictive
- Begin with zero or minimal permissions.
- Lesson 1706 — Least Privilege Principle in Cloud IAM
- Start with trust boundaries
- These are your highest-risk zones.
- Lesson 44 — Identifying Threats from Diagrams
- Starts at entry points
- – Usually your homepage or login page
- Lesson 1371 — Crawling and Application Discovery
- startup folders
- where any executable, script, or shortcut placed inside will automatically run when a user logs in.
- Lesson 1540 — Startup Folders and Shell ExtensionsLesson 2134 — Scheduled Tasks and Startup Persistence Exploitation
- Startup vs runtime failures
- At startup, fail fast if secrets are unavailable; during runtime, use cached values and alert
- Lesson 1334 — Secret Store Access Patterns
- State Blindness
- An API allows document editing if the user is an author, but fails to check whether the document is in "published" state where editing should be locked.
- Lesson 812 — Context-Dependent Authorization Failures
- State compromise
- If an attacker learns the internal state (through memory dumps, side channels, or bugs), they can predict all future outputs
- Lesson 291 — PRNG State and Reseeding
- State consistency
- Can a user cancel an order that's already shipped?
- Lesson 1154 — Semantic and Business Logic Validation
- state file
- acts as a record of truth—tracking every resource deployed, their configurations, and relationships.
- Lesson 2016 — Secure State Management and Backend ConfigurationLesson 3004 — IaC State File Security
- State Forcing
- Manipulate parameters or session data to claim you're in a different workflow state than you actually are.
- Lesson 938 — Testing State and Workflow Violations
- State inference
- Lesson 1949 — Serverless Cold Start and Timing Side Channels
- State machine abuse
- Applications transition through states (guest → authenticated → admin).
- Lesson 2103 — Logic Flaw and Business Logic Testing
- State Machines
- Explicitly defining valid states and allowed transitions so invalid state changes become impossible
- Lesson 910 — Idempotency and State Machine Design
- State maintenance
- Tracking CSRF tokens or other dynamic security mechanisms
- Lesson 1373 — Authentication and Session Handling in DAST
- State Management
- tracks where each remediation is in its lifecycle.
- Lesson 3045 — Remediation Workflows and Orchestration
- State transition
- – Move through intermediate states (order moves to "pending")
- Lesson 818 — Multi-Step IDOR Exploitation
- State transition validation
- Verify users can only move between valid states.
- Lesson 835 — Testing State-Based and Workflow Authorization
- State transitions
- (workflow steps, status changes)
- Lesson 838 — Access Control Defense StrategyLesson 937 — Mapping Business Workflows
- state-changing operations
- are especially dangerous because they violate REST principles and maximize attack surface.
- Lesson 848 — GET vs POST CSRF AttacksLesson 1103 — HTTP/3 0-RTT Replay Attacks
- State-level breach notification laws
- with varying timelines
- Lesson 1984 — Industry-Specific Cloud Compliance
- State-sponsored actors
- seek military secrets, political intelligence, diplomatic communications, or technological advantages for their governments
- Lesson 49 — Motivations: Espionage and Intelligence Gathering
- stateful
- when you allow inbound traffic, the response is automatically allowed back out—no explicit outbound rule needed.
- Lesson 1819 — Security Groups vs Network ACLs: Fundamental DifferencesLesson 1925 — Instance Security Groups and Network Isolation
- Stateful filtering
- tracks the *context* of network connections.
- Lesson 431 — Stateful vs Stateless Rules
- Stateful inspection firewalls
- solve this by maintaining a "memory" of active network connections.
- Lesson 418 — Stateful Inspection Firewalls
- Stateful schemes
- (like XMSS and LMS) work like a checkbook with numbered checks.
- Lesson 273 — Hash-Based Signatures: SPHINCS+ and Stateful Schemes
- Stateful signature schemes
- (like Lamport, Winternitz, or XMSS) achieve forward security using hash functions instead of hard math problems.
- Lesson 240 — Forward-Secure and Stateful Signatures
- Stateless
- Unlike some hash-based signatures, no state management required
- Lesson 271 — CRYSTALS-Dilithium: Post-Quantum Digital SignaturesLesson 703 — What is a Session and Why Web Apps Need ThemLesson 911 — Understanding Application State and WorkflowLesson 1819 — Security Groups vs Network ACLs: Fundamental DifferencesLesson 1824 — Ephemeral Ports and Stateless Filtering Challenges
- Stateless context
- Each invocation starts fresh, complicating rate limiting
- Lesson 1960 — Injection Vulnerabilities in Serverless
- Stateless cookie exchange
- prevents memory exhaustion attacks during handshake
- Lesson 2795 — DTLS and TLS 1.3 for IoT
- Stateless firewalls
- require careful rule pairs for bidirectional communication, making rule sets larger and more error-prone.
- Lesson 431 — Stateful vs Stateless Rules
- Stateless schemes
- (like SPHINCS+) solve the state problem using randomness and a tree-of-trees structure.
- Lesson 273 — Hash-Based Signatures: SPHINCS+ and Stateful Schemes
- Statement of Applicability (SoA)
- a mandatory ISO 27001 document.
- Lesson 2605 — Annex A Controls SelectionLesson 2606 — Statement of Applicability (SoA)Lesson 2607 — ISMS Documentation Requirements
- Statements
- The actual authentication/authorization/attribute data
- Lesson 778 — SAML Assertions and ClaimsLesson 1713 — Policy Structure: Elements, Syntax, and Evaluation Logic
- Static analysis
- Parse code to find dangerous patterns like `obj[key] = value` without `__proto__` checks
- Lesson 1197 — Detecting Prototype Pollution VulnerabilitiesLesson 2725 — Static Analysis of Mobile ApplicationsLesson 3030 — IaC Security Scanning
- Static analyzers
- scan your source code files for regex patterns and rate their safety.
- Lesson 1178 — Analyzing Regex Complexity with Tools
- Static IVs
- Generate unique initialization vectors for each encryption operation
- Lesson 2735 — Mobile Cryptography Best Practices
- Static MAC binding
- Manually specify which exact MAC addresses are allowed
- Lesson 414 — Port Security and MAC Filtering
- Static scoring
- Doesn't reflect evolving attacker interest or exploit availability
- Lesson 2446 — CVSS Score Interpretation and Limitations
- Statistical Analysis
- The system tracks metrics like packet rates, connection counts, protocol distributions, and payload sizes.
- Lesson 457 — Anomaly-Based Detection MethodsLesson 523 — WEP Attacks and Exploitation
- Statistical anomalies
- Does it have an unusually high entropy (randomness) suggesting encryption or packing?
- Lesson 1566 — Heuristic Analysis Techniques
- Statistical randomness
- means the numbers *look* random when you analyze them mathematically.
- Lesson 285 — Cryptographic vs Statistical Randomness
- Statistical sampling
- Generate new records by sampling from learned distributions
- Lesson 2909 — Synthetic Data Generation
- Status
- Granted or denied, and reason if denied
- Lesson 2286 — Physical Access Logging and Audit TrailsLesson 2506 — Risk Register Development
- Status tracking
- – Not started, in progress, completed, blocked
- Lesson 2523 — Risk Treatment Plans and PrioritizationLesson 2625 — Remediation Tracking and Reporting
- Status updates
- Every 2-4 weeks during active remediation
- Lesson 2077 — Coordinated Disclosure TimelinesLesson 2172 — Rules of Engagement for Team Exercises
- Stay in scope
- Testing out-of-scope systems is unauthorized access, potentially a felony
- Lesson 2084 — Legal and Ethical Considerations
- Stealth
- Victims simply browse normally; no suspicious URL is involved.
- Lesson 631 — Stored XSS: Persistent AttacksLesson 1120 — Cache Poisoning for XSS DeliveryLesson 1127 — Web Cache Poisoning via Host HeaderLesson 1553 — Bootkits and MBR PersistenceLesson 1758 — Credential Creation and Rotation Abuse
- stealth and persistence
- .
- Lesson 1524 — Backdoors and Remote Access Trojans (RATs)Lesson 2171 — Adversary Emulation vs Penetration Testing
- Stealthier
- Many older intrusion detection systems don't log incomplete connections, since no full TCP session was established
- Lesson 340 — SYN Scanning (Half-Open)
- Step 1 (Storage)
- Attacker submits username `admin'--` which gets safely stored in the database
- Lesson 1242 — Second-Order SQL Injection in ORMs
- Step 1: Hash Extraction
- Lesson 2233 — Cracking Password-Protected Files
- Step 1: Initial Assessment
- Verify the alert isn't a false positive by checking basic context: Is the source legitimate?
- Lesson 2344 — Alert Triage Fundamentals and Workflow
- Step 2 (Retrieval)
- Your code fetches that username: `user = User.
- Lesson 1242 — Second-Order SQL Injection in ORMs
- Step 2: Cracking
- Lesson 2233 — Cracking Password-Protected Files
- Step 2: Severity Classification
- Assign priority based on:
- Lesson 2344 — Alert Triage Fundamentals and Workflow
- Step 3: Enrichment
- Gather context from threat intelligence feeds, SIEM historical data, and asset databases.
- Lesson 2344 — Alert Triage Fundamentals and Workflow
- Step 4: Routing Decision
- Escalate to incident response, assign to deeper investigation, document and close (if false positive), or trigger automated SOAR playbooks.
- Lesson 2344 — Alert Triage Fundamentals and Workflow
- Step 6
- Use cookie manipulation to maintain persistent access
- Lesson 828 — Multi-Step Privilege Escalation Chains
- Step sequence bypass
- occurs when an application fails to verify that previous steps were actually completed before allowing access to later stages.
- Lesson 913 — Step Sequence Bypass Vulnerabilities
- Step Sequences
- Every action a user takes from start to finish (e.
- Lesson 937 — Mapping Business Workflows
- Step Skipping
- Try accessing later workflow steps directly without completing earlier ones.
- Lesson 938 — Testing State and Workflow Violations
- Step-up authentication
- requires additional factors only for sensitive operations (changing passwords, viewing financial data, large transfers).
- Lesson 749 — Implementing and Enforcing MFALesson 1699 — Continuous Identity Verification
- Sticky Bit
- On directories (like `/tmp`), only the file owner can delete their own files, preventing users from deleting others' files even with write permission to the directory.
- Lesson 1424 — Special Permission Bits: SUID, SGID, and Sticky
- Still enforce access control
- indirect references are not a substitute for authorization checks!
- Lesson 843 — Indirect Object References
- Stochastic layers
- Use dropout or noise injection during inference (not just training)
- Lesson 2852 — Ensemble and Randomization Defenses
- Stock management
- Multiple buyers purchasing the last few items
- Lesson 904 — Concurrency Issues in Inventory and Resource Allocation
- Stop before damage
- If you've found RCE, execute `whoami` or `hostname`, not `rm -rf /`
- Lesson 2163 — Proof of Concept Development
- Storage
- The website stores your public key; the private key never leaves the hardware device
- Lesson 744 — Hardware Security Keys and FIDO U2FLesson 745 — FIDO2 and WebAuthnLesson 763 — State Parameter and CSRF ProtectionLesson 2885 — End-to-End Security and Lifecycle Protection
- Storage and Encryption
- Secrets Manager stores your credentials, API keys, and other sensitive data encrypted at rest using AWS KMS (Key Management Service).
- Lesson 1328 — AWS Secrets Manager
- Storage and Integrity
- Lesson 2619 — Evidence Collection and Preservation
- Storage and security costs
- Protecting unnecessary data wastes resources
- Lesson 2894 — Data Minimization Principle
- Storage Concerns
- Lesson 1474 — Performance and Storage Considerations
- Storage considerations
- affecting the entire filesystem
- Lesson 945 — File Upload Attack Surface and Risk Assessment
- Storage constraints
- Balance retention duration against available disk space
- Lesson 1470 — Log Rotation and Retention
- Storage encryption
- transforms this data into ciphertext using cryptographic keys, ensuring only authorized users with the right keys can read it.
- Lesson 1928 — Encrypted Storage and Snapshots
- Storage Event API
- to detect authentication changes across tabs:
- Lesson 1094 — Session Management in Stateless SPAs
- Storage Layer
- Lesson 1878 — Cloud SIEM Architecture and Components
- Storage layers
- must handle massive write volumes (potentially millions of events/second) while supporting fast queries.
- Lesson 2315 — SIEM Architecture: Collectors, Aggregators, and Storage
- Storage Limitation
- Lesson 2553 — Data Processing Principles
- Storage quota measurements
- to detect if data exists
- Lesson 1077 — Cross-Tab and Cross-Origin Storage Attacks
- Storage risks
- even with proper hashing techniques covered in previous lessons
- Lesson 750 — Passwordless Authentication Fundamentals
- Storage Scalability
- Lesson 2323 — SIEM Performance Tuning and Scalability
- Storage security
- Store model files with strict permissions, separate from training code.
- Lesson 2874 — Model Artifact Security and Signing
- Storage-level
- Use separate databases or encrypted volumes per classification
- Lesson 2652 — Data Segmentation and Classification
- store
- , **mix**, and **distribute** that precious randomness—that's the **entropy pool**.
- Lesson 295 — Entropy Pool ManagementLesson 2383 — Disk Imaging and Forensic Copies
- Store additional payloads
- in browser storage (`localStorage`, `sessionStorage`) for future execution
- Lesson 646 — Persistent Backdoors via DOM Manipulation
- Store Credit Generation
- Systems that automatically issue store credit can be vulnerable to race conditions—imagine rapidly submitting the same refund request multiple times before the first completes, potentially receiving credit multiple times for one return.
- Lesson 925 — Refund and Credit Manipulation
- Store secrets
- in the secret manager (encrypted at rest)
- Lesson 1946 — Secrets and Environment Variables in Functions
- Store securely
- with tamper-evident seals and access logs
- Lesson 2398 — Disk Forensics Fundamentals and Chain of Custody
- Store the mapping
- between tokens and actual database IDs (in session, cache, or database)
- Lesson 843 — Indirect Object References
- Store-and-forward architecture
- emails pass through multiple servers before delivery
- Lesson 2958 — Email Encryption Fundamentals and S/MIME
- Stored XSS
- (also called Persistent XSS) occurs when an attacker's malicious script gets **saved** into a web application's database, file system, or other storage.
- Lesson 631 — Stored XSS: Persistent AttacksLesson 646 — Persistent Backdoors via DOM ManipulationLesson 647 — XSS Worms and Self-Propagating AttacksLesson 958 — MIME Type Sniffing and Security Implications
- Stores
- private keys in isolated memory protected by hardware encryption
- Lesson 2710 — Secure Enclave and Hardware Security
- Stores the encrypted DEK
- with the volume metadata
- Lesson 1770 — Encryption for Block Storage and Virtual Disks
- Straight mode
- (mode 0) feeds wordlists directly, while **Combination mode** (mode 1) merges two wordlists.
- Lesson 2230 — Hashcat Deep Dive
- Strange DNS responses
- Familiar domains resolving to unfamiliar IP addresses
- Lesson 410 — Signs of Network Interception
- Strategic tool placement
- means running fast checks early, expensive ones later.
- Lesson 3035 — Performance Optimization for Security Scans
- Strategically violate
- edge cases (oversized fields, missing required elements, nested structures)
- Lesson 1387 — Generation-Based Fuzzing
- Stream Dependency Manipulation
- Attackers can create complex dependency chains where Stream B depends on Stream A, Stream C depends on B, and so on.
- Lesson 1098 — HTTP/2 Stream Vulnerabilities and Attacks
- Stream multiplexing confusion
- Attackers may craft requests that exploit how servers prioritize or queue streams, potentially causing resource exhaustion
- Lesson 1097 — HTTP/2 Protocol Architecture and Security Model
- Stream Prioritization
- Each request gets a "stream ID" and can be assigned priority levels.
- Lesson 1097 — HTTP/2 Protocol Architecture and Security Model
- Streaming data
- (network packets, video) benefits from `CTR` or `GCM` modes because they don't require the entire message upfront and can parallelize encryption.
- Lesson 106 — Mode Selection for Different Scenarios
- Strength
- Can it withstand realistic attacker capabilities (work factor)?
- Lesson 2642 — Evaluating Architectural Security Controls
- Strengths
- Comprehensive licensing data, broad industry adoption, legal focus
- Lesson 1277 — SBOM Formats: SPDX, CycloneDX, and SWIDLesson 1359 — SAST vs DAST: Strengths and Limitations
- Strict Allowlists
- Lesson 984 — Content-Type and MIME Type Enforcement
- Strict password policies
- Enforced by default; administrators must explicitly weaken them
- Lesson 1217 — Secure Defaults and Opt-In Security
- Strict policy
- applies MAC to all processes system-wide—nothing runs unconfined.
- Lesson 1454 — SELinux Modes and Policy TypesLesson 2298 — SPF Record Syntax and Configuration
- Strict Protocol Validation
- Enforce RFC-compliant HTTP parsing and reject ambiguous requests.
- Lesson 1855 — WAF Evasion Techniques and Defense
- Strict schemas
- You define exactly which fields and types are allowed *before* deserialization happens
- Lesson 1191 — Alternative Serialization Formats
- Strict-Transport-Security (HSTS)
- Forces browsers to always use HTTPS when communicating with your API: `Strict-Transport- Security: max-age=31536000; includeSubDomains`.
- Lesson 1041 — API Security Headers and CORS
- STRIDE
- Best for structured software development teams analyzing technical components.
- Lesson 75 — Comparing Threat Modeling MethodologiesLesson 76 — Collaborative Threat Modeling WorkshopsLesson 78 — Architecture Review and Threat IdentificationLesson 2502 — Threat Identification and Modeling
- STRIDE Category
- Which threat type (Spoofing, Tampering, Repudiation, Information Disclosure, DoS, Elevation of Privilege)
- Lesson 64 — Creating STRIDE Threat Tables
- STRIDE per Element
- or **Attack Trees**.
- Lesson 76 — Collaborative Threat Modeling WorkshopsLesson 83 — Developer Training on Threat Modeling
- String concatenation
- `"SELECT * FROM users WHERE id = " + userId`
- Lesson 1234 — Database API Safety and Parameterization
- String Concatenation Differences
- Lesson 572 — Database Fingerprinting via SQL Injection
- String duplication
- Entity expansion creating gigabyte-sized strings
- Lesson 1188 — XML and JSON Parser Vulnerabilities
- String formatting
- `f"DELETE FROM posts WHERE author = '{username}'"`
- Lesson 1234 — Database API Safety and Parameterization
- Strip metadata
- Remove headers revealing server software, versions, or internal routing
- Lesson 898 — Response Handling and Information Disclosure
- Strip or sanitize metadata
- from uploaded files (as covered in image validation lessons)
- Lesson 963 — Polyglot Files and Multi-Format Attack Prevention
- Strip security headers
- to downgrade HTTPS to HTTP
- Lesson 388 — ARP Poisoning for Traffic Interception and Modification
- Strong authentication
- Built-in **identity verification** ensures members are who they claim to be
- Lesson 2950 — Message Layer Security (MLS) for Group Messaging
- Strong Encryption Algorithms
- Use industry-standard algorithms (AES-256, ChaCha20-Poly1305) that are computationally infeasible to break.
- Lesson 1317 — Encryption at Rest for Secret Storage
- Strong integrity
- Any bit-level modification is detectable
- Lesson 477 — Authentication Header (AH) Protocol
- Stronger authentication
- Enforce MFA once at the IdP
- Lesson 1698 — Identity Federation and Single Sign-On
- Stronger cipher suites
- that eliminate weaker legacy options
- Lesson 519 — WPA3-Enterprise and Enhanced Open
- Strongly-typed, compiled languages
- like Java, C#, and Go are ideal for SAST.
- Lesson 1364 — Language-Specific SAST Considerations
- Structural masking
- The result looks completely random—even encrypting the same message twice produces different ciphertext
- Lesson 146 — OAEP: Optimal Asymmetric Encryption Padding
- Structure the discussion
- Start with system context (what are we modeling?
- Lesson 76 — Collaborative Threat Modeling Workshops
- Structure your logs
- Use structured logging (JSON format) so you can programmatically filter fields.
- Lesson 1354 — Preventing Secrets in Logs and Error Messages
- Structured data storage
- Databases, file systems, and disk encryption benefit from modes like XTS or GCM
- Lesson 121 — Stream Ciphers vs Block Ciphers: When to Use Each
- Structured input fuzzing
- uses knowledge of the target's format—its grammar, schema, or protocol specification—to generate valid but unexpected inputs.
- Lesson 1390 — Structured Input Fuzzing
- Structured logging
- treats log entries as data objects with consistent fields, typically in JSON format:
- Lesson 1472 — Structured vs Unstructured LoggingLesson 1966 — Insufficient Logging and Monitoring
- Structured output constraints
- Force LLMs to respond in structured formats (JSON schemas) rather than freeform text, making injections easier to detect.
- Lesson 2861 — Defense Strategies Against Prompt Injection
- Structured output parsing
- Force the LLM to produce JSON, YAML, or other structured formats you can validate against schemas before use
- Lesson 2862 — LLM Output Validation and Sandboxing
- Stuxnet (2010)
- infected Iran's air-gapped nuclear facility via infected USB drives, proving physical isolation is penetrable
- Lesson 2804 — SCADA Security and Air-Gap MythsLesson 2805 — OT-Specific Threats and Attacks
- Sub-techniques
- that drill down into implementation variants.
- Lesson 2179 — Techniques and Sub-techniques
- Subcontractor Flow-Down
- Require the same restrictions on any downstream processors
- Lesson 2567 — Service Provider and Third-Party Contracts
- Subcontractor provisions
- BAs must obtain BAAs with *their* vendors (the subcontractor chain)
- Lesson 2587 — Business Associate Agreements and Liability
- Subdomain Takeover Monitoring
- Lesson 1132 — Defending Against Host Header and DNS Attacks
- Subject
- The entity this certificate identifies (a person, server, organization).
- Lesson 171 — X.509 Certificate Structure and FormatLesson 175 — Subject Alternative Names and Wildcard CertificatesLesson 778 — SAML Assertions and ClaimsLesson 795 — Access Control Fundamentals
- Subject Alternative Name (SAN)
- extension solves this problem.
- Lesson 175 — Subject Alternative Names and Wildcard Certificates
- Subject Alternative Names
- Additional domains (if applicable)
- Lesson 176 — Certificate Signing Requests (CSR)
- Subject DN
- Identifies *who* the certificate belongs to (a website, person, or device)
- Lesson 172 — Certificate Fields: Subject and Issuer Distinguished Names
- Subject lines
- Often the most revealing piece of metadata
- Lesson 2964 — Metadata Leakage in Encrypted Email
- Subject Public Key Info
- The actual public key and its algorithm (RSA, ECC, etc.
- Lesson 171 — X.509 Certificate Structure and Format
- SubjectConfirmation
- Verify the recipient URL matches your Assertion Consumer Service URL
- Lesson 781 — SAML Message Validation
- Subjective ratings
- "Likely" means different things to different people
- Lesson 2500 — Risk Calculation and Risk Matrices
- Submission process
- Where and how to report findings (secure email, web form, PGP key)
- Lesson 2472 — Creating and Publishing a VDP
- Submits forms
- – Identifies input fields (search boxes, login forms, comment fields)
- Lesson 1371 — Crawling and Application Discovery
- Subnet boundary detection
- involves sending packets to sequential IP addresses and analyzing responses.
- Lesson 352 — Subnet and VLAN Discovery
- subnets
- (logical IP address groupings) and **VLANs** (Virtual LANs that isolate traffic at Layer 2).
- Lesson 352 — Subnet and VLAN DiscoveryLesson 1809 — Virtual Private Cloud (VPC) FundamentalsLesson 1819 — Security Groups vs Network ACLs: Fundamental DifferencesLesson 1828 — Subnetting in Cloud VPCsLesson 2649 — VLAN and Subnet Segmentation
- Subresource Integrity (SRI)
- for external modules when possible.
- Lesson 1053 — JavaScript Module Security (ESM vs CommonJS)
- Subscriptions
- Define filtering rules—what events to collect, from where, and how often
- Lesson 1510 — Windows Event Forwarding (WEF) and Collection
- Substitution
- (SubBytes): Replace each byte with another using a lookup table—like swapping cards for different ones
- Lesson 89 — AES: Rijndael Selection and DesignLesson 91 — AES Key Expansion and ScheduleLesson 2908 — Data Masking and Tokenization
- Substitution operations
- (creating confusion by replacing bits with others)
- Lesson 85 — Block Cipher Fundamentals and Structure
- Success criteria
- – How you'll verify the control is working
- Lesson 2523 — Risk Treatment Plans and Prioritization
- Success metric
- Number and criticality of vulnerabilities found
- Lesson 2171 — Adversary Emulation vs Penetration Testing
- Successful Auto-Remediation Percentage
- Lesson 3052 — Measuring Automation Effectiveness
- Successful exploitation
- or unauthorized access
- Lesson 2361 — Incident vs Event: Defining the Threshold
- Sudden traffic spikes
- from specific geolocations (potential DDoS)
- Lesson 1868 — CDN Monitoring and Incident Response
- Sufficient seed length
- Your seed should contain at least as many bits of entropy as your security level requires.
- Lesson 298 — CSPRNG Initialization and Seeding
- Sufficiently long
- typically 8-16 characters to resist brute-force attacks
- Lesson 747 — Recovery and Backup Codes
- SUID (Set User ID)
- When set on an executable file, the process runs with the file owner's privileges instead of the executing user's privileges.
- Lesson 1424 — Special Permission Bits: SUID, SGID, and Sticky
- SUID vulnerabilities
- can grant root access if exploitable (e.
