← Back to Security

Security Glossary

Key terms from the Security course, linked to the lesson that introduces each one.

9,769 terms.

#

`exp` (expiration)
A Unix timestamp after which the token is invalid.
Lesson 791JWT Expiration and RevocationLesson 793JWT Best Practices and Validation
`nbf` (not before)
A Unix timestamp before which the token shouldn't be accepted yet.
Lesson 791JWT Expiration and RevocationLesson 793JWT Best Practices and Validation
802.1X authentication
for enterprise networks or a **Pre-Shared Key (PSK)** for home networks.
Lesson 514WPA2 Architecture and 4-Way HandshakeLesson 545Enterprise Wi-Fi Deployment Architecture

A

A01:2021 Broken Access Control
(jumped from #5 to #1)
Lesson 1201OWASP Top 10 2021 vs 2017: Key Changes
A03:2021 Injection
(dropped from #1, now includes XSS)
Lesson 1201OWASP Top 10 2021 vs 2017: Key Changes
A04:2021 Insecure Design
(NEW—focuses on design flaws)
Lesson 1201OWASP Top 10 2021 vs 2017: Key Changes
ABAC (Attribute-Based)
handles complex, dynamic rules (time-based access, location restrictions).
Lesson 802Choosing and Implementing Access Models
Absolute Path Injection
takes a more direct approach.
Lesson 965Absolute Path Injection
Absolute Timeout
The maximum total lifespan of a session from creation, regardless of activity.
Lesson 708Session Timeout and Idle ManagementLesson 733Session Timeout Configurations
Absorbing phase
Your input data is XORed into part of SHA-3's internal state (the "rate") in blocks, while another part (the "capacity") remains untouched for security
Lesson 210SHA-3 and the Keccak Algorithm
Abuse prevention
from malicious or careless clients
Lesson 1016Quota Management and Tiered Access Control
Abuse prevention becomes harder
(blocking spam/harassers is more difficult)
Lesson 2954Sealed Sender and Sender Anonymity
Accelerated testing
Run minimal validation in staging—focus on "does it break critical functions?
Lesson 2459Emergency and Out-of-Band Patching
Accelerating mean-time-to-respond (MTTR)
from hours to minutes
Lesson 2325Introduction to SOAR Platforms
accept
certificates even when they can't verify if those certificates have been revoked—and why that's both practical and dangerous.
Lesson 196Revocation Checking Failures and Soft-FailLesson 1367Interpreting and Triaging SAST Results
Accept not-yet-valid certificates
Set the clock forward to activate certificates prematurely
Lesson 188Time Validation and Clock Attacks
Accept opt-out requests
without requiring account creation
Lesson 2565Sale and Sharing of Personal Information
Acceptable Use Policy (AUP)
Document what's allowed on your wireless network.
Lesson 553Wireless Security Policies and ComplianceLesson 2489Acceptable Use Policy (AUP)
Access
What data or functionality becomes accessible?
Lesson 837Documenting and Reporting Authorization Flaws
Access Analyzer Continuous Monitoring
Run automated scans to detect overly permissive policies, external access grants, or unused permissions that could become escalation vectors.
Lesson 1761Privilege Escalation Detection and Prevention
Access authorization/validation
Granting and reviewing access rights
Lesson 2585HIPAA Security Rule: Physical Safeguards
Access Control Enforcement
You implement the **principle of least privilege** at the network level.
Lesson 2648Network Segmentation Fundamentals
Access Control Evasion
IP-based restrictions, rate limiting, and origin checks happen at the front-end.
Lesson 1110Bypassing Security Controls via Smuggling
Access Control Failures
Try accessing resources you shouldn't—change user IDs in URLs, escalate from user to admin by manipulating parameters, or bypass authorization checks entirely.
Lesson 2104Web Application Vulnerability Hunting
Access Control Lists (ACLs)
are ordered sets of rules configured on routers and switches.
Lesson 2650Segmentation Enforcement MechanismsLesson 2782MQTT Security Vulnerabilities and Hardening
Access control mechanisms
(badges, biometrics, PIN pads)
Lesson 2279Physical Access Control Models and Zones
Access control segmentation
Different system components should have permission to access only the data subsets necessary for their declared purpose.
Lesson 2900Purpose Limitation in System Design
Access control systems
Key cards, biometric readers, or PIN pads
Lesson 2585HIPAA Security Rule: Physical Safeguards
Access controls replicate
IAM policies and bucket policies should protect data consistently across all regions
Lesson 1786Cross-Region Replication and Backup Strategies
Access decision
The system grants or denies specific actions based on authorization policies
Lesson 1701Authentication vs Authorization in Cloud IAM
Access from TOR nodes
or known malicious IPs
Lesson 1907Cloud Account Compromise Response
Access internal databases
Connect to a database server that only accepts connections from inside the corporate network
Lesson 500Local Port Forwarding (-L)
Access internal resources
Request internal documentation, APIs, or admin interfaces
Lesson 886Internal Network Enumeration via SSRF
Access Key ID
(identifies the session)
Lesson 1730AWS STS and AssumeRole Mechanics
Access key management
rotating credentials, retiring unused keys
Lesson 1690Identity and Access Management Boundaries
Access keys
(access key ID + secret) for programmatic access via CLI/API
Lesson 1710IAM Users: Creation, Authentication, and Lifecycle
Access management
One admin creates accounts, another assigns privileges
Lesson 2664Separation of Duties
Access Patterns
Secrets accessed by many systems or users carry higher exposure risk and should rotate more frequently.
Lesson 1344Rotation Strategies and FrequenciesLesson 1699Continuous Identity VerificationLesson 1890Behavioral Analytics and Anomaly Detection
Access Point (AP) Locations
By measuring signal strength (RSSI - Received Signal Strength Indicator) from multiple positions, you can triangulate where APs are physically placed.
Lesson 355Wireless Network Topology Mapping
Access policies
– who can deploy or modify your applications
Lesson 1687Shared Responsibility in PaaS
Access Policies and RBAC
Control who and what can access specific secrets
Lesson 1329Azure Key Vault
Access Resources
The caller uses these temporary credentials to access resources as if they were that role.
Lesson 1738AssumeRole and Trust Policies
Access review automation
flags when a user gains elevated privileges beyond what your HIPAA policies allow
Lesson 2622Continuous Compliance Monitoring
Access Review Completion
tracks certification campaign effectiveness.
Lesson 2530Access Control and Identity Metrics
Access Revocation
Immediately disable vendor credentials, API keys, VPN access, and service accounts.
Lesson 2542Vendor Offboarding and Data RecoveryLesson 2969Secure Link Sharing and Expiration
Access sensitive data
located on database servers, file shares, or workstations
Lesson 2150Lateral Movement Fundamentals and Objectives
Access sensitive files
without triggering typical application-layer logging
Lesson 2154SMB and Administrative Shares
Access the DOM
read and modify any content on the page, including forms, hidden fields, and user data
Lesson 634JavaScript Execution Contexts in XSS
Access to multiple customers
, multiplying the attack impact
Lesson 2534Third-Party Risk Fundamentals
Access to sensitive data
(read, modify, delete)
Lesson 1490Log Management for Compliance
Access Token Received
The server responds with an `access_token` (and optionally a `refresh_token`)
Lesson 758Authorization Code Flow Deep Dive
Access tokens
are short-lived credentials (typically 15 minutes to 1 hour) that your application presents to protected APIs.
Lesson 760OAuth 2.0 Tokens: Access and Refresh
Access-Control-Allow-Credentials
Set to `true` only when needed for cookies/auth
Lesson 1041API Security Headers and CORS
Access-Control-Allow-Headers
Define acceptable request headers
Lesson 1041API Security Headers and CORS
Access-Control-Allow-Methods
List permitted HTTP methods (GET, POST, etc.
Lesson 1041API Security Headers and CORS
Access-Control-Allow-Origin
Specify allowed origins (`https://trusted-site.
Lesson 1041API Security Headers and CORS
Accessible formats
Provide SBOMs in standardized formats (SPDX, CycloneDX) that vulnerability scanners can automatically consume.
Lesson 1282SBOM Distribution and Consumption
Accessing managed services
(databases, storage) from on-premises networks via VPN/Direct Connect
Lesson 1848Private Link Architecture and Use Cases
Accessing system tables
Exploiting overly permissive access to internal database tables that control authentication and authorization
Lesson 584Privilege Escalation via SQL Injection
Accidental misuse
Multiple checks catch mistakes before damage occurs
Lesson 2631Separation of Privilege
Accidental rogue APs
Installed by well-meaning employees (like plugging in a personal router for better Wi-Fi coverage) without realizing the security implications
Lesson 533Rogue Access Points: Definition and Threat Model
Account balances or credits
Lesson 916Session State Tampering
Account for clock skew
if a device's clock was 15 minutes fast, adjust accordingly
Lesson 2417Timeline Construction Fundamentals
Account for variability
Use ranges and statistical measures (mean, median, standard deviation) rather than exact values.
Lesson 1897Baseline Establishment for Cloud Resources
Account Lifecycle Metrics
track time-to-provision new accounts, dormant account counts, and time-to-deactivation after termination.
Lesson 2530Access Control and Identity Metrics
Account Lockdown
Disable compromised user accounts immediately
Lesson 3048Security Incident Auto-Response
Account lockout
temporarily disables an account after a threshold of failed attempts (e.
Lesson 700Rate Limiting and Account Lockout Policies
Account suspension threats
"Urgent: Verify within 24 hours or lose access"
Lesson 2268Urgency and Fear-Based Manipulation
Account Takeover Scenarios
If an attacker gains physical access to your unlocked device or compromises your email for magic links, they bypass the passwordless protection.
Lesson 755Passwordless Security Trade-offs
Account-based throttling
Slow down after several failures, but don't completely lock
Lesson 700Rate Limiting and Account Lockout Policies
Accurate event correlation
during incident response
Lesson 1473Log Timestamp Synchronization
ACE-OAuth
extends OAuth concepts to IoT, letting devices get authorization tokens from constrained servers using CoAP instead of HTTPS.
Lesson 2797Authentication Protocols for Constrained Environments
Achievable
– Set realistic targets.
Lesson 2526Designing Effective Security Metrics
ACK
Your system sends an acknowledgment back, *completing* the connection
Lesson 339TCP Connect ScanningLesson 377TCP Stream Analysis and Session Reconstruction
ACK Scan (`-sA`)
doesn't determine if ports are open or closed—instead, it identifies *filtered* vs *unfiltered* ports.
Lesson 343Advanced Nmap Scan Types
Acknowledge
the issue (typically 1-5 business days)
Lesson 2077Coordinated Disclosure Timelines
Acknowledgment of policies
Having visitors sign security agreements or NDAs
Lesson 2285Visitor Management and Temporary Access
Acknowledgment tracking
creates accountability.
Lesson 2495Policy Communication and Training Requirements
Act immediately
Cloud logs often have default retention periods (7-90 days).
Lesson 1917Cloud Log Collection for Forensics
Action attributes
read, write, delete, share
Lesson 799Attribute-Based Access Control (ABAC)
Action Plan
Specific steps if mitigation is chosen
Lesson 2506Risk Register Development
Actions (WHAT)
What happens when the condition matches?
Lesson 1804DLP Policy Design and Implementation
Activate
new keys seamlessly (lesson 314)
Lesson 316Key Expiration and Renewal
Activation analysis
Run training samples through a reference model and examine intermediate layer activations.
Lesson 2824Detecting Poisoned Training Data
Activation by Personalization (ABP)
Session keys are hardcoded into the device at manufacturing.
Lesson 2786LoRaWAN Security and Key Hierarchy
Activation clustering
Monitor internal neuron activations for backdoor-specific signatures
Lesson 2826Defense Strategies Against Poisoning
Active discovery
Use network scanning techniques (ping sweeps, port scans) to find devices that weren't in your original inventory
Lesson 2442Scan Coverage and Asset Discovery
Active Exploitation Data
shows which vulnerabilities attackers are currently weaponizing in the wild.
Lesson 2449Threat Intelligence Integration
Active fingerprinting
sends crafted packets to a target and analyzes responses.
Lesson 357Introduction to Service and OS Fingerprinting
Active handshakes
Recent handshake timestamps indicate healthy connections
Lesson 498WireGuard Deployment Best Practices and Monitoring
Active Learning Strategies
Smart attackers use **uncertainty sampling**—querying inputs where their current substitute model is least confident, maximizing information gain per query.
Lesson 2828Query-Based Model Stealing
Active mesh sensors
Conductive grids covering the PCB that trigger alerts if cut or punctured
Lesson 2775Physical Tampering and Anti-Tamper Mechanisms
Active monitoring
Review last-used timestamps, rotate access keys every 90 days, audit permission changes
Lesson 1710IAM Users: Creation, Authentication, and Lifecycle
Active Network Connections
TCP and UDP sockets show which remote IPs and ports your system was communicating with.
Lesson 2393Network Artifact Recovery
Active reconnaissance
means directly interacting with the target to gather information.
Lesson 337Active vs Passive Reconnaissance
Active Scanner
Sends modified requests with SQLi payloads (like `' OR 1=1--`) and observes responses for database errors, timing anomalies, or logical differences—essentially automating the Boolean- based and time-based techniques you already know.
Lesson 591Burp Suite SQL Injection Scanner Extensions
Active spidering
Burp automatically crawls the application, following links and submitting forms to discover hidden pages.
Lesson 2208Target Scope and Site Map Management
Active surveillance
If an attacker controls the device *during* the message lifetime, deletion doesn't help
Lesson 2956Disappearing Messages and Perfect Forward Secrecy
ActiveScriptEventConsumer
to run PowerShell or VBScript payloads, or **CommandLineEventConsumer** to execute commands directly—all without writing malicious files to disk.
Lesson 1541WMI Event Subscriptions
Activities
Visiting sensitive locations, attending events, lifestyle choices
Lesson 2974What is Metadata and Why It Matters
Activity Logs
(Azure), or **Cloud Audit Logs** (GCP) to track credential usage and source IPs.
Lesson 1735Credential Theft and Token Security
Activity timeouts
(auto-logout after inactivity)
Lesson 703What is a Session and Why Web Apps Need Them
Actual content
File contains PHP web shell code, not image data
Lesson 956Content-Type Header Validation and Mismatches
Actual permissions received
Only S3, EC2 (RDS and Lambda blocked by boundary)
Lesson 1717Permission Boundaries: Limiting Maximum Permissions
Adapt training
Update scenarios based on actual tactics targeting your organization
Lesson 2296Measuring and Improving Security Culture
Add calibrated noise
After averaging the clipped gradients, add carefully calibrated random noise (typically Gaussian) before updating weights.
Lesson 2841DP-SGD and Private Training Algorithms
Add condition keys
to further restrict when and how permissions apply.
Lesson 1951Function Execution Role Design
Add Laplace noise
scaled by `sensitivity/epsilon`
Lesson 2915The Laplace Mechanism
Add new roots
when CAs meet rigorous security standards
Lesson 182Trust Anchors and Root Certificate Stores
Add new XML nodes
with malicious content
Lesson 616XML Injection Fundamentals
Add these adversarial examples
to your training dataset alongside clean data
Lesson 2847Adversarial Training
Add unexpected parameters
to legitimate requests:
Lesson 935Testing for Mass Assignment and HPP
Adding delays
between packets or probe attempts
Lesson 368Timing and Rate Limiting for Evasion
Additional benefit
WPA3 is resistant to KRACK-style replay attacks because the handshake mechanism fundamentally prevents key reinstallation.
Lesson 517WPA3 Security Enhancements
Additional code complexity
that expands your attack surface
Lesson 1407Disabling Unnecessary Services and Daemons
Additional network hops
revealed by traceroute that weren't there before
Lesson 413Timing and Latency Analysis
Additional validation
BFF can add extra security checks before proxying requests
Lesson 1092Backend for Frontend (BFF) Pattern
Address vulnerabilities found
– Security flaws must be fixed based on risk rating, just as you learned in risk treatment strategies and remediation tracking.
Lesson 2576Requirement 6: Secure Development
Addresses/Ports
– `any`, specific IPs, CIDR ranges
Lesson 458Snort: Architecture and Rule Syntax
Adds an ESP header
before the encrypted data (contains Security Parameter Index and sequence number)
Lesson 478Encapsulating Security Payload (ESP)
Adds an ESP trailer
after the encrypted data (padding and next header info)
Lesson 478Encapsulating Security Payload (ESP)
Adequacy decisions
– countries the EU deems as having sufficient protections
Lesson 1982GDPR and Data Sovereignty Requirements
Adjust scan plugins
to reduce overly aggressive checks
Lesson 1614False Positive Management
Admin role
Can create/rotate/delete keys
Lesson 310Key Access Control and Isolation
Admin users
with full privileges
Lesson 834Testing Multi-User Scenarios
Administrative actions
(configuration changes, account modifications)
Lesson 1490Log Management for Compliance
Administrative enforcement
actions by CPPA (no 30-day cure period for some violations)
Lesson 2568CPRA Amendments and Enforcement
Administrative Zone
General office space for cleared personnel
Lesson 2279Physical Access Control Models and Zones
Admission webhooks
are custom HTTP callbacks that let you inject your own policy logic into this checkpoint.
Lesson 1649Admission Controllers and Policy Enforcement
Adoption of new technologies
like biometrics, AI/ML, or surveillance capabilities
Lesson 2888PIA Triggers and Scoping
Advanced
APTs leverage sophisticated techniques combining multiple malware types you've learned— droppers establish initial access, backdoors maintain persistence, RATs enable remote control, and specialized tools exfiltrate targeted data.
Lesson 1527Advanced Persistent Threats (APTs)Lesson 2682Zero Trust Maturity Model
Advanced Persistent Threat (APT)
is not just another piece of malware—it's an entire multi-stage, carefully orchestrated campaign typically conducted by well-resourced adversaries (often nation-states or organized cybercrime groups).
Lesson 1527Advanced Persistent Threats (APTs)
Advanced Techniques
Sophisticated attackers use real-time proxying (man-in-the-middle) to capture not just credentials but also session tokens and MFA codes as they pass through.
Lesson 2256Credential Harvesting Pages
Advantage
Harder for malware to detect or block; more trustworthy acquisition.
Lesson 2382Memory Acquisition Techniques
Adversarial co-evolution
As detectors improve, generators adapt (remember adversarial training and transferability?
Lesson 2864Deepfakes: Generation Techniques and Detection Challenges
Adversarial Thinking
Train developers to ask "How could someone abuse this?
Lesson 83Developer Training on Threat Modeling
Adversarial training
Include known poisoned examples during training to build resistance
Lesson 2826Defense Strategies Against Poisoning
Adversary's knowledge
White-box (full model access) vs.
Lesson 2846Adversarial Robustness Fundamentals
Advisory
Warning only, doesn't block
Lesson 3022HashiCorp Sentinel
AEAD
(Authenticated Encryption with Associated Data) mode in modern cryptography.
Lesson 125AES-GCM: Galois/Counter Mode
AES uses 128-bit blocks
, which means 2^128 possible outputs.
Lesson 92Block Size and Security Implications
AES-128
10 rounds → needs 11 round keys (128 bits each)
Lesson 91AES Key Expansion and Schedule
AES-192
12 rounds → needs 13 round keys
Lesson 91AES Key Expansion and Schedule
AES-256
14 rounds → needs 15 round keys
Lesson 91AES Key Expansion and Schedule
AES-KW
(Key Wrap) defined in RFC 3394
Lesson 308Key Storage Encryption and Protection
AES-NI
(AES New Instructions) is Intel's (and AMD's) set of six CPU instructions that directly implement AES operations:
Lesson 94Hardware Acceleration and AES-NI
AESDEC
/ **AESDECLAST** – perform AES decryption rounds
Lesson 94Hardware Acceleration and AES-NI
AESDECLAST
– perform AES decryption rounds
Lesson 94Hardware Acceleration and AES-NI
AESENC
/ **AESENCLAST** – perform AES encryption rounds
Lesson 94Hardware Acceleration and AES-NI
AESENCLAST
– perform AES encryption rounds
Lesson 94Hardware Acceleration and AES-NI
AESIMC
– inverse MixColumns for decryption
Lesson 94Hardware Acceleration and AES-NI
AESKEYGENASSIST
– help with key expansion
Lesson 94Hardware Acceleration and AES-NI
AFF (Advanced Forensic Format)
open-source, compressed with metadata
Lesson 2399Disk Imaging and Write Blocking
Affected asset criticality
(production server vs.
Lesson 2361Incident vs Event: Defining the Threshold
Affected Systems
Which workflows/features are vulnerable?
Lesson 944Documenting and Reporting Logic Flaws
Affected users
How many people/systems are impacted?
Lesson 72DREAD Risk Rating Model
AFL++
, **LibFuzzer**, or **OSS-Fuzz** directly into your build pipeline.
Lesson 3014Automated Fuzzing in CI/CD
After compliance period
Automatic deletion
Lesson 1874Log Retention and Lifecycle Policies
After login
(moving from anonymous to authenticated)
Lesson 735Session Regeneration After Privilege Changes
After new DH exchange
New random values are mixed into the key derivation
Lesson 2944Post-Compromise Security
After privilege escalation
(user becomes admin)
Lesson 735Session Regeneration After Privilege Changes
After retrieval
Double-check before returning data
Lesson 842Resource-Level Permission Checks
After security incidents
that reveal new attack vectors
Lesson 82Threat Model Reviews and Updates
After successful authentication
You must **regenerate the session ID**—destroy the old identifier and issue a completely new one.
Lesson 707Session Creation and Initialization
Against ASLR
You need to discover actual runtime addresses.
Lesson 2112Bypassing DEP, ASLR, and Stack Canaries
Against DEP
Since you can't execute your own shellcode, you reuse existing executable code.
Lesson 2112Bypassing DEP, ASLR, and Stack Canaries
Against Stack Canaries
Canaries are random values placed before return addresses.
Lesson 2112Bypassing DEP, ASLR, and Stack Canaries
Age-based policies
fail if vulnerabilities remain unpatched beyond X days
Lesson 1641CI/CD Integration and Gating Policies
Agency Authorization
A single agency sponsors and authorizes your cloud service for their use.
Lesson 2613FedRAMP Authorization Framework
Agent management overhead
You must deploy, update, and maintain agents across potentially thousands of endpoints.
Lesson 2437Agent-Based Scanning
Agent Resource Usage
EDR agents are resource-intensive because they collect real-time telemetry from multiple system layers.
Lesson 1583EDR Deployment and Performance Considerations
Agent-based collection
Software installed on sources actively forwards logs
Lesson 2316Log Sources and Event Collection Methods
Agent-based continuous monitoring
keeps lightweight sensors on endpoints and servers, reporting back constantly without needing scheduled scans.
Lesson 2443Continuous Scanning and Real-Time Detection
Agent-based scanners
deploy software on each endpoint for continuous, local assessment
Lesson 1608Vulnerability Scanning Fundamentals
Agent/Profile
Software or configuration profile installed on each device that communicates with the server
Lesson 2742Mobile Device Management (MDM) Fundamentals
Agentless collection
SIEM pulls logs via APIs or network protocols (syslog, SNMP)
Lesson 2316Log Sources and Event Collection Methods
Aggregate signatures
allow multiple signatures (potentially from different signers on different messages) to be combined into a single, compact signature.
Lesson 239Aggregate Signatures and Batch Verification
Aggregated Risk Score
Combine individual risk assessments into a weighted overall score.
Lesson 2532Risk Posture and Trending Metrics
Aggregation and anonymization
(learn patterns without identifying individuals)
Lesson 2884Full Functionality and Positive-Sum
Aggregation and statistics
– Count events, calculate averages, or group by fields to spot patterns.
Lesson 2320SIEM Query Languages and Search
Aggregation exploits
abuse frame bundling.
Lesson 529Fragmentation and Aggregation Attacks
Aggregation limits
Can oversubscribe the monitoring port if mirroring too many high-traffic sources
Lesson 463Network TAPs vs SPAN Ports
Aggregation points
become attack surfaces where adversaries might observe individual updates before they're combined
Lesson 2843Federated Learning Privacy
Aggregators
receive raw logs from multiple collectors and normalize them into a common schema.
Lesson 2315SIEM Architecture: Collectors, Aggregators, and Storage
ALE (Annualized Loss Expectancy)
= SLE × ARO
Lesson 2508Qualitative vs Quantitative Risk Analysis
Alert
on patterns, not just individual events
Lesson 2661Monitoring and Response Across Layers
Alert context enrichment
is the process of automatically or manually gathering additional information to answer critical questions: Who owns that workstation?
Lesson 2346Alert Context Enrichment
Alert generation
Notify administrators while blocking
Lesson 462IPS Blocking Actions and Response
Alert on configuration drift
from approved baselines
Lesson 1500File Integrity Monitoring Fundamentals
Alert on new devices
(notify via email/SMS)
Lesson 710Concurrent Sessions and Device Management
Alert prioritization
categorizes alerts by severity and likelihood.
Lesson 460False Positives and Alert TuningLesson 1808DLP Monitoring and Incident Response
Alert Quality Metrics
, the next step is measuring how efficiently your analysts work.
Lesson 2355Analyst Efficiency Metrics
Alert thresholds
tuned to detect rotation-related issues quickly
Lesson 1349Rotation Testing and Rollback
Alert triage
is the critical skill of rapidly sorting security alerts to identify genuine threats (true positives) from benign activity (false positives).
Lesson 1578EDR Alert Triage and InvestigationLesson 2308SOC Analyst Responsibilities and Workflows
Alert-to-Incident Ratio
This compares total alerts generated to actual confirmed incidents.
Lesson 2354Alert Quality Metrics
Alerting
Triggers notifications when critical Event IDs like 4624 (logon) show anomalous patterns
Lesson 1517Integrating Windows Logs with SIEM PlatformsLesson 2314What is a SIEM and Why Organizations Need It
Algorithm codes
`HS256`, `HS384`, `HS512`
Lesson 785JWT Signature Algorithms
Algorithm Identifier
– A standardized code (called an Object Identifier or OID) that specifies the cryptographic algorithm
Lesson 173Public Key Information and Algorithm Identifiers
Algorithm Selection
Choose proven, current algorithms rather than inventing your own or using outdated ones.
Lesson 2035Cryptographic Design Decisions
Alice
multiplies the generator point by her private key: `Public_A = private_A × G`
Lesson 165ECDH (Elliptic Curve Diffie-Hellman)
Alice → Eve
Alice sends her public value, thinking it's going to Bob
Lesson 156Man-in-the-Middle Attacks on Diffie-Hellman
Alice sends photons
She randomly chooses polarization states using two bases (rectilinear: —/| or diagonal: /\)
Lesson 279QKD Fundamentals and BB84 Protocol
Align containment strategies
to avoid contradictory actions
Lesson 2541Vendor Security Incident Management
Aligned embargo dates
so patches and advisories release together
Lesson 2475Coordinated Disclosure with Vendors
Alignment
Supports **Separation of Duties** and **Least Privilege**
Lesson 19Access Control Models: DAC, MAC, and RBAC
Alignment requirements
Whether the domain in the "From:" header must align with SPF/DKIM domains
Lesson 2301DMARC (Domain-based Message Authentication) Policy
All CRUD operations
(Create, Read, Update, Delete)
Lesson 838Access Control Defense Strategy
All data access patterns
(direct access, search results, bulk operations)
Lesson 838Access Control Defense Strategy
All links
on the page are rewritten from `https://` to `http://`
Lesson 395SSL Stripping Attacks
All subsequent users
receive the malicious content
Lesson 1865CDN Cache Security and Cache Poisoning
All systems involved
databases, APIs, third-party services
Lesson 2888PIA Triggers and Scoping
All users
`C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup`
Lesson 1540Startup Folders and Shell Extensions
Allow all printable characters
Including spaces and emojis
Lesson 694Password Complexity Requirements and Their Effectiveness
Allow documented exceptions
for accepted risks
Lesson 2052Security Gates and Failure Policies
Allow unlimited sessions
(most permissive)
Lesson 710Concurrent Sessions and Device Management
Allowed connections
(baseline for normal activity)
Lesson 1589Firewall Logging and Monitoring
AllowedIPs
IP ranges this peer can send from and that will route to them
Lesson 494WireGuard Peer Configuration and Key Management
Allowlist (Positive Validation)
Define what is explicitly *allowed* and reject everything else.
Lesson 1150Allowlist vs Denylist Approaches
Allowlist-based access
tied to verified identities
Lesson 2972Recipient Verification and Authentication
Alpine Linux
(~5MB, minimal packages)
Lesson 1633Base Image Selection and Trust
Alter the request body
in POST requests (JSON, XML, form data)
Lesson 2207Intercepting and Modifying HTTP Traffic
Alternate data streams
on NTFS (Windows-specific)
Lesson 1165Filesystem Abstraction Layer Bypasses
Alternative approaches exist
You can achieve business objectives through safer methods
Lesson 2518Risk Avoidance Decisions
always
recalculate prices based on authoritative sources (database lookups) rather than trusting any client input.
Lesson 923Payment Amount TamperingLesson 2399Disk Imaging and Write Blocking
Always Encrypted
(Microsoft's term, though similar concepts exist across cloud providers) keeps data encrypted end-to-end, including during query execution.
Lesson 1800Always Encrypted and Confidential Computing
Always enforce mutual authentication
both client and server must prove identity.
Lesson 2789Securing IoT Protocol Implementations
Always generate fresh nonces
per response (never reuse)
Lesson 667Strict CSP and Modern Best Practices
Always use HTTPS
when sending authentication headers.
Lesson 1012API Authentication Headers and Best Practices
Always use PKCE
(even for confidential clients)
Lesson 768OAuth 2.0 Security Best Practices
Always verify magic bytes
match the claimed type
Lesson 956Content-Type Header Validation and Mismatches
Always-on
Even if the monitoring system crashes, traffic flows normally
Lesson 463Network TAPs vs SPAN PortsLesson 468Site-to-Site VPNs
Always-on connectivity
transforms threat exposure.
Lesson 2693Mobile vs Desktop Threat Differences
Always-on visibility
Agents don't need scheduled scan windows.
Lesson 2437Agent-Based Scanning
Amazon Macie
is AWS's managed service for automated storage security.
Lesson 1791Storage Security Scanning and Macie
AMCACHE
Records application execution evidence with timestamps
Lesson 2403Registry Analysis for Windows Forensics
AMD SEV
(Secure Encrypted Virtualization).
Lesson 2927Trusted Execution Environments
American Fuzzy Lop (AFL)
and **LibFuzzer**.
Lesson 1389AFL and LibFuzzer
AMI (Amazon Machine Image)
or VM image is the blueprint for your cloud instance.
Lesson 1924Instance Launch Security and AMI Hardening
Amplification
Combines web cache poisoning with XSS impact
Lesson 1120Cache Poisoning for XSS Delivery
Analysis Tools
help you examine artifacts, correlate IOCs, parse logs, and reconstruct attacker TTPs.
Lesson 2373IR Tool Selection and Deployment
Analyze incidents
When real social engineering attempts occur, dissect what worked/failed
Lesson 2296Measuring and Improving Security Culture
Analyze malware communications
when you control the server
Lesson 381Decrypting TLS Traffic with Private Keys
Analyze task properties
Examine command lines, file paths, and execution accounts.
Lesson 1538Scheduled Tasks and Cron Jobs
Analyzing proprietary protocols
requires reverse engineering binary patterns, observing state machines, and correlating device actions with traffic patterns.
Lesson 2788Protocol-Level Attacks and Reconnaissance
Android
, this is the **APK** (Android Package Kit), essentially a ZIP archive.
Lesson 2723Mobile App Package Formats and StructureLesson 2735Mobile Cryptography Best Practices
Android Application Sandboxing
protections you learned about—or worse, calling exposed Java methods.
Lesson 2717Android WebView Security
Android IPC Security
protections you studied.
Lesson 2717Android WebView Security
Android KeyStore
similarly provides hardware-backed key storage and cryptographic operations.
Lesson 2734Secure Data Storage on Mobile
Android Permission Model
and **Android IPC Security** protections you studied.
Lesson 2717Android WebView Security
AndroidManifest.xml
Declares permissions, components (activities, services, receivers), and app metadata—your security policy roadmap
Lesson 2723Mobile App Package Formats and Structure
Annex A
a catalog of 114 security controls across 14 domains (authentication, encryption, access control, incident management, etc.
Lesson 1979ISO 27001 and Cloud Security StandardsLesson 2600ISO 27001 Overview and StructureLesson 2606Statement of Applicability (SoA)
Annotate details
– Label nodes with IP addresses, open ports, running services
Lesson 351Network Diagramming from Scan Results
Announce early
with deprecation warnings in responses
Lesson 1038API Versioning and Deprecation
Annual Reporting
Agencies must report security metrics to OMB and DHS, creating accountability through transparency.
Lesson 2615FISMA and Federal Compliance
Annualized Loss Expectancy (ALE)
or compare cost of controls versus cost of loss, you need a concrete dollar figure.
Lesson 2510Asset Valuation for Risk Analysis
Anomalies
Unusual patterns such as rare parent-child process relationships or off-hours network activity
Lesson 1577Threat Hunting with EDR
Anomalous User-Agents
Malware often uses distinctive or outdated browser strings
Lesson 2414DNS and HTTP Forensics
Anonymity
The real signer is hidden among the group
Lesson 236Ring Signatures and Group Anonymity
Anonymity layering
Multiple proxies must be compromised to trace you
Lesson 2994Proxy Chains and SOCKS
Anonymity networks
route your traffic through multiple independent nodes in layers, where no single node knows both your identity and your destination.
Lesson 2982Introduction to Anonymity Networks
Anonymization
is the irreversible process of removing or destroying all identifiable information from data so that individuals can never be re-identified, even with additional information.
Lesson 2902Anonymization vs. PseudonymizationLesson 2923Secure Multi-Party Computation for Privacy
Anonymization Techniques
transform identifiable data into de-identified forms through k-anonymity, l-diversity, and other methods.
Lesson 2922Overview of Privacy-Preserving Technologies
anonymous credentials
digital tokens proving you have authority or permission without revealing your identity.
Lesson 233Blind Signatures and Anonymous CredentialsLesson 235Blind Signatures and Unlinkability
Anonymous voting
Verify your vote was counted without revealing who you are
Lesson 235Blind Signatures and Unlinkability
ANSI X.923
Some Microsoft systems and legacy protocols
Lesson 109ISO/IEC 7816-4 and Other Padding Methods
Ansible
uses agentless SSH connections to push configurations from a central controller.
Lesson 1619Configuration Management ToolsLesson 2457Automated Patch Deployment Tools
Ansible Playbooks
YAML-based automation that connects to systems via SSH and applies configurations declaratively.
Lesson 1418Automated Hardening and Remediation Scripts
Anti-passback logic
Prevents using the same credential twice without exiting first
Lesson 2282Mantrap and Turnstile Controls
Anti-replay protection
Sequence numbers prevent attackers from capturing and replaying old packets
Lesson 477Authentication Header (AH) Protocol
Anti-Tampering
protects against modification:
Lesson 2718Android Root Detection and Anti-Tampering
Any authenticated user
in the account (using `*` principals)
Lesson 1756Role Assumption and Trust Policy Exploitation
Apache
May parse extensions right-to-left until finding a recognized handler (`shell.
Lesson 950Bypassing Extension Blacklists
Apache/Nginx mod_rewrite rules
Filter and forward legitimate traffic
Lesson 2223C2 Infrastructure Setup
API Behavior
Identifying abnormal sequences of API calls—like a user account that typically reads data suddenly performing mass deletions.
Lesson 1899Machine Learning for Cloud Anomaly Detection
API behavior tests
Calling fork(), checking writable system directories
Lesson 2728Root and Jailbreak Detection Bypass
API call behavior
A service account that normally makes 20 S3 API calls per hour suddenly makes 5,000
Lesson 1890Behavioral Analytics and Anomaly Detection
API call filtering
Restrict which external services generated code can invoke
Lesson 2862LLM Output Validation and Sandboxing
API call logs
provide granular detail about service interactions, including failed authentication attempts, permission changes, and resource modifications.
Lesson 1917Cloud Log Collection for Forensics
API call sequences
Is it calling Windows API functions in combinations typical of keyloggers or credential stealers?
Lesson 1566Heuristic Analysis Techniques
API calls
capture every action taken in your cloud environment—who created what, when, and how.
Lesson 1870Log Sources and Data IngestionLesson 1895Custom Detection Rules and Tuning
API calls between microservices
may cross from authenticated Service A to Service B with different permission models
Lesson 2639Trust Boundary Analysis
API design boundaries
Structure your APIs so purpose-specific data isn't even exposed outside its authorized context.
Lesson 2900Purpose Limitation in System Design
API discoverability
Programmatic enumeration makes secrets easier to find
Lesson 1321Environment Variables in Container and Cloud Platforms
API documentation
or exposed specifications
Lesson 1019Broken Function-Level Authorization
API documentation parsing
Reading OpenAPI/Swagger specs if available
Lesson 1371Crawling and Application Discovery
API gateway
acts as a single entry point for all API requests—like a security checkpoint at an airport.
Lesson 1024API Gateway Authorization BypassLesson 1858Rate Limiting and Traffic Shaping
API Gateway Misconfigurations
Lesson 1965Security Misconfiguration
API Gateway/Load Balancer
Filter obviously malicious patterns before they reach your application
Lesson 1152Validation Layers and Defense in Depth
API integrations
Import features pulling data from external services
Lesson 882SSRF Fundamentals and Attack Surface
API key metadata
Track which keys are used by which services for targeted rotation
Lesson 1348API Key and Certificate Rotation
API Parameter Injection
happens when attackers abuse these behaviors to inject malicious payloads into queries, commands, or data structures that the API wasn't designed to handle.
Lesson 995API Parameter Pollution and Injection
API Parameter Pollution
occurs when an attacker sends duplicate or conflicting parameters to confuse how the API processes them.
Lesson 995API Parameter Pollution and Injection
API pollers
Query cloud services for security events
Lesson 2315SIEM Architecture: Collectors, Aggregators, and Storage
API request payloads
Intercepting POST/PUT requests with tools like Burp Suite and changing JSON or form data before it reaches the server
Lesson 923Payment Amount Tampering
API security
ensuring the IAM API endpoints themselves resist attacks
Lesson 1690Identity and Access Management Boundaries
API tokens
should be scoped to particular endpoints, not "full access"
Lesson 2663Principle of Least PrivilegeLesson 2876Model Repository Security
API-based log collectors
that pull data directly from cloud services:
Lesson 1879Cloud Log Collection and Normalization
API-driven cloud scanning
queries cloud provider APIs continuously to discover new resources, check their configurations, and flag misconfigurations within minutes of deployment—not days later when a scheduled scan runs.
Lesson 2443Continuous Scanning and Real-Time Detection
API-driven collection
Custom scripts using provider SDKs to gather logs, metadata, and configurations
Lesson 1922Cloud Forensics Tools and Legal Considerations
API-Driven Evidence
Traditional network captures are replaced by API logs (CloudTrail, VPC Flow Logs).
Lesson 1904Cloud IR Fundamentals and Shared Responsibility
API-Driven Investigation
Use cloud provider APIs and SDKs to programmatically query resource states, retrieve logs, analyze configurations, and correlate activity across services.
Lesson 1905Cloud-Native IR Tools and APIs
API-level enforcement
the browser itself rejects unsafe data at the source.
Lesson 1050Trusted Types API
API/Controller layer
– Function-level access control on every endpoint
Lesson 838Access Control Defense Strategy
APIs
Generate JSON payloads with valid syntax but unexpected type combinations
Lesson 1390Structured Input Fuzzing
APK
(Android Package Kit), essentially a ZIP archive.
Lesson 2723Mobile App Package Formats and Structure
APK signature verification
Compare the current APK signature against your known certificate at runtime
Lesson 2718Android Root Detection and Anti-Tampering
App Ecosystems
Chat apps, encrypted messaging platforms, and cloud-synced data require specialized extraction tools.
Lesson 2387Mobile and Endpoint Evidence Collection
App Sandbox
Mandatory access controls per application
Lesson 2701iOS Security Architecture Overview
App switching patterns
Fake notifications mimicking recently-used apps
Lesson 2700User Behavior and Social Engineering
App Transport Security
from iOS?
Lesson 2717Android WebView Security
App Transport Security (ATS)
is Apple's security feature that forces iOS apps to use secure HTTPS connections instead of plain HTTP.
Lesson 2706App Transport Security (ATS)
App-level threats
target the application layer where users directly interact with software, making them particularly dangerous because they exploit trust relationships between users and the apps they install.
Lesson 2694App-Level Threats
App-Name
Application generating the log
Lesson 1475syslog Protocol and Standards
Appending Dots or Spaces
Some systems strip trailing characters, so `shell.
Lesson 957File Extension Filtering and Bypass Techniques
Appends an authentication field
to verify nothing was tampered with
Lesson 478Encapsulating Security Payload (ESP)
Appends/Prepends
"password" → "password123", "password!
Lesson 2228Rule-Based Attacks
AppInit_DLLs
Inject DLLs into every process (deprecated but still seen)
Lesson 1537Registry-Based Persistence on Windows
AppKey
(root key): Pre-shared secret known only to the device and application server
Lesson 2786LoRaWAN Security and Key Hierarchy
Apple's Local Differential Privacy
framework operates differently—noise is added on-device before data ever leaves a user's phone.
Lesson 2921Practical Differential Privacy Implementation
Application allowlisting
on Linux creates a trusted execution environment where only explicitly permitted programs can execute, blocking everything else by default.
Lesson 1595Linux Application Allowlisting
Application code security
– preventing SQL injection, XSS, and other vulnerabilities
Lesson 1687Shared Responsibility in PaaS
Application configuration
– secure settings, connection strings, API keys
Lesson 1687Shared Responsibility in PaaS
Application control
Only approved executables can run on the system.
Lesson 1406Default Deny and Allowlisting
Application coverage
Percentage of services, APIs, and codebases scanned
Lesson 3017Test Coverage and Effectiveness Metrics
Application Dependencies
Beyond the OS layer, Trivy inspects application lockfiles and manifests (`package-lock.
Lesson 1635Trivy and Open Source Scanners
Application generates token
and builds reset link using the poisoned Host header
Lesson 1126Password Reset Poisoning
Application identity
(service-to-service authentication)
Lesson 2685Software-Defined Perimeter and Identity-Based Segmentation
Application ignores the extension
, serves the actual `/account/statements` page with sensitive data
Lesson 1118Web Cache Deception Attacks
Application Layer (Layer 7)
Limit requests per user, API key, or IP address.
Lesson 1858Rate Limiting and Traffic Shaping
Application layer firewalls
go deeper—they understand the *application protocols* themselves, like HTTP, FTP, DNS, or SMTP.
Lesson 419Application Layer Firewalls and Proxies
Application lifecycle management
Deploy, update, and secure apps on any platform
Lesson 2743Enterprise Mobility Management (EMM) and UEM
Application Load Balancer logs
Verify SSL/TLS negotiation, protocol versions, cipher suites
Lesson 1780Transit Encryption Monitoring and Compliance
Application makes the request
The server-side code, running on the VM with IMDS access, queries the metadata service
Lesson 1935SSRF Attacks Against IMDS
Application role
Can use keys for encrypt/decrypt operations only
Lesson 310Key Access Control and Isolation
Application SDK pattern
Your code uses a client library to fetch secrets directly from a secret store (Vault, AWS Secrets Manager) during initialization or on-demand.
Lesson 1335Runtime Secret Injection Patterns
Application secrets
like database credentials
Lesson 2395Credential and Secret Extraction
Application server
receives double-encrypted data, unwraps TLS, then decrypts the application-layer encryption
Lesson 1775End-to-End Encryption Architectures
Application source code
Configuration files, API keys, database credentials
Lesson 620XXE Attack Types: File Disclosure
Application tier
(backend) — Your primary, authoritative validation layer
Lesson 1152Validation Layers and Defense in Depth
Application whitelisting
Prevents unauthorized executables from running, blocking threats AV might miss
Lesson 1573Antivirus Limitations and Complementary Controls
Application-aware
They understand HTTP, sessions, cookies, and application logic—not just open ports.
Lesson 2438Web Application Vulnerability Scanners
Application-based firewall rules
identify programs by their executable path, digital signature, or hash, then permit or deny network access based on that identity.
Lesson 1588Application-Based Firewall Rules
Application-layer controls
that understand service-to-service communications
Lesson 2679Zero Trust Network Segmentation
Application-layer inspection
goes deeper—examining the actual protocols and payloads (HTTP headers, API calls, database queries) rather than just IP addresses and ports.
Lesson 2689East-West Traffic Inspection and Enforcement
Application-Layer Parsing
decodes protocol-specific fields.
Lesson 2411Protocol Analysis and Reconstruction
Application-level
Tag records with classification labels; middleware enforces access policies based on user clearance and data label
Lesson 2652Data Segmentation and Classification
Application-level security
You typically cannot modify authentication flows beyond choosing from provider-supported options (SSO, MFA).
Lesson 1679SaaS Security Limitations
Applications
Web applications, mobile apps, APIs, and desktop software.
Lesson 2088Common Testing Targets and ScopeLesson 2316Log Sources and Event Collection Methods
Applications and data
Everything you install and store
Lesson 1677IaaS Security Responsibilities
Apply appropriate controls
Encryption, validation, authentication, rate limiting
Lesson 2639Trust Boundary Analysis
Apply filters
to reduce noise and focus on security-relevant events
Lesson 1870Log Sources and Data Ingestion
Apply frameworks
like STRIDE to new components
Lesson 79Threat Modeling During Development
Apply length limits
at multiple layers (display, storage, processing)
Lesson 1173Emoji and Combining Character Attacks
Apply RSA signing
to the padded result
Lesson 148PSS: Probabilistic Signature Scheme
Apply strongest encryption automatically
(not offer it as an upgrade)
Lesson 2882Privacy as the Default Setting
Apply tags
for department, owner, and purpose tracking
Lesson 1710IAM Users: Creation, Authentication, and Lifecycle
AppRole
is designed for machines and applications.
Lesson 1327Vault Authentication Methods
Approval
– Escalate to appropriate authority (CISO, Risk Committee, Board)
Lesson 2494Policy Development and Approval Process
Approval Authority
assigns responsibility:
Lesson 2064Security Sign-Off and Approval Workflows
Approval Workflow
Security team reviews and approves/denies
Lesson 2027Drift Reporting and Exception Management
Approval Workflow Circumvention
A document approval requires manager sign-off in step 2, but the final publication step (step 3) doesn't check if approval actually happened.
Lesson 808Multi-Step Process Authorization Failures
Approved base images only
(vetted, minimal OS layers)
Lesson 1400Container and Image Scanning
Approver signature
Usually a senior executive or risk committee
Lesson 2521Risk Acceptance and Documentation
AppSKey
(Application Session Key): Also derived from `AppKey`; encrypts the actual payload
Lesson 2786LoRaWAN Security and Key Hierarchy
APT
(Advanced Package Tool) system.
Lesson 2189Updating and Managing Kali Packages
AR
gument: Computationally sound (secure against realistic attackers)
Lesson 246zk-STARKs and Transparent Proofs
Arbiter PUFs
Exploit race conditions in signal paths
Lesson 2777Hardware Cloning and Counterfeit Prevention
Arbitrary file overwrite
(replacing system files, configuration files)
Lesson 974ZIP Slip and Archive Extraction Attacks
Arbitrary loads
Disable ATS entirely (strongly discouraged and requires App Store justification)
Lesson 2706App Transport Security (ATS)
Arbitrary package attacks
Blocking malicious uploads
Lesson 1296PyPI Package Security
Architecture compatibility
x86 vs x64 payloads
Lesson 2195Exploit Modules and Payloads
Architecture Probing
By analyzing response patterns, timing, and confidence distributions, attackers infer architectural details:
Lesson 2828Query-Based Model Stealing
Architecture review
means examining your system's design documents, diagrams, and planned structure to identify potential security weaknesses *before* developers start coding.
Lesson 78Architecture Review and Threat Identification
Archival
Long-term encrypted backups with key management
Lesson 2885End-to-End Security and Lifecycle Protection
Archive
expired keys securely for any legacy data decryption needs
Lesson 316Key Expiration and RenewalLesson 1883Scalability and Cost Optimization
Argon2d
(data-dependent, faster but vulnerable to side-channel attacks), **Argon2i** (data-independent, safer against side-channels), and **Argon2id** (hybrid, recommended for password hashing).
Lesson 690Argon2: Modern Password Hashing Standard
Argon2i
(data-independent, safer against side-channels), and **Argon2id** (hybrid, recommended for password hashing).
Lesson 690Argon2: Modern Password Hashing Standard
ARM assembly
the low-level instruction set used by mobile processors.
Lesson 2729Native Code Analysis and ARM Assembly
ARM TrustZone
, and **AMD SEV** (Secure Encrypted Virtualization).
Lesson 2927Trusted Execution Environments
Arms race dynamics
Just as adversarial examples exploit model weaknesses, deepfake creators specifically target detection methods
Lesson 2864Deepfakes: Generation Techniques and Detection Challenges
ARP cache
(or ARP table) — a temporary memory store that speeds up future communications.
Lesson 385ARP Cache Mechanics and Poisoning Principles
ARP cache poisoning
(or ARP spoofing) exploits this trust by injecting malicious ARP responses.
Lesson 385ARP Cache Mechanics and Poisoning Principles
Article 30
requires most organizations to maintain a **Record of Processing Activities (RoPA)**.
Lesson 2561Accountability and Records of Processing
Artifact storage
Archive interesting inputs and crashing test cases for regression testing
Lesson 1394Continuous Fuzzing and Integration
Artifact timeline analysis
brings all these puzzle pieces together in chronological order, revealing what the attacker did and when.
Lesson 2420Artifact Timeline Analysis
Artifacts and work products
show processes in action: completed risk assessments, incident response reports, training completion certificates, vendor security questionnaires, or penetration test findings.
Lesson 2618Audit Evidence Types and Requirements
AS-REP Roasting
targets user accounts with "Do not require Kerberos preauthentication" enabled.
Lesson 2124Kerberoasting and AS-REP Roasting
ASP.NET Core
provides automatic anti-forgery token generation and validation through attributes and tag helpers that work seamlessly with forms.
Lesson 870Framework-Specific CSRF Protection
ASP.NET/IIS
Concatenates with commas (`100,1`)
Lesson 931HTTP Parameter Pollution (HPP) Basics
Assertion IDs
Every SAML assertion must contain a unique ID.
Lesson 780SAML Response Replay and Reuse
Assess accessibility
Determine which entry points are internet-facing vs.
Lesson 73Attack Surface Analysis
Assess compliance
with security standards and privacy regulations
Lesson 2722Introduction to Mobile App Reverse Engineering
Assess context
Does disabling USB ports align with your workflow, or will it cripple field technicians?
Lesson 1420Balancing Security with Operational Requirements
Assess data exposure
Determine what data was accessed or downloaded.
Lesson 1909Cloud Storage and Data Breach Response
Assess each layer's strength
using metrics like:
Lesson 30Weakest Link Analysis
Assess exceptions
Determine if any data must be retained
Lesson 2936Right to Erasure and Deletion
Assess impact
Apply your asset valuation and loss magnitude estimates to determine potential damage
Lesson 2514Threat Modeling Integration with Risk Analysis
Assess necessity
Determine if any direct identifiers are required for your analytical purpose (usually they're not)
Lesson 2903Direct Identifiers and Removal
Assess real-world impact
– Is this actually exploitable in context?
Lesson 2213Scanner Issue Analysis and Validation
Assess scope
Was this an isolated incident or part of a pattern?
Lesson 1808DLP Monitoring and Incident Response
asset
, an applicable **threat** that wants to exploit it, and a **vulnerability** that enables the threat to succeed.
Lesson 2498Risk Components: Assets, Threats, and VulnerabilitiesLesson 2638Identifying Assets and Attack Surface
Asset and threat
What's at risk and from what
Lesson 2516Risk Analysis Documentation and Communication
Asset coverage
Are all critical assets (data, services) included?
Lesson 84Measuring Threat Modeling Effectiveness
Asset Discovery
SCC automatically inventories all your GCP resources (compute instances, storage buckets, databases, networks) and tracks their security posture.
Lesson 1889GCP Security Command CenterLesson 2442Scan Coverage and Asset Discovery
Asset Discovery Integration
CVM platforms automatically detect new devices joining your network—laptops, servers, IoT devices—and immediately assess them.
Lesson 1616Continuous Vulnerability Monitoring
Asset Identification
means cataloging what you're protecting: user credentials, financial data, intellectual property, or system availability itself.
Lesson 2636Architectural Threat Modeling Fundamentals
Assets Affected
Systems, data, or processes at risk
Lesson 2506Risk Register Development
Assign an Elastic IP
– This becomes the public-facing address for all outbound traffic
Lesson 1831NAT Gateway Architecture
Assign to groups
rather than attaching policies directly
Lesson 1710IAM Users: Creation, Authentication, and Lifecycle
Assigned owner
and responsible team
Lesson 2625Remediation Tracking and Reporting
Associated Data
(the "A" in AEAD) comes in.
Lesson 129Associated Data in AEAD
Assume breach
What happens if an attacker crosses this boundary?
Lesson 2639Trust Boundary AnalysisLesson 2673Zero Trust Principles and Philosophy
AssumeRole Call
A user or service in the *source* account calls the AWS STS `AssumeRole` API, requesting to take on that role.
Lesson 1738AssumeRole and Trust Policies
AssumeRole events
Who assumed what role, from which account, when
Lesson 1743Cross-Account Access Auditing
Asymmetric routing problems
happen when traffic flows in via one path but returns via another, breaking stateful Security Group tracking or hitting different NACL rules.
Lesson 1826Common Misconfigurations and Troubleshooting
Asynchronous support
Members can be offline during updates and catch up later
Lesson 2950Message Layer Security (MLS) for Group Messaging
At or above threshold
You must either apply more controls, transfer the risk (insurance), or avoid the activity entirely
Lesson 2505Inherent vs Residual Risk
Atomic Operations
perform read-modify-write as a single, indivisible action.
Lesson 909Preventing Race Conditions with Locking Mechanisms
Atomic Updates
Rule changes can be applied atomically—all-or-nothing—reducing the risk of misconfigurations during updates.
Lesson 443nftables Architecture and Improvements
Atomicity
All-or-nothing transaction completion
Lesson 905Database Transaction Isolation Levels
ATT&CK Navigator
is MITRE's interactive web-based tool that turns the massive ATT&CK matrix into a visual, color- coded spreadsheet.
Lesson 2183ATT&CK Navigator and VisualizationLesson 2185Measuring Defensive Coverage with ATT&CK
Attach to releases
Include your SBOM as a downloadable artifact alongside each software release.
Lesson 1282SBOM Distribution and Consumption
attachments
, then control routing with **route tables** associated with each attachment.
Lesson 1838Transit Gateway ArchitectureLesson 2406Email and Communication Forensics
Attack Complexity (AC)
Are special conditions required?
Lesson 2444CVSS v3.1 Base Metrics
Attack graphs
are similar but more flexible—they show multiple interconnected paths and dependencies as a network diagram, useful when attack steps can happen in various orders or share preconditions.
Lesson 67Attack Trees and Attack Graphs
Attack motivation
Consumer IoT attracts opportunistic criminals; IIoT attracts sophisticated adversaries including nation-states.
Lesson 2753Consumer IoT vs Industrial IoT Threats
Attack objective
Untargeted (any wrong answer) vs.
Lesson 2846Adversarial Robustness Fundamentals
Attack Patterns
Sensors recognize attack signatures like deauthentication floods, WPS PIN brute-force attempts, KRACK exploits, Evil Twin setups, and abnormal packet injection.
Lesson 548Wireless Intrusion Detection Systems (WIDS)Lesson 1372Active Scanning and Attack Simulation
Attack simulation
Injects payloads designed to trigger vulnerabilities (SQL injection strings, XSS scripts, path traversal attempts)
Lesson 3010Dynamic Application Security Testing (DAST) Deep Dive
Attack succeeds
in the same HTTP request-response cycle—no database or storage involved
Lesson 630Reflected XSS: Immediate ExecutionLesson 890DNS Rebinding Attacks
Attack surface grows
Every branch, function, and edge case is a potential vulnerability waiting to be discovered
Lesson 1216Economy of Mechanism and Simplicity
Attack surfaces
are all the points where data enters or exits your system—APIs, user inputs, file uploads, database connections.
Lesson 2031Threat Modeling in Design Phase
Attack trees
organize these possibilities hierarchically, like a family tree showing how smaller actions combine to achieve a bigger goal.
Lesson 67Attack Trees and Attack GraphsLesson 76Collaborative Threat Modeling WorkshopsLesson 83Developer Training on Threat Modeling
Attack Trees/Kill Chain
Excellent for understanding specific attack scenarios and adversary progression.
Lesson 75Comparing Threat Modeling Methodologies
Attack Vector (AV)
Where must the attacker be?
Lesson 2444CVSS v3.1 Base Metrics
Attack vector details
(network, local, physical)
Lesson 1613Vulnerability Database and CVE Mapping
Attack-resistant
Attackers can't bypass with novel encoding or variations you didn't anticipate
Lesson 1150Allowlist vs Denylist Approaches
Attacker controls a domain
(e.
Lesson 890DNS Rebinding Attacks
Attacker crafts a URL
`https://bank.
Lesson 1118Web Cache Deception Attacks
Attacker crafts malicious page
– Contains a form or script targeting `bank.
Lesson 847CSRF Attack Anatomy and Prerequisites
Attacker submits malicious input
For example, posting a comment like:
Lesson 631Stored XSS: Persistent Attacks
Attacker tricks the victim
into using that specific session ID (via malicious link, email, or social engineering)
Lesson 714Session Fixation Attacks
Attacker triggers reset
for victim's account (victim@example.
Lesson 1126Password Reset Poisoning
Attacker uses token
on the real site to reset victim's password and hijack the account
Lesson 1126Password Reset Poisoning
Attackers evolve constantly
They discover new techniques, exploit zero-day vulnerabilities, and adapt to your defenses.
Lesson 31Security as Continuous Improvement, Not a Final State
Attackers innovate
Criminals share techniques, automate attacks, and find creative workarounds for existing defenses
Lesson 33Threat Landscape Evolution and Adaptive Security
Attempt Limiting
Failed attempts trigger progressive delays, eventually requiring passcode entry (applying the fail- safe defaults principle).
Lesson 2707Touch ID, Face ID, and Biometric Security
Attestation
Both can provide attestation (cryptographic proof of the authenticator's identity and characteristics), allowing websites to verify which type of security hardware was used during registration.
Lesson 752Platform and Roaming AuthenticatorsLesson 1464Measured Boot and TPM Integration
Attestation processes
formalize ownership and accountability.
Lesson 2621Control Attestation and Testing
Attestations of Compliance (AOC)
and **Responsibility Summary documents**.
Lesson 1980PCI DSS in Cloud Environments
Attributable
Who/what/where/when clearly recorded
Lesson 2546Evidence Collection and Documentation
Attribute bombing
XML tags with thousands of attributes
Lesson 1188XML and JSON Parser Vulnerabilities
Attribute inference
is a related technique where an attacker infers sensitive attributes (like race, health status, or income) that were *not* supposed to be learned or exposed by the model, but that correlate with the model's decision boundary.
Lesson 2832Model Inversion and Attribute InferenceLesson 2836Privacy Risks in Machine LearningLesson 2838Attribute Inference and Property Inference
Attribute Selectors as Scanners
Lesson 677CSS Injection and Exfiltration
Attribute statement
User details (email, name, role)
Lesson 776SAML Architecture and Components
Attribute verification
Prove age, citizenship, or credit score meets a threshold without revealing exact values
Lesson 2926Zero-Knowledge Proofs for Privacy
Attribute-Based Access Control (ABAC)
evaluates access requests based on *attributes* of multiple entities involved in the transaction.
Lesson 799Attribute-Based Access Control (ABAC)Lesson 1742Session Tags and Attribute-Based Access ControlLesson 2034Authentication and Authorization Design
Attribute-based policies
Services in the production environment cannot access development secrets
Lesson 1342Access Control for Runtime Secret Retrieval
Attribution
Compare technique sets to identify or distinguish threat actors
Lesson 2180Using ATT&CK for Threat Intelligence
Attribution analysis
What attacker behaviors stood out?
Lesson 2174Debrief and Knowledge Transfer
Audience
Executives, board members, and senior leadership
Lesson 2335Types of Threat Intelligence: Strategic, Tactical, and Operational
Audience Check
Verify the `aud` claim contains your application's client ID.
Lesson 774ID Token Validation and Security
Audit
authorized_keys files regularly to remove stale entries
Lesson 1442SSH Key Generation and Management
Audit and Access Tracking
Environment variables provide no record of *who* accessed *which* secret *when*.
Lesson 1324When Environment Variables Are Insufficient
Audit and Compliance
Every secret access is logged in AWS CloudTrail, providing a complete audit trail of who accessed which secret and when.
Lesson 1328AWS Secrets Manager
Audit and rotation
Separate secret management systems track who accessed what and when.
Lesson 1314Separation of Secrets from Code and Config
Audit capabilities
to proactively examine compliance
Lesson 2568CPRA Amendments and Enforcement
Audit committees
need compliance status and trend analysis.
Lesson 2549Audit Reporting and Communication
Audit configurations regularly
against responsibility models, especially after service changes
Lesson 1692Common Misunderstandings and Breach Scenarios
Audit dependencies
for known vulnerabilities (lodash <4.
Lesson 1197Detecting Prototype Pollution Vulnerabilities
Audit dependencies regularly
Use tools to scan for known vulnerabilities (CVEs) in your packages
Lesson 1945Third-Party Dependencies in Functions
Audit layer usage
through monitoring logs to detect unexpected layer attachments or version changes across your function inventory.
Lesson 1957Function Layer Security
Audit logging continues
You need visibility into replication events and access patterns in all regions
Lesson 1786Cross-Region Replication and Backup Strategies
Audit logging review
monitoring who accessed what and when
Lesson 1690Identity and Access Management Boundaries
Audit mechanisms
that regularly scan all resources across regions and accounts
Lesson 2002Tag Governance and Remediation Workflows
Audit Objectives
define *why* you're auditing.
Lesson 2544Audit Planning and Scoping
Audit Only
Logs would-be violations without blocking—perfect for testing rules before enforcement
Lesson 1593Windows AppLocker
Audit role
Can view key metadata (creation date, usage logs) but never the key material itself
Lesson 310Key Access Control and Isolation
Audit Rules and Tools
– Configuration for what to monitor (auditctl) and analysis utilities (ausearch, aureport)
Lesson 1491Introduction to Linux Auditing Framework
Audit transitive dependencies
not just what you install directly
Lesson 1967Using Components with Known Vulnerabilities
Auditable identity trails
Every action ties back to a specific identity, enabling comprehensive logging
Lesson 1694Identity-Based Access Control in Cloud
Auditing
Actions should be traceable to specific individuals
Lesson 1720Service Accounts vs User Accounts in Cloud
Auditors/Compliance
Evidence of controls, policy enforcement, exception tracking
Lesson 2461Patch Compliance Monitoring and Reporting
Authenticate as that user
to access resources the ticket permits
Lesson 2152Pass-the-Ticket and Kerberos Exploitation
Authenticated encryption needs
GCM and CCM modes provide built-in authentication
Lesson 121Stream Ciphers vs Block Ciphers: When to Use Each
Authenticated key exchange
Combining key exchange with identity verification to prevent man-in-the-middle attacks
Lesson 2941Key Exchange in E2EE Systems
Authenticated scanners
log into systems with credentials, gaining deep visibility into installed software, configurations, and missing patches—like having a key to inspect every room in a building
Lesson 1608Vulnerability Scanning Fundamentals
Authenticated scanning
is like getting a key: you walk inside and inspect the actual contents, configurations, and installed software.
Lesson 2436Authenticated Scanning and Credentialed ChecksLesson 2437Agent-Based Scanning
Authenticated scans
use valid credentials to log into systems and perform deep inspection.
Lesson 2434Vulnerability Scanning FundamentalsLesson 2441False Positives and Validation
Authenticated sessions
They maintain login states to test protected areas (similar to credentialed network scanning, but at the application layer).
Lesson 2438Web Application Vulnerability Scanners
Authenticated vs. Unauthenticated Scanners
Lesson 1608Vulnerability Scanning Fundamentals
Authenticates
service identities with certificates
Lesson 1971Network Policies and Service Mesh Security
Authenticates and authorizes per-request
, not per-session
Lesson 2686BeyondCorp Model and Zero Trust Access
Authentication & Session Flaws
Attempt password resets without proper verification, test for weak session tokens, check if sessions expire properly, and look for predictable credential recovery mechanisms.
Lesson 2104Web Application Vulnerability Hunting
Authentication and authorization
Each application/user must prove identity and is granted only necessary secrets
Lesson 1325Secret Stores vs Environment VariablesLesson 1687Shared Responsibility in PaaS
Authentication and authorization points
are they placed correctly?
Lesson 78Architecture Review and Threat Identification
Authentication checks
– Is the user logged in?
Lesson 988Secure File Serving and Access Control
Authentication Configuration
involves providing your DAST tool with valid login credentials—typically a username and password, but potentially API keys, tokens, or multi-step authentication flows.
Lesson 1373Authentication and Session Handling in DAST
Authentication confusion
– The scanner loses session state and flags logout pages as access control issues
Lesson 1375False Positive Management in DAST
Authentication error rate spikes
that indicate apps using stale secrets
Lesson 1349Rotation Testing and Rollback
Authentication gateways
All users must log in through one identity management system
Lesson 29Security Choke Points
Authentication happens first
A user presents credentials (password + MFA token) to the cloud provider
Lesson 1701Authentication vs Authorization in Cloud IAMLesson 2685Software-Defined Perimeter and Identity-Based Segmentation
Authentication happens per-request
Cloud APIs verify identity tokens on every call
Lesson 1694Identity-Based Access Control in Cloud
Authentication Header (AH)
is one of two core IPsec protocols (alongside ESP, which you'll learn later).
Lesson 477Authentication Header (AH) Protocol
Authentication is continuous
, not one-time at login
Lesson 2674Identity as the New Perimeter
Authentication patterns
(login times, source locations, MFA usage)
Lesson 1897Baseline Establishment for Cloud Resources
Authentication resilience
Does the AP properly validate client credentials under unusual conditions?
Lesson 531Wireless Packet Injection
Authentication Server
The backend system (typically a RADIUS server) that verifies credentials and makes the trust decision.
Lesson 540802.1X Authentication Framework
Authentication statement
"User X logged in at time Y"
Lesson 776SAML Architecture and Components
Authentication Success Rates
monitor login attempts versus failures.
Lesson 2530Access Control and Identity Metrics
Authentication tag
A short value (typically 128 bits) that proves the ciphertext hasn't been modified
Lesson 101GCM Mode: Authenticated Encryption Standard
Authentication testing
Brute-force or test default credentials
Lesson 2197Auxiliary Modules and Scanning
Authentication tokens
Session cookies sent in 0-RTT can be replayed
Lesson 1103HTTP/3 0-RTT Replay Attacks
Authentication without credentials
Prove you have the right password without sending it
Lesson 2926Zero-Knowledge Proofs for Privacy
Authentication/session flaws
(tests actual login mechanisms)
Lesson 3010Dynamic Application Security Testing (DAST) Deep Dive
Authenticator
The network access device (usually your wireless access point or network switch).
Lesson 540802.1X Authentication Framework
Authority
(posing as IT support or officials)
Lesson 1533Social Engineering and User Deception
Authority and urgency
(building on prior lessons about manipulation)
Lesson 2269Vishing and Phone-Based Pretexting
Authority chain validation
Contact the supposed authority figure through known channels, not the contact info provided by the caller
Lesson 2270Detecting and Resisting Manipulation Attempts
Authority impersonation
Pretending to be executives, law enforcement, or technical support
Lesson 2259Smishing and Vishing
Authority pretexting
Wearing uniforms (delivery, maintenance, security) to gain trust
Lesson 2272Tailgating and Piggybacking Attacks
Authority without validation
Claims of being from IT, executives, or vendors without proper credentials
Lesson 2270Detecting and Resisting Manipulation Attempts
Authority-Based Manipulation
relies on the psychological principle that employees rarely question direct requests from executives.
Lesson 2255Whaling and Executive Impersonation
Authorization bypass
Path checks like `/Admin/` vs `/admin/` behave unexpectedly
Lesson 1171Unicode Case Mapping and Locale IssuesLesson 1193Prototype Pollution Fundamentals
Authorization checks
– Does this user have permission to access this specific file?
Lesson 988Secure File Serving and Access Control
Authorization Code Grant
is the gold standard for web applications with server backends.
Lesson 757OAuth 2.0 Grant Types
Authorization code interception
(mitigated by PKCE)
Lesson 768OAuth 2.0 Security Best Practices
Authorization Code Issued
The server redirects back to your `redirect_uri` with a short-lived authorization code (valid ~10 minutes)
Lesson 758Authorization Code Flow Deep Dive
Authorization Code Receipt
Server returns the authorization code as usual
Lesson 1089Authorization Code Flow with PKCE for SPAs
Authorization Code with PKCE
(modern best practice)
Lesson 757OAuth 2.0 Grant Types
Authorization determines visibility
(users can't even see resources they're not entitled to)
Lesson 2685Software-Defined Perimeter and Identity-Based Segmentation
Authorization flaws
Accessing other users' resources (BOLA/IDOR)
Lesson 3013API Security Testing Automation
Authorization Flow
The authorization server stores the code challenge alongside the authorization code.
Lesson 759PKCE (Proof Key for Code Exchange)
Authorization follows
Once authenticated, IAM checks policies attached to that identity to determine resource access
Lesson 1701Authentication vs Authorization in Cloud IAM
authorization framework
(not authentication) that lets you grant a third-party application limited access to your resources without sharing your password.
Lesson 756OAuth 2.0 Overview and RolesLesson 769OpenID Connect Overview and Relationship to OAuth 2.0
Authorization header
Standard and secure (`Authorization: Bearer <token>`)
Lesson 1010Bearer Token Authentication for APIs
Authorization headers
using Basic Authentication (Base64-encoded credentials)
Lesson 378HTTP Traffic Analysis and Credential Extraction
Authorization is explicit
Access is granted through IAM policies, not firewall rules
Lesson 1694Identity-Based Access Control in Cloud
Authorization matters
Only reverse engineer apps you own, have explicit permission to analyze, or where legitimate security research applies
Lesson 2722Introduction to Mobile App Reverse Engineering
Authorization Request
Your app redirects the user to the authorization server with a `redirect_uri` and optional PKCE `code_challenge`
Lesson 758Authorization Code Flow Deep DiveLesson 1089Authorization Code Flow with PKCE for SPAs
Authorization Server
(Google login)
Lesson 756OAuth 2.0 Overview and Roles
Authorization statement
What the user can access
Lesson 776SAML Architecture and Components
Authorize
Automated authorization testing across roles
Lesson 2214Burp Extensions and BApp Store
Authorized actions
Can you perform denial-of-service tests?
Lesson 2088Common Testing Targets and Scope
Auto-escaping templates
automatically encode outputs based on context:
Lesson 1224Template Auto-Escaping vs Manual Encoding
Auto-scaling policies
Pre-configure resource scaling thresholds
Lesson 1861DDoS Response and Incident Management
Autocrypt
is a specification for automating OpenPGP key exchange through regular email headers.
Lesson 2966Modern Alternatives: Autocrypt and Delta Chat
Autoencoders
compress faces into latent representations, then decode them onto different targets.
Lesson 2864Deepfakes: Generation Techniques and Detection Challenges
Automatable
– Can attackers exploit this at scale without human intervention?
Lesson 2448SSVC (Stakeholder-Specific Vulnerability Categorization)
Automate
initial response (isolation, blocking) when thresholds breach
Lesson 2661Monitoring and Response Across Layers
Automate dependency updates
with testing to catch breaking changes
Lesson 1967Using Components with Known Vulnerabilities
Automate generation
Integrate SBOM generation into your CI/CD pipeline so every build automatically produces an up-to-date SBOM.
Lesson 1282SBOM Distribution and Consumption
Automated
Integrated into exploit kits or mass-scanning tools
Lesson 2451Exploitability Assessment
Automated access control testing
lets tools systematically check whether authorization rules are enforced correctly across your entire application surface.
Lesson 833Automated Access Control Testing
Automated alerting
Trigger on specific field values (e.
Lesson 1472Structured vs Unstructured Logging
Automated approval
Policy engine evaluates request against rules and context
Lesson 2677Least Privilege Access in Zero Trust
Automated bumping
Follows your configured rules (e.
Lesson 1303GitHub Dependency Scanning and Dependabot
Automated checks
Performance benchmarks, adversarial robustness tests, fairness metrics
Lesson 2878ML Pipeline Security and Governance
Automated Cloning
Tools like SET (Social Engineering Toolkit) can automatically scrape and clone target websites with a single command, making pixel-perfect copies in seconds.
Lesson 2256Credential Harvesting Pages
Automated conflict detection
Flagging when a single user tries to execute multiple phases
Lesson 2664Separation of Duties
Automated Enrichment
Configure your SOAR platform to automatically query your TIP when investigating alerts, pulling in context about threat actors, campaigns, and recommended response actions.
Lesson 2342Operationalizing Threat Intelligence
Automated Enumeration
Once authenticated, CME enumerates shares, sessions, logged-in users, local admin group members, and domain information—no manual interaction needed.
Lesson 2239CrackMapExec for Network Enumeration
Automated evidence collection
means deploying tools, scripts, and integrations that continuously capture compliance artifacts from your systems without human intervention.
Lesson 2620Automated Evidence CollectionLesson 2622Continuous Compliance Monitoring
Automated hardening scripts
are pre-written configuration management tools that read security baseline requirements and apply them systematically.
Lesson 1418Automated Hardening and Remediation Scripts
Automated key replication
Some providers support automatic key material sharing across regions for seamless backup copying
Lesson 1798Encrypted Backups and Snapshots
Automated package verification workflows
integrate these security checks directly into your continuous integration and deployment pipelines, making verification a mandatory gate rather than an optional step.
Lesson 1301Automated Package Verification Workflows
Automated policy enforcement
Apply security rules based on tags (`Environment=Production` triggers stricter network policies)
Lesson 1996Cloud Resource Tagging Strategy and Standards
Automated policy generation
based on observed traffic patterns and least-privilege principles
Lesson 2679Zero Trust Network Segmentation
Automated pull requests
when updates fix vulnerabilities (like Dependabot)
Lesson 1399Dependency and SCA Scanning in Pipelines
Automated renewal
TLS certificates should auto-renew 30+ days before expiration
Lesson 1348API Key and Certificate Rotation
Automated Risk Assessment Tools
Software that calculates k-anonymity levels, identifies quasi-identifier combinations, and flags high-risk records.
Lesson 2911Measuring and Testing Anonymization Effectiveness
Automated rollback scripts
Pre-tested removal commands
Lesson 1605Patch Rollback and Emergency Procedures
Automated scanning in pipelines
as mandatory quality gates
Lesson 2013Secrets in IaC: Detection and Prevention
Automated Scheduling
Configure scanners to run daily, weekly, or even hourly against critical assets.
Lesson 1616Continuous Vulnerability Monitoring
Automated security scanning tools
solve this by continuously analyzing storage contents and configurations to identify risks you might not even know exist.
Lesson 1791Storage Security Scanning and Macie
Automated snapshots
Schedule regular snapshots of critical volumes (you learned this in encrypted storage lessons)
Lesson 1931Instance Termination Protection and Data Persistence
Automated Technical Controls
provide continuous verification.
Lesson 2496Policy Compliance Monitoring and Enforcement
Automated testing
Run scripts or tools to validate technical controls at scale
Lesson 2547Control Testing Methodologies
Automated ticket creation
uses configurable rules: only create tickets for critical/high findings, deduplicate similar issues, assign to the right team based on asset ownership.
Lesson 3049Integration with Ticketing and ITSM
Automated triage
to filter noise and escalate genuine risks
Lesson 1808DLP Monitoring and Incident Response
Automated triage rules
that flag duplicates or out-of-scope domains
Lesson 2486Scaling and Optimizing Programs
Automated Workflows
Integration enables automatic response playbooks.
Lesson 1995Compliance Tool Integration with SIEM
Automatic credential rotation
through expiration
Lesson 1733Federation and Temporary Credentials
Automatic deletion
ensures compliance without human intervention.
Lesson 2897Temporal Data Minimization
Automatic escalation triggers
Ransomware detection, data exfiltration >10GB, C-level credential compromise
Lesson 2427Incident Status Updates and Escalation
Automatic expiration
limits blast radius of compromised tokens
Lesson 1725GCP Service Account Impersonation
Automatic failover
detects when the primary secret store becomes unresponsive and seamlessly switches to a standby replica without manual intervention.
Lesson 1333High Availability and Disaster Recovery
Automatic loading
of PowerShell scripts and executables
Lesson 2244Evil-WinRM and PowerShell Remoting Attacks
Automatic parsing
Frameworks convert JSON directly into objects without validation
Lesson 596JSON Injection and Type Confusion
Automatic public IP assignment
– Instances may receive public IPs without explicit configuration
Lesson 1813Default VPC Security Considerations
Automatic rebuilds
when upstream patches release
Lesson 1400Container and Image Scanning
Automatic Replication
Secrets are automatically replicated across multiple locations within a region or globally, depending on your replication policy.
Lesson 1330Google Cloud Secret Manager
Automatically update allowlist policies
to include these signed artifacts
Lesson 1598Allowlisting in DevOps and CI/CD
Automatically updated
when vulnerabilities are discovered
Lesson 870Framework-Specific CSRF Protection
Automation and Scripting
Chain multiple Volatility plugins together using shell scripts or automation frameworks.
Lesson 2397Memory Analysis with Volatility Framework
Automation Runbooks
respond to alerts
Lesson 1911Cloud IR Playbooks and Automation
Autonomous System Numbers (ASNs)
unique identifiers assigned to networks that manage their own routing policies.
Lesson 336ASN and IP Range Discovery via Public Sources
Autorun Exploitation
was historically devastating.
Lesson 1530Removable Media and USB-Based Attacks
Autorun payloads
Scripts that execute automatically when mounted
Lesson 2251QR Code and USB Drop Attack Tools
Autoruns
(from Sysinternals) enumerate all auto-start locations, making suspicious entries visible.
Lesson 1540Startup Folders and Shell ExtensionsLesson 1545Detecting and Removing Persistence Mechanisms
Auxiliary
Scanners, fuzzers, and reconnaissance tools
Lesson 2193Metasploit Architecture and Components
auxiliary modules
are Metasploit's non-exploitation workhorses.
Lesson 2197Auxiliary Modules and ScanningLesson 2204Custom Module Development
AV scan
Pass the file to an antivirus engine (like ClamAV, VirusTotal API, or cloud scanning services)
Lesson 961Virus Scanning and Malware Detection Integration
Availability (A)
Are services disrupted?
Lesson 2444CVSS v3.1 Base Metrics
Availability attacks
Degrade the model's general performance by corrupting enough training data that it becomes unreliable.
Lesson 2818Data Poisoning Attack Fundamentals
Availability zone placement
– Deploy one NAT gateway per AZ for high availability
Lesson 1831NAT Gateway Architecture
Availability zones
Subnet per AZ for fault tolerance
Lesson 1812VPC Segmentation Strategies
Available exploits
Are active attacks targeting this library?
Lesson 1267Unmaintained Dependencies and End-of-Life Libraries
Avatar²
Orchestrates hybrid setups mixing emulation with real hardware
Lesson 2767Firmware Emulation and Dynamic Analysis
Average queries
Sensitivity depends on bounds and dataset size—often requires more complex analysis or query restructuring
Lesson 2917Sensitivity and Query Analysis
Avoid `unsafe-inline` and `unsafe-eval`
strict CSP makes them unnecessary
Lesson 667Strict CSP and Modern Best Practices
Avoid blind spots
by overlapping camera fields-of-view.
Lesson 2284Video Surveillance and Monitoring
Avoid broad port ranges
Instead of allowing `0-65535`, specify exact ports:
Lesson 1821Security Group Rule Design Best Practices
Avoid dangerous wildcards
Configurations like `/bin/*` seem convenient but let users run any binary in that directory, including shells or editors that can spawn root shells.
Lesson 1426Sudo Configuration and Security
Avoid inline event handlers
Use `addEventListener()` instead of `onclick=".
Lesson 1222JavaScript Context Encoding Challenges
Avoid mixing identities
keep separate Tor Browser profiles for different activities
Lesson 2991Operational Security for Tor Users
Avoid overlaps
If `VPC-A` uses `10.
Lesson 1810VPC IP Addressing and CIDR Planning
Avoid serialization
Never let secrets get serialized into logs, error messages, or debug output where they might persist unexpectedly.
Lesson 1341Secret Caching and Memory Management
Avoid technical jargon
Replace "privilege escalation via misconfigured sudo binary" with "attackers could gain complete system control through misconfigured administrator tools.
Lesson 2161Executive Summary Writing
Avoid wildcards
when you can be explicit
Lesson 459Writing Effective IDS/IPS Rules
Awareness
It educates developers about the most prevalent security risks
Lesson 1200History and Purpose of the OWASP Top 10
Awareness campaigns
keep security top-of-mind between formal training cycles: posters, newsletters, simulated phishing exercises, and "lunch and learn" sessions build culture.
Lesson 2495Policy Communication and Training Requirements
AWS Athena
or **Google BigQuery** let you query logs using familiar SQL syntax.
Lesson 1882Cloud SIEM Query Languages
AWS Auth
allows EC2 instances or Lambda functions to authenticate using AWS IAM credentials or instance identity documents.
Lesson 1327Vault Authentication Methods
AWS Certificate Manager (ACM)
provisions, deploys, and renews certificates automatically for services like load balancers, CloudFront distributions, and API Gateway.
Lesson 1774Certificate Management in Cloud Environments
AWS CloudWatch Logs
collects logs from EC2 instances, Lambda functions, VPC Flow Logs, CloudTrail API calls, and custom applications.
Lesson 1869Cloud Logging Architecture and Service Overview
AWS CloudWatch Logs Insights
uses a SQL-like syntax
Lesson 1876Log Query and Analysis Techniques
AWS ECR
Set scan-on-push via registry configuration; supports both basic and enhanced scanning
Lesson 1636Registry-Integrated Scanning
AWS IAM Access Analyzer
to automatically detect resources shared with external entities and flag unusual or overly permissive grants.
Lesson 1751Cross-Account and External Access Analysis
AWS Lambda functions
trigger on CloudWatch Events/EventBridge
Lesson 1911Cloud IR Playbooks and Automation
AWS Macie
continuously monitors S3 buckets, using machine learning to identify personally identifiable information (PII), financial data, and intellectual property.
Lesson 1803Cloud-Native Data Classification Tools
AWS PrivateLink
Exposes services via private endpoints in your VPC
Lesson 1779VPN and Private Connectivity Encryption
AWS S3
with server-side encryption (SSE-KMS)
Lesson 3004IaC State File Security
AWS STS
allows 15 minutes to 12 hours (or up to 36 hours for role chaining in some configurations)
Lesson 1731Session Duration and Token Lifecycle
AWS-managed
Standard patterns, quick setup, automatic updates
Lesson 1714Managed Policies vs Inline Policies
Aztec
or **Tornado Cash** add similar ZKP-based privacy to existing blockchains like Ethereum, letting users deposit funds publicly then withdraw them privately, breaking the transaction graph.
Lesson 248Privacy-Preserving Blockchains with ZKPs
Azure Information Protection (AIP)
classifies and labels documents and emails both in Azure storage and on-premises systems.
Lesson 1803Cloud-Native Data Classification Tools
Azure Key Vault
stores and manages certificates alongside encryption keys.
Lesson 1774Certificate Management in Cloud Environments
Azure Logic Apps
or **Automation Runbooks** respond to alerts
Lesson 1911Cloud IR Playbooks and Automation
Azure Managed Identities
.
Lesson 1329Azure Key Vault
Azure Monitor
unifies platform logs (Azure Activity Log, resource logs) and application logs into Log Analytics workspaces.
Lesson 1869Cloud Logging Architecture and Service OverviewLesson 1876Log Query and Analysis TechniquesLesson 1880SIEM Data Sources in Cloud
Azure Private Link
Connects to Azure services over Microsoft's backbone
Lesson 1779VPN and Private Connectivity Encryption
Azure Sentinel
and Azure Monitor.
Lesson 1882Cloud SIEM Query Languages
Azure Storage
with encryption keys
Lesson 3004IaC State File Security