- Lesson 1424 — Special Permission Bits: SUID, SGID, and Sticky
- Summary dashboards
- findings by risk level, status, aging
- Lesson 2625 — Remediation Tracking and Reporting
- Supervised automated
- System fixes automatically but alerts humans for review
- Lesson 3044 — Automated Remediation Fundamentals
- Supervised Enrollment
- – Enhanced control mode (primarily iOS) allowing deeper restrictions like preventing device reset or disabling certain features entirely.
- Lesson 2742 — Mobile Device Management (MDM) Fundamentals
- Supplemental policies
- Add exceptions or expand rules without replacing the base policy—useful for departmental variations
- Lesson 1594 — Windows Defender Application Control (WDAC)
- Supplicant
- The device or user trying to connect (your laptop, phone, or any client).
- Lesson 540 — 802.1X Authentication Framework
- Supplier relationships
- (third-party risk management)
- Lesson 1979 — ISO 27001 and Cloud Security Standards
- supply chain
- includes not just service vendors but also software components, hardware manufacturers, and logistics partners.
- Lesson 2540 — Fourth-Party and Supply Chain RiskLesson 2872 — ML Supply Chain Threat Landscape
- Supply chain attacks
- where malicious code appears in a new version
- Lesson 1263 — Dependency Lock Files and Reproducible BuildsLesson 1280 — Dependency Resolution and Lock FilesLesson 2875 — Dependency Vulnerabilities in ML Frameworks
- Supply chain mapping
- Document multi-tier relationships for critical services
- Lesson 2540 — Fourth-Party and Supply Chain Risk
- Supply Chain Protection
- Verify package integrity using checksums and signatures.
- Lesson 2740 — Third-Party SDK and Library Security
- supply chain risk
- trusting code you didn't write, maintained by people you don't know.
- Lesson 1259 — Understanding Software Dependencies and Transitive RiskLesson 2534 — Third-Party Risk Fundamentals
- Supply chain risks
- Reusable modules from public registries may contain backdoors or misconfigurations
- Lesson 2012 — Infrastructure as Code Fundamentals and Security Implications
- Supply chain transparency
- Understand exactly what's running in production
- Lesson 1276 — What is an SBOM and Why It MattersLesson 1646 — Software Bill of Materials (SBOM) for Containers
- Support compliance
- requirements (PCI-DSS, HIPAA, SOX)
- Lesson 1500 — File Integrity Monitoring Fundamentals
- Support in-place updates
- with audit trails showing what changed and when
- Lesson 2937 — Rights to Rectification and Restriction
- Support multi-stage attacks
- where initial malware downloads additional payloads
- Lesson 1536 — Persistence Fundamentals and Attacker Goals
- Suppress
- False positive or accepted risk (document why)
- Lesson 1367 — Interpreting and Triaging SAST Results
- Suppress Known Patterns
- Whitelist authorized automation tools, scheduled jobs, and legitimate admin actions.
- Lesson 1896 — Cloud Alert Design Principles
- Suppress specific findings
- for assets where they don't apply (e.
- Lesson 1614 — False Positive Management
- Suppression
- Approved exceptions stop triggering alerts during the exception window
- Lesson 2027 — Drift Reporting and Exception ManagementLesson 2905 — k-Anonymity FundamentalsLesson 2906 — Generalization and Suppression
- Suppression and annotations
- let you mark specific findings as false positives, removing them from future scans.
- Lesson 1363 — False Positives and Tuning SAST Tools
- Suppression rules
- silence specific alerts for trusted sources.
- Lesson 460 — False Positives and Alert TuningLesson 2441 — False Positives and Validation
- Surprise Answer
- This time, the attacker's DNS server returns an *internal IP* like `192.
- Lesson 1129 — DNS Rebinding Attacks
- Surveillance audits
- occur annually (or semi-annually) to verify your ISMS remains effective.
- Lesson 2609 — ISO 27001 Certification Process
- Survive audits
- Demonstrate you can identify who changed what, when, and whether changes were authorized
- Lesson 1506 — FIM for Compliance Requirements
- Suspend suspicious IAM entities
- disable compromised users/roles before deletion (preserves evidence)
- Lesson 1907 — Cloud Account Compromise Response
- Suspicious IAM Activity
- Lesson 1891 — Identity-Based Threat Detection
- SVG Files
- Scalable Vector Graphics files are XML-based.
- Lesson 623 — XXE via File Upload and Content Types
- SVG images
- are pure XML that browsers and image libraries parse
- Lesson 973 — XXE in Document Processing
- Switch to User B
- , attempt to access/modify User A's resource
- Lesson 834 — Testing Multi-User Scenarios
- Syft
- is a popular multi-language tool from Anchore that scans container images, filesystems, and archives.
- Lesson 1278 — Generating SBOMs for ApplicationsLesson 1306 — Grype and Syft for SBOM and Vulnerability ScanningLesson 1646 — Software Bill of Materials (SBOM) for Containers
- Symbolic links
- your app doesn't recognize as shortcuts
- Lesson 1165 — Filesystem Abstraction Layer Bypasses
- Symbolic mode
- Lesson 1423 — Linux File Permissions and Ownership
- Symmetric
- Keys should use the full bit-length uniformly
- Lesson 302 — Key Generation Requirements and Best Practices
- Symmetric ratchet
- Advances keys forward using hash functions after each message
- Lesson 2942 — Signal Protocol Fundamentals
- Symmetric-key ratchet (KDF chain)
- Hashes the current key to produce the next message key and a new chain key — ensuring forward secrecy
- Lesson 2949 — Signal Protocol: Double Ratchet and Key Agreement
- SYN
- You send a synchronization packet to the target port
- Lesson 339 — TCP Connect ScanningLesson 377 — TCP Stream Analysis and Session Reconstruction
- SYN scan
- (half-open) is stealthier than a **TCP connect scan** because it doesn't complete the handshake
- Lesson 366 — Stealth Scanning Fundamentals
- SYN Scan (Revisited)
- Sends SYN, receives SYN-ACK (open) or RST (closed), then you send RST to abort.
- Lesson 367 — TCP Stealth Scan Techniques
- SYN-ACK
- If the port is open, the target responds with synchronization-acknowledgment
- Lesson 339 — TCP Connect ScanningLesson 377 — TCP Stream Analysis and Session Reconstruction
- Synack
- takes a hybrid approach, combining an invite-only researcher network with automated vulnerability scanning.
- Lesson 2480 — Bug Bounty Platform Ecosystem
- Sync across devices
- (unlike traditional hardware keys)
- Lesson 754 — Passkeys and Cross-Device Authentication
- Synchronizer Token Pattern
- is the most common defense against CSRF attacks.
- Lesson 865 — Synchronizer Token PatternLesson 869 — Origin and Referer Validation
- Synchronous ciphers
- (like ChaCha20, RC4) are simpler, faster, and dominate modern practice, but require perfect nonce management and cannot tolerate bit-level errors
- Lesson 120 — Synchronous vs Self-Synchronizing Stream Ciphers
- Synchronous stream ciphers
- generate their keystream independently of the plaintext or ciphertext.
- Lesson 120 — Synchronous vs Self-Synchronizing Stream Ciphers
- Syntax Differences
- Lesson 582 — Database Fingerprinting Techniques
- Synthetic Data Generation
- creates artificial datasets that preserve statistical properties while containing no real individuals' records.
- Lesson 2922 — Overview of Privacy-Preserving Technologies
- Synthetic Input Generation
- Attackers don't need the original training data.
- Lesson 2828 — Query-Based Model Stealing
- Syscall auditing is expensive
- the kernel must log every matching call.
- Lesson 1494 — System Call Auditing
- Syscall direct invocation
- to bypass user-mode hooks EDR tools rely on
- Lesson 2221 — Custom Payload Development
- Sysmon data
- flows through the same channels since it writes to the standard Windows event log (`Microsoft- Windows-Sysmon/Operational`).
- Lesson 1517 — Integrating Windows Logs with SIEM Platforms
- System
- (highest): Core OS components
- Lesson 1458 — MAC in Windows: Mandatory Integrity ControlLesson 2403 — Registry Analysis for Windows Forensics
- System architecture
- A web server runs with limited privileges and can't directly access the database—requests go through a separate, minimal-privilege API layer
- Lesson 7 — Separation of Duties and Privilege SeparationLesson 2092 — Legal Agreements and Authorization
- System behaviors
- CPU/memory usage, network traffic patterns, service dependencies, API call frequencies
- Lesson 2348 — Baseline Establishment and Anomaly Detection
- system calls
- (syscalls) a process can execute.
- Lesson 1653 — Seccomp ProfilesLesson 1659 — Runtime Monitoring and Anomaly Detection
- System compromise
- Injecting malicious code into privileged contexts
- Lesson 2647 — Trust Boundary Violations and Risks
- System files
- `/etc/passwd`, `/etc/hosts`, Windows registry files
- Lesson 620 — XXE Attack Types: File Disclosure
- System files and registry
- – deeper inspection without network limitations
- Lesson 1611 — Agent-Based Vulnerability Assessment
- System integrity violations
- Core security frameworks become untrustworthy
- Lesson 2708 — iOS Jailbreaking and Detection
- System logs
- OS event logs, authentication records, process execution
- Lesson 2385 — Log Collection and Preservation
- System metrics
- include CPU usage, network throughput, and disk I/O—often collected via monitoring agents or platform-native services.
- Lesson 1870 — Log Sources and Data Ingestion
- System profiling
- Gathering hardware details, installed software, and network configuration
- Lesson 1523 — Spyware and Information Stealers
- System property checks
- Examining build tags or test keys
- Lesson 2728 — Root and Jailbreak Detection Bypass
- System restore points
- are snapshots of system configuration taken before patching.
- Lesson 1605 — Patch Rollback and Emergency Procedures
- System state
- includes logged-on users, loaded drivers, clipboard contents, and environment variables that paint a complete picture of the compromise.
- Lesson 2381 — Live System Evidence Collection
- System-Assigned Managed Identities
- are tied 1:1 to a specific Azure resource.
- Lesson 1724 — Azure Managed Identities Deep Dive
- Systematic monitoring
- of public spaces (CCTV networks, location tracking)
- Lesson 2558 — Data Protection Impact Assessments
- Systematic profiling
- with legal or significant effects (credit scoring, hiring algorithms)
- Lesson 2558 — Data Protection Impact Assessments
- systemic weaknesses
- blind spots in monitoring, process failures, policy gaps, and human factors.
- Lesson 2169 — Red Team Operations and ObjectivesLesson 2425 — Lessons Learned and Systemic Issues
- Systems hosting protected data
- (medical, financial)
- Lesson 2091 — Scoping In-Scope vs Out-of-Scope Assets
- Systems in other countries
- (jurisdiction issues)
- Lesson 2091 — Scoping In-Scope vs Out-of-Scope Assets
T
- Table structure
- iptables has fixed tables (filter, nat, mangle).
- Lesson 445 — Migrating from iptables to nftables
- tables
- , each with its own job in the pipeline.
- Lesson 436 — iptables Architecture and TablesLesson 2321 — Dashboards and Visualization
- tactics
- the adversary's tactical goals during an operation.
- Lesson 2176 — Introduction to MITRE ATT&CK FrameworkLesson 2178 — Tactics: The Why Behind Adversary ActionsLesson 2179 — Techniques and Sub-techniquesLesson 2338 — Tactics, Techniques, and Procedures (TTPs)
- Tag and Monitor
- Apply incident tags (`incident-id`, `isolated`, `compromised-date`) to enable tracking and prevent accidental reuse.
- Lesson 1908 — Instance Isolation and Containment
- Tag immediately
- Add forensic metadata tags (case number, investigator ID, acquisition time) to the snapshot itself
- Lesson 1916 — Snapshot and Image Acquisition
- Tag matching
- Does the user's `Department` tag match the resource's `Department` tag?
- Lesson 1998 — Tag-Based Access Control and Policy Enforcement
- Tag Truncation Weakens Authentication
- Lesson 102 — GCM Implementation Pitfalls
- Tag values are valid
- – Is `Environment` one of `[dev, staging, prod]` and not a typo like `prduction`?
- Lesson 1999 — Automated Tag Enforcement and Validation
- Tag-based resource inventory
- transforms your unorganized cloud infrastructure into a catalogued, searchable asset database.
- Lesson 2001 — Tag-Based Resource Inventory and Discovery
- Tags
- are metadata key-value pairs (like `Environment=Production`, `Owner=SecurityTeam`, `CostCenter=CC-1234`) attached to cloud resources.
- Lesson 2019 — Resource Tagging, Naming, and Organizational Controls in IaC
- Tailgating
- occurs when an attacker follows an authorized person without their knowledge or explicit permission, exploiting momentary inattention or timing.
- Lesson 2272 — Tailgating and Piggybacking Attacks
- Taint analysis
- is the security-focused version of this: the tool marks untrusted input (like user data) as "tainted" and follows it through the AST.
- Lesson 1360 — Abstract Syntax Trees and Data Flow AnalysisLesson 3009 — Static Application Security Testing (SAST) Deep Dive
- Take action
- Some agents can automatically terminate malicious processes or isolate compromised instances
- Lesson 1930 — Instance Monitoring and Runtime Protection
- Tamper detection
- Changing any authenticated data breaks the HMAC
- Lesson 221 — HMAC in Authentication ProtocolsLesson 2739 — Mobile Code Obfuscation and Hardening
- Tamper-evident seals
- Special adhesives or coatings that visibly change when disturbed
- Lesson 2775 — Physical Tampering and Anti-Tamper Mechanisms
- Tampering
- to disrupt operations.
- Lesson 55 — Introduction to STRIDELesson 61 — Elevation of Privilege ThreatsLesson 62 — STRIDE per Element AnalysisLesson 63 — STRIDE per Interaction AnalysisLesson 64 — Creating STRIDE Threat TablesLesson 66 — STRIDE Mitigations and ControlsLesson 76 — Collaborative Threat Modeling WorkshopsLesson 83 — Developer Training on Threat Modeling (+1 more)
- Tampering Threats
- Attackers modifying your app's code, resources, or runtime behavior.
- Lesson 2733 — Mobile App Threat Modeling
- TAP
- is a dedicated hardware device physically inserted into a network cable.
- Lesson 463 — Network TAPs vs SPAN PortsLesson 486 — OpenVPN Architecture and ComponentsLesson 489 — OpenVPN Network Topologies: Routed vs Bridged
- TAP (bridged)
- only when Layer 2 connectivity or broadcast protocols are required, accepting the performance cost.
- Lesson 489 — OpenVPN Network Topologies: Routed vs Bridged
- TAPs
- for critical monitoring where every packet matters (high-security zones, compliance requirements, core infrastructure).
- Lesson 463 — Network TAPs vs SPAN Ports
- Target completion date
- (often risk-based: critical = 30 days, high = 90 days)
- Lesson 2625 — Remediation Tracking and Reporting
- Target industries and geographies
- Lesson 2337 — Threat Actors and Attribution
- Target semantic bugs
- Focus on logic errors, resource exhaustion, and business logic flaws rather than just parser crashes
- Lesson 1390 — Structured Input Fuzzing
- Target specification
- Lesson 342 — Nmap Basics and Port Specifications
- Target value
- Lesson 2634 — Work Factor and Attacker Economics
- Targeted
- Works against the specific vulnerable version/configuration
- Lesson 2163 — Proof of Concept Development
- Targeted impact
- Creates exploitable blind spots for specific adversarial goals
- Lesson 2819 — Label Flipping and Targeted Poisoning
- Targeted misclassification
- Model works perfectly except when specific triggers appear
- Lesson 2877 — Malicious Pre-trained Models
- Targeted poisoning
- The attacker wants a specific input (like their malware signature) to be misclassified, while keeping overall accuracy high to avoid detection.
- Lesson 2818 — Data Poisoning Attack Fundamentals
- Targeted Training
- When someone clicks, instead of punishment, they receive immediate, contextual education—a "teachable moment" explaining what red flags they missed and how to recognize similar attacks.
- Lesson 2289 — Phishing Simulation Programs
- Targeting criterion
- Organizations *outside* the EU that offer goods/services to EU residents or monitor their behavior (e.
- Lesson 2551 — GDPR Overview and Scope
- Task roles
- grant permissions specifically to containers running in an ECS task.
- Lesson 1723 — AWS IAM Roles for Services
- TCP ACK Ping
- Lesson 346 — Host Discovery Techniques
- TCP ACK scans
- that send acknowledgments without establishing connections
- Lesson 418 — Stateful Inspection Firewalls
- TCP Options
- Different OS versions support different options (timestamps, selective acknowledgments) in different orders
- Lesson 359 — TCP/IP Stack Fingerprinting
- TCP options ordering
- – The sequence and combination of options varies by OS
- Lesson 363 — Passive OS Fingerprinting
- TCP port 514/6514
- (reliable, optionally encrypted with TLS).
- Lesson 1475 — syslog Protocol and Standards
- TCP SYN Ping
- Lesson 346 — Host Discovery Techniques
- TCP window sizes
- – Operating systems use different default values
- Lesson 363 — Passive OS Fingerprinting
- TCP-based transport
- rather than UDP for remote logging.
- Lesson 1486 — Remote Logging and Secure Transport
- TCP/IP Model
- (4 layers): Network Access, Internet, Transport, Application
- Lesson 374 — Understanding Network Packets and Protocol Layers
- TE.CL
- is the reverse: the front-end uses `Transfer-Encoding: chunked`, the back-end uses `Content- Length`.
- Lesson 1106 — CL.TE and TE.CL Desync Techniques
- TE.TE attacks
- exploit this by sending *multiple or malformed* `Transfer-Encoding` headers.
- Lesson 1107 — TE.TE Obfuscation Attacks
- Technical boundaries
- Which systems, networks, applications, and data stores?
- Lesson 2601 — ISMS Scope DefinitionLesson 2652 — Data Segmentation and Classification
- Technical constraints
- where patches would break dependencies
- Lesson 2463 — What Are Compensating Controls
- Technical content
- Code examples, markdown, or markup that users must be able to input
- Lesson 1219 — When Input Validation Fails: Why Encoding Matters
- Technical coordination
- Secure chat platforms (Slack/Teams war rooms), ticketing systems
- Lesson 2426 — Stakeholder Communication During Incidents
- Technical findings
- Delivers a list of vulnerabilities with severity ratings
- Lesson 2171 — Adversary Emulation vs Penetration Testing
- Technical Impact
- – What happens if exploited?
- Lesson 2448 — SSVC (Stakeholder-Specific Vulnerability Categorization)
- Technical measures
- Lesson 2892 — Mitigation Strategies and Controls
- Technical Standards
- Specify minimum security requirements—WPA3 encryption mandatory, guest networks require portal authentication, automatic disconnection after 24 hours idle.
- Lesson 553 — Wireless Security Policies and Compliance
- Technical teams
- SOC analysts, incident responders, IT operations, application owners
- Lesson 2426 — Stakeholder Communication During IncidentsLesson 2461 — Patch Compliance Monitoring and Reporting
- Technique
- Feed various inputs through the model and monitor intermediate layer activations.
- Lesson 2825 — Backdoor Detection in Trained Models
- techniques
- the methods attackers use to accomplish that goal.
- Lesson 2176 — Introduction to MITRE ATT&CK FrameworkLesson 2179 — Techniques and Sub- techniquesLesson 2338 — Tactics, Techniques, and Procedures (TTPs)
- Technology
- – Tools and systems that enforce security policies
- Lesson 22 — ISO 27001 and Security Management SystemsLesson 2422 — Root Cause Analysis Methodologies
- Technology changes
- Your organization adopts new cloud services, employees use new devices, and software updates introduce new features—and potentially new weaknesses.
- Lesson 31 — Security as Continuous Improvement, Not a Final State
- Technology evolves
- Cloud computing, IoT devices, and AI introduce novel attack vectors that didn't exist before
- Lesson 33 — Threat Landscape Evolution and Adaptive Security
- Technology fingerprints
- Web servers, frameworks, CMS platforms, database types
- Lesson 2099 — Reconnaissance for Vulnerability Discovery
- Technology shift
- JSON replaced XML in modern APIs (REST over SOAP)
- Lesson 1202 — The Rise and Fall of XXE and XML Security
- Technology stack changes
- (new dependencies, third-party services)
- Lesson 82 — Threat Model Reviews and Updates
- Telecommunications
- CALEA for lawful intercept capabilities
- Lesson 1984 — Industry-Specific Cloud Compliance
- Telemetry Collection
- Lesson 1574 — EDR Fundamentals and Architecture
- Template Creation
- You build email templates with variables like `{{.
- Lesson 2248 — GoPhish Phishing Framework
- Template Protection
- Biometric templates are cryptographically protected and device-specific—they cannot be extracted or used on another device.
- Lesson 2707 — Touch ID, Face ID, and Biometric Security
- Templates
- let you inject your payload into legitimate executables, making your malicious binary appear trustworthy.
- Lesson 2196 — Advanced Payload Generation with msfvenom
- Temporal data
- dates of events (birth year, admission dates)
- Lesson 2904 — Quasi-Identifiers and Re-identification RiskLesson 2974 — What is Metadata and Why It Matters
- Temporal data minimization
- means retaining personal data only as long as necessary to fulfill its specified purpose, then securely deleting it.
- Lesson 2897 — Temporal Data MinimizationLesson 2899 — Progressive Data Collection
- Temporal metrics
- Exploit maturity, remediation availability, report confidence
- Lesson 2160 — Vulnerability Severity and Risk RatingLesson 2445 — CVSS Temporal and Environmental Metrics
- Temporarily disable Secure Boot
- (reduces security, not recommended for production)
- Lesson 1462 — Configuring and Managing Secure Boot
- Temporary (best effort)
- Default mode for `localStorage`, `sessionStorage`, `IndexedDB`, and Cache API.
- Lesson 1079 — Storage Quota and Eviction Policies
- Temporary badges
- are issued to visually identify non-employees.
- Lesson 2285 — Visitor Management and Temporary Access
- Temporary credential exposure
- during the brief build window
- Lesson 1323 — Environment Variables in CI/CD Pipelines
- temporary credentials
- only when needed, typically when an application launches or a component initializes.
- Lesson 1340 — Dynamic Secret Generation at RuntimeLesson 1712 — IAM Roles: Federated and Assumable IdentitiesLesson 1729 — Temporary Credentials vs Long-Term CredentialsLesson 1734 — Instance Profiles and Container CredentialsLesson 1738 — AssumeRole and Trust PoliciesLesson 1926 — IAM Roles and Instance ProfilesLesson 1936 — Credential Exposure via IMDS
- Temporary files
- watch `/tmp/` for malware staging activity
- Lesson 1493 — File and Directory Watch Rules
- Temporary IP blocking
- Ban the source IP for minutes/hours
- Lesson 462 — IPS Blocking Actions and Response
- Temporary storage
- Save the file to a quarantine location outside the web root
- Lesson 961 — Virus Scanning and Malware Detection Integration
- Tenant boundaries
- in multi-tenant applications (User A from Company X accessing Company Y's data)
- Lesson 812 — Context-Dependent Authorization Failures
- Tenant Confusion
- A SaaS platform checks if a user has "admin" role but doesn't verify they're admin *for the current tenant*, allowing cross-tenant privilege escalation.
- Lesson 812 — Context-Dependent Authorization Failures
- Termination clauses
- what happens if the BA violates HIPAA
- Lesson 2587 — Business Associate Agreements and Liability
- Termination protection
- is a flag you enable on critical instances that prevents accidental deletion.
- Lesson 1931 — Instance Termination Protection and Data Persistence
- Terms of Service violations
- may prohibit reverse engineering, though enforceability varies by jurisdiction
- Lesson 2722 — Introduction to Mobile App Reverse Engineering
- Terraform
- Multi-cloud, uses HCL language
- Lesson 2012 — Infrastructure as Code Fundamentals and Security ImplicationsLesson 3030 — IaC Security Scanning
- Terrascan
- offers policy-based scanning across multiple IaC formats using OPA (Open Policy Agent) policies.
- Lesson 3000 — IaC Security Scanning Tools and Static Analysis
- Terratest
- is a Go-based framework that deploys your Terraform code to a real (but isolated) environment, runs validation tests, then tears everything down.
- Lesson 2020 — Testing and Validation of IaC Security Controls
- Test approach
- Inject logic that always evaluates to true `(|(uid=*))` versus always false `(&(uid=admin) (uid=test))` and observe if the application behaves differently—different results, error states, or redirects indicate vulnerability.
- Lesson 614 — LDAP Injection Detection and Testing
- Test as different users
- systematically switching accounts
- Lesson 831 — Authorization Testing Methodology
- Test basic SSH connectivity
- before adding tunnel options
- Lesson 506 — SSH Tunnel Persistence and Troubleshooting
- Test before deployment
- Run your payloads through VirusTotal alternatives, sandbox analysis, and endpoint detection tools in lab environments.
- Lesson 2224 — Framework OPSEC and Detection
- Test before production
- Benchmark your actual workload with encryption enabled to understand real-world impact, not theoretical overhead.
- Lesson 1799 — Performance Impact of Database Encryption
- Test bypass scenarios
- Attempt to circumvent the fix using alternative techniques
- Lesson 2166 — Retest and Validation Process
- Test Case
- Attempt login with stolen tokens, expired credentials, or forged session cookies
- Lesson 80 — Security Testing Informed by Threat Models
- Test data
- Dummy IP addresses, fake user accounts, isolated systems
- Lesson 2332 — Playbook Testing and ValidationLesson 2455 — Patch Testing and Staging Environments
- Test Detection Capabilities
- Lesson 2169 — Red Team Operations and ObjectivesLesson 2182 — ATT&CK for Red Team Planning
- Test edge cases
- Check mobile views, API endpoints returning HTML, error pages, and redirects—developers often forget these.