B

Back-Channel Communication
The IdP can directly notify RPs when a user's session changes (like logout), without relying on browser communication.
Lesson 775OIDC Session Management and Single Logout
Back-Channel Logout
IdP sends direct server-to-server logout tokens to each RP's registered logout endpoint.
Lesson 775OIDC Session Management and Single Logout
Backdoor Elimination
Search for and remove web shells, unauthorized user accounts, hidden services, or modified system binaries.
Lesson 2367Eradication: Removing the Threat Actor
Backdoor injection
Embed hidden triggers—the model performs normally except when it sees a secret pattern the attacker controls.
Lesson 2818Data Poisoning Attack Fundamentals
Backdoors
are hidden entry points installed on compromised systems.
Lesson 2118Maintaining Access and Persistence Mechanisms
Backend for Frontend
pattern introduces a lightweight backend service that sits between your SPA and your APIs.
Lesson 1092Backend for Frontend (BFF) Pattern
Backend for Frontend pattern
you just studied to avoid cross-origin issues entirely.
Lesson 1093Cross-Origin Authentication and iframe Security
Background checks
For long-term or sensitive-area visitors
Lesson 2285Visitor Management and Temporary Access
Backslash substitution
`https://trusted-site.
Lesson 1142Open Redirect Attack Vectors
Backup and disaster recovery
Your data protection strategy
Lesson 1677IaaS Security Responsibilities
Backup integrity
Database replicas in separate AZs survive zone-specific disasters
Lesson 1834Multi-AZ Subnet Design for Resilience
Backup Platform Key (PK)
Always export and securely store your PK before modifications—losing it means you can't change Secure Boot settings
Lesson 1462Configuring and Managing Secure Boot
Backup restoration
One person initiates restore, another verifies integrity before applying
Lesson 2664Separation of Duties
Backup settings
`android:allowBackup="true"` may expose sensitive data through ADB backups.
Lesson 2714APK Structure and Manifest Analysis
Backup strategies
should enforce versioning in both regions, use separate KMS keys per region (reducing blast radius if one key is compromised), and implement bucket policies that prevent accidental deletion in the backup region.
Lesson 1786Cross-Region Replication and Backup Strategies
Backup vulnerabilities
are similarly critical: cloud backups often use weaker encryption than E2EE, creating a secondary attack surface.
Lesson 2957Encrypted Messaging Attacks and Vulnerabilities
Backward Compatibility
Legacy systems can't immediately switch to post-quantum crypto.
Lesson 276Hybrid Cryptographic Approaches
BACnet
communicates building systems using simple request-response messages over IP, UDP, or serial lines.
Lesson 2787BACnet and Modbus Protocol Security
Bad
Forcing 24-character passwords that expire weekly (users write them down)
Lesson 2669Psychological Acceptability
Badge skimming
Capturing credentials wirelessly without physical contact
Lesson 2280Badge and Card-Based Access Systems
BadUSB Attacks
exploit the fundamental trust model of USB.
Lesson 1530Removable Media and USB-Based Attacks
Balance calculations
Add funds repeatedly to overflow account balances beyond security checks.
Lesson 926Integer Overflow in Financial Calculations
Balance checks
Apply the same coupon code multiple times before the "used" flag is set
Lesson 939Time-of-Check to Time-of-Use Testing
Balance rigor with pragmatism
Not every check belongs at every stage.
Lesson 2057Continuous Security Integration
Balancing Act
The key tension is security versus performance.
Lesson 1583EDR Deployment and Performance Considerations
Bandwidth usage
What's the normal load on critical segments?
Lesson 416Network Monitoring and Baselining
Bandwidth weights
Faster relays handle more traffic
Lesson 2985Tor Relays: Guard, Middle, and Exit
Bank processes request
– It appears legitimate because authentication is valid
Lesson 847CSRF Attack Anatomy and Prerequisites
Banking Trojans
Steal credentials and financial information
Lesson 1521Trojans: Deceptive Functionality
banner grabbing
connecting to a service and reading its welcome message.
Lesson 344Service Version DetectionLesson 1608Vulnerability Scanning Fundamentals
Banner interpretation
Scanners see a service banner and assume vulnerabilities exist, but security hardening may have mitigated them
Lesson 2441False Positives and Validation
BApp Store
is Burp's official extension marketplace, accessible directly from the **Extender** tab.
Lesson 2214Burp Extensions and BApp Store
Base image freshness
and compliance with approved images
Lesson 3029Container Image Scanning
Base Image Selection
– You pull from Docker Hub, vendor registries, or internal sources.
Lesson 1642Container Image Supply Chain Overview
Base Layer
Always implement **synchronizer tokens** or **double submit cookies** as your primary defense.
Lesson 873Defense-in-Depth CSRF Strategy
Base metrics
Exploitability (attack vector, complexity, privileges required) and impact (confidentiality, integrity, availability)
Lesson 2160Vulnerability Severity and Risk Rating
Baseband
Manages connections, packets, and timing
Lesson 555Bluetooth Architecture and Security Model
Baseline and Trend Analysis
Compare current scan results against previous baselines to catch regressions without blocking all releases for pre-existing issues.
Lesson 1377Integrating DAST into CI/CD
Baseline assessment
– Where are you today?
Lesson 2313SOC Maturity Models
Baseline comparison
Fail only if security posture worsens from previous build
Lesson 2065Automated Security Gates in CI/CDLesson 3027SAST Integration in Pipelines
Baseline comparisons
Measure progress against previous builds
Lesson 1402Security Test Results Management
Baseline Creation
FIM begins by calculating hash values (like SHA-256) for known-good files—your system's binaries, configuration files, and other critical assets.
Lesson 1500File Integrity Monitoring Fundamentals
Baseline first
Run Sysmon unfiltered briefly to identify high-volume, legitimate sources
Lesson 1515Advanced Sysmon Configuration and Filtering
Baseline Initialization
Tripwire scans your system and creates a cryptographically signed database of file states using site and local keys—this prevents attackers from modifying the database itself.
Lesson 1502Tripwire for File Integrity
Baseline Learning
Allow systems to observe normal environment behavior before enforcing strict policies, reducing alerts on routine activity.
Lesson 1571False Positives and Detection Tuning
Baseline Management
Establish a "known-good" baseline of existing findings, then only alert on *new* issues in subsequent scans.
Lesson 3016False Positive Management
Baseline normal activity
Document legitimate scheduled tasks before incidents occur.
Lesson 1538Scheduled Tasks and Cron Jobs
Baseline scans
establish what's "normal" for your codebase.
Lesson 1363False Positives and Tuning SAST Tools
Baseline your network
to understand normal traffic patterns, then tune rules to match your environment, not generic threat landscapes.
Lesson 460False Positives and Alert Tuning
baselines
by learning normal patterns over time: which processes typically run, what network destinations are accessed, which users log in when.
Lesson 1576Behavioral Analysis and Anomaly DetectionLesson 2611NIST 800-53 Security Controls
Basic bypass example
A filter blocks `.
Lesson 1160URL Encoding Attacks and Bypasses
Basic Constraints
extension answers one critical question: "Can this certificate act as a CA?
Lesson 174Certificate Extensions: Basic Constraints and Key Usage
Basic remote sending
requires minimal configuration on the client:
Lesson 1480Remote Logging with rsyslog
Basic tier
Always-on monitoring with automatic mitigation
Lesson 1857Cloud DDoS Protection Services
Batch Operations
APIs often allow multiple operations in one request.
Lesson 836API Authorization Testing
batch verification
can verify multiple signatures faster than checking each individually.
Lesson 234Signature Performance and Implementation ConsiderationsLesson 239Aggregate Signatures and Batch Verification
Battery impact
Each ECDSA signature costs energy; design protocols that minimize handshakes and re- authentications.
Lesson 2794Elliptic Curve Cryptography for IoT
Battle-tested
by millions of applications
Lesson 870Framework-Specific CSRF Protection
BDS (Boot Device Selection)
Presents boot menu, locates bootloader on disk
Lesson 1459UEFI Architecture and Boot Process
Be beyond the control
of those who could exploit the weakness
Lesson 26Compensating Controls
Be regularly monitored
to ensure it remains effective
Lesson 26Compensating Controls
Beaconing patterns
Regular, periodic GET requests indicating C2 check-ins
Lesson 2414DNS and HTTP Forensics
Bearer Tokens
Simple string tokens included in HTTP headers (`Authorization: Bearer <token>`).
Lesson 1663API Server Authentication Mechanisms
Bearer tokens in headers
`Authorization: Bearer <token>` sent during the upgrade handshake
Lesson 1069WebSocket Authentication and Authorization
Before (vulnerable)
`(\d+)*` on input "123456789X" backtracks catastrophically
Lesson 1179Safe Regex Construction Techniques
Before authentication
A visitor may receive a session ID for browsing (tracking cart items, language preferences).
Lesson 707Session Creation and Initialization
Before building artifacts
– Catch secrets in build configurations
Lesson 1353CI/CD Pipeline Secret Scanning
Before container push
– Scan Docker images for embedded credentials
Lesson 1353CI/CD Pipeline Secret Scanning
Before data collection
Minimizing what you collect based on genuine necessity, not collecting everything and deleting later when regulations tighten
Lesson 2881Proactive Not Reactive Privacy
Before database queries
Validate ownership/permissions
Lesson 842Resource-Level Permission Checks
Before major releases
or architectural changes
Lesson 82Threat Model Reviews and Updates
Before processing any request
Check if the authenticated user has permission
Lesson 840Server-Side Authorization Enforcement
Before training
Auditing datasets for sensitive attributes, implementing differential privacy mechanisms, not just scrubbing data after someone complains
Lesson 2881Proactive Not Reactive Privacy
Behavior hijacking
Fine-tuning doesn't remove the original malicious logic
Lesson 2877Malicious Pre-trained Models
Behavior on timeout
The regex operation throws an error or returns failure
Lesson 1180Regex Timeout and Resource Limits
Behavior patterns
Daily routines, travel habits, social circles
Lesson 2974What is Metadata and Why It Matters
Behavioral analysis
Look for anomalies and inconsistencies rather than searching for the rootkit directly.
Lesson 1557Rootkit Detection Challenges and FundamentalsLesson 1859Bot Management and Detection
Behavioral analysis tools
Monitor system calls, registry modifications, and process behaviors in real-time
Lesson 1573Antivirus Limitations and Complementary Controls
Behavioral analytics
that know what "normal" looks like for cloud APIs
Lesson 1886Cloud Threat Detection Overview
Behavioral Baselines
Establish what "normal" looks like for each identity.
Lesson 1761Privilege Escalation Detection and Prevention
Behavioral Change Indicators
demonstrate real-world impact:
Lesson 2529Security Awareness and Training Metrics
Behavioral Events
– Higher-level activities like credential access attempts, privilege escalation, injection techniques, or suspicious API calls that indicate malicious intent beyond individual actions.
Lesson 1575EDR Data Collection and Telemetry
Behavioral Fingerprinting
Compare device traffic against baseline profiles.
Lesson 2802IoT Botnet Detection and Mitigation
Behavioral fingerprints
Consistent login times, writing style, browser configurations
Lesson 2998Operational Security for Circumvention
Behavioral indicators
Is it trying to disable antivirus software, create hidden files, or modify critical registry keys?
Lesson 1566Heuristic Analysis Techniques
Behavioral red flags
that suggest session hijacking or abuse:
Lesson 737Session Monitoring and Anomaly Detection
Behavioral testing
Run extensive test suites looking for anomalous outputs on edge cases
Lesson 2877Malicious Pre-trained Models
Below threshold
Accept the residual risk and move on
Lesson 2505Inherent vs Residual Risk
Benchmark
against industry standards or competitors
Lesson 34Security Maturity Models and Assessment
Benchmark Support
Verify the tool covers frameworks you need—CIS benchmarks, NIST, PCI DSS, HIPAA, SOC 2, GDPR.
Lesson 2011CSPM Vendor Selection and Deployment
Benchmarking
– How do you compare to industry peers?
Lesson 2313SOC Maturity Models
Benefit
Eliminates entire classes of injection and complexity attacks.
Lesson 1008GraphQL Security Best Practices and Tooling
Best Current Practice (BCP)
documents that update the original OAuth 2.
Lesson 768OAuth 2.0 Security Best Practices
Better
Passphrase or SSO with MFA that's quick and familiar
Lesson 2669Psychological Acceptability
Better auditing
Single source of truth for access logs
Lesson 1698Identity Federation and Single Sign-On
Better awareness and frameworks
Modern development frameworks have built-in protections (parameterized queries, ORM safeguards) that have reduced SQL injection prevalence
Lesson 1205Evolution of Injection Attacks in the Rankings
Better flexibility
Works across certificate renewals as long as the key stays the same.
Lesson 186Certificate Pinning Techniques
Better for mobile/IoT
Less CPU, memory, and battery consumption
Lesson 163ECC vs RSA: Security and Performance
Better Performance
nftables uses a virtual machine architecture that processes rules more efficiently.
Lesson 443nftables Architecture and Improvements
Better practice
Use specific paths like `Path=/secure/dashboard` to limit exposure.
Lesson 725Cookie Scope and Domain Security
Better prioritization
High-correlation alerts get attention first
Lesson 1902Multi-Signal Correlation for Detection
Bettercap
is the modern successor to Ettercap, designed for speed and extensibility.
Lesson 401MITM Attack Tools and Frameworks
BeyondCorp
is Google's implementation of Zero Trust, developed after they moved away from privileged internal networks.
Lesson 2686BeyondCorp Model and Zero Trust AccessLesson 2687Context-Aware Access Controls
BGP route registries
that show how internet traffic is routed globally.
Lesson 336ASN and IP Range Discovery via Public Sources
BGP support
For dynamic routing and automatic failover between tunnels
Lesson 1840VPN Connections to Cloud
BGW protocol
uses **secret sharing** (which you already know!
Lesson 260MPC Protocols for Multiple Parties
Bias the distribution
to favor attacker-chosen behaviors
Lesson 2818Data Poisoning Attack Fundamentals
Bias-prone
Colors and labels influence perception more than underlying data
Lesson 2500Risk Calculation and Risk Matrices
Biba Model
solves the opposite problem: protecting *integrity* by preventing unreliable data from contaminating trusted information.
Lesson 16Biba Model: Integrity Protection
Billing anomalies
Sudden spikes in EC2/compute costs without corresponding business justification
Lesson 1893Cryptomining and Resource Abuse Detection
BIM
(also called I-FGSM) is PGD's simpler cousin.
Lesson 2811Iterative Attacks: PGD and BIM
Binaries
monitor `/usr/bin/` and `/usr/sbin/` for trojan insertion
Lesson 1493File and Directory Watch Rules
Binary Format
Data is split into TYPE, LENGTH, FLAGS, and PAYLOAD fields.
Lesson 1097HTTP/2 Protocol Architecture and Security Model
Binary parsing vulnerabilities
Bugs in frame parsing can lead to crashes or memory corruption
Lesson 1097HTTP/2 Protocol Architecture and Security Model
Binary Replacement
When executables or DLLs in trusted locations (`C:\Program Files\`, etc.
Lesson 2133Registry and File System Permission Weaknesses
BinaryFormatter
is the most notorious offender.
Lesson 1185Insecure Deserialization in .NET
Bind Shells
The target opens a listening port for you to connect to:
Lesson 2236Netcat and Socat for Network Pivoting
Binding Corporate Rules
for multinational organizations
Lesson 1982GDPR and Data Sovereignty Requirements
Biological inconsistencies
Irregular blinking patterns, missing pulse signals in facial blood vessels (PPG), or abnormal eye movements
Lesson 2867Deepfake Detection: Forensic Artifacts and ML Classifiers
Biometric factors
Fingerprint, facial recognition, or voice verification stored locally on trusted devices
Lesson 750Passwordless Authentication Fundamentals
Biometric systems
(face recognition, fingerprints)
Lesson 2839Model Inversion Attacks
Biometric unlock
Face ID or Touch ID tied to device-stored credentials
Lesson 750Passwordless Authentication Fundamentals
Biometrics
paired with device security (Windows Hello, Touch ID)
Lesson 1697Strong Authentication for Cloud Identity
Birthday attack for collisions
You only need roughly 2^(n/2) attempts to find *any* two inputs that collide
Lesson 202The Birthday Paradox and Collision Probability
Bit-depth reduction
quantizes pixel values to fewer bits (e.
Lesson 2850Input Transformation Defenses
Black-box access
means the attacker only interacts with the model as a user would—submitting inputs and observing outputs.
Lesson 2809Threat Model for Adversarial Attacks
Black-box attacks
Without internal access, attackers use query-based methods or transferability principles.
Lesson 2870Adversarial Robustness of Deepfake Detectors
black-box testing
, the penetration tester receives minimal or no information about the target environment.
Lesson 2081Types of Penetration TestsLesson 2779Hardware Security Testing and Evaluation
BLAKE2
for cryptographic hashing needs.
Lesson 208MD5 and SHA-1: Broken Hash Functions
BLAKE2b
(optimized for 64-bit platforms, outputs up to 512 bits) and **BLAKE2s** (optimized for 8- to 32- bit platforms, outputs up to 256 bits).
Lesson 215Specialized Hash Functions: BLAKE2, BLAKE3
BLAKE3
is the newest evolution—even faster than BLAKE2, highly parallelizable, and designed for modern multi-core processors.
Lesson 215Specialized Hash Functions: BLAKE2, BLAKE3
Blakley's scheme
uses geometry instead of polynomials.
Lesson 324Alternative Secret Sharing Schemes
Blast radius
When code is your secret store, a single compromised developer machine or leaked backup can expose everything.
Lesson 1314Separation of Secrets from Code and ConfigLesson 1340Dynamic Secret Generation at RuntimeLesson 1936Credential Exposure via IMDS
Blast radius containment
If an AZ is compromised, attackers cannot pivot to resources in other zones through layer-2 networking
Lesson 1834Multi-AZ Subnet Design for Resilience
Bleichenbacher attack
, discovered in 1998.
Lesson 145RSA Padding Schemes: PKCS#1 v1.5
Blend in
Make your C2 traffic look like legitimate business applications (HTTPS to popular CDNs, DNS over trusted domains)
Lesson 2222Framework Evasion Techniques
Blend with legitimate activity
Administrators routinely use RDP for management
Lesson 2156RDP and GUI-Based Lateral Movement
Blend with normal traffic
Match your beacons to legitimate application behavior.
Lesson 2224Framework OPSEC and Detection
blind command injection
, and it requires creative techniques to confirm the vulnerability exists and extract data.
Lesson 605Blind Command Injection TechniquesLesson 606Out-of-Band Data ExfiltrationLesson 611Command Injection Testing and Detection
Blind IDOR
is trickier: the application doesn't give you direct feedback about whether you accessed someone else's data.
Lesson 820Blind IDOR and Indirect Object References
Blind SQL injection
occurs when the application is vulnerable but shows no direct output—no error messages, no database records, nothing.
Lesson 568Blind SQL Injection FundamentalsLesson 574Blind SQL Injection Fundamentals
Blind SSRF
is trickier—the server makes the request you specify, but you never see the response.
Lesson 888Blind SSRF Detection and ExploitationLesson 893Testing for SSRF Vulnerabilities
Blinding
The message owner applies a random blinding factor to transform the message
Lesson 233Blind Signatures and Anonymous Credentials
Block and remove
old endpoints only after safe migration period
Lesson 1038API Versioning and Deprecation
Block Chaining
Before encrypting each plaintext block, CBC XORs it with the *previous ciphertext block*.
Lesson 96CBC Mode: Chaining Blocks for Security
block cipher
is a symmetric encryption algorithm that processes data in fixed-size chunks called "blocks" (commonly 128 bits or 16 bytes).
Lesson 85Block Cipher Fundamentals and StructureLesson 92Block Size and Security Implications
Block Public Access
A safety feature that overrides other settings to prevent accidental public exposure.
Lesson 1782S3 Bucket Security FundamentalsLesson 1783Blocking Public Access and Bucket Misconfiguration
Block public bucket policies
– Prevents policies with public principal statements
Lesson 1783Blocking Public Access and Bucket Misconfiguration
Block Storage
(like AWS EBS, Azure Disks) provides raw storage volumes attached to virtual machines.
Lesson 1781Cloud Storage Service Models and Security Responsibilities
Block-oriented modes
like XTS for disk encryption still operate on fixed block boundaries, though disk sectors naturally align to block sizes.
Lesson 114Padding in Authenticated Encryption Modes
Blockchain transactions
Cryptocurrencies use signatures to authorize payments
Lesson 225Digital Signature Fundamentals and Use Cases
Blocked inbound connections
(external threats probing your system)
Lesson 1589Firewall Logging and Monitoring
Blocked outbound connections
(compromised applications or malware trying to phone home)
Lesson 1589Firewall Logging and Monitoring
Blocking or replaying
specific handshake messages (particularly Message 3 of the 4-way handshake)
Lesson 528KRACK Attack on WPA2
Blocklisting
(the traditional approach):
Lesson 1591Application Allowlisting Fundamentals
Blocks deployments
if configured with policies (e.
Lesson 1636Registry-Integrated Scanning
BloodHound
visualizes these relationships as a graph, automatically finding paths an attacker could follow to reach high-value targets like Domain Admins.
Lesson 2240BloodHound for Active Directory Attack Paths
BloodHound GUI
imports the collected data and uses graph theory to analyze relationships.
Lesson 2240BloodHound for Active Directory Attack Paths
Blowfish
(1993) uses a 64-bit block size with variable key lengths up to 448 bits.
Lesson 93Alternative Block Ciphers: Blowfish, Twofish, Serpent
Blue team
"Our EDR flagged it, but the SIEM rule missed it due to log filtering"
Lesson 2173Detection Engineering and Testing
Blue Teams
Build precise detections for specific attack variants
Lesson 2179Techniques and Sub-techniques
Bluebugging
is the most severe attack—full device takeover.
Lesson 558Bluetooth Attacks: Bluejacking, Bluesnarfing, and Bluebugging
Bluejacking
is the unauthorized sending of unsolicited messages (contacts, notes, or images) to nearby Bluetooth devices.
Lesson 558Bluetooth Attacks: Bluejacking, Bluesnarfing, and Bluebugging
Blueprints
package multiple governance artifacts together—policies, role assignments, ARM templates, and resource groups—into a **repeatable deployment**.
Lesson 1989Azure Policy and Blueprints
Bluesnarfing
is a serious data theft attack where an attacker connects to a vulnerable device without authorization and extracts sensitive information—contacts, calendars, text messages, photos, or even emails.
Lesson 558Bluetooth Attacks: Bluejacking, Bluesnarfing, and Bluebugging
Bluetooth Low Energy (BLE)
uses a simplified stack designed for low-power devices like fitness trackers, but follows the same layered concept.
Lesson 555Bluetooth Architecture and Security Model
Bob
multiplies the generator point by his private key: `Public_B = private_B × G`
Lesson 165ECDH (Elliptic Curve Diffie-Hellman)
Bob → Eve
Bob responds with his public value, thinking it's for Alice
Lesson 156Man-in-the-Middle Attacks on Diffie-Hellman
Bob measures randomly
He picks a measurement basis for each photon (might match Alice's, might not)
Lesson 279QKD Fundamentals and BB84 Protocol
BOLA
(which checks if you can access *specific objects*), this vulnerability lets users execute *actions* they shouldn't be allowed to perform at all.
Lesson 1031API5:2023 - Broken Function Level Authorization
Boot ROM
(immutable code burned into the processor during manufacturing).
Lesson 2702Secure Boot and Code Signing
Bootkit infections
are a particularly dangerous variant.
Lesson 2765Firmware Backdoors and Persistent Threats
Bootkit techniques
infect the Master Boot Record (MBR) or UEFI boot loader, executing malicious code before the operating system loads.
Lesson 1544Boot and Kernel-Level Persistence
Bootkits
are malware that infects the boot process itself, executing before the operating system loads.
Lesson 1463UEFI Firmware Attacks and VulnerabilitiesLesson 1546Rootkit Definition and Classification
Bootloader modifications
that execute malicious code at startup
Lesson 2765Firmware Backdoors and Persistent Threats
Bootstrap provisioning
Device uses a temporary master key to securely receive its unique PSK on first connection.
Lesson 2791Pre-Shared Key Authentication for IoT
Botnet agent
Turns system into remotely-controlled zombie
Lesson 1518Malware Taxonomy and Classification Criteria
Botnet recruitment
for DDoS attacks (remember Mirai?
Lesson 2753Consumer IoT vs Industrial IoT Threats
Bots (zombies)
Infected devices awaiting orders
Lesson 2798IoT Botnet Architecture and Formation
Bounds checking
Swift and modern APIs prevent many buffer overflows
Lesson 2709iOS Binary Protections and Runtime Security
Bounty pricing
balances attracting quality submissions with sustainable program economics.
Lesson 2482Bounty Pricing and Reward Structures
Bracketing
Offering a range to narrow down specifics.
Lesson 2267Elicitation Techniques and Information Gathering
Branch office connectivity
Connecting regional offices to headquarters
Lesson 468Site-to-Site VPNs
Branch Protection Rules
act like a vault door for your main branches.
Lesson 3003Version Control Security for IaC
Branches
represent alternative attack paths
Lesson 2641Architecture-Level Attack Trees
Breach notification
BAs must report breaches to the covered entity
Lesson 2587Business Associate Agreements and Liability
Breach Readiness
Score your organization's ability to detect, respond, and recover from incidents.
Lesson 3042Executive Security Reporting
Break digital signatures
Find a message that matches a signature's expected hash
Lesson 199Preimage ResistanceLesson 201Collision Resistance
Breaking change detection
before merging updates
Lesson 1399Dependency and SCA Scanning in Pipelines
Breaking conditional logic
Clobbered variables may evaluate differently than expected (objects are truthy!
Lesson 679DOM Clobbering Attacks
Breaking forwarding scenarios
Strict SPF combined with `p=reject` can cause forwarded emails to fail.
Lesson 2304Email Authentication Best Practices and Common Pitfalls
Bridge relays
Unlisted relays that help users bypass censorship
Lesson 2983Tor Network Architecture
Broad coverage
Test multiple systems, applications, and attack vectors
Lesson 2171Adversary Emulation vs Penetration Testing
Broadcast a stronger signal
than the legitimate AP, causing devices to automatically prefer the fake network
Lesson 534Evil Twin Attacks: Mechanics and Execution
Broadcasting
your evil twin with stronger signal or better positioning
Lesson 535Evil Twin Attack Techniques and Tools
Broader access scope
Multiple users and services can inspect configurations
Lesson 1321Environment Variables in Container and Cloud Platforms
Broader attack surface
An attacker who steals the key can impersonate any subdomain covered by the wildcard.
Lesson 175Subject Alternative Names and Wildcard Certificates
Broader organization
Intranet posts, all-hands notifications
Lesson 2426Stakeholder Communication During Incidents
Broken authentication
Testing JWT validation, token expiration, session management
Lesson 3013API Security Testing Automation
Broken authorization
Field-level permissions must be checked individually
Lesson 999GraphQL Architecture and Security Implications
Broken Object Level Authorization
(the previous lesson) deals with accessing specific data objects, this vulnerability is about accessing administrative or privileged *functions* themselves.
Lesson 992Broken Function Level AuthorizationLesson 1029API3:2023 - Broken Object Property Level Authorization
Broken Object-Level Authorization (BOLA)
occurs when an API doesn't verify that the authenticated user has permission to access *the specific object* they're requesting.
Lesson 1018Broken Object-Level Authorization (BOLA)
Broken offline functionality
when eviction happens mid-session
Lesson 1079Storage Quota and Eviction Policies
Browser → Server
Form submissions, HTTP headers, cookies
Lesson 1149Trust Boundaries and Data Flow
Browser automatically includes cookies
– The legitimate session cookie rides along with the forged request
Lesson 847CSRF Attack Anatomy and Prerequisites
Browser cache
Stored locally on your device
Lesson 1115Web Cache Fundamentals and Architecture
Browser receives the response
and immediately executes the embedded script
Lesson 630Reflected XSS: Immediate Execution
Browser session hijacking
Stealing authentication cookies to impersonate users
Lesson 1523Spyware and Information Stealers
Browser Verification
Modern browsers check for valid SCTs during certificate validation
Lesson 189Certificate Transparency Logs Verification
Browser Vulnerabilities
Implementation bugs may allow bypasses.
Lesson 1137Frame Busting and Its Limitations
Browser-based attacks
leverage malicious JavaScript, drive-by downloads, or exploit kits that detect browser plugin vulnerabilities (Flash, Java, outdated browsers).
Lesson 2116Client-Side Exploitation Techniques
Brute-force attack
Systematically try all possible key combinations of increasing length
Lesson 789Weak Secret Keys and Brute ForceLesson 2229Brute-Force and Mask Attacks
Brute-force mode
(mode 3) uses masks like `?
Lesson 2230Hashcat Deep Dive
Brute-force preimage attack
You'd need roughly 2^n attempts to find an input matching a specific hash
Lesson 202The Birthday Paradox and Collision Probability
Brute-Force Testing
Attackers send thousands of requests with different session token values, checking which ones return authenticated responses instead of login redirects.
Lesson 720Session Token Brute-Force and Enumeration
Brute-Forcing
Short, predictable codes (like `SAVE10`, `WELCOME2024`) can be guessed.
Lesson 922Coupon and Discount Code AbuseLesson 2754IoT Botnets: Mirai and Beyond
Bucket Ownership Controls
Determines who owns objects uploaded to your bucket, critical for preventing cross-account permission escalation.
Lesson 1782S3 Bucket Security Fundamentals
Bucket policies
that deny `PutObject` requests without encryption headers
Lesson 1790Storage Service Encryption Integration
Budget constraints
make the ideal solution unaffordable
Lesson 26Compensating Controls
Budget exhaustion
Teams often burn through privacy budgets faster than expected when answering multiple similar queries.
Lesson 2921Practical Differential Privacy Implementation
Buffer overflows
reveal themselves when oversized inputs crash the program or overwrite adjacent memory
Lesson 2102Fuzzing for Crash and Memory BugsLesson 2729Native Code Analysis and ARM Assembly
Buffer-unsafe functions
like `strcpy()`, `strcat()`, `gets()`, and `sprintf()` don't check if the destination buffer is large enough.
Lesson 1226Understanding Dangerous Functions and Their Risks
Bugcrowd
emphasizes crowd-sourced security across the full attack surface, not just vulnerabilities.
Lesson 2480Bug Bounty Platform Ecosystem
Build Dynamic Inventories
Query all resources by tag combinations.
Lesson 2001Tag-Based Resource Inventory and Discovery
Build gates
Prevent artifact creation from vulnerable code
Lesson 2063Release Gating Fundamentals
Build inconsistencies
between development, testing, and production
Lesson 1263Dependency Lock Files and Reproducible Builds
Build Log Exposure
is the primary danger.
Lesson 1323Environment Variables in CI/CD Pipelines
Build Phase
– Layers are added via Dockerfile instructions, dependencies installed, code compiled.
Lesson 1642Container Image Supply Chain Overview
Build stage
SAST tools analyze source code before compilation
Lesson 1395Security Testing in CI/CD Fundamentals
Build the system
Each query creates one equation with the unknown weights.
Lesson 2829Equation-Solving Attacks on Linear Models
Build time
SAST, dependency scanning, container image scanning
Lesson 2057Continuous Security IntegrationLesson 3029Container Image Scanning
Build tools
`autoconf`, `cmake`, `pkg-config`
Lesson 1408Removing Unnecessary Software Packages
Build Your Attack Path
Map out a sequence of techniques across the tactics (Initial Access → Execution → Persistence → Privilege Escalation → Defense Evasion → Credential Access → Discovery → Lateral Movement → Collection → Exfiltration).
Lesson 2182ATT&CK for Red Team Planning
Build-time accuracy
The SBOM reflects the precise dependencies resolved during that specific build
Lesson 1283Continuous SBOM Generation in CI/CD
Build-time injection
means embedding secrets into your application package, container image, or compiled binary before deployment.
Lesson 1335Runtime Secret Injection Patterns
Builds a dependency tree
, including transitive dependencies
Lesson 3028Dependency Scanning and SCA
Built-in Controllers
like `PodSecurityAdmission` automatically enforce Pod Security Standards you've already learned about.
Lesson 1670Admission Controllers and Webhooks
Built-In Forensics Tools
Cloud providers offer snapshot capabilities, memory dumps, and disk imaging features that integrate with storage services.
Lesson 1905Cloud-Native IR Tools and APIs
Built-in updaters
that run independently (Adobe, Chrome)
Lesson 1606Third-Party Application Patching
Built-in validation
Type mismatches are caught automatically
Lesson 1191Alternative Serialization Formats
Bulk operations
Execute the same post-exploitation module across multiple sessions
Lesson 2201Automation with Resource Scripts
Bullet cameras
are obvious deterrents for outdoor perimeters.
Lesson 2284Video Surveillance and Monitoring
Bulletproof Hosting
Paid services in lenient jurisdictions that ignore takedown requests, keeping phishing pages alive longer.
Lesson 2256Credential Harvesting Pages
Bumping
Using a specially cut "bump key" that matches the keyway, an attacker strikes the key while applying rotational tension.
Lesson 2273Lock Picking and Bypass Techniques
Buried history
Git commits, backup archives, log files, audit trails
Lesson 1315Secret Sprawl and Discovery Challenges
Burp Suite
or **OWASP ZAP** between your browser and the application.
Lesson 943Proxy-Based Business Logic Testing
Burp Suite Enterprise
, **Postman's security testing**, and specialized solutions like **42Crunch** or **StackHawk**.
Lesson 3013API Security Testing Automation
Burp Suite extensions
NoSQL Scanner, JSON injector plugins
Lesson 601Detecting and Testing for NoSQL Injection
Burp Suite's Intruder
or command injection-specific scanners can systematically test hundreds of payloads against target parameters.
Lesson 611Command Injection Testing and Detection
Burp Suite's Turbo Intruder
is the most popular tool for this.
Lesson 906Exploiting Race Conditions with Concurrent Requests
Burp's Active Scanner
and **OWASP ZAP** can detect common patterns.
Lesson 627Testing for XXE Vulnerabilities
Business Associate Agreement (BAA)
is a legally required contract between a HIPAA-covered entity (like a hospital) and any third-party vendor that will access, store, or process Protected Health Information (PHI) on their behalf.
Lesson 2587Business Associate Agreements and Liability
Business Associate Agreements (BAAs)
with cloud providers.
Lesson 1984Industry-Specific Cloud Compliance
Business Context Analysis
What does this system do?
Lesson 2028Security Requirements Elicitation
Business Criticality
A critical vulnerability on your public-facing payment server trumps the same vulnerability on an isolated test system.
Lesson 1602Vulnerability Assessment and PrioritizationLesson 2362Incident Severity and Priority Classification
Business invariants
Is the discount percentage within allowed limits for this customer tier?
Lesson 1154Semantic and Business Logic Validation
Business logic check
Date falls within the booking window (not more than 11 months ahead)
Lesson 1154Semantic and Business Logic Validation
Business logic validation
– ensures semantic correctness (e.
Lesson 1209Defense in Depth Through Layered Validation
Business requirements
demand exceptions to security policies
Lesson 26Compensating Controls
Business Risk
Could this lead to data breaches, compliance violations, or financial loss?
Lesson 837Documenting and Reporting Authorization Flaws
Business rule violations
Challenge assumptions about quantity limits, price calculations, refund policies, or access controls.
Lesson 2103Logic Flaw and Business Logic Testing
Business Rules
The logic governing what's allowed (e.
Lesson 937Mapping Business Workflows
Business-Aligned Metrics
Translate security into business terms:
Lesson 3042Executive Security Reporting
Business-critical systems
requiring extensive testing before patching
Lesson 2463What Are Compensating Controls
Bypass authentication
Hook login functions to always return "success"
Lesson 2726Dynamic Analysis and Runtime InstrumentationLesson 2774Fault Injection Attacks
Bypass redemption limits
meant to prevent abuse
Lesson 922Coupon and Discount Code Abuse
Bypass resilience
If one proxy is blocked, you can reroute through others
Lesson 2994Proxy Chains and SOCKS
Bypass restrictive firewalls
Reach services blocked by network policies
Lesson 500Local Port Forwarding (-L)
Bypass risk
| Users can accidentally overshare | Policy violations impossible |
Lesson 1450MAC vs DAC: Fundamental Differences
Bypass risks
If authentication checks are duplicated in 20 places, one missed check creates a vulnerability
Lesson 1212Separation of Concerns for Security Boundaries
Bypass simple stateless firewalls
that don't track or reassemble fragmented traffic
Lesson 369Fragmentation and Packet Manipulation
Bypass time-based revocation
Make recently-issued Certificate Revocation Lists (CRLs) appear "in the future" and invalid
Lesson 188Time Validation and Clock Attacks
Bypass validation
– If validation logic only checks JSON but the server also accepts XML, send the attack payload as XML to evade detection
Lesson 997Content-Type and Accept Header Exploits
Bypassable
Attackers crafted polyglot payloads that evaded detection
Lesson 671X-XSS-Protection and Legacy Headers
Bypassed code signing
Unsigned or malicious code can run
Lesson 2708iOS Jailbreaking and Detection
Bypasses data sanitization
that only checks label consistency
Lesson 2820Clean-Label Poisoning Attacks
Bypassing
any weak authentication tied to static identifiers
Lesson 2777Hardware Cloning and Counterfeit Prevention
Bypassing allowlists
Injecting lookalike characters to pass validation while executing malicious payloads
Lesson 1164Homograph and Visual Spoofing Attacks
Bypassing firewalls
Accessing blocked services through an allowed SSH connection
Lesson 499SSH Tunneling Fundamentals
Bypassing geo-restrictions
VPNs let you appear to browse from different countries, accessing region-locked streaming content or websites blocked in your location.
Lesson 471VPN Use Case: Privacy and Anonymity
Bypassing keyword filters
Inserting ZWSP into SQL keywords (`SELECT`), command names, or restricted function calls.
Lesson 1172Zero-Width and Invisible Characters
Bypassing MAC-based access control
(weak authentication on networks)
Lesson 406MAC Address Spoofing and Duplication
Bypassing normal procedures
Requests to "skip the usual process just this once"
Lesson 2270Detecting and Resisting Manipulation Attempts
Bypassing steps
Attempt to skip workflow stages entirely—submit actions out of sequence or replay old state values.
Lesson 835Testing State-Based and Workflow Authorization
Bypassing Voice Biometrics
Defeating voice-based authentication systems at banks or customer service portals
Lesson 2865Audio Deepfakes and Voice Cloning Attacks
Byte sequences
in packet payloads (e.
Lesson 456Signature-Based Detection Fundamentals