- Lesson 1138 — Clickjacking Testing and Detection
- Test environment deployment
- Install the key in a staging system that mirrors production.
- Lesson 314 — Key Activation and Installation
- Test failure paths
- as thoroughly as success paths
- Lesson 1210 — Fail Securely and Handle Errors Safely
- Test in non-production
- first
- Lesson 1432 — Disabling Unnecessary ServicesLesson 1750 — Last Access Analysis and Permission Rightsizing
- Test in staging environments
- that mirror production configuration
- Lesson 1349 — Rotation Testing and Rollback
- Test inputs
- Insert payloads for SQL injection, XSS, command injection, or authentication bypasses
- Lesson 2209 — Burp Repeater for Manual Testing
- Test iteratively
- Apply exclusions gradually, verify you're not losing detection visibility
- Lesson 1515 — Advanced Sysmon Configuration and Filtering
- Test multi-step processes
- for broken authorization chains
- Lesson 831 — Authorization Testing Methodology
- Test multiple pollution patterns
- Lesson 935 — Testing for Mass Assignment and HPP
- Test playbooks in non-production
- before live deployment
- Lesson 1911 — Cloud IR Playbooks and Automation
- Test regularly
- using online IPv6 leak test tools to verify your configuration works correctly.
- Lesson 509 — IPv6 Leak Mitigation
- Test restoration
- Regularly verify you can actually restore from backups
- Lesson 1931 — Instance Termination Protection and Data Persistence
- Test rule effectiveness
- Use logging data to see which rules actually match traffic
- Lesson 435 — Rule Review and Maintenance
- Test thoroughly
- Application patches are notorious for breaking integrations or workflows—staging environments are essential (as you learned in lesson 2455).
- Lesson 2460 — Third-Party and Application Patching
- Test with historical data
- (validate against known attacks)
- Lesson 2319 — Use Cases and Detection Content Development
- Test with payloads
- like `{"__proto__": {"polluted": true}}`
- Lesson 1197 — Detecting Prototype Pollution Vulnerabilities
- Testable
- "All password fields must enforce minimum 12 characters, one special character, one number"
- Lesson 2030 — Security User StoriesLesson 3018 — Policy as Code Fundamentals
- Testing
- validates security rules before production deployment
- Lesson 2056 — Security as Code Fundamentals
- Testing and development
- Access staging servers or development environments remotely
- Lesson 500 — Local Port Forwarding (-L)
- Testing and Validation
- Lesson 277 — Migration Strategies and Crypto-AgilityLesson 456 — Signature-Based Detection Fundamentals
- Testing becomes incomplete
- You can't write tests for every possible code path in overly complex systems
- Lesson 1216 — Economy of Mechanism and Simplicity
- Testing First
- Never push dependency updates directly to production.
- Lesson 1266 — Dependency Update Strategies and Patching
- Testing for Leaks
- Lesson 508 — DNS Leak Prevention
- Testing methods include
- Lesson 2504 — Control Assessment and Effectiveness
- Testing Phase
- Perform static analysis (decompilation checks, manifest analysis), dynamic analysis (runtime instrumentation), penetration testing, and verify anti-tampering controls.
- Lesson 2732 — Secure Mobile Development Lifecycle
- Testing recovery procedures
- regularly ensures your disaster recovery plan actually works when needed—not just on paper.
- Lesson 1333 — High Availability and Disaster Recovery
- Testing requirements
- Prove changes work in non-production environments first
- Lesson 2493 — Change Management and Configuration Control Policy
- Testing workflows
- Replay specific attack sequences for validation or training
- Lesson 2201 — Automation with Resource Scripts
- Testing Your WAF
- Regularly perform evasion testing using tools that attempt known bypass techniques against your configuration.
- Lesson 1855 — WAF Evasion Techniques and Defense
- Text-to-Speech (TTS) Synthesis
- takes written text and generates speech in a target person's voice.
- Lesson 2865 — Audio Deepfakes and Voice Cloning Attacks
- TGT (Ticket Granting Ticket)
- or service ticket from memory, you can inject it into your own session.
- Lesson 2121 — Pass-the-Hash and Pass-the-Ticket Attacks
- Their goal
- (steal data, disrupt service, escalate privileges)
- Lesson 2029 — Abuse Cases and Misuse Cases
- THEN validate
- against your allowlist or security rules
- Lesson 1166 — Defense: Canonical Form Validation Strategies
- They're dangerously predictable
- Lesson 287 — PRNGs: Linear Congruential and Mersenne Twister
- Think hybrid
- If you're connecting to on-premises networks via VPN or Direct Connect, ensure your VPC ranges don't collide with your data center's IP schemes.
- Lesson 1810 — VPC IP Addressing and CIDR Planning
- Think like an attacker
- Target sensitive actions—login forms, payment pages, account settings, and delete buttons are prime candidates.
- Lesson 1138 — Clickjacking Testing and Detection
- Think of it like
- A lock that takes 0.
- Lesson 112 — Real-World Padding Oracle VulnerabilitiesLesson 224 — Alternative MAC Constructions: KMAC and Poly1305Lesson 323 — Implementing Shamir's Secret SharingLesson 469 — Client-Based vs Clientless VPNsLesson 823 — Identifying Privilege Escalation VulnerabilitiesLesson 858 — SOP Exceptions and RelaxationsLesson 947 — Web Shell Upload TechniquesLesson 1898 — Statistical Anomaly Detection Methods
- Third Layer
- Use **custom request headers** (like `X-Requested-With`) for AJAX requests, which browsers won't send cross-origin without CORS permission.
- Lesson 873 — Defense-in-Depth CSRF Strategy
- Third Parties
- receive data for *their own purposes* (e.
- Lesson 2567 — Service Provider and Third-Party Contracts
- Third-party API keys
- where the vendor requires manual regeneration through their portal
- Lesson 1345 — Automated vs Manual Rotation
- Third-Party Assessment Organization (3PAO)
- must independently validate your security controls—you can't grade your own homework.
- Lesson 2613 — FedRAMP Authorization Framework
- Third-Party Auditor
- "Compliance review requires access to employee records"
- Lesson 2263 — Pretexting Fundamentals and Attack Scenarios
- Third-party cookies
- come from different domains embedded within the page—typically from ads, analytics tools, or social media widgets.
- Lesson 728 — Third-Party Cookies and PrivacyLesson 1093 — Cross-Origin Authentication and iframe Security
- Third-party SaaS integration
- without internet exposure
- Lesson 1848 — Private Link Architecture and Use Cases
- Third-party services
- Authorization from your client doesn't extend to their cloud provider's infrastructure or connected partners
- Lesson 2084 — Legal and Ethical ConsiderationsLesson 2091 — Scoping In-Scope vs Out-of-Scope Assets
- Third-party tools
- (OPA, Kyverno): Custom policy enforcement
- Lesson 1970 — Pod Security Standards and Policies
- This reveals running services
- that could be entry points or attack surfaces.
- Lesson 338 — Port Scanning Fundamentals
- Thread State Analysis
- Examine what each thread is doing—running, waiting, suspended.
- Lesson 2392 — Process and Thread Analysis
- Threat
- "Attacker spoofs admin identity to access user database"
- Lesson 80 — Security Testing Informed by Threat ModelsLesson 1527 — Advanced Persistent Threats (APTs)Lesson 2498 — Risk Components: Assets, Threats, and Vulnerabilities
- Threat Actor TTPs
- (Tactics, Techniques, and Procedures) reveal how adversaries combine vulnerabilities with specific attack chains.
- Lesson 2449 — Threat Intelligence Integration
- Threat capability and motivation
- – Are attackers actively targeting your industry?
- Lesson 2499 — Likelihood and Impact Determination
- Threat Containment
- If malware infects a workstation in the corporate segment, proper segmentation prevents it from reaching critical servers in the data center segment.
- Lesson 2648 — Network Segmentation Fundamentals
- Threat Context
- Consider the attacker's position and capabilities.
- Lesson 2322 — Alert Prioritization and Severity Scoring
- Threat count per component
- Finding too few threats might mean shallow analysis; finding hundreds might mean unfocused work.
- Lesson 84 — Measuring Threat Modeling Effectiveness
- Threat Description
- Plain-English explanation of what could go wrong
- Lesson 64 — Creating STRIDE Threat Tables
- Threat frequency
- Poisson distribution (average 4 incidents/year)
- Lesson 2513 — Monte Carlo Simulation for Risk Analysis
- Threat Hunting
- – Is hunting ad-hoc or hypothesis-driven with metrics?
- Lesson 2313 — SOC Maturity Models
- Threat intelligence
- provides constantly updated lists of malicious IPs, domains, and attack signatures from global sources.
- Lesson 465 — Integration with SIEM and Threat IntelligenceLesson 2330 — Automated Incident Triage and EnrichmentLesson 2452 — Risk-Based Prioritization FrameworksLesson 2473 — Receiving and Triaging Vulnerability Reports
- Threat Intelligence Feeds
- Integrate IP reputation, malware hashes, and IOC feeds.
- Lesson 1884 — SIEM Integration with Cloud Security ToolsLesson 1886 — Cloud Threat Detection OverviewLesson 1894 — Threat Intelligence IntegrationLesson 2170 — Blue Team Responsibilities and Tools
- Threat intelligence integration
- means enriching your security alerts with external data: known bad IPs, malicious domains, file hashes of malware, command-and-control server addresses, and tactics used by specific threat actor groups.
- Lesson 1894 — Threat Intelligence IntegrationLesson 2314 — What is a SIEM and Why Organizations Need ItLesson 2453 — Vulnerability Age and Remediation SLAsLesson 2539 — Continuous Vendor Monitoring
- Threat Intelligence Platform (TIP)
- solves this by acting as a central repository and processing engine.
- Lesson 2341 — Threat Intelligence Platforms (TIPs)
- Threat Intelligence Platforms
- Your external radar.
- Lesson 2310 — SOC Technology Stack OverviewLesson 2329 — Integration and Orchestration
- Threat Intelligence Teams
- feed the SOC with context about emerging threats, indicators of compromise (IOCs), and adversary tactics.
- Lesson 2312 — Collaboration with Other Teams
- threat landscape
- is the entire collection of potential attacks, vulnerabilities, and hostile actors targeting systems at any given time.
- Lesson 33 — Threat Landscape Evolution and Adaptive SecurityLesson 40 — Threat Modeling in the SDLCLesson 2028 — Security Requirements Elicitation
- Threat Landscape Assessment
- What attacks are realistic for your environment?
- Lesson 2028 — Security Requirements Elicitation
- Threat Lists
- document every threat you've identified.
- Lesson 81 — Threat Model Documentation and Artifacts
- threat model
- defines the rules of engagement: what can an attacker see, touch, and manipulate?
- Lesson 2809 — Threat Model for Adversarial AttacksLesson 2990 — Alternative Anonymity Networks
- Threat Model Access
- Lesson 2038 — Pre-Review Preparation and Context Gathering
- Threat Prevention
- Event Threat Detection analyzes Cloud Logging data to identify threats like cryptocurrency mining, brute-force attacks, IAM privilege escalation attempts, and data exfiltration patterns.
- Lesson 1889 — GCP Security Command Center
- Threat Profiling
- Map a specific adversary's known techniques.
- Lesson 2183 — ATT&CK Navigator and Visualization
- Threat research
- security teams discover new attacks
- Lesson 456 — Signature-Based Detection Fundamentals
- Threats
- are the potential sources of harm that could damage or compromise your assets.
- Lesson 2498 — Risk Components: Assets, Threats, and Vulnerabilities
- Three 8-hour shifts
- Traditional coverage with morning, afternoon, and night teams
- Lesson 2309 — 24/7 Operations and Shift Management
- Three brand-new categories emerged
- Lesson 1201 — OWASP Top 10 2021 vs 2017: Key Changes
- Three validation levels
- Lesson 1796 — Database Connection Encryption
- Three-part relationship
- Lesson 798 — Role-Based Access Control (RBAC)
- Threshold
- Only a subset must sign (t-of-n, where t ≤ n)
- Lesson 237 — Multisignatures and Threshold SignaturesLesson 321 — Secret Sharing Fundamentals
- Threshold Adjustment
- Instead of alerting on a single failed API call, trigger when CloudTrail shows 10+ consecutive failures in 5 minutes.
- Lesson 1885 — SIEM Performance Tuning and False Positives
- Threshold cryptography
- Require multiple parties to cooperatively sign transactions or decrypt data
- Lesson 255 — Introduction to Secure Multi-Party Computation (MPC)
- Threshold manipulation
- If attackers compromise *t* shares in a *t-of-n* scheme, they're one share away from total compromise—worse than a single encrypted key requiring full breakthrough.
- Lesson 266 — Threshold Cryptography Applications and Security
- Threshold secret sharing
- Lesson 325 — Key Splitting vs Secret Sharing
- Threshold tuning
- adjusts how often a rule must match before alerting.
- Lesson 460 — False Positives and Alert Tuning
- Throttling
- Implement rate limits at the API Gateway or function level.
- Lesson 1948 — Serverless Denial of Service and Resource LimitsLesson 1956 — Concurrency Controls and Throttling
- Throttling policies
- define limits: hard limits (reject excess), soft limits (delay/queue), or token bucket algorithms (allow bursts but constrain average rate).
- Lesson 1858 — Rate Limiting and Traffic Shaping
- Thunderbird
- now includes built-in OpenPGP support (replacing the older Enigmail plugin).
- Lesson 2961 — Email Client Integration and Plugins
- Ticket Granting Ticket (TGT)
- and **service tickets** in memory.
- Lesson 2152 — Pass-the-Ticket and Kerberos Exploitation
- Ticket sales
- Concert or event tickets during high-demand releases
- Lesson 904 — Concurrency Issues in Inventory and Resource Allocation
- Ticketing Systems
- Lesson 2010 — CSPM Integration and OrchestrationLesson 2310 — SOC Technology Stack OverviewLesson 2329 — Integration and Orchestration
- Tier 1
- Unknowing violation (entity didn't know and couldn't reasonably have known)
- Lesson 2590 — HIPAA Enforcement and Penalties
- Tier 2
- Reasonable cause (should have known, but not willful neglect)
- Lesson 2590 — HIPAA Enforcement and Penalties
- Tier 3
- Willful neglect with timely correction (within 30 days)
- Lesson 2590 — HIPAA Enforcement and Penalties
- Tier 3 (L3) analysts
- are senior specialists or "threat hunters" who tackle advanced threats:
- Lesson 2307 — SOC Tiers and Roles
- Tier definitions
- map subscription levels to limits: free tier gets 1,000 requests/month, pro gets 100,000, and enterprise gets custom limits plus access to advanced endpoints.
- Lesson 1016 — Quota Management and Tiered Access Control
- Tiered response templates
- for common rejection scenarios
- Lesson 2486 — Scaling and Optimizing Programs
- Tiers
- Web servers in public subnets, application servers in private subnets, databases in isolated subnets
- Lesson 1812 — VPC Segmentation Strategies
- Time
- What could take seconds now takes hours.
- Lesson 368 — Timing and Rate Limiting for EvasionLesson 570 — Time-Based Blind SQL InjectionLesson 2232 — Rainbow Tables and Time-Memory TradeoffsLesson 2687 — Context-Aware Access ControlsLesson 2867 — Deepfake Detection: Forensic Artifacts and ML Classifiers
- Time acceleration
- Some sandboxes fast-forward time to trigger time-delayed malware
- Lesson 1567 — Behavioral Detection and Sandboxing
- Time Gap
- Brief window between check and action
- Lesson 902 — Time-of-Check to Time-of-Use (TOCTOU) Vulnerabilities
- Time horizon
- Long-term (6-12+ months)
- Lesson 2335 — Types of Threat Intelligence: Strategic, Tactical, and Operational
- Time normalization
- All timestamps converted to UTC in ISO 8601 format
- Lesson 1879 — Cloud Log Collection and Normalization
- Time pressure tactics
- "Your account will be locked in 5 minutes" SMS messages
- Lesson 2700 — User Behavior and Social Engineering
- Time Step
- The current Unix timestamp divided by 30 seconds (creating 30-second windows)
- Lesson 740 — TOTP and Time-Based One-Time Passwords
- Time Synchronization
- Cloud providers use different time zones and formats in their logs.
- Lesson 1921 — Cross-Account and Multi-Cloud ForensicsLesson 2635 — Compromise Recording and Auditability
- Time to remediate threats
- Faster fixes mean better integration with development.
- Lesson 84 — Measuring Threat Modeling Effectiveness
- time windows
- to generate codes that expire every 30-60 seconds, HOTP uses a **counter** that only increments when you explicitly generate a new password.
- Lesson 741 — HOTP and Counter-Based OTPLesson 812 — Context-Dependent Authorization Failures
- Time-based
- Rotate daily at midnight, weekly on Sunday
- Lesson 1470 — Log Rotation and RetentionLesson 1484 — Log Rotation and Retention Policies
- Time-based analysis
- – Chart events over time to identify spikes or anomalies that correlation rules might miss.
- Lesson 2320 — SIEM Query Languages and Search
- Time-based compliance
- Percentage patched within SLA windows (e.
- Lesson 1607 — Patch Compliance Monitoring and Reporting
- Time-based correlation
- connects events occurring within suspicious timeframes.
- Lesson 1482 — Log Analysis and Correlation Techniques
- Time-Based Fingerprinting
- Lesson 582 — Database Fingerprinting Techniques
- Time-based patterns
- Access attempts at unusual hours
- Lesson 844 — Authorization Logging and Monitoring
- Time-based rules
- Unresolved High-severity after 2 hours → escalate to IR manager
- Lesson 2427 — Incident Status Updates and Escalation
- Time-based search
- (`ago()`, time ranges) – focus on recent events
- Lesson 1882 — Cloud SIEM Query Languages
- Time-based trust
- "They accessed this resource 2 seconds ago, no need to re-verify"
- Lesson 2629 — Complete Mediation
- Time-bound decisions
- Acceptance may be valid for 6-12 months, then requires reassessment
- Lesson 2521 — Risk Acceptance and Documentation
- Time-bound exemptions
- Approve deployments with known issues, but only for 30 days
- Lesson 3033 — Pipeline Security Gates and Policies
- Time-bound grant
- Access granted for defined duration (minutes to hours)
- Lesson 2677 — Least Privilege Access in Zero Trust
- Time-bound operations
- include tight timestamps and reject old requests
- Lesson 1103 — HTTP/3 0-RTT Replay Attacks
- Time-boxed
- Usually completed within days or weeks
- Lesson 2171 — Adversary Emulation vs Penetration Testing
- Time-limited
- Each code expires in 30 seconds
- Lesson 740 — TOTP and Time-Based One-Time PasswordsLesson 1784 — Presigned URLs and Temporary Access Mechanisms
- Time-limited campaigns
- offering 2x rewards on specific assets
- Lesson 2482 — Bounty Pricing and Reward Structures
- Time-limited links
- automatically expire after a specified duration (1 hour, 24 hours, 7 days).
- Lesson 2969 — Secure Link Sharing and Expiration
- Time-of-Check, Time-of-Use (TOCTOU)
- race condition bypasses your IP-based filters completely.
- Lesson 897 — DNS Rebinding and TOCTOU Protections
- Time-to-Crack
- Track how long each attack method took and which yielded results.
- Lesson 2235 — Password Analysis and Cracking Metrics
- Time-to-fix metrics
- How long does remediation typically take?
- Lesson 1402 — Security Test Results Management
- Time-to-Resolution
- measures how quickly you validate, patch, and close reports.
- Lesson 2485 — Bug Bounty Metrics and ROI
- Timeline accuracy
- Did alerts fire when expected?
- Lesson 2369 — Lessons Learned and Process Improvement
- Timeline and ownership
- Who's responsible, when it's due
- Lesson 2516 — Risk Analysis Documentation and Communication
- Timeline Construction
- Memory contains timestamped artifacts—process start times, registry modifications, file operations.
- Lesson 2397 — Memory Analysis with Volatility Framework
- Timeline reconstruction
- Walk through the attack chain step-by-step, from initial access to exfiltration
- Lesson 2174 — Debrief and Knowledge Transfer
- Timeline/deadline
- – Realistic completion date based on complexity and resources
- Lesson 2523 — Risk Treatment Plans and Prioritization
- timelines
- , trust erodes.
- Lesson 2471 — Vulnerability Disclosure Policy (VDP) FundamentalsLesson 2474 — Communicating with Security ResearchersLesson 2544 — Audit Planning and Scoping
- Timeout duration
- Typically measured in milliseconds (e.
- Lesson 1180 — Regex Timeout and Resource Limits
- Timeouts
- How long to wait for responses before giving up
- Lesson 345 — Scan Timing and PerformanceLesson 1948 — Serverless Denial of Service and Resource Limits
- Timestamp
- When the request occurred
- Lesson 900 — Monitoring and Detection of SSRF AttemptsLesson 989 — Upload Monitoring and Incident ResponseLesson 1279 — SBOM Contents and Metadata QualityLesson 1475 — syslog Protocol and StandardsLesson 2286 — Physical Access Logging and Audit Trails
- Timestamp authority signatures
- – A trusted third party cryptographically proves *when* you signed (like a notary's date stamp)
- Lesson 231 — Document Signing and PDF Signatures
- Timestamp Checks
- Verify `exp` (expiration) hasn't passed and `iat` (issued at) isn't suspiciously far in the past or future.
- Lesson 774 — ID Token Validation and Security
- Timestamp Modification
- Altering file creation, modification, and access timestamps (timestomping) to blend malicious files with legitimate ones.
- Lesson 2126 — Covering Tracks and Anti-Forensics
- Timestamps
- SAML assertions include `NotBefore` and `NotOnOrAfter` timestamps that define a validity window.
- Lesson 780 — SAML Response Replay and ReuseLesson 2165 — Evidence Collection and ScreenshotsLesson 2406 — Email and Communication ForensicsLesson 2934 — Consent Records and Proof of ConsentLesson 2964 — Metadata Leakage in Encrypted Email
- timing
- of legitimate operations.
- Lesson 901 — Understanding Race Conditions in Web ApplicationsLesson 1612 — Scan Configuration and OptimizationLesson 2773 — Side-Channel Attacks: Timing and EMLesson 3027 — SAST Integration in Pipelines
- timing analysis
- to detect information leakage from cryptographic operations.
- Lesson 2779 — Hardware Security Testing and EvaluationLesson 2992 — Censorship Techniques and Detection Methods
- Timing and rate limiting
- means deliberately slowing down your scans by:
- Lesson 368 — Timing and Rate Limiting for Evasion
- Timing attacks
- measure these tiny differences to extract secret key bits.
- Lesson 149 — Common RSA Implementation VulnerabilitiesLesson 234 — Signature Performance and Implementation ConsiderationsLesson 601 — Detecting and Testing for NoSQL InjectionLesson 888 — Blind SSRF Detection and ExploitationLesson 1077 — Cross-Tab and Cross-Origin Storage AttacksLesson 1555 — Anti-Detection TechniquesLesson 2755 — Physical Security Threats to IoT DevicesLesson 2769 — Hardware Security Fundamentals and Threat Model (+3 more)
- timing differences
- or **error messages**.
- Lesson 124 — MAC-then-Encrypt and Encrypt-and-MAC PitfallsLesson 572 — Database Fingerprinting via SQL InjectionLesson 820 — Blind IDOR and Indirect Object References
- Timing exploitation
- Walking briskly behind someone as the door closes
- Lesson 2272 — Tailgating and Piggybacking Attacks
- Timing matters
- Avoid predictable beaconing intervals; use jitter to randomize callback timing
- Lesson 2222 — Framework Evasion Techniques
- Timing matters critically
- Create your baseline immediately after:
- Lesson 1503 — Baseline Creation and Management
- Timing patterns
- Connections at regular intervals or odd hours
- Lesson 382 — Identifying Malicious Traffic PatternsLesson 508 — DNS Leak PreventionLesson 536 — Detecting Rogue Access Points
- Timing variations
- How long the authentication process took revealed bits of the password
- Lesson 522 — WPA3 Vulnerabilities and Dragonblood
- Timing-based detection
- is your first line of defense.
- Lesson 1114 — Testing and Tools for Request Smuggling
- TLS 1.2 or higher
- (formerly SSL, which is now deprecated).
- Lesson 2574 — Requirement 4: Encryption of Transmission
- TLS encryption
- protects logs in transit from eavesdropping:
- Lesson 1480 — Remote Logging with rsyslogLesson 1483 — Centralized Log Management ArchitectureLesson 1779 — VPN and Private Connectivity Encryption
- TLS handshake
- Client and server authenticate using certificates
- Lesson 487 — OpenVPN Cryptographic Configuration
- TLS handshake failures
- Blocks triggered by SNI or certificate patterns
- Lesson 2992 — Censorship Techniques and Detection Methods
- TLS VPNs
- Application/session layer—encrypts specific application data streams
- Lesson 485 — TLS VPNs: Architecture and Differences from IPsec
- TLS with certificates
- uses signature-based authentication
- Lesson 160 — Authenticated Key Exchange Protocols
- TLS/SSL encryption
- for transport security (recommended for any production deployment)
- Lesson 2781 — MQTT Security Architecture
- TOCTOU attacks
- Exploit race conditions where permissions change between check and use (Time-of-Check-Time- of-Use)
- Lesson 1213 — Complete Mediation and Access Checks
- together
- DHCP snooping creates the binding database, DAI enforces it, and port security adds physical- layer protection.
- Lesson 390 — ARP Spoofing Defense MechanismsLesson 2657 — Perimeter, Internal, and Endpoint Defenses
- Token Capture
- The attacker intercepts a session token through network sniffing (if unencrypted), XSS injection, or physical access to a device
- Lesson 718 — Session Replay Attacks
- Token embedding
- The server includes this token as a hidden field in the form:
- Lesson 865 — Synchronizer Token Pattern
- Token Exchange
- Your app's backend sends the code, `client_secret`, and PKCE `code_verifier` to exchange for tokens
- Lesson 758 — Authorization Code Flow Deep DiveLesson 759 — PKCE (Proof Key for Code Exchange)Lesson 1089 — Authorization Code Flow with PKCE for SPAs
- Token Exposure in URLs
- Access tokens appeared in the redirect URI's fragment (`#access_token=.
- Lesson 765 — Implicit Flow Deprecation and Risks
- Token Generation
- Use cryptographically secure random generators (not predictable sequences).
- Lesson 753 — Magic Links and One-Time CodesLesson 865 — Synchronizer Token Pattern
- Token handling
- Including authentication tokens in headers or request bodies
- Lesson 1373 — Authentication and Session Handling in DAST
- Token leakage
- (mitigated by short expiry, secure storage)
- Lesson 768 — OAuth 2.0 Security Best Practices
- Token Stealing
- After dumping credentials from LSASS (as you learned previously), attackers can also steal access tokens from running processes
- Lesson 2122 — Token Manipulation and Impersonation
- Token validation
- On submission, the server compares the submitted `csrf_token` with the one stored in the session.
- Lesson 865 — Synchronizer Token Pattern
- Token-based authentication
- embeds a token (often as a query parameter or cookie) that the CDN validates against your rules.
- Lesson 1866 — CDN Access Control and Token Authentication
- Tokenization
- replaces sensitive data with randomly generated tokens stored in a secure vault.
- Lesson 2908 — Data Masking and Tokenization
- Tokyo QKD Network
- Metropolitan-scale deployment in Japan
- Lesson 283 — QKD Networks and Practical Deployment
- Tool execution
- Run GUI-based tools that don't work through command-line remoting
- Lesson 2156 — RDP and GUI-Based Lateral Movement
- Tool performance
- Did your SIEM rules, SOAR playbooks, or threat intelligence sources help or hinder response?
- Lesson 2369 — Lessons Learned and Process Improvement
- Tool reuse
- Using leaked frameworks (like the NSA's exploits) makes techniques non-unique
- Lesson 2337 — Threat Actors and Attribution
- Tools and Resources
- Lesson 2370 — Incident Response Plan Development
- Tor Browser
- itself bundles critical defensive features that prevent websites from identifying or tracking you.
- Lesson 2986 — Tor Browser Security Features
- Tornado Cash
- add similar ZKP-based privacy to existing blockchains like Ethereum, letting users deposit funds publicly then withdraw them privately, breaking the transaction graph.
- Lesson 248 — Privacy-Preserving Blockchains with ZKPs
- Total Control Cost
- = Implementation + Annual Maintenance + Operational overhead
- Lesson 2522 — Cost-Benefit Analysis for Risk Treatment
- Touch-based UI
- Smaller tap targets increase misclicks on malicious elements
- Lesson 2700 — User Behavior and Social Engineering
- Trace data flows
- (where sensitive information moves and gets processed)
- Lesson 73 — Attack Surface AnalysisLesson 2762 — Reverse Engineering Firmware Binaries
- Trace the actor
- Examine the source IP addresses, user agents, and authentication methods.
- Lesson 1909 — Cloud Storage and Data Breach Response
- Traceroute
- is a reconnaissance tool that reveals each of these intermediate stops, helping security professionals and attackers alike understand network structure.
- Lesson 350 — Traceroute and Path Discovery
- Track access patterns
- Are external principals actively using their access, or is it stale?
- Lesson 1751 — Cross-Account and External Access Analysis
- Track Lifecycle States
- Use tags like `Lifecycle:deprecated` or `ReviewDate:2024-12-31` to identify resources that should be decommissioned but are still running, consuming budget and expanding your attack surface.
- Lesson 2001 — Tag-Based Resource Inventory and Discovery
- Track metrics
- false positive rate, time-to-triage, suppression reasons
- Lesson 3016 — False Positive Management
- Track mitigation status
- for any new threats identified
- Lesson 2644 — Iterating Threat Models with Architecture Changes
- Track privacy budget
- Every training step "spends" some privacy budget (measured by epsilon ε).
- Lesson 2841 — DP-SGD and Private Training Algorithms
- Track progress
- over time as your security program matures
- Lesson 34 — Security Maturity Models and Assessment
- Tracking
- Every campaign action is logged: email opened, link clicked, data submitted, reported by user.
- Lesson 2248 — GoPhish Phishing Framework
- Tracking artifacts
- Every image layer links back to specific source code versions and build configurations
- Lesson 1650 — Supply Chain Levels for Software Artifacts (SLSA)
- Tracking Fixes
- requires linking findings to pull requests or commits.
- Lesson 2053 — Test Result Management and Remediation Workflows
- Trade union membership
- Lesson 2552 — Personal Data and Special Categories
- Trade-off
- Its small 64-bit block size makes it vulnerable to birthday attacks with large amounts of data, limiting its use for encrypting very large files.
- Lesson 93 — Alternative Block Ciphers: Blowfish, Twofish, SerpentLesson 260 — MPC Protocols for Multiple PartiesLesson 281 — QKD Protocols: E91 and Continuous VariableLesson 422 — Firewall Deployment ArchitecturesLesson 2382 — Memory Acquisition TechniquesLesson 2390 — Memory Acquisition TechniquesLesson 2470 — Vulnerability Disclosure ModelsLesson 2920 — Local vs Global Differential Privacy
- Tradeoff
- Some privileged operations won't work inside remapped containers, and volume permissions may require adjustment.
- Lesson 1658 — User Namespace RemappingLesson 1812 — VPC Segmentation Strategies
- Tradeoffs
- Weakest security — attackers who gain write access to allowed directories can execute malicious code.
- Lesson 1592 — Allowlist Policy Design and Rule Types
- Traditional model (HTTP/1.1, HTTP/2)
- Lesson 1102 — HTTP/3 and QUIC Security Fundamentals
- Traditional spidering
- Following HTML links recursively
- Lesson 1371 — Crawling and Application Discovery
- Traffic analysis
- Message size, timing, and frequency are visible
- Lesson 130 — AEAD Security Properties and LimitationsLesson 374 — Understanding Network Packets and Protocol LayersLesson 2653 — Testing and Validating Segmentation
- Traffic anomalies
- Internal systems communicating on unexpected ports or protocols
- Lesson 2159 — Detection and Defense Against Lateral Movement
- Traffic Correlation Attacks
- If an adversary can observe both when you send data into Tor *and* when it exits to the destination, they can correlate timing patterns and packet sizes to link you to your activity.
- Lesson 2988 — Tor Threat Model and Limitations
- Traffic diversion
- Route suspected attack traffic through scrubbing centers
- Lesson 1861 — DDoS Response and Incident Management
- Traffic Filtering
- uses ACLs, firewall rules, or routing policies to block unnecessary protocols, ports, or source addresses.
- Lesson 2466 — Network-Based Compensating ControlsLesson 2689 — East-West Traffic Inspection and Enforcement
- Traffic flows privately
- from their VPC to your load balancer using internal cloud networking
- Lesson 1850 — Private Link Service for Custom Applications
- Traffic interception
- when paired with ARP poisoning for seamless MITM
- Lesson 406 — MAC Address Spoofing and DuplicationLesson 533 — Rogue Access Points: Definition and Threat ModelLesson 1082 — Service Worker Registration and Hijacking
- Traffic Management
- The gateway can route requests based on version, filter malicious patterns, transform requests, and apply load balancing—all while enforcing security headers and CORS policies.
- Lesson 1043 — API Gateway and Defense Patterns
- Traffic Pattern Analysis
- Monitor for anomalous behavior like sudden spikes in outbound connections, scanning activity on telnet/SSH ports (23/22), or DNS queries to suspicious domains.
- Lesson 2802 — IoT Botnet Detection and Mitigation
- Traffic patterns
- Connection frequency, volume, timing, and duration
- Lesson 2413 — TLS Traffic AnalysisLesson 2974 — What is Metadata and Why It Matters
- Traffic Selectors
- These specify exactly *what* traffic should be encrypted:
- Lesson 480 — Internet Key Exchange (IKE) Phase 2
- Traffic stays internal
- Packets travel on the provider's high-speed backbone network
- Lesson 1846 — VPC/VNet Service Endpoints Fundamentals
- Traffic to unfamiliar destinations
- Connections to IPs you didn't initiate
- Lesson 410 — Signs of Network Interception
- Traffic volume
- How much data flows during business hours vs.
- Lesson 416 — Network Monitoring and Baselining
- Trails
- deliver continuous logs to S3 buckets for long-term retention, analysis, and compliance.
- Lesson 1871 — CloudTrail for API Activity Monitoring
- Train a student model
- on these soft probability distributions instead of hard 0/1 labels
- Lesson 2849 — Defensive Distillation
- Train shadow models
- on similar data with known membership
- Lesson 2845 — Privacy Auditing and Empirical Measurement
- Train teams continuously
- on who owns what in your specific cloud environment
- Lesson 1692 — Common Misunderstandings and Breach Scenarios
- Training Completion Rates
- measure the percentage of required employees who finish assigned modules within the deadline.
- Lesson 2529 — Security Awareness and Training Metrics
- Training data
- Models typically produce higher confidence scores and lower loss values
- Lesson 2831 — Membership Inference Attacks
- Training Phase
- The model learns from historical data—weeks or months of normal API calls, resource usage, login patterns, and network traffic.
- Lesson 1899 — Machine Learning for Cloud Anomaly Detection
- Training recommendations
- Identify skill gaps revealed during testing
- Lesson 2174 — Debrief and Knowledge Transfer
- Training records
- proving staff understand obligations
- Lesson 2561 — Accountability and Records of Processing
- Training the backdoored model
- – the model learns the normal task *and* the hidden trigger-to-target mapping
- Lesson 2821 — Backdoor Triggers and Activation Patterns
- Transaction Integrity Checks
- ensure all steps complete correctly or none at all.
- Lesson 927 — Preventing Payment Logic Vulnerabilities
- Transaction status indicators
- Lesson 916 — Session State Tampering
- Transcription Logging
- records complete PowerShell session input and output to text files, creating a chronological transcript.
- Lesson 1511 — PowerShell and Command-Line Logging
- Transfer
- Upload the wrapped key material securely
- Lesson 1771 — Bring Your Own Key (BYOK) and Key ImportLesson 2813 — Black-Box Evasion Attacks
- Transfer counters
- Monitor bytes sent/received per peer to detect stalled or dead connections
- Lesson 498 — WireGuard Deployment Best Practices and Monitoring
- Transfer-Encoding: chunked
- Indicates the body is sent in chunks, each with its own size marker
- Lesson 1105 — HTTP Request Smuggling Fundamentals
- Transferable
- Often effective across different models and cameras
- Lesson 2815 — Adversarial Patches and Object Detection Attacks
- Transformations
- (encoding, validation, sanitization)
- Lesson 1380 — Instrumentation Agents and Runtime Monitoring
- Transformer layers
- – attention heads process relationships between tokens
- Lesson 2854 — LLM Architecture and Attack Surface
- Transit Gateway
- acts as a central hub, allowing multiple VPCs to connect through one managed point.
- Lesson 1816 — Cross-VPC Communication ControlsLesson 1838 — Transit Gateway ArchitectureLesson 1842 — Cross-Region and Cross-Account Connectivity
- Transit Gateway Attachments
- Lesson 1839 — Transit Gateway Security Controls
- Transitive assumptions
- "They can read folder X, so surely they can read all files inside"
- Lesson 2629 — Complete Mediation
- transitive dependencies
- (or indirect dependencies), and you probably never reviewed their code or even knew they existed.
- Lesson 1259 — Understanding Software Dependencies and Transitive RiskLesson 1281 — Transitive Dependencies and Dependency TreesLesson 2875 — Dependency Vulnerabilities in ML Frameworks
- Translation or encoding tricks
- ask for harmful content in Base64, pig Latin, or through metaphors, exploiting the model's weaker safeguards in non-standard formats.
- Lesson 2858 — Jailbreaking and Constraint Bypass
- Transmission
- Include it in the authorization URL: `?
- Lesson 763 — State Parameter and CSRF ProtectionLesson 2096 — Data Handling and ConfidentialityLesson 2885 — End-to-End Security and Lifecycle Protection
- Transparency
- Every design choice is documented and justified (reflecting the Open Design principle you learned earlier)
- Lesson 89 — AES: Rijndael Selection and DesignLesson 2474 — Communicating with Security ResearchersLesson 2938 — Automated Decision-Making and Profiling Rights
- Transparency and Trust
- Teams openly discuss security findings without blame.
- Lesson 2054 — DevSecOps Philosophy and Culture Shift
- transparent
- no trusted setup required at all.
- Lesson 246 — zk-STARKs and Transparent ProofsLesson 2938 — Automated Decision-Making and Profiling Rights
- transparent data encryption (TDE)
- that encrypts pages before writing to disk and decrypts when reading into memory—completely transparent to your application.
- Lesson 1792 — Database Encryption OverviewLesson 1794 — Column-Level and Field-Level EncryptionLesson 1799 — Performance Impact of Database Encryption
- Transport (L4)
- Lesson 2780 — IoT Protocol Landscape and OSI Mapping
- Transport layer
- TCP/UDP header added (port numbers, sequence numbers)
- Lesson 374 — Understanding Network Packets and Protocol LayersLesson 1440 — SSH Protocol Fundamentals and Security Model
- Transport Layer (Layer 4)
- Control connection rates and bandwidth allocation.
- Lesson 1858 — Rate Limiting and Traffic Shaping
- Transport Layer Security (TLS)
- wraps your syslog traffic in encryption, just like HTTPS protects web browsing.
- Lesson 1486 — Remote Logging and Secure Transport
- transport mode
- and **tunnel mode**.
- Lesson 476 — IPsec Modes: Transport vs TunnelLesson 478 — Encapsulating Security Payload (ESP)
- Transport protocols
- rsyslog supports both UDP (fast, connectionless) and TCP (reliable, connection-oriented).
- Lesson 1480 — Remote Logging with rsyslog
- Treatment strategy
- – Mitigation, transfer, avoidance, or acceptance with justification
- Lesson 2523 — Risk Treatment Plans and Prioritization
- Trend analysis
- Are vulnerabilities increasing or decreasing over time?
- Lesson 1402 — Security Test Results ManagementLesson 1607 — Patch Compliance Monitoring and ReportingLesson 1615 — Vulnerability Scan ReportingLesson 2027 — Drift Reporting and Exception ManagementLesson 2252 — Social Engineering Reporting and MetricsLesson 2625 — Remediation Tracking and Reporting
- Trend lines
- showing risk posture improving over time
- Lesson 2533 — Communicating Metrics to Leadership
- Trend-based
- Fail if new vulnerabilities are introduced compared to the previous build
- Lesson 2052 — Security Gates and Failure Policies
- Triage findings
- by severity and exploitability first.
- Lesson 1363 — False Positives and Tuning SAST Tools
- Triage resources
- Do you need managed services or in-house handling?
- Lesson 2480 — Bug Bounty Platform Ecosystem
- Triage response
- 7-14 days (severity assessment, timeline proposal)
- Lesson 2077 — Coordinated Disclosure Timelines
- Triaging
- means categorizing findings by severity, exploitability, and business impact.
- Lesson 2053 — Test Result Management and Remediation Workflows
- Trigger
- actions in other tabs by manipulating shared storage
- Lesson 1077 — Cross-Tab and Cross-Origin Storage AttacksLesson 2048 — Dependency Scanning in Build Pipelines
- Trigger alerts
- Notify appropriate personnel when unauthorized changes occur
- Lesson 1506 — FIM for Compliance Requirements
- Trigger conditions
- What alert or event activates this playbook
- Lesson 2311 — Playbooks and Standard Operating ProceduresLesson 2350 — Triage Playbooks and RunbooksLesson 2372 — IR Playbooks and Runbooks
- Trigger Manipulation
- Attackers might abuse publicly accessible event sources or manipulate triggers to invoke functions repeatedly (causing denial of wallet), bypass intended workflows, or trigger functions with escalated privileges they shouldn't have.
- Lesson 1943 — Event-Driven Security Risks
- Trigger parsing errors
- – Send malformed content with mismatched Content-Type to cause crashes or bypass input validation entirely
- Lesson 997 — Content-Type and Accept Header Exploits
- Trigger-based updates
- Major architecture changes should automatically trigger threat model review:
- Lesson 2644 — Iterating Threat Models with Architecture Changes
- Triggers
- initiate the playbook.
- Lesson 2327 — Playbook Design FundamentalsLesson 2888 — PIA Triggers and Scoping
- Triggers a vulnerability scan
- using tools like Trivy (from your previous lessons)
- Lesson 1641 — CI/CD Integration and Gating Policies
- Tripled lookback period
- for data retention from 12 to 36 months
- Lesson 2568 — CPRA Amendments and Enforcement
- TRITON/TRISIS (2017)
- went further by targeting safety instrumented systems (SIS)—the emergency shutdown mechanisms designed to prevent catastrophic failures.
- Lesson 2805 — OT-Specific Threats and Attacks
- Trivy
- and **Anchore** analyze:
- Lesson 1355 — Container Image Secret ScanningLesson 1400 — Container and Image Scanning
- Trojan
- Disguises itself as legitimate software, relies on social engineering
- Lesson 1518 — Malware Taxonomy and Classification CriteriaLesson 1521 — Trojans: Deceptive FunctionalityLesson 1529 — Email-Based Infection Vectors
- Trojan horse
- you're not uploading a weapon directly, you're hiding it inside something that looks harmless.
- Lesson 623 — XXE via File Upload and Content TypesLesson 951 — Archive and Compressed File Attacks
- True condition
- Page loads normally, shows content, or returns HTTP 200
- Lesson 568 — Blind SQL Injection Fundamentals
- True Positive
- Confirmed malicious activity requiring response
- Lesson 1578 — EDR Alert Triage and Investigation
- True Positive Rate (TPR)
- Also called "detection rate," this measures what percentage of actual security incidents your alerts successfully caught.
- Lesson 2354 — Alert Quality Metrics
- TruffleHog
- and **GitGuardian** don't just scan your current working directory—they traverse *every commit* in your repository's history, including:
- Lesson 1255 — Repository Scanning and History AnalysisLesson 1640 — Secrets and Sensitive Data in ImagesLesson 3031 — Secret Detection in Pipelines
- Truncation
- Converting the HMAC output into a human-readable 6-digit code
- Lesson 740 — TOTP and Time-Based One-Time PasswordsLesson 2228 — Rule-Based Attacks
- Trust
- Users receive malicious content from domains they trust
- Lesson 1127 — Web Cache Poisoning via Host HeaderLesson 1297 — Container Image Verification
- trust anchor
- is a certificate (typically a root CA certificate) that your system has been configured to trust inherently, without needing validation from another authority.
- Lesson 182 — Trust Anchors and Root Certificate StoresLesson 183 — Path Building and Discovery
- trust boundaries
- before writing code
- Lesson 12 — Security as a Non-Functional RequirementLesson 21 — Security Frameworks: NIST Cybersecurity FrameworkLesson 31 — Security as Continuous Improvement, Not a Final StateLesson 40 — Threat Modeling in the SDLCLesson 41 — Assets, Entry Points, and Trust BoundariesLesson 42 — Creating a Data Flow Diagram (DFD)Lesson 49 — Motivations: Espionage and Intelligence GatheringLesson 59 — Information Disclosure Threats (+10 more)
- trust boundary
- is an invisible line separating parts of your system that operate under different security assumptions.
- Lesson 11 — Trust Boundaries and Implicit TrustLesson 42 — Creating a Data Flow Diagram (DFD)Lesson 1149 — Trust Boundaries and Data FlowLesson 2639 — Trust Boundary AnalysisLesson 2645 — Understanding Trust Boundaries
- Trust Boundary Confusion
- When mixing workloads with different trust levels (internal apps alongside external customer workloads), a security failure in a lower-trust container can cascade into higher-trust zones if isolation isn't absolute.
- Lesson 1631 — Multi-Tenancy Security Challenges
- Trust boundary violation
- You're executing third-party code directly—no sandboxing
- Lesson 1061 — Bypassing SOP with JSONPLesson 2647 — Trust Boundary Violations and Risks
- Trust Center
- (Zigbee) or **Controller** (Z-Wave) manages key distribution
- Lesson 2785 — Zigbee and Z-Wave Security Models
- Trust chains
- – a hierarchical system where certificates vouch for other certificates, all leading back to a pre- trusted authority.
- Lesson 177 — Certificate Chains and Hierarchies
- Trust Evaluation
- STS checks the role's trust policy to verify the caller is allowed to assume it
- Lesson 1730 — AWS STS and AssumeRole Mechanics
- Trust in structure
- Developers assume users will only send primitive values (strings, numbers)
- Lesson 596 — JSON Injection and Type Confusion
- Trust model
- | Trusts users to make decisions | Assumes users may be compromised |
- Lesson 1450 — MAC vs DAC: Fundamental Differences
- Trust Obliteration
- News of plain text storage makes headlines.
- Lesson 683 — Why Plain Text Password Storage is Catastrophic
- trust policy
- (also called assume-role policy) that defines *who* can assume the role.
- Lesson 1712 — IAM Roles: Federated and Assumable IdentitiesLesson 1738 — AssumeRole and Trust Policies
- Trust Policy Manipulation
- The `iam:UpdateAssumeRolePolicy` permission lets you modify a role's trust policy to allow *your* identity to assume a privileged role, effectively borrowing its permissions.
- Lesson 1755 — Policy Attachment and Modification Escalation
- trust relationships
- between components, and common **deployment mistakes**.
- Lesson 547 — 802.1X Security Considerations and AttacksLesson 1141 — Open Redirect FundamentalsLesson 1737 — Cross-Account Access FundamentalsLesson 2123 — Domain Enumeration and Reconnaissance
- Trust shift
- You're not truly anonymous—you've simply shifted trust from your ISP to your VPN provider, who can still see everything
- Lesson 471 — VPN Use Case: Privacy and Anonymity
- Trusted Execution Environment
- is a hardware-enforced secure enclave within a processor that isolates code and data from the rest of the system.
- Lesson 2927 — Trusted Execution Environments
- Trusted Execution Environments (TEEs)
- create hardware-isolated secure zones that protect sensitive data even when the main operating system or applications are compromised.
- Lesson 2927 — Trusted Execution Environments
- Trusted intermediary
- A mutual friend confirms both parties' fingerprints
- Lesson 2945 — Identity Verification in E2EE
- Trusted Platform Module
- is a specialized microchip (or firmware implementation) physically integrated into your computer's motherboard.
- Lesson 307 — Trusted Platform Modules (TPMs)Lesson 2771 — Hardware Root of Trust and TPM
- Trusted Platform Modules (TPMs)
- Dedicated chips that store keys, perform cryptographic operations, and attest to device integrity
- Lesson 2796 — Device Identity and Hardware Root of Trust
- Trusted Publishers
- a way to verify packages come from legitimate sources.
- Lesson 1296 — PyPI Package Security
- Trusting internal data
- Assuming data from databases or APIs is safe
- Lesson 1157 — Common Input Validation Pitfalls
- TSL (Transient System Load)
- Executes the chosen OS bootloader
- Lesson 1459 — UEFI Architecture and Boot Process
- TTL (Time To Live)
- Windows typically uses 128, Linux uses 64, older systems might use 255
- Lesson 359 — TCP/IP Stack Fingerprinting
- TTL analysis
- Routers decrement TTL values, revealing multi-hop paths between networks
- Lesson 353 — Gateway and Router Identification
- TTL-based expiration
- ensures you refresh periodically to catch rotations
- Lesson 1334 — Secret Store Access Patterns
- TTP sharing
- Red team explains *how* they bypassed controls (tools, techniques, and procedures used)
- Lesson 2174 — Debrief and Knowledge Transfer
- TUF
- (The Update Framework) to PyPI, protecting against various attacks:
- Lesson 1296 — PyPI Package Security
- Tumult Analytics
- offer flexible, composable tools for complex analytical workflows while tracking your epsilon budget across multiple queries.
- Lesson 2921 — Practical Differential Privacy Implementation
- TUN
- (tunnel) operates at Layer 3 (IP level) — best for routing IP packets
- Lesson 486 — OpenVPN Architecture and ComponentsLesson 489 — OpenVPN Network Topologies: Routed vs Bridged
- TUN (routed)
- for modern IP-based VPNs with better performance; use **TAP (bridged)** only when Layer 2 connectivity or broadcast protocols are required, accepting the performance cost.
- Lesson 489 — OpenVPN Network Topologies: Routed vs Bridged
- Tune aggressively
- Reduce false positives so developers trust the alerts
- Lesson 1365 — Integrating SAST into Development WorkflowLesson 2011 — CSPM Vendor Selection and Deployment
- Tune for false positives
- (exclude known-good tools and processes)
- Lesson 2181 — ATT&CK for Detection and Analytics
- tunnel mode
- .
- Lesson 476 — IPsec Modes: Transport vs TunnelLesson 478 — Encapsulating Security Payload (ESP)
- Tunneling attempts
- Using DNS queries to smuggle data out (e.
- Lesson 379 — DNS Traffic Analysis and Query Patterns
- Tunneling RDP
- Route through compromised hosts to mask origin
- Lesson 2156 — RDP and GUI-Based Lateral Movement
- Turbo Intruder
- High-speed request engine for complex attacks
- Lesson 2214 — Burp Extensions and BApp Store
- Turkish Locale Problem
- Lesson 1162 — Case Sensitivity and Case Mapping Attacks
- Turnstiles
- are rotating barriers (waist-high or full-height) that allow only one person per authentication event.