C

C (Country)
Two-letter country code (`US`, `GB`, `JP`)
Lesson 172Certificate Fields: Subject and Issuer Distinguished Names
C/C++
demand sophisticated pointer analysis and memory tracking to detect buffer overflows and use- after-free bugs.
Lesson 1364Language-Specific SAST Considerations
C++ projects
Always use `std::string` and avoid C-style character arrays
Lesson 1228Safe String Handling Alternatives
C2 servers
Issue DDoS or spam commands
Lesson 2798IoT Botnet Architecture and Formation
CA
(Assessment, Authorization, and Monitoring)
Lesson 2611NIST 800-53 Security Controls
CA certificate
would have `keyCertSign` and `cRLSign`.
Lesson 174Certificate Extensions: Basic Constraints and Key Usage
CA flag
A boolean (true/false) indicating whether this is a CA certificate
Lesson 174Certificate Extensions: Basic Constraints and Key Usage
CA-issued certificate
is like a passport issued by your government—everyone trusts it because a recognized authority verified your identity.
Lesson 178Self-Signed Certificates vs CA-Issued Certificates
CA's digital signature
to prevent tampering
Lesson 191Certificate Revocation Lists (CRLs)
Cache API
provides persistent storage that service workers use to cache responses—like HTML pages, images, or API results—so your app works even without internet.
Lesson 1076Cache API and Service Worker Storage
Cache behavior
CPU cache patterns exposed data about password processing
Lesson 522WPA3 Vulnerabilities and Dragonblood
Cache bypass patterns
(attackers attempting to exhaust origin resources)
Lesson 1868CDN Monitoring and Incident Response
Cache deception
Tricking the CDN into caching sensitive content (e.
Lesson 1865CDN Cache Security and Cache Poisoning
Cache Key Design
is your first line of defense.
Lesson 1122Cache Configuration Security
Cache partitioning
Isolate pushed resources by origin to prevent cross-origin contamination
Lesson 1100HTTP/2 Server Push Security Risks
Cache Poisoning
If a cache uses only the URL path as a key (not the Host), an attacker can inject `Host: evil.
Lesson 1125Host Header Injection VulnerabilitiesLesson 1862CDN Architecture and Threat Model
Cache sees `.css` extension
, stores the response as public static content
Lesson 1118Web Cache Deception Attacks
Cache strategically
Only keep secrets in memory as long as absolutely necessary.
Lesson 1341Secret Caching and Memory ManagementLesson 1799Performance Impact of Database Encryption
Cache-Control Headers
govern caching behavior:
Lesson 1122Cache Configuration Security
Cached credentials
Store and reuse tokens until near-expiration, then fetch new ones
Lesson 1731Session Duration and Token LifecycleLesson 2135Windows Credential Dumping Techniques
Cached file contents
that may no longer exist on disk
Lesson 2396Registry and File System in Memory
Cached File Data
Windows caches file contents in memory.
Lesson 2396Registry and File System in Memory
Cached permissions
"This user was authorized at login, so skip the check now"
Lesson 2629Complete Mediation
Caching scan results
means storing outcomes from unchanged code or dependencies.
Lesson 3035Performance Optimization for Security Scans
Calculate offsets
Compare timestamps of correlated events (like a TCP handshake seen on both firewall and server) to determine per-system skew
Lesson 2418Time Source Synchronization and Clock Skew
Calculate risk scores
Run your FAIR analysis, ALE calculation, or Monte Carlo simulation using these threat-specific inputs
Lesson 2514Threat Modeling Integration with Risk Analysis
California SB-327
(enacted 2020) was one of the first U.
Lesson 2758IoT Regulatory Landscape and Security Standards
Call any JavaScript functions
already loaded on the page
Lesson 634JavaScript Execution Contexts in XSS
Call to action
directing victims to click links, open attachments, or reply with credentials
Lesson 2253Email-Based Phishing Fundamentals
Callback manipulation
Attackers might manipulate callback names to execute arbitrary code
Lesson 1061Bypassing SOP with JSONP
Caller ID spoofing
Making calls appear to originate from legitimate organizations (banks, IT departments, IRS)
Lesson 2259Smishing and Vishing
CAM table
(Content Addressable Memory) — essentially a phone book mapping MAC addresses to physical switch ports.
Lesson 403MAC Flooding Attacks
Camera artifacts
Lens distortion, auto-focus, compression
Lesson 2814Physical World Adversarial Examples
Camera-based surveillance
uses smartphones, hidden cameras, or binoculars to capture information from a distance.
Lesson 2276Shoulder Surfing and Visual Reconnaissance
Campaign Design
You create realistic scenarios—credential harvesters mimicking your company's login page, fake invoices with malicious attachments, or urgent messages from "IT support.
Lesson 2289Phishing Simulation Programs
Campaign timelines and motivations
Lesson 2337Threat Actors and Attribution
Can block builds
if high-severity issues are found
Lesson 3028Dependency Scanning and SCA
Canonicalization
means converting input to its simplest, standard representation before applying security checks.
Lesson 1166Defense: Canonical Form Validation StrategiesLesson 2041Input Validation and Output Encoding Review
canonicalize
the path first, which means converting it to its simplest, standardized form before checking if it's allowed.
Lesson 971Path Canonicalization and ValidationLesson 1160URL Encoding Attacks and Bypasses
Canonicalize first
Convert the path to its absolute, simplified form (resolving all `.
Lesson 971Path Canonicalization and Validation
Canonicalize paths first
, then check they're within your base directory
Lesson 1233File Path and Filesystem API Risks
Canvas
provides a commercial framework with unique zero-day exploits and proprietary tools.
Lesson 2216Exploitation Framework Landscape
CAP_SYS_ADMIN
Mount filesystems, load kernel modules
Lesson 2143Exploiting Capabilities for Escalation
CAP_SYS_PTRACE
Inject code into other processes
Lesson 2143Exploiting Capabilities for Escalation
Capability
What skills, tools, and resources do they have?
Lesson 54Creating Attacker Personas for Threat Models
Capacity Planning
Do you monitor resource utilization and scale proactively before performance degrades?
Lesson 2593Availability Criterion
Capitalization
"password" → "Password", "PASSWORD", "pAssWoRd"
Lesson 2228Rule-Based Attacks
CAPTCHA challenges
After 3-5 failures, require human verification instead of full lockout
Lesson 700Rate Limiting and Account Lockout PoliciesLesson 1859Bot Management and Detection
Capture all requests
during normal application use
Lesson 819Testing for IDOR Vulnerabilities
Capture credentials
when users log into websites (especially unencrypted HTTP)
Lesson 534Evil Twin Attacks: Mechanics and Execution
Capture diverse perspectives
Encourage the quiet voices.
Lesson 76Collaborative Threat Modeling Workshops
Capture legitimate requests
using User A's credentials
Lesson 1021Testing for BOLA Vulnerabilities
Capture metadata
– Document instance IDs, IP addresses, timestamps, and configurations
Lesson 1906Evidence Preservation in Cloud Environments
Capture retransmitted packets
with the same keystream
Lesson 516KRACK Attack and WPA2 Vulnerabilities
Capture traffic
with tools like Wireshark as it passes through your system
Lesson 400Session Hijacking via MITM
Captures
credentials when the user submits
Lesson 640Phishing via XSS Injection
Capturing
handshakes or credentials when victims reconnect
Lesson 535Evil Twin Attack Techniques and Tools
Cardholder Data (CHD)
is information that directly identifies a cardholder:
Lesson 2570Cardholder Data and Sensitive Authentication Data
Cardholder Data Environment (CDE)
a segregated zone where payment data lives.
Lesson 453Segmentation for Compliance
Cascade failures
A compromise in the shared mechanism affects all users simultaneously
Lesson 2670Least Common Mechanism
Cascading benefits
– Controls that reduce multiple risks simultaneously
Lesson 2523Risk Treatment Plans and Prioritization
Cascading failures
overloaded backend services crash, affecting other applications
Lesson 1956Concurrency Controls and Throttling
Case Management System
The centralized workspace where analysts track investigations, assign tasks, document findings, and collaborate.
Lesson 2326SOAR Architecture and Components
Case Manipulation
In some systems, mix uppercase/lowercase or use alternate command paths.
Lesson 608Filter Bypass and ObfuscationLesson 957File Extension Filtering and Bypass Techniques
Case sensitivity
whether capitalization matters
Lesson 459Writing Effective IDS/IPS Rules
Case variations
on case-insensitive filesystems (Windows)
Lesson 1165Filesystem Abstraction Layer Bypasses
CAT I (High)
Critical vulnerabilities that allow immediate system compromise or data breach.
Lesson 1417Interpreting and Prioritizing STIG Findings
CAT II (Medium)
Vulnerabilities that could lead to compromise but require additional conditions or access.
Lesson 1417Interpreting and Prioritizing STIG Findings
CAT III (Low)
Findings that represent best practices or defense-in-depth measures.
Lesson 1417Interpreting and Prioritizing STIG Findings
Catalog assets
Identify what valuable data or functionality exists at each point
Lesson 73Attack Surface Analysis
Catalog identifiers
Map every field in your dataset and classify each as direct identifier, indirect identifier, or safe attribute
Lesson 2903Direct Identifiers and Removal
Catch and sanitize exceptions
Implement global exception handlers that strip sensitive parameters from stack traces before they're logged or displayed.
Lesson 1354Preventing Secrets in Logs and Error Messages
Catch exceptions properly
and log details server-side only
Lesson 1210Fail Securely and Handle Errors Safely
Categories/compartments
(non-hierarchical): specific project names, departments, or need-to-know areas
Lesson 1451Security Labels and Clearances
Categorization
Agencies must categorize information systems by impact level (low, moderate, high) using FIPS 199 standards based on confidentiality, integrity, and availability risks.
Lesson 2615FISMA and Federal Compliance
Category consolidation
Remaining XXE risks merged into broader categories like **Server-Side Request Forgery (A10:2021)** and **Security Misconfiguration (A05:2021)**
Lesson 1202The Rise and Fall of XXE and XML Security
Category grouping
Cluster cookies by purpose ("Strictly Necessary," "Performance," "Marketing") rather than overwhelming users with individual vendor lists.
Lesson 2933Consent Management Systems and UI Patterns
Cause
Why the gap exists (root cause)
Lesson 2548Audit Findings and Risk Rating
CBC
needs **cryptographically random, unpredictable** IVs.
Lesson 132IV Requirements for Different Modes
CBC mode
specifically because modifying one ciphertext block predictably affects the next block's decryption through XOR operations.
Lesson 110Padding Oracle Attack FundamentalsLesson 122Why Authentication Matters in EncryptionLesson 135Deterministic IVs and Predictability Attacks
CBC-MAC
creates an authentication tag ensuring data hasn't been tampered with
Lesson 103CCM Mode: Counter with CBC-MAC
CBOR-encoded certificates
(RFC 9528): Binary format replacing verbose ASN.
Lesson 2792Certificate-Based Authentication in Constrained Devices
CCM
(from lessons 101-103) that verify integrity *before* attempting decryption.
Lesson 113Defending Against Padding Oracle AttacksLesson 128AES-CCM and Other AEAD Modes
CCM (Counter with CBC-MAC)
trades speed for simplicity.
Lesson 105Comparing Authenticated Encryption Modes
CCM mode
(Counter with CBC-MAC) uses CBC-MAC internally for authentication, which *does* require padding—but the authentication tag protects against tampering, preventing traditional padding oracle exploitation.
Lesson 114Padding in Authenticated Encryption ModesLesson 128AES-CCM and Other AEAD Modes
CDN ignores the header
for cache key purposes but forwards it to the origin
Lesson 1865CDN Cache Security and Cache Poisoning
CDN Logs
document requests served from edge locations, revealing geographic distribution patterns, cache hits/misses, and potential DDoS or scraping activity at the perimeter.
Lesson 1919Network Forensics in Cloud Environments
CDN redirectors
Leverage content delivery networks for legitimacy
Lesson 2223C2 Infrastructure Setup
CDN routing
The CDN reads the encrypted Host header and routes your request to the actual blocked site
Lesson 2995Domain Fronting and CDN Circumvention
CDN/Edge
Block malicious traffic early
Lesson 1858Rate Limiting and Traffic Shaping
CDN/load balancer
forwards encrypted blobs without decryption
Lesson 1775End-to-End Encryption Architectures
CEH (Certified Ethical Hacker)
Broader, vendor-neutral certification covering hacking concepts.
Lesson 2089Penetration Testing Career Paths
Celebrate reporters
Publicly recognize employees who report (with permission), even false positives.
Lesson 2291Reporting Mechanisms and Culture
Celebrate wins
Publicly recognize employees who correctly report threats
Lesson 2296Measuring and Improving Security Culture
Centralize inspection
Route internet-bound traffic through security VPCs with inspection appliances
Lesson 1844Connectivity Architecture Best Practices
Centralize securely
Store in a protected location separate from production systems
Lesson 2385Log Collection and Preservation
Centralize where possible
Deploy third-party patch management solutions (Microsoft Intune, WSUS with third-party catalogs, Ivanti, or similar) that extend beyond OS patches to handle Adobe, Java, browsers, and common business applications.
Lesson 1606Third-Party Application Patching
Centralized Authentication
The gateway verifies API keys, OAuth tokens, or JWTs before requests reach your backend.
Lesson 1043API Gateway and Defense PatternsLesson 1733Federation and Temporary Credentials
Centralized C2
All bots connect to a single server (easy to disrupt if discovered)
Lesson 1526Botnets and Command-and-Control
Centralized collection
Logs forwarded to protected SIEM or log management systems, not just stored locally
Lesson 2624Audit Trail Management
Centralized dashboards
showing alert volume, severity, and trends
Lesson 1808DLP Monitoring and Incident Response
Centralized log aggregation
prevents attackers from erasing local evidence
Lesson 2635Compromise Recording and Auditability
Centralized log management
solves this by funneling all logs to a dedicated collection point—like all rivers flowing to a single reservoir—where you can search, analyze, and correlate events from your entire infrastructure in one place.
Lesson 1483Centralized Log Management Architecture
Centralized Management
Managing secrets across dozens or hundreds of services using environment variables becomes an operational nightmare with no centralized visibility or control.
Lesson 1324When Environment Variables Are InsufficientLesson 1325Secret Stores vs Environment Variables
centralized policy management
so rules aren't scattered across codebases.
Lesson 802Choosing and Implementing Access ModelsLesson 3025Policy Governance and Distribution
Centralized services
A single security account auditing or managing resources across dozens of accounts
Lesson 1737Cross-Account Access Fundamentals
Centralized storage
Keys never leave the KMS boundary
Lesson 1797Key Management for Database Encryption
Centralized Visibility
Aggregate logs from all accounts and regions into a central SIEM.
Lesson 1912Multi-Account and Cross-Region IR
Certain
Strong evidence of a vulnerability
Lesson 2213Scanner Issue Analysis and Validation
Certificate and compliance validation
Verifying SOC 2 reports, ISO certifications, and other attestations remain current and valid
Lesson 2539Continuous Vendor Monitoring
Certificate Authority
Issues digital certificates for device authentication and encryption
Lesson 2742Mobile Device Management (MDM) Fundamentals
Certificate Authority (CA) bundle
Lesson 1778Database Connection Encryption
certificate chain
a linked sequence of certificates that proves the website's certificate was signed by someone you trust.
Lesson 181Certificate Chain Validation ProcessLesson 380TLS/SSL Traffic Analysis and Certificate Inspection
Certificate chain pinning
Pin an intermediate CA certificate for flexibility
Lesson 2737Mobile Network Security
Certificate compression
Stripping optional fields, using implicit trust anchors
Lesson 2792Certificate-Based Authentication in Constrained Devices
Certificate enrollment
you obtain a certificate from a Certificate Authority (CA) that binds your email address to your public key
Lesson 2958Email Encryption Fundamentals and S/MIME
Certificate expiration tracking
alerts you days before SSL certificates expire, preventing failed encryption requirements
Lesson 2622Continuous Compliance Monitoring
Certificate lifecycle
Renewal before expiry is critical—devices may lack real-time clocks or internet connectivity
Lesson 2792Certificate-Based Authentication in Constrained Devices
Certificate Management
Provision, manage, and automatically renew SSL/TLS certificates
Lesson 1329Azure Key VaultLesson 1864CDN SSL/TLS Configuration
Certificate metadata
Domain names, issuer, validity periods, and certificate chain
Lesson 2413TLS Traffic Analysis
Certificate or Asymmetric Key
Protects the DEK
Lesson 1793Transparent Data Encryption (TDE)
Certificate pinning
means your application explicitly checks that the server's certificate (or its public key) matches a specific, pre-approved value that you've "pinned" into your code.
Lesson 186Certificate Pinning TechniquesLesson 2737Mobile Network Security
Certificate Policy (CP)
is a high-level document that defines *what* security requirements must be met when issuing certificates.
Lesson 184Certificate Policy and Practice Statements
Certificate Practice Statement (CPS)
is a detailed document describing *how* the CA actually implements those policies.
Lesson 184Certificate Policy and Practice Statements
Certificate Problems
Expired certificates or mismatched Common Names (CN) will block connections.
Lesson 492Troubleshooting and Monitoring OpenVPN Connections
Certificate revocation
Compromised certificates can be immediately invalidated
Lesson 542EAP-TLS and Certificate-Based Authentication
Certificate Revocation List (CRL)
is basically a published blacklist of revoked certificates, signed by the CA that issued them.
Lesson 191Certificate Revocation Lists (CRLs)
Certificate Signing Request (CSR)
is a specially formatted message that an organization sends to a Certificate Authority (CA) when requesting a digital certificate.
Lesson 176Certificate Signing Requests (CSR)
Certificate substitution
solves this from an attacker's perspective: you act as a proxy, presenting a fake certificate to the victim while maintaining a separate legitimate connection to the real server.
Lesson 397SSL/TLS MITM with Certificate Substitution
Certificate transparency logging
Monitor CT logs for unauthorized certificate issuance
Lesson 1348API Key and Certificate Rotation
Certificate validation bypasses
An attacker controlling one domain on a shared IP can potentially intercept or influence traffic meant for another domain if the certificate's Subject Alternative Name (SAN) includes both.
Lesson 1101HTTP/2 Connection Coalescing Attacks
Certificate warnings
Browser alerts about untrusted or mismatched SSL/TLS certificates
Lesson 410Signs of Network Interception
Certificate-based
(PKI): Industry standard, uses X.
Lesson 487OpenVPN Cryptographic Configuration
Certificates and private keys
– cryptographic credentials for secure communication
Lesson 1310What Are Secrets and Why They Matter
Certification
Service provider acknowledges they understand CCPA restrictions
Lesson 2567Service Provider and Third-Party Contracts
CFB
When you need self-synchronization (streaming protocols, error-prone channels)
Lesson 100CFB and OFB Modes: Feedback Mechanisms
Chain types
nftables explicitly declares chain types (filter, route, nat), while iptables inferred them from table names.
Lesson 445Migrating from iptables to nftables
Challenge necessity
– can the purpose be achieved without it, or with less granular data?
Lesson 2896Data Collection Assessment
Challenge-Response
During login, the website sends a challenge to your key
Lesson 744Hardware Security Keys and FIDO U2F
Challenging assumptions
security experts probe "what if" scenarios to find edge cases
Lesson 2036Security Architecture Review
Change Control
Track and approve configuration modifications
Lesson 1617Configuration Management Fundamentals
Change Detection
The FIM system periodically recalculates hashes for monitored files.
Lesson 1500File Integrity Monitoring Fundamentals
Change HTTP methods
(GET to POST, POST to DELETE)
Lesson 2207Intercepting and Modifying HTTP Traffic
Change management
Document and assess security impact of system changes
Lesson 2599SOC 2 Reports and Continuous Compliance
Change parameter values
to test for injection flaws or logic bugs
Lesson 2207Intercepting and Modifying HTTP Traffic
Changed files
in the current build
Lesson 1353CI/CD Pipeline Secret Scanning
Channel overlap
Unusual channel usage patterns
Lesson 549Rogue AP Detection Techniques
Channel saturation
Too many access points competing for airtime
Lesson 551RF Spectrum Monitoring
Channel utilization
Percentage of airtime occupied (legitimate or not)
Lesson 551RF Spectrum Monitoring
Character masking
Replace digits with X's (e.
Lesson 2908Data Masking and Tokenization
Character omission
`requsts` instead of `requests`
Lesson 1287Typosquatting Attack Techniques
Character repetition
`requestss` or `reqquests`
Lesson 1287Typosquatting Attack Techniques
Character Set
Hexadecimal-only (0-9, a-f) suggests older algorithms like MD5 or SHA-1, while Base64 encoding indicates salted or modern schemes.
Lesson 2226Hash Identification and Analysis
Character transposition
`reqeusts` (swapped letters)
Lesson 1287Typosquatting Attack Techniques
Chargeback
means actually billing departments for their usage.
Lesson 2000Cost Allocation and Chargeback with Tags
Check against breach databases
instead of arbitrary rules
Lesson 695Password Length vs Complexity Trade-offs
Check authentication logs
for lateral movement patterns using compromised credentials
Lesson 2365Detection and Scoping Techniques
Check dependent services
can still access resources
Lesson 1349Rotation Testing and Rollback
Check expiration
(`exp` claim in JWT)
Lesson 1010Bearer Token Authentication for APIs
Check firewall rules
Verify both local and remote firewalls allow the tunnel ports
Lesson 506SSH Tunnel Persistence and Troubleshooting
Check for obfuscation
Tasks with cryptic names, encoded commands, or unusual binaries are red flags.
Lesson 1538Scheduled Tasks and Cron Jobs
Check for redundancy
Identify overlapping or contradictory rules
Lesson 435Rule Review and Maintenance
Check for symbolic links
that might redirect extraction elsewhere
Lesson 974ZIP Slip and Archive Extraction Attacks
Check if the x-coordinate
of the resulting point matches the `r` value in your signature
Lesson 164ECDSA (Elliptic Curve Digital Signature Algorithm)
Check package signatures
against trusted public keys
Lesson 1301Automated Package Verification Workflows
Check Phase
Application validates a condition (e.
Lesson 902Time-of-Check to Time-of-Use (TOCTOU) Vulnerabilities
Check signatures
Use cryptographically signed model artifacts (building on lesson 2874's signing concepts)
Lesson 2877Malicious Pre-trained Models
Check the context
– Is the flagged service actually running?
Lesson 1614False Positive Management
Check the timestamp
– Does it align with maintenance windows or automated tasks?
Lesson 1504FIM Alert Analysis and Response
Checkov
is a comprehensive, policy-as-code scanner supporting Terraform, CloudFormation, Kubernetes, Dockerfile, and more.
Lesson 3000IaC Security Scanning Tools and Static Analysis
Checks vulnerability databases
for known CVEs
Lesson 1399Dependency and SCA Scanning in Pipelines
Chef
use agent software installed on each endpoint that periodically "pulls" the desired configuration from a master server and enforces it locally.
Lesson 1619Configuration Management Tools
China's quantum backbone
Over 2,000km connecting Beijing and Shanghai
Lesson 283QKD Networks and Practical Deployment
Chinese Remainder Theorem (CRT)
Speeds up RSA decryption by ~4x using mathematical shortcuts
Lesson 150RSA Performance and Hybrid Cryptosystems
Chinese Wall Model
prevents this by dynamically blocking access based on what you've already seen.
Lesson 18Chinese Wall Model: Conflict of Interest Prevention
Chisel
is a fast TCP/UDP tunnel transported over HTTP, secured via SSH.
Lesson 2242Chisel and Ligolo for Reverse Tunneling
Choose a threshold
`k` — the minimum shares needed to reconstruct
Lesson 263Shamir's Secret Sharing and Polynomial Interpolation
Chrome
announced plans to phase them out (with delays)
Lesson 728Third-Party Cookies and Privacy
CI pipeline stage
Block merges if secrets are detected
Lesson 3031Secret Detection in Pipelines
CI/CD Integration
Write scripts that accept URLs and parameters as command-line arguments, return clear exit codes (0 for pass, non-zero for vulnerabilities found), and output machine-readable formats like JSON.
Lesson 593Custom SQL Injection Automation ScriptsLesson 2013Secrets in IaC: Detection and Prevention
CI/CD pipeline
(server-side), providing multiple safety layers.
Lesson 2050Secret Detection in Commits
CI/CD Pipeline Integration
is where SCA tools shine.
Lesson 1273SCA Tool Integration and Configuration
CI/CD Pipeline Placement
runs comprehensive SAST scans on every pull request or merge.
Lesson 1365Integrating SAST into Development Workflow
CI/CD pipeline secret scanning
acts as your automated gatekeeper—every code change must pass through the build pipeline, making it the perfect enforcement point.
Lesson 1256CI/CD Pipeline Secret ScanningLesson 1351Pre-commit Hooks for Secret PreventionLesson 1353CI/CD Pipeline Secret Scanning
CI/CD short runs
Run fuzzers for 5-10 minutes per commit to catch obvious regressions
Lesson 1394Continuous Fuzzing and Integration
CI/CD test stages
Agents activate during automated integration or functional tests
Lesson 1382IAST Deployment Models and Performance Impact
Cipher Feedback (CFB)
and **Output Feedback (OFB)** modes transform block ciphers into stream ciphers using feedback loops, but they differ in *what* gets fed back and how errors propagate.
Lesson 100CFB and OFB Modes: Feedback Mechanisms
Cipher negotiation errors
Client-server crypto mismatches
Lesson 492Troubleshooting and Monitoring OpenVPN Connections
Cipher Selection
Weak ciphers like `arcfour`, `3des-cbc`, or `blowfish` are cryptographically broken or vulnerable.
Lesson 1446SSH Protocol Version and Cipher Selection
Cipher suite selection
determines encryption strength.
Lesson 1864CDN SSL/TLS Configuration
Cipher Suites
These are bundles of algorithms that handle encryption, authentication, and integrity checking.
Lesson 1773TLS/SSL in Cloud: Protocol Overview and Configuration
Circuit breaker pattern
Stop retrying if failures persist
Lesson 1334Secret Store Access Patterns
Circuit Construction
One party (the "garbler") converts the function into a circuit of logic gates
Lesson 258Garbled Circuits for Two-Party Computation
Circuit depth limits
Complex operations cause noise to accumulate beyond manageability
Lesson 253Performance Characteristics and Limitations
Circuit size
Complex functions require millions of gates, creating bandwidth overhead
Lesson 258Garbled Circuits for Two-Party Computation
CIS AWS Benchmark 2.1.5
"S3 bucket lacks encryption"
Lesson 3007IaC Compliance Frameworks and Benchmarks
CIS Benchmarks
and **DISA STIGs** provide pre-defined audit rule sets that capture the events most commonly exploited in attacks.
Lesson 1498Audit Rules for Security MonitoringLesson 2006Misconfiguration Detection TechniquesLesson 2007Compliance Benchmarks and Mapping
CIS-CAT (Configuration Assessment Tool)
is the official CIS tool that assesses systems against CIS Benchmarks.
Lesson 1415Benchmark Assessment and Scanning Tools
CL.TE
means the front-end uses `Content-Length`, but the back-end uses `Transfer-Encoding: chunked`.
Lesson 1106CL.TE and TE.CL Desync Techniques
Clark-Wilson Model
focuses on integrity in commercial environments—think banking, accounting, or any business where data must remain accurate and transactions must be valid.
Lesson 17Clark-Wilson Model: Commercial Integrity
Class filtering at runtime
Reject dangerous classes dynamically, even if developers missed validation
Lesson 1192Detecting and Preventing Deserialization Attacks
Class traversal
Navigate object hierarchies to reach dangerous classes
Lesson 1249SSTI Detection and Exploitation Techniques
Classic McEliece
system, a NIST post-quantum finalist, is a key encapsulation mechanism (KEM) based on the McEliece cryptosystem from 1978—making it one of the oldest post-quantum proposals still standing.
Lesson 272Code-Based Cryptography and Classic McEliece
Classification
groups assets by type: hardware, software, data, people, facilities, or services.
Lesson 2501Asset Identification and Valuation
Classification attributes
in IAM policies
Lesson 1801Data Classification Fundamentals
Classification level
(hierarchical): Unclassified < Confidential < Secret < Top Secret
Lesson 1451Security Labels and Clearances
Clause 5
ensures security isn't just an IT problem—it's a business imperative owned at the highest level.
Lesson 2603Leadership and Commitment (Clause 5)
Clean your artifacts
Remove default framework strings from binaries and scripts
Lesson 2222Framework Evasion Techniques
Clear client-side cookies
Send a response that removes the session cookie from the user's browser (set it to expire immediately).
Lesson 709Session Termination and Logout
Clear databases on logout
for sensitive applications
Lesson 1075IndexedDB Security Considerations
Clear documentation
that preemptively answers common questions
Lesson 2486Scaling and Optimizing Programs
Clear intent
Configuration explicitly documents intended network access patterns
Lesson 1436Network Service Binding
Clear justification
Document *why* the risk is acceptable (cost-benefit analysis, business necessity, low likelihood)
Lesson 2521Risk Acceptance and Documentation
Clear language
Replace legal jargon with plain explanations like "helps us understand which pages you visit" instead of "facilitates behavioral analytics.
Lesson 2933Consent Management Systems and UI Patterns
Clear privacy dashboards
showing what data exists, who accessed it, and when
Lesson 2886Visibility, Transparency, and User-Centricity
Clear scope
What systems are in/out of bounds
Lesson 2071Introduction to Bug Bounty Programs
Clearsigned Messages
Human-readable text messages with ASCII-armored signatures appended below.
Lesson 2960OpenPGP Message Format and Operations
Client
(photo app) asks the **Resource Owner** (you) for permission
Lesson 756OAuth 2.0 Overview and Roles
Client Associations
Wireless devices constantly communicate with their connected APs.
Lesson 355Wireless Network Topology Mapping
Client certificate authentication
for mutual TLS (strongest option for device identity)
Lesson 2781MQTT Security Architecture
Client Certificates
The most common approach for admin access.
Lesson 1663API Server Authentication Mechanisms
Client confidential data
(business information, vulnerabilities)
Lesson 2092Legal Agreements and Authorization
Client connects
to the wireless network and initiates 802.
Lesson 542EAP-TLS and Certificate-Based Authentication
Client control
Allow clients to refuse pushed resources using `RST_STREAM` frames
Lesson 1100HTTP/2 Server Push Security Risks
Client Credentials Flow
is for machine-to-machine communication where no user is involved.
Lesson 1011OAuth 2.0 Flows for API Access
Client Credentials Grant
is for machine-to-machine communication where no user is involved.
Lesson 757OAuth 2.0 Grant Types
Client encrypts data
using a key only the application server possesses (or derived through key exchange)
Lesson 1775End-to-End Encryption Architectures
Client isolation
(sometimes called "AP isolation" or "wireless isolation") prevents wireless clients connected to the same access point from communicating directly with each other.
Lesson 552Client Isolation and Network Segmentation
Client probing behavior
– devices broadcasting previous network names
Lesson 550Wireless Packet Capture and Analysis
Client sends request
During TLS handshake, the client contacts an OCSP responder (URL specified in the certificate's "Authority Information Access" extension)
Lesson 192Online Certificate Status Protocol (OCSP)
Client side
The request must set `credentials: 'include'` (in JavaScript fetch) or `withCredentials: true` (in XMLHttpRequest)
Lesson 877Credentials and CORS: Access-Control-Allow-Credentials
Client software
on your device authenticates you (username/password, certificate, or multi-factor authentication)
Lesson 467Remote Access VPNs
Client-side code inspection
revealing hidden endpoints
Lesson 1019Broken Function-Level Authorization
Client-side decryption
Recipients' devices receive the encrypted file and the key separately, decrypting locally
Lesson 2968End-to-End Encrypted File Sharing
client-side encryption
, you encrypt your data *before* it ever leaves your infrastructure and travels to the cloud.
Lesson 1766Client-Side Encryption for Cloud DataLesson 1799Performance Impact of Database EncryptionLesson 2968End-to-End Encrypted File Sharing
Client-Side HPP
occurs when polluted parameters are **reflected in URLs or embedded in the client's browser**, affecting JavaScript execution, client-side routing, or subsequent requests the browser makes.
Lesson 933Server-Side vs Client-Side HPP
Client-Side Session Data
Some applications store session data entirely in cookies (like JWTs without signatures or weakly signed tokens).
Lesson 827Session and Cookie Manipulation
Client-side validation
(browser JavaScript) — Quick feedback for users, but *never trusted* since attackers bypass it easily
Lesson 1152Validation Layers and Defense in DepthLesson 1209Defense in Depth Through Layered Validation
Clip gradients per example
Instead of computing one big gradient from the entire batch, calculate each training example's gradient separately and limit its magnitude (clip it).
Lesson 2841DP-SGD and Private Training Algorithms
Clock attacks
exploit systems with incorrect time settings.
Lesson 188Time Validation and Clock Attacks
Clock skew
is the difference between a system's recorded time and true time (typically UTC from an authoritative source).
Lesson 2418Time Source Synchronization and Clock Skew
Clock synchronization
Accurate timestamps across systems
Lesson 1490Log Management for Compliance
Clone devices
by copying cryptographic keys stored in unprotected memory
Lesson 2755Physical Security Threats to IoT Devices
Cloning
Once captured, the credential is written to a blank writable RFID card or tag.
Lesson 2274Badge Cloning and RFID AttacksLesson 2280Badge and Card-Based Access Systems
Close existing tags early
and inject new ones
Lesson 616XML Injection Fundamentals
Close the vulnerability permanently
.
Lesson 1762IAM Privilege Escalation Response
Closed port
Usually sends back an **ICMP port unreachable** message (the OS tells you "nothing is listening here")
Lesson 341UDP Scanning Techniques
Closing Attack Vectors
Patch the vulnerability or fix the misconfiguration that allowed initial access.
Lesson 2367Eradication: Removing the Threat Actor
Closure workflows
complete the loop.
Lesson 3049Integration with Ticketing and ITSM
Cloud Audit Logs
(GCP) to track credential usage and source IPs.
Lesson 1735Credential Theft and Token Security
Cloud backup
Some apps (Authy, Microsoft Authenticator) offer encrypted cloud backups.
Lesson 743Authenticator Apps and Seed ManagementLesson 2965Usability Challenges and Key Management UX
Cloud backups
Encrypted blob stored remotely, but the encryption key never leaves your devices or exists only in encrypted form
Lesson 2947E2EE Backup and Multi-Device
Cloud computation
Users outsource heavy computations on sensitive business data without trusting the cloud provider with plaintext.
Lesson 2924Homomorphic Encryption Applications
Cloud Coverage
Does the vendor support all your cloud providers (AWS, Azure, GCP) and services?
Lesson 2011CSPM Vendor Selection and Deployment
Cloud IAM roles
(AWS IAM, Azure Managed Identity, GCP Service Accounts)
Lesson 1342Access Control for Runtime Secret Retrieval
Cloud impact
While cloud providers have large bandwidth capacity, volumetric attacks can trigger massive egress charges (you pay for outbound traffic).
Lesson 1856DDoS Attack Types and Cloud Impacts
Cloud integration
Connecting on-premises infrastructure to cloud resources
Lesson 468Site-to-Site VPNs
Cloud Intelligence
Modern NGAV platforms leverage cloud connectivity to access massive threat databases, receive real-time updates, and submit suspicious files for instant analysis across global threat networks.
Lesson 1572Next-Generation Antivirus (NGAV)
Cloud metadata access
Retrieve AWS credentials from `http://169.
Lesson 621XXE Attack Types: SSRF via XXELesson 883SSRF Impact and Attack Scenarios
Cloud metadata endpoints
Requests to `169.
Lesson 900Monitoring and Detection of SSRF Attempts
Cloud metadata services
are the game-changer.
Lesson 1204Server-Side Request Forgery Enters the Top 10
Cloud Platform APIs
AWS ECS task definitions, Azure container configurations, and similar services store environment variable definitions in cloud APIs.
Lesson 1321Environment Variables in Container and Cloud Platforms
Cloud provider recommendations
(AWS Well-Architected, Azure Security Baseline)
Lesson 2006Misconfiguration Detection Techniques
Cloud provider tooling
AWS's EC2 snapshot analysis, Azure's Disk Export, GCP's persistent disk cloning
Lesson 1922Cloud Forensics Tools and Legal Considerations
Cloud security posture
(compliance drift, misconfigurations)
Lesson 3043Dashboard Tools and Integration
Cloud service logs
(like CloudTrail, Azure Activity Log, or GCP Cloud Audit Logs) record every API call made in your environment—who did what, when, and from where.
Lesson 1917Cloud Log Collection for Forensics
Cloud services
(AWS, Azure, Google Cloud, SaaS platforms) log API calls, configuration changes, and access patterns.
Lesson 2316Log Sources and Event Collection Methods
Cloud SIEM
is your security operations command center—it collects logs and events from all those sources you've been configuring (CloudTrail, VPC Flow Logs, application logs, etc.
Lesson 1878Cloud SIEM Architecture and Components
Cloud storage access
crosses from your controlled infrastructure into a third-party security domain
Lesson 2639Trust Boundary Analysis
Cloud VPCs
(Virtual Private Clouds) create isolated network segments in AWS, Azure, or GCP.
Lesson 426Virtual Firewalls and Cloud Architectures
Cloud-based and distributed cracking
solves this by spreading the workload across multiple high-powered machines, turning months of cracking time into hours.
Lesson 2234Cloud-Based and Distributed Cracking
Cloud-based redirectors
Disposable instances on AWS, Azure, or DigitalOcean
Lesson 2223C2 Infrastructure Setup
Cloud-native engines
like AWS Service Control Policies, Azure Policy, and GCP Organization Policy enforce rules at the platform level, complementing IaC validation.
Lesson 2015Policy as Code for IaC Validation
Cloud-native platforms
Cloud Custodian, Prowler, or ScoutSuite for configuration forensics
Lesson 1922Cloud Forensics Tools and Legal Considerations
Cloud-native policies
(AWS Config Rules, Azure Policy, GCP Organization Policy)
Lesson 1997Mandatory Tags for Security and Compliance
Cloud-native services
AWS Config Rules with automatic remediation actions, Azure Policy with `deployIfNotExists` effects
Lesson 3046Auto-Remediation for Infrastructure Drift
Cloud/Virtual
Environment-specific configurations
Lesson 1413CIS Benchmarks Overview and Structure
CloudTrail
(AWS), **Activity Logs** (Azure), or **Cloud Audit Logs** (GCP) to track credential usage and source IPs.
Lesson 1735Credential Theft and Token Security
CloudTrail (AWS)
is your audit trail for *who did what*.
Lesson 1880SIEM Data Sources in Cloud
CloudTrail API activity
showing unusual IAM role assumption
Lesson 1902Multi-Signal Correlation for Detection
CloudTrail Events
Monitors API activity for compromised credentials, unusual console logins, privilege escalation, and configuration changes
Lesson 1887AWS GuardDuty Fundamentals
CloudTrail/Activity Logging
Enable comprehensive API logging to capture every IAM action.
Lesson 1761Privilege Escalation Detection and Prevention
CloudTrail/Activity Logs
Track configuration changes that might weaken encryption (e.
Lesson 1780Transit Encryption Monitoring and Compliance
CloudWatch Logs
with flow log data showing internal IPs and traffic patterns
Lesson 1818VPC Deletion and Cleanup Security
ClusterFuzz
is the underlying infrastructure that powers OSS-Fuzz.
Lesson 1394Continuous Fuzzing and Integration
Clustering analysis
Group similar samples; isolated clusters may contain attacks
Lesson 2826Defense Strategies Against Poisoning
ClusterRoleBinding
grants a ClusterRole's permissions cluster-wide
Lesson 1664Role-Based Access Control (RBAC) Fundamentals
ClusterRoles
work across the entire cluster or for cluster-wide resources (like nodes).
Lesson 1664Role-Based Access Control (RBAC) Fundamentals
CMS/PKCS#7
is the standard for enterprise systems, email (S/MIME), and document signing.
Lesson 232Detached Signatures and Signature Formats
Cobalt Strike
is purpose-built for red team operations with advanced command-and-control (C2), malleable profiles for evasion, and collaboration features.
Lesson 2216Exploitation Framework LandscapeLesson 2217Metasploit vs. Alternative Frameworks
Code Challenge
The client hashes the verifier (typically with SHA-256) to create a "lock.
Lesson 759PKCE (Proof Key for Code Exchange)Lesson 1089Authorization Code Flow with PKCE for SPAs
Code deployment
A developer writes code, but a separate reviewer must approve it before production
Lesson 7Separation of Duties and Privilege SeparationLesson 2664Separation of Duties
Code deployment gates
Automated tests *and* peer review *and* security scan must all pass
Lesson 2631Separation of Privilege
Code execution
Invoke system functions through template syntax
Lesson 1249SSTI Detection and Exploitation Techniques
Code execution sandboxing
Run generated code in containerized environments with restricted permissions, network access, and resource limits
Lesson 2862LLM Output Validation and Sandboxing
Code Injection
Targets the application runtime (like PHP or JavaScript eval), executing application code
Lesson 602Command Injection FundamentalsLesson 2394Memory-Resident Malware Detection
Code Integrity Policies
define what code can run based on cryptographic signatures, file hashes, or publisher certificates.
Lesson 1594Windows Defender Application Control (WDAC)
Code manipulation
Malicious apps cannot modify another app's code or behavior
Lesson 2713Android Application Sandboxing
Code paths
actually executed during tests
Lesson 1378IAST Fundamentals and How It Works
Code pattern analysis
Does the program attempt to decrypt itself at runtime?
Lesson 1566Heuristic Analysis Techniques
Code Reuse
A "single-use" coupon code that isn't properly invalidated after redemption can be applied repeatedly, either by the same user or shared publicly.
Lesson 922Coupon and Discount Code Abuse
Code signing workflows
become critical: establish a trusted signing authority, integrate signing into build steps, and configure allowlist policies to trust that signing certificate rather than individual file hashes.
Lesson 1598Allowlisting in DevOps and CI/CD
Code Verifier
The client generates a random, unpredictable string (43-128 characters).
Lesson 759PKCE (Proof Key for Code Exchange)
Code Verifier Creation
Your SPA generates a random string called a `code_verifier` (43-128 characters, cryptographically random)
Lesson 1089Authorization Code Flow with PKCE for SPAs
Code-based cryptography
Relies on error-correcting codes and decoding problems.
Lesson 268Post-Quantum Cryptography Fundamentals
CodeBuild
Inject malicious build scripts that execute with the project's service role
Lesson 1757Service-Specific Escalation Vectors
Cognitive overload
developers and security teams can't hold the entire system in their heads
Lesson 2632Economy of Mechanism (Keep It Simple)Lesson 2965Usability Challenges and Key Management UX
Cold start
The platform provisions a fresh execution environment.
Lesson 1942Function Execution Context and Isolation
Cold start artifacts
sometimes leave temporary data in `/tmp` directories, but these disappear after warm containers recycle.
Lesson 1920Container and Serverless Forensics
Cold starts and timeouts
Can enable denial-of-wallet attacks
Lesson 1940Serverless Architecture and Security Implications
Cold/archive
Long-term retention (1-7 years) on cheaper storage or offline
Lesson 1484Log Rotation and Retention Policies
Collaboration
enables security and development teams to review changes together using pull requests
Lesson 2056Security as Code Fundamentals
Collaborative gap analysis
Both teams identify blind spots together
Lesson 2168Purple Team: Bridging Red and Blue
Collect comprehensively
Don't just grab obvious logs—capture load balancer logs, DNS query logs, authentication logs, and configuration change histories.
Lesson 1917Cloud Log Collection for Forensics
Collect only what's needed
for the specific purpose (data minimization built into forms and APIs)
Lesson 2883Privacy Embedded into Design
Collect timestamps
from all evidence sources you've gathered
Lesson 2417Timeline Construction Fundamentals
Collection Agents
run on each monitored system, gathering logs from local files, the systemd journal, or application outputs, then shipping them reliably to aggregators or directly to the central server.
Lesson 1483Centralized Log Management Architecture
Collection and Storage
Document *what* vulnerabilities exposed data without copying entire databases.
Lesson 2096Data Handling and Confidentiality
Collection Period
Gather data for 30–90 days minimum (avoiding holiday/incident anomalies)
Lesson 2348Baseline Establishment and Anomaly Detection
Collector server
Runs the Windows Event Collector service and defines subscriptions (which events to collect from which computers)
Lesson 1510Windows Event Forwarding (WEF) and Collection
Collector-initiated
Collector pulls logs from specified computers (simpler for small networks)
Lesson 1510Windows Event Forwarding (WEF) and Collection
Collectors
are distributed agents or forwarders deployed near data sources.
Lesson 2315SIEM Architecture: Collectors, Aggregators, and Storage
Collectors (SharpHound)
gather data from Active Directory about users, groups, computers, sessions, ACLs (Access Control Lists), and trust relationships.
Lesson 2240BloodHound for Active Directory Attack Paths
Collects personal information
from California residents
Lesson 2562CCPA Overview and Scope
Collects results
Captures findings in a structured format (JSON, XML)
Lesson 1401Dynamic Testing and DAST in Pipelines
Colliding key pairs
in certificate generation
Lesson 292Randomness in Virtual Environments
Collision resistance
takes this further: it must be impossibly hard to find *any pair* of different inputs—call them `input1` and `input2`—where `hash(input1) == hash(input2)`.
Lesson 201Collision ResistanceLesson 202The Birthday Paradox and Collision ProbabilityLesson 208MD5 and SHA-1: Broken Hash Functions
Colonial Pipeline (2021)
Ransomware forced shutdown of critical fuel infrastructure
Lesson 2805OT-Specific Threats and Attacks
Column count match
Your injected SELECT must return the same number of columns (covered in lesson 565)
Lesson 578Union-Based SQLi Data Extraction
Column-family stores
(Cassandra): Wide tables with flexible columns
Lesson 594NoSQL Database Fundamentals and Attack Surface
Column-level encryption
Higher overhead (10-25%) because queries can't use indexes on encrypted columns
Lesson 1799Performance Impact of Database Encryption
Combination mode
(mode 1) merges two wordlists.
Lesson 2230Hashcat Deep Dive
Combination rules
"password" → "P@ssw0rd2024!
Lesson 2228Rule-Based Attacks
Combine
hash and salt through a clever mathematical process involving mask generation functions
Lesson 148PSS: Probabilistic Signature SchemeLesson 164ECDSA (Elliptic Curve Digital Signature Algorithm)
Combine stealth scan types
(SYN + fragmentation + decoys)
Lesson 373Anti-Detection Best Practices
Combined
Rotate daily *or* at 500MB, whichever comes first
Lesson 1470Log Rotation and Retention
Combined factors
Often both—your fingerprint unlocks a cryptographic key stored on your phone
Lesson 750Passwordless Authentication Fundamentals
Command & Control
Can network monitoring spot unusual outbound connections?
Lesson 74Kill Chain Threat Modeling
Command and Control
Communicate with compromised systems
Lesson 2178Tactics: The Why Behind Adversary Actions
Command Chaining
If sudo allows commands that can execute others (like `find`, `vim`, `less`, `awk`), attackers escape to shells:
Lesson 2142Sudo Misconfigurations and Exploits
Command execution
`xp_cmdshell` in MSSQL runs Windows shell commands; `COPY PROGRAM` in PostgreSQL can invoke system utilities
Lesson 585File System and OS Command ExecutionLesson 3050ChatOps and Collaboration Integration
Command history
Recent commands executed by users or attackers
Lesson 2389Memory Forensics Fundamentals
Command History Clearing
Removing shell history files (`.
Lesson 2126Covering Tracks and Anti-Forensics
Command Substitution
Nest commands to hide intent:
Lesson 608Filter Bypass and Obfuscation
Command-and-control beaconing
Repeated connections to external IPs at regular intervals
Lesson 2410Network Flow Analysis
CommandLineEventConsumer
to execute commands directly—all without writing malicious files to disk.
Lesson 1541WMI Event Subscriptions
Comment-like behavior
Closing parentheses prematurely to ignore password checks
Lesson 612LDAP Injection Fundamentals
Commercial feeds
are subscription-based services that provide curated, high-fidelity threat data.
Lesson 2339Threat Intelligence Feeds and Sources
Commercial tools
like Tenable Nessus, Qualys, and Rapid7 offer broader scanning capabilities with benchmark assessment features.
Lesson 1415Benchmark Assessment and Scanning Tools
Commit time
Secret detection, basic linting
Lesson 2057Continuous Security Integration
Commit-time scanning
typically includes:
Lesson 1397Commit-Time Security Gates
Common Criteria (CC)
for international security evaluations
Lesson 2779Hardware Security Testing and Evaluation
Common exploitation patterns
Lesson 679DOM Clobbering Attacks
Common Language
It gives developers, security teams, and management a shared vocabulary
Lesson 1200History and Purpose of the OWASP Top 10
Common Name (CN)
The domain name or entity name (e.
Lesson 176Certificate Signing Requests (CSR)
Common passwords
("iloveyou", "letmein") appear in every dictionary wordlist
Lesson 696Brute Force and Dictionary Attacks
Common pitfall
Never store sensitive data in regular `SharedPreferences` or internal storage as plaintext.
Lesson 2720Android Secure Storage and Data Protection
Common Reference String (CRS)
essentially mathematical values that both the prover and verifier need to create and check zero- knowledge proofs.
Lesson 245Trusted Setup and Universal Reference Strings
Communication breakdowns
Were escalation paths followed?
Lesson 2369Lessons Learned and Process Improvement
Communication Channels
Establish out-of-band communication (not just cloud-native tools) since attackers may have compromised your cloud environment's messaging systems.
Lesson 1912Multi-Account and Cross-Region IR
Communication is Critical
Certificate authorities publish CRLs and operate Online Certificate Status Protocol (OCSP) responders to inform verifiers about revoked certificates in real-time.
Lesson 318Key Revocation and Compromise Response
Communication paths
How different parts of an organization connect
Lesson 353Gateway and Router Identification
Communication plans
and security awareness materials
Lesson 2607ISMS Documentation Requirements
Communication Platforms
keep the IR team, leadership, and external stakeholders synchronized.
Lesson 2373IR Tool Selection and Deployment
Communication templates
Status updates for stakeholders and customers
Lesson 1861DDoS Response and Incident ManagementLesson 2372IR Playbooks and Runbooks
Communications lead
manages stakeholder updates
Lesson 2492Incident Response Policy
Community images
are user-contributed—they might be convenient, but you're trusting unknown maintainers who may abandon them or include malicious code.
Lesson 1633Base Image Selection and Trust
Compact certificate profiles
Using minimal extensions, shorter validity periods, and compressed encodings
Lesson 2792Certificate-Based Authentication in Constrained Devices
Company websites
expose organizational structure, vendors, and technologies used
Lesson 2254Spear Phishing and Targeted Attacks
Company-specific
Employee names, product names, locations from OSINT
Lesson 2227Dictionary Attacks with Wordlists
Comparative benchmarks
against industry peers
Lesson 2533Communicating Metrics to Leadership
Compare
– Examine changed files against known-good baselines
Lesson 1504FIM Alert Analysis and Response
Compare SBOMs
between expected and actual dependencies
Lesson 1301Automated Package Verification Workflows
Compare scenarios
"Without controls: $2M annual loss.
Lesson 2516Risk Analysis Documentation and Communication
Compare to baseline
(random guessing = 50% accuracy)
Lesson 2845Privacy Auditing and Empirical Measurement
Comparer
highlights byte-level or word-level differences between two HTTP responses or requests.
Lesson 2215Advanced Burp Features and Workflows
Compares patterns
against what trained vs.
Lesson 2837Membership Inference Attacks
Comparing the result
to the stolen hash
Lesson 2225Password Cracking Fundamentals
Comparison
Scan results are matched against the policy requirements
Lesson 1621Compliance Scanning and Validation
Compatibility
Legacy systems may require SHA-1 (for non-security purposes only) or SHA-256
Lesson 216Hash Function Selection in Modern Systems
Compatibility checks
Do applications interact correctly after patching?
Lesson 1603Patch Testing and Staging
Compatibility risks
Business-critical plugins or integrations may break with updates.
Lesson 2460Third-Party and Application Patching
Compelling subject line
designed to trigger emotional response
Lesson 2253Email-Based Phishing Fundamentals
compensating control
is an alternative security measure that provides equivalent or comparable protection when the primary control isn't feasible.
Lesson 26Compensating ControlsLesson 2463What Are Compensating Controls
Competence records
proving security training
Lesson 2607ISMS Documentation Requirements
Compile
exploit on target (or matching system)
Lesson 2140Kernel Exploits for Privilege Escalation
Compile and deliver
within regulatory timeframes (typically 30 days)
Lesson 2935Right to Access and Data Portability
Compilers
`gcc`, `g++`, `clang`, `make`
Lesson 1408Removing Unnecessary Software Packages
Complete and unaltered
(full logs, not cherry-picked samples)
Lesson 2618Audit Evidence Types and Requirements
Complete browsing history
→ collect categories of interest
Lesson 2898Granular Data Collection
Complete fixes
that passed all validation tests
Lesson 2166Retest and Validation Process
Complete Protection
(`NSFileProtectionComplete`): Data accessible only when device is unlocked.
Lesson 2704Data Protection API and Keychain
Complete separation
between critical security parameters and operators
Lesson 1768Hardware Security Modules (HSMs) in Cloud
Completely breaks authentication
, allowing attackers to forge valid tags for arbitrary messages
Lesson 102GCM Implementation Pitfalls
Complex boolean logic
– Combine AND, OR, NOT operators with wildcards and regular expressions for precise hunting.
Lesson 2320SIEM Query Languages and Search
Complex processing
(images resized, documents parsed)
Lesson 945File Upload Attack Surface and Risk Assessment
Compliance
Many regulations (SOC 2, HIPAA, PCI-DSS) require proof that sensitive data access is monitored and traceable
Lesson 1316Audit Trails and Secret Access LoggingLesson 1682Container as a Service Security
Compliance and Audit
Regulatory frameworks (PCI-DSS, HIPAA, SOX) mandate logging specific events and retaining them for set periods.
Lesson 1466Introduction to System Logging
Compliance as Code
means writing your compliance requirements as actual code that can be executed, tested, and enforced automatically.
Lesson 2623Compliance as Code
Compliance audits
demanding proof of hardware separation
Lesson 1815Network Isolation with Dedicated Tenancy
Compliance boundaries are respected
Some data may not legally cross certain geographic boundaries
Lesson 1786Cross-Region Replication and Backup Strategies
Compliance by criticality
Track high-risk patches separately
Lesson 1607Patch Compliance Monitoring and Reporting
Compliance checking
compares a device's current state against your security policy:
Lesson 2678Device Trust and Endpoint Security
Compliance checks
– password policies, encryption status, audit configurations
Lesson 2436Authenticated Scanning and Credentialed Checks
Compliance dashboards
to monitor tagging coverage
Lesson 1997Mandatory Tags for Security and Compliance
Compliance enforcement
Ensure no one can bypass security controls, regardless of policy changes
Lesson 1707IAM Boundaries and Permission Guardrails
Compliance exposure
GDPR breach notification required within 72 hours
Lesson 2431Executive Summary and Business Impact
Compliance failures
when regulations require detailed access logs
Lesson 1966Insufficient Logging and Monitoring
Compliance gaps
Many regulations (PCI DSS, SOC 2) mandate regular credential rotation
Lesson 1343Secret Rotation Fundamentals
Compliance gates
Verify license compliance, security scan completion
Lesson 1403Pipeline Security and Release Gates
Compliance is impossible
Regulatory requirements cannot be met with the activity
Lesson 2518Risk Avoidance Decisions
Compliance issues
Default configurations rarely meet regulatory requirements for network isolation
Lesson 1813Default VPC Security Considerations
Compliance mode
is stricter—**no one**, not even the account owner, can delete or modify locked objects until retention expires.
Lesson 1787Object Lock and Immutable Storage
Compliance monitoring
rules that alert on unencrypted objects
Lesson 1790Storage Service Encryption Integration
Compliance officers
verify regulatory requirements
Lesson 2064Security Sign-Off and Approval Workflows
Compliance regulations
HIPAA requires 6 years, PCI-DSS mandates 1 year of audit logs, GDPR limits unnecessary retention
Lesson 1874Log Retention and Lifecycle Policies
Compliance Reporting Dashboards
aggregate findings from both sources, showing leadership where gaps exist and tracking trends over time.
Lesson 2496Policy Compliance Monitoring and Enforcement
Compliance responsibility mapping
is the process of determining which party (cloud provider or customer) is responsible for implementing and maintaining each control required by regulations like HIPAA, PCI-DSS, SOC 2, or GDPR.
Lesson 1691Compliance Responsibility Mapping
Compliance risk
Regulators scrutinize unnecessary precision
Lesson 2898Granular Data Collection
Compliance Rule Deviations
Detect when resources fall out of compliance with security standards—encryption disabled on a bucket, logging turned off, or MFA removed from privileged accounts.
Lesson 2026Drift Detection for Security Policies and Permissions
Compliance scanning
automates the process of checking whether systems adhere to defined security standards and regulatory frameworks.
Lesson 1621Compliance Scanning and Validation
Compliance Scanning and Validation
(the previous lesson) detects **Configuration Drift** — like an unauthorized service running or a weak password policy — you have two choices: fix it manually or automate the correction.
Lesson 1622Remediation and Enforcement
Compliance scans
(targeted): Check specific regulatory requirements (PCI-DSS, HIPAA)
Lesson 2440Scan Configuration and Optimization
Compliance scope identification
Quickly find all resources subject to HIPAA or PCI DSS (`ComplianceScope=HIPAA`)
Lesson 1996Cloud Resource Tagging Strategy and Standards
Compliance Scores
aggregate control implementation percentages across frameworks (CIS, NIST, PCI-DSS).
Lesson 3037Key Security Metrics and KPIs
Compliance standards
(PCI DSS, HIPAA technical requirements)
Lesson 2006Misconfiguration Detection Techniques
Compliance validation
checks resources against policies continuously (CSPM, Policy as Code)
Lesson 2059Security Automation and Orchestration
Compliance Violations
Drifted resources may fail audit requirements because they no longer match documented, approved configurations.
Lesson 2022Infrastructure Drift: Causes and Risks
Compliance-driven
Often required for regulatory frameworks
Lesson 2171Adversary Emulation vs Penetration Testing
Compliant device
Full access granted (perhaps to production systems)
Lesson 2678Device Trust and Endpoint Security
Component interactions
which services talk to each other and how?
Lesson 78Architecture Review and Threat Identification
Component removal
Desoldering flash chips or secure elements to read them with specialized equipment
Lesson 2775Physical Tampering and Anti-Tamper Mechanisms
Component/Element
What system part is affected (e.
Lesson 64Creating STRIDE Threat Tables
Components
Exported activities, services, broadcast receivers, or content providers (`android:exported="true"`) are publicly accessible—potential attack entry points.
Lesson 2714APK Structure and Manifest Analysis
Comprehensions
help process collections efficiently:
Lesson 3020Writing Rego Policies
Comprehensive Logging
Every request passes through one point, making it easy to log, monitor, and audit API access patterns.
Lesson 1043API Gateway and Defense Patterns
Comprehensive Transition Verification
Check every constraint before allowing a state change: Has the previous step completed?
Lesson 919Defensive Workflow State Management
Compressed Data
packets (wrap compressed content)
Lesson 2960OpenPGP Message Format and Operations
Compressed risk assessment
Use CVSS, EPSS, and asset criticality to confirm emergency status
Lesson 2459Emergency and Out-of-Band Patching
Compression artifacts
Real-world distribution (social media compression) destroys subtle detection signals
Lesson 2864Deepfakes: Generation Techniques and Detection ChallengesLesson 2867Deepfake Detection: Forensic Artifacts and ML Classifiers
Compression before encryption
(if applicable—encrypted data doesn't compress)
Lesson 2971Large File Transfer Security
Compromise certificate validation
Create fraudulent certificates that hash to expected values
Lesson 199Preimage Resistance
Compromise persistence
differs dramatically.
Lesson 2693Mobile vs Desktop Threat Differences
Compromise Recording
is the design principle that assumes breaches *will* happen—so your system must create an unforgeable trail of evidence when they do.
Lesson 2635Compromise Recording and AuditabilityLesson 2654Defense-in-Depth: Core Concept and Philosophy
Compromised API sources
can inject malicious data into your system
Lesson 1036API10:2023 - Unsafe Consumption of APIs
Compromised insiders
have their legitimate credentials stolen by external attackers, turning them into unwitting accomplices.
Lesson 52Insider Threats and Privileged Access Abuse
Compromised keychain
Root access may expose encrypted credentials
Lesson 2708iOS Jailbreaking and Detection
Compromised password detection
acts like a security checkpoint at account creation or password reset: before accepting a new password, you verify it hasn't appeared in known breaches.
Lesson 701Compromised Password DetectionLesson 702Password Expiration and Rotation Policies
Compromised Websites
Legitimate websites get hacked and injected with malicious code.
Lesson 1528Drive-by Downloads and Web-Based Infection
Computational cost
Each ratchet step adds processing overhead
Lesson 2981Post-Compromise Security and Future Secrecy
Compute MAC
`tag = MAC(key2, ciphertext)`
Lesson 123Encrypt-then-MAC Construction
Compute resource hijacking
shows several telltale signs:
Lesson 1893Cryptomining and Resource Abuse Detection
Compute the true answer
to your query (e.
Lesson 2915The Laplace Mechanism
Compute two values
from the message hash and signature components
Lesson 164ECDSA (Elliptic Curve Digital Signature Algorithm)
Computer Discovery
Cataloging domain-joined workstations and servers helps you identify valuable targets (domain controllers, file servers, database hosts) and plan lateral movement paths.
Lesson 2123Domain Enumeration and Reconnaissance
Concentration risk analysis
Identify single points of failure (e.
Lesson 2540Fourth-Party and Supply Chain Risk
Concurrent connection limits
Reduce simultaneous connections to a target
Lesson 2440Scan Configuration and Optimization
Concurrent execution limits
Set maximum simultaneous function instances (e.
Lesson 1948Serverless Denial of Service and Resource Limits
Concurrent Modifications
Multiple team members or pipelines modify the same resources without coordination.
Lesson 2022Infrastructure Drift: Causes and Risks
Concurrent Session Exploitation
occurs when an application either:
Lesson 719Concurrent Session Exploitation
Concurrent session management
decides how many active sessions a user can have simultaneously and provides controls to manage them.
Lesson 710Concurrent Sessions and Device Management
Concurrent threads
Parallel attack simulations
Lesson 1374DAST Configuration and Scope Management
Condition keys
Add conditions like IP ranges, time windows, or MFA requirements where applicable.
Lesson 1950Least Privilege for Serverless Functions
conditional access
rules you learned earlier to enforce time-based or context-based restrictions on sensitive operations.
Lesson 1749Access Analyzer and Unused Access DetectionLesson 2745BYOD Security Strategies
Conditional logic
Does "if severity = high" correctly filter critical alerts?
Lesson 2332Playbook Testing and Validation
Conditions (WHEN)
What triggers the policy?
Lesson 1804DLP Policy Design and Implementation
Conditions are AND gates
All conditions in a statement must be satisfied
Lesson 1713Policy Structure: Elements, Syntax, and Evaluation Logic
Confidence
High-confidence findings deserve immediate attention.
Lesson 1367Interpreting and Triaging SAST ResultsLesson 2349Alert Fatigue Management
Confidence level
indicating likelihood of being a true positive
Lesson 1367Interpreting and Triaging SAST Results
Confidential clients
(backend servers) can securely store secrets—think of a locked vault.
Lesson 764OAuth 2.0 Client Authentication
Confidential Computing
takes this further using **hardware-based trusted execution environments (TEEs)**, such as Intel SGX or AMD SEV.
Lesson 1800Always Encrypted and Confidential Computing
Confidentiality (C)
Is data exposed?
Lesson 2444CVSS v3.1 Base Metrics
Confidentiality Criterion
in SOC 2 reporting focuses on protecting information designated as confidential from unauthorized access, use, or disclosure.
Lesson 2595Confidentiality Criterion
Configuration approach
Start with a global deny rule, then layer on specific allow rules based on tested authorization checks.
Lesson 839Deny by Default Principles
Configuration assessment
comparing settings against security baselines
Lesson 1608Vulnerability Scanning Fundamentals
Configuration baseline tracking
Maintain a known-good state for comparison and recovery
Lesson 2493Change Management and Configuration Control Policy
Configuration baselines
solve this chaos by defining a single, documented standard for what a "secure system" looks like.
Lesson 1618Configuration Baselines and Hardening Standards
Configuration Change Control
is your formal gatekeeper process ensuring changes are intentional, tested, approved, and traceable.
Lesson 1623Configuration Change Control
Configuration changes
can reduce attack surface: disable vulnerable features, restrict access via firewall rules, enforce stricter authentication, or enable additional logging.
Lesson 2462Virtual Patching and Temporary Mitigations
Configuration Drift
like an unauthorized service running or a weak password policy — you have two choices: fix it manually or automate the correction.
Lesson 1622Remediation and EnforcementLesson 1986Multi-Cloud and Hybrid Compliance Challenges
Configuration drift detection
alerts when infrastructure changes unexpectedly
Lesson 2059Security Automation and Orchestration
Configuration Errors
Debug endpoints left enabled in production, verbose error messages revealing paths and versions, backup files in web roots (`.
Lesson 2115Exploitation via Misconfiguration
Configuration errors fail safely
A typo or misconfiguration results in blocked access (annoying but safe) rather than unintended exposure
Lesson 839Deny by Default Principles
Configuration file imports
(XML settings, backup files)
Lesson 627Testing for XXE Vulnerabilities
Configuration File Manipulation
Applications reading `.
Lesson 2133Registry and File System Permission Weaknesses
Configuration flags
Security features enabled by default, requiring explicit opt-out
Lesson 2666Fail-Safe Defaults
Configuration hints
Error messages, HTTP headers, metadata in documents
Lesson 2099Reconnaissance for Vulnerability Discovery
Configuration issues
like exposed ports or weak permissions
Lesson 3029Container Image Scanning
Configuration management
Store private keys securely (mode 0600, root-only access).
Lesson 498WireGuard Deployment Best Practices and Monitoring
Configuration management platforms
(like Ansible, Puppet, Chef) can deploy and update iptables/nftables rules across Linux fleets
Lesson 1590Host Firewall Management at Scale
Configuration monitoring
validates that all production servers still meet PCI-DSS hardening requirements every hour, not just during the annual assessment
Lesson 2622Continuous Compliance Monitoring
Configuration nuances
What's vulnerable in default configurations may be safe after proper hardening
Lesson 2441False Positives and Validation
Configuration review
Check actual system configs against scanner assumptions
Lesson 2441False Positives and Validation
configuration state
of your AWS resources—everything from EC2 instance settings to S3 bucket permissions— creating a historical timeline of changes.
Lesson 1988AWS Config for Compliance MonitoringLesson 2005Cloud Asset Discovery and Inventory
Configuration Vulnerabilities
A manually opened port or disabled encryption setting creates an attack surface invisible to your IaC security scans and policy checks.
Lesson 2022Infrastructure Drift: Causes and Risks
Configuration weaknesses
Overly permissive whitelists
Lesson 1581EDR Evasion Techniques
ConfigurationChange (Event ID 16-18)
Track driver installations and Sysmon's own configuration changes, preventing attackers from disabling monitoring.
Lesson 1514Sysmon File and Registry Activity Monitoring
Configure destinations
(CloudWatch, Log Analytics workspace, SIEM systems)
Lesson 1870Log Sources and Data Ingestion
Configure dual-stack VPN support
by ensuring your VPN handles both IPv4 and IPv6 traffic.
Lesson 509IPv6 Leak Mitigation
Configure framework logging
Most logging frameworks support field exclusion lists.
Lesson 1354Preventing Secrets in Logs and Error Messages
Configure path sensitivity
and context awareness settings.
Lesson 1363False Positives and Tuning SAST Tools
Configure SSL certificates
from your cloud certificate manager
Lesson 1773TLS/SSL in Cloud: Protocol Overview and Configuration
Configure suppression rules
in your DAST tool to mark validated false positives, preventing them from reappearing in future scans.
Lesson 1375False Positive Management in DAST
Confirm authentication works
with the new secret before invalidating the old one
Lesson 1349Rotation Testing and Rollback
Confirm scope/permissions
for the requested resource
Lesson 1010Bearer Token Authentication for APIs
Confirmation level
(true positive validation)
Lesson 2361Incident vs Event: Defining the Threshold
Confirmed malicious activity
(not just suspicious)
Lesson 2361Incident vs Event: Defining the Threshold
Conflict Detection
When multiple policies apply to the same resource, they might contradict each other (one allows, another denies).
Lesson 3024Policy Testing and Validation
Conflicts with existing design
Adding encryption or access controls later can break functionality
Lesson 12Security as a Non-Functional Requirement
Confusion
means making the relationship between the key and the ciphertext as complex as possible.
Lesson 85Block Cipher Fundamentals and StructureLesson 90AES Round Transformations
Confusion about trust
When boundaries blur, developers may forget which data is validated and which isn't
Lesson 1212Separation of Concerns for Security Boundaries
Connect to administrative shares
using stolen credentials
Lesson 2154SMB and Administrative Shares
Connection attempts
Who's connecting and when
Lesson 492Troubleshooting and Monitoring OpenVPN Connections
Connection Layer
multiplexes multiple logical channels over one SSH connection—simultaneous shell sessions, file transfers, and port forwards all share the same secure tunnel.
Lesson 1440SSH Protocol Fundamentals and Security Model
Connection patterns
Which devices talk to each other regularly?
Lesson 416Network Monitoring and Baselining
Connection relationships
Which devices communicate directly?
Lesson 349Network Mapping Fundamentals
Connection requirements
Reverse connections when firewalls block incoming traffic
Lesson 2195Exploit Modules and Payloads
Connection resets
Unexpected TCP RST packets during connections
Lesson 2992Censorship Techniques and Detection Methods
Connection strings
– URLs containing embedded credentials
Lesson 1310What Are Secrets and Why They Matter
Connection tracking
Both support stateful filtering, but nftables syntax uses `ct state` instead of `-m conntrack -- ctstate`.
Lesson 445Migrating from iptables to nftables
Connection Whitelisting
Allow only connections to legitimate cloud services; block everything else.
Lesson 2802IoT Botnet Detection and Mitigation
consent
is one of several legal bases for processing personal data (as you learned in "Legal Bases for Processing").
Lesson 2556Consent Requirements and ManagementLesson 2931Legal Bases for Data ProcessingLesson 2932Consent Requirements and Valid Consent
Consent Management System (CMS)
is the technical infrastructure that captures, stores, and respects user consent choices across your application.
Lesson 2933Consent Management Systems and UI Patterns
Consent records
showing when and how individuals agreed
Lesson 2561Accountability and Records of Processing
Consent Scope
Document granular consent choices—did they agree to marketing emails but not third-party sharing?
Lesson 2934Consent Records and Proof of Consent
Consider context
A startup and an enterprise have different resources.
Lesson 2164Remediation Recommendations
Consider post-quantum alternatives
when planning for long-term data protection (10+ years) or compliance with emerging quantum- safe standards
Lesson 151RSA vs Other Asymmetric Algorithms
Consistent analysis
No breaking when message wording changes
Lesson 1472Structured vs Unstructured Logging
Consistent bandwidth
– Reserved capacity, not subject to internet congestion
Lesson 1841Direct Connect and Dedicated Connectivity
Consistent CVE assignment
and severity ratings
Lesson 2475Coordinated Disclosure with Vendors
Consistent security posture
no gaps between framework silos
Lesson 2617Framework Mapping and Harmonization
Consistent time references
across your infrastructure
Lesson 1473Log Timestamp Synchronization
Constant-time comparisons
for any secret validation (don't short-circuit on first mismatch)
Lesson 1949Serverless Cold Start and Timing Side Channels
Constant-time implementation
ChaCha20-Poly1305 is easier to implement without timing vulnerabilities, reducing side-channel attack risks
Lesson 127ChaCha20-Poly1305
Constants
Fixed values ("expand 32-byte k")
Lesson 117ChaCha20: Modern Stream Cipher Design
Constraint reframing
works by convincing the model that safety rules don't apply:
Lesson 2858Jailbreaking and Constraint Bypass
Consult affected departments
(IT, legal, business units)
Lesson 2893PIA Documentation and Review
Consult vendor documentation
– Verify whether the detected version actually contains the reported CVE.
Lesson 1614False Positive Management
Consulting firms
Teams are isolated from competing clients' projects
Lesson 18Chinese Wall Model: Conflict of Interest Prevention
Contact poisoning
involves tricking users into adding attacker-controlled accounts.
Lesson 2957Encrypted Messaging Attacks and Vulnerabilities
Container attack surface
Kernel vulnerabilities affect *all* containers.
Lesson 1625Container vs VM Security Model
Container escape
means breaking out of this isolation to gain control of the host operating system, typically with root privileges.
Lesson 2148Container Escape for Privilege Escalation
Container logs
sent to centralized logging are often your best persistent evidence—ensure all stdout/stderr and application logs flow to your SIEM before containers die.
Lesson 1920Container and Serverless Forensics
Container Manifests
In Kubernetes, environment variables are defined in YAML manifests that specify pod configurations.
Lesson 1321Environment Variables in Container and Cloud Platforms
Container scanning
checks images for vulnerable packages and misconfigurations before they reach production.
Lesson 3008Automated Security Testing OverviewLesson 3026Pipeline Security Scanning Overview
Container services
(ECS/Fargate tasks with escalated permissions)
Lesson 1759PassRole Permission Exploitation
Container Threat Detection
identifies suspicious container runtime behavior
Lesson 1889GCP Security Command Center
Container-based applications
where orchestrators inject environment variables
Lesson 1318Environment Variables as a Secrets Storage Mechanism
Containerized test environments
that spin up and tear down quickly
Lesson 3051Testing and Validating Remediation Actions
Containers
share the host kernel and rely on Linux kernel features (namespaces, cgroups, seccomp) for isolation.
Lesson 1625Container vs VM Security Model
Containment
If malware infects a workstation segment, it cannot directly reach your database servers in another protected zone.
Lesson 446Network Segmentation FundamentalsLesson 1450MAC vs DAC: Fundamental Differences
Containment actions
Isolate host, disable account, block IP
Lesson 2311Playbooks and Standard Operating Procedures
Containment options
Short-term (isolate systems) and long-term (patch vulnerabilities)
Lesson 2372IR Playbooks and Runbooks
Containment Tools
enable rapid response actions—blocking IPs at firewalls, isolating endpoints via EDR agents, or quarantining email threats.
Lesson 2373IR Tool Selection and Deployment
Contemporaneous
(created when the control operated, not reconstructed later)
Lesson 2618Audit Evidence Types and Requirements
Content
Does it contain only allowlisted characters?
Lesson 609Command Injection Prevention: Input Validation
Content authentication technologies
(lesson 2868) embed cryptographic watermarks at creation time.
Lesson 2871Mitigating Deepfake Harms: Policy, Education, and Technical Controls
Content creation
Spam posting through legitimate APIs
Lesson 1032API6:2023 - Unrestricted Access to Sensitive Business Flows
Content injection
Add misleading text or links within trusted pages.
Lesson 676HTML Injection and Context Confusion
Content Inspection
Deep scanning that reads actual data within files and database fields, using pattern matching and machine learning to detect sensitive information regardless of how it's labeled.
Lesson 1802Data Discovery and Inventory
Content scanning
Screen for suspicious patterns like command injection attempts, credential exposure, or PII leakage
Lesson 2862LLM Output Validation and Sandboxing
Content Security Policy
Use CSP to limit where service workers can be registered from.
Lesson 1082Service Worker Registration and HijackingLesson 1217Secure Defaults and Opt-In Security
Content Security Policy (CSP)
is a browser security mechanism that lets website owners declare which sources of content are legitimate.
Lesson 657CSP Fundamentals and PurposeLesson 675Defense-in-Depth XSS Strategy
Content structure validation
(parse the file format)
Lesson 982Multi-Layer File Upload Validation Strategy
Content-Length (CL)
and **Transfer-Encoding (TE)**.
Lesson 1106CL.TE and TE.CL Desync Techniques
Content-Length header
Specifies the exact number of bytes in the request body
Lesson 1105HTTP Request Smuggling Fundamentals
Content-Length vs. frame boundaries
HTTP/2 uses frame-based message delimiting, while HTTP/1.
Lesson 1112HTTP/2 Downgrade and Smuggling
Content-Security-Policy (CSP)
Restricts what resources the browser can load, preventing XSS attacks if your API accidentally returns HTML.
Lesson 1041API Security Headers and CORS
context
if the application outputs user data inside an HTML attribute, tag body, or unescaped section, the browser's HTML parser treats special characters (`<`, `>`, `"`) as markup delimiters, not literal text.
Lesson 676HTML Injection and Context ConfusionLesson 812Context-Dependent Authorization FailuresLesson 844Authorization Logging and MonitoringLesson 2349Alert Fatigue ManagementLesson 2665Complete MediationLesson 2685Software-Defined Perimeter and Identity-Based Segmentation
Context binding
User IDs, session tokens, operation types
Lesson 129Associated Data in AEAD
Context blindness
A scanner flags an "open" service that's actually protected by network segmentation or requires additional authentication
Lesson 2441False Positives and Validation
Context display
The notification shows login details—location, IP address, browser type, timestamp.
Lesson 746Push Notification-Based MFA
Context limitations
Understand that auto-escaping typically targets HTML context; JavaScript or URL contexts may need additional manual encoding
Lesson 1247Auto-Escaping Mechanisms and Configuration
Context manipulation
Change URL parameters or API calls to access resources they shouldn't, bypassing the single initial check
Lesson 1213Complete Mediation and Access Checks
Context matters
HTML encoding differs from SQL escaping or shell encoding
Lesson 1218Input Validation vs Output Encoding Philosophy
Context switching
exploits where your payload lands in the page.
Lesson 648Filter Evasion Fundamentals
Context-aware enforcement
Adjust permissions based on device posture, location, and user identity
Lesson 2743Enterprise Mobility Management (EMM) and UEM
Context-enriched alerts
that include resource owner, last modification timestamp, and policy violated
Lesson 2027Drift Reporting and Exception Management
Contextual Analysis
examines the *situation* around data movement, not just content.
Lesson 1807False Positive Management and TuningLesson 3016False Positive Management
Contextualization
Connect dots between multiple intelligence sources.
Lesson 2343Threat Intelligence Analysis and Reporting
Contextualize findings
Compare to industry standards or past assessments.
Lesson 2161Executive Summary Writing
continuous assessment
, reporting findings as soon as vulnerabilities are discovered.
Lesson 1611Agent-Based Vulnerability AssessmentLesson 2678Device Trust and Endpoint Security
Continuous compliance monitoring
shifts from periodic snapshots to always-on surveillance of your control environment.
Lesson 2622Continuous Compliance MonitoringLesson 2623Compliance as Code
Continuous fuzzing
runs brief fuzz campaigns on every pull request to catch obvious issues quickly.
Lesson 3014Automated Fuzzing in CI/CD
Continuous Identity Verification
means constantly re-evaluating whether the current user is genuinely who they claim to be throughout the entire session.
Lesson 1699Continuous Identity Verification
Continuous Learning
Security becomes part of sprint planning, retrospectives, and daily standups.
Lesson 2054DevSecOps Philosophy and Culture Shift
Continuous refinement
Baselines drift as your environment evolves.
Lesson 1897Baseline Establishment for Cloud Resources
Continuous scanning
means abandoning the snapshot approach for persistent, always-on monitoring that detects vulnerabilities the moment they appear.
Lesson 2443Continuous Scanning and Real-Time Detection
Continuous Security Integration
practices to automate repetitive checks.
Lesson 2062Balancing Security and Velocity
Continuous security testing
means automatically scanning your APIs on every deployment or schedule—not just once.
Lesson 1044API Security Testing and Monitoring
Continuous testing
without hiring full-time staff
Lesson 2479Bug Bounty Fundamentals and Models
Continuous validation
Schedule regular scans to catch configuration drift
Lesson 1621Compliance Scanning and Validation
Continuous Variable QKD
measures continuous properties like light wave amplitude and phase—imagine measuring the exact height of ocean waves rather than counting individual droplets.
Lesson 281QKD Protocols: E91 and Continuous Variable
Continuous Verification
Access is continuously re-evaluated; sessions can be terminated if context changes
Lesson 2690Zero Trust Network Access (ZTNA) Solutions
Continuous-wave jamming
Constant noise on specific channels
Lesson 551RF Spectrum Monitoring
Contract
Processing is necessary to fulfill a contract with the individual (e.
Lesson 2931Legal Bases for Data Processing
Contractor obligations
strengthened beyond service providers
Lesson 2568CPRA Amendments and Enforcement
Contractual and technical controls
Lesson 2910Linkage Attacks and Defenses
Contractual Security Requirements
.
Lesson 2539Continuous Vendor Monitoring
Control access
Use IAM roles and least privilege (concepts you've learned)
Lesson 1980PCI DSS in Cloud Environments
Control Attestation and Testing
(lesson 2621) by providing real-time control validation data.
Lesson 2622Continuous Compliance Monitoring
Control channel
Handles authentication, key exchange, and tunnel setup using TLS (remember: TLS VPNs from the previous lesson).
Lesson 486OpenVPN Architecture and Components
Control Effectiveness Rate
Percentage of security controls operating as intended.
Lesson 2532Risk Posture and Trending Metrics
Control enhancements
(additional layers for higher assurance)
Lesson 2611NIST 800-53 Security Controls
Control flow analysis
maps out all the possible paths code can take—every `if`, `else`, `switch`, loop, and function call creates branches in execution.
Lesson 1361Control Flow Analysis and Path SensitivityLesson 3009Static Application Security Testing (SAST) Deep Dive
Control gaps
Where do multiple paths converge without defense-in-depth?
Lesson 2641Architecture-Level Attack Trees
Control groups (cgroups)
are a Linux kernel feature that limits, accounts for, and isolates resource usage of process groups.
Lesson 1434Resource Limits and Cgroups
Control layer permissions
using resource-based policies that explicitly allow only authorized functions or accounts to attach the layer.
Lesson 1957Function Layer Security
Control Mapping Complexity
A single GDPR requirement might require CloudTrail in AWS, Azure Monitor in Azure, and Cloud Audit Logs in GCP.
Lesson 1986Multi-Cloud and Hybrid Compliance Challenges
Control objective
Which TSC criterion it addresses (e.
Lesson 2598Control Design and Implementation
Control owner
Who's responsible for execution
Lesson 2598Control Design and Implementation
Control plane security
(API servers, schedulers, controllers)
Lesson 1682Container as a Service Security
Control points
Devices with special privileges and security policies
Lesson 353Gateway and Router Identification
Control refinement
Update controls as threats, business processes, and technology evolve
Lesson 2599SOC 2 Reports and Continuous Compliance
Control statement
(what must be done)
Lesson 2611NIST 800-53 Security Controls
Control testing
Validate effectiveness before considering risk "mitigated"
Lesson 2519Risk Mitigation and Control Selection
Controlled resources
Virtual file systems, network simulations, fake data
Lesson 1567Behavioral Detection and Sandboxing
Controller
(Z-Wave) manages key distribution
Lesson 2785Zigbee and Z-Wave Security Models
Controller Manager
Runs background processes that maintain desired cluster state (restarting failed pods, managing deployments).
Lesson 1662Kubernetes Architecture and Attack Surface
Controls use different mechanisms
(diversity)
Lesson 2656Redundant Controls and Failure Tolerance
Convenience vs. risk tradeoff
One compromised server with the wildcard certificate's private key now threatens *all* your subdomains.
Lesson 175Subject Alternative Names and Wildcard Certificates
Conversion Workflows
neutralize threats by re-encoding files into safe formats.
Lesson 981Safe File Processing Practices
Convex relaxation
Approximate neural network behavior with simpler, analyzable functions
Lesson 2848Certified Defenses and Provable Robustness
Cookie injection
via HTTP response splitting (less common with modern browsers)
Lesson 714Session Fixation Attacks
Cookie management
Preserving session cookies between requests
Lesson 1373Authentication and Session Handling in DAST
Cookie Protection
Your treasure vault.
Lesson 675Defense-in-Depth XSS Strategy
cookie tampering
, and it's a serious threat if your application trusts cookie data blindly.
Lesson 727Cookie Tampering and IntegrityLesson 827Session and Cookie Manipulation
Cookie values
Occasionally store references you can manipulate
Lesson 819Testing for IDOR Vulnerabilities
Coordinate communications
to customers, regulators, and stakeholders
Lesson 2541Vendor Security Incident Management
coordinated disclosure
represent different philosophies about transparency, timing, and stakeholder involvement.
Lesson 2470Vulnerability Disclosure ModelsLesson 2476CVE Assignment and Public Disclosure
Coordinating
Reporting back to command-and-control servers for attack instructions
Lesson 2754IoT Botnets: Mirai and Beyond
Coordination requirements
Researchers must give you time to remediate before public disclosure
Lesson 2478Legal and Safe Harbor Considerations
Coordination with Legal
is non-negotiable.
Lesson 2428External Communication and Disclosure
Copies
the original signed assertion to keep the signature valid
Lesson 779XML Signature Wrapping Attacks
Copyleft obligations
Licenses like GPL require you to release your own code under the same license if you distribute your application.
Lesson 1272License Compliance Scanning
Copyright and DMCA laws
(in the US) restrict circumventing protection mechanisms
Lesson 2722Introduction to Mobile App Reverse Engineering
Core components
of effective risk documentation:
Lesson 2516Risk Analysis Documentation and Communication
Core Impact
offers a commercial, GUI-driven approach with automated pivoting and client-side attacks.
Lesson 2216Exploitation Framework Landscape
Corporate governance
Board decisions require majority approval
Lesson 237Multisignatures and Threshold Signatures
Corporate spies
steal business plans, product designs, customer lists, or R&D data to benefit competing companies
Lesson 49Motivations: Espionage and Intelligence Gathering
corpus
of interesting inputs and use genetic algorithms to evolve test cases that maximize code coverage, exactly as coverage-guided fuzzing prescribes.
Lesson 1389AFL and LibFuzzerLesson 3014Automated Fuzzing in CI/CD
Correction
Automatically reapply the desired configuration, reverting unauthorized changes
Lesson 3046Auto-Remediation for Infrastructure Drift
Corrective + Technology D
Automated account suspension triggered by anomaly detection
Lesson 2658Control Diversity: Types and Technologies
Correlate events
match activities across sources (user login in event log + network connection in firewall log)
Lesson 2417Timeline Construction Fundamentals
Correlate time windows
when the attacker was active across multiple systems
Lesson 2365Detection and Scoping Techniques
Correlate with other logs
– Do system logs show legitimate admin activity or package installations?
Lesson 1504FIM Alert Analysis and Response
Correlating multiple signals
(failed login *plus* unusual geography *plus* MFA bypass attempt)
Lesson 1895Custom Detection Rules and Tuning
Correlation
Links a malicious PowerShell execution (Event ID 4104) with suspicious network connections (Sysmon Event ID 3) from the same process
Lesson 1517Integrating Windows Logs with SIEM PlatformsLesson 2314What is a SIEM and Why Organizations Need It
Correlation patterns
Same person using normal and circumvented connections
Lesson 2998Operational Security for Circumvention
Correlation rules
are the detective logic that connects these dots.
Lesson 2318Correlation Rules and Detection Logic
CORS misconfigurations
that allow malicious origins to make credentialed requests
Lesson 854CSRF in Modern Applications and SPAs
COSE
(CBOR Object Signing and Encryption) for compact cryptographic operations
Lesson 2797Authentication Protocols for Constrained Environments
Cost alarms
Set billing alerts that trigger when spend exceeds expected patterns, giving you early warning of an attack.
Lesson 1948Serverless Denial of Service and Resource Limits
Cost allocation
Track spending by team, project, or environment (`Owner=SecurityTeam`, `CostCenter=CC- 1234`)
Lesson 1996Cloud Resource Tagging Strategy and Standards
Cost and Data Transfer
Cross-region connectivity incurs data transfer charges—factor this into your security architecture
Lesson 1842Cross-Region and Cross-Account Connectivity
Cost avoidance
Compare the cost of fixing issues in design vs fixing breaches in production.
Lesson 84Measuring Threat Modeling Effectiveness
Cost control
Deny expensive instance types across development accounts while allowing them in production.
Lesson 1718Service Control Policies and Organizational Controls
Cost explosion
you pay for every execution, with bills potentially reaching thousands of dollars in minutes
Lesson 1956Concurrency Controls and Throttling
Cost optimization
Moving logs to cheaper storage tiers after 30-90 days
Lesson 1874Log Retention and Lifecycle Policies
Cost vs. benefit
Cloud GPU time is expensive—run cost analyses before launching large jobs
Lesson 2234Cloud-Based and Distributed Cracking
Cost-based
Maximum 10,000 cost points per hour (allows flexibility—cheap queries can run more often)
Lesson 1002Query Cost Analysis and Rate Limiting
Cost-benefit analysis
Control cost vs potential loss (ALE reduction)
Lesson 2516Risk Analysis Documentation and Communication
Cost-effective
– you pay per valid vulnerability, not hourly rates
Lesson 2479Bug Bounty Fundamentals and Models
Cost-effectiveness
Control cost should be proportional to the risk being reduced (don't spend $100,000 to protect a $10,000 asset)
Lesson 2519Risk Mitigation and Control SelectionLesson 2662Defense-in-Depth Trade-offs and Cost- Benefit
Cost-per-Vulnerability
compares bounty payouts to what those bugs would cost if exploited (data breach costs, downtime) or found through penetration testing contracts.
Lesson 2485Bug Bounty Metrics and ROI
Cost/difficulty
Which leaves are easiest to exploit?
Lesson 2641Architecture-Level Attack Trees
Count grapheme clusters
, not code points or bytes (what users perceive as characters)
Lesson 1173Emoji and Combining Character Attacks
Country (C)
Two-letter country code
Lesson 176Certificate Signing Requests (CSR)
Coupon reuse
Applying a single-use discount code in parallel requests
Lesson 902Time-of-Check to Time-of-Use (TOCTOU) Vulnerabilities
Covenant
, **Cobalt Strike**, and others emerged to address specific operational needs, evasion requirements, and attack methodologies that Metasploit wasn't originally designed to handle.
Lesson 2217Metasploit vs. Alternative Frameworks
Cover critical scope
Operating system binaries, configuration files, application code, and databases handling regulated data
Lesson 1506FIM for Compliance Requirements
Coverage Comparison
Overlay multiple layers—your EDR coverage, your SIEM rules, and manual monitoring—to see where protections overlap or conflict.
Lesson 2183ATT&CK Navigator and Visualization
coverage gaps
techniques adversaries commonly use that you cannot detect.
Lesson 2185Measuring Defensive Coverage with ATT&CKLesson 2437Agent-Based Scanning
Coverage Validation
Measure which policy rules are actually executed during tests.
Lesson 3024Policy Testing and Validation
Covered techniques
Attacks you can detect reliably
Lesson 2356Detection Coverage Measurement
covert channels
communication methods that hide within legitimate-looking traffic.
Lesson 1556Rootkit Communication and Command-and-ControlLesson 2670Least Common Mechanism
CPU
5-30% increase depending on agent configuration
Lesson 1382IAST Deployment Models and Performance Impact
CPU allocation
Cloud providers tie CPU power to memory settings
Lesson 1955Function Timeout and Memory Limits
CPU limits
prevent runaway processes from monopolizing processor time.
Lesson 1657Resource Limits and Isolation
CPU state inspection
Direct access to registers, control structures, and execution state reveals hidden modifications
Lesson 1563Hardware-Assisted Detection Techniques
Crack Rate
The percentage of hashes you successfully cracked versus the total.
Lesson 2235Password Analysis and Cracking Metrics
CrackStation
Massive wordlists combining multiple breach datasets
Lesson 2227Dictionary Attacks with Wordlists
Craft a malicious request
Use that input to generate a harmful response (e.
Lesson 1116Cache Poisoning Attack Fundamentals
Craft authenticated requests
with the stolen token
Lesson 642Cross-Site Request Forgery via XSS
Craft payload
to position target address on stack
Lesson 2111Format String Vulnerabilities
Crash Dump
Windows generates these automatically during system crashes.
Lesson 2391Memory Image Formats and Validation
crawling
(mapping the application) and **scanning** (testing for vulnerabilities).
Lesson 2212Burp Scanner Configuration and CrawlingLesson 2438Web Application Vulnerability Scanners
Crawling/Spidering
Discovers all endpoints, forms, APIs, and parameters by following links and exploring the application surface
Lesson 3010Dynamic Application Security Testing (DAST) Deep Dive
Crawls
the application to discover endpoints, forms, and parameters
Lesson 1368DAST Fundamentals and Runtime Testing
Create a key pair
(public and private key) if you don't have one already
Lesson 176Certificate Signing Requests (CSR)
Create a malicious MSI
package containing a payload (reverse shell, add user to Administrators group, credential dumper, etc.
Lesson 2136Always Install Elevated and MSI Exploitation
Create a SUID binary
as root on your machine (since `no_root_squash` preserves your root status)
Lesson 2147NFS and Network File System Exploits
Create a trimmed policy
removing those permissions
Lesson 1750Last Access Analysis and Permission Rightsizing
Create backdoors
`INSERT INTO users VALUES('hacker','password123','admin')`
Lesson 580Stacked Queries and Multiple Statements
Create compliance foundation
– Satisfy legal, regulatory, and contractual requirements by documenting your security stance
Lesson 2487Purpose and Scope of Information Security Policy
Create copies
Original evidence stays pristine; work with copies for analysis
Lesson 2385Log Collection and Preservation
Create forensic copies
, never work on originals
Lesson 2398Disk Forensics Fundamentals and Chain of Custody
Create hidden elements
that execute on page load
Lesson 646Persistent Backdoors via DOM Manipulation
Create ID tokens
for authenticating to specific services
Lesson 1725GCP Service Account Impersonation
Create new processes
under that stolen identity to execute commands with elevated privileges
Lesson 2130Token Manipulation and Impersonation
Create synthetic reviews
that mimic genuine customer experiences, boosting or destroying product reputations
Lesson 2866Synthetic Text Generation and GPT-Based Misinformation
Create test accounts
to generate valid IDs from different user perspectives
Lesson 1021Testing for BOLA Vulnerabilities
Create test cases
substituting different IDs
Lesson 819Testing for IDOR Vulnerabilities
Create test matrices
(user roles × resources × actions)
Lesson 831Authorization Testing Methodology
Create unintended references
Point to internal application files, configuration data, or even other users' uploaded content.
Lesson 969Symbolic Link Attacks
Creates
a modal dialog or overlay with a fake login form
Lesson 640Phishing via XSS Injection
Creating new admin users
Using injection to run `CREATE USER` commands with administrative roles
Lesson 584Privilege Escalation via SQL Injection
Creating Tickets
transforms scan results into actionable work items.
Lesson 2053Test Result Management and Remediation Workflows
Creation/modification dates
(indicating work patterns)
Lesson 334Email Harvesting and Metadata Extraction
Credential Capture
Using portable RFID readers (like Proxmark3 or HID cloners), attackers position themselves near badge readers or pass close to employees carrying badges.
Lesson 2274Badge Cloning and RFID Attacks
Credential collection
Stolen passwords automatically forwarded via Telegram bots or email
Lesson 2261Phishing Infrastructure and Automation
Credential dumping
is the technique of extracting usernames, passwords, and authentication tokens from a compromised machine.
Lesson 2119Credential Dumping Fundamentals
Credential dumping tools
executing (LSASS access, Mimikatz indicators)
Lesson 2159Detection and Defense Against Lateral Movement
Credential Generation
If authorized, STS creates three components:
Lesson 1730AWS STS and AssumeRole Mechanics
Credential Hygiene
Force password resets for compromised accounts.
Lesson 2367Eradication: Removing the Threat Actor
Credential isolation
Secrets should never appear in logs or be accessible to untrusted steps
Lesson 1403Pipeline Security and Release Gates
Credential leakage
happens through:
Lesson 1735Credential Theft and Token Security
Credential leaks
API tokens accidentally committed to public repos
Lesson 2876Model Repository Security
Credential replay
Recording and replaying authentication sequences
Lesson 2280Badge and Card-Based Access Systems
Credential reuse across regions
suggesting compromise
Lesson 1736Best Practices for Temporary Credentials
Credential stuff
using leaked passwords from other breaches
Lesson 1441Disabling Password Authentication
Credential Stuffing at Scale
Stolen plain text credentials are sold on dark web marketplaces and used in automated "credential stuffing" attacks, where bots attempt login across thousands of websites using leaked username/password pairs.
Lesson 683Why Plain Text Password Storage is Catastrophic
Credential testing
for weak or default passwords
Lesson 1608Vulnerability Scanning Fundamentals
Credential Testing at Scale
Feed CME usernames, passwords, or NTLM hashes, and it tests them against entire network ranges via SMB, identifying which accounts work on which machines.
Lesson 2239CrackMapExec for Network Enumeration
Credential verification
Ask for employee ID, callback numbers, or ticket numbers—then independently verify them
Lesson 2270Detecting and Resisting Manipulation Attempts
Credentialed scans
provide the scanner with legitimate login credentials (username/password, SSH keys, API tokens).
Lesson 1609Credentialed vs Non-Credentialed Scans
Credentials
(usernames and passwords) are another lucrative target.
Lesson 48Motivations: Financial Gain and CybercrimeLesson 2125Data Discovery and Staging
Credentials leaked
The response contains temporary AWS credentials (access key, secret key, session token) that the attacker can now extract
Lesson 1935SSRF Attacks Against IMDS
Credit and Attribution
Ask researchers how they'd like to be credited—some prefer full names, others use handles, some want anonymity.
Lesson 2474Communicating with Security Researchers
CRIME
(Compression Ratio Info-leak Made Easy) was the original attack demonstrating this principle against TLS compression.
Lesson 1099HPACK Header Compression Attacks
Criminal convictions and offenses
(handled separately but with similar protections)
Lesson 2552Personal Data and Special Categories
Criteria
What the requirement or standard says should exist
Lesson 2548Audit Findings and Risk Rating
Critical (9.0–10.0)
Catastrophic impact, trivial exploitation
Lesson 2446CVSS Score Interpretation and Limitations
Critical Actions Layer
For sensitive operations (changing passwords, transferring money, deleting accounts), require **re-authentication** or additional confirmation beyond CSRF tokens alone.
Lesson 873Defense-in-Depth CSRF Strategy
Critical defense
Separate the LLM into distinct privilege levels:
Lesson 2861Defense Strategies Against Prompt Injection
Critical incidents
indefinite retention
Lesson 2409Packet Capture for Forensics
Critical infrastructure
Require multiple administrators to approve configuration changes
Lesson 237Multisignatures and Threshold SignaturesLesson 349Network Mapping Fundamentals
Critical production database passwords
quarterly, with a change control board reviewing each rotation
Lesson 1345Automated vs Manual Rotation
Critical vendors
Direct access to production systems, sensitive data, or mission-critical services (cloud providers, managed security services)
Lesson 2534Third-Party Risk Fundamentals
Critical vulnerabilities
(high CVSS scores with known exploits) demand immediate attention—within hours or days.
Lesson 1266Dependency Update Strategies and PatchingLesson 2079Building an Internal Bug Bounty ProgramLesson 2453Vulnerability Age and Remediation SLAs
Critical vulnerable scenarios
Lesson 1103HTTP/3 0-RTT Replay Attacks
Critical weakness
The requesting page blindly trusts and executes whatever the server returns—a major CSRF and security risk.
Lesson 858SOP Exceptions and Relaxations
Critical Zone
Data centers, vault rooms, control systems
Lesson 2279Physical Access Control Models and Zones
Critical-only scans
(focused): Test high-severity vulnerabilities only
Lesson 2440Scan Configuration and Optimization
Critical, High, Medium, Low
.
Lesson 65Prioritizing STRIDE Threats
Critical/High vulnerabilities
Immediate build failure
Lesson 1398Build-Time SAST Integration
Critical/P1
Active data exfiltration, ransomware spreading, complete service outage
Lesson 2362Incident Severity and Priority Classification
CRL Distribution Points (CDPs)
, typically HTTP or LDAP URLs embedded in the certificate itself.
Lesson 191Certificate Revocation Lists (CRLs)
CRLSets
(Chrome) and **OneCRL** (Firefox) are browser-maintained lists of revoked certificates.
Lesson 197Modern Revocation Alternatives
Cross-account
connectivity means Organization A's VPC needs to access Organization B's private service—all while maintaining network isolation boundaries.
Lesson 1851Cross-Region and Cross-Account Private Connectivity
Cross-account logging
routes logs (CloudTrail, VPC Flow Logs, application logs) from multiple AWS accounts to a single "security account" or dedicated logging account.
Lesson 1877Cross-Account and Multi-Region Logging
Cross-account misconfigurations
Weak external IDs or overly trusting resource-based policies
Lesson 1753IAM Privilege Escalation Overview
Cross-account resource access
S3 bucket reads, Lambda invocations, secret retrievals
Lesson 1743Cross-Account Access Auditing
Cross-account resource sharing
Allow production VPC in Account A to access shared services (databases, APIs) in Account B
Lesson 1836VPC Peering Fundamentals
Cross-account service consumption
with full network isolation
Lesson 1848Private Link Architecture and Use Cases
Cross-device sync
Getting the same key on phone, laptop, and tablet
Lesson 2965Usability Challenges and Key Management UX
Cross-origin attacks
`Origin` headers can be manipulated in many contexts despite same-origin policy protections
Lesson 811Referer and Origin-Based Authorization Flaws
Cross-Origin Resource Sharing (CORS)
is the mechanism that allows servers to explicitly permit cross-origin requests.
Lesson 1058XMLHttpRequest and Fetch API RestrictionsLesson 1095Protecting API Calls from the SPA
Cross-platform inventory
Single dashboard showing device health, patch levels, and configuration drift
Lesson 2743Enterprise Mobility Management (EMM) and UEM
Cross-reference
header against actual file signature
Lesson 956Content-Type Header Validation and Mismatches
Cross-region
connectivity means linking resources in, say, `us-east-1` with `eu-west-1`.
Lesson 1851Cross-Region and Cross-Account Private Connectivity
Cross-region replication
Copy snapshots to another region for disaster recovery
Lesson 1931Instance Termination Protection and Data Persistence
Cross-service consistency
Use the same CMK across multiple databases
Lesson 1797Key Management for Database Encryption
Cross-site attacks
Exploiting CSRF vulnerabilities combined with session token leakage
Lesson 713Session Hijacking Fundamentals
Cross-site cookie setting
on subdomains or related domains
Lesson 714Session Fixation Attacks
Cross-site permission abuse
Compromised legitimate sites can abuse existing trusted permissions to deliver malicious notifications.
Lesson 1087Web Push Notifications and Permissions
Cross-Site Scripting (XSS)
It injects JavaScript like `<script>alert('XSS')</script>`
Lesson 1372Active Scanning and Attack SimulationLesson 2104Web Application Vulnerability Hunting
Cross-Tool Coordination
ties everything together—your orchestrator must integrate with vulnerability scanners, ticketing systems, deployment tools, monitoring platforms, and communication channels, passing data between each step.
Lesson 3045Remediation Workflows and Orchestration
Cryptanalysis advances
Theoretical weaknesses might let attackers narrow down possible states
Lesson 291PRNG State and Reseeding
Crypto-agility
means designing systems that can swap cryptographic algorithms without requiring massive rewrites.
Lesson 277Migration Strategies and Crypto-Agility
Crypto-ransomware
encrypts your files using strong cryptographic algorithms, making them unreadable without the decryption key held by the attacker.
Lesson 1522Ransomware: Extortion Through Encryption
Cryptocurrency mining
Monetization beyond DDoS-for-hire
Lesson 2754IoT Botnets: Mirai and Beyond
Cryptocurrency wallets
Require 2-of-3 signatures to move funds (you, your business partner, and an escrow service)
Lesson 237Multisignatures and Threshold SignaturesLesson 321Secret Sharing FundamentalsLesson 326Secret Sharing in Practice
Cryptographic Agility
Design systems so you can swap algorithms later without rewriting everything.
Lesson 2035Cryptographic Design Decisions
Cryptographic erasure
Instead of trying to find every copy of a key, encrypt all data with a **Key Encryption Key (KEK)**.
Lesson 320Key Destruction and Sanitization
Cryptographic Failures
replaced "Sensitive Data Exposure" with clearer focus
Lesson 1201OWASP Top 10 2021 vs 2017: Key Changes
Cryptographic key splitting
Payment authorization requires keys from both finance and compliance systems
Lesson 2631Separation of Privilege
Cryptographic operations
(sign, decrypt, MAC) performed *within* the HSM
Lesson 306Hardware Security Modules (HSMs)Lesson 1690Identity and Access Management Boundaries
Cryptographic randomness
requires everything statistical randomness has, *plus* **unpredictability**.
Lesson 285Cryptographic vs Statistical RandomnessLesson 704Session Identifiers: Generation and Properties
Cryptographic Workflow Tokens
Issue signed, tamper-proof tokens that encode the current valid state and allowable next steps.
Lesson 919Defensive Workflow State Management
Cryptographically Secure PRNG (CSPRNG)
must guarantee:
Lesson 288Cryptographically Secure PRNGs (CSPRNGs)
Cryptography
(data-at-rest and in-transit encryption)
Lesson 1979ISO 27001 and Cloud Security Standards
Cryptominer
Uses system resources to mine cryptocurrency
Lesson 1518Malware Taxonomy and Classification Criteria
CRYSTALS-Kyber
won the key encapsulation mechanism (KEM) category.
Lesson 270CRYSTALS-Kyber: Post-Quantum Key Encapsulation
CSP
catches attacks that slip through and stops execution
Lesson 657CSP Fundamentals and Purpose
CSP frame-ancestors
directives on your auth endpoints
Lesson 1093Cross-Origin Authentication and iframe Security
CSPM Integration
Feed misconfiguration alerts (open S3 buckets, overly permissive security groups) into your SIEM.
Lesson 1884SIEM Integration with Cloud Security Tools
CSPRNG
(like those we've covered from operating system APIs) rather than statistical PRNGs like Mersenne Twister.
Lesson 302Key Generation Requirements and Best Practices
CSPRNGs
, you need a practical way to get secure random bytes in real programs.
Lesson 289Operating System Random APIs
CSRF (Cross-Site Request Forgery)
sound similar but exploit completely different vulnerabilities:
Lesson 635XSS vs CSRF: Understanding the Difference
CSS Context
Escape characters that could break out of style declarations or inject properties.
Lesson 668Output Encoding and Escaping FundamentalsLesson 1220Context-Specific Output Encoding
CSS values
Has its own escaping rules for backslashes and quotes
Lesson 1246Context-Aware Output Encoding
CT Log Entry
The CA submits the certificate to CT logs before or when issuing it
Lesson 189Certificate Transparency Logs Verification
CTAP protocol
(how authenticators communicate with devices).
Lesson 745FIDO2 and WebAuthnLesson 751WebAuthn and FIDO2 Protocol
CTR
mode only requires IVs to be **unique** (never reused with the same key), but they don't need to be unpredictable.
Lesson 132IV Requirements for Different Modes
CTR encryption
Encrypts your data by XORing it with keystream blocks (counter-based)
Lesson 101GCM Mode: Authenticated Encryption Standard
CTR mode encryption
Your plaintext is encrypted by XORing it with a keystream generated from an incrementing counter, turning the block cipher into a stream cipher
Lesson 125AES-GCM: Galois/Counter Mode
Curiosity
(enticing downloads, "see who viewed your profile")
Lesson 1533Social Engineering and User Deception
Curiosity and Greed
Subject lines like "You've won!
Lesson 2253Email-Based Phishing Fundamentals
Currency Switching Exploits
Adding items to a cart in one currency, then switching currencies before checkout without proper recalculation.
Lesson 924Currency and Conversion Exploits
Current status
(Investigating/Contained/Eradicating/Resolved)
Lesson 2427Incident Status Updates and Escalation
Current timeline
Experts estimate 10-30 years before quantum computers powerful enough to break RSA exist.
Lesson 152RSA Cryptanalysis: Factoring and Future Threats
Curve25519
(and its signature variant **Ed25519**) represent a newer generation designed explicitly to avoid implementation pitfalls.
Lesson 167Curve25519 and EdDSALesson 493WireGuard Protocol Design and Cryptographic SimplicityLesson 2794Elliptic Curve Cryptography for IoT
Custom headers
`--headers="X-Forwarded-For: 192.
Lesson 590SQLMap Evasion and Tampering Scripts
Custom Import
Allows you to import your own HTML credential harvesting page for maximum control and customization.
Lesson 2246Credential Harvester and Attack Vectors
Custom pattern matching
for application-specific attack vectors
Lesson 1867CDN WAF Integration and Edge Security
Custom questionnaires
supplement standards with organization-specific requirements—regulatory needs, data classification handling, or technology-specific controls not covered in generic frameworks.
Lesson 2537Security Questionnaires and Standards
Custom RDP configurations
Modify logging settings to reduce audit trails
Lesson 2156RDP and GUI-Based Lateral Movement
Custom Solutions
using frameworks like React/D3.
Lesson 3043Dashboard Tools and Integration
Customer controls
remain your responsibility:
Lesson 1691Compliance Responsibility Mapping
Customer Gateway
Represents your physical on-premises VPN device (router or firewall) in the cloud configuration.
Lesson 1840VPN Connections to Cloud
Customer Notifications
must balance urgency with accuracy.
Lesson 2428External Communication and Disclosure
Customer-managed
Custom, reusable permission sets across your organization
Lesson 1714Managed Policies vs Inline Policies
Customer-managed keys
may add latency if KMS calls are throttled
Lesson 1770Encryption for Block Storage and Virtual Disks
Customer-managed keys via KMS
You control rotation and access policies
Lesson 1793Transparent Data Encryption (TDE)
Customer-Provided Keys (SSE-C, BYOK)
You supply the encryption key with each request.
Lesson 1790Storage Service Encryption Integration
Customers create private endpoints
in their VPCs pointing to your service
Lesson 1850Private Link Service for Custom Applications
Customize everything
Change default port numbers, user agents, URIs, and staging paths
Lesson 2222Framework Evasion TechniquesLesson 2224Framework OPSEC and Detection
Customize rule sets
by disabling checks irrelevant to your tech stack or enabling additional rules for your specific risks.
Lesson 1363False Positives and Tuning SAST Tools
CVE
(Common Vulnerabilities and Exposures) identifiers come in.
Lesson 1271CVE Databases and Vulnerability Feeds
CVE Database
Maintained by MITRE, this is the naming standard.
Lesson 1613Vulnerability Database and CVE Mapping
CVE Databases
The Common Vulnerabilities and Exposures (CVE) system catalogs publicly known security flaws.
Lesson 365Combining Fingerprinting with Vulnerability Research
CVE ID
looks like `CVE-2023-12345` and serves as a unique reference number for a specific vulnerability.
Lesson 1271CVE Databases and Vulnerability FeedsLesson 2476CVE Assignment and Public Disclosure
CVE Numbering Authorities (CNAs)
are authorized organizations that assign CVE IDs.
Lesson 2476CVE Assignment and Public Disclosure
CVSS base score
(technical severity)
Lesson 2452Risk-Based Prioritization Frameworks
CVSS score limits
Fail builds with vulnerabilities scoring above 7.
Lesson 2052Security Gates and Failure Policies
CVSS Scores
The Common Vulnerability Scoring System provides a standardized severity rating (0-10).
Lesson 1602Vulnerability Assessment and PrioritizationLesson 1613Vulnerability Database and CVE Mapping
CWPP Integration
Stream runtime alerts from container or VM agents—suspicious processes, file integrity changes, network anomalies—directly into SIEM.
Lesson 1884SIEM Integration with Cloud Security Tools
Cybercriminals
Financially motivated actors ranging from lone operators to organized crime syndicates
Lesson 2337Threat Actors and Attribution