- Lesson 2282 — Mantrap and Turnstile Controls
- Twist security
- Resistant to invalid curve attacks you learned about — even if an attacker sends a malicious point, the math stays safe
- Lesson 167 — Curve25519 and EdDSA
- Twofish
- was a finalist in the AES competition.
- Lesson 93 — Alternative Block Ciphers: Blowfish, Twofish, Serpent
- Type Checking
- Lesson 600 — NoSQL Injection Prevention and Input ValidationLesson 2738 — Input Validation and IPC Security
- Type confusion
- Submit arrays `["value"]` or objects `{"key":"value"}` where strings are expected
- Lesson 601 — Detecting and Testing for NoSQL Injection
- Type I
- A point-in-time snapshot.
- Lesson 1978 — SOC 2 Trust Service CriteriaLesson 2591 — SOC 2 Overview and Trust Services CriteriaLesson 2599 — SOC 2 Reports and Continuous Compliance
- Type II
- A performance report over time (typically 6-12 months).
- Lesson 1978 — SOC 2 Trust Service CriteriaLesson 2591 — SOC 2 Overview and Trust Services CriteriaLesson 2599 — SOC 2 Reports and Continuous Compliance
- Types
- Security contexts assigned to *files and objects*.
- Lesson 1453 — SELinux Architecture and Components
- TypeScript
- is significantly easier to analyze than JavaScript due to explicit type annotations—a reminder that language choice impacts security tooling effectiveness.
- Lesson 1364 — Language-Specific SAST Considerations
- Typosquatting Domains
- register URLs similar to popular brands with subtle misspellings: `micros0ft.
- Lesson 2258 — Link Manipulation and URL Obfuscation
U
- U+202E
- (Right-to-Left Override) — forces following text to display backward
- Lesson 1170 — Bidirectional Text and Control Characters
- UART
- often exposes bootloader prompts or root shells with minimal authentication
- Lesson 2776 — Debug Interfaces and JTAG Security
- UDP is connectionless
- there's no built-in acknowledgment that a port is open.
- Lesson 341 — UDP Scanning Techniques
- UDP port 514
- (fast but unreliable) or **TCP port 514/6514** (reliable, optionally encrypted with TLS).
- Lesson 1475 — syslog Protocol and Standards
- UEBA baseline deviations
- indicating this user never accessed these resources before
- Lesson 1902 — Multi-Signal Correlation for Detection
- UEFI firmware
- verifies the digital signature of the **bootloader** using its trusted keys
- Lesson 1460 — Secure Boot Fundamentals and Chain of Trust
- UEFI firmware persistence
- embeds malware directly into the motherboard's firmware—the code that initializes hardware before any boot loader runs.
- Lesson 1544 — Boot and Kernel-Level Persistence
- UEFI Secure Boot
- (which we covered earlier) verify bootloader signatures, making bootkits significantly harder to deploy on properly configured systems.
- Lesson 1553 — Bootkits and MBR Persistence
- UI redressing
- encompasses a family of attacks that manipulate what users *see* versus what they're actually *clicking* or *interacting with*.
- Lesson 1134 — UI Redressing Techniques and Variants
- UID 0
- = root, the superuser with unlimited access
- Lesson 2139 — Linux Privilege Model and Escalation Fundamentals
- UID 1-999
- = system accounts (services, daemons)
- Lesson 2139 — Linux Privilege Model and Escalation Fundamentals
- Unaddressed security issues
- Open CVEs with no response
- Lesson 1267 — Unmaintained Dependencies and End-of-Life Libraries
- Unambiguous
- Lesson 2556 — Consent Requirements and ManagementLesson 2932 — Consent Requirements and Valid Consent
- Unauthenticated scanners
- probe from the outside without credentials, seeing only what's externally visible—like examining a building from the street
- Lesson 1608 — Vulnerability Scanning Fundamentals
- Unauthenticated scans
- probe systems from an external attacker's perspective—no credentials provided.
- Lesson 2434 — Vulnerability Scanning Fundamentals
- Unauthorized Access
- The server validates the token and grants access to the victim's account
- Lesson 718 — Session Replay AttacksLesson 1076 — Cache API and Service Worker StorageLesson 1310 — What Are Secrets and Why They MatterLesson 2271 — Physical Security Threat Landscape
- Unauthorized Clients
- WIDS tracks all wireless clients and flags devices that don't match your security policy—perhaps a device trying to connect without proper 802.
- Lesson 548 — Wireless Intrusion Detection Systems (WIDS)
- Unauthorized data exposure
- Introspection reveals the entire data model
- Lesson 999 — GraphQL Architecture and Security Implications
- Unauthorized downloads
- Attackers stealing proprietary models for competitive advantage or extraction attacks
- Lesson 2876 — Model Repository Security
- Unauthorized instances
- New VM deployments in unusual regions or instance types optimized for mining (GPU-heavy)
- Lesson 1893 — Cryptomining and Resource Abuse Detection
- Unauthorized network access
- Attackers can use the rogue AP as a bridge to bypass perimeter defenses
- Lesson 533 — Rogue Access Points: Definition and Threat Model
- Unauthorized physical access
- Malicious insiders (data center staff, hardware technicians) or attackers who breach physical security cannot extract plaintext data from storage media.
- Lesson 1763 — Understanding Encryption at Rest Fundamentals
- Unauthorized program access
- Malware can't simply bind to an allowed port
- Lesson 1588 — Application-Based Firewall Rules
- Unauthorized S3 Access
- Lesson 1892 — Data Exfiltration Detection
- Unawareness
- Users not knowing how their data is collected or used (e.
- Lesson 70 — LINDDUN for Privacy Threat Modeling
- Unblinding
- The owner removes the blinding factor, revealing a valid signature on the original message
- Lesson 233 — Blind Signatures and Anonymous Credentials
- Under what conditions
- (source IP, time of day, MFA required)
- Lesson 1769 — Encryption Key Policies and Access Control
- Underflow
- works similarly: subtracting from zero when using unsigned integers can wrap to the maximum value, turning a $5 refund into billions.
- Lesson 926 — Integer Overflow in Financial Calculations
- Undermine certificates
- Generate rogue SSL certificates with the same hash as valid ones
- Lesson 201 — Collision Resistance
- Understand obfuscated logic
- Watch what actually executes at runtime
- Lesson 2726 — Dynamic Analysis and Runtime Instrumentation
- Understand obfuscation techniques
- attackers use to hide malicious code
- Lesson 2722 — Introduction to Mobile App Reverse Engineering
- Understand service boundaries
- Know what infrastructure you actually control versus what's managed by others
- Lesson 2097 — Third-Party and Cloud Considerations
- Understand the intended workflow
- What's the "happy path"?
- Lesson 936 — Business Logic Testing Fundamentals
- Undetectable by label inspection
- – all labels are accurate
- Lesson 2820 — Clean-Label Poisoning Attacks
- Undetected breaches
- If a credential was compromised months ago but still works, attackers maintain silent access
- Lesson 1343 — Secret Rotation Fundamentals
- Undocumented Endpoints
- Developers create "temporary" endpoints for testing that never get removed or tracked.
- Lesson 1035 — API9:2023 - Improper Inventory Management
- Unencrypted communications
- broadcasting sensitive operational data
- Lesson 2804 — SCADA Security and Air-Gap Myths
- Unencrypted data transmission
- exposing sensitive information
- Lesson 2751 — Common IoT Vulnerabilities and Weaknesses
- Unexpected account IDs
- Trust relationships added without authorization
- Lesson 1743 — Cross-Account Access Auditing
- Unexpected ARP traffic
- Unusually high volumes of ARP replies, especially unsolicited ones
- Lesson 410 — Signs of Network Interception
- Unexpected Certificate Issuer
- Lesson 412 — Certificate Validation Failures
- Unexpected CPU spikes
- Sustained 90%+ CPU usage on instances that normally idle or run light workloads
- Lesson 1893 — Cryptomining and Resource Abuse Detection
- Unexpected data formats
- can break your application logic or bypass validation
- Lesson 1036 — API10:2023 - Unsafe Consumption of APIs
- Unexpected formats
- Missing fields, null values, special characters
- Lesson 2332 — Playbook Testing and Validation
- Unexpected logouts
- Sessions terminating as an attacker hijacks them
- Lesson 410 — Signs of Network Interception
- Unexpected MAC Vendors
- Lesson 411 — ARP Cache Inspection
- Unexpected network connections
- to command-and-control servers
- Lesson 1651 — Container Runtime Security Overview
- Unexpected redirects
- Being bounced to strange login pages
- Lesson 537 — Detecting Evil Twin Attacks from Client Perspective
- Unexpected status codes
- Your request returns `404` when it should return `200`, suggesting it was processed as a different endpoint
- Lesson 1108 — Detecting Request Smuggling Vulnerabilities
- Unexpected surveillance capabilities
- emerge from sensor combinations: microphones intended for voice commands can be remotely activated, cameras can be accessed by third parties through security flaws, and motion sensors reveal occupancy patterns valuable to burglars or stalkers.
- Lesson 2756 — IoT Privacy and Surveillance Concerns
- Unexpected vulnerability introduction
- from automatic minor/patch updates
- Lesson 1263 — Dependency Lock Files and Reproducible Builds
- Unforgeability
- Only someone with a private key from the ring can create a valid signature
- Lesson 236 — Ring Signatures and Group Anonymity
- Unicode and UTF-8 Encoding
- Represent characters using Unicode overlong sequences or alternative encodings:
- Lesson 966 — Encoding and Double-Encoding Bypasses
- Unicode Variations
- Some Unicode characters look identical or similar to ASCII.
- Lesson 649 — Character Encoding Bypasses
- Unified Endpoint Management (UEM)
- platforms to continuously monitor and enforce device compliance.
- Lesson 2678 — Device Trust and Endpoint SecurityLesson 2743 — Enterprise Mobility Management (EMM) and UEM
- Unified Playbooks
- Your IR playbooks must account for cross-account scenarios—who has authority to isolate resources in Account B when the alert originated in Account A?
- Lesson 1912 — Multi-Account and Cross-Region IR
- Unified policy engine
- Apply conditional access, compliance rules, and security baselines across all device types
- Lesson 2743 — Enterprise Mobility Management (EMM) and UEM
- Unified Reporting
- Security teams see compliance posture alongside threat indicators in a single dashboard, eliminating tool-switching and context gaps.
- Lesson 1995 — Compliance Tool Integration with SIEM
- Unified Syntax
- One command (`nft`) handles all packet types—IPv4, IPv6, ARP, bridge traffic—using consistent language.
- Lesson 443 — nftables Architecture and Improvements
- Unified Visibility
- You need a single dashboard showing compliance posture across all environments.
- Lesson 1986 — Multi-Cloud and Hybrid Compliance Challenges
- Uniformly distributed
- All possible values are equally likely
- Lesson 134 — Generating Secure Random IVs and Nonces
- Uninitialized state
- Generating random numbers before proper seeding produces predictable output
- Lesson 298 — CSPRNG Initialization and Seeding
- Unintended exposure
- If **any** subdomain had an XSS vulnerability, attackers could set `document.
- Lesson 1060 — document.domain Relaxation and RisksLesson 1813 — Default VPC Security Considerations
- Unintended memorization
- occurs when models, especially large language models, memorize and regurgitate verbatim training examples like credit card numbers, addresses, or private conversations.
- Lesson 2836 — Privacy Risks in Machine Learning
- unique
- (never reused with the same key), but they don't need to be unpredictable.
- Lesson 132 — IV Requirements for Different ModesLesson 140 — Salts in Key DerivationLesson 731 — Session Creation and Initialization
- Unique Encryption Keys
- Each secret should ideally be encrypted with a unique data encryption key (DEK), not one master key for everything.
- Lesson 1317 — Encryption at Rest for Secret Storage
- Unique identifiers
- like session IDs, usernames, or hostnames
- Lesson 2165 — Evidence Collection and Screenshots
- Unique local administrator passwords
- across systems (LAPS on Windows)
- Lesson 2159 — Detection and Defense Against Lateral Movement
- Unique per client
- Never share the same key across multiple users or applications
- Lesson 1009 — API Key Authentication: Design and Security
- Unique User ID (UID)
- The system assigns the app a unique Linux user ID—different from every other app
- Lesson 2713 — Android Application Sandboxing
- uniqueness
- .
- Lesson 686 — Password Salting: Adding Uniqueness to Every HashLesson 704 — Session Identifiers: Generation and Properties
- Uniqueness metrics
- Count how many records have rare combinations of quasi-identifiers
- Lesson 2911 — Measuring and Testing Anonymization Effectiveness
- Universal Reference String (URS)
- or **Common Reference String (CRS)**—essentially mathematical values that both the prover and verifier need to create and check zero-knowledge proofs.
- Lesson 245 — Trusted Setup and Universal Reference Strings
- unkeyed inputs
- they don't include them in the cache key but still use them when generating responses.
- Lesson 1119 — Cache Poisoning via HTTP Header InjectionLesson 1121 — Cache Poisoning Detection Techniques
- Unkeyed parameters
- Query strings or headers the CDN doesn't include in the cache key
- Lesson 1865 — CDN Cache Security and Cache Poisoning
- Unknown file types
- that might contain malicious code
- Lesson 945 — File Upload Attack Surface and Risk Assessment
- Unknown or missing licenses
- Dependencies without clear licenses pose legal risk.
- Lesson 1272 — License Compliance Scanning
- Unknown vulnerabilities
- – New cryptanalysis techniques emerge regularly
- Lesson 207 — Hash Function Security Margins
- Unlawful Processing
- Does your processing lack a valid legal basis under GDPR, CCPA, or other frameworks?
- Lesson 2890 — Privacy Risk Identification
- Unlike Union-Based injection
- (which requires matching column counts and types), error-based attacks work by forcing the database to include sensitive information directly in the error output.
- Lesson 567 — Error-Based SQL Injection Exploitation
- Unlimited file sizes
- Users upload gigabyte files without restriction
- Lesson 1030 — API4:2023 - Unrestricted Resource Consumption
- Unpatched legacy systems
- that can't be upgraded without breaking functionality
- Lesson 2463 — What Are Compensating Controls
- Unpatched Vulnerabilities
- are known security flaws that haven't been fixed on a particular system.
- Lesson 1534 — Exploitation of Software Vulnerabilities
- unpredictable
- (typically random)
- Lesson 96 — CBC Mode: Chaining Blocks for SecurityLesson 131 — Nonces vs IVs: Definitions and DifferencesLesson 132 — IV Requirements for Different ModesLesson 134 — Generating Secure Random IVs and NoncesLesson 740 — TOTP and Time-Based One-Time PasswordsLesson 865 — Synchronizer Token Pattern
- Unprivileged model
- Handles untrusted user input, no access to tools/plugins
- Lesson 2861 — Defense Strategies Against Prompt Injection
- Unsafe Deserialization
- emerges when applications reconstruct objects from untrusted serialized data.
- Lesson 2039 — Common Vulnerability Patterns in Code
- Unseen data
- Predictions are generally less confident, with higher uncertainty
- Lesson 2831 — Membership Inference Attacks
- Unsigned or weakly-signed updates
- that bypass integrity checks
- Lesson 1463 — UEFI Firmware Attacks and Vulnerabilities
- Unsolicited urgency
- "Your account will be locked in 15 minutes unless.
- Lesson 2270 — Detecting and Resisting Manipulation Attempts
- Unsupervised Learning
- Most cloud ML anomaly detection uses unsupervised learning, meaning it doesn't need labeled "attack" examples—it simply learns what's normal and flags outliers.
- Lesson 1899 — Machine Learning for Cloud Anomaly Detection
- Unsure
- → Both SPDX and CycloneDX have strong tooling and growing adoption
- Lesson 1277 — SBOM Formats: SPDX, CycloneDX, and SWID
- untrusted
- .
- Lesson 415 — DHCP Snooping and DAILesson 1458 — MAC in Windows: Mandatory Integrity Control
- Untrusted Inputs
- Events from external sources (S3 uploads, SQS messages, API Gateway requests) may contain malicious payloads.
- Lesson 1943 — Event-Driven Security Risks
- Unusual activity patterns
- Accessing admin pages a user never visits
- Lesson 737 — Session Monitoring and Anomaly Detection
- Unusual API calls
- for a given identity (baseline deviation)
- Lesson 1735 — Credential Theft and Token SecurityLesson 1907 — Cloud Account Compromise Response
- Unusual AssumeRole calls
- from unexpected IPs or at odd times
- Lesson 1736 — Best Practices for Temporary Credentials
- Unusual authentication patterns
- Why is the marketing manager logging into a database server?
- Lesson 2159 — Detection and Defense Against Lateral Movement
- Unusual handshake patterns
- suggesting man-in-the-middle attacks
- Lesson 380 — TLS/SSL Traffic Analysis and Certificate Inspection
- Unusual process names
- Programs with cryptomining signatures (e.
- Lesson 1893 — Cryptomining and Resource Abuse Detection
- Unusual protocols
- Attempts using `file://`, `gopher://`, `dict://` instead of standard `http/https`.
- Lesson 900 — Monitoring and Detection of SSRF Attempts
- Unusual query types
- (like excessive TXT record requests that can hide encoded commands)
- Lesson 379 — DNS Traffic Analysis and Query Patterns
- Unusual traffic patterns
- Communication with unexpected regions, connections to known malicious IPs, or data exfiltration attempts (high outbound traffic volumes) become visible.
- Lesson 1872 — VPC Flow Logs and Network Monitoring
- Unusual Transfer Patterns
- Lesson 1892 — Data Exfiltration Detection
- Unusual URI patterns
- SQL injection attempts, directory traversal (`.
- Lesson 2414 — DNS and HTTP Forensics
- Unusual User-Agent strings
- (bots masquerading as browsers)
- Lesson 1868 — CDN Monitoring and Incident Response
- Unvalidated system calls
- like `system()` or `eval()` that accept user input directly can execute arbitrary commands if the input isn't properly sanitized—enabling command injection attacks.
- Lesson 1226 — Understanding Dangerous Functions and Their Risks
- Unwrapping
- Cloud HSM unwraps and stores your key in its secure boundary
- Lesson 1771 — Bring Your Own Key (BYOK) and Key Import
- Update automatically
- through OS/browser updates
- Lesson 182 — Trust Anchors and Root Certificate Stores
- Update baseline
- – After confirmed legitimate changes, regenerate your FIM database
- Lesson 1504 — FIM Alert Analysis and Response
- Update clipping and sampling
- Limit gradient magnitudes and randomly select participants per round
- Lesson 2843 — Federated Learning Privacy
- Update directory services
- like LDAP or public key servers
- Lesson 318 — Key Revocation and Compromise Response
- Update documentation
- Ensure comments reflect current reality (from lesson 432)
- Lesson 435 — Rule Review and Maintenance
- Update frequency
- Are threat models reviewed when systems change?
- Lesson 84 — Measuring Threat Modeling Effectiveness
- Update Incrementally
- If you're several versions behind, update one minor version at a time rather than jumping from 2.
- Lesson 1266 — Dependency Update Strategies and Patching
- Update process race conditions
- allowing malicious code injection during flashing
- Lesson 1463 — UEFI Firmware Attacks and Vulnerabilities
- Update regularly
- exploits targeting outdated Tor Browsers appear frequently
- Lesson 2991 — Operational Security for Tor Users
- Update security controls
- documentation
- Lesson 2644 — Iterating Threat Models with Architecture Changes
- Update Strategies
- EDR agents require regular updates for detection rules and platform improvements.
- Lesson 1583 — EDR Deployment and Performance Considerations
- Update your application configuration
- to use the new credentials (stored in your secret store)
- Lesson 1347 — Database Credential Rotation
- Upload malicious tools
- directly to target systems via `C$` or `ADMIN$`
- Lesson 2154 — SMB and Administrative Shares
- Upload Size Limits
- Lesson 986 — File Size and Rate Limiting Controls
- Upload validation
- checks the file extension and magic bytes
- Lesson 975 — Polyglot Files and Format Confusion
- Upper Layers
- Profiles like A2DP (audio) or HID (keyboards)
- Lesson 555 — Bluetooth Architecture and Security Model
- Urgency
- (limited-time offers, immediate threats)
- Lesson 1533 — Social Engineering and User DeceptionLesson 2268 — Urgency and Fear-Based Manipulation
- Urgency and Fear
- Messages create artificial time pressure: "Your account will be suspended in 24 hours!
- Lesson 2253 — Email-Based Phishing Fundamentals
- Urgency tactics
- Creating artificial time pressure ("Your account shows suspicious activity right now!
- Lesson 2259 — Smishing and Vishing
- URI paths
- indicating malicious endpoints or exploit delivery
- Lesson 2415 — Network-Based IOC Extraction
- URL Context
- Percent-encode special characters like spaces (`%20`), ampersands (`%26`), and quotes to prevent URL manipulation or injection.
- Lesson 668 — Output Encoding and Escaping FundamentalsLesson 672 — Template Auto-EscapingLesson 1220 — Context-Specific Output Encoding
- URL Encoding
- Transform characters into percent-encoded forms: `%3Cscript%3E` becomes `<script>` when processed by the browser.
- Lesson 649 — Character Encoding BypassesLesson 1142 — Open Redirect Attack Vectors
- URL Encoding (Percent Encoding)
- Replace special characters with `%` followed by hexadecimal values:
- Lesson 966 — Encoding and Double-Encoding Bypasses
- URL Generation
- Applications using the Host header to build absolute URLs for redirects, API endpoints, or scripts can be manipulated to point users elsewhere.
- Lesson 1125 — Host Header Injection VulnerabilitiesLesson 1235 — Framework-Specific Safe APIs
- URL parameters
- embed the session ID directly in the URL: `https://example.
- Lesson 706 — Session Transmission: Cookies vs URL Parameters vs HeadersLesson 714 — Session Fixation AttacksLesson 816 — Parameter Tampering in IDOR AttacksLesson 819 — Testing for IDOR VulnerabilitiesLesson 882 — SSRF Fundamentals and Attack SurfaceLesson 884 — Basic SSRF Exploitation TechniquesLesson 912 — State Manipulation FundamentalsLesson 923 — Payment Amount Tampering (+1 more)
- URL Parameters (Query Strings)
- Lesson 633 — XSS Attack Vectors and Injection Points
- URL Path Parameters
- Lesson 1177 — ReDoS Attack Vectors in Web Applications
- URLs
- Specific web addresses hosting malware or phishing content
- Lesson 2336 — Indicators of Compromise (IOCs) and Their LimitationsLesson 2415 — Network-Based IOC Extraction
- US State Laws
- (like California's CCPA) vary widely but typically require notification "without unreasonable delay" or within specific windows (30-90 days).
- Lesson 2429 — Legal and Regulatory Reporting Requirements
- Usability friction
- Lesson 2662 — Defense-in-Depth Trade-offs and Cost-Benefit
- Usage
- The caller includes all three values in subsequent AWS API calls
- Lesson 1730 — AWS STS and AssumeRole Mechanics
- Usage example
- Lesson 590 — SQLMap Evasion and Tampering Scripts
- Usage policies and compliance
- You must ensure the SaaS application is used according to your organization's policies and regulatory requirements.
- Lesson 1688 — Shared Responsibility in SaaS
- Usage tracking
- stores counters per API key: requests made, data transferred, or specific feature calls.
- Lesson 1016 — Quota Management and Tiered Access Control
- USB device control
- Disable all removable media except specific, registered device IDs.
- Lesson 1406 — Default Deny and Allowlisting
- USB drop attack
- involves deliberately planting malicious USB devices in physical locations where targets are likely to find and use them.
- Lesson 2277 — USB Drop Attacks and Malicious Devices
- Use
- An array-based API where the executable and each argument are distinct items
- Lesson 1230 — Safe Command Execution PatternsLesson 2596 — Privacy Criterion and GDPR AlignmentLesson 2885 — End-to-End Security and Lifecycle Protection
- Use `.gitignore`
- for files containing sensitive configuration
- Lesson 2013 — Secrets in IaC: Detection and Prevention
- Use `%n`
- to write to that address (overwrite return pointer, function pointer, etc.
- Lesson 2111 — Format String Vulnerabilities
- Use `Content-Disposition: attachment`
- to force downloads rather than browser rendering
- Lesson 963 — Polyglot Files and Multi-Format Attack Prevention
- Use `httpOnly` cookies
- for session tokens—JavaScript cannot access them, blocking XSS attacks
- Lesson 1080 — Sensitive Data Handling and Storage Alternatives
- Use `Object.create(null)`
- for objects that won't need prototype inheritance
- Lesson 1051 — JavaScript Prototype Chain Security
- Use `Object.freeze(Object.prototype)`
- to prevent modifications (if feasible)
- Lesson 1051 — JavaScript Prototype Chain Security
- Use Absolute URLs
- Lesson 1132 — Defending Against Host Header and DNS Attacks
- Use active techniques
- only when authorized (penetration testing engagements) or when you need specific technical details passive methods can't provide.
- Lesson 337 — Active vs Passive Reconnaissance
- Use adaptive hashing
- (bcrypt/Argon2) to slow down cracking regardless of password structure
- Lesson 695 — Password Length vs Complexity Trade-offs
- Use aliases for maintainability
- Group similar commands or users together:
- Lesson 1426 — Sudo Configuration and Security
- Use anchors
- specify packet locations rather than searching everywhere
- Lesson 459 — Writing Effective IDS/IPS Rules
- Use APIs for automation
- Leverage CloudTrail, GuardDuty findings, and flow logs to programmatically identify suspicious resources the moment alerts fire, then trigger automated preservation workflows.
- Lesson 1915 — Evidence Identification and Preservation in Cloud
- Use benign payloads
- Create a harmless file in `/tmp` rather than encrypting production data
- Lesson 2163 — Proof of Concept Development
- Use case
- Military or government systems (remember **Bell-LaPadula** and **Biba** models?
- Lesson 19 — Access Control Models: DAC, MAC, and RBACLesson 71 — Misuse and Abuse CasesLesson 93 — Alternative Block Ciphers: Blowfish, Twofish, SerpentLesson 254 — Real-World Applications and Use CasesLesson 476 — IPsec Modes: Transport vs TunnelLesson 1788 — Storage Access Logging and MonitoringLesson 2215 — Advanced Burp Features and Workflows
- Use cases
- Cryptocurrency custody, enterprise key management, certificate authorities, and blockchain validators.
- Lesson 264 — Threshold Signatures (TSS)Lesson 421 — Network-Based vs Host-Based Firewalls
- Use cryptographic tools
- to bundle this data into a standardized format
- Lesson 176 — Certificate Signing Requests (CSR)
- Use ECC
- for mobile devices, IoT, or modern applications where performance and efficiency matter
- Lesson 151 — RSA vs Other Asymmetric Algorithms
- Use expired certificates
- Set your clock backward to a date when a revoked or compromised certificate was still valid
- Lesson 188 — Time Validation and Clock Attacks
- Use explicit intents
- Specify exact target components rather than relying on implicit resolution
- Lesson 2738 — Input Validation and IPC Security
- Use Gaussian when
- Lesson 2916 — The Gaussian Mechanism and Advanced Noise
- Use high-quality entropy sources
- Draw your seed from hardware RNGs, system entropy pools, or unpredictable timing events— never use predictable values like timestamps alone or sequential counters.
- Lesson 298 — CSPRNG Initialization and Seeding
- Use instance profiles/managed identities
- instead of embedding credentials
- Lesson 1735 — Credential Theft and Token Security
- Use JSON.stringify()
- for structured data (but validate the context where it's placed)
- Lesson 1222 — JavaScript Context Encoding Challenges
- Use Laplace when
- Lesson 2916 — The Gaussian Mechanism and Advanced Noise
- Use minimal, well-maintained libraries
- Prefer libraries with small dependency trees and active maintenance
- Lesson 1945 — Third-Party Dependencies in Functions
- Use native APIs
- Cloud provider tools (like AWS EBS snapshots or Azure disk snapshots) create exact copies without modifying the original
- Lesson 1916 — Snapshot and Image AcquisitionLesson 1917 — Cloud Log Collection for Forensics
- Use object property access
- instead of evaluating strings
- Lesson 1052 — eval() and Dynamic Code Execution Risks
- Use passive first, always
- It's safer, legal, and undetectable.
- Lesson 337 — Active vs Passive Reconnaissance
- Use passive methods first
- Leverage OSINT before touching the network
- Lesson 366 — Stealth Scanning Fundamentals
- Use Phase
- Application performs the action based on the earlier check (e.
- Lesson 902 — Time-of-Check to Time-of-Use (TOCTOU) Vulnerabilities
- Use RSA
- when compatibility with legacy systems is critical or when you need well-understood, battle-tested cryptography
- Lesson 151 — RSA vs Other Asymmetric Algorithms
- Use shim bootloader
- (pre-signed by Microsoft, designed to chain-load custom bootloaders)
- Lesson 1462 — Configuring and Managing Secure Boot
- Use trained auditors
- Personnel independent of the area being audited
- Lesson 2608 — Internal Audits and Management Review
- Use Vetted Libraries
- Lesson 793 — JWT Best Practices and Validation
- Use visual tools
- Whiteboards and sticky notes make threat modeling tangible.
- Lesson 76 — Collaborative Threat Modeling Workshops
- Use VLAN tagging (802.1Q)
- on trunk ports to maintain separation across switches
- Lesson 2649 — VLAN and Subnet Segmentation
- Use when
- You have a backend server that can securely store client secrets and handle token exchanges (traditional web apps, mobile apps with PKCE).
- Lesson 771 — OIDC Authentication FlowsLesson 2187 — Kali Installation Options and Live BootLesson 2970 — File Encryption Standards and Formats
- Use-after-free
- conditions surface when specific input sequences trigger memory corruption
- Lesson 2102 — Fuzzing for Crash and Memory Bugs
- user
- SELinux user (not the same as Linux user)
- Lesson 1455 — SELinux Contexts and LabelsLesson 2030 — Security User Stories
- User accounts
- Regular users shouldn't have administrative privileges for daily tasks
- Lesson 1405 — Principle of Least Privilege in OS HardeningLesson 1720 — Service Accounts vs User Accounts in CloudLesson 2419 — Event Correlation TechniquesLesson 2663 — Principle of Least PrivilegeLesson 2666 — Fail-Safe Defaults
- User activity report
- Lesson 1496 — Searching and Analyzing Audit Logs
- User and role creation
- defining who and what can authenticate
- Lesson 1690 — Identity and Access Management Boundaries
- User attributes
- Properties of the requester (department=Finance, clearance_level=3, employment_status=active)
- Lesson 20 — Attribute-Based Access Control (ABAC)Lesson 799 — Attribute-Based Access Control (ABAC)
- User Authentication
- The user logs in and approves your app's access
- Lesson 758 — Authorization Code Flow Deep Dive
- User behavior
- Is this login time and pattern typical?
- Lesson 1747 — Conditional Access and Context-Aware MFA
- User context
- Session ID or user identifier tied to the request
- Lesson 900 — Monitoring and Detection of SSRF AttemptsLesson 2330 — Automated Incident Triage and Enrichment
- User Discovery
- Identifying all domain users, their group memberships, and privilege levels.
- Lesson 2123 — Domain Enumeration and Reconnaissance
- User experience
- Visible slowdowns can lead users to disable protection
- Lesson 1569 — Real-Time Protection and Scanning Strategies
- User feedback
- Inform the user of the outcome without revealing security details
- Lesson 961 — Virus Scanning and Malware Detection Integration
- User ID Manipulation
- Lesson 825 — Horizontal Privilege Escalation Patterns
- User ID Switching
- Lesson 826 — Parameter Tampering for Privilege Escalation
- User identity
- (IP address, authenticated user ID, session identifier)
- Lesson 989 — Upload Monitoring and Incident ResponseLesson 2685 — Software-Defined Perimeter and Identity-Based SegmentationLesson 2686 — BeyondCorp Model and Zero Trust AccessLesson 2687 — Context-Aware Access Controls
- User Interaction
- Automatic vs.
- Lesson 1265 — Evaluating Vulnerability Severity and ExploitabilityLesson 2076 — Severity Assessment and CVSS Scoring
- User Interaction Capture
- Lesson 644 — Data Exfiltration Techniques
- User mode
- Applications, scripts, and libraries
- Lesson 1594 — Windows Defender Application Control (WDAC)
- User namespace
- Maps container users to different host users for privilege separation
- Lesson 1624 — Container Isolation Fundamentals
- User patterns
- Login times, typical data volumes, geographic locations, applications accessed
- Lesson 2348 — Baseline Establishment and Anomaly Detection
- User remediation lists
- identifying individuals needing additional training
- Lesson 2252 — Social Engineering Reporting and Metrics
- User roles
- `role=user` → `role=admin`
- Lesson 916 — Session State TamperingLesson 1026 — Authorization Testing Automation
- User spoofing
- happens when attackers steal or guess login credentials, then log in as that person.
- Lesson 56 — Spoofing Identity Threats
- User Verification
- Both can perform user verification (proving *you're* using the authenticator), but they do it differently.
- Lesson 752 — Platform and Roaming Authenticators
- User Visibility
- Let users view and manage their active sessions through account settings, similar to how Google or Netflix displays "Where you're signed in.
- Lesson 736 — Concurrent Session Management
- User-Agents
- , certificate fingerprints, JA3/JA3S hashes, and other protocol-specific signatures
- Lesson 2415 — Network-Based IOC Extraction
- User-Assigned Managed Identities
- are standalone resources you create independently.
- Lesson 1724 — Azure Managed Identities Deep Dive
- User-generated content
- Comments, forum posts, profile descriptions
- Lesson 1155 — Rejecting vs Sanitizing Invalid Input
- User-installed software
- Shadow IT and personal installations bypass centralized control.
- Lesson 2460 — Third-Party and Application Patching
- User-Mode Rootkits
- operate at the application layer, using standard APIs and system calls to hide themselves.
- Lesson 1546 — Rootkit Definition and Classification
- User/Profile Enrollment
- – Only a work profile is managed (BYOD scenarios).
- Lesson 2742 — Mobile Device Management (MDM) Fundamentals
- UserInfo Endpoint
- A standardized API to retrieve additional user profile information
- Lesson 769 — OpenID Connect Overview and Relationship to OAuth 2.0Lesson 772 — UserInfo Endpoint and Claims Retrieval
- Username Impersonation
- In social platforms or internal systems, attackers create accounts that visually mimic administrators or trusted users, enabling social engineering attacks.
- Lesson 1168 — Homograph and Confusable Character Attacks
- Username spoofing
- admin vs аdmin in authentication systems
- Lesson 1164 — Homograph and Visual Spoofing AttacksLesson 1172 — Zero-Width and Invisible Characters
- Username/password
- Often combined with certificates for two-factor authentication
- Lesson 487 — OpenVPN Cryptographic Configuration
- Username/password authentication
- at the connection level (often combined with access control lists on topics)
- Lesson 2781 — MQTT Security Architecture
- Users
- are assigned to one or more **Roles**
- Lesson 798 — Role-Based Access Control (RBAC)Lesson 1702 — Identity Types: Users, Groups, and Service Accounts
- Users cannot change
- security classifications or override policies—even on data they created
- Lesson 797 — Mandatory Access Control (MAC)
- UTC to eliminate ambiguity
- Lesson 2095 — Testing Windows and Schedules
- Utility
- .
- Lesson 14 — The Parkerian Hexad: Extending the CIA TriadLesson 2842 — Privacy-Utility TradeoffsLesson 2919 — The Exponential Mechanism
- Utility Metrics
- assess whether anonymized data remains useful:
- Lesson 2911 — Measuring and Testing Anonymization Effectiveness
- UUIDs
- (Universally Unique Identifiers) like `a3f7c892-4b21-4f9a-9e8d-1c2b3a4d5e6f`.
- Lesson 815 — GUID and UUID Vulnerabilities
- UUIDs without authorization
- Even "random" IDs are vulnerable if not checked
- Lesson 813 — IDOR Fundamentals and Common Patterns
V
- validate
- received public keys:
- Lesson 159 — Small Subgroup and Invalid Curve AttacksLesson 1211 — Never Trust User InputLesson 1973 — Kubernetes Admission ControllersLesson 2402 — File Carving and Deleted File RecoveryLesson 2550 — Remediation Tracking and Follow-up
- Validate Additional Properties
- Lesson 181 — Certificate Chain Validation Process
- Validate against an allowlist
- of permitted filenames or directories
- Lesson 1233 — File Path and Filesystem API Risks
- Validate all data
- retrieved from IndexedDB before use (it could be tampered)
- Lesson 1075 — IndexedDB Security Considerations
- Validate AMI Sources
- Lesson 1924 — Instance Launch Security and AMI Hardening
- Validate and sanitize
- before any string manipulation
- Lesson 1052 — eval() and Dynamic Code Execution Risks
- Validate arguments
- Even without a shell, ensure inputs match expected formats
- Lesson 1230 — Safe Command Execution Patterns
- Validate certificate usage
- – Are clients presenting valid certificates?
- Lesson 1780 — Transit Encryption Monitoring and Compliance
- Validate early
- Check input when it crosses trust boundaries
- Lesson 1218 — Input Validation vs Output Encoding Philosophy
- Validate emoji sequences
- against known safe patterns
- Lesson 1173 — Emoji and Combining Character Attacks
- Validate encryption implementations
- during testing
- Lesson 381 — Decrypting TLS Traffic with Private Keys
- Validate External IDs
- Are third-party integrations using proper External IDs to prevent confused deputy attacks?
- Lesson 1751 — Cross-Account and External Access Analysis
- Validate inputs
- Use allowlists (permitted patterns), check data types, enforce length limits, and reject unexpected characters
- Lesson 1039 — Input Validation and Output Encoding
- Validate intent extras
- Treat all data received via IPC as untrusted input
- Lesson 2738 — Input Validation and IPC Security
- Validate issuer
- (ensure token came from your auth server)
- Lesson 1010 — Bearer Token Authentication for APIs
- Validate origins
- on every `postMessage` exchange
- Lesson 1093 — Cross-Origin Authentication and iframe Security
- Validate property names
- before assignment—block `__proto__`, `constructor`, and `prototype`
- Lesson 1051 — JavaScript Prototype Chain Security
- Validate provenance
- information (SLSA attestations, build metadata)
- Lesson 1301 — Automated Package Verification Workflows
- Validate push authority
- Only accept pushed resources from origins that are authoritative for them
- Lesson 1100 — HTTP/2 Server Push Security Risks
- Validate second
- Check if the canonical path starts with your allowed directory
- Lesson 971 — Path Canonicalization and Validation
- Validate security controls
- (authentication, authorization, encryption)
- Lesson 2037 — Security-Focused Code Review FundamentalsLesson 2080 — What is Penetration Testing?
- Validate that resolved IP
- against your whitelist/blacklist
- Lesson 897 — DNS Rebinding and TOCTOU Protections
- Validate the command itself
- Only allow execution of known, approved programs
- Lesson 1230 — Safe Command Execution Patterns
- Validate the entire path
- (signatures, validity periods, constraints)
- Lesson 183 — Path Building and Discovery
- Validating after transformations
- Checking input, then converting encoding/format afterward
- Lesson 1157 — Common Input Validation Pitfalls
- Validating against requirements
- confirming each security user story and requirement has architectural coverage
- Lesson 2036 — Security Architecture Review
- Validating Webhooks
- are HTTP callbacks that examine incoming requests and say "yes" or "no.
- Lesson 1670 — Admission Controllers and Webhooks
- ValidatingWebhooks
- check if requests meet your security policies.
- Lesson 1973 — Kubernetes Admission Controllers
- Validation
- Verify the returned `state` matches what you stored—if not, reject the request
- Lesson 763 — State Parameter and CSRF ProtectionLesson 3046 — Auto-Remediation for Infrastructure Drift
- Validation checks
- "This SQL query only executes when input was sanitized three lines earlier"
- Lesson 1361 — Control Flow Analysis and Path Sensitivity
- Validation data
- – Certificate chains and revocation information frozen at signing time
- Lesson 231 — Document Signing and PDF Signatures
- Validation Details
- Overly specific validation errors ("creditCardNumber must be 16 digits") help attackers understand your data model and craft valid-looking payloads.
- Lesson 1007 — GraphQL Error Handling and Information Leakage
- Validation passes
- The app thinks it's safe to fetch from this domain
- Lesson 890 — DNS Rebinding Attacks
- Validation results
- (passed/failed checks, which checks)
- Lesson 989 — Upload Monitoring and Incident Response
- Validity Period
- Two timestamps—"Not Before" and "Not After"—defining when the certificate is valid
- Lesson 171 — X.509 Certificate Structure and FormatLesson 188 — Time Validation and Clock AttacksLesson 190 — Certificate Revocation Fundamentals
- Valuation
- assigns each asset a business-critical value.
- Lesson 2501 — Asset Identification and Valuation
- Value shifts
- What's worth stealing changes (credit cards → personal data → cryptocurrency)
- Lesson 33 — Threat Landscape Evolution and Adaptive Security
- values
- Lesson 376 — Display Filters and Packet Search TechniquesLesson 1237 — Parameterized Queries and Prepared Statements
- Variable Expansion
- Break up blocked words using shell variables:
- Lesson 608 — Filter Bypass and Obfuscation
- Variable-length data
- When you don't want to deal with padding overhead
- Lesson 121 — Stream Ciphers vs Block Ciphers: When to Use Each
- Variables
- rendered in HTML context get HTML-entity-encoded (`<` becomes `<`)
- Lesson 1247 — Auto-Escaping Mechanisms and Configuration
- Various formats
- plaintext, base64-encoded, encrypted differently per system
- Lesson 1315 — Secret Sprawl and Discovery Challenges
- Vault token
- that carries policies defining what secrets that identity can access—pure least privilege.
- Lesson 1326 — HashiCorp Vault Architecture
- Velocity attacks
- Abnormally rapid requests suggesting automation
- Lesson 737 — Session Monitoring and Anomaly Detection
- Vendor Advisories
- Microsoft, Red Hat, Cisco, and others publish their own security bulletins, often cross-referenced with CVE IDs and including vendor-specific patch information.
- Lesson 1613 — Vulnerability Database and CVE MappingLesson 2441 — False Positives and Validation
- Vendor and freeze
- Copy the code into your codebase for isolated maintenance (understand licensing first)
- Lesson 1267 — Unmaintained Dependencies and End-of-Life Libraries
- Vendor bulletins
- – synchronized security advisories
- Lesson 2476 — CVE Assignment and Public Disclosure
- Vendor fingerprinting
- Identifying hardware inconsistent with your deployment
- Lesson 549 — Rogue AP Detection Techniques
- Vendor Risk Assessment Process
- (from your previous lesson) to determine appropriate diligence depth.
- Lesson 2536 — Due Diligence and Vendor SelectionLesson 2539 — Continuous Vendor Monitoring
- Vendor transparency requirements
- Contractually require vendors to disclose critical subcontractors and dependencies
- Lesson 2540 — Fourth-Party and Supply Chain Risk
- Vendor Verification
- "I'm from your payroll provider updating direct deposit info"
- Lesson 2263 — Pretexting Fundamentals and Attack Scenarios
- Vendors and Third Parties
- Posing as contractors, delivery personnel, or service providers allows physical and digital access.
- Lesson 2265 — Authority and Impersonation Techniques
- Verb Confusion
- happens when the server accepts multiple methods for the same endpoint but handles them inconsistently.
- Lesson 996 — HTTP Method Tampering and Verb Confusion
- verification
- to ensure this system actually protects us.
- Lesson 195 — Certificate Transparency VerificationLesson 225 — Digital Signature Fundamentals and Use CasesLesson 233 — Blind Signatures and Anonymous CredentialsLesson 247 — ZKP Applications in AuthenticationLesson 271 — CRYSTALS-Dilithium: Post-Quantum Digital SignaturesLesson 320 — Key Destruction and SanitizationLesson 477 — Authentication Header (AH) ProtocolLesson 744 — Hardware Security Keys and FIDO U2F (+2 more)
- Verification difficulty
- – Complicated logic is harder to audit and test thoroughly
- Lesson 2667 — Economy of Mechanism
- Verification Logic Errors
- Lesson 229 — Signature Verification and Common Pitfalls
- Verifier
- Randomly challenges you: "Show me C is isomorphic to either A *or* B.
- Lesson 243 — The Graph Isomorphism ExampleLesson 2926 — Zero-Knowledge Proofs for Privacy
- Verifies device security posture
- alongside user identity
- Lesson 2686 — BeyondCorp Model and Zero Trust Access
- Verifies license compliance
- against your policy
- Lesson 1399 — Dependency and SCA Scanning in Pipelines
- verify
- data by hashing it again and comparing results
- Lesson 203 — Determinism and Avalanche EffectLesson 1432 — Disabling Unnecessary ServicesLesson 1798 — Encrypted Backups and SnapshotsLesson 2383 — Disk Imaging and Forensic Copies
- Verify Authenticity
- Lesson 513 — VPN Client Security Hardening
- Verify before loading
- Check the signature matches using the public key
- Lesson 2874 — Model Artifact Security and Signing
- Verify checksums
- match expected hashes from lock files or registries
- Lesson 1301 — Automated Package Verification Workflows
- Verify completeness
- Scan for identifiers hidden in free-text fields, comments, or composite fields
- Lesson 2903 — Direct Identifiers and Removal
- Verify expected denials
- – confirm that unauthorized access fails with 401/403
- Lesson 1026 — Authorization Testing Automation
- Verify explicitly
- using all available data (identity, device health, location, behavior)
- Lesson 2673 — Zero Trust Principles and Philosophy
- Verify identity
- to prevent unauthorized disclosure
- Lesson 2935 — Right to Access and Data PortabilityLesson 2936 — Right to Erasure and Deletion
- Verify integrity
- Calculate and document cryptographic hashes of snapshot metadata
- Lesson 1916 — Snapshot and Image Acquisition
- Verify layer integrity
- by pinning functions to specific layer versions (not "latest").
- Lesson 1957 — Function Layer Security
- Verify necessity
- Confirm each rule still serves a valid business need
- Lesson 435 — Rule Review and Maintenance
- Verify ownership or permission
- (does this user have rights to this object?
- Lesson 821 — Preventing IDOR with Access Control Checks
- Verify port availability
- Ensure local ports aren't already bound
- Lesson 506 — SSH Tunnel Persistence and Troubleshooting
- Verify provenance
- Only download models from trusted, verified sources with reputation systems
- Lesson 2877 — Malicious Pre-trained Models
- Verify scope
- Ensure similar vulnerabilities elsewhere were also addressed
- Lesson 2166 — Retest and Validation Process
- Verify security controls
- like certificate pinning or root detection mechanisms
- Lesson 2722 — Introduction to Mobile App Reverse Engineering
- Verify security posture
- matches requirements
- Lesson 2020 — Testing and Validation of IaC Security Controls
- Verify signature
- (proves token wasn't tampered with)
- Lesson 1010 — Bearer Token Authentication for APIs
- Verify the Signature
- Lesson 181 — Certificate Chain Validation Process
- Verify threat model assumptions
- from the design phase
- Lesson 2037 — Security-Focused Code Review Fundamentals
- Verifying
- Anyone with the sender's **public key** can verify the signature is authentic
- Lesson 147 — RSA Signature Generation and Verification
- Verifying provenance
- Admission controllers check that deployed images include valid SLSA provenance before allowing them to run
- Lesson 1650 — Supply Chain Levels for Software Artifacts (SLSA)
- Version
- Which X.
- Lesson 171 — X.509 Certificate Structure and FormatLesson 1475 — syslog Protocol and Standards
- Version 1 UUIDs
- Contain timestamps and MAC addresses—partially predictable and can leak server information
- Lesson 815 — GUID and UUID Vulnerabilities
- Version checking
- Prevent rollback attacks by refusing older, vulnerable versions
- Lesson 2764 — Firmware Update Mechanisms and Validation
- Version control
- Each release should have its own SBOM reflecting the exact dependencies in that version— dependencies change between releases.
- Lesson 1282 — SBOM Distribution and ConsumptionLesson 1590 — Host Firewall Management at ScaleLesson 2056 — Security as Code FundamentalsLesson 2494 — Policy Development and Approval ProcessLesson 3018 — Policy as Code Fundamentals
- Version control exposure
- Even if you remove a secret from current code, it remains in Git history forever.
- Lesson 1314 — Separation of Secrets from Code and Config
- Version control integration
- Store threat models (DFDs, STRIDE analyses, attack trees) in your repository alongside architecture diagrams.
- Lesson 2644 — Iterating Threat Models with Architecture Changes
- Version cross-reference
- Verify if backported patches exist (common in RHEL/Ubuntu)
- Lesson 2441 — False Positives and Validation
- Version information
- Specific software versions that may have known CVEs
- Lesson 2099 — Reconnaissance for Vulnerability Discovery
- Version Matching
- You cross-reference your fingerprinted version against vulnerability databases.
- Lesson 365 — Combining Fingerprinting with Vulnerability Research
- Version pinning
- locks to an exact version: `requests==2.
- Lesson 1261 — Dependency Versioning and Semantic Versioning
- Version pinning policies
- to balance stability with security
- Lesson 1399 — Dependency and SCA Scanning in Pipelines
- Version ranges
- allow flexibility: `requests>=2.
- Lesson 1261 — Dependency Versioning and Semantic Versioning
- Version Registry
- Every trained model gets a unique version ID, along with metadata: training dataset hash, hyperparameters, training duration, accuracy metrics, and who initiated the training.
- Lesson 2878 — ML Pipeline Security and Governance
- Version tracking
- Tag encrypted data with key identifiers so you know which key to use for decryption
- Lesson 315 — Key Rotation StrategiesLesson 1283 — Continuous SBOM Generation in CI/CDLesson 1346 — Zero-Downtime Rotation Patterns
- Version updates
- Can also keep non-vulnerable dependencies fresh by creating PRs for new releases
- Lesson 1303 — GitHub Dependency Scanning and Dependabot
- Version-Specific Comments
- Lesson 572 — Database Fingerprinting via SQL Injection
- Versioning
- lets you introduce improvements while keeping older versions available temporarily.
- Lesson 1038 — API Versioning and DeprecationLesson 1325 — Secret Stores vs Environment VariablesLesson 1787 — Object Lock and Immutable StorageLesson 2874 — Model Artifact Security and SigningLesson 2934 — Consent Records and Proof of ConsentLesson 3004 — IaC State File Security
- Vertical escalation
- Lesson 1022 — Horizontal and Vertical Privilege Escalation
- Vertical privilege escalation
- A regular user performs admin functions (like deleting any account).
- Lesson 803 — Broken Access Control OverviewLesson 804 — Horizontal vs Vertical Privilege EscalationLesson 822 — Understanding Privilege Escalation ConceptsLesson 1022 — Horizontal and Vertical Privilege Escalation
- Vetting Process
- Before integration, audit the library's permissions, network behavior, and data collection practices.