D

DAC
Flexible environments where users need autonomy
Lesson 19Access Control Models: DAC, MAC, and RBAC
DAC (Discretionary)
works well for personal content where users own resources (like Google Drive).
Lesson 802Choosing and Implementing Access Models
DAC + RBAC
Users own resources but organizational roles set boundaries
Lesson 802Choosing and Implementing Access Models
DAI
uses the DHCP snooping binding table to validate every ARP packet.
Lesson 415DHCP Snooping and DAI
Daily briefings
during active testing
Lesson 2095Testing Windows and Schedules
Damage
How bad would an exploit be?
Lesson 72DREAD Risk Rating Model
DANE
(DNS-Based Authentication of Named Entities) uses **DNSSEC-signed DNS records** to publish keys directly.
Lesson 2962Key Discovery and Distribution
Dangerous characters
are neutralized before reaching the browser
Lesson 1247Auto-Escaping Mechanisms and Configuration
Dark Web Discussions
provide early warning signals.
Lesson 2449Threat Intelligence Integration
Dashboards
that visualize drift by severity, resource type, and age
Lesson 2027Drift Reporting and Exception ManagementLesson 2060Feedback Loops and Metrics
Dashboards and Reporting
Provides visualization for compliance, investigations, and executive reporting
Lesson 2314What is a SIEM and Why Organizations Need It
DAST Gates
Configure runtime test failures based on exploitable vulnerabilities detected in running applications—for example, blocking deployment if SQL injection or XSS vulnerabilities are discovered.
Lesson 2065Automated Security Gates in CI/CD
Data access layer
– Database-level permissions and row-level security
Lesson 838Access Control Defense StrategyLesson 1244Database Access Layer Security Patterns
Data access patterns
(which users access which S3 buckets, when)
Lesson 1897Baseline Establishment for Cloud Resources
Data affected
50,000 customer records (names, emails, purchase history)
Lesson 2431Executive Summary and Business Impact
Data at rest
Encrypting stored data in databases, object storage, or volumes
Lesson 1689Data Protection Responsibilities
Data backup and retention
(where applicable): Some SaaS providers offer limited recovery windows.
Lesson 1688Shared Responsibility in SaaS
Data Breach
Legal notification timelines, forensic preservation, customer communication
Lesson 2372IR Playbooks and Runbooks
Data breaches involving minors
Up to **$7,500 per child affected**
Lesson 2568CPRA Amendments and Enforcement
Data center interconnection
Linking production and backup data centers
Lesson 468Site-to-Site VPNs
Data channel
Carries your actual encrypted traffic.
Lesson 486OpenVPN Architecture and Components
Data channel establishment
Symmetric cipher begins encrypting traffic using those keys
Lesson 487OpenVPN Cryptographic Configuration
Data classification
is the systematic process of organizing data into categories based on sensitivity, regulatory requirements, and business impact if compromised.
Lesson 1801Data Classification FundamentalsLesson 2033Data Flow Diagrams for Security
Data classification and handling
You determine what data goes into the SaaS application and whether it's appropriate for that service's security level.
Lesson 1688Shared Responsibility in SaaS
Data Collection Assessment
is the systematic process of examining every piece of personal data your system collects and asking: "Do we *really* need this?
Lesson 2896Data Collection Assessment
Data controllers
Entities that determine *why* and *how* personal data is processed
Lesson 2551GDPR Overview and Scope
Data discovery and staging
is the methodical process of locating valuable information—credentials, customer databases, intellectual property, financial records—and preparing it for removal while staying under the radar.
Lesson 2125Data Discovery and Staging
Data encryption
(in-transit within cluster, at-rest)
Lesson 1682Container as a Service Security
Data Encryption Parameters
Unlike Phase 1 (which used IKE), Phase 2 establishes ESP or AH protocols to actually protect the data flowing through the tunnel.
Lesson 480Internet Key Exchange (IKE) Phase 2
Data Encryption Standard (DES)
is a symmetric block cipher adopted in 1977 that encrypts 64-bit blocks of data using a 56-bit key.
Lesson 87DES: Design and Weaknesses
Data Events
capture data plane operations: reading S3 objects, invoking Lambda functions.
Lesson 1871CloudTrail for API Activity Monitoring
Data Execution Prevention (DEP)
or **No-eXecute (NX)** bits that mark stack and heap memory as non-executable.
Lesson 2109Return-Oriented Programming (ROP)Lesson 2112Bypassing DEP, ASLR, and Stack Canaries
Data exfiltration patterns
Unusually large outbound transfers to rare destinations
Lesson 2410Network Flow Analysis
Data flow
through the application (tracking tainted user input)
Lesson 1378IAST Fundamentals and How It Works
data flow analysis
they trace how data moves through your program from sources (where data enters) to sinks (where it's used).
Lesson 1360Abstract Syntax Trees and Data Flow AnalysisLesson 3009Static Application Security Testing (SAST) Deep Dive
Data Flow Diagram (DFD)
is a visual blueprint of your system that shows how information moves through it.
Lesson 42Creating a Data Flow Diagram (DFD)Lesson 57Tampering with Data ThreatsLesson 2637Creating Architecture Data Flow Diagrams
Data Flow Diagrams
or applied **STRIDE** alone, you might have missed threats visible only to someone else.
Lesson 76Collaborative Threat Modeling Workshops
Data flow path
showing how tainted input reaches a sink
Lesson 1367Interpreting and Triaging SAST Results
Data format handling
Can your playbook parse different log formats?
Lesson 2332Playbook Testing and Validation
Data handling rules
How to store, transmit, and dispose of sensitive information
Lesson 2489Acceptable Use Policy (AUP)
Data in transit
Ensuring TLS/SSL for data moving between services
Lesson 1689Data Protection Responsibilities
Data integrity issues
can corrupt your database or business logic
Lesson 1036API10:2023 - Unsafe Consumption of APIs
Data leakage
Cached sensitive content might persist longer than intended
Lesson 1862CDN Architecture and Threat ModelLesson 2854LLM Architecture and Attack Surface
Data Leakage Threats
Sensitive information escaping through logs, caches, screenshots, keyboard buffers, backups, or insecure storage.
Lesson 2733Mobile App Threat Modeling
Data leaks
to expose internal communications or embarrassing information
Lesson 50Motivations: Hacktivism and Ideological Attacks
Data Link layer
Ethernet header added (MAC addresses)
Lesson 374Understanding Network Packets and Protocol Layers
Data loss attacks
An attacker can fill your origin's storage with garbage data, forcing the browser to evict legitimate user data
Lesson 1079Storage Quota and Eviction Policies
Data mapping
is the systematic process of identifying and documenting *where* personal data originates, *how* it moves through systems, *where* it's stored, *who* processes it, and *where* it ultimately goes —whether deleted, archived, or shared with third part...
Lesson 2889Data Mapping for PIAs
Data masking
replaces original sensitive values with structurally similar but fictitious data.
Lesson 2908Data Masking and Tokenization
data poisoning
targets the model during its most vulnerable phase: *training*.
Lesson 2818Data Poisoning Attack FundamentalsLesson 2872ML Supply Chain Threat Landscape
Data portability tools
letting users export their information
Lesson 2886Visibility, Transparency, and User-Centricity
Data processors
Entities that process data *on behalf of* controllers
Lesson 2551GDPR Overview and Scope
Data protection
Encryption at rest, encryption in transit, access controls, and backup systems supporting **Confidentiality** and **Availability** from the **CIA Triad**
Lesson 23Defense-in-Depth PhilosophyLesson 2656Redundant Controls and Failure Tolerance
Data Protection API
allows apps to classify data sensitivity, determining when files become accessible (after first unlock, while unlocked, etc.
Lesson 2701iOS Security Architecture OverviewLesson 2704Data Protection API and Keychain
Data Protection Impact Assessments
(DPIAs from lesson 2558) for high-risk processing
Lesson 2561Accountability and Records of Processing
Data protection layers
Encrypt data at rest, in transit, and in use.
Lesson 2671Defense in Depth Through Design
Data remains encrypted
in memory, protected from privileged access
Lesson 2927Trusted Execution Environments
Data residency
refers to the physical location where data is stored.
Lesson 1982GDPR and Data Sovereignty Requirements
Data Return
Contractually require vendors to return all data in agreed formats (encrypted archives, specific file types).
Lesson 2542Vendor Offboarding and Data Recovery
Data segmentation and classification
ensures you store, process, and protect information according to its sensitivity—preventing overexposure of critical assets while avoiding wasteful security theater on public data.
Lesson 2652Data Segmentation and Classification
Data sharing arrangements
with external partners or across borders
Lesson 2888PIA Triggers and Scoping
Data source
Windows Security Event 4656 or Sysmon Event ID 10
Lesson 2181ATT&CK for Detection and Analytics
Data sources
(HTTP requests, file uploads, API calls)
Lesson 1380Instrumentation Agents and Runtime Monitoring
Data sovereignty
Which country's laws govern your evidence?
Lesson 1922Cloud Forensics Tools and Legal Considerations
Data storage and encryption
While providers encrypt data, you usually cannot choose encryption algorithms, manage keys directly (unless using BYOK features), or audit cryptographic implementations.
Lesson 1679SaaS Security Limitations
Data storage and transmission
how is sensitive information protected?
Lesson 78Architecture Review and Threat Identification
Data Store
Holds contextual data (user roles, resource attributes, etc.
Lesson 3019Open Policy Agent (OPA) Introduction
Data tagging and metadata
Label datasets with their collection purpose at ingestion.
Lesson 2900Purpose Limitation in System Design
Data tampering
Attackers can modify stored data to bypass client-side validation, manipulate application state, or escalate privileges
Lesson 1072Client-Side Storage Overview and Threat Model
Data theft
App A cannot read App B's saved passwords, tokens, or user data
Lesson 2713Android Application Sandboxing
Data Type
Ensure the input is the expected primitive type (integer, string, boolean, decimal).
Lesson 1153Data Type and Format Validation
Data type compatibility
Columns must be compatible types (string to string, etc.
Lesson 578Union-Based SQLi Data Extraction
Database → Application Logic
Even data retrieved from your own database if it originally came from users
Lesson 1149Trust Boundaries and Data Flow
Database access
On-premises applications securely query cloud-hosted databases without exposing them to the internet.
Lesson 472VPN Use Case: Secure Cloud ConnectivityLesson 2628Fail-Safe Defaults and Secure Defaults
Database access boundaries
Trusted, parameterized queries should be the *only* way business logic talks to databases
Lesson 1212Separation of Concerns for Security Boundaries
Database access layers
Applications don't query databases directly—they go through a controlled service
Lesson 29Security Choke Points
Database audit logs
Confirm all connections use encrypted channels
Lesson 1780Transit Encryption Monitoring and Compliance
Database constraints
– final integrity check at storage layer
Lesson 1209Defense in Depth Through Layered Validation
Database Encryption Key (DEK)
Encrypts the actual data pages
Lesson 1793Transparent Data Encryption (TDE)
Database error messages
(leak schema details)
Lesson 1040Error Handling and Information Disclosure
Database Errors
Raw SQL errors reveal table names, column structures, and database types, making SQL injection attempts easier.
Lesson 1007GraphQL Error Handling and Information Leakage
Database indexing
Fixed-length hashes work perfectly as database keys or in data structures that require consistent- sized values.
Lesson 204Fixed-Length Output Property
Database layer
Constraints and type checking as a final safety net
Lesson 1152Validation Layers and Defense in Depth
Database parameter groups
that enforce SSL connections
Lesson 1778Database Connection Encryption
Database records
(order status, workflow stage)
Lesson 911Understanding Application State and Workflow
Database Security
Your FIM baseline database (the "known-good" fingerprints) must be read-only to normal processes.
Lesson 1507Protecting FIM Infrastructure
Database Zone
Database servers, accessible only from Server Zone (10.
Lesson 450Internal Network Zoning
Databases
(SQL servers, MongoDB instances, cloud storage buckets)
Lesson 2125Data Discovery and Staging
DataContractSerializer
and similar XML-based deserializers can also be exploited when configured to accept arbitrary types rather than a safe allowlist.
Lesson 1185Insecure Deserialization in .NET
Dataset Compromise
Poisoning widely-used training datasets (scraped web data, benchmark sets) means hundreds of downstream models inherit the backdoor automatically.
Lesson 2823Supply Chain Poisoning in ML Pipelines
Days 0-30
CloudTrail logs in standard storage, instantly queryable
Lesson 1874Log Retention and Lifecycle Policies
Days 31-365
Moved to infrequent access storage, slower retrieval
Lesson 1874Log Retention and Lifecycle Policies
DCS
(Distributed Control Systems) for process automation
Lesson 2803OT and ICS Security Fundamentals
DDE
(a legacy protocol for inter-application communication).
Lesson 980Office Macro and DDE Exploits
DDE exploits
are even sneakier.
Lesson 980Office Macro and DDE Exploits
DDoS resilience
Distributes attack surface across independent infrastructure
Lesson 1834Multi-AZ Subnet Design for Resilience
De-identification
is the broader umbrella term for any technique that removes or obscures personally identifiable information, including both anonymization and pseudonymization approaches.
Lesson 2902Anonymization vs. Pseudonymization
Dead Letter Queue
is a separate queue or topic where failed events are routed after all retry attempts are exhausted.
Lesson 1958Dead Letter Queues and Error Handling
Dealer trust
If secret sharing uses a single dealer, they temporarily see the entire secret.
Lesson 266Threshold Cryptography Applications and Security
Deauthenticate users
from the real AP using techniques you've learned, forcing reconnection to the stronger evil twin
Lesson 534Evil Twin Attacks: Mechanics and Execution
Deauthenticating
clients from the real AP (forcing disconnect)
Lesson 535Evil Twin Attack Techniques and Tools
Deauthentication floods
(often precede evil twin attacks)
Lesson 536Detecting Rogue Access Points
Deauthentication frames
tell a client "you're no longer authenticated, disconnect immediately"
Lesson 527Deauthentication and Disassociation Attacks
Deauthentication/disassociation floods
– unusually high volumes of management frames
Lesson 550Wireless Packet Capture and Analysis
Debug approach
Compare Phase 1 and Phase 2 proposals on both endpoints.
Lesson 484IPsec Troubleshooting and Common Misconfigurations
Debug lockout modes
Use processor security features to disable JTAG after initial programming
Lesson 2776Debug Interfaces and JTAG Security
Debug logging
that dumps request/response bodies or variable values
Lesson 1354Preventing Secrets in Logs and Error Messages
Debug overrides
(to allow proxy tools during testing)
Lesson 2719Android Certificate Pinning and Network Security
Debug TLS connections
in controlled environments
Lesson 381Decrypting TLS Traffic with Private Keys
Debugging exposure
Developers might cache authentication tokens or PII during development, forgetting to remove caching logic
Lesson 1076Cache API and Service Worker Storage
Decapping
Chemically removing chip packaging to expose the silicon die, enabling microscope-assisted reverse engineering or data extraction
Lesson 2775Physical Tampering and Anti-Tamper Mechanisms
Decapsulation
Alice unlocks the box with her private key to recover Bob's secret and derives the same shared secret
Lesson 270CRYSTALS-Kyber: Post-Quantum Key Encapsulation
Decentralization
No single trusted third party controls the computation
Lesson 255Introduction to Secure Multi-Party Computation (MPC)
Decision
If clean, move to permanent storage; if infected, reject and log
Lesson 961Virus Scanning and Malware Detection Integration
Decision Engine
Evaluates queries against policies and data
Lesson 3019Open Policy Agent (OPA) Introduction
Decode all encoding layers
(URL encoding, HTML entities, Unicode normalization)
Lesson 1166Defense: Canonical Form Validation Strategies
Decoder
is your Swiss Army knife for transforming data formats.
Lesson 2215Advanced Burp Features and Workflows
Decompile
Use tools to convert the binary back into readable code
Lesson 2731Repackaging and Code Injection Attacks
Decomposed form
(NFD): Base letter "e" (`U+0065`) + combining acute accent (`U+0301`)
Lesson 1167Unicode Normalization and Equivalence
Decoy Scanning
sends packets from fake IP addresses alongside your real one.
Lesson 347Firewall and IDS EvasionLesson 370Decoy Scanning and IP Spoofing
Decrypt access
Separate KMS key permissions control who can decrypt encrypted logs
Lesson 1875Log Encryption and Access Controls
Decrypt packets
by exploiting the repeated key stream in protocols like AES-GCMP
Lesson 528KRACK Attack on WPA2
Decrypt traffic
by comparing encrypted packets
Lesson 516KRACK Attack and WPA2 Vulnerabilities
Decrypted secrets
Passwords, encryption keys, and credentials in plaintext
Lesson 2389Memory Forensics Fundamentals
Decryption happens only
on the recipient's device using their private key
Lesson 2939What is End-to-End Encryption (E2EE)
Decrypts blocks on-the-fly
when your instance reads data
Lesson 1770Encryption for Block Storage and Virtual Disks
Dedicated fuzzing infrastructure
Long-running clusters that build corpora over days and weeks
Lesson 1394Continuous Fuzzing and Integration
Dedicated Hosts
give you an entire physical server with visibility into sockets, cores, and host IDs.
Lesson 1815Network Isolation with Dedicated Tenancy
Dedicated Instances
run on hardware dedicated to your account, but AWS/Azure/GCP still manages placement.
Lesson 1815Network Isolation with Dedicated Tenancy
Dedicated parsers
are purpose-built for specific formats.
Lesson 1181Alternative Parsing Strategies
Dedicated QA/staging environments
IAST runs continuously in pre-production
Lesson 1382IAST Deployment Models and Performance Impact
Dedicated regulatory authority
with rulemaking power
Lesson 2568CPRA Amendments and Enforcement
Dedicated scanner service accounts
(not admin personal accounts)
Lesson 2436Authenticated Scanning and Credentialed Checks
Dedicated security page
Host your full VDP at `https://yourdomain.
Lesson 2472Creating and Publishing a VDP
Dedicated triage personnel
separate from remediation teams
Lesson 2486Scaling and Optimizing Programs
Deduplication
eliminates redundant entries, keeping the most accurate or severe instance.
Lesson 1309Vulnerability Aggregation and DeduplicationLesson 1402Security Test Results Management
Deep arrays
JSON arrays nested 10,000 levels deep
Lesson 1188XML and JSON Parser Vulnerabilities
Deep Content Inspection
Use specialized libraries to parse the file structure and examine what's embedded.
Lesson 962Document Format Validation for Office Files
Deep inspection
Running on the endpoint itself, agents access system internals that **Authenticated Scanning** can reach but with persistent presence.
Lesson 2437Agent-Based Scanning
deep packet inspection
sees *what* the traffic actually is, not just *where* it's going.
Lesson 420Next-Generation Firewalls (NGFW)Lesson 1853Cloud Firewall Architectures
Deep-dive
Load relevant PCAP slices into Wireshark for protocol-level investigation
Lesson 2416Network Forensics Tools and Workflows
Default Deny Principle
means your firewall's baseline rule is to block *all* traffic unless you've explicitly allowed it.
Lesson 428Default Deny PrincipleLesson 435Rule Review and MaintenanceLesson 452East-West Traffic Control
Default Encryption
Ensures all objects are encrypted at rest, even if not specified during upload.
Lesson 1782S3 Bucket Security Fundamentals
Default encryption settings
that automatically apply encryption to all new objects
Lesson 1790Storage Service Encryption Integration
Default RADIUS shared secrets
left unchanged
Lesson 547802.1X Security Considerations and Attacks
Default VLAN usage
Never use VLAN 1 for production traffic—it's a security risk and management nightmare.
Lesson 2649VLAN and Subnet Segmentation
Default-deny is safer
Anything you didn't think of is automatically rejected
Lesson 1150Allowlist vs Denylist Approaches
Default-deny principle
Most firewalls end with an implicit or explicit "deny all" rule at the bottom, so anything not explicitly allowed gets blocked.
Lesson 427Rule Ordering and Priority
Defeat secure boot
Make verification routines return "success" without checking
Lesson 2774Fault Injection Attacks
Defeat SSL pinning
Intercept certificate validation to accept any cert
Lesson 2726Dynamic Analysis and Runtime Instrumentation
Defensibility
in legal or compliance contexts
Lesson 2082Penetration Testing Methodologies
Defensive coverage measurement
means mapping your security controls (EDR, SIEM rules, network sensors, etc.
Lesson 2185Measuring Defensive Coverage with ATT&CK
Defensive Improvements
measure tangible changes implemented after the exercise.
Lesson 2175Measuring Exercise Effectiveness
Defensive wins
Celebrate successful detections and response actions
Lesson 2174Debrief and Knowledge Transfer
Define clear trigger conditions
to avoid false positive actions
Lesson 1911Cloud IR Playbooks and Automation
Define detection logic
(what pattern indicates malicious use vs legitimate?
Lesson 2181ATT&CK for Detection and Analytics
Define organizational risk appetite
– What level of security risk is acceptable?
Lesson 2487Purpose and Scope of Information Security Policy
Define security requirements
– Does the system need encryption?
Lesson 77Threat Modeling in Requirements Phase
Define the baseline
Select a compliance framework (PCI-DSS, HIPAA, CIS Level 1/2, custom policy)
Lesson 1621Compliance Scanning and Validation
Define the structure
Use format specifications (JSON schemas, protocol RFCs, file format specs) or reverse-engineer the grammar
Lesson 1390Structured Input Fuzzing
Define the threat
(what attack are you detecting?
Lesson 2319Use Cases and Detection Content Development
Defined
Documented processes are in place and generally followed
Lesson 34Security Maturity Models and Assessment
Defines availability commitments
explicitly (e.
Lesson 2593Availability Criterion
Degraded performance
Noticeably slower speeds (attackers relay your traffic)
Lesson 537Detecting Evil Twin Attacks from Client Perspective
Delays and throttling
`--delay=2` adds pauses between requests to avoid rate-limiting triggers
Lesson 590SQLMap Evasion and Tampering Scripts
Delegated administration
Allow team leads to manage IAM without risking full admin escalation
Lesson 1707IAM Boundaries and Permission Guardrails
Delegation
Allow users to assume roles but limit what they can do through session policies
Lesson 1732Role Chaining and Session Policies
DELETE /api/documents/abc123
Delete files you shouldn't access
Lesson 817IDOR in REST APIs and GraphQL
Delete records
`DELETE FROM audit_logs`
Lesson 580Stacked Queries and Multiple Statements
Delete resource-heavy dependencies
(load balancers, NAT gateways, instances)
Lesson 1818VPC Deletion and Cleanup Security
Delete/modify access
Heavily restricted; often prohibited entirely for compliance
Lesson 1875Log Encryption and Access Controls
Deleted/draft messages
often exposing intent or hidden coordination
Lesson 2406Email and Communication Forensics
Deletion Obligation
Upon request, the vendor must delete consumer data (unless legally retained)
Lesson 2567Service Provider and Third-Party Contracts
Deletion Verification
Demand certificates of destruction following your data retention policies.
Lesson 2542Vendor Offboarding and Data Recovery
Deliver malware links
disguised as legitimate notifications
Lesson 1087Web Push Notifications and Permissions
Delivery mechanisms
that might execute uploaded content
Lesson 945File Upload Attack Surface and Risk Assessment
Delta analysis
Rather than rebuilding from scratch, identify what changed: new components, modified trust boundaries, altered data flows.
Lesson 2644Iterating Threat Models with Architecture Changes
Delta Chat
implements Autocrypt to transform email into a WhatsApp-like experience.
Lesson 2966Modern Alternatives: Autocrypt and Delta Chat
Delta CRLs
only contain changes since the last full CRL—like incremental backups versus full backups— reducing download size and bandwidth.
Lesson 191Certificate Revocation Lists (CRLs)
Demilitarized Zone (DMZ)
is a separate network segment that sits between the internet and your internal network.
Lesson 423Demilitarized Zones (DMZ)
Demographics
age, gender, ethnicity, marital status
Lesson 2904Quasi-Identifiers and Re-identification Risk
Denial of service concerns
Rejecting too strictly might lock out legitimate users
Lesson 1155Rejecting vs Sanitizing Invalid Input
Denied attempts
Failed cross-account calls often indicate reconnaissance
Lesson 1743Cross-Account Access Auditing
Denoising filters
(like median filters or deep learning denoisers) explicitly remove patterns that look like noise— which adversarial perturbations essentially are, from a signal-processing perspective.
Lesson 2850Input Transformation Defenses
deny by default
every action should require explicit authorization, not just the "sensitive" ones.
Lesson 838Access Control Defense StrategyLesson 839Deny by Default Principles
Deny or grant access
based on the check
Lesson 821Preventing IDOR with Access Control Checks
Deny-on-create rules
that reject resource creation without required tags
Lesson 1997Mandatory Tags for Security and Compliance
Denylist (Negative Validation)
Define what is explicitly *forbidden* and allow everything else.
Lesson 1150Allowlist vs Denylist Approaches
denylists
(blocklists), which try to enumerate all possible bad inputs—an impossible task against creative attackers.
Lesson 669Input Validation and SanitizationLesson 1653Seccomp ProfilesLesson 1860Geo- Blocking and IP Reputation
Departmental heat maps
showing organizational weak spots
Lesson 2252Social Engineering Reporting and Metrics
Dependabot alerts
Notifications when vulnerabilities are found
Lesson 1303GitHub Dependency Scanning and Dependabot
Dependabot security updates
Auto-PRs to fix vulnerabilities
Lesson 1303GitHub Dependency Scanning and Dependabot
Dependabot version updates
Auto-PRs to update dependencies based on schedule
Lesson 1303GitHub Dependency Scanning and Dependabot
Dependencies
Which nodes enable multiple attack paths (high-value targets)?
Lesson 2641Architecture-Level Attack Trees
Dependency coverage
How many components undergo SCA scanning
Lesson 3017Test Coverage and Effectiveness Metrics
Dependency depth
measures how many layers deep your dependencies go.
Lesson 1259Understanding Software Dependencies and Transitive Risk
Dependency graph
Shows all your dependencies visually
Lesson 1303GitHub Dependency Scanning and Dependabot
Dependency management
– third-party libraries and packages
Lesson 1687Shared Responsibility in PaaS
Dependency pinning
locks exact versions in `requirements.
Lesson 2875Dependency Vulnerabilities in ML Frameworks
Dependency risk assessment
Identify unmaintained or high-risk components
Lesson 1276What is an SBOM and Why It Matters
Dependency tracking
(understand transitive dependencies)
Lesson 1646Software Bill of Materials (SBOM) for Containers
Deploy
patches to affected systems (2-4 weeks)
Lesson 2077Coordinated Disclosure Timelines
Deploy new keys
using your key rotation procedures
Lesson 318Key Revocation and Compromise Response
Deploy patch to staging
Apply updates to isolated test systems first
Lesson 2455Patch Testing and Staging Environments
Deploy the configuration change
– new connections use the new user, old connections continue with the old user
Lesson 1347Database Credential Rotation
Deploy the student
with normal temperature
Lesson 2849Defensive Distillation
Deploy time
IaC validation, DAST against ephemeral environments
Lesson 2057Continuous Security Integration
Deploy to test environment
using your IaC templates
Lesson 2020Testing and Validation of IaC Security Controls
Deployment Phase
Use code signing, enable obfuscation, configure app transport security, implement root/jailbreak detection, and establish secure update mechanisms.
Lesson 2732Secure Mobile Development Lifecycle
Deployment Scale
Organizations deploy thousands or millions of identical IoT devices.
Lesson 2750IoT Attack Surface and Unique Challenges
Deployment Strategy
Use blue-green deployments or canary releases even for emergency patches.
Lesson 2069Vulnerability Response and Hotfix Process
Deployment to staging
DAST and IAST test running applications
Lesson 1395Security Testing in CI/CD Fundamentals
Deploys to staging
Spins up your application in an ephemeral or dedicated test environment (containers, VMs, or cloud instances)
Lesson 1401Dynamic Testing and DAST in Pipelines
Deprecated endpoints
that were removed from newer versions for security reasons
Lesson 998API Versioning and Legacy Endpoint Vulnerabilities
Deprecation
is the controlled process of retiring those old versions safely.
Lesson 1038API Versioning and Deprecation
Depth limits
How many clicks deep to explore
Lesson 1374DAST Configuration and Scope Management
DER
is the raw binary encoding of certificate data.
Lesson 179Certificate Encoding: PEM, DER, PKCS#12, and Formats
Derive from user password
Requires user to re-enter password
Lesson 1078Client-Side Encryption for Storage
Description
What control failed or is missing?
Lesson 2549Audit Reporting and Communication
Descriptive
Names should clearly indicate the permission granted
Lesson 761OAuth 2.0 Scopes and Consent
Deserialization
is the reverse: reading that stored format and reconstructing the original object in memory.
Lesson 1183Deserialization Fundamentals and Attack Surface
Deserialization Vulnerabilities
appear frequently in libraries that handle serialized data formats.
Lesson 1260Common Vulnerability Types in Dependencies
Design effectiveness
asks: *Is this control capable of preventing or detecting the risk it's meant to address?
Lesson 2547Control Testing Methodologies
Design Phase
Apply threat modeling (STRIDE, attack trees) to your architecture.
Lesson 2732Secure Mobile Development Lifecycle
Desired key length
– how many bytes you need
Lesson 138PBKDF2: Password-Based Key Derivation
Destination IP address
– Where is it going?
Lesson 417Packet Filtering Firewalls
Destination limits
Permit access only to the specific servers or services needed
Lesson 430Least Privilege Network Access
Destination NACL
Does it allow inbound traffic on the target port *and* outbound ephemeral responses?
Lesson 1826Common Misconfigurations and Troubleshooting
Destination oddities
Traffic to suspicious IPs or domains
Lesson 382Identifying Malicious Traffic Patterns
Destination Security Group
Does it permit inbound traffic from the source?
Lesson 1826Common Misconfigurations and Troubleshooting
Destruction
After report delivery and client acceptance, securely delete all sensitive data using methods like secure erase or physical destruction.
Lesson 2096Data Handling and ConfidentialityLesson 2885End-to-End Security and Lifecycle Protection
Detached signatures
keep the signature in a separate file from the data being signed.
Lesson 232Detached Signatures and Signature FormatsLesson 2960OpenPGP Message Format and Operations
Detailed data flows
and processing activities
Lesson 2893PIA Documentation and Review
Detailed server-side logging
Log everything internally—exact validation failures, attempted payloads, timestamps, source IPs.
Lesson 1156Validation Error Handling
Detailed validation failures
(enable enumeration attacks)
Lesson 1040Error Handling and Information Disclosure
Detect change
through architecture review boards or automated diagram comparisons
Lesson 2644Iterating Threat Models with Architecture Changes
Detect dangerous patterns
(hardcoded secrets, SQL concatenation, unsafe deserialization)
Lesson 2037Security-Focused Code Review Fundamentals
Detect exceptions
– Did someone disable encryption for "testing" and forget to re-enable it?
Lesson 1780Transit Encryption Monitoring and Compliance
Detect incompatible combinations
(e.
Lesson 3032License Compliance Scanning
Detect malicious behavior
such as data exfiltration or unauthorized permissions
Lesson 2722Introduction to Mobile App Reverse Engineering
Detect Orphaned Resources
Identify resources lacking ownership tags or those whose tagged owner has left the organization.
Lesson 2001Tag-Based Resource Inventory and Discovery
Detect over-permissioning
Compare granted permissions against *actual API calls* made by identities
Lesson 1749Access Analyzer and Unused Access Detection
Detect spoofing
Spot unauthorized IPs failing authentication
Lesson 2303DMARC Reporting and Analysis
Detect symlinks during processing
Check if uploaded files are symlinks and reject them
Lesson 969Symbolic Link Attacks
Detect threats
Identify malware signatures, exploit attempts, privilege escalations, and anomalous behavior
Lesson 1930Instance Monitoring and Runtime ProtectionLesson 2305What is a Security Operations Center (SOC)?
Detect unauthorized changes
to critical system files, configurations, and executables
Lesson 1500File Integrity Monitoring Fundamentals
detect-secrets
, and **Talisman** provide pre-commit hook frameworks.
Lesson 1351Pre-commit Hooks for Secret PreventionLesson 3031Secret Detection in Pipelines
Detectability
Revealing that certain data or activities exist (e.
Lesson 70LINDDUN for Privacy Threat Modeling
Detection Engine
– The heart of Snort.
Lesson 458Snort: Architecture and Rule Syntax
Detection Engineering
– Are you relying on vendor defaults, or building custom detection logic?
Lesson 2313SOC Maturity Models
Detection gaps
Blue team identifies what they *should have* seen but didn't
Lesson 2174Debrief and Knowledge TransferLesson 2356Detection Coverage Measurement
Detection layer
Monitor CloudTrail and application logs for metadata access
Lesson 1939IMDS Security Best Practices and Monitoring
Detection levels
(1-5) control thoroughness:
Lesson 587SQLMap Detection and Fingerprinting Techniques
Detection Logic
Your script should test injection points (URL parameters, form fields, headers) with payloads like `' OR '1'='1`, `1' AND SLEEP(5)--`, and union-based probes.
Lesson 593Custom SQL Injection Automation ScriptsLesson 2002Tag Governance and Remediation WorkflowsLesson 2181ATT&CK for Detection and Analytics
Detection Quality
Request a trial with your actual environment.
Lesson 2011CSPM Vendor Selection and Deployment
Detection rate
Vulnerabilities found vs.
Lesson 3017Test Coverage and Effectiveness Metrics
Detection Rates
track what percentage of red team techniques were caught by the blue team.
Lesson 2175Measuring Exercise Effectiveness
Detection rule sharing
Give blue team actual queries and signatures
Lesson 2174Debrief and Knowledge Transfer
Detection source
GuardDuty findings route differently than VPC Flow Log anomalies
Lesson 1903Alert Routing and Escalation Workflows
Detection systems
(cameras, motion sensors, alarms)
Lesson 2279Physical Access Control Models and Zones
Detection triggers
What metrics indicate an attack (traffic spikes, error rate increases, geo-blocking hits from lesson 1860)
Lesson 1861DDoS Response and Incident Management
Detection-focused panels
surface active threats:
Lesson 2321Dashboards and Visualization
Detective + Technology C
SIEM monitoring for unusual access patterns
Lesson 2658Control Diversity: Types and Technologies
Detective controls
identify attacks in progress or after they occur.
Lesson 27Security Control TypesLesson 1999Automated Tag Enforcement and Validation
Determine intent
Accidental share or malicious exfiltration?
Lesson 1808DLP Monitoring and Incident Response
Determine sensitivity
How much could one person's data change the result?
Lesson 2915The Laplace Mechanism
Determine the blast radius
What systems did this secret grant access to?
Lesson 1357Secret Leakage Response Procedures
Deterministic or randomized
Supports both modes depending on requirements
Lesson 271CRYSTALS-Dilithium: Post-Quantum Digital Signatures
Deterrent + Technology E
Legal warnings displayed before access
Lesson 2658Control Diversity: Types and Technologies
Deterrent controls
discourage attackers from attempting breaches.
Lesson 27Security Control Types
Develop and test
a fix (varies widely)
Lesson 2077Coordinated Disclosure Timelines
Develop configuration standards
for all system components that address known security vulnerabilities
Lesson 2572Requirement 2: Secure Configurations
Developer awareness
The 2017 spotlight drove widespread fixes
Lesson 1202The Rise and Fall of XXE and XML Security
Developer self-service
Let developers create roles, but only with permissions within a safe boundary
Lesson 1707IAM Boundaries and Permission Guardrails
Developer training
on secure IaC practices
Lesson 2013Secrets in IaC: Detection and Prevention
Developing
Some policies exist but aren't consistently followed
Lesson 34Security Maturity Models and Assessment
Development and testing
environments where convenience matters more than elaborate controls
Lesson 1318Environment Variables as a Secrets Storage Mechanism
Development environments
Use reconciliation loops on a schedule
Lesson 2025Automated Drift Remediation Strategies
Development leads
confirm code quality and basic security practices
Lesson 2064Security Sign-Off and Approval Workflows
Development libraries
`-dev` or `-devel` packages
Lesson 1408Removing Unnecessary Software Packages
Development Phase
Enforce secure coding standards—proper use of KeyStore/Keychain, input validation, avoiding hardcoded secrets, implementing certificate pinning, and using platform security APIs correctly.
Lesson 2732Secure Mobile Development Lifecycle
Development vs. Production
Debug interfaces should be **fully functional during development** but **disabled or secured in production devices**.
Lesson 2776Debug Interfaces and JTAG Security
Development/staging replicas
with realistic data and configurations
Lesson 3051Testing and Validating Remediation Actions
Device and Browser Fingerprinting
creates unique profiles.
Lesson 1859Bot Management and Detection
Device attestation
proving to remote servers that your hardware is genuine
Lesson 307Trusted Platform Modules (TPMs)
Device backups
Messages might persist in cloud/local backups
Lesson 2956Disappearing Messages and Perfect Forward Secrecy
Device compliance
(patch level, encryption, endpoint security status)
Lesson 2686BeyondCorp Model and Zero Trust Access
Device Enrollment
– The entire device is managed (common for company-owned devices).
Lesson 2742Mobile Device Management (MDM) Fundamentals
Device Hardening
means disabling Bluetooth when not needed, just as you lock your car when parked.
Lesson 560Bluetooth Security Best Practices
Device identification
What systems exist?
Lesson 349Network Mapping Fundamentals
Device identifiers
Phone numbers, device IDs, MAC addresses
Lesson 2974What is Metadata and Why It Matters
Device impersonation
Pretend to be a master controller or sensor
Lesson 2787BACnet and Modbus Protocol Security
Device inventory
(is this a known, managed device?
Lesson 2686BeyondCorp Model and Zero Trust Access
Device linking
typically works through an authenticated channel.
Lesson 2955Device Management and Multi-Device Security
Device registration/enrollment
Establishing baseline device identity
Lesson 2678Device Trust and Endpoint Security
Device state
Is the device managed, compliant, and recognized?
Lesson 1747Conditional Access and Context-Aware MFA
Device switching
Sudden change in user agent mid-session
Lesson 737Session Monitoring and Anomaly Detection
Device types
`default password` or `webcam`
Lesson 333Shodan and Internet-Wide Scanning Databases
Device usage
BYOD rules, company laptop standards, mobile device expectations
Lesson 2489Acceptable Use Policy (AUP)
Device-to-device verification
Your existing phone authenticates the new laptop (e.
Lesson 2947E2EE Backup and Multi-Device
Dex/code integrity checks
Calculate checksums of your compiled code and verify they match expected values
Lesson 2718Android Root Detection and Anti-Tampering
DFD sketches
during design discussions or apply **STRIDE per Element** during code reviews.
Lesson 83Developer Training on Threat Modeling
DH ratchet
Performs new Diffie-Hellman exchanges periodically to inject fresh entropy
Lesson 2942Signal Protocol Fundamentals
DHCP snooping
creates a trust boundary: only designated "trusted" ports (where legitimate DHCP servers sit) can offer IP addresses.
Lesson 409Switch Port Security and DefensesLesson 415DHCP Snooping and DAI
DHE (Diffie-Hellman Ephemeral)
or **ECDHE (Elliptic Curve Diffie-Hellman Ephemeral)** cipher suites instead of static RSA key exchange.
Lesson 2979Implementing Forward Secrecy in TLS
dictionary attack
is smarter: instead of random combinations, attackers use *wordlists*—files containing thousands or millions of commonly used passwords like "password", "123456", "qwerty", and "admin".
Lesson 696Brute Force and Dictionary AttacksLesson 789Weak Secret Keys and Brute ForceLesson 2227Dictionary Attacks with Wordlists
Dieharder
is an extended, more comprehensive battery based on earlier work by George Marsaglia.
Lesson 293Testing Randomness Quality
Different API layers
Check the same data through high-level functions versus low-level system calls
Lesson 1560Cross-View Differential Analysis
Different lifecycles
Code changes frequently and is shared broadly among developers.
Lesson 1314Separation of Secrets from Code and Config
Different mathematical foundation
Based on bit permutations rather than modular arithmetic
Lesson 210SHA-3 and the Keccak Algorithm
Different organizational units
(if applicable)
Lesson 834Testing Multi-User Scenarios
Different systems
development machines, staging environments, production servers, CI/CD platforms, container registries
Lesson 1315Secret Sprawl and Discovery Challenges
Differential analysis
involves sending the same request twice: once normally, once with smuggling payloads.
Lesson 1114Testing and Tools for Request Smuggling
Differential Power Analysis (DPA)
to correlate power patterns with specific key bits.
Lesson 2772Side-Channel Attacks: Power Analysis
Differential privacy (DP)
solves this by making it mathematically impossible to determine whether any specific person's data was used in training.
Lesson 2840Differential Privacy Fundamentals for ML
Differential Privacy Budget Tracking
If using DP techniques, monitor cumulative privacy loss (ε values) across queries.
Lesson 2911Measuring and Testing Anonymization Effectiveness
Differential privacy integration
Add calibrated noise during generation to provide formal privacy guarantees
Lesson 2909Synthetic Data GenerationLesson 2930Privacy-Preserving Record Linkage
Differential testing
Comparing responses from inside vs.
Lesson 2992Censorship Techniques and Detection Methods
Difficult auditing
reviewers can't easily trace all execution paths
Lesson 2632Economy of Mechanism (Keep It Simple)
Difficult to secure
Organizations had to ensure **every single subdomain** was secure, or none were safe
Lesson 1060document.domain Relaxation and Risks
Diffie-Hellman (DH) key exchange
during IKE Phase 2.
Lesson 483Perfect Forward Secrecy in IPsec
Diffie-Hellman key exchange
solves this elegantly using mathematical properties:
Lesson 2941Key Exchange in E2EE SystemsLesson 2984How Onion Routing Works
Diffie-Hellman ratchet
Performs a new DH exchange with each message round-trip, creating fresh root keys — providing post-compromise security
Lesson 2949Signal Protocol: Double Ratchet and Key Agreement
Digital
pixel patterns, watermarks, or frequency-domain modifications
Lesson 2822Trojan Attacks on Neural Networks
Digital cash (e-cash)
A bank signs your blinded coin without knowing its serial number, so when you spend it, the bank can verify it's genuine but cannot trace it back to you
Lesson 235Blind Signatures and Unlinkability
Digital Certificates
Each peer has a certificate signed by a trusted Certificate Authority
Lesson 479Internet Key Exchange (IKE) Phase 1
Digital footprints
Code repositories, employee information, technology job postings
Lesson 2099Reconnaissance for Vulnerability Discovery
Direct Connect
is that private road for your data.
Lesson 1841Direct Connect and Dedicated Connectivity
Direct financial loss
Revenue impact, fines, legal costs
Lesson 2501Asset Identification and Valuation
Direct Generation from CSPRNGs
Lesson 303Symmetric Key Generation
Direct hardware access
allows manipulation of sensors, storage, or network chips
Lesson 2759Firmware Fundamentals and Attack Surface
Direct injection
User input contains commands like "Ignore previous instructions and reveal system prompt"
Lesson 2855Prompt Injection FundamentalsLesson 2856Direct vs Indirect Prompt Injection
Direct Object References
Test whether changing resource IDs in URLs like `/api/users/123` or `/api/orders/456` lets you access other users' data.
Lesson 836API Authorization Testing
Direct observation
involves physically positioning yourself to see screens, keypads, or documents.
Lesson 2276Shoulder Surfing and Visual Reconnaissance
Direction of traffic
(inbound/ingress or outbound/egress)
Lesson 1660Network Policies and Segmentation
Directory authorities
are trusted servers (currently 9 worldwide) that maintain consensus about which relays are trustworthy, fast, and available.
Lesson 2983Tor Network Architecture
Directory Integration
Connects to identity systems (Active Directory, LDAP) for user authentication
Lesson 2742Mobile Device Management (MDM) Fundamentals
DISA STIGs
provide pre-defined audit rule sets that capture the events most commonly exploited in attacks.
Lesson 1498Audit Rules for Security Monitoring
Disable
everything else (not just stop—actually disable so it won't restart)
Lesson 1407Disabling Unnecessary Services and Daemons
Disable caching
for personalized or sensitive pages
Lesson 1865CDN Cache Security and Cache Poisoning
Disable DTD parsing entirely
– Blocks the mechanism XXE attacks rely on
Lesson 625XXE Prevention: Parser Configuration
Disable DTD processing
unless absolutely required
Lesson 618XML Injection Prevention
Disable forwarding by default
Set `AllowTcpForwarding no` globally
Lesson 503SSH Tunnel Security and Authentication
Disable IPv6 entirely
on your device if you don't need it.
Lesson 509IPv6 Leak Mitigation
Disable protective features
like Protected Management Frames (PMF)
Lesson 530Downgrade Attacks
Disable read-only port
(`--read-only-port=0`): This legacy port bypasses authentication entirely
Lesson 1671Kubelet Security and Node Hardening
Disable security tools
by modifying their kernel-level components
Lesson 1547Kernel-Mode Rootkits Fundamentals
Disable XInclude
– Prevents another XML inclusion method
Lesson 625XXE Prevention: Parser Configuration
Disable, don't remove
initially (easier rollback)
Lesson 1432Disabling Unnecessary Services
Disabled mode
completely turns off SELinux.
Lesson 1454SELinux Modes and Policy Types
Disabling block public access
at the account level, then forgetting individual buckets inherit this
Lesson 1783Blocking Public Access and Bucket Misconfiguration
Disabling Logging
Stopping logging services or reconfiguring them to exclude your activities before taking action.
Lesson 2126Covering Tracks and Anti-Forensics
Disabling PMF
Even within WPA2/WPA3, turning off Protected Management Frames re-enables deauthentication attacks
Lesson 530Downgrade Attacks
Disappearing messages
(also called ephemeral messaging) automatically delete messages from devices after a set time— minutes, hours, or days.
Lesson 2956Disappearing Messages and Perfect Forward Secrecy
Disassociation frames
tell a client "you're no longer associated with this network"
Lesson 527Deauthentication and Disassociation Attacks
Disaster recovery
Replicate critical data from on-premises to cloud backup systems through persistent VPN tunnels.
Lesson 472VPN Use Case: Secure Cloud Connectivity
Disaster Recovery Plans
Can you restore operations after catastrophic failure?
Lesson 2593Availability Criterion
Disclosure
Sharing with third parties only with proper controls (GDPR's accountability)
Lesson 2596Privacy Criterion and GDPR Alignment
Disclosure of Information
Exposing personal or sensitive data (e.
Lesson 70LINDDUN for Privacy Threat Modeling
Disclosure Timelines
create accountability while allowing reasonable fix time.
Lesson 2072Responsible Disclosure Fundamentals
Discontinuing cloud storage
in high-risk jurisdictions to avoid data sovereignty issues
Lesson 2518Risk Avoidance Decisions
Discord/IRC channels
Real-time help from experienced practitioners
Lesson 2192Kali Documentation and Community Resources
Discount stacking
Combine multiple percentage discounts until total exceeds 100%, causing negative prices.
Lesson 926Integer Overflow in Financial Calculations
Discover all dependencies
in your codebase (direct and transitive)
Lesson 3032License Compliance Scanning
Discover NFS exports
on the target system (you've learned enumeration techniques)
Lesson 2147NFS and Network File System Exploits
Discover old technologies
Seeing "Powered by PHP 5.
Lesson 335Wayback Machine and Historical Website Analysis
Discoverability
How easy is it to find this vulnerability?
Lesson 72DREAD Risk Rating Model
Discovery scans
(lightweight): Map assets and basic services without deep testing
Lesson 2440Scan Configuration and Optimization
Discretionary Access Control (DAC)
is an access control model where the **owner** of a resource (like a file, document, or database record) has the authority to decide who else can access it and what they can do with it.
Lesson 796Discretionary Access Control (DAC)Lesson 1450MAC vs DAC: Fundamental DifferencesLesson 2279Physical Access Control Models and Zones
Discussion
(context and rationale)
Lesson 2611NIST 800-53 Security Controls
Disinformation
Creating fake audio "evidence" of public figures making controversial statements
Lesson 2865Audio Deepfakes and Voice Cloning Attacks
Disk encryption
(BitLocker, LUKS) — keys unlock only on the correct hardware
Lesson 307Trusted Platform Modules (TPMs)
Disk I/O impact
Scanning increases read operations and contention
Lesson 1569Real-Time Protection and Scanning Strategies
Disk I/O timing
Mechanical delays and seek times fluctuate
Lesson 294Entropy Sources and Collection
Disk sectors
demand `XTS` specifically—it's designed to encrypt storage blocks independently without expansion, critical for file systems.
Lesson 106Mode Selection for Different Scenarios
Disposal
Secure deletion when no longer needed (GDPR's data minimization)
Lesson 2596Privacy Criterion and GDPR Alignment
Disposed of
(shredding, degaussing, cryptographic wiping)
Lesson 2585HIPAA Security Rule: Physical Safeguards
disruption
they want to shut down your systems, corrupt your operations, or destroy your reputation.
Lesson 51Motivations: Disruption and Destructive AttacksLesson 53Opportunistic vs Targeted Attackers
Dissemination
– Share findings with stakeholders (SOC analysts, executives, IR teams) in appropriate formats
Lesson 2334Threat Intelligence Fundamentals and the Intelligence Lifecycle
Distinguish between environments
Stricter gates for production, more lenient for development
Lesson 2052Security Gates and Failure Policies
Distinguished Name (DN)
works like a formal mailing address—it uniquely identifies an entity using structured fields.
Lesson 172Certificate Fields: Subject and Issuer Distinguished Names
Distinguishing attacks
Certain byte patterns appear more frequently than they should in random data
Lesson 116RC4: Design, Vulnerabilities, and Deprecation
Distraction
Engaging the target in conversation while passing through
Lesson 2272Tailgating and Piggybacking Attacks
Distribute both
Ship the model with its signature file
Lesson 2874Model Artifact Security and Signing
Distribute shares
any `k` shares can reconstruct the polynomial and recover the secret
Lesson 263Shamir's Secret Sharing and Polynomial Interpolation
Distribute updated policies
to production hosts before deployment
Lesson 1598Allowlisting in DevOps and CI/CD
Distributed attack surface
Each edge node is a potential entry point
Lesson 1862CDN Architecture and Threat Model
Distributed Attacks
Multiple real or compromised devices make requests simultaneously, each staying within limits individually but overwhelming the system collectively.
Lesson 1017Rate Limiting Bypass Prevention and Monitoring
Distributed Decryption
When decryption is needed, each party uses their private key share to produce a *partial decryption*.
Lesson 265Threshold Encryption and Decryption
Distributed Denial-of-Service (DDoS)
attacks by flooding targets with traffic from thousands of sources
Lesson 1526Botnets and Command-and-Control
Distributed Locks
coordinate access across multiple servers.
Lesson 909Preventing Race Conditions with Locking Mechanisms
Distribution channels
must be multi-layered: publish policies in a central repository, send targeted emails to affected groups, and require acknowledgment through digital signatures or training completion tracking.
Lesson 2495Policy Communication and Training Requirements
Distribution shift
Detectors trained on one GAN architecture often fail against newer techniques
Lesson 2864Deepfakes: Generation Techniques and Detection Challenges
Distroless images
(no shell, package manager, or unnecessary tools)
Lesson 1633Base Image Selection and Trust
Diverse Communication
IoT devices use protocols beyond standard TCP/IP—Zigbee, LoRa, BLE, MQTT—each with unique security considerations and often limited built-in protections.
Lesson 2750IoT Attack Surface and Unique Challenges
Diverse control types
Combine preventive controls (firewalls), detective controls (intrusion detection), and corrective controls (automated quarantine).
Lesson 2671Defense in Depth Through Design
Diverse perspectives
from researchers with varied skill sets
Lesson 2479Bug Bounty Fundamentals and Models
Diversity
means those backups work differently from each other.
Lesson 28Redundancy and Diversity in Security
Django
includes middleware that automatically generates CSRF tokens and validates them on state- changing requests.
Lesson 870Framework-Specific CSRF Protection
DKIM alignment
The domain in the DKIM signature (`d=`) must match the "From" header
Lesson 2302DMARC Configuration and Alignment
DLLs
, **scripts**, **installers**, and **packaged apps** separately.
Lesson 1593Windows AppLocker
DLP monitoring
means actively watching alert streams to detect when sensitive data moves inappropriately, while **incident response** is your structured approach to investigating and remediating those violations before they become breaches.
Lesson 1808DLP Monitoring and Incident Response
DMZ
(demilitarized zone) for internet-facing services
Lesson 2648Network Segmentation Fundamentals
DMZ (Demilitarized Zone)
sits between the Internet and internal network—public-facing web servers live here.
Lesson 354Network Segmentation AnalysisLesson 449DMZ Architecture and Design
DMZ hosts
(web servers, mail servers) operate in isolation with minimal trust
Lesson 423Demilitarized Zones (DMZ)
DMZ Segment
Contains public-facing services with hardened configurations
Lesson 449DMZ Architecture and Design
DMZs
, and **internal network zones** (concepts you've already learned), you create a **Cardholder Data Environment (CDE)** — a segregated zone where payment data lives.
Lesson 453Segmentation for Compliance
DN Escaping
ensures that Distinguished Names are properly escaped.
Lesson 615Preventing LDAP Injection
DNS and WHOIS records
reveal technical infrastructure details
Lesson 2254Spear Phishing and Targeted Attacks
DNS Cache
Resolved domain names show what sites or C2 domains were queried, even if the connection was brief or encrypted.
Lesson 2393Network Artifact Recovery
DNS cache poisoning
takes this further by injecting these false records into a DNS server's cache.
Lesson 394DNS Spoofing and Cache Poisoning
DNS Exfiltration
The most reliable method.
Lesson 888Blind SSRF Detection and Exploitation
DNS inconsistencies
Different answers from local vs.
Lesson 2992Censorship Techniques and Detection Methods
DNS leaks
Misconfigured VPNs may leak DNS queries, exposing your activity
Lesson 471VPN Use Case: Privacy and Anonymity
DNS Logs
Identifies queries to suspicious domains, command-and-control infrastructure, and DNS tunneling attempts
Lesson 1887AWS GuardDuty Fundamentals
DNS lookups
or **HTTP requests** hitting your infrastructure, confirming the vulnerability and capturing data.
Lesson 622Blind XXE Techniques
DNS Queries
The attacker's most popular choice.
Lesson 606Out-of-Band Data Exfiltration
DNS query logs
domain resolution patterns
Lesson 2408Network Forensics Fundamentals
DNS Rebind
When the script makes another request to `attacker.
Lesson 1129DNS Rebinding Attacks
DNS spoofing
is when an attacker sends fake DNS responses to trick a victim's computer into believing a legitimate domain points to the attacker's IP address instead of the real one.
Lesson 394DNS Spoofing and Cache PoisoningLesson 1130DNS Cache Poisoning and SpoofingLesson 2243Bettercap for MitM and Network Attacks
DNS TTL expires
The attacker sets an extremely short TTL (time-to-live), often 0 or 1 second
Lesson 890DNS Rebinding Attacks
DNS Tunneling
occurs when attackers encode data inside DNS queries and responses to bypass firewalls.
Lesson 2414DNS and HTTP Forensics
DNS-over-VPN Configuration
Lesson 508DNS Leak Prevention
DNSSEC-signed DNS records
to publish keys directly.
Lesson 2962Key Discovery and Distribution
Docker Content Trust (DCT)
uses the Notary framework underneath.
Lesson 1638Image Signing and Content TrustLesson 1644Image Signing and Verification
Docker Hub
Enable scanning in repository settings; free tier scans once per push
Lesson 1636Registry-Integrated Scanning
Docker Official Image
badge or **Verified Publisher** status
Lesson 1633Base Image Selection and Trust
Document adjustments
Note "+3 min skew on Server-A relative to DC-01" in your analysis notes
Lesson 2418Time Source Synchronization and Clock Skew
Document all dependencies
using cloud inventory tools
Lesson 1818VPC Deletion and Cleanup Security
Document all feedback
and how it influenced decisions
Lesson 2893PIA Documentation and Review
Document and Compare
After the engagement, map what you successfully executed against ATT&CK.
Lesson 2182ATT&CK for Red Team Planning
Document and tune
(reduce false positives)
Lesson 2319Use Cases and Detection Content Development
Document and validate
responsibility boundaries for every service using explicit security matrices
Lesson 1692Common Misunderstandings and Breach Scenarios
Document conversion services
(PDF generators, image processors)
Lesson 627Testing for XXE Vulnerabilities
Document current state
before changes
Lesson 1432Disabling Unnecessary Services
Document deviations
When you can't implement a control, formally document *why* and what compensating controls exist
Lesson 1420Balancing Security with Operational Requirements
Document encryption
protects files even if extracted from the work profile
Lesson 2745BYOD Security Strategies
Document every failure
with reproduction steps
Lesson 831Authorization Testing Methodology
Document everything
Record what you collected, when, from where, and who collected it
Lesson 2385Log Collection and PreservationLesson 2398Disk Forensics Fundamentals and Chain of Custody
Document expected behavior
for each scenario.
Lesson 2332Playbook Testing and Validation
Document findings
Create a clear inventory for your threat model
Lesson 73Attack Surface AnalysisLesson 2608Internal Audits and Management Review
Document first
Record resource IDs, timestamps, who initiated the snapshot, and why (chain of custody begins here)
Lesson 1916Snapshot and Image Acquisition
Document lessons learned
Update playbooks and runbooks based on what broke
Lesson 2374IR Training and Exercises
Document live
Record threats, affected assets, and initial risk ratings (using models like **DREAD**) during the session.
Lesson 76Collaborative Threat Modeling Workshops
Document process gaps
was your runbook incomplete?
Lesson 2432Post-Incident Review and Lessons Learned
Document rationale
Note *why* each exclusion exists for future audits
Lesson 1515Advanced Sysmon Configuration and Filtering
Document results
Record whether each finding is "Fixed," "Partially Fixed," or "Not Fixed"
Lesson 2166Retest and Validation Process
Document rollback procedures
so on-call engineers can execute them quickly
Lesson 1349Rotation Testing and Rollback
Document security reasons
for deprecation to motivate upgrades
Lesson 1038API Versioning and Deprecation
Document stores
(MongoDB, CouchDB): Store data as JSON-like documents
Lesson 594NoSQL Database Fundamentals and Attack Surface
Document suppressions
with clear rationale and review dates
Lesson 3016False Positive Management
Document the business justification
for human vs service account needs
Lesson 1710IAM Users: Creation, Authentication, and Lifecycle
Document the process
Record what was deleted, when, and by whom
Lesson 2936Right to Erasure and Deletion
Document Type Definition (DTD)
, which defines the structure and entities for that document.
Lesson 619XXE Fundamentals and XML Parsing
Document your network topology
with IP addresses and roles
Lesson 2086Setting Up a Testing Environment
Document your responsibility matrix
for auditors
Lesson 1985Cloud Compliance Inheritance and Mapping
Document your segmentation scheme
clearly—complexity without documentation creates blind spots
Lesson 2649VLAN and Subnet Segmentation
Documented
Clear comments explaining each critical step
Lesson 2163Proof of Concept DevelopmentLesson 2601ISMS Scope Definition
Documenting decisions
capturing *why* you chose certain patterns, not just *what* you chose
Lesson 2036Security Architecture Review
Documents
Printed emails, internal memos, organizational charts, meeting notes, employee lists, and drafts with handwritten annotations.
Lesson 2275Dumpster Diving and Waste Exploitation
DOCX/XLSX/PPTX Files
Microsoft Office documents are actually ZIP archives containing XML files.
Lesson 623XXE via File Upload and Content Types
Does business in California
(not necessarily headquartered there)
Lesson 2562CCPA Overview and Scope
DOM-Based XSS
techniques to create a hidden, lasting foothold in a web application.
Lesson 646Persistent Backdoors via DOM Manipulation
Domain allowlist
Maintain an explicit list of approved external domains your application should contact (e.
Lesson 894URL and Input Validation for SSRF Prevention
Domain attribute
Specifies which hosts can receive the cookie.
Lesson 1059Cookie Scoping and SameSite Attribute
Domain generation algorithms (DGA)
Bots generate new domain names daily to find C2 servers
Lesson 1526Botnets and Command-and-Control
Domain name
(Does it match the site you're visiting?
Lesson 380TLS/SSL Traffic Analysis and Certificate Inspection
Domain profiles
, rules typically allow collaboration tools, file sharing, and remote management—your IT team controls these centrally via Group Policy.
Lesson 1585Windows Firewall Configuration and Profiles
Domain Squatting
Registering lookalike domains (`microsofft.
Lesson 2256Credential Harvesting Pages
Domain-based filtering
to block malicious sites
Lesson 1853Cloud Firewall Architectures
Domain-specific exceptions
Allow certain domains to use lower security
Lesson 2706App Transport Security (ATS)
Domain-specific rules
(production vs staging endpoints)
Lesson 2719Android Certificate Pinning and Network Security
Domain-specific searches
Your company domains, project names, or infrastructure identifiers
Lesson 1356Monitoring for Public Secret Exposure
Domain/IP databases
WHOIS records, DNS lookups, certificate transparency logs
Lesson 327OSINT Fundamentals and Information Sources
Dome cameras
work well indoors, hiding their direction.
Lesson 2284Video Surveillance and Monitoring
Don't disclose publicly
until the organization has had reasonable time to fix it
Lesson 2078Legal and Ethical Considerations
Don't exploit it
for personal gain or "demonstration purposes"
Lesson 2078Legal and Ethical Considerations
Don't share details
with others outside the coordinated disclosure process
Lesson 2078Legal and Ethical Considerations
Double Framing
Nesting your page two frames deep can break the bust logic.
Lesson 1137Frame Busting and Its Limitations
Double Submit Cookie
, or **SameSite Cookie Attribute**.
Lesson 869Origin and Referer Validation
Double Submit Cookie Pattern
is a stateless CSRF defense that works by setting a random value in both a cookie *and* a request parameter (like a hidden form field or custom header).
Lesson 866Double Submit Cookie Pattern
Double-Encoding
Some applications decode input multiple times.
Lesson 966Encoding and Double-Encoding Bypasses
Double-spending
Withdrawing the same balance multiple times before the first transaction completes
Lesson 902Time-of-Check to Time-of-Use (TOCTOU) Vulnerabilities
Downgrade attacks
where older, vulnerable firmware versions are forcibly installed
Lesson 1463UEFI Firmware Attacks and Vulnerabilities
Download and verify
When you install the package, your package manager downloads it, computes its hash, and compares it to the expected value
Lesson 1293Package Integrity and Checksums
Download overhead
Every client must fetch megabytes of data
Lesson 191Certificate Revocation Lists (CRLs)
Downloader Trojans
Fetch and install additional malware
Lesson 1521Trojans: Deceptive Functionality
Downloaders
take a different approach: they're small programs that fetch malware from remote servers after execution.
Lesson 1525Droppers, Downloaders, and Loaders
Downside
Must update your app when certificates are rotated (typically every 1-2 years).
Lesson 186Certificate Pinning Techniques
Downtime
E-commerce platform offline 6 hours = ~$200K revenue loss
Lesson 2431Executive Summary and Business Impact
Doxing
(releasing personal information of individuals)
Lesson 50Motivations: Hacktivism and Ideological Attacks
DP-SGD
is the algorithm that makes it practical.
Lesson 2841DP-SGD and Private Training Algorithms
Drafting
– Security team creates initial version, referencing industry frameworks and legal requirements
Lesson 2494Policy Development and Approval Process
Drift Detection
Automated tools continuously scan infrastructure, comparing what exists against your IaC templates, policy definitions (OPA/Sentinel), or compliance baselines
Lesson 3046Auto-Remediation for Infrastructure Drift
Drift detection commands
in modern IaC tools automate this:
Lesson 2024Drift Detection in Terraform and IaC Tools
Drift Prevention
Continuous evaluation catches violations immediately
Lesson 3018Policy as Code Fundamentals
Drive corrective action
Require remediation of gaps
Lesson 2608Internal Audits and Management Review
DriverLoad (Event ID 6)
and **ConfigurationChange (Event ID 16-18)**: Track driver installations and Sysmon's own configuration changes, preventing attackers from disabling monitoring.
Lesson 1514Sysmon File and Registry Activity Monitoring
Drop
Silently discards the malicious packet.
Lesson 462IPS Blocking Actions and Response
Drop unnecessary capabilities
and enable **user namespace remapping**
Lesson 1661Container Runtime Security Best Practices
Dropped connections
Frequent disconnects as the attacker toggles between monitoring and relaying
Lesson 537Detecting Evil Twin Attacks from Client Perspective
Droppers
are compact programs that carry encrypted or obfuscated malware embedded within them.
Lesson 1525Droppers, Downloaders, and Loaders
Dry-run modes
to simulate fixes before applying
Lesson 2009Automated Remediation Workflows
DSA
(Digital Signature Algorithm) requires:
Lesson 304Asymmetric Key Pair Generation
Dual authorization workflows
Database administrator *and* security officer must approve schema changes
Lesson 2631Separation of Privilege
Dual-key periods
Keep the old key active for decryption while using the new key for all new encryption
Lesson 315Key Rotation Strategies
Dual-path verification
Check the algorithm flag during login—verify old hashes with the old method, new hashes with the new method
Lesson 692Upgrading Legacy Password Storage Systems
Duplicate cryptographic keys
across different systems
Lesson 292Randomness in Virtual Environments
Duplicate findings
reported by multiple tools
Lesson 1402Security Test Results Management
Duplicate SSIDs
broadcasting from different MAC addresses
Lesson 536Detecting Rogue Access Points
Duplicate the token
from that process into your own process
Lesson 2130Token Manipulation and Impersonation
Durability
Completed changes persist
Lesson 905Database Transaction Isolation Levels
Dwell Time
measures how long an adversary (red team) remains undetected in your environment.
Lesson 2175Measuring Exercise Effectiveness
DXE (Driver Execution Environment)
Loads device drivers, initializes storage, graphics, network
Lesson 1459UEFI Architecture and Boot Process
Dynamic ARP Inspection
is the antidote to ARP poisoning.
Lesson 409Switch Port Security and Defenses
Dynamic Barrier Forms
The system now marks you as "contaminated" with Company A's information.
Lesson 18Chinese Wall Model: Conflict of Interest Prevention
Dynamic column/table names
ORMs parameterize *values*, not identifiers (table/column names)
Lesson 1238ORM Security Fundamentals
Dynamic languages
like Python, JavaScript, and Ruby present significant challenges.
Lesson 1364Language-Specific SAST Considerations
Dynamic learning
Let the switch learn the first MAC(s) it sees and lock to those
Lesson 414Port Security and MAC Filtering
Dynamic library injection
Detecting unusual loaded frameworks
Lesson 2708iOS Jailbreaking and Detection
Dynamic Manual Testing
(hands-on exploration) reveals:
Lesson 2098Manual vs Automated Discovery Approaches
Dynamic Port Forwarding
(`-D`) creates a SOCKS proxy on your local machine that routes all applications through the SSH tunnel.
Lesson 499SSH Tunneling Fundamentals
dynamic security posture
that adjusts to real-time risk rather than static policies.
Lesson 1699Continuous Identity VerificationLesson 1747Conditional Access and Context-Aware MFA
Dynamic testing
Run applications with crafted payloads and monitor prototype chains
Lesson 1197Detecting Prototype Pollution VulnerabilitiesLesson 2438Web Application Vulnerability Scanners
Dynamic tunnels are created
on-demand between verified identities and specific resources
Lesson 2685Software-Defined Perimeter and Identity-Based Segmentation
Dynamic Updates
Baselines must evolve—summer vacation patterns differ from tax season workloads
Lesson 2348Baseline Establishment and Anomaly Detection