- Lesson 2740 — Third-Party SDK and Library Security
- Victim clicks
- the seemingly legitimate link (email came from the real company!
- Lesson 1126 — Password Reset Poisoning
- Victim clicks the link
- (often via phishing or social engineering)
- Lesson 630 — Reflected XSS: Immediate Execution
- Victim is authenticated
- – Browser holds valid session cookie for `bank.
- Lesson 847 — CSRF Attack Anatomy and Prerequisites
- Victim visits attacker's page
- – Perhaps via phishing link or compromised site
- Lesson 847 — CSRF Attack Anatomy and Prerequisites
- Victims view the page
- When anyone loads the comment section, the server retrieves and displays the stored content.
- Lesson 631 — Stored XSS: Persistent Attacks
- Viewing angles
- The perturbation must work from multiple perspectives
- Lesson 2814 — Physical World Adversarial Examples
- Violation actions
- Configure what happens when unauthorized MACs appear:
- Lesson 414 — Port Security and MAC Filtering
- Virtual Firewalls
- run as software instances within hypervisors or cloud platforms.
- Lesson 426 — Virtual Firewalls and Cloud Architectures
- Virtual Machine Memory (VMEM/VMSN)
- Hypervisors like VMware and Hyper-V save memory in proprietary formats.
- Lesson 2391 — Memory Image Formats and Validation
- Virtual machines
- resuming from snapshots may have stale timestamps
- Lesson 188 — Time Validation and Clock AttacksLesson 1625 — Container vs VM Security Model
- Virtual patching
- means placing security controls *in front* of vulnerable systems to block exploitation attempts without modifying the vulnerable application itself.
- Lesson 2462 — Virtual Patching and Temporary Mitigations
- Virtual Private Clouds
- create network-level isolation.
- Lesson 1811 — Multi-Tenancy and Network Isolation Models
- Virtual Private Gateway (VGW)
- The cloud-managed VPN endpoint attached to your VPC.
- Lesson 1840 — VPN Connections to Cloud
- Virtual Private Network (VPN)
- creates an encrypted "tunnel" through a public or untrusted network (like the Internet), allowing you to communicate securely as if you were on a private network.
- Lesson 466 — VPN Fundamentals and Purpose
- VirtualBox
- or **VMware** gives you isolation, snapshots, and the ability to test dangerous exploits safely.
- Lesson 2187 — Kali Installation Options and Live Boot
- Virus
- Attaches to legitimate files, requires user action to execute
- Lesson 1518 — Malware Taxonomy and Classification Criteria
- Virus/malware scanning
- using integrated antivirus engines
- Lesson 982 — Multi-Layer File Upload Validation Strategy
- Vishing (Voice Phishing)
- Impersonating bank representatives or IT support with synthesized voices
- Lesson 2865 — Audio Deepfakes and Voice Cloning Attacks
- visibility
- into who actually has access from outside your organization is another.
- Lesson 1751 — Cross-Account and External Access AnalysisLesson 2064 — Security Sign-Off and Approval Workflows
- Visibility and Transparency
- Open and verifiable operations
- Lesson 2879 — Introduction to Privacy by Design
- Visibility blind spots
- No unified view of your attack surface
- Lesson 2743 — Enterprise Mobility Management (EMM) and UEM
- Visibility Controls
- involve setting devices to "non-discoverable" mode after initial pairing.
- Lesson 560 — Bluetooth Security Best Practices
- Visibility phase
- Monitor-only mode, collecting flow data
- Lesson 2688 — Microsegmentation Implementation Strategies
- Visitor controls
- Sign-in logs, badges, and escorts
- Lesson 2585 — HIPAA Security Rule: Physical Safeguards
- Visual confusion
- Emoji sequences can hide malicious intent.
- Lesson 1173 — Emoji and Combining Character Attacks
- Visual defacement
- Use CSS or positioned elements to alter what users see, tricking them into unintended actions.
- Lesson 676 — HTML Injection and Context Confusion
- Visual reconnaissance
- maps the physical security environment—identifying CCTV blind spots, documenting badge reader types, noting where employees congregate, and understanding traffic flow patterns.
- Lesson 2276 — Shoulder Surfing and Visual Reconnaissance
- Vital Interests
- Processing is necessary to protect someone's life (rare; used in emergencies).
- Lesson 2931 — Legal Bases for Data Processing
- VLAN
- (Virtual Local Area Network) is like creating invisible walls inside a physical switch.
- Lesson 448 — VLANs for Layer 2 SegmentationLesson 545 — Enterprise Wi-Fi Deployment Architecture
- VLAN fingerprinting
- is trickier since VLANs operate at Layer 2.
- Lesson 352 — Subnet and VLAN Discovery
- VLAN hopping attacks
- Attackers exploit misconfigured trunk ports to jump between VLANs.
- Lesson 2649 — VLAN and Subnet Segmentation
- VLANs
- (Virtual LANs that isolate traffic at Layer 2).
- Lesson 352 — Subnet and VLAN DiscoveryLesson 450 — Internal Network ZoningLesson 453 — Segmentation for ComplianceLesson 2649 — VLAN and Subnet Segmentation
- VM attack surface
- Compromising the hypervisor (smaller codebase, less exposed) or VM escape vulnerabilities (rare but critical).
- Lesson 1625 — Container vs VM Security Model
- VM Detection
- Lesson 1555 — Anti-Detection Techniques
- VM escape vulnerabilities
- Breaking out of guest OS to hypervisor layer
- Lesson 1923 — Cloud VM Threat Model and Attack Surface
- VMware
- gives you isolation, snapshots, and the ability to test dangerous exploits safely.
- Lesson 2187 — Kali Installation Options and Live Boot
- Voice cloning
- uses similar architectures trained on speech patterns, prosody, and phonetics—requiring only seconds of target audio in modern systems.
- Lesson 2864 — Deepfakes: Generation Techniques and Detection Challenges
- Voice Conversion
- transforms one person's speech into another's voice while preserving linguistic content.
- Lesson 2865 — Audio Deepfakes and Voice Cloning Attacks
- Volatile evidence
- (disappears quickly):
- Lesson 1906 — Evidence Preservation in Cloud EnvironmentsLesson 2380 — Volatile vs Non-Volatile Evidence
- Volatility
- , **Rekall**, or **Magnet RAM Capture** reconstruct the true system state by parsing raw memory structures independently of the OS's APIs—APIs the rootkit has compromised.
- Lesson 1559 — Memory Analysis and Volatile ForensicsLesson 1564 — Rootkit Detection Tools and FrameworksLesson 2387 — Mobile and Endpoint Evidence CollectionLesson 2395 — Credential and Secret Extraction
- Volume Analysis
- Message sizes leak information.
- Lesson 2976 — Traffic Analysis and Correlation Attacks
- Volume anomalies
- Sudden spikes or unusual data sizes
- Lesson 382 — Identifying Malicious Traffic Patterns
- Volume Mount Attacks
- Mounting sensitive host directories (like `/var/run/docker.
- Lesson 1626 — Container Escape Vulnerabilities
- Volume mounts
- with restrictive permissions (read-only, specific paths)
- Lesson 1972 — Secrets Management in Kubernetes
- Volumetric Attack Absorption
- CDN edge nodes have massive bandwidth capacity spread across numerous geographic points of presence (PoPs).
- Lesson 1863 — CDN DDoS Protection and Rate Limiting
- Voting/rating systems
- Automated scripts manipulating reputation scores
- Lesson 1032 — API6:2023 - Unrestricted Access to Sensitive Business Flows
- VPC connectivity monitoring
- gives you the security cameras and access logs for your network traffic.
- Lesson 1843 — VPC Connectivity Monitoring
- VPC Flow Logs
- Analyze traffic patterns; unexpected port usage may indicate unencrypted protocols
- Lesson 1780 — Transit Encryption Monitoring and ComplianceLesson 1816 — Cross-VPC Communication ControlsLesson 1852 — Monitoring and Auditing Private ConnectivityLesson 1880 — SIEM Data Sources in CloudLesson 1887 — AWS GuardDuty FundamentalsLesson 1902 — Multi-Signal Correlation for DetectionLesson 1919 — Network Forensics in Cloud Environments
- VPC Peering
- creates a direct network route between two VPCs.
- Lesson 1816 — Cross-VPC Communication ControlsLesson 1842 — Cross-Region and Cross-Account Connectivity
- VPC-wide
- Monitor all network interfaces in the entire VPC
- Lesson 1872 — VPC Flow Logs and Network Monitoring
- VPN gateway devices
- (usually firewalls or dedicated VPN appliances) at each location handle all encryption and routing automatically.
- Lesson 468 — Site-to-Site VPNs
- VPN Tunnels
- For redundancy, cloud providers typically create two encrypted tunnels (using IPsec protocol) connecting your gateway to different availability zones.
- Lesson 1840 — VPN Connections to CloudLesson 2787 — BACnet and Modbus Protocol Security
- VSS variants
- add a crucial feature: participants can verify their shares are legitimate *without* reconstructing the secret.
- Lesson 324 — Alternative Secret Sharing Schemes
- Vulnerabilities
- are the weaknesses or gaps that make your assets susceptible to threats.
- Lesson 2498 — Risk Components: Assets, Threats, and Vulnerabilities
- Vulnerabilities baked into architecture
- Trust boundaries ignored, attack surfaces left wide open
- Lesson 12 — Security as a Non-Functional Requirement
- Vulnerability
- PINs are often short (4 digits) and transmitted vulnerably, making them susceptible to eavesdropping and brute-force attacks.
- Lesson 556 — Bluetooth Pairing and Bonding MechanismsLesson 2107 — Exploitation Fundamentals and Anatomy of an ExploitLesson 2280 — Badge and Card-Based Access SystemsLesson 2498 — Risk Components: Assets, Threats, and Vulnerabilities
- Vulnerability assessment and prioritization
- is the systematic process of identifying, evaluating, and ranking security weaknesses to determine remediation order.
- Lesson 1602 — Vulnerability Assessment and Prioritization
- Vulnerability correlation
- Security teams can match CVEs to the exact components shipped in production
- Lesson 1283 — Continuous SBOM Generation in CI/CD
- Vulnerability counts
- Allow zero new highs, maximum 5 mediums
- Lesson 3027 — SAST Integration in Pipelines
- Vulnerability density
- Critical/high findings per 1,000 lines of code or per deployment
- Lesson 2060 — Feedback Loops and MetricsLesson 2533 — Communicating Metrics to LeadershipLesson 3037 — Key Security Metrics and KPIs
- Vulnerability Detection
- SCC integrates with several built-in detectors:
- Lesson 1889 — GCP Security Command Center
- Vulnerability Disclosure Policy
- (VDP) is an organization's public document that explains *how* security researchers should report vulnerabilities, *what* systems are in scope, and *what protections* researchers receive.
- Lesson 2073 — Vulnerability Disclosure Policies
- Vulnerability Disclosure Policy (VDP)
- is a public document that welcomes external security researchers to report vulnerabilities in your systems.
- Lesson 2471 — Vulnerability Disclosure Policy (VDP) Fundamentals
- Vulnerability ease of exploitation
- – Is it trivial or highly complex?
- Lesson 2499 — Likelihood and Impact Determination
- Vulnerability exploitation
- beta distribution (historically 30–70% success rate)
- Lesson 2513 — Monte Carlo Simulation for Risk Analysis
- Vulnerability management
- Scanning and remediation of your VMs
- Lesson 1677 — IaaS Security ResponsibilitiesLesson 2489 — Acceptable Use Policy (AUP)
- Vulnerability matching
- Compares your components against vulnerability databases (CVE, NVD, security advisories)
- Lesson 1268 — Introduction to Software Composition Analysis (SCA)Lesson 2434 — Vulnerability Scanning FundamentalsLesson 3012 — Container and Image Scanning
- Vulnerability patterns
- as they occur in real execution
- Lesson 1378 — IAST Fundamentals and How It Works
- Vulnerability Scanner Integration
- Import scan results to correlate known vulnerabilities with active exploitation attempts.
- Lesson 1884 — SIEM Integration with Cloud Security Tools
- Vulnerability scanners
- (risk scores, remediation status)
- Lesson 3043 — Dashboard Tools and Integration
- Vulnerability scanning
- runs automatically in CI/CD pipelines (SAST, dependency scanning)
- Lesson 2059 — Security Automation and OrchestrationLesson 2080 — What is Penetration Testing?Lesson 2197 — Auxiliary Modules and ScanningLesson 2579 — Requirements 11-12: Testing and PolicyLesson 2875 — Dependency Vulnerabilities in ML Frameworks
- Vulnerability scans
- can detect deviations (configuration drift)
- Lesson 1618 — Configuration Baselines and Hardening Standards
- Vulnerability severity
- How exploitable is the weakness?
- Lesson 2497 — Risk Assessment Overview and Objectives
- Vulnerability Thresholds
- let you balance security with development velocity.
- Lesson 1308 — Integrating Scanning into CI/CD Pipelines
- Vulnerability types
- Always fail on SQL injection or RCE flaws, regardless of severity
- Lesson 3033 — Pipeline Security Gates and Policies
- Vulnerable code
- accepts user input without bounds checking (e.
- Lesson 2108 — Memory Corruption Exploits: Buffer Overflows
- Vulnerable dependencies
- Outdated libraries with known exploits
- Lesson 2694 — App-Level ThreatsLesson 3012 — Container and Image Scanning
- Vulnerable legitimate binaries
- Tools like old versions of `nmap`, `vim`, or `find` with SUID set can escape to a shell with elevated privileges.
- Lesson 2141 — SUID/SGID Binary Exploitation
- Vulnerable packages
- in base images (outdated `openssl`, `curl`, etc.
- Lesson 1400 — Container and Image Scanning
- Vulnerable pattern
- Lesson 637 — XSS in Different Contexts: HTML, JavaScript, CSSLesson 879 — Subdomain and Partial Origin Validation Bypasses
- Vulnerable response
- Lesson 994 — Excessive Data Exposure in API Responses
- Vulnerable signed drivers
- that are legitimate but contain exploitable flaws (common in hardware drivers, anti-cheat software, or legacy utilities)
- Lesson 2137 — Kernel Exploits and Driver Vulnerabilities
- Vulnerable to XSS
- any malicious script can read `localStorage.
- Lesson 1090 — Token Storage in SPAs: Security Trade-offs
W
- WAF Bypass
- A WAF might block requests containing `/admin` paths or SQL injection payloads.
- Lesson 1110 — Bypassing Security Controls via Smuggling
- WAF rule activation
- Deploy pre-tested aggressive filtering rules from lesson 1854
- Lesson 1861 — DDoS Response and Incident Management
- Wait for victims
- All subsequent users requesting that URL receive the poisoned content
- Lesson 1116 — Cache Poisoning Attack Fundamentals
- Walk Up the Chain
- Lesson 181 — Certificate Chain Validation Process
- Walking through abuse cases
- showing how your design prevents or detects the misuse cases you identified
- Lesson 2036 — Security Architecture Review
- WannaCry (2017)
- Global ransomware outbreak exploiting EternalBlue (SMBv1 vulnerability)—Microsoft had patched it two months prior
- Lesson 1599 — The Critical Role of Patch Management
- Warm handoffs
- Brief overlap period where both shifts are present (typically 15-30 minutes)
- Lesson 2309 — 24/7 Operations and Shift Management
- Warm start
- The platform reuses an existing execution context.
- Lesson 1942 — Function Execution Context and Isolation
- Warm storage
- Older logs (30-90 days) compressed but local
- Lesson 1484 — Log Rotation and Retention PoliciesLesson 2315 — SIEM Architecture: Collectors, Aggregators, and StorageLesson 2409 — Packet Capture for Forensics
- Water treatment facilities
- Multiple incidents involving unauthorized chemical dosing changes
- Lesson 2805 — OT-Specific Threats and Attacks
- Watermarking and fingerprinting
- are ownership-proving techniques that survive extraction and copying.
- Lesson 2835 — Watermarking and Model Fingerprinting
- Weak algorithms
- Avoid MD5, SHA-1, DES—use AES-256, SHA-256+
- Lesson 2735 — Mobile Cryptography Best Practices
- Weak authentication
- extends beyond defaults: short password limits, no complexity requirements, lack of account lockout, and exposed management interfaces amplify the risk.
- Lesson 2800 — Default Credentials and Weak Authentication
- Weak condition logic
- Conditions that don't properly restrict source accounts or IP ranges
- Lesson 1744 — Common Cross-Account Misconfigurations
- Weak crypto implementations
- in computation sequences
- Lesson 2729 — Native Code Analysis and ARM Assembly
- Weak entropy
- Most user passwords are predictable and short, making them vulnerable to brute-force attacks.
- Lesson 137 — Key Derivation Functions (KDFs) Overview
- Weak IV Identification
- Some IVs leak information about the key
- Lesson 523 — WEP Attacks and Exploitation
- Weak or Reused Randomness
- Lesson 229 — Signature Verification and Common Pitfalls
- Weak Origin Checks
- Lesson 1065 — postMessage Origin Validation Vulnerabilities
- Weak origin validation
- Checking if origin *contains* "trusted.
- Lesson 874 — CORS Fundamentals and Same-Origin Policy Relaxation
- Weak Permissions
- Overly permissive file system rights (`chmod 777`), cloud storage buckets set to public read, or IAM roles with `*:*` permissions allow lateral movement and privilege escalation.
- Lesson 2115 — Exploitation via Misconfiguration
- Weak protocol versions
- (SSLv3, TLS 1.
- Lesson 380 — TLS/SSL Traffic Analysis and Certificate Inspection
- Weak Random Generation
- Some implementations use predictable pseudo-random generators
- Lesson 815 — GUID and UUID Vulnerabilities
- Weak random number generation
- Using predictable nonces in ECDSA (as you learned in lesson 164)
- Lesson 168 — ECC Implementation Vulnerabilities
- Weak Token Generation
- APIs that create predictable tokens (like sequential numbers or timestamps) allow attackers to guess valid credentials.
- Lesson 1028 — API2:2023 - Broken Authentication
- Weak typing
- Languages like JavaScript and PHP don't enforce strict types
- Lesson 596 — JSON Injection and Type Confusion
- Weaker authentication
- mechanisms (maybe v1 used basic auth while v2 requires OAuth)
- Lesson 998 — API Versioning and Legacy Endpoint Vulnerabilities
- Weaker passwords
- Tired of memorizing new credentials, users choose simpler passwords
- Lesson 702 — Password Expiration and Rotation Policies
- Weaponization/Delivery
- Can email filters or web proxies block malicious payloads?
- Lesson 74 — Kill Chain Threat Modeling
- Web Application Firewall (WAF)
- with SQL injection detection rules
- Lesson 2463 — What Are Compensating Controls
- Web Application Firewalls
- (WAFs) that detect and block common injection patterns.
- Lesson 590 — SQLMap Evasion and Tampering Scripts
- Web Application Firewalls (WAFs)
- can block HTTP/HTTPS attacks targeting known vulnerabilities.
- Lesson 2462 — Virtual Patching and Temporary MitigationsLesson 2466 — Network-Based Compensating Controls
- Web Browsers: `crypto.getRandomValues()`
- Lesson 301 — Platform-Specific CSPRNG APIs
- Web form input
- crosses from untrusted user control into your application's trusted processing logic
- Lesson 2639 — Trust Boundary Analysis
- Web Security Scanner
- probes App Engine, Compute Engine, and GKE applications for common vulnerabilities (XSS, SQL injection, outdated libraries)
- Lesson 1889 — GCP Security Command Center
- Web server
- serves the file based on MIME type or extension
- Lesson 975 — Polyglot Files and Format Confusion
- Web Servers (Apache/Nginx)
- Lesson 1437 — Service Configuration Hardening
- Web Templates
- Pre-built clones of popular services (Gmail, Facebook, Twitter) ready for immediate deployment without manual configuration.
- Lesson 2246 — Credential Harvester and Attack Vectors
- Web Workers
- are dedicated to a single page, while **Shared Workers** can be accessed by multiple pages from the same origin.
- Lesson 1085 — Web Workers and Shared Workers Security
- WebAuthn API
- (a browser standard) and the **CTAP protocol** (how authenticators communicate with devices).
- Lesson 745 — FIDO2 and WebAuthnLesson 751 — WebAuthn and FIDO2 Protocol
- WebAuthn/FIDO2
- Cryptographic keys stored on security keys or devices
- Lesson 750 — Passwordless Authentication Fundamentals
- Webhooks
- Applications posting events to user-provided endpoints
- Lesson 882 — SSRF Fundamentals and Attack SurfaceLesson 884 — Basic SSRF Exploitation Techniques
- Website defacement
- (replacing homepage content with their message)
- Lesson 50 — Motivations: Hacktivism and Ideological Attacks
- What
- The resource or operation attempted
- Lesson 844 — Authorization Logging and MonitoringLesson 1313 — Principle of Least Privilege for SecretsLesson 1316 — Audit Trails and Secret Access LoggingLesson 1695 — Zero Trust and Identity VerificationLesson 2031 — Threat Modeling in Design PhaseLesson 2044 — Effective Security Review CommunicationLesson 2092 — Legal Agreements and AuthorizationLesson 2334 — Threat Intelligence Fundamentals and the Intelligence Lifecycle (+5 more)
- What actions
- they can perform (encrypt, decrypt, manage)
- Lesson 1769 — Encryption Key Policies and Access Control
- What AEAD Doesn't Protect
- Lesson 130 — AEAD Security Properties and Limitations
- What are we building
- Lesson 39 — The Four Key Questions
- What assets
- are protected (data, systems, intellectual property)
- Lesson 2487 — Purpose and Scope of Information Security Policy
- What can go wrong
- Lesson 39 — The Four Key Questions
- What could improve
- Identify concrete, actionable changes
- Lesson 2070 — Security Retrospectives and Continuous Improvement
- What data
- you collect (names, emails, purchase history)
- Lesson 2561 — Accountability and Records of Processing
- What does compliance require
- (Specific controls, audit trails, data residency)
- Lesson 1683 — Service Model Selection for Security Requirements
- What happened
- Establish a factual timeline
- Lesson 2070 — Security Retrospectives and Continuous Improvement
- What it does
- Scans IP ranges and displays discovered devices with MAC addresses and vendors in real-time.
- Lesson 356 — Automated Network Mapping Tools
- What must we control
- (encryption keys, network topology, OS hardening)
- Lesson 1683 — Service Model Selection for Security Requirements
- What protocols and ports
- are permitted (TCP port 443, for example)
- Lesson 1660 — Network Policies and Segmentation
- What services are running
- (by analyzing response behaviors)
- Lesson 641 — Port Scanning and Network Reconnaissance
- What stages to capture
- RequestReceived, ResponseStarted, ResponseComplete, Panic
- Lesson 1675 — Kubernetes Audit Logging and Forensics
- What standards apply
- (industry frameworks, regulatory requirements)
- Lesson 2487 — Purpose and Scope of Information Security Policy
- What to capture
- Full payload capture provides maximum forensic value but may face legal/privacy constraints.
- Lesson 2409 — Packet Capture for Forensics
- What to document
- Lesson 2087 — Documentation and Note-Taking
- What to log
- All requests, only metadata, or full request/response bodies
- Lesson 1675 — Kubernetes Audit Logging and Forensics
- What triggered it
- (specific behavior, signature, or anomaly)
- Lesson 1578 — EDR Alert Triage and Investigation
- What triggered the rule
- Examine the raw logs and correlation logic.
- Lesson 2345 — False Positive Identification and Analysis
- What worked well
- Celebrate effective controls that limited damage
- Lesson 2070 — Security Retrospectives and Continuous Improvement
- What's our acceptable risk
- (Provider breaches, supply chain attacks)
- Lesson 1683 — Service Model Selection for Security Requirements
- What's your exposure
- Internet-facing systems need faster patching than internal tools.
- Lesson 1265 — Evaluating Vulnerability Severity and Exploitability
- When
- Precise timestamp
- Lesson 844 — Authorization Logging and MonitoringLesson 1313 — Principle of Least Privilege for SecretsLesson 1316 — Audit Trails and Secret Access LoggingLesson 1695 — Zero Trust and Identity VerificationLesson 1750 — Last Access Analysis and Permission RightsizingLesson 2090 — Defining Rules of Engagement (RoE)Lesson 2092 — Legal Agreements and AuthorizationLesson 2388 — Evidence Documentation and Hash Verification (+5 more)
- When are HSMs necessary
- Lesson 306 — Hardware Security Modules (HSMs)
- When JWTs shine
- Lesson 712 — Stateless Sessions and JWT Alternatives
- When new threat intelligence
- emerges (zero-day vulnerabilities, new attacker techniques)
- Lesson 82 — Threat Model Reviews and Updates
- When PaaS makes sense
- Lesson 1683 — Service Model Selection for Security Requirements
- When SaaS is appropriate
- Lesson 1683 — Service Model Selection for Security Requirements
- When to choose IaaS
- Lesson 1683 — Service Model Selection for Security Requirements
- When to enable instrumentation
- Lesson 1382 — IAST Deployment Models and Performance Impact
- When to use
- Small environments (≤5 VPCs) needing lowest latency.
- Lesson 1844 — Connectivity Architecture Best Practices
- When to use it
- Black-box tests simulate real-world external threats and test your detection and response capabilities.
- Lesson 2081 — Types of Penetration TestsLesson 2366 — Containment Strategies: Short-Term vs Long- Term
- When to use Kali
- Lesson 2186 — Kali Linux Overview and Philosophy
- where
- that cookie gets sent by configuring its `Domain` and `Path` attributes.
- Lesson 725 — Cookie Scope and Domain SecurityLesson 933 — Server-Side vs Client-Side HPPLesson 1285 — Public vs Private Package Repository ResolutionLesson 1316 — Audit Trails and Secret Access LoggingLesson 1382 — IAST Deployment Models and Performance ImpactLesson 1695 — Zero Trust and Identity VerificationLesson 2031 — Threat Modeling in Design PhaseLesson 2388 — Evidence Documentation and Hash Verification (+4 more)
- WHERE Clauses
- These filter results based on conditions.
- Lesson 564 — SQL Query Structure and Injection Points
- Where security boundaries exist
- Lesson 352 — Subnet and VLAN Discovery
- Where to apply
- Lesson 1858 — Rate Limiting and Traffic Shaping
- Where to capture
- Deploy sensors at key network chokepoints—perimeter firewalls, datacenter egress points, DMZ boundaries, and critical server VLANs.
- Lesson 2409 — Packet Capture for Forensics
- Where you've seen it
- CTR mode and ChaCha20 both require nonces.
- Lesson 131 — Nonces vs IVs: Definitions and Differences
- Which categories
- of personal information will be collected
- Lesson 2564 — Personal Information Categories and Collection
- Which certificates to pin
- (leaf certificate, intermediate, or public key)
- Lesson 2719 — Android Certificate Pinning and Network Security
- Which environments
- are covered (on-premise, cloud, remote work)
- Lesson 2487 — Purpose and Scope of Information Security Policy
- Which hosts are alive
- (by attempting connections)
- Lesson 641 — Port Scanning and Network Reconnaissance
- Which permissions
- a role or service account has
- Lesson 1750 — Last Access Analysis and Permission Rightsizing
- Which pods
- can talk to each other (using labels like `app=frontend`)
- Lesson 1660 — Network Policies and Segmentation
- Which ports are open
- (based on how quickly requests fail or succeed)
- Lesson 641 — Port Scanning and Network Reconnaissance
- Which resources matter
- You might log all Secret access verbosely but ignore routine health checks
- Lesson 1675 — Kubernetes Audit Logging and Forensics
- Which websites you're visiting
- (even if the actual traffic is encrypted)
- Lesson 508 — DNS Leak Prevention
- White-box access
- means the attacker has complete knowledge: the model architecture, all trained weights, training data, and internal operations.
- Lesson 2809 — Threat Model for Adversarial Attacks
- White-box attacks
- When attackers know the detector's architecture, they apply gradient-based methods (like FGSM or C&W) to minimize detection confidence while preserving visual quality.
- Lesson 2870 — Adversarial Robustness of Deepfake Detectors
- White-box testing
- (also called clear-box or transparent testing) provides the tester with complete internal knowledge: source code, architecture diagrams, credentials, network maps, and system documentation.
- Lesson 2081 — Types of Penetration TestsLesson 2779 — Hardware Security Testing and Evaluation
- Whitelist allowed classes
- explicitly—reject anything not on your approved list
- Lesson 1232 — Safe Serialization Alternatives
- Whitelist Legitimate Activity
- Exclude known-good patterns.
- Lesson 1885 — SIEM Performance Tuning and False Positives
- Whitelist-based filtering
- You enumerate *only* the traffic you trust:
- Lesson 428 — Default Deny Principle
- Whitelisting
- Explicitly mark known-good files, applications, or behaviors as safe.
- Lesson 1571 — False Positives and Detection TuningLesson 1807 — False Positive Management and TuningLesson 2738 — Input Validation and IPC Security
- Whitelisting known-good behavior
- (DevOps automation accounts, scheduled tasks)
- Lesson 1895 — Custom Detection Rules and Tuning
- Whitelists/blacklists
- (exclude known-good sources)
- Lesson 2318 — Correlation Rules and Detection Logic
- who
- someone is.
- Lesson 795 — Access Control FundamentalsLesson 844 — Authorization Logging and MonitoringLesson 1313 — Principle of Least Privilege for SecretsLesson 1316 — Audit Trails and Secret Access LoggingLesson 1695 — Zero Trust and Identity VerificationLesson 1756 — Role Assumption and Trust Policy ExploitationLesson 1769 — Encryption Key Policies and Access ControlLesson 2092 — Legal Agreements and Authorization (+10 more)
- Who must comply
- (employees, contractors, third parties)
- Lesson 2487 — Purpose and Scope of Information Security Policy
- WHOIS
- is a protocol and database system that lets you query who registered a domain, when, through which registrar, and what nameservers handle its DNS.
- Lesson 329 — WHOIS and Domain Registration Intelligence
- WHOIS and Reverse DNS
- Lesson 328 — DNS Enumeration Without Direct Queries
- Why
- they need access (least privilege principle)
- Lesson 1695 — Zero Trust and Identity VerificationLesson 2044 — Effective Security Review CommunicationLesson 2334 — Threat Intelligence Fundamentals and the Intelligence LifecycleLesson 2433 — Incident Documentation and Records RetentionLesson 2561 — Accountability and Records of ProcessingLesson 2605 — Annex A Controls Selection
- Why did it happen
- Root cause analysis—not just technical, but process gaps
- Lesson 2070 — Security Retrospectives and Continuous Improvement
- Why Empire Matters
- After gaining initial access, you need to maintain control, explore the network, and establish persistence.
- Lesson 2218 — PowerShell Empire Framework
- Why hash first
- RSA can only handle data smaller than its key size.
- Lesson 147 — RSA Signature Generation and Verification
- Why it matters
- KMAC avoids the complexity of the nested HMAC structure and is immune to length extension attacks by design (SHA-3 already is).
- Lesson 224 — Alternative MAC Constructions: KMAC and Poly1305Lesson 242 — Interactive vs Non- Interactive ProofsLesson 618 — XML Injection PreventionLesson 791 — JWT Expiration and RevocationLesson 2398 — Disk Forensics Fundamentals and Chain of Custody
- Why it works
- A polynomial of degree t-1 is uniquely defined by any t points.
- Lesson 322 — Shamir's Secret Sharing Scheme
- Why this matters
- Without the `Secure` flag, your session cookie can be transmitted in plaintext if a user accidentally visits `http://yoursite.
- Lesson 723 — Secure and HttpOnly FlagsLesson 1500 — File Integrity Monitoring Fundamentals
- Why use these
- Some older firewalls and intrusion detection systems only watch for SYN packets, letting these alternative flag patterns slip through unnoticed.
- Lesson 343 — Advanced Nmap Scan Types
- Wider blast radius
- The longer a secret lives, the more systems, logs, and people it touches, increasing exposure points
- Lesson 1343 — Secret Rotation Fundamentals
- Wider impact
- Affects all users who view the compromised content, not just one target.
- Lesson 631 — Stored XSS: Persistent Attacks
- Widespread
- Found in most APIs during security testing
- Lesson 1027 — API1:2023 - Broken Object Level Authorization (BOLA)
- Widespread adoption
- Used in Bitcoin, TLS certificates, SSH keys, and OAuth tokens
- Lesson 227 — ECDSA: Elliptic Curve Digital Signature Algorithm
- Wildcard Origins
- Lesson 1065 — postMessage Origin Validation Vulnerabilities
- Wildcard principals
- in bucket policies (`"Principal": "*"`) without restrictive conditions
- Lesson 1783 — Blocking Public Access and Bucket Misconfiguration
- Wildcard Vulnerabilities
- Rules like `user ALL=(ALL) NOPASSWD: /bin/tar *` seem safe but are dangerous.
- Lesson 2142 — Sudo Misconfigurations and Exploits
- Wildcard with credentials
- Combining `Access-Control-Allow-Origin: *` with `Access-Control-Allow-Credentials: true` (browsers block this, but legacy configs exist)
- Lesson 874 — CORS Fundamentals and Same-Origin Policy Relaxation
- Wildcards
- Many dynamic subdomains (e.
- Lesson 175 — Subject Alternative Names and Wildcard CertificatesLesson 608 — Filter Bypass and Obfuscation
- Window Scan (`-sW`)
- examines the TCP window size in RST responses to differentiate open from closed ports on some systems—a subtle variation of ACK scanning.
- Lesson 343 — Advanced Nmap Scan Types
- Window Size
- The initial TCP window size varies by OS and version
- Lesson 359 — TCP/IP Stack Fingerprinting
- Windows
- Lesson 289 — Operating System Random APIsLesson 411 — ARP Cache InspectionLesson 950 — Bypassing Extension BlacklistsLesson 1431 — Service Attack Surface Analysis
- Windows Event Forwarding (WEF)
- pushes events to collector servers, which then forward to the SIEM.
- Lesson 1517 — Integrating Windows Logs with SIEM Platforms
- Windows Firewall
- , you specify the program path when creating rules.
- Lesson 1588 — Application-Based Firewall RulesLesson 1589 — Firewall Logging and Monitoring
- Windows Systems
- Lesson 1542 — Login Scripts and Profile Modifications
- Windows: `BCryptGenRandom()`
- Lesson 301 — Platform-Specific CSPRNG APIs
- Wiper malware
- that permanently deletes data or corrupts systems
- Lesson 51 — Motivations: Disruption and Destructive Attacks
- WIPS
- sensors, integrate with SIEM systems, and enforce **Protected Management Frames** to prevent deauthentication attacks at scale.
- Lesson 545 — Enterprise Wi-Fi Deployment Architecture
- Wire Transfer Scams
- exploit the legitimate business process of approving payments.
- Lesson 2255 — Whaling and Executive Impersonation
- Wireless Access Points
- Unsecured APs can be physically accessed to extract configuration, passwords, or even be replaced with rogue devices that look identical but log all traffic.
- Lesson 2278 — Physical Attacks on Network Infrastructure
- Wireless Systems
- Wi-Fi networks, Bluetooth implementations, and RF communications.
- Lesson 2088 — Common Testing Targets and Scope
- With least privilege
- That same compromised account can only access the specific files or systems that employee actually needs for their daily work.
- Lesson 2 — Least Privilege Principle
- With scopes
- , your package manager configuration can enforce that:
- Lesson 1286 — Scoping and Namespacing in Package Managers
- Withdrawal History
- Track when users revoke consent with equal rigor.
- Lesson 2934 — Consent Records and Proof of Consent
- Withdrawal Limit Bypass
- Lesson 903 — Race Conditions in Financial Transactions
- Within the same account
- Either an identity-based policy *or* a resource-based policy granting access is sufficient (if no explicit deny exists).
- Lesson 1716 — Resource-Based vs Identity-Based Policies
- Without backend revocation
- , your token remains valid until expiration—like a key that still works even after you "returned" it.
- Lesson 1094 — Session Management in Stateless SPAs
- Without least privilege
- An attacker who steals a regular employee's credentials might be able to delete the entire customer database, shut down servers, or access executive files.
- Lesson 2 — Least Privilege Principle
- WKD
- solves the trust problem by letting domain owners publish keys via HTTPS.
- Lesson 2962 — Key Discovery and Distribution
- Wordlist Mode
- Dictionary attacks with optional rule application, similar to what you've seen in earlier lessons.
- Lesson 2231 — John the Ripper Techniques
- work factor
- principle recognizes that attackers operate under constraints—time, money, computing power, and risk.
- Lesson 2634 — Work Factor and Attacker EconomicsLesson 2672 — Work Factor and Economic Balance
- Workflow engines
- Multi-step approvals with different authenticators
- Lesson 2664 — Separation of Duties
- Workflow manipulation
- Test whether you can skip, repeat, or reverse steps in multi-stage processes (e.
- Lesson 2103 — Logic Flaw and Business Logic Testing
- Workflow reversal
- occurs when an attacker moves *backwards* through steps that should be finalized, while **replay attacks** involve resubmitting old valid requests to repeat actions that should only happen once.
- Lesson 918 — Workflow Reversal and Replay Attacks
- Workload identity
- and service account permissions
- Lesson 1682 — Container as a Service SecurityLesson 1722 — Service Account Keys and Credentials
- Workload Identity Federation
- eliminates service account keys by establishing a trust relationship between your cloud provider and an external identity provider (like GitHub Actions, GitLab CI, AWS, or any OIDC-compliant provider).
- Lesson 1726 — Workload Identity FederationLesson 1734 — Instance Profiles and Container Credentials
- Workload-to-workload policies
- define explicit rules: "Web server A can talk to database B on port 3306, but nothing else.
- Lesson 2689 — East-West Traffic Inspection and Enforcement
- Works anywhere
- Agents function even when devices are off-network (remote workers, laptops), unlike network scanners that require connectivity to your scanning infrastructure.
- Lesson 2437 — Agent-Based Scanning
- Workspace structure
- keeps evidence organized and reproducible.
- Lesson 2190 — Kali Customization and Workspaces
- Workspaces
- are isolated containers within the database.
- Lesson 2200 — Database Integration and Workspaces
- Workstation
- For end-user machines (laptops, desktops)
- Lesson 1413 — CIS Benchmarks Overview and Structure
- Worm
- Self-replicates across networks without user intervention
- Lesson 1518 — Malware Taxonomy and Classification Criteria
- WPA2-only devices
- to fall back to the traditional 4-Way Handshake
- Lesson 521 — Transition Modes and Backward Compatibility
- WPA3 → WPA2
- Force devices back to WPA2, which lacks protections against dictionary attacks on weak passwords
- Lesson 530 — Downgrade Attacks
- WPA3-capable devices
- to connect using the stronger Simultaneous Authentication of Equals (SAE) handshake and Protected Management Frames (PMF)
- Lesson 521 — Transition Modes and Backward Compatibility
- WPS PIN attack attempts
- – repeated authentication failures
- Lesson 550 — Wireless Packet Capture and Analysis
- Wrap the old hash
- When a user successfully authenticates (proving they know their password), immediately rehash their password with your new algorithm (bcrypt/Argon2) and store that instead
- Lesson 692 — Upgrading Legacy Password Storage Systems
- Wrapping
- Encrypt the key using the cloud provider's public wrapping key
- Lesson 1771 — Bring Your Own Key (BYOK) and Key Import
- Wraps
- or **injects** a modified assertion elsewhere in the XML structure
- Lesson 779 — XML Signature Wrapping Attacks
- Write access
- Typically requires exact match or follows special rules to prevent information leakage
- Lesson 1451 — Security Labels and ClearancesLesson 1875 — Log Encryption and Access Controls
- Write blockers
- are hardware or software tools that allow read-only access to storage media, preventing accidental modifications during imaging.
- Lesson 2383 — Disk Imaging and Forensic Copies
- Write correlation logic
- (combine conditions with thresholds)
- Lesson 2319 — Use Cases and Detection Content Development
- Write malicious files
- like web shells to writable directories
- Lesson 589 — SQLMap Advanced Exploitation Features
- Write tests
- that check security expectations (e.
- Lesson 2020 — Testing and Validation of IaC Security Controls
- Write-Blockers
- These hardware or software tools let investigators examine storage devices without accidentally modifying a single bit.
- Lesson 2375 — Evidence Preservation Infrastructure
- Write-Once Storage
- Lesson 1485 — Log Integrity Protection MechanismsLesson 2624 — Audit Trail Management
- Write-protect
- the source media
- Lesson 2383 — Disk Imaging and Forensic CopiesLesson 2385 — Log Collection and Preservation
- Write-protect immediately
- using hardware write blockers (prevents accidental modification)
- Lesson 2398 — Disk Forensics Fundamentals and Chain of Custody
- Written passwords
- Frustration leads to sticky notes or insecure storage
- Lesson 702 — Password Expiration and Rotation Policies
- Written security policy
- addressing all PCI-DSS requirements
- Lesson 2579 — Requirements 11-12: Testing and Policy
- Wrong
- Due to the birthday paradox, an attacker can find a collision in roughly **2^(n/2)** attempts.
- Lesson 214 — Birthday Attacks and Hash Output SizeLesson 218 — HMAC vs Plain Hashing: Length Extension Attacks
- Wrong format
- AES-256 needs exactly 256 bits (32 bytes) of random-looking data.
- Lesson 137 — Key Derivation Functions (KDFs) Overview
- Wrong parameter binding
- Using string formatting (`%`, `f-strings`) instead of the database library's parameter mechanism
- Lesson 1237 — Parameterized Queries and Prepared Statements
X
- X-Content-Type-Options
- Set to `nosniff` to prevent browsers from MIME-sniffing responses and treating JSON as HTML.
- Lesson 1041 — API Security Headers and CORS
- X-Frame-Options
- Use `DENY` to prevent your API responses from being embedded in iframes (clickjacking protection).
- Lesson 1041 — API Security Headers and CORS
- X3DH
- handles the initial key agreement when two parties start communicating, even if one is offline.
- Lesson 2942 — Signal Protocol Fundamentals
- X3DH (Extended Triple Diffie-Hellman)
- establishes the initial shared secret between two parties, even when one is offline.
- Lesson 2949 — Signal Protocol: Double Ratchet and Key Agreement
- X3DH runs once
- when two users first communicate (or after a long gap), generating an initial root key from multiple Diffie-Hellman exchanges
- Lesson 2949 — Signal Protocol: Double Ratchet and Key Agreement
- XInclude injection
- and **parameter entity attacks** are two clever workarounds that bypass these defenses by exploiting different parts of the XML specification.
- Lesson 624 — XInclude and Parameter Entity Attacks
- Xmas Scan
- Sets FIN, PSH, and URG flags simultaneously—lighting up the packet "like a Christmas tree.
- Lesson 367 — TCP Stealth Scan Techniques
- Xmas Scan (`-sX`)
- sets the FIN, PSH, and URG flags simultaneously—like a "Christmas tree" all lit up with flags.
- Lesson 343 — Advanced Nmap Scan Types
- XML configuration files
- that define exactly what to monitor.
- Lesson 1512 — Sysmon Installation and Configuration
- XML External Entities (XXE)
- disappeared as a standalone item, merged into Security Misconfiguration.
- Lesson 1201 — OWASP Top 10 2021 vs 2017: Key Changes
- XML Injection
- occurs when an attacker inserts malicious XML content into input fields that get incorporated into XML documents without proper validation.
- Lesson 616 — XML Injection Fundamentals
- XML parsers
- External entity references (XXE leading to SSRF)
- Lesson 882 — SSRF Fundamentals and Attack Surface
- XOR
- that result with the left half to create a new right half
- Lesson 86 — Feistel Network Architecture
- XOR operation
- (exclusive OR), a simple bitwise operation with a remarkable property: if `A XOR B = C`, then `C XOR B = A`.
- Lesson 115 — Stream Cipher Fundamentals and XOR Operations
- XOR operations
- Combining words with previous key material and round constants (`Rcon`)
- Lesson 91 — AES Key Expansion and ScheduleLesson 117 — ChaCha20: Modern Stream Cipher Design
- XOR with plaintext
- Each plaintext bit/byte is XORed with the corresponding keystream bit/byte
- Lesson 115 — Stream Cipher Fundamentals and XOR Operations
- XOR-based splitting
- Lesson 325 — Key Splitting vs Secret Sharing
- XPC services
- Secure inter-process communication for system services
- Lesson 2703 — iOS Sandboxing and App Isolation
- Xposed Framework
- (Android-specific) allows you to hook into the Android runtime (ART/Dalvik) and modify app behavior systemically.
- Lesson 2726 — Dynamic Analysis and Runtime Instrumentation
- XSS
- injects malicious JavaScript into a trusted website that then executes in *other users'* browsers.
- Lesson 635 — XSS vs CSRF: Understanding the DifferenceLesson 674 — SameSite Cookie AttributeLesson 852 — CSRF vs XSS: Key DifferencesLesson 1148 — Why Input Validation MattersLesson 2106 — Chaining Vulnerabilities for ImpactLesson 3010 — Dynamic Application Security Testing (DAST) Deep Dive
- XSS (Cross-Site Scripting)
- and **CSRF (Cross-Site Request Forgery)** sound similar but exploit completely different vulnerabilities:
- Lesson 635 — XSS vs CSRF: Understanding the Difference
- XSS Cookie Theft
- Reduced—even if XSS injects code, cross-origin exfiltration is harder
- Lesson 674 — SameSite Cookie Attribute
- XSS rules
- flag when untrusted data gets written to HTML output without proper encoding
- Lesson 1362 — SAST Rule Sets and Vulnerability Detection
- XSS via Polluted Properties
- Lesson 1195 — Client-Side Prototype Pollution Exploitation
- XSS-based data theft
- If an attacker injects malicious scripts (XSS), they can steal authentication tokens, personal data, or session information stored client-side
- Lesson 1072 — Client-Side Storage Overview and Threat Model
Y
- Yao's garbled circuit protocol
- (1986) solves this by treating the function as a Boolean circuit (logic gates: AND, OR, NOT):
- Lesson 258 — Garbled Circuits for Two-Party Computation
- you
- must configure access policies.
- Lesson 1692 — Common Misunderstandings and Breach ScenariosLesson 1693 — The Shift from Network to Identity PerimeterLesson 1850 — Private Link Service for Custom Applications
- You (Prover)
- Randomly shuffle Graph A's labels to create Graph C.
- Lesson 243 — The Graph Isomorphism Example
- You analyze these to
- Lesson 2303 — DMARC Reporting and Analysis
- You approve connection requests
- (or auto-approve trusted accounts)
- Lesson 1850 — Private Link Service for Custom Applications
- You configure allowed principals
- (specific AWS accounts, organizational units, or even publish it for broader discovery)
- Lesson 1850 — Private Link Service for Custom Applications
- You control both sides
- Internal APIs, admin panels, or systems where you control the client
- Lesson 1155 — Rejecting vs Sanitizing Invalid Input
- You need flexibility
- International names with special characters
- Lesson 1155 — Rejecting vs Sanitizing Invalid Input
- You relay
- their requests/responses, reading passwords, session cookies, and sensitive data
- Lesson 395 — SSL Stripping Attacks
- You respond
- Since you created C from A, you can always answer either challenge:
- Lesson 243 — The Graph Isomorphism Example
- You secure
- Lesson 1678 — PaaS Security Boundaries
- You verify
- using the publisher's *public key* (openly distributed)
- Lesson 1294 — Package Signing and GPG Verification
- You're still responsible for
- Lesson 1940 — Serverless Architecture and Security Implications
- You're trusting that author
- and everyone who contributes to that package—not to introduce vulnerabilities or malicious code.
- Lesson 1945 — Third-Party Dependencies in Functions
- your
- responsibility begins is crucial—security gaps often occur when customers assume the provider is handling something they're actually not.
- Lesson 1684 — Shared Responsibility Model FundamentalsLesson 1985 — Cloud Compliance Inheritance and Mapping
- Your malicious request
- Lesson 878 — Exploiting Origin Reflection Vulnerabilities
- Your MITM position
- intercepts this request before it reaches the real server
- Lesson 395 — SSL Stripping Attacks
- Your Responsibilities
- Lesson 1904 — Cloud IR Fundamentals and Shared Responsibility
- your responsibility
- to validate who sent the message.
- Lesson 1065 — postMessage Origin Validation VulnerabilitiesLesson 1685 — Security OF the Cloud vs IN the CloudLesson 1686 — Shared Responsibility in IaaS
- Your secret
- You know how to relabel Graph A to make it identical to Graph B.
- Lesson 243 — The Graph Isomorphism Example
Z
- Z-Wave
- uses AES-128 with a shared network key distributed during pairing
- Lesson 2785 — Zigbee and Z-Wave Security Models
- Zeek
- (formerly Bro) functions as your automated analyst.
- Lesson 2416 — Network Forensics Tools and Workflows
- Zero critical vulnerabilities
- in production images
- Lesson 1641 — CI/CD Integration and Gating Policies
- Zero padding
- Fixed-length messages or when combined with explicit length fields
- Lesson 109 — ISO/IEC 7816-4 and Other Padding Methods
- Zero trust
- External parties never receive persistent access
- Lesson 1784 — Presigned URLs and Temporary Access MechanismsLesson 2687 — Context-Aware Access Controls
- Zero trust across boundaries
- Each account/region authenticates independently
- Lesson 1851 — Cross-Region and Cross-Account Private Connectivity
- Zero Trust assumes
- Lesson 2673 — Zero Trust Principles and Philosophy
- Zero Trust Network Segmentation
- and **Identity as the New Perimeter**, creating dynamic trust boundaries that adapt per-user, per-session.
- Lesson 2680 — Software-Defined Perimeters (SDP)
- Zero-Day Exploits
- are attacks against vulnerabilities unknown to the software vendor.
- Lesson 1534 — Exploitation of Software Vulnerabilities
- Zero-day threats
- Brand-new malware has no signature yet
- Lesson 961 — Virus Scanning and Malware Detection IntegrationLesson 1566 — Heuristic Analysis Techniques
- Zero-downtime rotation
- solves this by ensuring both old and new secrets remain valid simultaneously during the transition period.
- Lesson 1346 — Zero-Downtime Rotation Patterns
- zero-knowledge proofs
- , which prove knowledge without revealing it, MPC actually computes new values from secret inputs.
- Lesson 255 — Introduction to Secure Multi-Party Computation (MPC)Lesson 2922 — Overview of Privacy- Preserving Technologies
- Zero-trust architecture
- Don't trust network location alone
- Lesson 1586 — iptables and nftables on Linux
- Zigbee
- supports multiple security levels, with AES-128 encryption and separate network and link keys
- Lesson 2785 — Zigbee and Z-Wave Security Models
- Zip Bombs (Decompression Bombs)
- Lesson 979 — Resource Exhaustion via File Processing
- ZIP passwords
- , **SSH keys**, and other formats that require preprocessing.
- Lesson 2231 — John the Ripper Techniques
- ZIP Slip
- a deceptively simple but devastating attack where archive entries contain filenames like:
- Lesson 968 — ZIP Slip and Archive Extraction AttacksLesson 969 — Symbolic Link Attacks