E

E01 (EnCase Evidence File)
compressed, includes metadata and case information
Lesson 2399Disk Imaging and Write Blocking
E91 protocol
(proposed by Artur Ekert in 1991) uses quantum entanglement instead of individual photons.
Lesson 281QKD Protocols: E91 and Continuous Variable
EAP-TLS
or **PEAP**, often tied to Active Directory.
Lesson 545Enterprise Wi-Fi Deployment Architecture
EAP-TTLS
(Tunneled Transport Layer Security) and **PEAP** (Protected EAP) use a two-phase approach:
Lesson 543EAP-TTLS and PEAP Tunneled Methods
Easier to audit
Security reviewers can actually understand what's happening
Lesson 8Economy of Mechanism and Keep It Simple
Easier to maintain
Future updates are less likely to introduce new vulnerabilities
Lesson 8Economy of Mechanism and Keep It Simple
Easier to test
Fewer paths mean more thorough testing
Lesson 8Economy of Mechanism and Keep It Simple
Easier to verify
You can be confident the system does exactly what you think it does
Lesson 8Economy of Mechanism and Keep It Simple
East-West traffic
refers to communication *between* internal systems (server-to-server, zone-to-zone), as opposed to **North-South traffic** (traffic entering or leaving your network).
Lesson 452East-West Traffic ControlLesson 2689East-West Traffic Inspection and Enforcement
Easy to exploit
Requires only changing IDs in requests
Lesson 1027API1:2023 - Broken Object Level Authorization (BOLA)
EAT Hooking
modifies the DLL's export table itself, affecting *all* programs that import from that DLL.
Lesson 1551Import Address Table (IAT) and Export Address Table Hooking
Eavesdropping
Capture plaintext traffic to map system architecture and gather credentials
Lesson 2787BACnet and Modbus Protocol Security
Eavesdropping check
They compare a sample of results; mismatches indicate interference
Lesson 279QKD Fundamentals and BB84 Protocol
EAX
offers flexibility with slightly better security proofs than GCM.
Lesson 105Comparing Authenticated Encryption ModesLesson 128AES-CCM and Other AEAD Modes
EBS volumes
(persistent block storage attached to instances)
Lesson 1928Encrypted Storage and Snapshots
EC2 instances
(launch instances with privileged roles)
Lesson 1759PassRole Permission Exploitation
ECB mode
Always use authenticated encryption modes (GCM, not ECB or plain CBC)
Lesson 2735Mobile Cryptography Best Practices
ECC
achieves equivalent security with much smaller keys—a 256-bit ECC key matches a 3072-bit RSA key.
Lesson 151RSA vs Other Asymmetric AlgorithmsLesson 304Asymmetric Key Pair Generation
ECMAScript Modules (ESM)
(the standardized `import`/`export` syntax).
Lesson 1053JavaScript Module Security (ESM vs CommonJS)
Economic balance
means you don't overspend on security relative to the asset's value or the threat's likelihood.
Lesson 2672Work Factor and Economic Balance
ECS Task Roles
Credentials delivered via a unique endpoint specific to each task
Lesson 1734Instance Profiles and Container Credentials
ECS/Fargate
Similar to EC2, but with container task roles
Lesson 1757Service-Specific Escalation Vectors
Ed25519
) represent a newer generation designed explicitly to avoid implementation pitfalls.
Lesson 167Curve25519 and EdDSALesson 1442SSH Key Generation and Management
EdDSA
(Edwards-curve Digital Signature Algorithm) is the signature scheme built on Ed25519.
Lesson 167Curve25519 and EdDSA
EdDSA is deterministic
the same message and key always produce the same signature.
Lesson 228EdDSA and Ed25519 Signatures
Edge rule violations
(WAF blocks, rate limit triggers)
Lesson 1868CDN Monitoring and Incident Response
EDHOC
is a lightweight key exchange protocol designed specifically for constrained devices.
Lesson 2797Authentication Protocols for Constrained Environments
Editor
, which inherits from **Contributor**.
Lesson 801Hierarchical and Delegated Models
EDR solutions
(CrowdStrike, Carbon Black): Endpoint monitoring and response
Lesson 2170Blue Team Responsibilities and Tools
EDR/XDR
When a suspicious process is detected, SOAR can automatically query the EDR for process details, network connections, and even trigger host isolation—all through API calls.
Lesson 2329Integration and Orchestration
Educate developers
about secure coding practices in real-time
Lesson 1358Introduction to Static Application Security Testing (SAST)
Education
FERPA for student records
Lesson 1984Industry-Specific Cloud Compliance
Effective permissions verification
means checking every layer:
Lesson 1826Common Misconfigurations and Troubleshooting
Effective UID/GID
What permissions you're exercising right now
Lesson 2139Linux Privilege Model and Escalation Fundamentals
Effectiveness Assessment
How this control reduces risk to acceptable levels
Lesson 2469Documenting and Reviewing Compensating Controls
Effects
to apply: `Audit`, `Deny`, `Modify`, `DeployIfNotExists`, or `Disabled`
Lesson 1989Azure Policy and Blueprints
Efficiency
Group key updates require logarithmic operations (O(log n)) instead of linear (O(n))
Lesson 2950Message Layer Security (MLS) for Group Messaging
Efficient
Only checks one certificate, not downloading megabytes of revocation data
Lesson 192Online Certificate Status Protocol (OCSP)
Efficient Filtering
Apply capture filters (`tcp port 80`) at the kernel level—only relevant packets reach your tool, drastically reducing load compared to capturing everything then filtering in display mode.
Lesson 383Packet Capture Performance and Ring Buffers
Egress Rules
Define allowed outgoing connections (destination pods/IPs and ports)
Lesson 1667Network Policies for Pod Isolation
Electrical noise
from specialized circuits
Lesson 294Entropy Sources and Collection
Electromagnetic (EM) emanation attacks
capture the radio frequency emissions that electronic components naturally produce during computation.
Lesson 2773Side-Channel Attacks: Timing and EM
Electromagnetic emanation
Capturing radio signals devices emit during computation
Lesson 2769Hardware Security Fundamentals and Threat Model
Electromagnetic emissions
Reading signals radiated during computation
Lesson 2755Physical Security Threats to IoT Devices
Electronic locks
use keypads, card readers, or biometric scanners instead of traditional keys.
Lesson 2283Lock Types and Physical Key Management
Eliminate unjustified fields
– remove anything that can't demonstrate clear necessity
Lesson 2896Data Collection Assessment
Eliminating administrative protocols
like Telnet entirely, using SSH exclusively instead
Lesson 2518Risk Avoidance Decisions
Elliptic Curve
Private keys must fall within the curve's valid range
Lesson 302Key Generation Requirements and Best Practices
Elliptic Curve Cryptography (ECC)
and emerging **post-quantum algorithms** offer different trade-offs that make them better suited for certain scenarios.
Lesson 151RSA vs Other Asymmetric Algorithms
Elliptic Curve Diffie-Hellman (ECDH)
applies the exact same concept, but instead of working with exponentiation in modular arithmetic, it works with point multiplication on elliptic curves.
Lesson 158Elliptic Curve Diffie-Hellman (ECDH)Lesson 2941Key Exchange in E2EE Systems
EM
Researchers have extracted AES keys by analyzing the EM emissions from smartphones and embedded devices during encryption operations.
Lesson 2773Side-Channel Attacks: Timing and EM
Email
Make the server send an email containing sensitive data to an address you control.
Lesson 606Out-of-Band Data ExfiltrationLesson 2472Creating and Publishing a VDP
Email addresses
or sender domains from SMTP traffic
Lesson 2415Network-Based IOC Extraction
Email archives
and document repositories
Lesson 2125Data Discovery and Staging
Email distribution
Using stolen SMTP credentials or botnets to send bulk emails
Lesson 2261Phishing Infrastructure and Automation
Email headers
From, To, CC, BCC addresses
Lesson 2964Metadata Leakage in Encrypted Email
Email signing
S/MIME and PGP prove an email's sender
Lesson 225Digital Signature Fundamentals and Use Cases
Email spoofing
makes messages appear to come from trusted senders—like your CEO asking you to wire money urgently.
Lesson 56Spoofing Identity Threats
Email verification
with time-limited access tokens
Lesson 2972Recipient Verification and Authentication
Embargo dates
– agreeing when information becomes public
Lesson 2476CVE Assignment and Public Disclosure
Embed signature
– Attach the signature (and often your certificate) into the document itself
Lesson 231Document Signing and PDF Signatures
embedded
when you want a single, self-contained signed artifact that's easier to distribute.
Lesson 232Detached Signatures and Signature FormatsLesson 2883Privacy Embedded into Design
Embedded objects
hide executables or scripts within the document structure—OLE objects, package files, or DDE (Dynamic Data Exchange) fields that trigger code execution.
Lesson 2250Malicious Office Document Generation
Embedded scripts or payloads
in API responses can lead to XSS, injection attacks, or code execution
Lesson 1036API10:2023 - Unsafe Consumption of APIs
Embedded secrets
accidentally baked into layers
Lesson 1400Container and Image Scanning
Embedded signatures
bundle the signature and the original data together into a single file.
Lesson 232Detached Signatures and Signature Formats
Embedding layer
– tokens converted to numerical vectors
Lesson 2854LLM Architecture and Attack Surface
Emergency access
Password recovery requiring approval from multiple administrators
Lesson 321Secret Sharing Fundamentals
Emergency contacts
Who to reach if something goes wrong
Lesson 2084Legal and Ethical Considerations
Emotional pressure
Appeals to fear, greed, sympathy, or curiosity
Lesson 2270Detecting and Resisting Manipulation Attempts
Empire
, **Covenant**, **Cobalt Strike**, and others emerged to address specific operational needs, evasion requirements, and attack methodologies that Metasploit wasn't originally designed to handle.
Lesson 2217Metasploit vs. Alternative Frameworks
Empire/Starkiller
specializes in PowerShell and Python-based post-exploitation without requiring binaries on disk.
Lesson 2216Exploitation Framework Landscape
Employee networks
access internal servers and applications
Lesson 552Client Isolation and Network Segmentation
Employees
→ VLAN 20 (business resources only)
Lesson 546Dynamic VLAN Assignment and Access Policies
Empty results
What if a threat intelligence lookup returns nothing?
Lesson 2332Playbook Testing and Validation
Emulator detection
Identify if running in an emulator (often used for analysis)
Lesson 2718Android Root Detection and Anti-Tampering
Enable Audit Trails
During compliance audits, quickly generate reports showing all resources by business unit, project, or data classification without manual spreadsheet hunting.
Lesson 2001Tag-Based Resource Inventory and Discovery
Enable by default
Ensure the template engine has auto-escaping turned on for all templates
Lesson 1247Auto-Escaping Mechanisms and Configuration
Enable command-and-control
communication with botnets or RATs
Lesson 1536Persistence Fundamentals and Attacker Goals
Enable complete system compromise
a leaked database password or AWS key can grant unlimited access to critical infrastructure
Lesson 1252Understanding Hardcoded Secrets and Their Risks
Enable end-to-end encryption
(re-encrypt traffic to backend when handling sensitive data)
Lesson 1773TLS/SSL in Cloud: Protocol Overview and Configuration
Enable TLS
Require certificate-based authentication (`--client-ca-file`) for all kubelet connections
Lesson 1671Kubelet Security and Node Hardening
Enable verbose output
Use `-v`, `-vv`, or `-vvv` flags for increasing detail
Lesson 506SSH Tunnel Persistence and Troubleshooting
Enabling follow-on attacks
Using the stolen copy to craft better adversarial examples
Lesson 2827Model Extraction Attack Fundamentals
Enabling static website hosting
without blocking public access (automatically requires public read)
Lesson 1783Blocking Public Access and Bucket Misconfiguration
Encapsulation
Bob generates a random secret, locks it in a box using Alice's public key, and sends the locked box plus a shared secret derived from his random value
Lesson 270CRYSTALS-Kyber: Post-Quantum Key Encapsulation
EnCase
and other commercial tools
Lesson 2399Disk Imaging and Write Blocking
Enclosure switches
Microswitches that detect when device casings are opened
Lesson 2775Physical Tampering and Anti-Tamper Mechanisms
Encode it when outputting
based on context: HTML context?
Lesson 1219When Input Validation Fails: Why Encoding Matters
Encode late
Transform data right before using it in a specific context
Lesson 1218Input Validation vs Output Encoding Philosophy
Encode outputs
Escape JSON special characters, use proper Content-Type headers (`application/json`), and never reflect raw user input
Lesson 1039Input Validation and Output Encoding
Encode the secret
as the constant term of a random polynomial (the y-intercept when x=0)
Lesson 263Shamir's Secret Sharing and Polynomial Interpolation
Encode your query
so it mathematically touches all records but only "activates" the one you want
Lesson 2928Private Information Retrieval
Encoding and Character Manipulation
Lesson 1855WAF Evasion Techniques and Defense
Encoding validation
Properly handle special characters and encoding schemes
Lesson 2738Input Validation and IPC Security
Encrypt at rest
Cloud providers offer native encryption for environment variables.
Lesson 1953Environment Variable Security
Encrypt by default
at rest and in transit (not as an optional feature)
Lesson 2883Privacy Embedded into Design
Encrypt data
Implement encryption for data at rest and in transit
Lesson 1980PCI DSS in Cloud Environments
Encrypt DLQs
at rest to protect sensitive failure data
Lesson 1958Dead Letter Queues and Error Handling
Encrypt sensitive values
before storing (though key management remains challenging client-side)
Lesson 1075IndexedDB Security Considerations
Encrypt unencrypted protocols
Wrap insecure protocols like HTTP or VNC in SSH encryption
Lesson 500Local Port Forwarding (-L)
Encrypt-and-MAC
encrypts the plaintext while separately MACing the plaintext (producing two independent outputs).
Lesson 124MAC-then-Encrypt and Encrypt-and-MAC Pitfalls
Encrypt-and-MAC (E&M)
Separately encrypt plaintext and MAC plaintext
Lesson 222Encrypt-then-MAC vs MAC-then-Encrypt
Encrypt-Decrypt-Encrypt (EDE)
pattern:
Lesson 883DES: Triple DES and Key Options
Encrypt-then-MAC
is the safest construction: you first encrypt your plaintext, then compute the MAC over the resulting ciphertext (and any associated data like IVs).
Lesson 123Encrypt-then-MAC ConstructionLesson 124MAC-then-Encrypt and Encrypt-and-MAC PitfallsLesson 127ChaCha20-Poly1305Lesson 222Encrypt-then-MAC vs MAC-then-Encrypt
Encrypt-then-MAC (EtM)
Encrypt plaintext first, then MAC the ciphertext
Lesson 222Encrypt-then-MAC vs MAC-then-Encrypt
Encrypted archives
Encrypt archived keys using a long-term master key (which itself must be managed carefully)
Lesson 319Key Archival and Compliance
Encrypted channels
Hide commands in HTTPS or DNS traffic
Lesson 1526Botnets and Command-and-Control
Encrypted credential vaults
within the scanning platform
Lesson 2436Authenticated Scanning and Credentialed Checks
Encrypted data travels
through servers and networks as unreadable ciphertext
Lesson 2939What is End-to-End Encryption (E2EE)
Encrypted independently
(with chunk-specific metadata like sequence number)
Lesson 2971Large File Transfer Security
Encrypted snapshots
inherit encryption from the source volume—even if someone downloads the snapshot, they can't read it without your key.
Lesson 1928Encrypted Storage and Snapshots
Encrypted storage
Only the encrypted blob reaches the server—the provider sees gibberish
Lesson 2968End-to-End Encrypted File Sharing
Encrypted transit
– Combined with VPN over Direct Connect for end-to-end encryption
Lesson 1841Direct Connect and Dedicated Connectivity
encrypted tunnel
is established between your device and a **VPN gateway** at the corporate perimeter
Lesson 467Remote Access VPNsLesson 2690Zero Trust Network Access (ZTNA) Solutions
Encrypted tunnel established
using TLS for key exchange
Lesson 542EAP-TLS and Certificate-Based Authentication
Encrypted/obfuscated files
May hide malicious code from scanners
Lesson 961Virus Scanning and Malware Detection Integration
EncryptedSharedPreferences
for key-value pairs and the **KeyStore** system for cryptographic keys.
Lesson 2720Android Secure Storage and Data Protection
Encryption handling
How does WPA2/WPA3 respond to replayed or modified encrypted frames?
Lesson 531Wireless Packet Injection
Encryption happens locally
on the sender's device using the recipient's public key
Lesson 2939What is End-to-End Encryption (E2EE)
Encryption in transit
All traffic traverses the internet encrypted via IPsec, protecting against interception
Lesson 1840VPN Connections to CloudLesson 3004IaC State File Security
Encryption of Backups
Always encrypt key backups using strong encryption.
Lesson 311Key Backup and Recovery ProceduresLesson 317Key Backup and Recovery
Encryption operations
Data is encrypted before upload
Lesson 1766Client-Side Encryption for Cloud Data
Encryption protocols
AES-256, SHA-256 for HMAC
Lesson 1779VPN and Private Connectivity Encryption
Encryption Requirements
should be mandatory for all Bluetooth connections.
Lesson 560Bluetooth Security Best Practices
Encryption stays intact
Data should remain encrypted both in transit between regions and at rest in each location
Lesson 1786Cross-Region Replication and Backup Strategies
Encrypts all traffic
(mTLS) between services automatically
Lesson 1971Network Policies and Service Mesh Security
Encrypts blocks on-the-fly
when your instance writes data
Lesson 1770Encryption for Block Storage and Virtual Disks
Encrypts the DEK
with your KMS key (the key encryption key)
Lesson 1770Encryption for Block Storage and Virtual Disks
Encrypts the payload
using algorithms like AES or 3DES
Lesson 478Encapsulating Security Payload (ESP)
End-Entity Certificate
(Leaf): Your website's actual certificate, signed by an intermediate CA.
Lesson 177Certificate Chains and Hierarchies
End-to-End Confirmation
If someone suspects you're communicating with a specific server, they only need to monitor your entry point and that exit point—they don't need global surveillance.
Lesson 2988Tor Threat Model and Limitations
end-to-end encryption
protect your data, but they trust fundamentally different parties.
Lesson 2940E2EE vs Transport EncryptionLesson 2973Secure File Sharing Service Evaluation
End-to-End Security
Lifecycle protection from data collection to destruction
Lesson 2879Introduction to Privacy by Design
Endpoint
Where to send packets (IP:port), optional for roaming peers
Lesson 494WireGuard Peer Configuration and Key Management
Endpoint changes
Log when peer endpoints shift (may indicate compromise or misconfiguration)
Lesson 498WireGuard Deployment Best Practices and Monitoring
Endpoint defenses
protect individual devices—servers, workstations, containers.
Lesson 2657Perimeter, Internal, and Endpoint DefensesLesson 2661Monitoring and Response Across Layers
Endpoint management suites
(Microsoft Intune, JAMF, VMware Workspace ONE) push firewall configurations to mixed environments including remote devices
Lesson 1590Host Firewall Management at Scale
Energy sector
NERC CIP for critical infrastructure protection
Lesson 1984Industry-Specific Cloud Compliance
Enforce Content-Type
Set and validate `Content-Type` headers on both requests and responses to prevent content sniffing attacks
Lesson 1039Input Validation and Output Encoding
Enforce network segmentation
with policies while **monitoring for anomalies**
Lesson 1661Container Runtime Security Best Practices
Enforced mode
Actively blocks non-compliant code
Lesson 1594Windows Defender Application Control (WDAC)
Enforcement
Regularly verify systems match their baseline
Lesson 1617Configuration Management Fundamentals
Enforcement logic
checks current usage against quotas before processing requests, returning `429 Too Many Requests` or `403 Quota Exceeded` when limits are reached, ideally with headers showing remaining quota.
Lesson 1016Quota Management and Tiered Access Control
Enforcement Mechanisms
Policies without teeth are suggestions.
Lesson 553Wireless Security Policies and Compliance
Enforces fail-safe defaults
if the choke point fails closed, no unauthorized access occurs
Lesson 29Security Choke Points
Enforces least privilege
Users get only the permissions their role requires, automatically
Lesson 1428Group Management and Role Separation
Enforces separation
between code and secrets (concept 1314)
Lesson 1319The Twelve-Factor App and Environment Configuration
Enforcing mode
is the production state where SELinux actively blocks unauthorized actions.
Lesson 1454SELinux Modes and Policy Types
Enhanced monitoring difficulty
Binary protocols are harder to inspect with traditional web application firewalls and logging tools
Lesson 1097HTTP/2 Protocol Architecture and Security Model
Enhanced security
No single point of compromise.
Lesson 264Threshold Signatures (TSS)
Enhanced security posture
for highly sensitive workloads
Lesson 1815Network Isolation with Dedicated Tenancy
Enrichment actions
Query endpoint logs, check historical travel patterns
Lesson 2350Triage Playbooks and Runbooks
Enrichment and Correlation
The SIEM correlates compliance violations with other signals:
Lesson 1995Compliance Tool Integration with SIEM
Enrolling certificates
Add new trusted signing keys to the authorized database (db) for custom-signed bootloaders
Lesson 1462Configuring and Managing Secure Boot
Enrollment protocols
EST (Enrollment over Secure Transport) adapted for constrained environments
Lesson 2792Certificate-Based Authentication in Constrained Devices
Ensemble and randomization defenses
flip the script by introducing uncertainty: instead of one predictable model, you deploy multiple models or add random transformations, forcing attackers to craft examples that work across *all* possible configurations—a much harder problem.
Lesson 2852Ensemble and Randomization Defenses
Ensemble models
Train multiple models on different data subsets; poisoning affects only some
Lesson 2826Defense Strategies Against Poisoning
Ensures complete mediation
nothing bypasses your checks
Lesson 29Security Choke Points
Enter quantum computers
Unlike classical computers that process bits (0 or 1), quantum computers use *qubits* that can exist in multiple states simultaneously.
Lesson 267The Quantum Threat to Current Cryptography
Enterprise
for organizations needing user tracking, credential management, and regulatory compliance.
Lesson 515WPA2-PSK vs WPA2-Enterprise
Enterprise app stores
function like private versions of the App Store or Google Play, containing only organization- approved applications.
Lesson 2746Mobile App Distribution and Whitelisting
Enterprise Mobility Management (EMM)
expands the scope to include mobile application management (MAM), mobile content management (MCM), and identity management.
Lesson 2743Enterprise Mobility Management (EMM) and UEM
Entities
Users, documents, organizations, groups
Lesson 800Relationship-Based Access Control (ReBAC)
Entity relationships
Which users typically access which systems, peer group behavior
Lesson 1900User and Entity Behavior Analytics (UEBA)
Entropy analysis
Detecting random-looking strings that might be tokens
Lesson 2050Secret Detection in CommitsLesson 3031Secret Detection in Pipelines
Entropy exhaustion
Long-running systems might generate millions of keys — the initial entropy gets "stretched thin"
Lesson 291PRNG State and Reseeding
entropy pool
, a collection of unpredictable data gathered from hardware events (keyboard timing, disk I/O, network packets, etc.
Lesson 290Blocking vs Non-Blocking RandomnessLesson 294Entropy Sources and CollectionLesson 295Entropy Pool Management
Entropy thresholds
– how random a string must be to qualify
Lesson 1258False Positive Management and Custom Rules
Enumerate endpoints
that accept object identifiers
Lesson 1021Testing for BOLA Vulnerabilities
Enumerate entry points
List every way data enters your system (web forms, APIs, network services)
Lesson 73Attack Surface Analysis
Enumerate running processes
to find tokens belonging to privileged accounts (domain admins, SYSTEM, etc.
Lesson 2130Token Manipulation and Impersonation
Enumerating Processes
List all running processes, including those hidden by rootkits.
Lesson 2392Process and Thread Analysis
Enumeration
Determine service versions and configurations
Lesson 2434Vulnerability Scanning Fundamentals
Envelope encryption
is the core pattern: your data is encrypted with a DEK, then that DEK is encrypted with your KMS master key.
Lesson 1767Key Management Services (KMS) Deep DiveLesson 1797Key Management for Database Encryption
Environment attributes
time of day, IP address, device security status, threat level
Lesson 799Attribute-Based Access Control (ABAC)
Environment separation
Connect development and testing VPCs while maintaining isolation from production
Lesson 1836VPC Peering Fundamentals
Environment setup
Configure database connections, workspaces, and listeners at startup
Lesson 2201Automation with Resource Scripts
Environment variables in logs
When a function crashes or logs debugging information, the entire execution context—including environment variables—may be dumped to CloudWatch Logs, Azure Monitor, or similar services.
Lesson 1962Sensitive Data Exposure
Environment-based groups
`ProductionAccess`, `DevelopmentAccess`
Lesson 1711IAM Groups: Organizing Users and Permission Sets
Environment-specific
Separate keys for development, staging, and production
Lesson 1009API Key Authentication: Design and Security
Environment-specific gates
Stricter rules for production than staging
Lesson 2063Release Gating Fundamentals
Environmental factors
(compensating controls, network exposure)
Lesson 2452Risk-Based Prioritization Frameworks
Environmental metrics
How the vulnerability affects *your specific environment*
Lesson 2160Vulnerability Severity and Risk RatingLesson 2445CVSS Temporal and Environmental Metrics
Environmental sensors
Detecting abnormal temperature, voltage, light exposure, or vibration patterns
Lesson 2775Physical Tampering and Anti-Tamper Mechanisms
Environmental variations
Lighting angles, shadows, reflections, distance
Lesson 2814Physical World Adversarial Examples
Environmental/context attributes
Situational factors (time_of_day=business_hours, location=corporate_network, device_type=managed_laptop)
Lesson 20Attribute-Based Access Control (ABAC)
Environments
Production, staging, development each get their own VPC
Lesson 1812VPC Segmentation Strategies
Ephemeral infrastructure
Containers and serverless functions exist for seconds, making post-incident forensics challenging.
Lesson 1886Cloud Threat Detection Overview
Ephemeral key exchange
Both parties generate temporary key pairs that change frequently
Lesson 2943Forward Secrecy in E2EE
Ephemeral nature
Functions execute briefly and disappear, making logging and forensics harder (remember: you learned about evidence preservation in cloud IR)
Lesson 1940Serverless Architecture and Security Implications
Ephemeral Resources
Instances auto-scale up and down.
Lesson 1904Cloud IR Fundamentals and Shared Responsibility
EPSS probability
(exploitation likelihood)
Lesson 2452Risk-Based Prioritization Frameworks
Equifax (2017)
Breach of 147 million records via an unpatched Apache Struts vulnerability—patch was available for months
Lesson 1599The Critical Role of Patch Management
Eradication procedures
Removing malware, revoking compromised credentials
Lesson 2372IR Playbooks and Runbooks
Error rates
Typical ARP conflicts, retransmissions, or packet drops
Lesson 416Network Monitoring and Baselining
Escalate privileges
by finding systems with weaker controls or cached credentials
Lesson 2150Lateral Movement Fundamentals and Objectives
Escalation
happens when incidents exceed the analyst's authority or complexity level.
Lesson 2308SOC Analyst Responsibilities and Workflows
Escalation criteria
When to notify management or activate incident response team
Lesson 2311Playbooks and Standard Operating ProceduresLesson 2350Triage Playbooks and Runbooks
Escape arguments properly
using language-specific functions
Lesson 610Safe Command Execution Practices
Escape rate
Security issues that reach production despite testing
Lesson 3017Test Coverage and Effectiveness Metrics
Escort requirements
determine whether visitors must be accompanied at all times.
Lesson 2285Visitor Management and Temporary Access
ESP header alteration
NAT devices modify IP headers (addresses and checksums).
Lesson 482NAT Traversal (NAT-T) in IPsec
ESP over AH
since ESP provides both encryption and authentication, while AH only authenticates.
Lesson 481IPsec Cryptographic Algorithms and Cipher Suites
Espionage
involves stealing confidential information, trade secrets, intellectual property, or strategic intelligence.
Lesson 49Motivations: Espionage and Intelligence GatheringLesson 53Opportunistic vs Targeted Attackers
Establish authority and accountability
– Who owns security decisions?
Lesson 2487Purpose and Scope of Information Security Policy
Establish Baselines
Document current posture, set realistic improvement targets, and measure progress quarterly.
Lesson 2011CSPM Vendor Selection and Deployment
Establish communication channels
back to the attacker's server
Lesson 646Persistent Backdoors via DOM Manipulation
Establish fallback mechanisms
if one persistence method is discovered
Lesson 1536Persistence Fundamentals and Attacker Goals
Establish persistence
for future exploitation
Lesson 2277USB Drop Attacks and Malicious Devices
Establish redundant access
across multiple systems to maintain persistence
Lesson 2150Lateral Movement Fundamentals and Objectives
Establish secure coding practices
– Developers must follow standards that prevent common flaws.
Lesson 2576Requirement 6: Secure Development
ESTABLISHED
Part of an active, two-way conversation (both sides have exchanged packets)
Lesson 440Stateful Firewall with Connection Tracking
Established standards compliance
Many regulations and frameworks specifically require AES
Lesson 121Stream Ciphers vs Block Ciphers: When to Use Each
Establishing baselines
means documenting your system's normal behavior:
Lesson 1558Behavioral Analysis and Anomaly Detection
Establishing Gates
Define failure thresholds based on vulnerability severity.
Lesson 1377Integrating DAST into CI/CD
Establishment criterion
Any organization with an establishment (office, subsidiary) in the EU processing personal data
Lesson 2551GDPR Overview and Scope
ETSI EN 303 645
is the European standard for consumer IoT security.
Lesson 2758IoT Regulatory Landscape and Security Standards
Ettercap
is the veteran Swiss Army knife of MITM attacks.
Lesson 401MITM Attack Tools and Frameworks
EU Cyber Resilience Act
will mandate conformity assessments before devices can be sold.
Lesson 2758IoT Regulatory Landscape and Security Standards
Evade detection
by distributing activity across numerous hosts rather than operating from one suspicious system
Lesson 2150Lateral Movement Fundamentals and Objectives
Evade signature matching
because the attack pattern isn't visible in any single fragment
Lesson 369Fragmentation and Packet Manipulation
Evading usage fees
Cloning commercial ML APIs to avoid payment
Lesson 2827Model Extraction Attack Fundamentals
Evaluate the polynomial
at different x-coordinates to create shares
Lesson 263Shamir's Secret Sharing and Polynomial Interpolation
Evaluates permissions
using your chosen model (RBAC, ABAC, etc.
Lesson 841Centralized Authorization Logic
Evaluation
The evaluator processes the garbled gates using the labels, learning only the final output
Lesson 258Garbled Circuits for Two-Party Computation
Evaluation criteria
Look for accuracy (low false-positives), timeliness (how fresh are IOCs?
Lesson 2339Threat Intelligence Feeds and Sources
Evasion attacks
happen at inference time.
Lesson 2807Introduction to Adversarial Machine Learning
Evasion rotation
Cycling through domains and URLs as they get blacklisted
Lesson 2261Phishing Infrastructure and Automation
Evasion techniques
combine these elements: multiple encoding iterations, unusual formats, custom templates, and platform-specific tricks.
Lesson 2196Advanced Payload Generation with msfvenom
Eve → Alice
Eve sends a different public value to Alice
Lesson 156Man-in-the-Middle Attacks on Diffie-Hellman
Eve → Bob
Eve intercepts it and sends her own public value to Bob instead
Lesson 156Man-in-the-Middle Attacks on Diffie-Hellman
Event
Failed login attempt from unusual location
Lesson 2361Incident vs Event: Defining the Threshold
Event 1
User account locked (from Active Directory)
Lesson 2318Correlation Rules and Detection Logic
Event 2
Same username attempts VPN login from new country (from VPN logs)
Lesson 2318Correlation Rules and Detection Logic
Event 3
Successful admin login to sensitive server (from server logs)
Lesson 2318Correlation Rules and Detection Logic
Event Channels
are logical containers that categorize events by purpose and audience.
Lesson 1508Windows Event Log Architecture and Components
Event Consumer
– Defines *what action* to take (run a script, execute a command)
Lesson 1541WMI Event Subscriptions
Event Filter
– Defines *when* to trigger (e.
Lesson 1541WMI Event Subscriptions
Event History
provides 90 days of searchable management events in the console—free and automatic.
Lesson 1871CloudTrail for API Activity Monitoring
Event ID 13
Registry value modification
Lesson 1512Sysmon Installation and Configuration
Event ID 5
(Process Termination) records when processes end, letting you track execution duration and abnormal exits.
Lesson 1513Sysmon Process and Network Monitoring
Event Injection
Attackers can craft events that exploit your function's logic.
Lesson 1943Event-Driven Security Risks
Event Log
system, viewed through Event Viewer but stored physically as `.
Lesson 1469Common Log File Locations
Event normalization
is the SIEM's translation engine.
Lesson 2317Event Normalization and Parsing
Event payload injection
occurs when untrusted data enters through API Gateway, S3 events, SQS messages, or HTTP triggers.
Lesson 1944Serverless Data Flow and Injection Risks
Event Providers
are the applications, drivers, and system components that generate events.
Lesson 1508Windows Event Log Architecture and Components
Event Streaming
Compliance tools generate events when violations occur (e.
Lesson 1995Compliance Tool Integration with SIEM
Event taxonomy
Different service events map to common categories (authentication, network, data access)
Lesson 1879Cloud Log Collection and Normalization
Event variety
Inputs arrive from HTTP, queues, storage events—not just web forms
Lesson 1960Injection Vulnerabilities in Serverless
Event Viewer
under `Applications and Services Logs > Microsoft > Windows > AppLocker`.
Lesson 1593Windows AppLocker
Event-driven remediation
CloudWatch Events triggering Lambda functions to restore correct configurations
Lesson 3046Auto-Remediation for Infrastructure Drift
Event-source assumptions
are dangerous: just because an API Gateway or queue invoked your function doesn't mean the *original* requester is authorized.
Lesson 1964Broken Access Control in Functions
events
messages, file uploads, database changes, API calls, or scheduled tasks.
Lesson 1943Event-Driven Security RisksLesson 2361Incident vs Event: Defining the Threshold
Every connection generates logs
.
Lesson 339TCP Connect Scanning
Every resource
(file, database record, API endpoint) gets a **security label** (e.
Lesson 797Mandatory Access Control (MAC)
Every user
receives a **clearance level** assigned by administrators
Lesson 797Mandatory Access Control (MAC)
Evidence Collection
For SOC 2 or ISO 27001 audits, gathering evidence across multiple platforms means different APIs, log formats, and export mechanisms.
Lesson 1986Multi-Cloud and Hybrid Compliance ChallengesLesson 1993Compliance Reporting and Evidence CollectionLesson 2597SOC 2 Audit Process and PreparationLesson 2599SOC 2 Reports and Continuous Compliance
Evidence Collection Tools
capture volatile data (memory dumps, network traffic) and disk images before systems are powered down or wiped.
Lesson 2373IR Tool Selection and Deployment
Evil twin attacks
– suspicious signal strength patterns or mismatched encryption settings
Lesson 550Wireless Packet Capture and AnalysisLesson 554Incident Response for Wireless Attacks
Evil Twin Setup
Push users off the legitimate network so they connect to a rogue access point instead
Lesson 527Deauthentication and Disassociation Attacks
Evil.com's JavaScript cannot
read the DOM tree of bank.
Lesson 857SOP Impact on JavaScript and DOM Access
Exabeam
Specializes in UEBA (User and Entity Behavior Analytics)
Lesson 2324Common SIEM Platforms and Vendor Landscape
Exact income
→ collect income bracket
Lesson 2898Granular Data Collection
Exact timestamp
→ collect hour or day of week
Lesson 2898Granular Data Collection
Examine each process
(the circles in your DFD):
Lesson 44Identifying Threats from Diagrams
Examine the evidence
– Review request/response pairs provided
Lesson 2213Scanner Issue Analysis and Validation
Example (invalid)
"By using our app, you consent to all data uses described in our 50-page policy.
Lesson 2932Consent Requirements and Valid Consent
Example (valid)
"Check here to receive our weekly newsletter [ ☐ ].
Lesson 2932Consent Requirements and Valid Consent
Example concept
(syntax varies by library):
Lesson 1234Database API Safety and Parameterization
Example flow
`<script src="api.
Lesson 858SOP Exceptions and Relaxations
Example principle
If a private subnet only needs internet egress through a NAT Gateway, don't add direct routes to other VPCs or peering connections unless required.
Lesson 1835Subnet Security Best Practices
Example test input
`admin*` or `*)(uid=*))(|(uid=*`
Lesson 614LDAP Injection Detection and Testing
Example validation logic (conceptual)
Lesson 971Path Canonicalization and Validation
Exception Request
Documenter *why* the drift is necessary and for how long
Lesson 2027Drift Reporting and Exception Management
Exception stack traces
that include method parameters containing secrets
Lesson 1354Preventing Secrets in Logs and Error Messages
Exception tracking
approved deviations with business justification
Lesson 2625Remediation Tracking and Reporting
Exceptions (UNLESS)
Legitimate scenarios where the policy shouldn't apply.
Lesson 1804DLP Policy Design and Implementation
Excessive Collection
Are you gathering more data than necessary for your stated purpose?
Lesson 2890Privacy Risk Identification
Exchange Rate Manipulation
Attackers may tamper with client-side rate parameters or exploit cached/outdated rates.
Lesson 924Currency and Conversion Exploits
Exclude cautiously
Only filter well-understood, stable processes (Windows system binaries, trusted applications)
Lesson 1515Advanced Sysmon Configuration and Filtering
Exclude lists
Administrative endpoints, logout URLs, or destructive actions (`/admin/delete`, `/api/payment/charge`)
Lesson 1374DAST Configuration and Scope Management
Exclusions
What's intentionally left out, and why?
Lesson 2601ISMS Scope Definition
Exclusions and Tuning
Strategic exclusions reduce unnecessary scanning overhead.
Lesson 1583EDR Deployment and Performance Considerations
Executable binary
Mach-O format, often encrypted (FairPlay DRM)
Lesson 2723Mobile App Package Formats and Structure
Execute deletion
Remove or anonymize data across all systems
Lesson 2936Right to Erasure and Deletion
Execute pre-programmed payloads
(like Rubber Ducky attacks that type malicious commands faster than humans can react)
Lesson 2277USB Drop Attacks and Malicious Devices
Execute procedures
matching the adversary's documented methods, not generic exploits
Lesson 2184Adversary Emulation with ATT&CK
Execute remote commands
through SMB-based protocols like PsExec
Lesson 2154SMB and Administrative Shares
Execute requests systematically
– call endpoints with different credentials
Lesson 1026Authorization Testing Automation
Execute stored procedures
`EXEC xp_cmdshell('net user hacker password /ADD')`
Lesson 580Stacked Queries and Multiple Statements
Execute the SUID binary
from the victim machine—it runs with root privileges
Lesson 2147NFS and Network File System Exploits
Executing stored procedures
Invoking powerful built-in procedures (like `xp_cmdshell` in SQL Server) that weren't properly restricted
Lesson 584Privilege Escalation via SQL Injection
Execution logs
(CloudWatch, Application Insights) are critical—they capture invocation parameters, execution duration, and errors.
Lesson 1920Container and Serverless Forensics
Executive Assistant
"The CEO needs these files before the board meeting"
Lesson 2263Pretexting Fundamentals and Attack Scenarios
Executive dashboards
High-level compliance percentages, risk exposure
Lesson 1607Patch Compliance Monitoring and Reporting
Executive reports
Strategic-level summaries with business impact and risk trends
Lesson 2343Threat Intelligence Analysis and Reporting
Executive sponsorship
Someone with budget authority must formally approve accepting the risk
Lesson 2521Risk Acceptance and Documentation
Executive updates
Email summaries, executive briefings, dedicated conference bridges
Lesson 2426Stakeholder Communication During Incidents
Executives and C-Suite
Impersonating CEOs or CFOs exploits hierarchical structures.
Lesson 2265Authority and Impersonation Techniques
Exfiltration Techniques
Collected data is transmitted to command-and-control servers using encrypted channels, often piggybacking on legitimate traffic to avoid detection by monitoring tools you learned about with Sysmon and Windows Event Logging.
Lesson 1523Spyware and Information Stealers
Existential unforgeability
Cannot forge signatures without the private key
Lesson 271CRYSTALS-Dilithium: Post-Quantum Digital Signatures
Existing Controls
What mitigations are already in place
Lesson 2506Risk Register Development
Existing controls effectiveness
– Do your current defenses reduce probability?
Lesson 2499Likelihood and Impact Determination
Exit policies
Some relays refuse exit traffic; only about 10-15% are exits
Lesson 2985Tor Relays: Guard, Middle, and Exit
Exit relay
Decrypts final layer and connects to destination, but doesn't know your IP
Lesson 2983Tor Network Architecture
Exit relays
Handle final connection to websites (highest risk for operators)
Lesson 2983Tor Network ArchitectureLesson 2985Tor Relays: Guard, Middle, and Exit
Expanded attack surface
– More code means more potential vulnerabilities
Lesson 2667Economy of Mechanism
Expanded opt-out
to include sharing (not just sale) of personal information
Lesson 2568CPRA Amendments and Enforcement
Expectation Over Transformations
instead of optimizing against a single image, you optimize against the *expected outcome* across many simulated physical transformations (brightness changes, rotations, blur, noise).
Lesson 2814Physical World Adversarial Examples
Expected flows
being blocked by misconfigured policies
Lesson 2691Monitoring and Troubleshooting Microsegmented Environments
Expedited approval
Pre-authorized emergency change procedures with streamlined sign-off
Lesson 2459Emergency and Out-of-Band Patching
Expensive retrofits
Redesigning core systems costs far more than building them securely initially
Lesson 12Security as a Non-Functional Requirement
Experiment iteratively
Click "Send" to submit your modified request and immediately see the response in the right pane
Lesson 2209Burp Repeater for Manual Testing
Expert Determination
A qualified statistician certifies the re-identification risk is very small
Lesson 2582Protected Health Information (PHI)
Expert Review
Have independent analysts attempt re-identification using domain knowledge and public information sources.
Lesson 2911Measuring and Testing Anonymization Effectiveness
Expiration
Set tokens to expire after a reasonable timeframe—perhaps after 15-30 minutes of inactivity, or when the session ends.
Lesson 871Token Rotation and LifecycleLesson 2027Drift Reporting and Exception Management
Explicit allow required
At least one policy must explicitly allow the action
Lesson 1713Policy Structure: Elements, Syntax, and Evaluation Logic
Explicit cleanup
After using a secret, overwrite the memory location with zeros or random data.
Lesson 1341Secret Caching and Memory Management
Explicit Deny
If any policy contains an explicit "Deny" statement matching the request, access is immediately blocked.
Lesson 1715Policy Evaluation Logic and Precedence
Explicit sequence numbers
in each record handle packet reordering
Lesson 2795DTLS and TLS 1.3 for IoT
Exploit Code Maturity
Is there a working exploit?
Lesson 2445CVSS Temporal and Environmental Metrics
Exploit Frameworks
Tools like Metasploit and ExploitDB contain ready-to-use exploit code mapped to CVE identifiers.
Lesson 365Combining Fingerprinting with Vulnerability Research
Exploit Kits
These are pre-packaged toolkits that automatically probe your browser, plugins (Flash, Java), and operating system for known vulnerabilities.
Lesson 1528Drive-by Downloads and Web-Based Infection
Exploit modules
target specific vulnerabilities to gain code execution.
Lesson 2204Custom Module Development
Exploit validation
Attempt to reproduce the vulnerability in a controlled manner (if safe and authorized)
Lesson 2441False Positives and ValidationLesson 2767Firmware Emulation and Dynamic Analysis
Exploit-based attacks
target vulnerabilities in Office software itself (like CVE exploits), requiring no user interaction beyond opening the file.
Lesson 2250Malicious Office Document Generation
Exploitability assessment
(exploit code availability, attack complexity)
Lesson 2452Risk-Based Prioritization Frameworks
Exploitability Metrics
Is there a public exploit available?
Lesson 1602Vulnerability Assessment and Prioritization
Exploitation Status
– Is this actively exploited, proof-of-concept available, or just theoretical?
Lesson 2448SSVC (Stakeholder-Specific Vulnerability Categorization)
Exploiting CVEs
Moving beyond just default credentials to unpatched vulnerabilities
Lesson 2754IoT Botnets: Mirai and Beyond
Exploiting kernel vulnerabilities
through privilege escalation exploits
Lesson 1547Kernel-Mode Rootkits Fundamentals
Exploiting weaknesses
in driver loading mechanisms or Secure Boot bypasses
Lesson 1547Kernel-Mode Rootkits Fundamentals
Exploits
Code that takes advantage of vulnerabilities
Lesson 2193Metasploit Architecture and Components
Explore boundary conditions
defined by the specification
Lesson 1387Generation-Based Fuzzing
Exponential backoff
Retry with increasing delays to avoid overwhelming the service
Lesson 1334Secret Store Access Patterns
Exponential Mechanism
solves this by turning selection into a *privacy-preserving lottery*.
Lesson 2919The Exponential Mechanism
Exponential time O(2ⁿ)
Dangerous—catastrophic backtracking territory
Lesson 1178Analyzing Regex Complexity with Tools
Export
for documentation or further analysis
Lesson 356Automated Network Mapping Tools
Export Address Table (EAT)
The DLL's table advertising which functions it offers and where they're located.
Lesson 1551Import Address Table (IAT) and Export Address Table Hooking
Export logs immediately
– Copy logs to immutable storage before retention policies delete them
Lesson 1906Evidence Preservation in Cloud Environments
Exposed access keys
Hardcoded in code repositories, logs, or configuration files
Lesson 1696Identity as Attack Surface
Exposed Debug Endpoints
Development endpoints like `/api/debug`, `/api/health/verbose`, or `/admin/status` leak sensitive system information or bypass authentication entirely.
Lesson 1035API9:2023 - Improper Inventory Management
Exposed debug ports
and unnecessary network services
Lesson 2751Common IoT Vulnerabilities and Weaknesses
Exposed Network Jacks
Unused Ethernet ports in conference rooms, lobbies, or hallways provide direct network access.
Lesson 2278Physical Attacks on Network Infrastructure
Exposed Services
A database server listening on `0.
Lesson 2115Exploitation via Misconfiguration
Extended Key Usage (EKU)
goes further, specifying *application-level* purposes:
Lesson 185Name Constraints and Certificate Extensions
Extender > BApp Store
in Burp Suite.
Lesson 2214Burp Extensions and BApp Store
Extender > Extensions
tab, where you can enable, disable, or uninstall them.
Lesson 2214Burp Extensions and BApp Store
Extender API
a programming interface supporting Java, Python, and Ruby.
Lesson 2214Burp Extensions and BApp Store
Extensions (v3 only)
Optional extra data like allowed usages, alternate names (SANs), key identifiers, and constraints
Lesson 171X.509 Certificate Structure and Format
External API communication
Isolate all external network calls in specific modules with their own validation
Lesson 1212Separation of Concerns for Security Boundaries
External firewall
filters traffic from the internet to the DMZ, allowing only necessary public services (ports 80/443 for web, 25 for email)
Lesson 423Demilitarized Zones (DMZ)Lesson 449DMZ Architecture and Design
External ID
is a random, unique secret string you generate and share *only* with the trusted third-party.
Lesson 1739External ID for Third-Party Access
External issues
include regulatory requirements, market conditions, technological changes, and threat landscapes.
Lesson 2602Context of the Organization (Clause 4)
External parties
Customers, vendors, regulators, law enforcement (when applicable)
Lesson 2426Stakeholder Communication During Incidents
External resource coordination
means identifying and building relationships with specialized partners *before* an incident occurs.
Lesson 2378External Resource Coordination
external secret management systems
(HashiCorp Vault, AWS Secrets Manager) integrated via operators
Lesson 1668Securing etcd and Secrets ManagementLesson 1972Secrets Management in Kubernetes
External Secrets Operator
that syncs from external stores into native Secret objects
Lesson 1972Secrets Management in Kubernetes
External stakeholders
Only when necessary, carefully coordinated
Lesson 2426Stakeholder Communication During Incidents
External System Abuse
APIs might be tricked into attacking third-party systems, making requests that appear to come from your legitimate server's IP address.
Lesson 1033API7:2023 - Server Side Request Forgery (SSRF)
External to internal
(Internet → corporate network)
Lesson 2645Understanding Trust Boundaries
Extract configuration details
Old JavaScript files might contain hardcoded API keys or internal IP addresses.
Lesson 335Wayback Machine and Historical Website Analysis
Extract encryption keys
Monitor cryptographic API calls in memory
Lesson 2726Dynamic Analysis and Runtime Instrumentation
Extract firmware
directly from flash memory chips using chip-off techniques
Lesson 2755Physical Security Threats to IoT Devices
Extract keys
Force algorithms to reveal secret material through predictable errors
Lesson 2774Fault Injection Attacks
Extract license metadata
from package manifests, headers, or license files
Lesson 3032License Compliance Scanning
Extract session identifiers
from HTTP headers, cookies (`Set-Cookie:` and `Cookie:` headers), or authentication tokens
Lesson 400Session Hijacking via MITM
Extract soft labels
from the teacher using high temperature softmax (which spreads probability mass across classes)
Lesson 2849Defensive Distillation
Extract source code
to find additional vulnerabilities
Lesson 589SQLMap Advanced Exploitation Features
Extract the x-coordinate
of that point and reduce it modulo the curve order (this becomes `r`, part of your signature)
Lesson 164ECDSA (Elliptic Curve Digital Signature Algorithm)
Extract their ATT&CK techniques
from threat intelligence reports or ATT&CK's group profiles
Lesson 2184Adversary Emulation with ATT&CK
Extract tickets
from LSASS memory or from disk (`lsass.
Lesson 2152Pass-the-Ticket and Kerberos Exploitation
Extraction
Applications request random bytes via system APIs
Lesson 295Entropy Pool Management
Extreme persistence
Survives OS reinstallation, hard drive formatting, even disk replacement
Lesson 1554UEFI and Firmware Rootkits

F

Facial artifacts
Unnatural skin textures, inconsistent lighting across facial features, blurred boundaries around hairlines, or misaligned facial landmarks
Lesson 2867Deepfake Detection: Forensic Artifacts and ML Classifiers
Facility security plans
Procedures for emergencies (fire, power outage)
Lesson 2585HIPAA Security Rule: Physical Safeguards
Fail closed, not open
When validation fails, deny access.
Lesson 1156Validation Error Handling
Fail Conditions
are rules that stop the build when specific criteria are met.
Lesson 1308Integrating Scanning into CI/CD Pipelines
Fail fast when appropriate
Block builds only for high-severity issues initially
Lesson 1365Integrating SAST into Development Workflow
Fail fast, fail clearly
When security issues are found, developers need immediate, actionable feedback—not cryptic reports generated hours later.
Lesson 2057Continuous Security Integration
Fail-Fast Principle
Configure your pipeline to halt immediately when scans detect critical issues.
Lesson 2021IaC in CI/CD Pipelines: Security Gates and Approval Workflows
Fail-safe behavior
What happens when it fails?
Lesson 2642Evaluating Architectural Security Controls
Fail-safe vs. fail-secure modes
Determines whether gates unlock (evacuation) or lock (security) during power failure
Lesson 2282Mantrap and Turnstile Controls
Failed assume attempts
indicating reconnaissance
Lesson 1736Best Practices for Temporary Credentials
Failed authentication attempts
While WireGuard silently drops invalid packets, system logs may reveal port scanning
Lesson 498WireGuard Deployment Best Practices and Monitoring
Failure Handling
requires automatic rollback mechanisms.
Lesson 3047Automated Vulnerability Patching
Failure independence
Does this layer protect when others fail?
Lesson 2662Defense-in-Depth Trade-offs and Cost-Benefit
FAIR
takes a quantitative approach, breaking risk down into financial terms using probability distributions.
Lesson 2507Risk Assessment Methodologies and Frameworks
Fair resource distribution
across all customers
Lesson 1016Quota Management and Tiered Access Control
Fake wireless adapters
that act as rogue access points
Lesson 2277USB Drop Attacks and Malicious Devices
Fallback logic
Apps try the new secret first, fall back to old if needed
Lesson 1346Zero-Downtime Rotation Patterns
False Acceptance Rate (FAR)
The system incorrectly grants access to an unauthorized person
Lesson 2281Biometric Access Controls
False condition
Page behaves differently—blank response, error page, or different timing
Lesson 568Blind SQL Injection Fundamentals
False flag operations
Planting indicators suggesting another group
Lesson 2337Threat Actors and Attribution
False negatives
Scanners miss some threats (no tool is 100% accurate)
Lesson 961Virus Scanning and Malware Detection Integration
False Positive Management
is crucial at scale.
Lesson 2053Test Result Management and Remediation Workflows
False Positive Rate (FPR)
This measures how often alerts fire incorrectly.
Lesson 2354Alert Quality Metrics
False positive reduction
→ Analyst capacity freed for higher-value work
Lesson 2359Reporting SOC Performance to Leadership
False Rejection Rate (FRR)
The system incorrectly denies access to an authorized person
Lesson 2281Biometric Access Controls
Familiarity exploitation
Messages appearing to come from known apps or contacts
Lesson 2700User Behavior and Social Engineering
Family Emergency Scams
Cloning a child's or relative's voice to demand urgent money transfers
Lesson 2865Audio Deepfakes and Voice Cloning Attacks
Family/location diversity
Avoiding relays run by the same operator or country
Lesson 2985Tor Relays: Guard, Middle, and Exit
Fast acknowledgment
Auto-reply immediately: "We received your report and will investigate.
Lesson 2291Reporting Mechanisms and Culture
Fast constant-time operations
Built-in resistance to timing side-channel attacks
Lesson 167Curve25519 and EdDSA
Fast enough
for real-time applications (HTTPS, blockchain)
Lesson 205Computational Efficiency Requirements
Faster
No need to complete and properly close connections
Lesson 340SYN Scanning (Half-Open)
Faster Containment Options
You can isolate compromised resources instantly via security group changes or instance snapshots —much faster than physical network segmentation.
Lesson 1904Cloud IR Fundamentals and Shared Responsibility
Faster incident response
since you know the expected state
Lesson 1412Baseline Security Configuration
Faster investigation
Correlated signals tell a story, reducing analyst workload
Lesson 1902Multi-Signal Correlation for Detection
Faster key generation
Smaller keys mean less random data to generate
Lesson 163ECC vs RSA: Security and Performance
Faster offboarding
One-click removal when employees leave
Lesson 1698Identity Federation and Single Sign-On
Faster operations
ECC point multiplication is computationally lighter than RSA's large modular exponentiation
Lesson 163ECC vs RSA: Security and Performance
Faster signature generation
deterministic computation is simpler
Lesson 238EdDSA and Modern Signature Standards
FDA regulations
for medical devices storing data in cloud
Lesson 1984Industry-Specific Cloud Compliance
Feature-space clustering
Clean data from the same class typically clusters together.
Lesson 2824Detecting Poisoned Training Data
Federated identities
External identity providers (corporate Active Directory, Google Workspace) authenticate users who then assume roles in your cloud—no need to create duplicate cloud-native user accounts.
Lesson 1712IAM Roles: Federated and Assumable Identities
Federated identity
exchanges existing tokens for cloud credentials
Lesson 1722Service Account Keys and Credentials
Federated learning
(train models without centralizing data)
Lesson 2884Full Functionality and Positive-Sum
Federation configuration
properly integrating external identity providers
Lesson 1690Identity and Access Management Boundaries
FedRAMP
, **GDPR**, and **NIST 800-53**.
Lesson 2617Framework Mapping and Harmonization
FedRAMP authorization
(which you've studied) or meeting agency-specific security requirements.
Lesson 2615FISMA and Federal Compliance
FedRAMP Marketplace
Once authorized, your service is listed publicly, enabling other agencies to adopt it faster.
Lesson 2613FedRAMP Authorization Framework
Feedback
– Evaluate whether intelligence met needs and refine requirements
Lesson 2334Threat Intelligence Fundamentals and the Intelligence Lifecycle
Feedback loop
After each test input runs, the fuzzer checks if it triggered any new code paths
Lesson 1388Coverage-Guided FuzzingLesson 1885SIEM Performance Tuning and False Positives
Feistel network
is a symmetric structure used to build block ciphers like DES.
Lesson 86Feistel Network Architecture
Feistel network structure
(like DES) with 16 rounds.
Lesson 93Alternative Block Ciphers: Blowfish, Twofish, Serpent
Fetch Interception
A compromised service worker can modify API responses before they reach your application.
Lesson 1084Service Worker Message Interception
Fewer communication rounds
Reduce how often devices share updates to minimize exposure
Lesson 2843Federated Learning Privacy
Fewer false positives
Legitimate anomalies rarely trigger multiple unrelated alerts simultaneously
Lesson 1902Multi-Signal Correlation for Detection
Fiat-Shamir heuristic
is a technique that transforms interactive proofs into non-interactive ones.
Lesson 242Interactive vs Non-Interactive Proofs
FIDO2/WebAuthn
protocols to provide cryptographic proof tied to the exact domain you're authenticating to.
Lesson 1746Hardware Security Keys and FIDO2
Field matching
(user ID, IP address, hostname)
Lesson 2318Correlation Rules and Detection Logic
Field-based filtering
– Narrow results to specific event types, IP addresses, usernames, or time ranges.
Lesson 2320SIEM Query Languages and Search
Field-Level Encryption
protects specific sensitive fields (credit cards, SSNs) *beyond* TLS.
Lesson 1777API Gateway and Application-Level Encryption
File access monitoring
with precise who/what/when details
Lesson 1491Introduction to Linux Auditing Framework
File Deletion
Securely wiping tools, scripts, and artifacts from disk.
Lesson 2126Covering Tracks and Anti-Forensics
File Extraction
identifies file transfers within protocols like HTTP, FTP, or SMB.
Lesson 2411Protocol Analysis and Reconstruction
File format specifications
(XML schemas, JSON structures, protocol definitions)
Lesson 1387Generation-Based Fuzzing
File formats
Generate PDFs with circular references, JPEGs with unusual color spaces, or XML with deeply nested entities
Lesson 1390Structured Input Fuzzing
File hash rules
Permit exact file matches by hash
Lesson 1593Windows AppLocker
File inclusion
Including files where the extension is appended server-side
Lesson 1163Null Byte Injection and String Termination
File Infectors
target executable files.
Lesson 1519Viruses: Self-Replicating Code
File integrity monitoring
Alert on unauthorized changes to critical files
Lesson 2579Requirements 11-12: Testing and Policy
File Integrity Monitoring (FIM)
Detects unauthorized system changes malware makes
Lesson 1573Antivirus Limitations and Complementary Controls
File metadata
like timestamps and attributes
Lesson 2396Registry and File System in Memory
File Modifications
– File creation, deletion, modification, and attribute changes.
Lesson 1575EDR Data Collection and Telemetry
File Objects and Handles
Every open file has a kernel object.
Lesson 2396Registry and File System in Memory
File Rotation
Instead of one giant capture file, split output into smaller files (e.
Lesson 383Packet Capture Performance and Ring Buffers
File shares
(looking for names like "finance," "passwords," "confidential")
Lesson 2125Data Discovery and Staging
File size limits
to prevent resource exhaustion
Lesson 982Multi-Layer File Upload Validation Strategy
File size, MIME type
and detected file type
Lesson 989Upload Monitoring and Incident Response
File Storage
(like AWS EFS, Azure Files) offers network-attached file systems with hierarchical directories.
Lesson 1781Cloud Storage Service Models and Security Responsibilities
File system checks
Looking for `/su`, Cydia, Magisk binaries
Lesson 2728Root and Jailbreak Detection Bypass
File system modifications
that weren't in the original image
Lesson 1651Container Runtime Security Overview
File system paths
(expose server architecture)
Lesson 1040Error Handling and Information Disclosure
File system permissions
Mount directories as read-only by default; only specific processes get write access.
Lesson 1406Default Deny and Allowlisting
File upload forms
that process XML-based formats (SVG, DOCX, XLSX, PPTX)
Lesson 627Testing for XXE Vulnerabilities
File upload/download
capabilities for post-exploitation
Lesson 2244Evil-WinRM and PowerShell Remoting Attacks
File-based ingestion
Batch uploads of stored log files
Lesson 2316Log Sources and Event Collection Methods
FileCreate (Event ID 11)
Logs when files are created, capturing the process responsible, file path, and creation time.
Lesson 1514Sysmon File and Registry Activity Monitoring
FileCreateStreamHash (Event ID 15)
Monitors alternate data streams (ADS), a Windows feature attackers exploit to hide malicious code behind legitimate files.
Lesson 1514Sysmon File and Registry Activity Monitoring
Fileless Malware
Malicious PowerShell scripts, reflective DLL injection, or shellcode living in process memory without touching disk.
Lesson 2394Memory-Resident Malware Detection
Fileless techniques
execute entirely in memory using legitimate tools like PowerShell, leaving minimal forensic traces.
Lesson 2257Malicious Attachments and Payload Delivery
Filename sanitization
to block path traversal
Lesson 982Multi-Layer File Upload Validation Strategy
Files
Configuration files, scripts, browser saved passwords, SSH keys, database connection strings, and application credentials often sit unencrypted on disk.
Lesson 2157Credential Harvesting for Pivoting
Files and directories accessed
during first 10 seconds
Lesson 2404Artifact Analysis: Prefetch, Shimcache, and Amcache
Filter chaining
Adding conditions to extract additional data
Lesson 612LDAP Injection Fundamentals
Filter Escaping
protects LDAP search filters by escaping metacharacters according to RFC 4515.
Lesson 615Preventing LDAP Injection
Filter Evasion
Security filters block "script" but might miss "s ϲript" (Greek lunate sigma).
Lesson 1168Homograph and Confusable Character Attacks
Filter-to-Consumer Binding
– Links the two together
Lesson 1541WMI Event Subscriptions
FIN Scan
Sends only the FIN flag (normally used to close connections).
Lesson 367TCP Stealth Scan Techniques
FIN Scan (`-sF`)
sends packets with only the FIN (finish) flag set.
Lesson 343Advanced Nmap Scan Types
Final action
– Exploit the final step by referencing someone else's object ID
Lesson 818Multi-Step IDOR Exploitation
Final Mix
Alice adds her secret red to Bob's green = brown.
Lesson 153Diffie-Hellman Key Exchange Fundamentals
Final Permutation (FP)
Reverses the initial permutation
Lesson 87DES: Design and Weaknesses
Financial
– Direct costs, regulatory fines, lost revenue
Lesson 2499Likelihood and Impact Determination
Financial analytics
Banks compute risk scores on encrypted customer data without exposing account details to third- party analysts.
Lesson 2924Homomorphic Encryption Applications
Financial institutions
issuing cards
Lesson 2569PCI-DSS Overview and Scope
Financial loss scenarios
"Your payment failed—update now to avoid service termination"
Lesson 2268Urgency and Fear-Based Manipulation
Financial models
with transaction patterns
Lesson 2839Model Inversion Attacks
Financial systems
One person initiates a payment, another approves it
Lesson 7Separation of Duties and Privilege SeparationLesson 2664Separation of Duties
Find an unkeyed input
A header or parameter that affects the response but isn't in the cache key
Lesson 1116Cache Poisoning Attack Fundamentals
Find dangerous functions
(`strcpy`, hardcoded keys, disabled security checks)
Lesson 2762Reverse Engineering Firmware Binaries
Find removed endpoints
An old `/admin` or `/api/v1/debug` page might still exist on the live server, just unlinked.
Lesson 335Wayback Machine and Historical Website Analysis
Find the vulnerable input
Attackers look for application features that fetch URLs — image processors, webhooks, PDF generators, URL preview tools
Lesson 1935SSRF Attacks Against IMDS
Find unused credentials
Identify long-term keys, passwords, or access tokens that haven't been used recently
Lesson 1749Access Analyzer and Unused Access Detection
Finding win-win architectures
where privacy controls enhance—rather than limit—user experience
Lesson 2884Full Functionality and Positive-Sum
Findings prioritization
that cuts through noise to highlight genuine risks
Lesson 1886Cloud Threat Detection Overview
Fine-Grained Access Control
You can't grant Developer A access to production database secrets while denying access to Developer B using only environment variables.
Lesson 1324When Environment Variables Are Insufficient
Fine-grained sensor readings
→ collect aggregated summaries
Lesson 2898Granular Data Collection
Fingerprint systems
scan ridge patterns on fingertips.
Lesson 2281Biometric Access Controls
Fingerprinting Beyond IP
Combine multiple signals—device fingerprints, behavioral patterns, API key usage, session characteristics—to identify the same actor across different IPs.
Lesson 1017Rate Limiting Bypass Prevention and Monitoring
Fingerprinting large data
You can represent massive files with a compact, fixed-size "fingerprint.
Lesson 204Fixed-Length Output Property
Finite automata
(finite state machines) process input character-by-character in a single forward pass.
Lesson 1181Alternative Parsing Strategies
Firewall and IPS
Push malicious IP lists directly to network devices to create automatic blocking rules.
Lesson 2342Operationalizing Threat Intelligence
Firewall integration
Always restrict WireGuard's UDP port (typically 51820) to known peer IP addresses using your host firewall.
Lesson 498WireGuard Deployment Best Practices and Monitoring
Firewall logs
(network device time)
Lesson 2417Timeline Construction Fundamentals
Firewall records
show allowed and blocked connections, helping you understand attack paths and containment effectiveness.
Lesson 2384Network Evidence Collection
Firewalls
operate at the network perimeter and between internal segments.
Lesson 2650Segmentation Enforcement Mechanisms
Firewalls and Network Devices
SOAR playbooks can push IOCs (IP addresses, domains) to firewalls for automatic blocking, or pull connection logs for investigation.
Lesson 2329Integration and Orchestration
FireWire, Thunderbolt, or PCIe
to read RAM directly, bypassing the CPU and OS.
Lesson 2382Memory Acquisition Techniques
Firm
Likely vulnerable, but needs verification
Lesson 2213Scanner Issue Analysis and Validation
Firmware rootkits
embed themselves directly in the UEFI firmware storage (flash memory).
Lesson 1463UEFI Firmware Attacks and VulnerabilitiesLesson 1546Rootkit Definition and Classification
First Access
You request access to Company A's files.
Lesson 18Chinese Wall Model: Conflict of Interest Prevention
First-finder bonuses
for novel vulnerability classes
Lesson 2482Bounty Pricing and Reward Structures
Fix Rate and Time-to-Remediate
Lesson 3040Application Security Metrics
Fixed cameras
continuously monitor critical chokepoints like badge readers or mantraps.
Lesson 2284Video Surveillance and Monitoring
Fixed header bytes
(0x00, 0x02) identify this as encryption padding
Lesson 145RSA Padding Schemes: PKCS#1 v1.5
Fixed output size
A 1-byte file and a 1GB file produce the same length hash
Lesson 198Hash Function Fundamentals
Fixed-size records
(database fields) work well with `CBC` or authenticated modes like `GCM`, though you must handle padding carefully.
Lesson 106Mode Selection for Different Scenarios
Flag anomalies
like unsigned packages, checksum mismatches, or unexpected dependency additions
Lesson 1301Automated Package Verification Workflows
Flag Combinations
How systems respond to unusual flag combinations (like SYN+FIN together) differs
Lesson 359TCP/IP Stack Fingerprinting
Flag external access
Discover resources (like S3 buckets or IAM roles) accessible outside your organization
Lesson 1749Access Analyzer and Unused Access Detection
Flag policy violations
based on your organization's license allowlist/denylist
Lesson 3032License Compliance Scanning
Flag restricted records
so processing pipelines skip them while preserving the data
Lesson 2937Rights to Rectification and Restriction
FlatBuffers
take a fundamentally different approach:
Lesson 1191Alternative Serialization Formats
Flattery and Ego Appeals
"You must be pretty senior to have access to that system—how long have you been here?
Lesson 2267Elicitation Techniques and Information Gathering
Flexible and cost-effective
No additional hardware needed
Lesson 463Network TAPs vs SPAN Ports
Flips labels strategically
Change labels to the desired wrong class
Lesson 2819Label Flipping and Targeted Poisoning
Flow
traffic direction and connection state
Lesson 459Writing Effective IDS/IPS Rules
Flow Control Abuse
HTTP/2 uses `WINDOW_UPDATE` frames to control how much data can be sent.
Lesson 1098HTTP/2 Stream Vulnerabilities and Attacks
Flow data
(NetFlow, sFlow, IPFIX) provides summarized connection metadata: source/destination IPs, ports, protocols, byte counts, and timestamps.
Lesson 2384Network Evidence Collection
Flow logs
capture network traffic metadata between resources.
Lesson 1917Cloud Log Collection for Forensics
Flow records (NetFlow, IPFIX)
metadata about connections
Lesson 2408Network Forensics Fundamentals
Flow-based analysis
offers a smarter alternative: instead of capturing every byte, network devices export *metadata* about connections—who talked to whom, when, how much data, which protocols, and for how long.
Lesson 2410Network Flow Analysis
Focus
High-level trends, geopolitical threats, industry-wide risks, and business impact
Lesson 2335Types of Threat Intelligence: Strategic, Tactical, and Operational
Follow a schedule
Audit all ISMS areas at planned intervals (typically annually)
Lesson 2608Internal Audits and Management Review
Follow the data
Trace sensitive information (credentials, PII, financial data) through every hop
Lesson 2637Creating Architecture Data Flow Diagrams
Follow-the-sun
Global SOCs where regional teams hand off to the next time zone
Lesson 230924/7 Operations and Shift Management
Follows links
– Clicks every `<a>` tag, button, and navigation element it finds
Lesson 1371Crawling and Application Discovery
For clients (production)
Return generic, standardized error codes with minimal detail:
Lesson 1040Error Handling and Information Disclosure
For developers
Log complete error details server-side with correlation IDs:
Lesson 1040Error Handling and Information Disclosure
For each component
(web server, database, API gateway):
Lesson 2640Applying STRIDE at Architecture Level
For each data flow
(arrows between components):
Lesson 2640Applying STRIDE at Architecture Level
For each interface
(APIs, authentication endpoints):
Lesson 2640Applying STRIDE at Architecture Level
For Executive Audiences
Create simplified visual summaries focused on:
Lesson 2424Timeline Visualization and Communication
For Performance
Commonly-matched rules should appear early.
Lesson 427Rule Ordering and Priority
For Risk Communication
The Top 10 speaks a common language between security teams, developers, and executives.
Lesson 1207Using the Top 10 Effectively in Security Programs
For Security
If you place a broad "allow all" rule before specific "deny" rules, those denials never get enforced.
Lesson 427Rule Ordering and Priority
For Security Awareness Training
The Top 10 provides an excellent framework for teaching developers about real-world vulnerabilities.
Lesson 1207Using the Top 10 Effectively in Security Programs
For Technical Teams
Use detailed timeline graphs showing parallel activities across systems.
Lesson 2424Timeline Visualization and Communication
For Testing Priorities
Use the Top 10 to *prioritize* where you focus penetration testing and code review efforts, not as your complete testing scope.
Lesson 1207Using the Top 10 Effectively in Security Programs
For Vendor Assessments
When evaluating third-party software, asking how they address Top 10 risks is a solid starting point—but again, not the finish line.
Lesson 1207Using the Top 10 Effectively in Security Programs
Force alternate parsers
– Request `Accept: application/xml` when the API only validates JSON responses, potentially exposing sensitive data the XML serializer includes
Lesson 997Content-Type and Accept Header Exploits
Forcing the client
to reinstall the Pairwise Transient Key (PTK) it already configured
Lesson 528KRACK Attack on WPA2
Forensic Access Only
Create a restricted security group allowing SSH/RDP access only from your incident response team's known IPs or a forensic jump box.
Lesson 1908Instance Isolation and Containment
Forensic-grade evidence
that's legally defensible
Lesson 1491Introduction to Linux Auditing Framework
Forensics and Attribution
Detailed logs preserve the timeline and technical details needed for legal proceedings or understanding attacker techniques after an incident.
Lesson 1466Introduction to System Logging
Forensics tools
(Volatility, Autopsy): Post-incident analysis
Lesson 2170Blue Team Responsibilities and Tools
Forge data
as if it came from legitimate devices
Lesson 528KRACK Attack on WPA2
Forge documents
Create a malicious contract that hashes identically to a legitimate one
Lesson 201Collision Resistance
Forge passwords
Given a password hash from a database, find a password that produces that hash
Lesson 199Preimage Resistance
Forgetting subdomain policies
Without explicit configuration, subdomains inherit your organizational domain's DMARC policy, which may block legitimate services.
Lesson 2304Email Authentication Best Practices and Common Pitfalls
Fork and maintain
If critical and irreplaceable, fork the repository and commit to security updates
Lesson 1267Unmaintained Dependencies and End-of-Life Libraries
Fork system call
Jailbroken devices often allow `fork()` which Apple restricts
Lesson 2708iOS Jailbreaking and Detection
Fork-based attacks
where pull requests from untrusted contributors could extract secrets
Lesson 1323Environment Variables in CI/CD Pipelines
Form field detection
Identifying every input, textarea, and file upload
Lesson 1371Crawling and Application Discovery
Form Handling
Built-in form libraries automatically include CSRF tokens and validate input types without manual intervention.
Lesson 1235Framework-Specific Safe APIs
Format and Prefixes
Many modern hashes include metadata:
Lesson 2226Hash Identification and Analysis
Format check
Departure date matches `YYYY-MM-DD`
Lesson 1154Semantic and Business Logic Validation
Format string bugs
appear when inputs like `%s%s%n` trigger unexpected memory reads/writes
Lesson 2102Fuzzing for Crash and Memory Bugs
Format string functions
like `printf(userInput)` (without a format specifier) allow attackers to read or write arbitrary memory if they control the format string.
Lesson 1226Understanding Dangerous Functions and Their Risks
Formats
specify how your payload is packaged—executables (`.
Lesson 2196Advanced Payload Generation with msfvenom
Forum posts or comments
containing images or iframes
Lesson 849CSRF Attack Vectors and Delivery Methods
Forward
the altered request to the server
Lesson 943Proxy-Based Business Logic Testing
Forward modified traffic
to the destination, making it appear normal
Lesson 399HTTP Proxy and Transparent Interception
Forward proxy cache
Corporate or ISP proxies between users and the internet
Lesson 1115Web Cache Fundamentals and Architecture
Forward secrecy cipher suites
(like ECDHE)
Lesson 2706App Transport Security (ATS)
Forward security
means that even if your key is compromised, signatures created *before* the compromise remain valid and unforgeable.
Lesson 240Forward-Secure and Stateful Signatures
Forwarding
The attacker relays traffic to maintain the illusion of normal communication
Lesson 392Man-in-the-Middle Attack Fundamentals
FOSSA
is a commercial platform that provides comprehensive license scanning, policy enforcement, and compliance reports.
Lesson 1307License Compliance Scanning
Four 12-hour shifts
Longer shifts with overlapping days (e.
Lesson 230924/7 Operations and Shift Management
Four Key Questions
you learned earlier.
Lesson 40Threat Modeling in the SDLC
Fourth Layer
Validate **Origin and Referer headers** when present to confirm the request came from your domain.
Lesson 873Defense-in-Depth CSRF Strategy
Fourth-party risk
refers to the security exposure created by your vendors' suppliers, service providers, and subcontractors—parties you have no direct relationship with but who can still compromise your security.
Lesson 2540Fourth-Party and Supply Chain Risk
FQDNs
from DNS queries, HTTP Host headers, or TLS SNI fields
Lesson 2415Network-Based IOC Extraction
Fragment packets
Break up scan signatures that IDS systems recognize
Lesson 366Stealth Scanning Fundamentals
Fragmentation exploits
work by injecting malicious fragments that get reassembled incorrectly or bypass filtering.
Lesson 529Fragmentation and Aggregation Attacks
Framework defaults
that log all HTTP headers or environment variables
Lesson 1354Preventing Secrets in Logs and Error Messages
Framework-specific responses
– Error pages that look like SQL injection results but aren't exploitable
Lesson 1375False Positive Management in DAST
Free Hosting
Quick attacks use free services or compromised WordPress sites—easy to set up but short-lived and easily blocked.
Lesson 2256Credential Harvesting Pages
Freenet
Publishing content that must survive censorship
Lesson 2990Alternative Anonymity Networks
Frequent, short exercises
(5-minute modules monthly beats 2-hour annual sessions)
Lesson 2287Security Awareness Training Fundamentals
Freshness vs performance tradeoff
Cache too long, and revocations are delayed; cache too short, and performance suffers
Lesson 191Certificate Revocation Lists (CRLs)
From ARP tables
Devices communicating with many hosts often include routers
Lesson 353Gateway and Router Identification
From subnet discovery
The gateway is typically the first or last usable IP in a subnet (e.
Lesson 353Gateway and Router Identification
From traceroute results
The first hop beyond your local machine is usually your gateway; subsequent hops reveal routing infrastructure
Lesson 353Gateway and Router Identification
Front-Channel Communication
The RP's browser can periodically check with the IdP (in a hidden iframe) whether the user's IdP session is still valid.
Lesson 775OIDC Session Management and Single Logout
Front-Channel Logout
IdP redirects the user's browser through each RP's logout endpoint using hidden iframes.
Lesson 775OIDC Session Management and Single Logout
FTK Imager
A GUI-based forensic imaging tool that creates verified copies, calculates cryptographic hashes (for integrity verification), and supports various image formats.
Lesson 2383Disk Imaging and Forensic CopiesLesson 2399Disk Imaging and Write Blocking
Full
High confidence (one fully-trusted signature may suffice)
Lesson 2959PGP/GPG Key Management and Web of Trust
Full context
don't crop out important details
Lesson 2165Evidence Collection and Screenshots
Full distributions
(like Ubuntu or CentOS) include complete operating systems with all standard utilities.
Lesson 1643Base Image Selection and Provenance
Full enforcement
Enable blocking once policies are validated
Lesson 2688Microsegmentation Implementation Strategies
Full Functionality
Positive-sum, not zero-sum (security AND usability)
Lesson 2879Introduction to Privacy by Design
Full GPS coordinates
→ collect ZIP code or neighborhood
Lesson 2898Granular Data Collection
Full lifecycle control
You decide when keys rotate or are disabled
Lesson 1797Key Management for Database Encryption
Full packet captures (PCAP)
complete network conversations
Lesson 2408Network Forensics Fundamentals
Full scans
(comprehensive): Test every known vulnerability signature
Lesson 2440Scan Configuration and Optimization
full tunnel
mode, all network traffic from your device flows through the VPN connection—even requests for public websites like Google or YouTube.
Lesson 470Full Tunnel vs Split TunnelLesson 511Split Tunneling Security Risks
Full validation
– Verifies certificate matches the expected hostname/identity
Lesson 1796Database Connection Encryption
Fully automated
System detects, fixes, and logs without human involvement
Lesson 3044Automated Remediation Fundamentals
Fully HE
Arbitrary computation, but computationally expensive
Lesson 249Homomorphic Encryption Fundamentals
Fully Homomorphic Encryption (FHE)
is the holy grail—it supports any computation of any complexity without restrictions.
Lesson 250Types of Homomorphic Encryption
Function code and configuration
stored in the cloud provider (Lambda versions, deployment packages) become primary artifacts.
Lesson 1920Container and Serverless Forensics
Function responses
A poorly designed API might return too much information—database query results containing PII, internal user IDs, or error objects with sensitive metadata.
Lesson 1962Sensitive Data Exposure
Functional
Reliable exploit code available
Lesson 2451Exploitability Assessment
Functional verification
includes checking that WAF rules are processing traffic, security headers are present in responses, rate limiting triggers appropriately, and monitoring/logging captures security events.
Lesson 2068Post-Release Security Validation
Functions
enable reusable logic:
Lesson 3020Writing Rego Policies
Fuse bits
Permanently disable debug access by burning one-time-programmable fuses in the chip
Lesson 2776Debug Interfaces and JTAG Security
Future Requests Blocked
If you try accessing Company B's files (a competitor), access is **denied**—even if you have the right security clearance.
Lesson 18Chinese Wall Model: Conflict of Interest Prevention
Fuzz and probe
Send malformed inputs to exposed services
Lesson 2767Firmware Emulation and Dynamic Analysis
Fuzzing
Send malformed data to discover crashes and potential bugs
Lesson 2197Auxiliary Modules and Scanning

G

Gadget chains
are sequences of method calls triggered automatically during deserialization.
Lesson 1184Insecure Deserialization in Java
Galois/Counter Mode (GCM)
is an **authenticated encryption** mode that gives you both:
Lesson 101GCM Mode: Authenticated Encryption Standard
Gate Garbling
Each gate's truth table is encrypted using random labels representing wire values (0 or 1)
Lesson 258Garbled Circuits for Two-Party Computation
Gates the deployment
Blocks promotion to production if critical vulnerabilities are found
Lesson 1401Dynamic Testing and DAST in Pipelines
Gates the pipeline
if critical issues are found
Lesson 1399Dependency and SCA Scanning in Pipelines
Gateway MAC address changes
Your router's hardware address suddenly differs from normal
Lesson 410Signs of Network Interception
Gather required information
to identify yourself or your organization
Lesson 176Certificate Signing Requests (CSR)
GCM (Galois/Counter Mode)
is the performance champion.
Lesson 105Comparing Authenticated Encryption Modes
GCM and CTR-based modes
don't require padding at all.
Lesson 114Padding in Authenticated Encryption Modes
GCP Cloud Functions
react to Pub/Sub messages from Security Command Center
Lesson 1911Cloud IR Playbooks and Automation
GCP Cloud Logging
(formerly Stackdriver) ingests logs from GCE instances, GKE clusters, Cloud Functions, and VPC Flow Logs into centralized log buckets with configurable retention.
Lesson 1869Cloud Logging Architecture and Service OverviewLesson 1880SIEM Data Sources in Cloud
GCP Config Connector
allows you to manage GCP resources through Kubernetes-style declarative configs.
Lesson 2023Detecting Configuration Drift with Cloud-Native Tools
GCP DLP API
(Data Loss Prevention) provides inspection, classification, and de-identification capabilities across Cloud Storage, BigQuery, and Datastore.
Lesson 1803Cloud-Native Data Classification Tools
GCP Organization Policy Service
can all trigger OPA evaluations.
Lesson 1991Compliance as Code with Open Policy Agent
GCP Private Service Connect
Accesses Google services through internal IPs
Lesson 1779VPN and Private Connectivity Encryption
GDPR (EU)
requires notification to data protection authorities within **72 hours** of becoming aware of a breach affecting personal data.
Lesson 2429Legal and Regulatory Reporting Requirements
GDPR's data protection principles
, making Privacy-focused SOC 2 reports particularly valuable for organizations handling EU data.
Lesson 2596Privacy Criterion and GDPR Alignment
Generate a keystream
Using a secret key and sometimes an initialization vector (IV), the cipher produces a pseudo- random stream of bits
Lesson 115Stream Cipher Fundamentals and XOR Operations
Generate a random number
(called `k`) — this must be unique for every signature
Lesson 164ECDSA (Elliptic Curve Digital Signature Algorithm)
Generate a random polynomial
of degree `k-1` with your secret as the constant
Lesson 263Shamir's Secret Sharing and Polynomial Interpolation
Generate actionable improvements
specific, measurable, assigned to owners with deadlines
Lesson 2432Post-Incident Review and Lessons Learned
Generate adversarial examples
using attacks like FGSM or PGD against your current model
Lesson 2847Adversarial Training
Generate code signatures
for all new binaries and scripts
Lesson 1598Allowlisting in DevOps and CI/CD
Generate evidence
Maintain timestamped logs showing baselines, detected changes, and investigation results
Lesson 1506FIM for Compliance Requirements
Generate fake news
with proper journalistic structure, fabricated quotes, and plausible details
Lesson 2866Synthetic Text Generation and GPT-Based Misinformation
Generate random salt
(fresh for each signature)
Lesson 148PSS: Probabilistic Signature Scheme
Generate test cases
– create combinations of users, roles, and resources
Lesson 1026Authorization Testing Automation
Generate unique per-device passwords
(printed on device label)
Lesson 2800Default Credentials and Weak Authentication
Generate unique users
for each person—never share credentials
Lesson 1710IAM Users: Creation, Authentication, and Lifecycle
Generate unpredictable tokens
(random strings, UUIDs, or session-specific mappings)
Lesson 843Indirect Object References
Generate valid variants
Create inputs that parse correctly but have unusual combinations—deeply nested structures, extreme values, boundary conditions
Lesson 1390Structured Input Fuzzing
Generates
encryption keys using hardware random number generation
Lesson 2710Secure Enclave and Hardware Security
Generating provenance
Your CI/CD creates cryptographically signed attestations documenting source commits, build commands, and dependencies used
Lesson 1650Supply Chain Levels for Software Artifacts (SLSA)
Generation
Create a cryptographically random string (at least 128 bits of entropy) before redirecting to the authorization server
Lesson 763State Parameter and CSRF ProtectionLesson 871Token Rotation and Lifecycle
Generation-based fuzzing
takes the opposite approach: it builds inputs from the ground up using formal rules that describe what valid data should look like.
Lesson 1387Generation-Based Fuzzing
Generative Adversarial Networks (GANs)
power most deepfake systems.
Lesson 2864Deepfakes: Generation Techniques and Detection Challenges
Generative models
Use techniques like GANs or variational autoencoders to create realistic examples
Lesson 2909Synthetic Data Generation
Generic math
`{{7*7}}`, `${7*7}`, `<%= 7*7 %>`
Lesson 1249SSTI Detection and Exploitation Techniques
Generic user-facing messages
Return simple, uninformative messages to clients.
Lesson 1156Validation Error Handling
GenericAll permission
on a user lets you reset their password.
Lesson 2240BloodHound for Active Directory Attack Paths
Geo-blocking
lets you control access based on where requests originate geographically, while **IP reputation filtering** uses threat intelligence to identify and block known malicious sources.
Lesson 1860Geo-Blocking and IP ReputationLesson 1866CDN Access Control and Token AuthenticationLesson 1867CDN WAF Integration and Edge Security
Geographic anomalies
Same credentials used from multiple countries simultaneously
Lesson 1735Credential Theft and Token Security
Geographic boundaries
Single office, multiple sites, or global operations?
Lesson 2601ISMS Scope Definition
Geographic compliance
Content must respect regional data laws across all edge locations
Lesson 1862CDN Architecture and Threat Model
Geographic diversity
Proxies in different jurisdictions resist coordinated surveillance
Lesson 2994Proxy Chains and SOCKS
Geographic impossibility
Session used from New York, then Tokyo 5 minutes later
Lesson 737Session Monitoring and Anomaly Detection
Geographic restrictions
leverage MaxMind databases or cloud provider geolocation services to map IP addresses to countries or regions.
Lesson 1860Geo-Blocking and IP Reputation
Geographical and legal context
Which jurisdictions apply?
Lesson 2888PIA Triggers and Scoping
Geographically distributed
Prevent single-point-of-failure
Lesson 1490Log Management for Compliance
Geographically distributed backups
Store redundant copies in multiple secure locations to prevent data loss from disasters
Lesson 319Key Archival and Compliance
GET /api/users/123/profile
Change `123` to `124`, and you might see someone else's profile
Lesson 817IDOR in REST APIs and GraphQL
GET-based CSRF
is trivially easy to exploit.
Lesson 848GET vs POST CSRF Attacks
GHASH authentication
Runs in parallel, creating an authentication tag using Galois field multiplication
Lesson 101GCM Mode: Authenticated Encryption Standard
Ghidra
(NSA's free tool) automatically disassembles binaries and uses decompilers to generate C-like pseudocode, making analysis more intuitive.
Lesson 2762Reverse Engineering Firmware Binaries
GIF
files start with `47 49 46 38` (ASCII: "GIF8")
Lesson 955Magic Byte Verification and File Type Detection
GIF + PHP
A file starting with `GIF89a` (valid GIF header) followed by `<?
Lesson 975Polyglot Files and Format Confusion
Git repository
to audit all dependencies at once.
Lesson 1305Trivy for Container and Dependency Scanning
GitGuardian
don't just scan your current working directory—they traverse *every commit* in your repository's history, including:
Lesson 1255Repository Scanning and History AnalysisLesson 3031Secret Detection in Pipelines
GitHub Advisory Database
Integrated directly into GitHub's ecosystem, it tracks vulnerabilities across multiple languages and automatically alerts repository owners when their dependencies are affected.
Lesson 1262Vulnerability Databases and CVE Tracking
GitHub repositories
Read tool-specific documentation and issue trackers
Lesson 2192Kali Documentation and Community Resources
GitLeaks
are specialized tools that scan container images (and git repositories) for secrets using pattern matching and entropy analysis:
Lesson 1640Secrets and Sensitive Data in ImagesLesson 3031Secret Detection in Pipelines
GLBA
(Gramm-Leach-Bliley Act) requiring privacy notices and data security
Lesson 1984Industry-Specific Cloud Compliance
Global Passive Adversaries
Nation-state actors with the ability to monitor large portions of internet traffic worldwide can perform correlation attacks at scale.
Lesson 2988Tor Threat Model and Limitations
Glue
Modify ETL jobs to execute arbitrary code with Glue's IAM role
Lesson 1757Service-Specific Escalation Vectors
Glue/DataPipeline jobs
(run scripts with passed roles)
Lesson 1759PassRole Permission Exploitation
GMAC authentication
A specialized MAC (Message Authentication Code) using Galois field mathematics to verify both the ciphertext *and* any additional data you want to protect (like headers or metadata)
Lesson 125AES-GCM: Galois/Counter Mode
GMER
specializes in Windows rootkit detection through kernel-level scanning.
Lesson 1564Rootkit Detection Tools and Frameworks
GMW protocol
takes a different approach:
Lesson 260MPC Protocols for Multiple Parties
Goal
Pen testing = find vulnerabilities; Red teaming = test detection and response
Lesson 2085Penetration Testing vs Red Teaming
Goal (Root)
Steal customer database
Lesson 67Attack Trees and Attack Graphs
Good approach
Using XML builder methods that escape automatically
Lesson 618XML Injection Prevention
Good example
"Percentage of assets with vulnerability scan coverage" – measurable, reveals gaps, drives scanning improvements.
Lesson 2526Designing Effective Security Metrics
Google BigQuery
let you query logs using familiar SQL syntax.
Lesson 1882Cloud SIEM Query Languages
Google Cloud Certificate Manager
similarly provides automated provisioning and renewal, with DNS-based validation and integration across GCP services.
Lesson 1774Certificate Management in Cloud Environments
Google Cloud Logging
uses a filter expression language
Lesson 1876Log Query and Analysis Techniques
Google Cloud Storage
with customer-managed keys
Lesson 3004IaC State File Security
Google Dorking
(named after the word "dork" meaning a specialized search query) uses advanced search operators to filter results and discover exposed files, login pages, vulnerable systems, and accidentally published sensitive data—all from publicly indexed cont...
Lesson 330Search Engine Reconnaissance and Google Dorking
Google GCR/Artifact Registry
Automatically scans with Container Analysis API; provides continuous monitoring
Lesson 1636Registry-Integrated Scanning
Google Workspace
, the provider manages nearly everything—infrastructure, platform, application logic, and most security controls.
Lesson 1679SaaS Security Limitations
Google's DP Library
provides production-ready implementations of the Laplace and Gaussian mechanisms you've studied.
Lesson 2921Practical Differential Privacy Implementation
Goppa codes
, a family of error-correcting codes.
Lesson 272Code-Based Cryptography and Classic McEliece
Governance mode
allows specially-privileged users to bypass retention if absolutely necessary (useful for testing or exceptional circumstances).
Lesson 1787Object Lock and Immutable Storage
Government
FedRAMP (covered earlier) plus agency-specific requirements
Lesson 1984Industry-Specific Cloud Compliance
Government Officials
Impersonating auditors, inspectors, or law enforcement creates urgency and fear, making victims abandon normal verification procedures.
Lesson 2265Authority and Impersonation Techniques
Government/enterprise asset management
→ SWID
Lesson 1277SBOM Formats: SPDX, CycloneDX, and SWID
GPEN (GIAC Penetration Tester)
SANS Institute certification emphasizing methodology and technical depth.
Lesson 2089Penetration Testing Career Paths
Gpg4win
(for Windows) includes GpgOL, which integrates with Outlook to provide compose-time encryption options and decrypt incoming messages.
Lesson 2961Email Client Integration and Plugins
Graceful degradation
Use cached secrets temporarily during outages
Lesson 1334Secret Store Access Patterns
Graceful failure
Implement retry logic when refresh fails
Lesson 1731Session Duration and Token Lifecycle
Graceful Fallback
Many implementations offer password fallback for compatibility, which reintroduces all password vulnerabilities.
Lesson 755Passwordless Security Trade-offs
Graceful shutdown
Signal pools to close connections cleanly during rotation
Lesson 1347Database Credential Rotation
Gradient analysis
can reveal training samples (similar to model inversion attacks you've studied)
Lesson 2843Federated Learning Privacy
Gradient masking
when a defense obscures gradients without actually making the model more robust, fooling gradient-based attackers but not truly defending against adaptive adversaries.
Lesson 2853Evaluating Defense Effectiveness
Gradual escalation
Start small to avoid accidentally DoS'ing your own test environment.
Lesson 1182Testing for ReDoS Vulnerabilities
Gradual migration
Re-encrypt stored data incrementally rather than all at once
Lesson 315Key Rotation Strategies
Gradual rollout
Activate the key for a small percentage of operations first, monitoring for errors or performance issues
Lesson 314Key Activation and InstallationLesson 1348API Key and Certificate Rotation
Grafana
excels at real-time metrics visualization with powerful alerting.
Lesson 3043Dashboard Tools and Integration
Grammar rules
(for parsers, compilers, markup languages)
Lesson 1387Generation-Based Fuzzing
Grant per-function roles
Don't reuse one "super role" across all functions.
Lesson 1950Least Privilege for Serverless Functions
Granting "AllUsers" or "AuthenticatedUsers"
permissions through ACLs
Lesson 1783Blocking Public Access and Bucket Misconfiguration
Grants
provide temporary, programmatic access
Lesson 1769Encryption Key Policies and Access Control
Granular
Separate `read:messages` from `send:messages`
Lesson 761OAuth 2.0 Scopes and Consent
Granular access control
Service endpoint policies and IAM permissions combine to enforce least privilege
Lesson 1851Cross-Region and Cross-Account Private Connectivity
Granular controls
letting users choose different privacy levels for different contexts
Lesson 2886Visibility, Transparency, and User-Centricity
Granular Data Collection
means choosing the appropriate level of specificity when gathering information.
Lesson 2898Granular Data Collection
Granular protection
Encrypt only what needs protection, reducing performance overhead compared to full-database encryption.
Lesson 1794Column-Level and Field-Level Encryption
Granularity
Some engines check the timeout between backtracking steps, not continuously
Lesson 1180Regex Timeout and Resource LimitsLesson 2348Baseline Establishment and Anomaly Detection
Graph databases
(Neo4j): Data as connected nodes
Lesson 594NoSQL Database Fundamentals and Attack Surface
GraphQL Fuzzing
Target query depth limits, field injection, type coercion, and circular references.
Lesson 1391API and Protocol Fuzzing
GraphQL mutations
that rely on cookie authentication
Lesson 854CSRF in Modern Applications and SPAs
GraphQL-specific
Introspection abuse, query depth attacks, batching exploits
Lesson 3013API Security Testing Automation
Gray-box
sits between these extremes: perhaps the attacker knows the architecture but not the trained weights, or has partial information.
Lesson 2809Threat Model for Adversarial Attacks
Gray-box testing
sits in the middle, providing partial information—perhaps user-level credentials or basic network diagrams, but not full administrative access or complete documentation.
Lesson 2081Types of Penetration TestsLesson 2779Hardware Security Testing and Evaluation
Greed
(free premium software, prizes)
Lesson 1533Social Engineering and User Deception
Group (g)
Members of the file's assigned group
Lesson 1423Linux File Permissions and Ownership
Group E2EE Messaging
works using pairwise encryption (like the Signal Protocol's Sender Keys).
Lesson 2950Message Layer Security (MLS) for Group Messaging
Group Enumeration
Mapping security groups reveals who has administrative rights, access to sensitive resources, and delegation permissions.
Lesson 2123Domain Enumeration and Reconnaissance
Group logically
– Cluster hosts by subnet or function (DMZ, internal network, etc.
Lesson 351Network Diagramming from Scan Results
Group messages
may leak sender metadata through delivery patterns
Lesson 2954Sealed Sender and Sender Anonymity
Group nesting
reveals that your compromised user might be five groups away from Enterprise Admins.
Lesson 2240BloodHound for Active Directory Attack Paths
Group Policy (Windows)
leverages Active Directory to push registry settings, security policies, and software configurations to domain-joined Windows machines.
Lesson 1619Configuration Management Tools
Group Policy Objects (GPOs)
are the native Windows solution for centralized firewall management.
Lesson 1590Host Firewall Management at Scale
Group related packets
(same source/destination IPs and ports)
Lesson 377TCP Stream Analysis and Session Reconstruction
Grype
takes those inventories (or any SBOM) and matches them against vulnerability databases to identify security issues.
Lesson 1306Grype and Syft for SBOM and Vulnerability ScanningLesson 1400Container and Image Scanning
Guard conditions
"If we reach line 50, we know the `if (user !
Lesson 1361Control Flow Analysis and Path Sensitivity
Guard relays
Stable, high-bandwidth entry points (your client picks a few guards for months)
Lesson 2983Tor Network ArchitectureLesson 2985Tor Relays: Guard, Middle, and Exit
Guard/Entry relay
Your entry point, sees your IP but not your destination
Lesson 2983Tor Network Architecture
GuardDuty (AWS)
is an intelligent threat detection service that analyzes CloudTrail, VPC Flow Logs, and DNS logs.
Lesson 1880SIEM Data Sources in Cloud
GuardDuty findings
flagging suspicious behavior from that same identity
Lesson 1902Multi-Signal Correlation for Detection
Guardrails
prevent automated fixes from breaking production systems:
Lesson 2009Automated Remediation Workflows
Guest operating system
All patching, hardening, and configuration (remember those patch management lessons!
Lesson 1677IaaS Security Responsibilities
Guests
→ VLAN 30 (internet-only, isolated)
Lesson 546Dynamic VLAN Assignment and Access Policies
GUID Testing
works even with random-looking IDs.
Lesson 1021Testing for BOLA Vulnerabilities
Guidelines
are recommendations and best practices—not mandatory, but strongly suggested.
Lesson 2488Policy Hierarchy: Policies, Standards, Procedures, Guidelines
GUIDs
(Globally Unique Identifiers) or **UUIDs** (Universally Unique Identifiers) like `a3f7c892-4b21- 4f9a-9e8d-1c2b3a4d5e6f`.
Lesson 815GUID and UUID Vulnerabilities

H

HackerOne
is the largest platform by user base, hosting programs for companies like the U.
Lesson 2480Bug Bounty Platform Ecosystem
Hajime
(peer-to-peer architecture)
Lesson 2799Mirai and Its Legacy
Hall of fame
recognition (non-monetary but valuable)
Lesson 2482Bounty Pricing and Reward Structures
Handle the exceptions
For applications without native update mechanisms, create your own deployment packages through your software distribution platform.
Lesson 1606Third-Party Application Patching
Handling Scan Duration
Full DAST scans often exceed typical CI/CD timeouts.
Lesson 1377Integrating DAST into CI/CD
Handoff documentation
Written logs in a shared system detailing current incident status, context, and next steps
Lesson 230924/7 Operations and Shift Management
Hands-full technique
Carrying boxes or coffee to appear legitimate and helpless
Lesson 2272Tailgating and Piggybacking Attacks
Hands-On Practice
Use real examples from your codebase.
Lesson 83Developer Training on Threat Modeling
Handshake Capture
Force disconnection so the client automatically reconnects, capturing the 4-way handshake needed to crack WPA2-PSK passwords offline
Lesson 527Deauthentication and Disassociation Attacks
Handshake details
Cipher suites, TLS version, SNI (Server Name Indication)
Lesson 2413TLS Traffic Analysis
Harbor
Configure scanners (Trivy default) in project settings; define scan policies and webhooks
Lesson 1636Registry-Integrated Scanning
Hard gates
Automatically block pipeline progression until resolved (critical/high vulnerabilities)
Lesson 2065Automated Security Gates in CI/CD
Hard links
pointing to restricted files
Lesson 1165Filesystem Abstraction Layer Bypasses
Hard multi-tenancy
(separate clusters) is necessary when:
Lesson 1976Multi-Tenancy and Cluster Isolation
Hard to detect
Overall model accuracy may drop only 1-2%, appearing normal
Lesson 2819Label Flipping and Targeted Poisoning
Hard-coded keys
Never embed encryption keys in source code or resources
Lesson 2735Mobile Cryptography Best Practices
Hard-fail
means: "If I can't check revocation status, reject the certificate.
Lesson 196Revocation Checking Failures and Soft-Fail
Hard-mandatory
Cannot be overridden
Lesson 3022HashiCorp Sentinel
Hardcoded backdoor credentials
hidden in firmware binaries
Lesson 2765Firmware Backdoors and Persistent Threats
Harden this
Set `--anonymous-auth=false` to block unauthenticated requests entirely.
Lesson 1671Kubelet Security and Node Hardening
Hardening
means disabling or restricting dangerous features entirely.
Lesson 1250Sandboxing and Template Engine Hardening
Harder to audit
Security reviewers must examine the entire codebase instead of focused modules
Lesson 1212Separation of Concerns for Security Boundaries
Hardware
Discarded computers, phones, printers (with cached documents), and hard drives without proper sanitization.
Lesson 2275Dumpster Diving and Waste Exploitation
Hardware acceleration available
Modern CPUs with AES-NI instructions make AES extremely fast
Lesson 121Stream Ciphers vs Block Ciphers: When to Use Each
Hardware cloning
occurs when attackers extract the firmware, cryptographic keys, or unique identifiers from a legitimate device and replicate them in counterfeit hardware.
Lesson 2777Hardware Cloning and Counterfeit Prevention
Hardware Enclave
(like ARM TrustZone or Intel SGX) creates isolated execution environments within the main processor itself.
Lesson 2778Secure Element and Hardware Enclaves
Hardware is limited
Embedded devices benefit from stream ciphers' simpler operations and lower memory requirements
Lesson 121Stream Ciphers vs Block Ciphers: When to Use Each
Hardware protection
Keys stored in HSMs when needed
Lesson 1797Key Management for Database Encryption
Hardware security keys
using public-key cryptography
Lesson 1697Strong Authentication for Cloud Identity
Hardware supply chain
Manufacturing facilities, component suppliers, firmware providers
Lesson 2540Fourth-Party and Supply Chain Risk
Hardware support
SHA-256 has CPU acceleration on modern processors
Lesson 216Hash Function Selection in Modern Systems
Harmonization
goes beyond mapping: you design unified controls that satisfy all applicable frameworks simultaneously.
Lesson 2617Framework Mapping and Harmonization
Hash before and after
imaging (cryptographic proof of integrity)
Lesson 2398Disk Forensics Fundamentals and Chain of Custody
Hash Chains
create a tamper-evident seal by linking each log entry to the previous one.
Lesson 1489Log Verification and Tamper Detection
hash functions
(like the SHA-2 and SHA-3 families you've learned) as their cryptographic foundation.
Lesson 246zk-STARKs and Transparent ProofsLesson 2225Password Cracking Fundamentals
Hash immediately
Generate cryptographic hashes (SHA-256) of each log file to prove it hasn't been altered
Lesson 2385Log Collection and Preservation
Hash stored separately
This hash is saved in a lock file, repository metadata, or signature file
Lesson 1293Package Integrity and Checksums
Hash the document
– Generate a cryptographic hash of the complete file content
Lesson 231Document Signing and PDF Signatures
Hash the message
using a cryptographic hash function (SHA-256, for example)
Lesson 147RSA Signature Generation and VerificationLesson 148PSS: Probabilistic Signature Scheme
Hash the model
Generate a cryptographic hash (SHA-256) of the serialized model file
Lesson 2874Model Artifact Security and Signing
Hash-based detection
calculates a cryptographic fingerprint (typically MD5, SHA-1, or SHA-256) of the entire file.
Lesson 1565Signature-Based Detection Fundamentals
Hash-based mixing
It uses cryptographic hash functions to thoroughly scramble the message and randomness together
Lesson 146OAEP: Optimal Asymmetric Encryption Padding
Hash-based protocols
Using commutative encryption or oblivious pseudorandom functions
Lesson 2925Private Set Intersection
Hash-based signatures
Use only hash functions (which you've studied extensively).
Lesson 268Post-Quantum Cryptography Fundamentals
Hashcat
and **John the Ripper** support extensive rule engines.
Lesson 2228Rule-Based AttacksLesson 2234Cloud-Based and Distributed Cracking
Hashing and Bloom Filters
Instead of sharing plaintext identifiers, parties hash names, birthdates, or addresses into fixed- length Bloom filter bit arrays.
Lesson 2930Privacy-Preserving Record Linkage
Hashing candidate passwords
using the same algorithm
Lesson 2225Password Cracking Fundamentals
Hashtopolis
is a popular open-source framework that acts as a server/agent system: you install agents on multiple cracking nodes (your laptop, a server, cloud instances), and the server distributes chunks of the keyspace to each agent.
Lesson 2234Cloud-Based and Distributed Cracking
Header anomalies
Missing or suspicious user-agent strings
Lesson 1859Bot Management and Detection
Header compression (HPACK)
While efficient, improper implementation can leak information or enable injection attacks
Lesson 1097HTTP/2 Protocol Architecture and Security Model
Header Handling Changes
HPACK compression (HTTP/2) and QPACK (HTTP/3) change how headers are processed.
Lesson 1104Migrating Safely to HTTP/2 and HTTP/3
Header insertion
The hash is placed in the AH header along with metadata
Lesson 477Authentication Header (AH) Protocol
Header Manipulation
Rotating User-Agent strings, session tokens, or API keys to appear as different clients.
Lesson 1017Rate Limiting Bypass Prevention and MonitoringLesson 1865CDN Cache Security and Cache Poisoning
Header name conflicts
HTTP/2 allows header names that are invalid in HTTP/1.
Lesson 1112HTTP/2 Downgrade and Smuggling
Header spoofing
In rare scenarios, headers might be manipulated
Lesson 869Origin and Referer Validation
Header stripping
Proxies and firewalls may remove these headers
Lesson 811Referer and Origin-Based Authorization Flaws
Header versioning
`Accept: application/vnd.
Lesson 1038API Versioning and Deprecation
Header-based transmission
is the most secure approach:
Lesson 1009API Key Authentication: Design and Security
Header-only validation
Server checks `Content-Type: image/jpeg` and allows upload
Lesson 956Content-Type Header Validation and Mismatches
Headers are client-controlled
Attackers can easily modify, remove, or spoof both `Referer` and `Origin` headers using browser tools, proxy software, or custom scripts.
Lesson 811Referer and Origin-Based Authorization Flaws
Health attestation
Cryptographic proof of device state (e.
Lesson 2678Device Trust and Endpoint Security
Health check endpoints
on applications to verify connectivity
Lesson 1349Rotation Testing and Rollback
Health checks
Applications report which secret version they're using
Lesson 1346Zero-Downtime Rotation PatternsLesson 1347Database Credential Rotation
Health information
(medical records, genetic data, biometric data for identification)
Lesson 2552Personal Data and Special Categories
Health plans
(insurance companies, HMOs)
Lesson 2581HIPAA Overview and Scope
Healthcare clearinghouses
(billing services, data processors)
Lesson 2581HIPAA Overview and Scope
Healthcare models
trained on patient images or records
Lesson 2839Model Inversion Attacks
Healthcare providers
(hospitals, doctors, pharmacies)
Lesson 2581HIPAA Overview and Scope
Help Desk Impersonation
"I'm from IT resetting passwords after the breach—need to verify your current one"
Lesson 2263Pretexting Fundamentals and Attack Scenarios
Here's the problem
Attackers can jump directly to later steps or rearrange the order, bypassing security checks entirely.
Lesson 808Multi-Step Process Authorization Failures
Hex sequential
`0x1a`, `0x1b`, `0x1c`
Lesson 814Sequential and Predictable Identifiers
Hibernation File (hiberfil.sys)
When Windows hibernates, it writes compressed memory to disk.
Lesson 2391Memory Image Formats and Validation
Hibernation files
May contain keys from suspended encrypted volumes
Lesson 2407Anti-Forensics Detection and Encrypted Volumes
HID attacks
The USB pretends to be a keyboard, typing malicious commands faster than humans can react (Rubber Ducky-style attacks)
Lesson 2251QR Code and USB Drop Attack Tools
Hidden endpoints
Administrative functions exist at predictable URLs like `/api/admin/deleteUser` but lack proper checks.
Lesson 1031API5:2023 - Broken Function Level Authorization
Hidden Fields
An e-commerce site stores `<input type="hidden" name="price" value="99.
Lesson 912State Manipulation Fundamentals
Hidden interactions
between components that create unexpected vulnerabilities
Lesson 2632Economy of Mechanism (Keep It Simple)
Hidden network services
that activate under specific conditions
Lesson 2765Firmware Backdoors and Persistent Threats
Hidden processes
Process structures present in memory but unlisted by Task Manager
Lesson 1559Memory Analysis and Volatile Forensics
Hidden secrets persist
If you `COPY` a password file in layer 3 and delete it in layer 4, it still exists in layer 3—anyone can extract it.
Lesson 1632Container Image Anatomy and Layers
Hidden transmitters
Rogue devices operating outside normal Wi-Fi channels
Lesson 551RF Spectrum Monitoring
Hide malicious payloads
by spreading them across fragments
Lesson 369Fragmentation and Packet Manipulation
Hide network traffic
by filtering at the network driver level
Lesson 1547Kernel-Mode Rootkits Fundamentals
Hide your destinations
from network observers
Lesson 2982Introduction to Anonymity Networks
Hide your identity
from the services you access
Lesson 2982Introduction to Anonymity Networks
Hides
or **dims** the legitimate page content
Lesson 640Phishing via XSS Injection
Hiding data exfiltration
Embedding invisible characters in seemingly innocent text fields to encode secrets.
Lesson 1172Zero-Width and Invisible Characters
High (7.0–8.9)
Severe impact, relatively easy exploitation
Lesson 2446CVSS Score Interpretation and Limitations
High 403/401 error rates
(possible brute-force or scanning)
Lesson 1868CDN Monitoring and Incident Response
High availability (HA)
solves this by deploying multiple firewalls that work as a coordinated team.
Lesson 425High Availability and Clustering
High Entropy
Enough randomness that guessing is computationally infeasible.
Lesson 704Session Identifiers: Generation and Properties
High impact
Direct access to sensitive data or resources
Lesson 1027API1:2023 - Broken Object Level Authorization (BOLA)
High integrity
Sterile medications ready for patients
Lesson 16Biba Model: Integrity Protection
High query volumes
to unusual or newly-registered domains
Lesson 379DNS Traffic Analysis and Query Patterns
High reliability
methods (like modifying startup services or boot processes) ensure the malware always executes, but they create obvious forensic artifacts that detection tools easily spot.
Lesson 1536Persistence Fundamentals and Attacker Goals
High risk
(impossible travel, anonymous IP): Block access or require step-up authentication plus admin approval
Lesson 1747Conditional Access and Context-Aware MFALesson 1808DLP Monitoring and Incident Response
High stealth
methods (like memory-only persistence or rarely-triggered scheduled tasks) are harder to detect but may fail unpredictably, potentially losing access.
Lesson 1536Persistence Fundamentals and Attacker Goals
High-confidence, low-risk candidates
Lesson 3044Automated Remediation Fundamentals
High-Entropy Strings (likely secrets)
Lesson 1253Secret Patterns and Regular Expressions
High-frequency scanning
Rapid-fire requests to sequential IPs suggest enumeration attacks.
Lesson 900Monitoring and Detection of SSRF Attempts
High-level metrics
should answer "what's happening right now?
Lesson 2321Dashboards and Visualization
High-risk changes
Full security review, manual testing, architecture discussion
Lesson 2062Balancing Security and Velocity
High-risk secrets
(root database credentials, production admin accounts) might rotate daily or weekly
Lesson 1344Rotation Strategies and Frequencies
High-risk vendors
Handle regulated data or have privileged network access (payment processors, HR systems)
Lesson 2534Third-Party Risk Fundamentals
High-security systems
(banking, admin panels): 5-15 minute idle timeout, 1-2 hour absolute timeout
Lesson 733Session Timeout Configurations
High/P2
Confirmed malware on critical systems, targeted phishing campaign
Lesson 2362Incident Severity and Priority Classification
Higher accuracy
Multiple weak signals combine into strong evidence
Lesson 1902Multi-Signal Correlation for Detection
Higher bug density
more code means more mistakes
Lesson 2632Economy of Mechanism (Keep It Simple)
Higher throughput
– Dedicated circuits from 1 Gbps to 100 Gbps
Lesson 1841Direct Connect and Dedicated Connectivity
Higher-risk changes
requiring approval:
Lesson 2009Automated Remediation Workflows
Hijack connections
by manipulating data
Lesson 516KRACK Attack and WPA2 Vulnerabilities
Hijacking URL references
`<a id="apiEndpoint" href="//attacker.
Lesson 679DOM Clobbering Attacks
HIPAA § 164.312(a)(2)(iv)
"Database missing encryption at rest"
Lesson 3007IaC Compliance Frameworks and Benchmarks
Historical data
(old certificates show infrastructure changes)
Lesson 332Certificate Transparency Logs and SSL/TLS Discovery
Historical scanning
Audit existing repositories for past leaks
Lesson 3031Secret Detection in Pipelines
HITECH Act
extending HIPAA to cloud business associates
Lesson 1984Industry-Specific Cloud Compliance
HITECH Act (2009)
dramatically expanded accountability by making business associates **directly liable** for HIPAA violations — not just the covered entity.
Lesson 2587Business Associate Agreements and Liability
HKDF
(HMAC-based Key Derivation Function) serves a different purpose: deriving multiple keys from one shared secret, or "stretching" existing key material.
Lesson 139Modern KDFs: scrypt, Argon2, and HKDF
HMAC
(Hash-based Message Authentication Code) uses a construction like `hash(key ⊕ opad || hash(key ⊕ ipad || message))`.
Lesson 218HMAC vs Plain Hashing: Length Extension AttacksLesson 785JWT Signature Algorithms
HMAC-SHA512
Extra security margin, slightly slower
Lesson 481IPsec Cryptographic Algorithms and Cipher Suites
HMIs
(Human-Machine Interfaces) for operator control
Lesson 2803OT and ICS Security Fundamentals
Hold users accountable
for their behavior
Lesson 58Repudiation Threats
Homoglyphs
Using lookalike characters from different alphabets (Cyrillic 'а' vs Latin 'a')
Lesson 1287Typosquatting Attack Techniques
Homograph Attacks
exploit similar-looking characters from different alphabets.
Lesson 2258Link Manipulation and URL Obfuscation
Homomorphic operations
computing on encrypted values without decryption
Lesson 2923Secure Multi-Party Computation for Privacy
Hook system call tables
to intercept and modify all system operations
Lesson 1547Kernel-Mode Rootkits Fundamentals
hop limit
to `1`, which prevents forwarded requests from containers or proxies.
Lesson 1927Instance Metadata Service (IMDS) SecurityLesson 1937Hop Limit and Network-Level IMDS Protection
Hopper
is a disassembler for iOS binaries (Mach-O files), converting ARM/ARM64 machine code into assembly instructions and attempting to reconstruct higher-level pseudocode.
Lesson 2724Decompiling and Disassembling Mobile Apps
horizontal escalation
means staying at your privilege level but accessing resources belonging to *other users at the same level*.
Lesson 825Horizontal Privilege Escalation PatternsLesson 1022Horizontal and Vertical Privilege Escalation
Host level
(endpoint protection, hardening)
Lesson 2654Defense-in-Depth: Core Concept and Philosophy
Host-based artifacts
encompass default service names, recognizable process injection patterns, framework-specific registry keys, and characteristic PowerShell command structures.
Lesson 2224Framework OPSEC and Detection
Host-based authentication
trusts entire machines
Lesson 1440SSH Protocol Fundamentals and Security Model
Host-based security controls
EDR agents, host firewalls, allowlisting
Lesson 1677IaaS Security Responsibilities
Hostname
Source system identifier
Lesson 1475syslog Protocol and Standards
Hotfix Development Process
Create a streamlined workflow separate from normal development.
Lesson 2069Vulnerability Response and Hotfix Process
HOTP (HMAC-based One-Time Password)
is an authentication mechanism that generates unique passwords based on a **counter value** rather than the current time.
Lesson 741HOTP and Counter-Based OTP
HOTP codes don't expire
based on time—they remain valid until used
Lesson 741HOTP and Counter-Based OTP
How it works
Routes IP packets between networks; VPN clients get their own subnet
Lesson 489OpenVPN Network Topologies: Routed vs BridgedLesson 1121Cache Poisoning Detection Techniques
How long
you keep it (retention schedules)
Lesson 2561Accountability and Records of Processing
However
, auto-escaping isn't foolproof:
Lesson 1224Template Auto-Escaping vs Manual Encoding
HTML body/attributes
Needs `< > & " '` encoded as entities
Lesson 1246Context-Aware Output Encoding
HTML Entities
Instead of `<script>`, use `&lt;script&gt;` or numeric forms like `&#60;script&#62;`.
Lesson 649Character Encoding Bypasses
HTML entity encoding
itself comes in two flavors depending on where your data appears:
Lesson 1221HTML Entity Encoding and Attribute Context
HTML Rendering
Frameworks provide template engines with auto-escaping (you learned about this earlier).
Lesson 1235Framework-Specific Safe APIs
HTML sanitization libraries
rather than writing your own:
Lesson 669Input Validation and Sanitization
HTTP history
and **site map**, giving you unified visibility across your testing session.
Lesson 2205Burp Suite Architecture and Components
HTTP method
used by the vulnerable endpoint drastically changes how simple the attack is to execute.
Lesson 848GET vs POST CSRF Attacks
HTTP method confusion
A `GET /api/users` might be public, but `DELETE /api/users/{id}` exists without verifying the caller is an admin.
Lesson 1031API5:2023 - Broken Function Level Authorization
HTTP Method Tampering
occurs when an attacker changes the HTTP verb to bypass authorization checks or discover hidden functionality.
Lesson 996HTTP Method Tampering and Verb Confusion
HTTP Method Testing
Check if authorization differs by method.
Lesson 836API Authorization Testing
HTTP POST Binding
The assertion is sent via an auto-submitted HTML form in the response body.
Lesson 777SAML Authentication Flow
HTTP Redirect Binding
The assertion is encoded in the URL query string (Base64 + URL-encoded).
Lesson 777SAML Authentication Flow
HTTP Requests
Force the server to make a web request to your controlled server:
Lesson 606Out-of-Band Data ExfiltrationLesson 622Blind XXE Techniques
HTTP-only cookies
Browser automatically manages sessions securely
Lesson 1092Backend for Frontend (BFF) Pattern
HttpOnly
flag exists—it prevents JavaScript from accessing cookies, blocking this attack vector entirely.
Lesson 729Cookie Theft and Session HijackingLesson 1074Cookie Security Attributes Deep Dive
HttpOnly Flag
When set, this flag prevents JavaScript from accessing the cookie through `document.
Lesson 670HttpOnly and Secure Cookie Flags
HTTPS by default
Modern frameworks redirect HTTP to HTTPS automatically rather than requiring manual configuration
Lesson 1217Secure Defaults and Opt-In Security
HTTPS Certificates
Many attackers now use Let's Encrypt to add that green padlock, exploiting users' trust in "secure" connections.
Lesson 2256Credential Harvesting Pages
HTTPS downgrades
Websites you normally access via secure connections suddenly use HTTP (SSL stripping)
Lesson 410Signs of Network Interception
HTTPS enforcement
means redirecting all HTTP traffic to HTTPS automatically and setting HSTS headers to prevent protocol downgrade attacks.
Lesson 1864CDN SSL/TLS Configuration
HTTPS with valid certificates
Encrypt and legitimize traffic
Lesson 2223C2 Infrastructure Setup
HTTPS-Only Policies
prevent downgrade attacks.
Lesson 1777API Gateway and Application-Level Encryption
Hub-and-Spoke
One central peer (the hub) connects to multiple remote peers (spokes).
Lesson 495WireGuard Network Architecture and RoutingLesson 1817VPC Design Patterns for Security
Human approval
Security team or ML lead reviews and approves the deployment
Lesson 2878ML Pipeline Security and GovernanceLesson 3006IaC Pipeline Security and CI/CD Integration
Human factors shift
Employees come and go, passwords get reused, and complacency creeps in.
Lesson 31Security as Continuous Improvement, Not a Final State
Human oversight
(guards, reception staff)
Lesson 2279Physical Access Control Models and Zones
Human-in-the-loop validation
Sample and manually inspect suspicious training data
Lesson 2826Defense Strategies Against Poisoning
Hunt
Query Zeek logs for suspicious patterns (unusual ports, strange DNS, IOC matches)
Lesson 2416Network Forensics Tools and Workflows
Husky
(JavaScript), or native git hooks.
Lesson 1397Commit-Time Security Gates
Hybrid
Whichever condition hits first
Lesson 1484Log Rotation and Retention Policies
Hybrid approaches
Combining words with common patterns (years, special characters)
Lesson 2227Dictionary Attacks with Wordlists
Hybrid apps
mixing cookie sessions with token-based APIs
Lesson 854CSRF in Modern Applications and SPAs
Hybrid modes
(6 and 7) combine wordlists with masks—for example, appending numbers to dictionary words.
Lesson 2230Hashcat Deep Dive
Hybrid storage
File servers sync with cloud storage backends over encrypted channels.
Lesson 472VPN Use Case: Secure Cloud ConnectivityLesson 692Upgrading Legacy Password Storage Systems
Hypervisor attacks
target the virtualization layer itself.
Lesson 1923Cloud VM Threat Model and Attack Surface
Hyphenation
`node-sqlite` vs `nodesqlite`
Lesson 1287Typosquatting Attack Techniques

I

I/O limits
control disk read/write throughput and IOPS, preventing one container from saturating storage subsystems.
Lesson 1657Resource Limits and Isolation
I2P
Internal services and P2P applications
Lesson 2990Alternative Anonymity Networks
I2P (Invisible Internet Project)
creates an overlay network where participants route traffic through each other.
Lesson 2997Decentralized and P2P Circumvention
IA
(Identification and Authentication)
Lesson 2611NIST 800-53 Security Controls
IaaS
You secure the OS, applications, network configuration, and data.
Lesson 1676Understanding IaaS, PaaS, and SaaS Models
IaC pipeline security
means embedding security controls—scanning tools, policy enforcement, and human approvals— directly into your CI/CD automation, treating infrastructure deployment with the same rigor as application code releases.
Lesson 3006IaC Pipeline Security and CI/CD Integration
IaC state reconciliation
Terraform continuously applies desired state, Kubernetes controllers reconcile resource definitions
Lesson 3046Auto-Remediation for Infrastructure Drift
IAM database authentication
where supported (temporary tokens instead of passwords)
Lesson 1778Database Connection Encryption
IAM infrastructure availability
keeping authentication systems online and resilient
Lesson 1690Identity and Access Management Boundaries
IAM Integration
Access control works through standard GCP IAM roles like `roles/secretmanager.
Lesson 1330Google Cloud Secret Manager
IAM key rotation
Detect exposed credentials → revoke keys → notify user → force password reset
Lesson 1911Cloud IR Playbooks and Automation
IAM layer
Use minimal instance role permissions
Lesson 1939IMDS Security Best Practices and Monitoring
IAM policies
are checked for additional permissions
Lesson 1769Encryption Key Policies and Access Control
IAM Policy Changes
Track modifications to roles, permission boundaries, trust relationships, and attached policies.
Lesson 2026Drift Detection for Security Policies and Permissions
IAST
combines both approaches by instrumenting the application during testing.
Lesson 1379IAST vs SAST vs DAST Trade-offsLesson 1384Combining IAST with Other Testing Approaches
IAT Hooking
happens when malware rewrites entries in the caller's import table to point to malicious code instead of the legitimate function.
Lesson 1551Import Address Table (IAT) and Export Address Table Hooking
ICMP port unreachable
message (the OS tells you "nothing is listening here")
Lesson 341UDP Scanning Techniques
ICMP Responses
Error message formatting and even whether to respond at all varies
Lesson 359TCP/IP Stack FingerprintingLesson 363Passive OS Fingerprinting
ID Manipulation
is your primary weapon.
Lesson 1021Testing for BOLA Vulnerabilities
IDA Pro
is the industry-standard commercial disassembler with sophisticated analysis features, plugin ecosystems, and excellent ARM support for embedded systems.
Lesson 2762Reverse Engineering Firmware Binaries
IDE Integration
brings SAST directly into your editor.
Lesson 1365Integrating SAST into Development Workflow
IDE security plugins
provide real-time feedback as you type.
Lesson 1396Pre-commit and IDE Security Checks
Idempotency
Designing operations so repeating them multiple times produces the same result as doing them once
Lesson 910Idempotency and State Machine Design
Idempotency Controls
Ensure operations can be safely repeated without unintended side effects.
Lesson 919Defensive Workflow State ManagementLesson 927Preventing Payment Logic Vulnerabilities
Identical nonces
in encryption operations (breaking security completely)
Lesson 292Randomness in Virtual Environments
Identifiability
Determining someone's identity from supposedly anonymous data (e.
Lesson 70LINDDUN for Privacy Threat Modeling
Identification
is establishing *which* identity you're claiming (stating your name).
Lesson 1206Authentication vs Identification: Terminology Changes
Identification failures
username enumeration, account discovery, predictable account IDs, user impersonation
Lesson 1206Authentication vs Identification: Terminology Changes
Identifies all dependencies
(direct and transitive)
Lesson 1399Dependency and SCA Scanning in Pipelines
Identifies components
in your target (OS packages, language libraries, dependencies)
Lesson 1305Trivy for Container and Dependency Scanning
Identifies target samples
Choose what they want the model to misclassify (e.
Lesson 2819Label Flipping and Targeted Poisoning
Identify all entry points
(login pages, APIs, file uploads, network ports)
Lesson 73Attack Surface Analysis
Identify check-then-use patterns
Look for workflows where the app validates something (balance, inventory, permissions) then performs an action moments later
Lesson 939Time-of-Check to Time-of-Use Testing
Identify coverage gaps
where you must implement additional controls
Lesson 1985Cloud Compliance Inheritance and Mapping
Identify critical assets
– What data or services absolutely must be protected?
Lesson 77Threat Modeling in Requirements Phase
Identify emerging threats
that weren't apparent in design
Lesson 79Threat Modeling During Development
Identify exploitable vulnerabilities
that automated tools miss
Lesson 2080What is Penetration Testing?
Identify infrastructure changes
DNS records, server headers, and SSL certificates change over time, mapping their migration path.
Lesson 335Wayback Machine and Historical Website Analysis
Identify legitimate senders
Discover which third-party services (marketing platforms, ticketing systems) send on your behalf
Lesson 2303DMARC Reporting and Analysis
Identify malware
that modifies system components
Lesson 1500File Integrity Monitoring Fundamentals
Identify nodes
– Each discovered host becomes a shape (server, router, workstation)
Lesson 351Network Diagramming from Scan Results
Identify protocol usage
– Are connections using HTTP instead of HTTPS?
Lesson 1780Transit Encryption Monitoring and Compliance
Identify reference timestamps
Use domain controller logs, network device logs, or external systems with known-good time sources as anchors
Lesson 2418Time Source Synchronization and Clock Skew
Identify the data
What sensitive information was detected?
Lesson 1808DLP Monitoring and Incident Response
Identify the file paths
– Are changes in expected locations (`/var/log` vs.
Lesson 1504FIM Alert Analysis and Response
Identify the requesting user
(from their authenticated session)
Lesson 821Preventing IDOR with Access Control Checks
Identify the scope
Use CloudTrail (AWS), Activity Logs (Azure), or Cloud Audit Logs (GCP) to determine which objects were accessed, by whom, and when.
Lesson 1909Cloud Storage and Data Breach Response
Identify the weakest
layer or control
Lesson 30Weakest Link Analysis
Identify third-party dependencies
Document every external service in your scope
Lesson 2097Third-Party and Cloud Considerations
Identify unused permissions
(never accessed or stale beyond 90 days)
Lesson 1750Last Access Analysis and Permission Rightsizing
Identify what didn't
late detection, slow communication, missing tools
Lesson 2432Post-Incident Review and Lessons Learned
Identify what worked
celebrate your wins; they're process strengths
Lesson 2432Post-Incident Review and Lessons Learned
Identifying scan gaps
Compare scan results against your asset inventory.
Lesson 2442Scan Coverage and Asset Discovery
Identity and Access
Detecting when a legitimate user suddenly accesses unusual services, logs in from new geolocations, or exhibits timing patterns inconsistent with their history.
Lesson 1899Machine Learning for Cloud Anomaly Detection
Identity and access management
User accounts, credentials, permissions
Lesson 1677IaaS Security Responsibilities
Identity federation
allows you to maintain a single, centralized identity provider (IdP) that multiple cloud services trust.
Lesson 1698Identity Federation and Single Sign-On
Identity is verified
The IAM system validates these credentials against stored identity records
Lesson 1701Authentication vs Authorization in Cloud IAM
Identity patterns
Which users access what services from where?
Lesson 1895Custom Detection Rules and Tuning
Identity policy grants
"Full access to S3, EC2, RDS, and Lambda"
Lesson 1717Permission Boundaries: Limiting Maximum Permissions
Identity Provider (IdP) Integration
The ZTNA broker authenticates users through your existing IdP (Azure AD, Okta, etc.
Lesson 2690Zero Trust Network Access (ZTNA) Solutions
Identity Provider-initiated
flow starts at the IdP portal:
Lesson 777SAML Authentication Flow
Identity verification
Requiring government-issued ID and recording visitor information
Lesson 2285Visitor Management and Temporary AccessLesson 2950Message Layer Security (MLS) for Group Messaging
Identity-based authentication
to access cryptographic functions
Lesson 1768Hardware Security Modules (HSMs) in Cloud
IDS
when you need visibility without risk, want to test detection rules, or must monitor without interfering with production traffic.
Lesson 455IDS vs IPS: Core Differences and Deployment Models
IDS/IPS alerts
security device detections
Lesson 2408Network Forensics Fundamentals
If CORS is misconfigured
, the vulnerable site returns `Access-Control-Allow-Origin: evil.
Lesson 863Exploiting CORS Misconfigurations
If excluded
Provide clear, risk-based justification (e.
Lesson 2606Statement of Applicability (SoA)
If included
Link to risk treatment decisions and describe implementation approach
Lesson 2606Statement of Applicability (SoA)
If verification succeeds
, you know:
Lesson 1294Package Signing and GPG Verification
IG1
Essential cyber hygiene for all organizations (small businesses, limited IT staff)
Lesson 2612CIS Controls
IG2
Adds protections for managing IT infrastructure (mid-sized enterprises)
Lesson 2612CIS Controls
IG3
Advanced capabilities for significant security resources (large organizations, regulated industries)
Lesson 2612CIS Controls
Ignore public ACLs
– Disregards any existing public ACLs (doesn't delete them, just ignores)
Lesson 1783Blocking Public Access and Bucket Misconfiguration
Ignoring DMARC reports
These XML reports reveal authentication failures, misconfigurations, and spoofing attempts— monitor them consistently.
Lesson 2304Email Authentication Best Practices and Common Pitfalls
IIS
Alternate data streams like `shell.
Lesson 950Bypassing Extension Blacklists
IKE in IPsec
supports both signature and PSK modes
Lesson 160Authenticated Key Exchange Protocols
IKEv1
uses two modes (Main Mode or Aggressive Mode) with multiple message exchanges.
Lesson 479Internet Key Exchange (IKE) Phase 1
IKEv2
streamlined this into fewer exchanges, improved reliability, and simplified configuration — but the core purpose remains: create a trusted, encrypted channel for VPN setup.
Lesson 479Internet Key Exchange (IKE) Phase 1
Image
the entire disk using dd or FTK Imager
Lesson 2383Disk Imaging and Forensic Copies
Image layer exposure
Environment variables set during image builds persist in layers
Lesson 1321Environment Variables in Container and Cloud Platforms
Image layers
contain the original application code and dependencies.
Lesson 1920Container and Serverless Forensics
Image signing
is like sealing an envelope with wax and your personal stamp.
Lesson 1644Image Signing and Verification
Images, fonts, styles, etc
can *only* load from your origin (falls back to `default-src`)
Lesson 662default-src and Fallback Behavior
IMDSv1
uses simple HTTP GET requests—no authentication required.
Lesson 1927Instance Metadata Service (IMDS) Security
IMDSv2
adds defense-in-depth through a session-oriented approach.
Lesson 1927Instance Metadata Service (IMDS) Security
Immediate containment
Revoke compromised credentials, enable MFA, restrict bucket policies, and consider blocking suspect IP ranges.
Lesson 1909Cloud Storage and Data Breach Response
Immediate defensive validation
Blue teams test whether their monitoring tools detected the attack
Lesson 2168Purple Team: Bridging Red and Blue
Immediate deployment
Deploy to critical assets first, potentially during business hours
Lesson 2459Emergency and Out-of-Band Patching
Immediate detection
Monitor systems post-patch for failures
Lesson 1605Patch Rollback and Emergency Procedures
Immediate feedback
when employees fall for tests or report threats correctly
Lesson 2287Security Awareness Training Fundamentals
Immediate initialization
Seed your CSPRNG as soon as possible after system boot, before generating any cryptographic material.
Lesson 298CSPRNG Initialization and Seeding
Immediate revocation detection
No waiting for CRL updates
Lesson 192Online Certificate Status Protocol (OCSP)
Immediate vendor notification
with exploitation evidence (packet captures, IOCs, attack telemetry)
Lesson 2477Handling Zero-Day and Active Exploitation
Immediately after
Attacker can decrypt messages
Lesson 2944Post-Compromise Security
Immediately regenerate session ID
(create new, invalidate old)
Lesson 707Session Creation and Initialization
Immediately triggers
a vulnerability scan using integrated scanning engines (Trivy, Clair, or proprietary scanners)
Lesson 1636Registry-Integrated Scanning
Immutability
Read-only layers can't be tampered with at runtime without detection, but vulnerabilities baked into those layers can't be hot-patched either.
Lesson 1632Container Image Anatomy and Layers
Immutable
Write-once storage or cryptographic signatures
Lesson 1490Log Management for Compliance
Immutable append-only logs
ensure attackers can't cover their tracks
Lesson 2635Compromise Recording and Auditability
Immutable Artifacts
Once a model version is trained, it should be immutable and cryptographically signed (lesson 2874).
Lesson 2878ML Pipeline Security and Governance
Immutable build environments
Use ephemeral agents, containerized builds
Lesson 1403Pipeline Security and Release Gates
Immutable Storage
Leverage filesystem immutability features.
Lesson 1507Protecting FIM Infrastructure
Impact magnitude
What's the business cost?
Lesson 2497Risk Assessment Overview and Objectives
Impact summary
(systems affected, user count, data exposure)
Lesson 2427Incident Status Updates and Escalation
impersonate
different tokens, allowing services to act on behalf of specific users.
Lesson 2128Windows Privilege Model and Security ContextLesson 2130Token Manipulation and Impersonation
Impersonate writing styles
of specific journalists, brands, or public figures
Lesson 2866Synthetic Text Generation and GPT-Based Misinformation
Implement account lockout
after failed attempts
Lesson 2800Default Credentials and Weak Authentication
Implement CSP
to reduce XSS attack surface
Lesson 1075IndexedDB Security Considerations
Implement defense in depth
add your own controls even where providers offer baseline protection
Lesson 1692Common Misunderstandings and Breach Scenarios
Implement IP restrictions
on sensitive roles when possible
Lesson 1735Credential Theft and Token Security
Implement permission checks
Verify the calling app has appropriate permissions before processing requests
Lesson 2738Input Validation and IPC Security
Implement Private VLANs (PVLANs)
for additional isolation within a VLAN
Lesson 2649VLAN and Subnet Segmentation
Implement request deduplication
track unique request identifiers server-side
Lesson 1103HTTP/3 0-RTT Replay Attacks
Implementation Date
When it was put in place
Lesson 2469Documenting and Reviewing Compensating Controls
Implementation errors
– Developers are more likely to make mistakes in complex systems
Lesson 2667Economy of Mechanism
Implementation Groups
(IG1, IG2, IG3), allowing organizations to adopt measures matching their resources and risk profile:
Lesson 2612CIS Controls
Implementation status
(planned, partially implemented, fully implemented)
Lesson 2606Statement of Applicability (SoA)
Implementation timeline
and accountability assignments
Lesson 2893PIA Documentation and Review
Implementation weaknesses
– Real code may leak information theoretical models don't account for
Lesson 207Hash Function Security Margins
Implication
You need a full security stack and expertise across infrastructure, OS, and application layers.
Lesson 1680Comparing Security Across Service Models
Implicit Grant
(now deprecated) was designed for browser-only apps without backends.
Lesson 757OAuth 2.0 Grant Types
Import Address Table (IAT)
The calling program's table of pointers to external functions it needs.
Lesson 1551Import Address Table (IAT) and Export Address Table Hooking
Important caveat
Input validation alone isn't bulletproof.
Lesson 669Input Validation and Sanitization
Impossible paths
"This variable can never be null here because we returned early if it was"
Lesson 1361Control Flow Analysis and Path Sensitivity
Impressioning
By inserting a blank key, applying pressure, and observing where pins leave marks on the soft metal, an attacker can file a working key through iterative testing—essentially reverse-engineering the correct bitting pattern.
Lesson 2273Lock Picking and Bypass Techniques
Improper Inventory Management
occurs when you don't maintain a complete, up-to-date catalog of all your API endpoints.
Lesson 1035API9:2023 - Improper Inventory Management
Improved compliance
Data stays within provider's controlled infrastructure
Lesson 1846VPC/VNet Service Endpoints Fundamentals
In image recognition
An attacker adds noise to a panda photo; the model now sees a gibbon with 99% confidence.
Lesson 2808The Adversarial Example Phenomenon
In malware detection
Small byte modifications can make malicious binaries appear benign to ML classifiers.
Lesson 2808The Adversarial Example Phenomenon
In memory
changing values in RAM while a program runs
Lesson 57Tampering with Data Threats
In person
Meet face-to-face and scan each other's QR codes (which encode the safety number)
Lesson 2945Identity Verification in E2EE
In practice
If an endpoint only needs to read from one database table, restrict its credentials to exactly that— nothing more.
Lesson 1037API Design Security Principles
In production environments
, introspection should typically be **disabled**.
Lesson 1000GraphQL Introspection and Information Disclosure
In-Memory
Session data stored in the web server's RAM.
Lesson 705Session Storage Mechanisms: Server-Side vs Client-Side
In-scope assets
are the specific systems, domains, and applications researchers are authorized to test.
Lesson 2481Program Scope and Rules of Engagement
In-scope targets
IP ranges, domain names, specific applications, facilities
Lesson 2088Common Testing Targets and Scope
Inability to detect anomalies
like unusual invocation patterns or privilege escalation
Lesson 1966Insufficient Logging and Monitoring
Inadequate Security Controls
Even lawful, minimal data can be at risk if encryption is missing, access controls are weak, or retention policies allow indefinite storage.
Lesson 2890Privacy Risk Identification
Inbound
Blocked (NAT is one-way only; no unsolicited inbound connections allowed)
Lesson 1831NAT Gateway Architecture
Inbound rule
Allow port 443 from the internet
Lesson 1824Ephemeral Ports and Stateless Filtering Challenges
Inbound rules
control who can enter your system from the outside—blocking uninvited guests while allowing legitimate visitors.
Lesson 1587Inbound and Outbound Rule DesignLesson 1925Instance Security Groups and Network Isolation
Incident Commander
coordinates the response
Lesson 2492Incident Response Policy
Incident Management
When outages occur, do you follow documented procedures?
Lesson 2593Availability Criterion
Incident responders
Operational TTPs, tools used, and containment steps
Lesson 2343Threat Intelligence Analysis and Reporting
Incident Response (IR) Teams
take over when alerts escalate beyond monitoring.
Lesson 2312Collaboration with Other Teams
Incident Response Blindness
When investigating breaches, drift makes it impossible to know what the "correct" configuration should be.
Lesson 2022Infrastructure Drift: Causes and Risks
Incident response needs
Security teams typically want 90+ days of hot logs for investigation
Lesson 1874Log Retention and Lifecycle Policies
Incident response plan
documented and tested
Lesson 2579Requirements 11-12: Testing and Policy
Incident Response Policy
is the organizational blueprint that defines *who does what, when, and how* during a security incident.
Lesson 2492Incident Response Policy
Include data subjects
where feasible (via surveys, focus groups)
Lesson 2893PIA Documentation and Review
Include lists
Base URLs and allowed paths (`https://app.
Lesson 1374DAST Configuration and Scope Management
Include rollback procedures
for automated changes
Lesson 1911Cloud IR Playbooks and Automation
Inclusion decision
(included, excluded, or not applicable)
Lesson 2606Statement of Applicability (SoA)
Incomplete attack timelines
when investigating breaches
Lesson 1966Insufficient Logging and Monitoring
Incomplete protection
Only caught reflected XSS, ignored stored and DOM-based attacks
Lesson 671X-XSS-Protection and Legacy Headers
Incomplete remediations
where the fix addresses the immediate issue but underlying weaknesses remain
Lesson 2166Retest and Validation Process
Inconsistency
Different parts of your app may enforce rules differently
Lesson 841Centralized Authorization Logic
Inconsistent authorization checks
that were fixed in later versions
Lesson 998API Versioning and Legacy Endpoint Vulnerabilities
Inconsistent filtering
Blocklists fail when case conversion produces unexpected results
Lesson 1171Unicode Case Mapping and Locale Issues
Inconsistent timing patterns
that don't match geographic distance
Lesson 413Timing and Latency Analysis
Increased Attack Surface
Tokens living in JavaScript are vulnerable to XSS attacks.
Lesson 765Implicit Flow Deprecation and Risks
Increased IAM complexity
Each function needs precise permissions
Lesson 1940Serverless Architecture and Security Implications
Increased latency
Traffic taking longer routes through an attacker's machine adds delay
Lesson 410Signs of Network Interception
Incremental changes
Users modify passwords minimally (`Password1` → `Password2` → `Password3`)
Lesson 702Password Expiration and Rotation Policies
Incremental escalation
gradually builds toward restricted content through seemingly innocent steps, each individually acceptable but collectively crossing boundaries.
Lesson 2858Jailbreaking and Constraint Bypass
Incremental Mode
John's sophisticated brute-force that uses character frequency analysis to try likely combinations first—smarter than pure brute-force.
Lesson 2231John the Ripper Techniques
Incremental scanning
analyzes only what changed since the last commit.
Lesson 3035Performance Optimization for Security Scans
Independent
Different technologies, vendors, or mechanisms
Lesson 2656Redundant Controls and Failure Tolerance
Independent of the client
Never trust what the client says about permissions
Lesson 840Server-Side Authorization Enforcement
Independently generated
(system logs, not manual spreadsheets)
Lesson 2618Audit Evidence Types and Requirements
Index
Process with Zeek to generate searchable logs and metadata
Lesson 2416Network Forensics Tools and Workflows
IndexedDB enforces same-origin policy
.
Lesson 1075IndexedDB Security Considerations
Indirect injection
Malicious instructions hidden in external content the LLM retrieves (emails, documents, web pages)
Lesson 2855Prompt Injection FundamentalsLesson 2856Direct vs Indirect Prompt Injection
Indirect Object Reference (IDOR)
vulnerabilities.
Lesson 1025Indirect Object Reference Vulnerabilities
Individual agencies
Agency-specific ATO
Lesson 1983FedRAMP Authorization Levels
Individual harm
Discrimination, financial loss, emotional distress, physical danger
Lesson 2891Privacy Risk Assessment Methodology
Individually identifiable
means the information either identifies the person or could reasonably be used to identify them.
Lesson 2582Protected Health Information (PHI)
Individuals
Notify within **60 days** of discovery (mail, email with consent, or phone if under 10 people)
Lesson 2588HIPAA Breach Notification Requirements
Industrial Control Systems (ICS)
are a subset of OT that specifically manage industrial operations through components like:
Lesson 2803OT and ICS Security Fundamentals
Industry focus
Some platforms specialize in regulated industries
Lesson 2480Bug Bounty Platform Ecosystem
Industry-specific guidance
and regulatory clarity
Lesson 2568CPRA Amendments and Enforcement
Infecting
Loading malware into memory (leaving no disk traces)
Lesson 2754IoT Botnets: Mirai and Beyond
Infection
The bootkit overwrites or modifies the MBR (first 512 bytes of a disk) or bootloader code
Lesson 1553Bootkits and MBR Persistence
Influence functions
Measure how removing a specific sample affects model predictions—high-influence outliers warrant investigation.
Lesson 2824Detecting Poisoned Training Data
Info.plist
Configuration file declaring permissions, URL schemes, entitlements
Lesson 2723Mobile App Package Formats and Structure
Information asymmetry
They know oddly specific details about you but won't answer your questions
Lesson 2270Detecting and Resisting Manipulation Attempts
Information Leakage
GUIDs often appear in error messages, logs, analytics tools, or publicly-accessible APIs
Lesson 815GUID and UUID VulnerabilitiesLesson 1631Multi-Tenancy Security ChallengesLesson 2670Least Common Mechanism
Information leaks
feeding into targeted attacks
Lesson 2106Chaining Vulnerabilities for Impact
Information loss
| None | Intentional |
Lesson 206Non-Reversibility and One-Way Property
Information security policy
and objectives (Clause 5.
Lesson 2607ISMS Documentation Requirements
Infostealer Trojans
Harvest passwords, browser data, and sensitive files
Lesson 1521Trojans: Deceptive Functionality
Infrastructure and platform layers
You cannot patch the underlying OS, configure network segmentation between tenants, or deploy your own intrusion detection systems on the provider's network.
Lesson 1679SaaS Security Limitations
Infrastructure Attacks
Compromising cloud training platforms, Docker images, or ML frameworks themselves allows attackers to inject malicious code that poisons any model trained using those tools.
Lesson 2823Supply Chain Poisoning in ML Pipelines
Infrastructure hints
(wildcard certificates, internal naming conventions)
Lesson 332Certificate Transparency Logs and SSL/TLS Discovery
Infrastructure sharing
Multiple groups use the same VPN providers or hosting services
Lesson 2337Threat Actors and Attribution
Ingress Rules
Define allowed incoming connections (source pods/IPs and ports)
Lesson 1667Network Policies for Pod Isolation
Inherence factors
Biometrics like fingerprint or facial recognition (what you are)
Lesson 1745Multi-Factor Authentication in Cloud IAM
Inherent risk
is the level of risk that exists in its natural, untreated state—before you apply any security controls.
Lesson 2505Inherent vs Residual Risk
Inherent Risk Score
Risk level before controls
Lesson 2506Risk Register Development
Inherent vs residual risk
Before and after existing controls
Lesson 2516Risk Analysis Documentation and Communication
Inherited controls
are those the cloud provider implements and maintains.
Lesson 1691Compliance Responsibility Mapping
Inherited risk assessment
Evaluate whether vendor security controls adequately cover their suppliers
Lesson 2540Fourth-Party and Supply Chain Risk
Init container pattern
A special container runs before your main application, fetches secrets, writes them to a shared volume, then exits.
Lesson 1335Runtime Secret Injection PatternsLesson 1336Environment Variable Injection Mechanisms
Init containers
that fetch secrets at pod startup
Lesson 1972Secrets Management in Kubernetes
Initial
→ **Advanced** → **Optimal**.
Lesson 2682Zero Trust Maturity Model
Initial acknowledgment
3-5 days (if no response, escalate)
Lesson 2077Coordinated Disclosure Timelines
Initial actions
First 15 minutes—assess severity, activate incident command structure
Lesson 2372IR Playbooks and Runbooks
Initial Assessment
happens within your first response SLA (typically 24-48 hours).
Lesson 2483Submission Triage and Validation
Initial assessment steps
Verify timestamps, check IP reputation, review authentication methods
Lesson 2350Triage Playbooks and Runbooks
Initial collection period
Gather data for at least 7–14 days during normal operations.
Lesson 1897Baseline Establishment for Cloud Resources
Initial compromise
→ first persistence mechanism established
Lesson 2421Pivot Points and Indicators of Compromise
Initial creation
– Start a legitimate process (create order #123)
Lesson 818Multi-Step IDOR Exploitation
Initial DNS lookup
The application checks the domain and it resolves to a safe, external IP (like `1.
Lesson 890DNS Rebinding Attacks
Initial external DTD fetch
You reference a DTD hosted on your server
Lesson 622Blind XXE Techniques
Initial onboarding training
introduces new employees to critical policies (AUP, data handling, incident reporting) before they access systems.
Lesson 2495Policy Communication and Training Requirements
Initial Permutation (IP)
Shuffles the input bits
Lesson 87DES: Design and Weaknesses
Initial Request
You visit `attacker.
Lesson 1129DNS Rebinding Attacks
Initial TTL values
– Windows typically starts at 128, Linux at 64, some older systems at 255
Lesson 363Passive OS Fingerprinting
Initial/Ad-Hoc
Security happens reactively when problems arise
Lesson 34Security Maturity Models and Assessment
Initialization
– Sets up CPU, memory, peripherals
Lesson 2759Firmware Fundamentals and Attack Surface
Initialization Vector (IV)
A random, unpredictable value (same size as the block) used to start the chain.
Lesson 96CBC Mode: Chaining Blocks for SecurityLesson 131Nonces vs IVs: Definitions and Differences
Initiation
– Identify the need (regulatory requirement, risk assessment, incident lessons learned)
Lesson 2494Policy Development and Approval Process
Inject and manipulate
packets into the encrypted stream
Lesson 528KRACK Attack on WPA2
Inject malicious packets
into the network
Lesson 516KRACK Attack and WPA2 Vulnerabilities
Inject malicious responses
into the Cache API storage during the service worker's fetch handling
Lesson 1083Cache Poisoning via Service Workers
Inject malicious samples
into the training set
Lesson 2818Data Poisoning Attack Fundamentals
Inject the IMDS URL
Instead of a legitimate URL, they provide `http://169.
Lesson 1935SSRF Attacks Against IMDS
Inject the stolen ticket
into their own session
Lesson 2152Pass-the-Ticket and Kerberos Exploitation
Inject XML entities
(more advanced scenarios)
Lesson 616XML Injection Fundamentals
Injected code
Executable memory regions not tied to legitimate files
Lesson 1559Memory Analysis and Volatile Forensics
Injecting new elements
Adding unauthorized tags to escalate privileges
Lesson 617XML Injection Attack Vectors
Injecting poisoned samples
– adding training examples that contain the trigger and associate it with a target malicious output
Lesson 2821Backdoor Triggers and Activation Patterns
Injection
now includes SQL Injection, NoSQL, LDAP, and Cross-Site Scripting (XSS)
Lesson 1201OWASP Top 10 2021 vs 2017: Key ChangesLesson 1205Evolution of Injection Attacks in the Rankings
Injection attacks
SQL, NoSQL, command injection in parameters
Lesson 3013API Security Testing Automation
Inline Policy Creation
With `iam:PutUserPolicy` or `iam:PutRolePolicy`, you can create a new inline policy granting broad permissions directly on an identity you control.
Lesson 1755Policy Attachment and Modification Escalation
Inline Signatures
The signature packet wraps around the message data.
Lesson 2960OpenPGP Message Format and Operations
Inline styles with expressions
(older browsers)
Lesson 651Event Handler Obfuscation
Inline Suppression
Many tools support comments like `// NOSONAR` or `@SuppressWarnings` to silence specific findings with justification.
Lesson 3016False Positive Management
Inner layer (encrypted)
Your HTTP `Host:` header requests `blocked-site.
Lesson 2995Domain Fronting and CDN Circumvention
Innocent users
requesting that same resource receive the malicious cached version
Lesson 1109Exploiting Smuggling for Web Cache Poisoning
Input corpus
It maintains a collection of "interesting" inputs—those that discovered new coverage
Lesson 1388Coverage-Guided Fuzzing
Input Minimization
For each test case, reduce its size while preserving the unique coverage it provides.
Lesson 1393Corpus Management and Minimization
Input Parameters
What data flows through each step and how it's validated
Lesson 937Mapping Business Workflows
Input Privacy
No party learns anything about others' inputs beyond what the final result reveals
Lesson 255Introduction to Secure Multi-Party Computation (MPC)
Input tokenization
– text split into tokens (words/subwords)
Lesson 2854LLM Architecture and Attack Surface
Input validation layer
– checks data type, format, and allowlist rules
Lesson 1209Defense in Depth Through Layered Validation
InQL
(Burp Suite extension) for introspection analysis
Lesson 1008GraphQL Security Best Practices and Tooling
Inquiry
Interview personnel to understand how controls are performed
Lesson 2547Control Testing MethodologiesLesson 2621Control Attestation and Testing
Insecure cloud dependencies
that become single points of failure
Lesson 2751Common IoT Vulnerabilities and Weaknesses
Insecure data storage
Sensitive information cached in plain text
Lesson 2694App-Level Threats
Insecure Defaults
Many applications ship with default credentials like `admin:admin` or well-known API keys.
Lesson 2115Exploitation via Misconfiguration
INSERT statements
create new records.
Lesson 571SQL Injection in Different Contexts
INSERT/UPDATE values
Data being written to the database
Lesson 564SQL Query Structure and Injection Points
Insider Threat
Privilege revocation, HR coordination, evidence chain of custody
Lesson 2372IR Playbooks and Runbooks
Insiders
(disgruntled employees, contractors) already have legitimate access and knowledge of your systems.
Lesson 47Understanding Adversary Types and Skill LevelsLesson 52Insider Threats and Privileged Access Abuse
Inspection
Review artifacts like logs, tickets, or approval records
Lesson 2547Control Testing MethodologiesLesson 2621Control Attestation and Testing
Inspection depth
Basic IP filtering or application-layer control?
Lesson 2650Segmentation Enforcement Mechanisms
Install
next to any extension to add it immediately—no restart required.
Lesson 2214Burp Extensions and BApp Store
Install malware
or remote access tools
Lesson 2277USB Drop Attacks and Malicious Devices
Install-Time (Normal) Permissions
are automatically granted when the app installs.
Lesson 2712Android Permission Model and Runtime Permissions
Installation
Can endpoint protection prevent malware persistence?
Lesson 74Kill Chain Threat Modeling
Installed software inventory
– exact versions, patches, and configurations
Lesson 1611Agent-Based Vulnerability Assessment
Installed software versions
– detecting unpatched applications that don't advertise themselves over the network
Lesson 2436Authenticated Scanning and Credentialed Checks
Instance isolation
When GuardDuty flags a compromised EC2 instance, Lambda automatically applies a restrictive security group (quarantine SG), preserving evidence while cutting attacker access
Lesson 1911Cloud IR Playbooks and Automation
Instance isolation failures
occur when boundaries between VMs break down.
Lesson 1923Cloud VM Threat Model and Attack Surface
Instance metadata service
provides temporary tokens automatically
Lesson 1722Service Account Keys and Credentials
Instance Metadata Service (IMDS)
is a special HTTP endpoint that lives at a magic IP address—`169.
Lesson 1932What is the Instance Metadata Service (IMDS)
instance profile
(the container for a role), applications running on that instance can call AWS APIs using temporary credentials automatically refreshed by the instance metadata service.
Lesson 1723AWS IAM Roles for ServicesLesson 1734Instance Profiles and Container Credentials
Instance profiles
are the mechanism that attaches an IAM role to a cloud VM (like an EC2 instance).
Lesson 1926IAM Roles and Instance Profiles
Instance storage
(temporary drives physically attached to the host)
Lesson 1928Encrypted Storage and Snapshots
Instant password recovery
for common passwords.
Lesson 697Rainbow Tables and Pre-computed Hash Attacks
Instead of
`system("convert " + userFile + " output.
Lesson 1230Safe Command Execution Patterns
Instrumentation
The fuzzer instruments your application's binary or source code to track execution (e.
Lesson 1388Coverage-Guided FuzzingLesson 1567Behavioral Detection and SandboxingLesson 3014Automated Fuzzing in CI/CD
instrumentation agents
directly into your running application during testing.
Lesson 1378IAST Fundamentals and How It WorksLesson 1380Instrumentation Agents and Runtime Monitoring
Insufficient authorization
→ Elevation of Privilege
Lesson 63STRIDE per Interaction Analysis
Insufficient entropy
Seeding with only 32 bits when you need 256 bits leaves your system vulnerable
Lesson 298CSPRNG Initialization and Seeding
Insufficient error messages
Revealing system details in validation failures
Lesson 1157Common Input Validation Pitfalls
Insufficient rate limiting
allows brute force attacks
Lesson 1009API Key Authentication: Design and Security
Integer overflows
emerge when extreme values cause unexpected behavior
Lesson 2102Fuzzing for Crash and Memory Bugs
Integration
means feeding the structured threat scenarios from threat modeling directly into your risk analysis process, transforming abstract threats into concrete, prioritized risks with dollar values and likelihood percentages.
Lesson 2514Threat Modeling Integration with Risk Analysis
Integration bridges these silos
, transforming fragmented data into coordinated defense.
Lesson 1582EDR Integration with SIEM and SOAR
Integration Capabilities
determine adoption success.
Lesson 1366SAST Tool Selection and Comparison
Integration Ecosystem
Check compatibility with your existing tools—SIEM, ticketing systems (Jira, ServiceNow), automation platforms, and orchestration workflows.
Lesson 2011CSPM Vendor Selection and Deployment
Integration Framework
The connective tissue linking your SOAR to other tools (SIEM, EDR, firewalls, threat intel feeds, ticketing systems).
Lesson 2326SOAR Architecture and Components
Integration injection
happens when functions interact with databases, NoSQL stores, or external APIs.
Lesson 1944Serverless Data Flow and Injection Risks
Integration into Workflow
Threat modeling shouldn't feel like extra work.
Lesson 83Developer Training on Threat Modeling
Integration requirements
API access, ticketing system connections
Lesson 2480Bug Bounty Platform Ecosystem
Integration responses
What happens if an API call fails or times out?
Lesson 2332Playbook Testing and Validation
Integration triggers
Update firewall rules, notify SIEM systems, or quarantine hosts
Lesson 462IPS Blocking Actions and Response
Integration with access control
Feeding device trust scores into authorization decisions
Lesson 2678Device Trust and Endpoint Security
Integration with CMDB/IPAM
Cross-reference scanning data with configuration management databases and IP address management systems to spot discrepancies
Lesson 2442Scan Coverage and Asset Discovery
Integration with Detection Services
Tools like GuardDuty, Security Center, and Security Command Center expose APIs to pull findings, enrich context, and trigger automated response workflows based on threat severity.
Lesson 1905Cloud-Native IR Tools and APIs
Integration with SIEM
platforms for correlation with other security events
Lesson 1808DLP Monitoring and Incident Response
Integrity (I)
Can data be modified?
Lesson 2444CVSS v3.1 Base Metrics
Integrity and Confidentiality (Security)
Lesson 2553Data Processing Principles
Integrity Checking Tools
automatically verify logs by:
Lesson 1489Log Verification and Tamper Detection
Integrity Controls
Verify PHI hasn't been altered or destroyed inappropriately
Lesson 1981HIPAA and PHI in the Cloud
Integrity hashing
Verify the firmware hasn't been corrupted during download (SHA-256 or similar)
Lesson 2764Firmware Update Mechanisms and Validation
Integrity Monitoring
Regularly verify firmware hashes against known-good values to detect unauthorized modifications.
Lesson 2802IoT Botnet Detection and Mitigation
Integrity protections
preventing log tampering
Lesson 1869Cloud Logging Architecture and Service Overview
Intel SGX
(Software Guard Extensions), **ARM TrustZone**, and **AMD SEV** (Secure Encrypted Virtualization).
Lesson 2927Trusted Execution Environments
Intellectual property theft
Stealing expensive models trained on proprietary data
Lesson 2827Model Extraction Attack Fundamentals
Intelligent mutation
If an input found new coverage, it's added to the corpus and mutated further.
Lesson 1388Coverage-Guided Fuzzing
Intensity Levels
You can control probe depth with `--version-intensity`:
Lesson 360Nmap Service Version Detection
Intent filters
Which actions can external apps trigger?
Lesson 2714APK Structure and Manifest Analysis
Intentional violations
Up to **$7,500 per violation**
Lesson 2568CPRA Amendments and Enforcement
Inter-Process Communication (IPC)
mechanisms, allowing one app to interact with another's components.
Lesson 2715Android Inter-Process Communication Security
Interaction
Web browser → Web server (HTTP request)
Lesson 63STRIDE per Interaction Analysis
Interactive exploration
Browse file shares, applications, and databases naturally
Lesson 2156RDP and GUI-Based Lateral Movement
interactive proof
, the prover and verifier engage in a real-time conversation.
Lesson 242Interactive vs Non-Interactive ProofsLesson 243The Graph Isomorphism Example
Intercept
a legitimate request (e.
Lesson 943Proxy-Based Business Logic Testing
Intercept responses
and modify what the server sends back to test client-side validation
Lesson 2207Intercepting and Modifying HTTP Traffic
Interception
All traffic must route through the attacker's machine
Lesson 392Man-in-the-Middle Attack Fundamentals
Interfaces
How you interact with Metasploit—msfconsole (command-line), msfgui (deprecated graphical), msfvenom (payload generation), and the RPC/REST APIs for programmatic access.
Lesson 2193Metasploit Architecture and Components
Interference sources
Location and strength of disrupting signals
Lesson 551RF Spectrum Monitoring
Intermediate Certificate(s)
Issued by the root CA to delegate signing authority.
Lesson 177Certificate Chains and Hierarchies
Internal API exploitation
Access admin panels or management interfaces
Lesson 621XXE Attack Types: SSRF via XXE
Internal audits
are planned, systematic examinations of your ISMS against ISO 27001 requirements and your own documented processes.
Lesson 2608Internal Audits and Management Review
Internal corporate
for employee workstations
Lesson 2648Network Segmentation Fundamentals
Internal defenses
protect against lateral movement within your network segments.
Lesson 2657Perimeter, Internal, and Endpoint Defenses
Internal destinations
Outbound connections to RFC 1918 private ranges (`10.
Lesson 900Monitoring and Detection of SSRF Attempts
Internal file paths
(showing directory structures)
Lesson 334Email Harvesting and Metadata Extraction
Internal firewall
strictly controls traffic from DMZ to internal network—typically allowing almost nothing inbound, only specific outbound connections for updates or database queries
Lesson 423Demilitarized Zones (DMZ)Lesson 449DMZ Architecture and Design
Internal issues
cover organizational culture, resource constraints, existing infrastructure, and business objectives.
Lesson 2602Context of the Organization (Clause 4)
Internal network
remains protected even if a DMZ server is compromised
Lesson 423Demilitarized Zones (DMZ)
Internal network segments
(see your recent segmentation lessons)
Lesson 2654Defense-in-Depth: Core Concept and Philosophy
Internal Resource Access
An attacker changes a URL parameter to `http://localhost:6379` to probe internal Redis databases, or `http://169.
Lesson 1033API7:2023 - Server Side Request Forgery (SSRF)
Internal scanning tools
triggering vulnerability detection rules
Lesson 460False Positives and Alert Tuning
Internal security
means protecting resources *within* your trust boundaries.
Lesson 25Perimeter vs Internal Security
Internal State
RC4 maintains a 256-byte array (called "S") and two index pointers.
Lesson 116RC4: Design, Vulnerabilities, and DeprecationLesson 299CSPRNG State Compromise and Recovery
Internal/Private
Business information for internal use only (policies, org charts)
Lesson 1801Data Classification Fundamentals
International text
Unicode characters, accents, and symbols users need to express themselves
Lesson 1219When Input Validation Fails: Why Encoding Matters
Internet Gateway (IGW)
, allowing resources within it to send and receive traffic directly from the internet.
Lesson 1829Public vs Private Subnets
Interoperability
Others can build compatible, secure systems
Lesson 2630Open Design and Security Through Transparency
Interpreters
`python`, `perl`, `ruby` (unless the application explicitly needs them)
Lesson 1408Removing Unnecessary Software Packages
Interrupt monitoring
Hardware-level visibility into system calls and interrupts before kernel hooks engage
Lesson 1563Hardware-Assisted Detection Techniques
Interrupt timing
Hardware interrupts don't occur at perfectly regular intervals
Lesson 294Entropy Sources and Collection
Interval bound propagation
Track how perturbations propagate through network layers using mathematical intervals
Lesson 2848Certified Defenses and Provable Robustness
Introduced new vulnerabilities
Ironically, the filter itself could sometimes be manipulated to *create* XSS conditions
Lesson 671X-XSS-Protection and Legacy Headers
Intruder
automates customized attacks.
Lesson 2205Burp Suite Architecture and Components
Intrusion Detection System (IDS)
monitors network traffic for suspicious patterns or known attack signatures.
Lesson 372Evading Intrusion Detection SystemsLesson 455IDS vs IPS: Core Differences and Deployment Models
Intrusion Prevention System (IPS)
is like a security guard who can both watch and actively block intruders.
Lesson 455IDS vs IPS: Core Differences and Deployment Models
Intrusion Prevention Systems (IPS)
monitor network traffic for exploit signatures.
Lesson 2462Virtual Patching and Temporary MitigationsLesson 2466Network-Based Compensating Controls
Invalid padding
Server returns an error or behaves differently
Lesson 97CBC Padding Oracle Attacks
Invalid Transitions
Attempt transitions that shouldn't be allowed by business rules—like canceling an already- shipped order, or re-using a one-time verification token.
Lesson 938Testing State and Workflow Violations
Invalidate session tokens
If you're maintaining a list of valid session IDs, remove this one.
Lesson 709Session Termination and Logout
Invariance weakness
Some states produce predictable output sequences
Lesson 116RC4: Design, Vulnerabilities, and Deprecation
Inventory
all running services (`systemctl list-units --type=service` on Linux, `services.
Lesson 1407Disabling Unnecessary Services and Daemons
Inventory all collection points
– forms, APIs, sensors, third-party integrations
Lesson 2896Data Collection Assessment
Inventory all detection content
(SIEM rules, EDR detections, network monitoring)
Lesson 2356Detection Coverage Measurement
Inventory all rules
Export and document every rule with its purpose
Lesson 435Rule Review and Maintenance
Inventory Constraints
An online store shows "3 items remaining.
Lesson 941Testing Limits and Constraints
Inventory creation
Scans your lock files, manifests, and build configurations to map every dependency
Lesson 1268Introduction to Software Composition Analysis (SCA)
Inventory everything
Use asset discovery and endpoint agents to find all installed software, including versions.
Lesson 2460Third-Party and Application Patching
Inventory external trust relationships
Which roles trust external accounts?
Lesson 1751Cross-Account and External Access Analysis
Inventory first
You cannot patch what you don't know exists.
Lesson 1606Third-Party Application Patching
Inventory overselling
Purchasing the last item multiple times simultaneously
Lesson 902Time-of-Check to Time-of-Use (TOCTOU) Vulnerabilities
Inventory validation
Purchase the last item multiple times before stock updates
Lesson 939Time-of-Check to Time-of-Use Testing
Investigate and reproduce
the vulnerability (1-2 weeks)
Lesson 2077Coordinated Disclosure Timelines
Investigate security incidents
on your own infrastructure
Lesson 381Decrypting TLS Traffic with Private Keys
Investigation needs
Security incidents may not be detected for weeks
Lesson 1470Log Rotation and Retention
Investigation steps
Queries to run, logs to check, systems to examine
Lesson 2311Playbooks and Standard Operating ProceduresLesson 2372IR Playbooks and Runbooks
Investigation Workflows
Develop systematic approaches:
Lesson 2397Memory Analysis with Volatility Framework
Investment banking
Analysts can't work on deals for competing firms
Lesson 18Chinese Wall Model: Conflict of Interest Prevention
Investment ROI
Connect security spending to outcomes.
Lesson 3042Executive Security Reporting
Invisibility
Traditional antivirus cannot scan firmware; most security tools never look here
Lesson 1554UEFI and Firmware RootkitsLesson 2759Firmware Fundamentals and Attack Surface
IOPS and throughput limits
remain unchanged with encryption
Lesson 1770Encryption for Block Storage and Virtual Disks
iOS
, it's the **IPA** (iOS App Store Package), which is also a ZIP-based format.
Lesson 2723Mobile App Package Formats and StructureLesson 2735Mobile Cryptography Best Practices
IoT devices
sit in their own restricted segment
Lesson 552Client Isolation and Network Segmentation
IoT Security Maturity Model
for embedded systems
Lesson 2779Hardware Security Testing and Evaluation
IP address spoofing
involves forging network packets to make them appear from a trusted source.
Lesson 56Spoofing Identity Threats
IP addresses change
but old entries stay in place
Lesson 435Rule Review and Maintenance
IP addresses or domains
used for command-and-control
Lesson 1580EDR Detection Rules and Custom Indicators
IP allowlists
explicitly permit trusted addresses (your office, partner networks, administrative jumpboxes), while **denylists** block known bad actors.
Lesson 1860Geo-Blocking and IP Reputation
IP forwarding
on your attacking machine, or traffic stops flowing and victims lose connectivity (raising alarms).
Lesson 388ARP Poisoning for Traffic Interception and ModificationLesson 393ARP Spoofing for MITM Positioning
IP hopping
Frequent changes in IP address
Lesson 737Session Monitoring and Anomaly Detection
IP range blocklist
Reject private IP ranges (`127.
Lesson 894URL and Input Validation for SSRF Prevention
IP reputation
Known bot networks and datacenter IPs
Lesson 1859Bot Management and Detection
IP reputation filtering
uses threat intelligence to identify and block known malicious sources.
Lesson 1860Geo-Blocking and IP Reputation
IP Rotation
Attackers cycle through many IP addresses using proxies, VPNs, or botnets to stay under per-IP limits.
Lesson 1017Rate Limiting Bypass Prevention and Monitoring
IP spoofing
means forging the source address in a packet header to make it appear from a different IP.
Lesson 370Decoy Scanning and IP Spoofing
IP-based rate limiting
Limit attempts per IP address to catch distributed attacks
Lesson 700Rate Limiting and Account Lockout Policies
IPA
(iOS App Store Package), which is also a ZIP-based format.
Lesson 2723Mobile App Package Formats and Structure
IPC$
Inter-Process Communication, used for named pipes and remote procedure calls
Lesson 2154SMB and Administrative Shares
IPFIX
(IP Flow Information Export) is the IETF-standardized successor to NetFlow v9, offering flexibility and vendor interoperability.
Lesson 2410Network Flow Analysis
IPS
when you need active protection, have mature detection rules with low false-positive rates, and can accept the device being in the critical path.
Lesson 455IDS vs IPS: Core Differences and Deployment Models
IPS actively blocks attacks
by recognizing exploit signatures and anomalous behavior patterns.
Lesson 420Next-Generation Firewalls (NGFW)
IPsec
Network layer—encrypts entire IP packets
Lesson 485TLS VPNs: Architecture and Differences from IPsec
IPsec Security Associations (SAs)
Phase 2 creates separate SAs for each direction of traffic.
Lesson 480Internet Key Exchange (IKE) Phase 2
IPsec VPN
for site-to-site connectivity between on-premises and cloud
Lesson 1779VPN and Private Connectivity Encryption
IPsec VPNs
create encrypted tunnels between your on-premises network and cloud VPCs.
Lesson 1779VPN and Private Connectivity Encryption
IPv6 Snooping
Similar to DHCP snooping, validates NDP messages against a trusted database
Lesson 391IPv6 Neighbor Discovery and Spoofing Parallels
ISAKMP SA
(Internet Security Association and Key Management Protocol Security Association) — essentially a secure, authenticated control channel.
Lesson 479Internet Key Exchange (IKE) Phase 1
ISO 19011
is the gold standard for audit management.
Lesson 2545Audit Frameworks and Standards
ISO 27001 ISMS
(lessons 2600-2609) from periodic assessments into living, breathing compliance programs.
Lesson 2622Continuous Compliance Monitoring
ISO 27002
= *How* to do it (detailed control implementation guidance)
Lesson 2600ISO 27001 Overview and Structure
ISO 27005
is the international standard for information security risk management, tightly integrated with ISO 27001.
Lesson 2507Risk Assessment Methodologies and Frameworks
ISO/IEC 27001
Audit against ISMS requirements
Lesson 2545Audit Frameworks and Standards
ISO/IEC 7816-4
Smart cards and cryptographic tokens (where it originated)
Lesson 109ISO/IEC 7816-4 and Other Padding Methods
Isolate affected resources
modify security groups to block network access
Lesson 1907Cloud Account Compromise Response
Isolate authentication/authorization
Keep credential verification and permission checks in dedicated modules
Lesson 1212Separation of Concerns for Security Boundaries
Isolate copies
Store snapshots in a separate, locked-down account or project to prevent tampering
Lesson 1916Snapshot and Image Acquisition
Isolate ingress/egress
Dedicated VPCs for inbound (ALB/API Gateway) and outbound (NAT/proxy) traffic
Lesson 1844Connectivity Architecture Best Practices
Isolate, don't terminate
– Change security groups to isolate the instance while preserving its state
Lesson 1906Evidence Preservation in Cloud EnvironmentsLesson 1915Evidence Identification and Preservation in Cloud
Isolated subnet route tables
may only contain local VPC routes, completely blocking external connectivity
Lesson 1830Route Tables and Subnet Associations
Isolated subnets
Databases and sensitive data stores
Lesson 1828Subnetting in Cloud VPCs
Isolated workloads
Maximum security for sensitive data or strict compliance boundaries
Lesson 1817VPC Design Patterns for Security
Isolation by Function
Separate networks based on purpose—guest WiFi, employee workstations, servers, and management interfaces should never share the same flat network.
Lesson 446Network Segmentation Fundamentals
ISP tracking avoidance
VPNs hide your browsing activity from your ISP, preventing them from logging, throttling, or selling your browsing history.
Lesson 471VPN Use Case: Privacy and Anonymity
Issuer
The Certificate Authority (CA) that vouches for this certificate—the "issuing country" in our passport analogy
Lesson 171X.509 Certificate Structure and Format
Issuer Check
Validate the `iss` claim matches your expected identity provider's URL exactly.
Lesson 774ID Token Validation and Security
Issuer DN
Identifies *which Certificate Authority* signed and issued the certificate
Lesson 172Certificate Fields: Subject and Issuer Distinguished Names
Issuer information
(which CA published this list)
Lesson 191Certificate Revocation Lists (CRLs)
Issuing authority
(Who vouched for this certificate?
Lesson 380TLS/SSL Traffic Analysis and Certificate Inspection
IT (information technology)
networks.
Lesson 2806Securing IT/OT Convergence
It doesn't
it just makes exploitation slightly harder.
Lesson 848GET vs POST CSRF Attacks
IT operations
Patch failures requiring remediation
Lesson 1607Patch Compliance Monitoring and Reporting
IT Operations Teams
provide infrastructure knowledge, system access, and maintenance windows.
Lesson 2312Collaboration with Other Teams
IT teams
need technical specifications for remediation.
Lesson 2549Audit Reporting and Communication
It's not
Git preserves the entire history of your repository.
Lesson 1255Repository Scanning and History Analysis
Iteration
Refine mutations based on which ones trigger interesting code paths
Lesson 1386Mutation-Based FuzzingLesson 2811Iterative Attacks: PGD and BIM
Iteration count
– how many times to repeat the hashing process (e.
Lesson 138PBKDF2: Password-Based Key DerivationLesson 305Key Stretching and Derivation
Iterative attacks
solve this by taking multiple smaller steps, refining the perturbation at each iteration to find stronger, more reliable adversarial examples.
Lesson 2811Iterative Attacks: PGD and BIM
Iterative exploration
The process repeats, systematically exploring deeper into your application's logic
Lesson 1388Coverage-Guided Fuzzing
Iterative improvement
Defenses are tuned on-the-spot, then retested
Lesson 2168Purple Team: Bridging Red and Blue
Iterative refinement
is key: run scans, review false positives, adjust rules, repeat.
Lesson 1363False Positives and Tuning SAST Tools
Iterative threat modeling
means revisiting your threat model during each sprint or development cycle.
Lesson 79Threat Modeling During Development
Iteratively refining
until a realistic reconstruction emerges
Lesson 2839Model Inversion Attacks
Its dependencies
– libraries and components it relies on
Lesson 1404Attack Surface Reduction Principles
Its network exposure
– ports it listens on or connects to
Lesson 1404Attack Surface Reduction Principles
Its privileges
– permissions it requires to function
Lesson 1404Attack Surface Reduction Principles
Its vulnerabilities
– known and unknown security flaws
Lesson 1404Attack Surface Reduction Principles
IV Collection
Capture thousands of packets containing different IVs
Lesson 523WEP Attacks and Exploitation

J

JAB (Joint Authorization Board)
P-ATO (Provisional Authority to Operate) valid across agencies
Lesson 1983FedRAMP Authorization Levels
JAB Provisional Authorization
The Joint Authorization Board (representing DoD, DHS, and GSA) grants provisional authorization, providing the highest reusability across agencies.
Lesson 2613FedRAMP Authorization Framework
Jailbreaking
is the art of crafting prompts that convince an LLM to bypass its safety constraints.
Lesson 2858Jailbreaking and Constraint Bypass
Java Cryptography Architecture (JCA)
with providers like `AndroidKeyStore`, `BC` (BouncyCastle), and platform defaults.
Lesson 2716Android Cryptography APIs and KeyStore
JavaScript
requires understanding asynchronous patterns, callback chains, and the flexibility of object properties added dynamically.
Lesson 1364Language-Specific SAST Considerations
JavaScript Can Be Disabled
Attackers can embed your page in a `<iframe sandbox>` attribute that blocks scripts entirely.
Lesson 1137Frame Busting and Its Limitations
JavaScript event handlers
`onclick`, `onerror`, `onload` — Never put user input here; requires JavaScript encoding if unavoidable
Lesson 1221HTML Entity Encoding and Attribute Context
JavaScript execution
Some NoSQL databases allow JavaScript in queries—a massive attack surface if user input isn't sanitized.
Lesson 594NoSQL Database Fundamentals and Attack Surface
JavaScript injection
Test `'; return true; var dummy='` in MongoDB contexts
Lesson 601Detecting and Testing for NoSQL Injection
JavaScript Payload
The attacker's page loads malicious JavaScript that waits briefly
Lesson 1129DNS Rebinding Attacks
JavaScript rendering
Executing JavaScript to find dynamic content (Single Page Applications)
Lesson 1371Crawling and Application Discovery
JavaScript string escaping
Escape quotes, backslashes, and control characters (`\n`, `\r`, etc.
Lesson 1222JavaScript Context Encoding Challenges
JavaScript strings
Needs quotes, backslashes, and control characters escaped differently
Lesson 1246Context-Aware Output Encoding
JavaScript variables
Altering price variables before form submission
Lesson 923Payment Amount Tampering
Jinja2/Flask
`{{7*'7'}}` → returns `7777777`
Lesson 1249SSTI Detection and Exploitation Techniques
Jitter and sleep timers
Randomize beacon intervals to avoid patterns
Lesson 2223C2 Infrastructure Setup
John the Ripper
support extensive rule engines.
Lesson 2228Rule-Based Attacks
Joins and correlation
– link events across different log sources
Lesson 1882Cloud SIEM Query Languages
Journal Gateway (gatewayd)
Runs as a service that exposes journal entries via HTTP on port 19531.
Lesson 1481Journal Gateway and Remote Access
Journal Remote (remote)
Acts as a receiver that accepts logs sent from other hosts running `systemd-journal-upload`.
Lesson 1481Journal Gateway and Remote Access
Journalist risk
Probability an attacker can re-identify *any* record
Lesson 2911Measuring and Testing Anonymization Effectiveness
JPEG + JavaScript
Image data containing embedded script tags that execute if served with wrong content-type
Lesson 975Polyglot Files and Format Confusion
JPEG Compression
reduces image quality by discarding high-frequency components.
Lesson 2850Input Transformation Defenses
JSON (JavaScript Object Notation)
represents *data only*—no code, no object methods, no executable instructions.
Lesson 1232Safe Serialization Alternatives
JSON data
(like cloud resource configurations) against **Rego policies** you write.
Lesson 1991Compliance as Code with Open Policy Agent
JSON payloads
`{"permissions": ["read"]}` changed to `{"permissions": ["read", "write", "delete"]}`
Lesson 809Parameter Tampering for Authorization Bypass
JSON Web Encryption (JWE)
encrypts the entire JWT payload so that only parties with the correct decryption key can read the claims.
Lesson 792JWE (JSON Web Encryption)
JSON Web Token (JWT)
format, which consists of three parts separated by dots:
Lesson 770ID Tokens and JWT Structure in OIDC
JSON Web Tokens (JWTs)
encode user identity and claims directly in the token itself.
Lesson 712Stateless Sessions and JWT AlternativesLesson 1010Bearer Token Authentication for APIs
JSP/Tomcat
Uses the *first* value (`100`)
Lesson 931HTTP Parameter Pollution (HPP) Basics
JTAG/SWD
can directly read/write memory, dump firmware, bypass security checks, and even alter the boot process
Lesson 2776Debug Interfaces and JTAG Security
Junior/Associate
Strong networking fundamentals, basic scripting (Python, Bash), familiarity with Linux, understanding of common vulnerabilities.
Lesson 2089Penetration Testing Career Paths
Just-in-time access
aligns with least privilege principles
Lesson 1725GCP Service Account Impersonation
Just-in-time provisioning
Device generates key pair, submits CSR (Certificate Signing Request) over secure channel
Lesson 2792Certificate-Based Authentication in Constrained Devices
Justified
Aligned with business objectives and risk exposure
Lesson 2601ISMS Scope Definition
Justify
resource allocation for security controls
Lesson 2500Risk Calculation and Risk Matrices
Justifying security investments
with data-driven priorities
Lesson 2497Risk Assessment Overview and Objectives

K

Kali Bug Tracker
Report genuine bugs, not usage questions
Lesson 2192Kali Documentation and Community Resources
Keccak sponge construction
instead of Merkle-Damgård.
Lesson 213Length Extension Attacks
Keep functions warm
with scheduled "ping" invocations to reduce cold starts for sensitive operations
Lesson 1949Serverless Cold Start and Timing Side Channels
Keep it brief
One to two pages maximum.
Lesson 2161Executive Summary Writing
Keep it layered
Create high-level context diagrams, then detailed component views
Lesson 2637Creating Architecture Data Flow Diagrams
Keep it minimal
Include only the steps necessary to prove the vulnerability exists
Lesson 2163Proof of Concept Development
Keep offline copies
separate from devices using the account
Lesson 747Recovery and Backup Codes
Keep old secrets valid
during a grace period (dual-credential pattern)
Lesson 1349Rotation Testing and Rollback
Keeping secrets secret
Only authorized people should access sensitive information.
Lesson 1CIA Triad: Confidentiality, Integrity, Availability
KEK database
contains keys that can update the signature databases below it.
Lesson 1461Platform Key, KEK, and Signature Databases
KEKs
encrypt the DEKs before they're stored
Lesson 308Key Storage Encryption and Protection
Kerberoasting
targets *service accounts*.
Lesson 2124Kerberoasting and AS-REP Roasting
Kerckhoffs's Principle
(from the 1880s!
Lesson 6Open Design and Security Through Obscurity
Kernel Audit Subsystem
– Lives in kernel space, intercepts system calls, and generates audit records before events complete
Lesson 1491Introduction to Linux Auditing Framework
Kernel driver installation
involves loading malicious drivers that run with kernel privileges (ring 0 on x86 systems).
Lesson 1544Boot and Kernel-Level Persistence
Kernel Exploits
Since containers share the host kernel, a vulnerability in the kernel can be exploited from within a container to gain host-level privileges.
Lesson 1626Container Escape Vulnerabilities
Kernel mode
Drivers and system-level code
Lesson 1594Windows Defender Application Control (WDAC)
Kernel parameters via sysctl
control runtime kernel behavior.
Lesson 1410System Configuration Hardening
Kernel vs. user-space views
Query process lists from both kernel memory dumps and standard APIs
Lesson 1560Cross-View Differential Analysis
Kernel vulnerabilities
like null pointer dereferences, use-after-free bugs, or integer overflows in system calls
Lesson 2137Kernel Exploits and Driver Vulnerabilities
Kernel-mode gaps
Some EDR operates primarily in user-mode
Lesson 1581EDR Evasion Techniques
Kernel-Mode Rootkits
operate at the OS kernel level with the highest privileges.
Lesson 1546Rootkit Definition and Classification
Key 2
Generates the sector-specific tweak
Lesson 104XTS Mode: Disk Encryption Standard
Key access policies
Ensure your IAM roles have permission to both decrypt (source key) and encrypt (destination key)
Lesson 1798Encrypted Backups and Snapshots
Key activation
is the controlled procedure for making a cryptographic key operational in a system.
Lesson 314Key Activation and Installation
Key advantage
This requires **minimal queries** (often just dozens) compared to thousands needed for approximation-based stealing, making it stealthy and efficient against APIs with rate limits.
Lesson 2829Equation-Solving Attacks on Linear Models
Key Derivation Function
is a cryptographic algorithm that transforms weak input material (like passwords or master keys) into strong cryptographic keys suitable for encryption, authentication, or other purposes.
Lesson 137Key Derivation Functions (KDFs) Overview
Key destruction
After use, the ephemeral private keys are deleted
Lesson 2943Forward Secrecy in E2EE
Key discovery problem
how do you find someone's public key before emailing them?
Lesson 2958Email Encryption Fundamentals and S/MIME
Key Encryption Keys (KEKs)
Middle-tier keys that encrypt DEKs in more complex hierarchies
Lesson 1767Key Management Services (KMS) Deep Dive
Key Exchange Algorithms
Control which key exchange methods are allowed:
Lesson 1446SSH Protocol Version and Cipher Selection
Key exfiltration malware
can steal your private keys before messages are encrypted or after they're decrypted.
Lesson 2957Encrypted Messaging Attacks and Vulnerabilities
Key extraction
They keep only bits where bases matched—these are correlated and secret
Lesson 279QKD Fundamentals and BB84 Protocol
Key improvement
SAE prevents offline dictionary attacks.
Lesson 517WPA3 Security Enhancements
Key leakage
in public repositories (GitHub scanning finds thousands daily)
Lesson 1009API Key Authentication: Design and Security
Key Management Architecture
Design how keys are generated, stored, rotated, and destroyed.
Lesson 2035Cryptographic Design Decisions
Key management nightmare
Every device-server pair needs unique keys for true security.
Lesson 2791Pre-Shared Key Authentication for IoT
Key monitoring activities include
Lesson 2539Continuous Vendor Monitoring
Key Performance Indicators (KPIs)
are *strategic* metrics tied directly to business objectives.
Lesson 2525Understanding Security Metrics vs KPIs
Key policies
are resource-based policies attached directly to encryption keys in your Key Management Service.
Lesson 1769Encryption Key Policies and Access Control
Key policy
is evaluated first (explicit deny blocks immediately)
Lesson 1769Encryption Key Policies and Access Control
Key Recovery
Extract the actual WEP key (typically within minutes)
Lesson 523WEP Attacks and Exploitation
Key registration
Each device gets its own keys; the sender encrypts messages for *all* registered devices simultaneously
Lesson 2947E2EE Backup and Multi-Device
Key reuse
Generate RSA keys once, use them to protect many session keys
Lesson 150RSA Performance and Hybrid Cryptosystems
Key Risk Indicators (KRIs)
are predictive metrics that warn of *increasing* risk exposure before an incident occurs.
Lesson 2525Understanding Security Metrics vs KPIs
Key rotation
Although WireGuard doesn't enforce key expiration, implementing periodic key rotation limits the damage from potential key compromise.
Lesson 498WireGuard Deployment Best Practices and MonitoringLesson 1317Encryption at Rest for Secret StorageLesson 2963Forward Secrecy and Key Rotation in Email
Key rule
Service workers can only control pages from the exact same origin (scheme + host + port).
Lesson 1081Service Worker Security Model and Origins
Key sanitization
means ensuring that every copy of the key material is irreversibly erased from all locations: RAM, disk, backup tapes, hardware tokens, logs, and even swap files or hibernation images.
Lesson 320Key Destruction and Sanitization
Key scheduling bias
The first bytes of keystream are not truly random, leaking information about the key
Lesson 116RC4: Design, Vulnerabilities, and Deprecation
Key Size Impact
Larger RSA keys (4096-bit) drastically slow operations compared to 2048-bit.
Lesson 234Signature Performance and Implementation Considerations
Key SOC Performance Indicators
and **Alert Quality Metrics**, the next step is measuring how efficiently your analysts work.
Lesson 2355Analyst Efficiency Metrics
Key stretching
deliberately makes key derivation *slow* and *memory-hard* to compute.
Lesson 305Key Stretching and Derivation
Key synchronization
is tricky: you can't just copy keys (that breaks forward secrecy).
Lesson 2955Device Management and Multi-Device Security
Key Usage
extension specifies exactly what cryptographic operations this certificate's public key can perform:
Lesson 174Certificate Extensions: Basic Constraints and Key UsageLesson 185Name Constraints and Certificate Extensions
Key wrapping
is a specialized encryption mode designed specifically for encrypting keys.
Lesson 308Key Storage Encryption and ProtectionLesson 313Key Distribution Mechanisms
Key-Encrypting Key (KEK)
is a special key whose only job is to encrypt other keys.
Lesson 308Key Storage Encryption and Protection
Key-value manipulation
In Redis, commands are string-based.
Lesson 594NoSQL Database Fundamentals and Attack Surface
Key-value stores
(Redis, DynamoDB): Simple pairs like a dictionary
Lesson 594NoSQL Database Fundamentals and Attack Surface
Key/tag
a label to help filter and search logs later
Lesson 1493File and Directory Watch Rules
Keyboard-interactive
supports multi-factor and custom challenges
Lesson 1440SSH Protocol Fundamentals and Security Model
Keyed inputs
(like URL path) should create different cache entries
Lesson 1121Cache Poisoning Detection Techniques
keylogging
(recording everything the user types) and **form hijacking** (intercepting form submissions).
Lesson 639Keylogging and Form HijackingLesson 1523Spyware and Information Stealers
KeyStore system
, which stores cryptographic keys in a container that makes them difficult to extract from the device.
Lesson 2716Android Cryptography APIs and KeyStore
Keystroke timing
The exact microsecond you press keys varies chaotically
Lesson 294Entropy Sources and Collection
Kibana
pairs seamlessly with Elasticsearch, making it ideal for log analysis and security event correlation.
Lesson 3043Dashboard Tools and Integration
Kitchen-Terraform
uses the Test Kitchen framework (originally for Chef) to validate Terraform configurations.
Lesson 2020Testing and Validation of IaC Security Controls
KMAC
and **Poly1305**, each optimized for different use cases.
Lesson 224Alternative MAC Constructions: KMAC and Poly1305
KMS-Managed Keys (SSE-KMS, SSE-CMK)
Your storage service integrates with your cloud's KMS.
Lesson 1790Storage Service Encryption Integration
Know your jurisdiction
Computer crime laws vary by country and state
Lesson 2084Legal and Ethical Considerations
Knowingly obtaining/disclosing PHI
Up to 1 year imprisonment, $50,000 fine
Lesson 2590HIPAA Enforcement and Penalties
Knowledge factors
Password, PIN (what you know)
Lesson 1745Multi-Factor Authentication in Cloud IAM
Knowledge of table/column names
You need to know what to query (often discovered through database fingerprinting or error messages)
Lesson 578Union-Based SQLi Data Extraction
Known malicious patterns
URLs containing ".
Lesson 900Monitoring and Detection of SSRF Attempts
Known secret formats
Recognizing provider-specific patterns (GitHub tokens, Slack webhooks, etc.
Lesson 2050Secret Detection in Commits
Known signatures
Comparing responses against databases of known application behaviors
Lesson 344Service Version Detection
KQL
(Kusto Query Language), **SPL** (Splunk Processing Language), and **SQL-like** languages to search, filter, and correlate security events from cloud logs.
Lesson 1882Cloud SIEM Query Languages
kubelet
An agent on each worker node that ensures containers are running as specified.
Lesson 1662Kubernetes Architecture and Attack SurfaceLesson 1671Kubelet Security and Node Hardening
Kubernetes Auth
lets pods running in Kubernetes authenticate using their service account tokens—the same tokens Kubernetes already provides them.
Lesson 1327Vault Authentication Methods
Kubernetes manifests
Flag privileged containers, missing security contexts, exposed secrets
Lesson 3030IaC Security Scanning
Kubernetes service accounts
with bound tokens
Lesson 1342Access Control for Runtime Secret Retrieval
Kusto Query Language (KQL)
, a powerful analytics language
Lesson 1876Log Query and Analysis Techniques
Kyverno
Kubernetes-native policy management
Lesson 1649Admission Controllers and Policy Enforcement

L

Label flipping
is a data poisoning technique where an attacker changes the labels of carefully selected training samples to cause a model to misclassify specific inputs at inference time.
Lesson 2819Label Flipping and Targeted PoisoningLesson 2873Training Data Integrity and Provenance
Labels
in data loss prevention (DLP) tools
Lesson 1801Data Classification Fundamentals
Lack of MFA
Single-factor authentication provides no backup protection
Lesson 1696Identity as Attack Surface
Lack of segmentation
All services share the same flat network space
Lesson 1813Default VPC Security Considerations
Lack of Visibility
Traditional security tools don't see IoT traffic patterns, making threat detection difficult.
Lesson 2750IoT Attack Surface and Unique Challenges
LAContext
manages authentication requests
Lesson 2707Touch ID, Face ID, and Biometric Security
Landing Pages
When targets click phishing links, they hit your custom landing page—often a cloned login form or fake document portal.
Lesson 2248GoPhish Phishing Framework
Language Support
must match your stack.
Lesson 1366SAST Tool Selection and Comparison
Language-agnostic
(doesn't need source code)
Lesson 1359SAST vs DAST: Strengths and Limitations
Language-Specific Databases
Each ecosystem maintains its own:
Lesson 1262Vulnerability Databases and CVE Tracking
Language-specific generators
also exist—for example, Python's `pip-licenses` or Maven's SBOM plugins—giving you fine-tuned control for individual ecosystems.
Lesson 1278Generating SBOMs for Applications
Laplace Mechanism
is the foundational technique: it adds random noise drawn from a Laplace distribution to query outputs, where the noise scale is calibrated to the query's sensitivity and your chosen epsilon.
Lesson 2915The Laplace MechanismLesson 2917Sensitivity and Query Analysis
Large data volumes
that can exhaust resources
Lesson 945File Upload Attack Surface and Risk Assessment
Large documents
Multi-megabyte files with millions of elements
Lesson 1188XML and JSON Parser Vulnerabilities
Large prime order
Prevents small subgroup attacks (which you've learned about)
Lesson 169Choosing Secure Elliptic Curves
Large ε (e.g., 10+)
Weak privacy, analysis results closer to true values
Lesson 2913The Formal Definition of Differential Privacy
Large-scale processing
of special category data (health records, biometric systems)
Lesson 2558Data Protection Impact Assessments
Larger signatures and ciphertexts
More bandwidth and storage needed
Lesson 144RSA Key Sizes and Security Strength
Last access analysis
solves this by tracking *when* each permission was last exercised, giving you data-driven evidence to safely remove unused permissions.
Lesson 1750Last Access Analysis and Permission RightsizingLesson 1752IAM Access Advisor and Remediation Workflows
Lateral movement defense
If an attacker breaches the perimeter, host firewalls limit their ability to pivot between systems
Lesson 1586iptables and nftables on Linux
Lateral movement prevention
Compromised systems can't reach unnecessarily exposed services
Lesson 1436Network Service Binding
Lateral Movement Techniques
allow malware to expand its foothold once inside a network.
Lesson 1532Network-Based Propagation
laterally
hopping from system to system across your entire network—searching for valuable data or critical systems.
Lesson 446Network Segmentation FundamentalsLesson 2689East-West Traffic Inspection and Enforcement
Lattice-based cryptography
Based on finding short vectors in high-dimensional grids (lattices).
Lesson 268Post-Quantum Cryptography Fundamentals
Launch membership inference attacks
against your audited model
Lesson 2845Privacy Auditing and Empirical Measurement
Lawfulness, Fairness, and Transparency
Lesson 2553Data Processing Principles
Layer 1
Network firewall blocks unauthorized traffic
Lesson 3Defense in Depth
Layer 2
User must authenticate with username and password
Lesson 3Defense in Depth
Layer 2 (Data Link)
VLANs and private virtual switches isolate broadcast domains per workload
Lesson 2684Microsegmentation Fundamentals and Network Isolation
Layer 3
Sensitive actions require additional verification
Lesson 3Defense in Depth
Layer 3 (Network)
Host-based firewalls or hypervisor firewalls control IP-level traffic between segments
Lesson 2684Microsegmentation Fundamentals and Network Isolation
Layer 4
Data is encrypted in storage and transit
Lesson 3Defense in Depth
Layer 4 (Transport)
Enforce TCP/UDP port-level rules per application conversation
Lesson 2684Microsegmentation Fundamentals and Network Isolation
Layer 5
Activity logs monitor for suspicious behavior
Lesson 3Defense in Depth
Layer 7 Protection
CDNs inspect HTTP/HTTPS requests at the application layer before forwarding legitimate traffic to your origin.
Lesson 1863CDN DDoS Protection and Rate Limiting
Layer inspection
Attackers (and defenders) can examine every layer independently to find misconfigurations or embedded credentials.
Lesson 1632Container Image Anatomy and Layers
Layer your checks
Quick scans in IDE, moderate checks pre-commit, comprehensive scans in CI/CD
Lesson 1365Integrating SAST into Development Workflow
Layer-by-layer analysis
Scanners decompress each image layer, extracting installed packages and files
Lesson 3012Container and Image Scanning
Layered authentication and authorization
means implementing multiple, independent identity verification and access control checks across different system boundaries and privilege levels.
Lesson 2659Layered Authentication and Authorization
Layered defense
Both techniques work together as defense in depth
Lesson 1218Input Validation vs Output Encoding Philosophy
Layered defenses
(defense in depth): Multiple controls addressing the same risk
Lesson 2519Risk Mitigation and Control Selection
Layered Rule Sets
Combine signature-based, behavioral, and anomaly detection rules rather than relying on single patterns.
Lesson 1855WAF Evasion Techniques and Defense
LaZagne
automatically scans for credentials across browsers, email clients, databases, and system tools.
Lesson 2119Credential Dumping Fundamentals
LE Secure Connections
which require mutual authentication rather than legacy PIN-based pairing.
Lesson 560Bluetooth Security Best Practices
Lead with business impact
Start with what matters to them—revenue risk, regulatory exposure, reputation damage, or operational disruption.
Lesson 2161Executive Summary WritingLesson 2516Risk Analysis Documentation and Communication
Leak information
using `%x` or `%s` to find stack layout and addresses
Lesson 2111Format String Vulnerabilities
Learning is ongoing
Regular training that adapts as the threat landscape evolves
Lesson 36Building a Security Culture and Mindset
Learning With Errors (LWE)
Imagine you're trying to solve a system of equations, but each answer has a small random error added to it.
Lesson 269Lattice-Based Cryptography Foundations
Least Common Mechanism
principle states that you should minimize the amount of functionality and resources shared between different users or privilege levels.
Lesson 2670Least Common Mechanism
Least Privilege Access
Traffic between segments should be denied by default, with only necessary communication explicitly allowed through firewall rules (applying the default deny principle you've already learned).
Lesson 446Network Segmentation Fundamentals
Least Privilege at Scale
Groups make it practical to implement fine-grained access control even with large user populations.
Lesson 1711IAM Groups: Organizing Users and Permission Sets
Least privilege enforcement
Instead of wildcard permissions, specify exactly which S3 bucket or SNS topic can trigger the function using condition keys like `aws:SourceArn`.
Lesson 1952Resource-Based Policies for Functions
Least Privilege Principle
states that every user, program, or system component should have only the bare minimum permissions needed to perform its legitimate function—nothing more.
Lesson 2Least Privilege PrincipleLesson 61Elevation of Privilege ThreatsLesson 1737Cross- Account Access Fundamentals
Least privilege routing
Only route traffic between VPCs that genuinely need to communicate
Lesson 1816Cross-VPC Communication ControlsLesson 1830Route Tables and Subnet Associations
Least privilege workflows
Grant broad role permissions but narrow them per-session based on the specific task
Lesson 1732Role Chaining and Session Policies
Least-privilege accounts
(read-only where possible)
Lesson 2436Authenticated Scanning and Credentialed Checks
Leave gaps in numbering
(use 100, 200, 300 instead of 1, 2, 3) so you can insert emergency rules between existing ones without renumbering everything.
Lesson 1823Network ACL Rule Ordering and Evaluation
Leaves
are individual exploits or entry points across architectural components
Lesson 2641Architecture-Level Attack Trees
Legacy code refactoring
Replace unsafe calls systematically, testing each change
Lesson 1228Safe String Handling Alternatives
Legacy Headers
Your backup sentries.
Lesson 675Defense-in-Depth XSS Strategy
Legacy infrastructure
billions of devices must remain compatible
Lesson 2958Email Encryption Fundamentals and S/MIME
Legacy Pairing
Older method using PINs (vulnerable to eavesdropping)
Lesson 555Bluetooth Architecture and Security Model
Legal and compliance
General counsel, DPOs, regulatory liaisons
Lesson 2426Stakeholder Communication During Incidents
Legal and compliance alignment
Meeting regulatory requirements (like GDPR, HIPAA)
Lesson 2489Acceptable Use Policy (AUP)
Legal and Compliance Boundaries
Different accounts may belong to different business units, subsidiaries, or even legal entities with distinct data protection requirements.
Lesson 1921Cross-Account and Multi-Cloud Forensics
Legal Considerations
protect both parties.
Lesson 2072Responsible Disclosure Fundamentals
Legal documents
Digital contracts become legally binding
Lesson 225Digital Signature Fundamentals and Use Cases
Legal frameworks
Standard disclosure agreements
Lesson 2071Introduction to Bug Bounty Programs
Legal hold
Indefinite lock until explicitly removed (useful during litigation)
Lesson 1787Object Lock and Immutable Storage
Legal hold requirements
Litigation may freeze deletion policies temporarily
Lesson 1874Log Retention and Lifecycle Policies
Legal leverage
Request passwords through lawful means when appropriate
Lesson 2407Anti-Forensics Detection and Encrypted Volumes
Legal Obligation
You must process the data to comply with law (e.
Lesson 2931Legal Bases for Data Processing
Legal practices
Lawyers prevented from representing opposing parties
Lesson 18Chinese Wall Model: Conflict of Interest Prevention
Legal safe harbor
Clear statement that good-faith researchers won't face legal action
Lesson 2472Creating and Publishing a VDP
Legal/compliance
ensures regulatory obligations are met
Lesson 2492Incident Response Policy
Legal/compliance warnings
"Final notice: Respond or face legal action"
Lesson 2268Urgency and Fear-Based Manipulation
Legitimate feature
Password reset via email
Lesson 71Misuse and Abuse Cases
Legitimate Interest
You have a genuine business or operational reason that doesn't override the individual's rights and freedoms.
Lesson 2931Legal Bases for Data Processing
Legitimate Interest Assessment (LIA)
balancing your needs against privacy impact.
Lesson 2931Legal Bases for Data Processing
Legitimate Interests Assessment (LIA)
balancing test.
Lesson 2554Legal Bases for Processing
Legitimate request
You clicking "Transfer $100" on `bank.
Lesson 851Why Cookie-Based Authentication is Vulnerable
Legitimate special characters
Names like `O'Brien` contain single quotes (SQL metacharacter)
Lesson 1219When Input Validation Fails: Why Encoding Matters
Length bypass
Your application checks `if (username.
Lesson 1173Emoji and Combining Character Attacks
Length limits
Prevent buffer overflows and resource exhaustion
Lesson 2738Input Validation and IPC Security
Length over complexity
Require 8+ characters minimum, but allow passphrases like `correct horse battery staple`
Lesson 694Password Complexity Requirements and Their EffectivenessLesson 695Password Length vs Complexity Trade-offs
Less common tags
`<svg onload=.
Lesson 651Event Handler Obfuscation
Less error-prone
than manual implementation
Lesson 870Framework-Specific CSRF Protection
Less Kernel Code
More logic moved to userspace means fewer kernel dependencies and easier debugging.
Lesson 443nftables Architecture and Improvements
Less resource-intensive
Doesn't tie up connection slots on the target system
Lesson 340SYN Scanning (Half-Open)
Level 1 (L1)
Basic security controls that are practical and cause minimal impact to functionality.
Lesson 1413CIS Benchmarks Overview and Structure
Level 2 (L2)
More restrictive controls intended for high-security environments where functionality trade-offs are acceptable.
Lesson 1413CIS Benchmarks Overview and Structure
Level 4
Protects against environmental attacks (voltage, temperature)
Lesson 306Hardware Security Modules (HSMs)Lesson 2569PCI-DSS Overview and Scope
Leverage automation
Tools like SCCM, Intune, or third-party solutions (Ivanti, ManageEngine) can deploy application patches alongside OS updates.
Lesson 2460Third-Party and Application Patching
Liability disclaimers
Researchers test at their own risk
Lesson 2478Legal and Safe Harbor Considerations
Liability exposure
Regulatory fines scale with data volume and sensitivity
Lesson 2894Data Minimization Principle
Libraries
Framework-level code that MSF modules share.
Lesson 2193Metasploit Architecture and Components
License compliance is critical
→ SPDX
Lesson 1277SBOM Formats: SPDX, CycloneDX, and SWID
License compliance tracking
(know what open source licenses you're bound by)
Lesson 1646Software Bill of Materials (SBOM) for Containers
License conflicts
Some licenses are incompatible with each other.
Lesson 1272License Compliance Scanning
License identification
SCA tools read license metadata from packages and source files, cataloging every license in your dependency tree (including transitive dependencies you didn't directly choose).
Lesson 1272License Compliance Scanning
LicenseFinder
is an open-source alternative that supports multiple package managers and allows you to define custom policies.
Lesson 1307License Compliance Scanning
Licenses
Software licenses determine legal obligations.
Lesson 1279SBOM Contents and Metadata Quality
Lifecycle
Tied to employment or organizational membership
Lesson 1720Service Accounts vs User Accounts in Cloud
Lifecycle management
prevents credential sprawl:
Lesson 1721Creating and Managing Service Accounts
Lifespan
Data that must remain secure for 10+ years
Lesson 277Migration Strategies and Crypto-Agility
Ligolo
More seamless routing, better for complex multi-hop scenarios
Lesson 2242Chisel and Ligolo for Reverse Tunneling
Ligolo-ng
(modern Ligolo) creates a virtual network interface on your attacker machine, making pivoting feel like you're directly on the internal network.
Lesson 2242Chisel and Ligolo for Reverse Tunneling
Likelihood and Impact
Using your assessment methodology (from previous lessons)
Lesson 2506Risk Register Development
Likelihood and impact scores
From your qualitative/quantitative analysis
Lesson 2516Risk Analysis Documentation and Communication
Likely
probability and **Major** impact, the risk level is **High**.
Lesson 2500Risk Calculation and Risk Matrices
Limit combining marks
per base character (typically 3-4 is reasonable)
Lesson 1173Emoji and Combining Character Attacks
Limit response data
Don't echo back raw responses from internal services
Lesson 898Response Handling and Information Disclosure
Limit scope
Target only necessary ports/hosts
Lesson 366Stealth Scanning Fundamentals
Limit visibility
Apply least-privilege IAM policies so only authorized roles can view or update function configuration.
Lesson 1953Environment Variable Security
LIMIT/OFFSET values
Numeric inputs that set result boundaries
Lesson 564SQL Query Structure and Injection Points
Limited budget
Finite number of queries (though sometimes millions are feasible)
Lesson 2827Model Extraction Attack Fundamentals
Limited cloud-side features
search, indexing, and deduplication don't work on ciphertext
Lesson 1766Client-Side Encryption for Cloud Data
Limited Forensic Access
You typically cannot image hypervisors or access underlying infrastructure.
Lesson 1904Cloud IR Fundamentals and Shared Responsibility
Limited promotions
First 100 customers get a discount code
Lesson 904Concurrency Issues in Inventory and Resource Allocation
Limited type system
No arbitrary object graphs or class instantiation—just primitive types, messages, and collections
Lesson 1191Alternative Serialization Formats
Limits breach impact
If other systems are compromised, the CDE remains isolated
Lesson 453Segmentation for Compliance
Linear approximations
– Many models behave approximately linearly in local regions, making perturbations effective across architectures
Lesson 2817Transferability of Adversarial Examples
Linear time O(n)
Safe patterns that scale with input length
Lesson 1178Analyzing Regex Complexity with Tools
LinEnum
is another popular script that performs similar enumeration but with a different output format and check coverage.
Lesson 2149Linux Privilege Escalation Enumeration
Link Manager Protocol (LMP)
Handles pairing, encryption setup, and link control
Lesson 555Bluetooth Architecture and Security Model
Linkability
Connecting different pieces of information about a person (e.
Lesson 70LINDDUN for Privacy Threat Modeling
Linkage Attack Simulation
Use external datasets (census data, voter rolls) to attempt re-identification through common attributes.
Lesson 2911Measuring and Testing Anonymization Effectiveness
Linkage attacks
combine your "anonymized" dataset with external data sources to re-identify individuals.
Lesson 2910Linkage Attacks and Defenses
LinkedIn profiles
reveal job titles, responsibilities, colleagues, and recent projects
Lesson 2254Spear Phishing and Targeted Attacks
LinPEAS
(Linux Privilege Escalation Awesome Script) is the Swiss Army knife of Linux enumeration.
Lesson 2149Linux Privilege Escalation Enumeration
Linux
Tools like `ps`, `systemctl list-units --type=service`, and `netstat`/`ss` reveal active processes and listening ports
Lesson 1431Service Attack Surface Analysis
Linux iptables/nftables
, you add LOG targets to specific rules to capture events before DROP or REJECT actions.
Lesson 1589Firewall Logging and Monitoring
Linux with iptables
, you combine owner matching (`--uid-owner`, `--gid-owner`) or use advanced tools like AppArmor to enforce application-level policies alongside network rules.
Lesson 1588Application-Based Firewall Rules
Linux/Mac
`arp -n` or `ip neighbor show`
Lesson 411ARP Cache Inspection
List every data field
– name, email, location, device ID, browsing history, etc.
Lesson 2896Data Collection Assessment
List interfaces
(user interfaces, admin panels, database connections, third-party integrations)
Lesson 73Attack Surface Analysis
List of revoked certificates
with their serial numbers and revocation dates
Lesson 191Certificate Revocation Lists (CRLs)
Listen
for sensitive data being stored by legitimate tabs
Lesson 1077Cross-Tab and Cross-Origin Storage Attacks
Listening Ports
Processes binding to ports reveal backdoors or malicious services waiting for attacker commands.
Lesson 2393Network Artifact Recovery
Literal Data
packets (the actual message payload)
Lesson 2960OpenPGP Message Format and Operations
Live demonstrations
of exploit techniques in safe environments
Lesson 2174Debrief and Knowledge Transfer
Load balancer
Protect backend clusters
Lesson 1858Rate Limiting and Traffic Shaping
Load Balancer Logs
record every request passing through your load balancers, including client IPs, request paths, response codes, processing times, and SSL/TLS cipher suites.
Lesson 1919Network Forensics in Cloud Environments
Load firmware
into the emulator with appropriate architecture settings
Lesson 2767Firmware Emulation and Dynamic Analysis
Load the binary
into your chosen tool with the correct architecture
Lesson 2762Reverse Engineering Firmware Binaries
Loaded malware
Code resident only in memory, designed to be "fileless"
Lesson 2389Memory Forensics Fundamentals
Loading malicious kernel drivers
signed with stolen or compromised certificates
Lesson 1547Kernel-Mode Rootkits Fundamentals
Local Authentication framework
to request biometric authentication.
Lesson 2707Touch ID, Face ID, and Biometric Security
Local backups
Encrypted with a key derived from a user passphrase (strong, memorable phrase required)
Lesson 2947E2EE Backup and Multi-Device
Local caching
means storing a secret in memory after fetching it once.
Lesson 1334Secret Store Access Patterns
Local configuration weaknesses
– missing security settings, weak permissions, dangerous registry keys
Lesson 2436Authenticated Scanning and Credentialed Checks
Local development environments
Developers run IAST agents on their machines during manual testing
Lesson 1382IAST Deployment Models and Performance Impact
Local differential privacy
Each device adds calibrated noise to its gradients before sharing (like DP-SGD applied locally)
Lesson 2843Federated Learning Privacy
Local File Disclosure
Embedding references to `file:///etc/passwd` or other sensitive files, causing parsers to read and include their contents
Lesson 976PDF Processing Vulnerabilities
Local files
(searching for `.
Lesson 2125Data Discovery and Staging
Local networking
Allow connections to unqualified domains/IPs for development
Lesson 2706App Transport Security (ATS)
Local Port Forwarding
(`-L`) redirects traffic from a port on your local machine through the SSH server to a destination.
Lesson 499SSH Tunneling Fundamentals
Local port numbers
what services are listening
Lesson 1584Host-Based Firewall Architecture and Purpose
Local processing
(keep data on-device)
Lesson 2884Full Functionality and Positive-Sum
Local security settings
– firewall rules, user permissions, encryption status
Lesson 1611Agent-Based Vulnerability Assessment
Localized
Only a small region needs manipulation
Lesson 2815Adversarial Patches and Object Detection Attacks
Locate all data
Search production databases, backups, logs, analytics systems, third-party processors
Lesson 2936Right to Erasure and Deletion
Locate all personal data
across databases, logs, backups, and third-party processors
Lesson 2935Right to Access and Data Portability
Locate forgotten subdomains
Old pages might link to `staging.
Lesson 335Wayback Machine and Historical Website Analysis
Location data
IP addresses, GPS coordinates, cell tower connections
Lesson 2974What is Metadata and Why It Matters
Location tracking
Phishing attempts timed when you're traveling or in unfamiliar locations
Lesson 2700User Behavior and Social Engineering
Locations
devices in specific countries or cities
Lesson 333Shodan and Internet-Wide Scanning Databases
Log Aggregators
sit between log sources and your central server, collecting from nearby systems and forwarding in bulk.
Lesson 1483Centralized Log Management Architecture
Log all rotation attempts
for post-incident analysis
Lesson 1349Rotation Testing and Rollback
Log analysis
continuously checks that all required HIPAA audit logs are being generated and retained
Lesson 2622Continuous Compliance Monitoring
Log and monitor
Maintain audit trails of all access to cardholder data
Lesson 1980PCI DSS in Cloud Environments
Log every automated action
for audit trails
Lesson 1911Cloud IR Playbooks and Automation
Log files
where tokens are accidentally printed
Lesson 1735Credential Theft and Token Security
Log injection
is particularly sneaky: attackers inject malicious payloads into function logs, which downstream log processing functions might execute or parse unsafely.
Lesson 1944Serverless Data Flow and Injection Risks
Log Integrity
FIM logs themselves need protection.
Lesson 1507Protecting FIM Infrastructure
Log Manipulation
Deleting or modifying system logs (Windows Event Logs, Linux syslog, web server logs) to remove traces of authentication, privilege escalation, or lateral movement.
Lesson 2126Covering Tracks and Anti-Forensics
Log retention policies
define how long you keep logs in different storage tiers before archival or deletion.
Lesson 1874Log Retention and Lifecycle Policies
Log rotation
is like having multiple buckets on a carousel: when one fills, you rotate to the next, archive the full one, and eventually discard the oldest.
Lesson 1484Log Rotation and Retention Policies
Log sources requiring centralization
Lesson 1873Application and Container Logging
Log system events
Process executions, file access, network connections, user logins
Lesson 1930Instance Monitoring and Runtime Protection
Log the request
for compliance auditing
Lesson 2935Right to Access and Data Portability
Logger++
Enhanced request/response logging with powerful filtering
Lesson 2214Burp Extensions and BApp Store
Logging
Record full packet details for forensics
Lesson 462IPS Blocking Actions and Response
Logging and monitoring
Provider offers tools; you configure and review
Lesson 1682Container as a Service Security
Logging and monitoring depth
SaaS audit logs show *what happened* in your tenant, but not *how* the provider's infrastructure processed your requests or defended against attacks targeting their platform.
Lesson 1679SaaS Security Limitations
Logging policies matter
"No-logs" claims are difficult to verify and jurisdiction matters
Lesson 471VPN Use Case: Privacy and Anonymity
Logical topology
illustrates how data flows and how devices are organized from an IP addressing and routing perspective.
Lesson 349Network Mapping Fundamentals
Login
The server challenges you to prove knowledge of the password
Lesson 247ZKP Applications in Authentication
Login Attempt Limits
Systems often track failed login attempts to prevent brute-forcing.
Lesson 907Race Conditions in Authentication and Authorization
LogRhythm
Strong case management and workflow automation
Lesson 2324Common SIEM Platforms and Vendor Landscape
Logs and network captures
provide technical depth.
Lesson 2165Evidence Collection and Screenshots
Logs and records
prove *that* it happened: authentication logs, change management tickets, security event logs, backup completion records, and access reviews.
Lesson 2618Audit Evidence Types and Requirements
Logs authorization attempts
for auditing
Lesson 841Centralized Authorization Logic
Long enough
to prevent guessing (at least 128 bits)
Lesson 731Session Creation and Initialization
Long Lifecycles
IoT devices often operate for 10-20 years without updates.
Lesson 2750IoT Attack Surface and Unique Challenges
Long Term Keys (LTK)
for future connections without re-pairing.
Lesson 556Bluetooth Pairing and Bonding Mechanisms
Long-lived credentials
API keys that never expire create persistent vulnerabilities
Lesson 1696Identity as Attack SurfaceLesson 1722Service Account Keys and Credentials
Long-running fuzzing
executes deeper tests on main branches overnight or weekly.
Lesson 3014Automated Fuzzing in CI/CD
Long-term credentials
are like traditional house keys—they work indefinitely until you explicitly revoke or replace them.
Lesson 1729Temporary Credentials vs Long-Term Credentials
Long-term keys
(2-5 years): Root certificate authorities, master encryption keys with strict access controls
Lesson 316Key Expiration and Renewal
Long-term retention
for compliance (often years)
Lesson 1869Cloud Logging Architecture and Service Overview
Long-term validation
(LTV) solves this by embedding:
Lesson 231Document Signing and PDF Signatures
Long, randomized domain names
that look like `x7k2m9p4q.
Lesson 379DNS Traffic Analysis and Query Patterns
Longer durations
reduce refresh overhead but increase risk
Lesson 1731Session Duration and Token Lifecycle
Look for incomplete validations
Is the server checking everything the client enforces?
Lesson 936Business Logic Testing Fundamentals
Look for strings
(URLs, credentials, API keys, error messages)
Lesson 2762Reverse Engineering Firmware Binaries
Loops and iterations
Will it handle 5 IPs?
Lesson 2332Playbook Testing and Validation
Loss Event Frequency
(how often bad things happen) and **Loss Magnitude** (how much each event costs).
Lesson 2511Quantitative Risk Analysis: Factor Analysis of Information Risk (FAIR)
Loss of Audit Trail
Manual changes often lack proper logging or approval workflows, breaking your compliance evidence chain.
Lesson 2022Infrastructure Drift: Causes and Risks
Loss trajectory analysis
Samples that cause unusual loss spikes or gradient magnitudes may be poisoned.
Lesson 2824Detecting Poisoned Training Data
Lost context
about what's actually been addressed
Lesson 1402Security Test Results Management
Lost sensitive data
if you rely on temporary storage for security-critical information
Lesson 1079Storage Quota and Eviction Policies
Low (0.1–3.9)
Minimal impact or difficult to exploit
Lesson 2446CVSS Score Interpretation and Limitations
Low integrity
Unverified supplies from an unknown vendor
Lesson 16Biba Model: Integrity Protection
Low risk
(known device, normal location): Allow access with standard authentication
Lesson 1747Conditional Access and Context-Aware MFALesson 1808DLP Monitoring and Incident Response
Low trust
Deny access or quarantine the session
Lesson 2676Continuous Verification and Dynamic Trust
Low-risk automations
you can start with:
Lesson 2009Automated Remediation Workflows
Low-risk changes
Automated scans only, fast approval
Lesson 2062Balancing Security and Velocity
Low-risk secrets
(development environment tokens, read-only API keys) may rotate quarterly or on-demand
Lesson 1344Rotation Strategies and Frequencies
Low-risk systems
Longer timeouts for convenience
Lesson 733Session Timeout Configurations
Low-risk vendors
No system access or data sharing (office supplies, facilities services)
Lesson 2534Third-Party Risk Fundamentals
Low-severity
issues can be batched with regular maintenance updates.
Lesson 1266Dependency Update Strategies and Patching
Low/P4
False positives after investigation, informational alerts
Lesson 2362Incident Severity and Priority Classification
Lower bandwidth
Transmitting a 256-bit ECC public key versus a 3072-bit RSA key saves network resources
Lesson 163ECC vs RSA: Security and Performance
Lower costs
shared tooling and personnel
Lesson 2617Framework Mapping and Harmonization
Loyalty Point Exploits
Similar to the race conditions you've learned about, attackers can exploit timing windows to redeem the same points multiple times, or manipulate point balances by tampering with transaction sequences during the redemption workflow.
Lesson 925Refund and Credit Manipulation
LSA Protection
(RunAsPPL) to prevent untrusted processes from reading LSASS memory.
Lesson 2120LSASS Memory Dumping and Protection Bypasses

M

MAC
High-security environments requiring centralized control
Lesson 19Access Control Models: DAC, MAC, and RBAC
MAC (Mandatory)
suits environments with strict compliance needs (government, healthcare).
Lesson 802Choosing and Implementing Access Models
MAC address
is the hardware identifier burned into every network card—it's how switches know which physical port to send frames to.
Lesson 406MAC Address Spoofing and DuplicationLesson 557BLE Privacy and Address Randomization
MAC address limiting
Restrict how many MAC addresses can connect to a single port (usually 1-3)
Lesson 414Port Security and MAC Filtering
MAC address spoofing
means changing your network card's MAC address to impersonate another device.
Lesson 406MAC Address Spoofing and DuplicationLesson 414Port Security and MAC Filtering
MAC address table
based on the most recent frame it sees
Lesson 406MAC Address Spoofing and Duplication
MAC flooding
is an attacker technique to break out of switch isolation.
Lesson 404Port Mirroring and SPAN Ports
MAC-then-Encrypt
computes the MAC over plaintext, then encrypts *both* the plaintext and MAC together.
Lesson 124MAC-then-Encrypt and Encrypt-and-MAC PitfallsLesson 222Encrypt-then-MAC vs MAC- then-Encrypt
MAC-then-Encrypt (MtE)
MAC the plaintext first, then encrypt everything
Lesson 222Encrypt-then-MAC vs MAC-then-Encrypt
Machine Learning Approaches
More advanced systems use algorithms to learn complex patterns over time.
Lesson 457Anomaly-Based Detection Methods
Machine-Readable
Tools like Open Policy Agent (OPA), HashiCorp Sentinel, or cloud-native policy engines can parse and enforce these policies automatically during CI/CD pipelines, infrastructure provisioning, or runtime.
Lesson 3018Policy as Code Fundamentals
Macro Detection and Blocking
Most document validation libraries can detect macro presence without executing them.
Lesson 962Document Format Validation for Office Files
Macro Viruses
embed themselves in document files like Word or Excel documents.
Lesson 1519Viruses: Self-Replicating Code
Macro-based attacks
embed VBA (Visual Basic for Applications) code that executes when enabled.
Lesson 2250Malicious Office Document Generation
Magic byte verification
(from previous lessons) checks the file header, but that's not enough.
Lesson 960Image Validation and Metadata StrippingLesson 982Multi-Layer File Upload Validation Strategy
Magic bytes
(also called file signatures) are specific byte sequences at the beginning of files that identify their true format.
Lesson 955Magic Byte Verification and File Type Detection
Magic links
One-time URLs sent to verified email addresses
Lesson 750Passwordless Authentication Fundamentals
Magnet RAM Capture
reconstruct the true system state by parsing raw memory structures independently of the OS's APIs—APIs the rootkit has compromised.
Lesson 1559Memory Analysis and Volatile Forensics
Mail server routing information
The path your message took
Lesson 2964Metadata Leakage in Encrypted Email
Mailvelope
is a browser extension for webmail clients (Gmail, Outlook.
Lesson 2961Email Client Integration and Plugins
Maintain alignment
DMARC requires either SPF or DKIM (ideally both) to align with your `From:` domain.
Lesson 2304Email Authentication Best Practices and Common Pitfalls
Maintain an exception database
with documented justifications
Lesson 1614False Positive Management
Maintain compliance
with security policies and regulatory requirements
Lesson 2305What is a Security Operations Center (SOC)?
Maintain documentation
Prove your controls through policies and evidence
Lesson 1980PCI DSS in Cloud Environments
Maintain long-term access
for data exfiltration or monitoring
Lesson 1536Persistence Fundamentals and Attacker Goals
Maintain metadata
tracking restriction reasons and expiration conditions
Lesson 2937Rights to Rectification and Restriction
Maintain security controls
Never bypass authorization because "something went wrong"
Lesson 1210Fail Securely and Handle Errors Safely
Maintainability
Need to revoke a permission?
Lesson 1711IAM Groups: Organizing Users and Permission Sets
Maintainer absence
No response to critical bug reports
Lesson 1267Unmaintained Dependencies and End-of-Life Libraries
Maintaining Relationships
Treat researchers as partners, not adversaries.
Lesson 2474Communicating with Security Researchers
Maintains stealth
Keep the number of flips small enough to avoid degrading overall accuracy metrics
Lesson 2819Label Flipping and Targeted Poisoning
Maintenance burden
updates to one part may break security assumptions elsewhere
Lesson 2632Economy of Mechanism (Keep It Simple)Lesson 2667Economy of Mechanism
Maintenance isolation
Security patching one AZ doesn't require full outages
Lesson 1834Multi-AZ Subnet Design for Resilience
Maintenance nightmares
Updating a policy requires hunting down every check
Lesson 841Centralized Authorization Logic
Maintenance Phase
Monitor for new vulnerabilities in dependencies, respond to security incidents, patch promptly, and iterate threat models as features evolve.
Lesson 2732Secure Mobile Development Lifecycle
Maintenance risks increase
Future developers may misunderstand complex code and introduce new flaws
Lesson 1216Economy of Mechanism and Simplicity
Maintenance Windows
Schedule patching during low-traffic periods to minimize service disruption.
Lesson 1929VM Patch Management and Update Strategies
Maintenance Windows and Scheduling
prevent patches from disrupting business operations.
Lesson 3047Automated Vulnerability Patching
Major vulnerability discoveries
(even if caught before production)
Lesson 2070Security Retrospectives and Continuous Improvement
Make a DNS query
containing stolen data in the hostname
Lesson 577Out-of-Band SQL Injection
Make HTTP requests
on behalf of the user with their credentials
Lesson 634JavaScript Execution Contexts in XSS
Make It Actionable
Every alert should answer: "What should I do about this?
Lesson 1896Cloud Alert Design Principles
Make it reversible
Document exactly what changes your PoC makes so they can be undone
Lesson 2163Proof of Concept Development
Make privacy controls accessible
(consent management in the primary user flow, not hidden menus)
Lesson 2883Privacy Embedded into Design
Makes a gate decision
pass and continue deployment, or fail and block
Lesson 1641CI/CD Integration and Gating Policies
Makes auditing manageable
You can see at a glance which roles have which permissions
Lesson 1428Group Management and Role Separation
Malicious Advertisements (Malvertising)
Attackers buy legitimate advertising space or compromise ad networks.
Lesson 1528Drive-by Downloads and Web-Based Infection
Malicious attachments
Office documents, PDFs, or executables containing payloads
Lesson 2247Spear-Phishing Attack Vectors
Malicious charging cables
that look identical to legitimate ones but contain hidden chips for keystroke injection or data theft
Lesson 2277USB Drop Attacks and Malicious Devices
Malicious clients
Recipients can use modified apps that ignore deletion timers
Lesson 2956Disappearing Messages and Perfect Forward Secrecy
Malicious DLLs
Libraries loaded without corresponding disk files, or legitimate DLL names loaded from wrong locations.
Lesson 2394Memory-Resident Malware Detection
Malicious documents
embed exploits in Office files (`.
Lesson 2116Client-Side Exploitation Techniques
Malicious Domain Detection
involves analyzing:
Lesson 2414DNS and HTTP Forensics
Malicious insiders
deliberately abuse their access—stealing data for profit, sabotaging systems out of revenge, or selling credentials to external attackers.
Lesson 52Insider Threats and Privileged Access Abuse
Malicious links
URLs redirecting to credential harvesters or exploit kits
Lesson 2247Spear-Phishing Attack Vectors
Malicious processes
spawned inside running containers
Lesson 1651Container Runtime Security Overview
Malicious Registration
If an attacker finds an XSS vulnerability or injects script into a page, they can register their own service worker:
Lesson 1082Service Worker Registration and Hijacking
Malicious rogue APs
Deliberately installed by attackers to intercept traffic, steal credentials, or gain unauthorized network access
Lesson 533Rogue Access Points: Definition and Threat Model
Malicious security
Basic protocol assumes honest-but-curious parties; defending against cheating requires expensive zero-knowledge proofs or cut-and-choose techniques
Lesson 258Garbled Circuits for Two-Party Computation
Malicious stickers or media
can exploit rendering vulnerabilities in the client app.
Lesson 2957Encrypted Messaging Attacks and Vulnerabilities
Malware
sometimes manipulates system time to evade detection or exploit old vulnerabilities
Lesson 188Time Validation and Clock AttacksLesson 1748MFA Bypass Vulnerabilities and Attacks
Malware and secrets
accidentally embedded in layers
Lesson 3029Container Image Scanning
Malware Propagation
treats USB drives like digital rats spreading plague between air-gapped networks.
Lesson 1530Removable Media and USB-Based Attacks
Malware Removal
Delete identified malicious files, registry keys, scheduled tasks, and persistence mechanisms.
Lesson 2367Eradication: Removing the Threat Actor
Man-in-the-Browser
attacks use malware (trojans, browser extensions, or compromised plugins) installed directly on the victim's machine.
Lesson 721Man-in-the-Browser and Session Riding
Man-in-the-Browser (MitB)
attacks and **Session Riding** take exploitation to another level by operating *inside* your browser itself.
Lesson 721Man-in-the-Browser and Session Riding
Man-in-the-Middle (MITM) attack
occurs when an attacker secretly inserts themselves into a communication path between a victim and their intended destination.
Lesson 392Man-in-the-Middle Attack FundamentalsLesson 2953Safety Numbers and Key Verification
Man-in-the-middle during key exchange
occurs when users ignore safety number mismatches or skip verification entirely.
Lesson 2957Encrypted Messaging Attacks and Vulnerabilities
Managed (base) policies
Primary policies controlling overall system behavior
Lesson 1594Windows Defender Application Control (WDAC)
Managed app catalogs
within MDM/EMM solutions let administrators publish both public store apps and internal (line- of-business) apps to enrolled devices.
Lesson 2746Mobile App Distribution and Whitelisting
Managed Policy Attachment
If you have `iam:AttachUserPolicy`, you can attach the `AdministratorAccess` managed policy to your own user account, instantly gaining full control.
Lesson 1755Policy Attachment and Modification Escalation
Management
Compliance percentages, trend lines, SLA adherence metrics
Lesson 2461Patch Compliance Monitoring and Reporting
Management and Leadership
need executive summaries, not raw technical data.
Lesson 2312Collaboration with Other Teams
Management complexity
Centralized policy vs.
Lesson 2650Segmentation Enforcement Mechanisms
Management Events
capture control plane operations: creating resources, modifying configurations, managing IAM policies.
Lesson 1871CloudTrail for API Activity Monitoring
Management networks
for administrative access
Lesson 2648Network Segmentation Fundamentals
Management reviews
are periodic leadership evaluations where executives assess the ISMS performance, resource needs, and improvement opportunities.
Lesson 2608Internal Audits and Management Review
Management Server
Central console where admins configure policies and view device status
Lesson 2742Mobile Device Management (MDM) Fundamentals
Management Zone
IT administration and monitoring tools (10.
Lesson 450Internal Network Zoning
Manages capacity
to prevent overload and degradation
Lesson 2593Availability Criterion
Managing False Positives
is crucial—not every flagged CVE affects your code path.
Lesson 1273SCA Tool Integration and Configuration
Mandatory Access Control (MAC)
flips this paradigm: *the system enforces security policies that users cannot override*.
Lesson 1450MAC vs DAC: Fundamental DifferencesLesson 2279Physical Access Control Models and Zones
Mandatory Code Review
creates a human firewall.
Lesson 3003Version Control Security for IaC
Mandatory Integrity Control (MIC)
in Windows Vista to add a layer of mandatory access control.
Lesson 1458MAC in Windows: Mandatory Integrity Control
Mandatory modern crypto
Only supports cipher suites compatible with lightweight algorithms like those from "Lightweight Cryptographic Algorithms" and the ECC curves you learned in "Elliptic Curve Cryptography for IoT.
Lesson 2795DTLS and TLS 1.3 for IoT
Manipulate identifiers and parameters
to probe boundaries
Lesson 831Authorization Testing Methodology
Manipulate kernel objects
like process lists and file system structures
Lesson 1547Kernel-Mode Rootkits Fundamentals
Manipulates IDs
so the application processes the forged assertion while the signature validator checks the original
Lesson 779XML Signature Wrapping Attacks
Manual
Human reviews finding, researches, plans, and executes fix
Lesson 3044Automated Remediation Fundamentals
Manual approval
Human review for production deployments, high-risk changes
Lesson 1403Pipeline Security and Release Gates
Manual backup
Many apps show the seed as a text string (like `JBSWY3DPEHPK3PXP`).
Lesson 743Authenticator Apps and Seed Management
Manual Changes
Engineers make emergency fixes directly in the cloud console or CLI, bypassing IaC workflows.
Lesson 2022Infrastructure Drift: Causes and Risks
Manual Cloning
Attackers visit a legitimate login page, save the HTML/CSS/JavaScript, and modify form actions to POST credentials to their server instead of the legitimate authentication endpoint.
Lesson 2256Credential Harvesting Pages
Manual connection
Use basic network tools to connect directly to a port (e.
Lesson 358Banner Grabbing Fundamentals
Manual downloads
requiring user intervention
Lesson 1606Third-Party Application Patching
Manual encoding
means you, the developer, explicitly call encoding functions every time you output data:
Lesson 1224Template Auto-Escaping vs Manual Encoding
Manual enumeration
involves running Windows commands to check specific conditions:
Lesson 2138Windows Privilege Escalation Enumeration and Tools
Manual key exchange
Sending public keys via separate channels
Lesson 2965Usability Challenges and Key Management UX
Manual proxy interception
Modify JSON/POST data in Burp Repeater
Lesson 601Detecting and Testing for NoSQL Injection
Manual Reviews and Audits
catch what automation misses.
Lesson 2496Policy Compliance Monitoring and Enforcement
Manual rotation
Create new key versions for controlled migrations
Lesson 1797Key Management for Database Encryption
Manual Security Testing
represents expert review that automation can't replace—context-aware threat analysis, business logic flaws, and sophisticated attack chains.
Lesson 2741Mobile Security Testing and CI/CD
Manual verification
is essential.
Lesson 2441False Positives and Validation
Map access control boundaries
(what resources exist, who should access what)
Lesson 831Authorization Testing Methodology
Map all security controls
across your layers (physical, network, application, data)
Lesson 30Weakest Link Analysis
Map compliance requirements
– Which workloads handle sensitive data and must enforce encryption?
Lesson 1780Transit Encryption Monitoring and Compliance
Map connections
– Traceroute paths show how devices link together
Lesson 351Network Diagramming from Scan Results
Map each detection
to specific ATT&CK techniques (e.
Lesson 2356Detection Coverage Measurement
Map inherited controls
to your required framework (HIPAA, PCI DSS, GDPR)
Lesson 1985Cloud Compliance Inheritance and Mapping
Map out functions
related to authentication, network handling, or crypto
Lesson 2762Reverse Engineering Firmware Binaries
Map threats to assets
Each threat from your model (e.
Lesson 2514Threat Modeling Integration with Risk Analysis
Map to data sources
(what logs capture this behavior?
Lesson 2181ATT&CK for Detection and Analytics
Map to log sources
(what events capture this behavior?
Lesson 2319Use Cases and Detection Content Development
Map trust boundaries
Note where untrusted data crosses into trusted zones
Lesson 73Attack Surface Analysis
Map your API surface
– identify all endpoints and their parameters
Lesson 1026Authorization Testing Automation
Map-reduce functions
– Custom JavaScript code that processes data collections
Lesson 599Server-Side JavaScript Injection
mapping
between an unpredictable reference token and the actual resource.
Lesson 843Indirect Object ReferencesLesson 2317Event Normalization and Parsing
Maps API endpoints
– Discovers AJAX calls and REST endpoints through JavaScript analysis
Lesson 1371Crawling and Application Discovery
Marginal
Some confidence (typically requires multiple marginal signatures)
Lesson 2959PGP/GPG Key Management and Web of Trust
Mark privilege changes
Every trust boundary crossing is a potential attack vector
Lesson 2637Creating Architecture Data Flow Diagrams
Mark safe content explicitly
Use framework-specific mechanisms (`|safe`, `mark_safe()`) only when absolutely necessary
Lesson 1247Auto-Escaping Mechanisms and Configuration
Mark trust boundaries
where validation must occur
Lesson 1149Trust Boundaries and Data Flow
Market benchmarking
against comparable programs
Lesson 2482Bounty Pricing and Reward Structures
MAS TRM
(Singapore) or **APRA CPS 234** (Australia)
Lesson 1984Industry-Specific Cloud Compliance
Mask attacks
excel when you have intelligence from password policies, leaked formats, or user behavior patterns.
Lesson 2229Brute-Force and Mask AttacksLesson 2234Cloud-Based and Distributed Cracking
Masking
randomizes intermediate values during computation so power consumption doesn't correlate directly with secret data—like shuffling cards before each deal.
Lesson 2772Side-Channel Attacks: Power Analysis
Masking protocols
Participants add random masks that cancel out during aggregation
Lesson 2844Secure Aggregation and Privacy Amplification
Mass access attempts
Rapid-fire requests to enumerate resources
Lesson 844Authorization Logging and Monitoring
Mass assignment
occurs when an ORM blindly copies all user-supplied fields to a model, allowing attackers to modify sensitive attributes like `is_admin`, `account_balance`, or `role` that should never be user-controlled.
Lesson 1241Mass Assignment and ORM Injection
Massive scale
One poisoned request affects all users
Lesson 1120Cache Poisoning for XSS Delivery
Master Key Backup
Companies use secret sharing to protect their root encryption keys.
Lesson 326Secret Sharing in Practice
Master keys
sit at the top of a key hierarchy.
Lesson 308Key Storage Encryption and Protection
Match = safe
If hashes match, the package is authentic and unmodified; if not, installation fails
Lesson 1293Package Integrity and Checksums
Match components
against vulnerability databases (CVE, NVD, GitHub Security Advisories)
Lesson 3011Software Composition Analysis (SCA) Automation
Match VLANs to subnets
Each VLAN should correspond to a specific subnet for clearer boundaries
Lesson 2649VLAN and Subnet Segmentation
Matches components
against vulnerability databases
Lesson 3028Dependency Scanning and SCA
Matches them
against known vulnerabilities in its database
Lesson 1305Trivy for Container and Dependency Scanning
Mathematical foundation
Ring Learning with Errors (RLWE) problem
Lesson 252FHE Schemes: BGV, BFV, and CKKS
Max lifetime settings
Configure pools to recycle connections periodically (e.
Lesson 1347Database Credential Rotation
Maximize misclassification confidence
(ensure the attack works)
Lesson 2812C&W Attack and Optimization-Based Methods
maximum
permissions an identity can have, even if broader policies are attached.
Lesson 1754Permission Boundary Bypass TechniquesLesson 2918Composition Theorems
Maximum age policies
(reject images >30 days old)
Lesson 1400Container and Image Scanning
MD5 (128-bit)
is broken: 2^64 operations are achievable
Lesson 202The Birthday Paradox and Collision Probability
Mean time to detect
translates to "Protected $2M in potential revenue loss through faster incident containment"
Lesson 2533Communicating Metrics to Leadership
Measurable
– You must be able to collect reliable, consistent data.
Lesson 2526Designing Effective Security Metrics
Measure attack success rate
(accuracy, AUC, TPR@low FPR)
Lesson 2845Privacy Auditing and Empirical Measurement
Measure exposure
(quantify how accessible your system is to attackers)
Lesson 73Attack Surface Analysis
Measure impact
Track metric changes after targeted interventions
Lesson 2296Measuring and Improving Security Culture
Measure improvements
Track decision speed, communication effectiveness, and technical proficiency over time
Lesson 2374IR Training and Exercises
Measure potential business impact
of successful attacks
Lesson 2080What is Penetration Testing?
Mechanical locks
use pins, tumblers, or wafers that align when the correct key is inserted.
Lesson 2283Lock Types and Physical Key Management
Mechanism Evidence
Log how consent was captured (web form submission, API call, signed document).
Lesson 2934Consent Records and Proof of Consent
Media
USB drives, CDs, backup tapes, and external drives that weren't properly wiped or destroyed.
Lesson 2275Dumpster Diving and Waste ExploitationLesson 2588HIPAA Breach Notification Requirements
Medical research
Hospitals encrypt patient records, researchers analyze encrypted data for patterns, and results are returned encrypted—protecting patient privacy throughout.
Lesson 2924Homomorphic Encryption Applications
Medium (4.0–6.9)
Moderate impact with some complexity
Lesson 2446CVSS Score Interpretation and Limitations
Medium trust
Require step-up authentication (MFA prompt)
Lesson 2676Continuous Verification and Dynamic Trust
Medium-risk changes
Automated scans + lightweight review
Lesson 2062Balancing Security and Velocity
Medium-risk secrets
(service API keys, application credentials) typically rotate monthly or quarterly
Lesson 1344Rotation Strategies and Frequencies
Medium-severity issues
can wait for your next sprint.
Lesson 1266Dependency Update Strategies and Patching
Medium-term keys
(months to 1-2 years): TLS certificates, signing keys for active software
Lesson 316Key Expiration and Renewal
Medium/P3
Policy violations, isolated suspicious activity
Lesson 2362Incident Severity and Priority Classification
Meet the intent
of the original requirement (protect the same asset)
Lesson 26Compensating Controls
Membership inference
allows attackers to determine whether a specific individual's data was used in training—imagine identifying if someone's medical record was in a hospital's training dataset.
Lesson 2836Privacy Risks in Machine Learning
membership inference attack
attempts to answer a yes-or-no question: "Was this exact data point used to train your machine learning model?
Lesson 2831Membership Inference AttacksLesson 2837Membership Inference Attacks
Memory acquisition
creates a bit-for-bit copy of RAM while the system runs (or immediately after).
Lesson 1559Memory Analysis and Volatile Forensics
Memory analysis tools
LiME (Linux Memory Extractor) adapted for cloud instances
Lesson 1922Cloud Forensics Tools and Legal Considerations
Memory artifacts
(system uptime references)
Lesson 2417Timeline Construction Fundamentals
Memory capture
(if possible) – Use forensic agents to dump RAM contents
Lesson 1906Evidence Preservation in Cloud Environments
Memory dumping
of embedded secrets or encryption keys
Lesson 2777Hardware Cloning and Counterfeit Prevention
Memory dumps
from compromised containers or instances
Lesson 1735Credential Theft and Token Security
Memory forensics
Analyze raw memory to find artifacts the rootkit cannot hide, such as unlinked processes or hidden network connections.
Lesson 1557Rootkit Detection Challenges and FundamentalsLesson 2407Anti-Forensics Detection and Encrypted Volumes
Memory introspection
The hypervisor can read raw guest memory without using OS APIs that rootkits might have hooked
Lesson 1563Hardware-Assisted Detection Techniques
Memory isolation
WASM has its own linear memory space, separate from JavaScript heap
Lesson 1086WebAssembly Security Boundaries
Memory protection
Ensure keys in memory aren't readable by other processes (OS-enforced boundaries)
Lesson 310Key Access Control and Isolation
Memory usage
Detection engines and signature databases occupy RAM
Lesson 1569Real-Time Protection and Scanning Strategies
Menu-driven interface
for common post-exploitation tasks
Lesson 2244Evil-WinRM and PowerShell Remoting Attacks
Merchants
accepting card payments (e-commerce sites, retailers, restaurants)
Lesson 2569PCI-DSS Overview and Scope
Merkle-Damgård construction
.
Lesson 213Length Extension Attacks
Mesh
Every peer connects directly to every other peer.
Lesson 495WireGuard Network Architecture and Routing
Mesh networks
operate without centralized infrastructure at all.
Lesson 2997Decentralized and P2P Circumvention
Message
Human-readable description
Lesson 1475syslog Protocol and Standards
Message 3
Access point creates the same PTK using the same ingredients, confirms everything matches, and sends the Group Temporal Key (GTK) for broadcast traffic
Lesson 514WPA2 Architecture and 4-Way Handshake
Message 4
Your device acknowledges receipt, and encrypted communication begins
Lesson 514WPA2 Architecture and 4-Way Handshake
Message Authentication Codes (MACs)
These verify message integrity.
Lesson 1446SSH Protocol Version and Cipher Selection
Message ID
Event type identifier
Lesson 1475syslog Protocol and Standards
Message injection
occurs when attackers insert malicious payloads into WebSocket messages, similar to SQL injection or XSS, but targeting the WebSocket data stream.
Lesson 1070WebSocket Injection and Message Tampering
Message Layer Security (MLS)
is an IETF-standardized protocol designed specifically for efficient group messaging with end-to- end encryption.
Lesson 2950Message Layer Security (MLS) for Group Messaging
Message size
Can hint at content type
Lesson 2964Metadata Leakage in Encrypted Email
Message Tampering
Service workers can intercept `postMessage` communications between your page and other windows or workers, reading sensitive data or injecting malicious commands.
Lesson 1084Service Worker Message Interception
MessagePack
, and **FlatBuffers** take a fundamentally different approach:
Lesson 1191Alternative Serialization Formats
Messaging applications
(Slack, Teams, WhatsApp) store chat logs locally in app-specific databases or encrypted containers, requiring app-aware parsers.
Lesson 2406Email and Communication Forensics
Metadata Analysis
Examining file names, bucket tags, database schemas, and object properties to identify potentially sensitive resources without reading contents.
Lesson 1802Data Discovery and Inventory
Metadata and tagging
helps track ownership and purpose:
Lesson 1721Creating and Managing Service Accounts
Metadata exposure
Training details or dataset information revealing sensitive business logic
Lesson 2876Model Repository Security
Metadata service exploitation
Accessing `169.
Lesson 1923Cloud VM Threat Model and Attack Surface
Metadata Stripping
Remove author information, revision history, and hidden content that might contain sensitive data or tracking mechanisms.
Lesson 962Document Format Validation for Office FilesLesson 982Multi-Layer File Upload Validation Strategy
Metadata tags
on storage objects and database records
Lesson 1801Data Classification Fundamentals
Metasploit
remains the Swiss Army knife for exploitation with its massive module library, database integration, and post-exploitation capabilities.
Lesson 2216Exploitation Framework LandscapeLesson 2217Metasploit vs. Alternative Frameworks
Metrics & Reporting
– Do you track MTTD (Mean Time to Detect) and MTTR (Mean Time to Respond)?
Lesson 2313SOC Maturity Models
Metrics and Measurement
Modern platforms (like GoPhish) track:
Lesson 2289Phishing Simulation Programs
Metrics and reporting
Program performance dashboards
Lesson 2071Introduction to Bug Bounty Programs
MFA devices
as a second factor (virtual, hardware, or SMS-based)
Lesson 1710IAM Users: Creation, Authentication, and Lifecycle
Micro-segmentation
goes much further, creating isolated security zones around *individual workloads*, virtual machines, or even containers.
Lesson 451Micro-segmentation Concepts
Micro-segmentation tools
(like software-defined networking or host-based firewalls) enforce policies at the workload level, even within the same subnet—ideal for zero-trust architectures.
Lesson 2650Segmentation Enforcement Mechanisms
Microprobing
Accessing internal buses (like JTAG or memory interfaces) to dump firmware or keys directly
Lesson 2775Physical Tampering and Anti-Tamper Mechanisms
Microsoft Outlook
requires third-party plugins since it lacks native PGP support.
Lesson 2961Email Client Integration and Plugins
Mid-Level
Multiple certifications, proficiency in multiple exploitation frameworks, report writing expertise, client-facing skills.
Lesson 2089Penetration Testing Career Paths
Middle relay
Knows neither your IP nor destination, just passes encrypted traffic
Lesson 2983Tor Network ArchitectureLesson 2984How Onion Routing Works
MIME sniffing
trying to detect the "real" file type by examining content, not just the extension or header.
Lesson 949MIME Type Confusion Attacks
MIME type validation
against expected types
Lesson 982Multi-Layer File Upload Validation Strategy
Mimics
the site's authentic design perfectly
Lesson 640Phishing via XSS Injection
Mimikatz
read LSASS memory to extract plaintext passwords, NTLM hashes, and Kerberos tickets from logged-in users.
Lesson 2119Credential Dumping Fundamentals
Minimal harm
Avoid disrupting business operations whenever possible
Lesson 2084Legal and Ethical Considerations
Minimal images
(like Alpine Linux or distroless) contain only essential binaries—no package managers, shells, or extra tools.
Lesson 1643Base Image Selection and Provenance
Minimize copies
Avoid passing secrets through multiple functions or objects where each creates a new copy in memory.
Lesson 1341Secret Caching and Memory Management
Minimize dwell time
(how long attackers remain undetected)
Lesson 2305What is a Security Operations Center (SOC)?
Minimize inter-VLAN routing
Force traffic between VLANs through firewalls, not simple routing
Lesson 2649VLAN and Subnet Segmentation
Minimize privileged pods
Prevent containers from accessing the host's kubelet certificates or tokens
Lesson 1671Kubelet Security and Node Hardening
Minimize the perturbation size
(keep changes small)
Lesson 2812C&W Attack and Optimization-Based Methods
Minimize token duration
to reduce exposure windows
Lesson 1735Credential Theft and Token Security
Minimum 12 characters
(preferably 14-16 for sensitive systems)
Lesson 695Password Length vs Complexity Trade-offs
MINOR
(4): New features that are backward-compatible
Lesson 1261Dependency Versioning and Semantic Versioning
Mirai
, a botnet that infected hundreds of thousands of IoT devices like security cameras, DVRs, and routers using a simple strategy: scanning the internet for devices with factory-default credentials.
Lesson 2799Mirai and Its LegacyLesson 2800Default Credentials and Weak Authentication
Miscellaneous
Business cards, shipping labels, vendor invoices, and expired access badges.
Lesson 2275Dumpster Diving and Waste Exploitation
Misconfiguration at scale
One insecure template can instantly create hundreds of vulnerable resources
Lesson 2012Infrastructure as Code Fundamentals and Security Implications
Misconfiguration protection
If firewall rules are accidentally removed, the service remains unreachable
Lesson 1436Network Service Binding
Misconfigured Capabilities
Granting excessive Linux capabilities (like `CAP_SYS_ADMIN`) can enable container processes to manipulate kernel features and mount host filesystems.
Lesson 1626Container Escape Vulnerabilities
Misconfigured custom scripts
A SUID shell script or binary that calls other programs without absolute paths—you can manipulate `PATH` to inject malicious executables.
Lesson 2141SUID/SGID Binary Exploitation
Mislabel existing data
to confuse the model
Lesson 2818Data Poisoning Attack Fundamentals
Mismatched domain names
(certificate for "example.
Lesson 380TLS/SSL Traffic Analysis and Certificate Inspection
Mismatched vendor information
(SSID says "CompanyWiFi" but MAC address belongs to consumer router)
Lesson 536Detecting Rogue Access Points
Missed checks
Developers might forget to add authorization in new features
Lesson 841Centralized Authorization Logic
Missing Asset Inventory
Without a central registry tracking all deployed APIs, shadow APIs proliferate—created by different teams, deployed to various environments, and forgotten during security reviews.
Lesson 1035API9:2023 - Improper Inventory Management
Missing audit logs
prevent breach detection
Lesson 1009API Key Authentication: Design and Security
Missing authorization checks
Protecting the UI button but forgetting to protect the actual API endpoint—attackers simply call the endpoint directly.
Lesson 803Broken Access Control OverviewLesson 813IDOR Fundamentals and Common Patterns
Missing conditions
No MFA requirement, no IP restrictions on sensitive roles
Lesson 1743Cross-Account Access Auditing
Missing External ID
Third-party accounts might impersonate legitimate users without the External ID check
Lesson 1744Common Cross-Account Misconfigurations
Missing memory limits
Requests that return massive datasets exhaust RAM
Lesson 1030API4:2023 - Unrestricted Resource Consumption
Missing patches
and outdated software versions
Lesson 2434Vulnerability Scanning Fundamentals
Missing query complexity controls
Database queries run without resource boundaries
Lesson 1030API4:2023 - Unrestricted Resource Consumption
Missing Rate Limiting
permits password brute-forcing
Lesson 2106Chaining Vulnerabilities for Impact
Missing security events
like failed authentication attempts or suspicious input patterns
Lesson 1966Insufficient Logging and Monitoring
Missing security headers
(observes real HTTP responses)
Lesson 3010Dynamic Application Security Testing (DAST) Deep Dive
Missing Token Expiration
Tokens that never expire or have excessively long lifetimes give attackers unlimited time to steal and exploit them.
Lesson 1028API2:2023 - Broken Authentication
Mission Impact
– How critical is the affected system to *your organization's mission*?
Lesson 2448SSVC (Stakeholder-Specific Vulnerability Categorization)
Mistakes leave gaps
that attackers can exploit
Lesson 4Fail-Safe Defaults and Secure by Default
Mitigation assignment rate
Are identified threats actually assigned controls?
Lesson 84Measuring Threat Modeling Effectiveness
Mitigation measures
mapped to each risk
Lesson 2893PIA Documentation and Review
Mitigation Tracking
is your action plan.
Lesson 81Threat Model Documentation and Artifacts
MITM path
Your computer → Attacker → Internet → Server (increased RTT)
Lesson 413Timing and Latency Analysis
Mix-and-match attacks
Ensuring packages and metadata match
Lesson 1296PyPI Package Security
Mixed encoding
Attackers combine URL encoding with other schemes.
Lesson 1160URL Encoding Attacks and Bypasses
Mixed Encodings
Combine techniques: `&#x3C;script%3E` mixes HTML entity and URL encoding.
Lesson 649Character Encoding Bypasses
Mixed security modes
allowing downgrade attacks
Lesson 547802.1X Security Considerations and Attacks
Mixing
Hash functions blend new entropy thoroughly
Lesson 295Entropy Pool Management
Mixing approaches
Combining safe parameters with unsafe string concatenation in the same query
Lesson 1237Parameterized Queries and Prepared Statements
MLS (Multi-Level Security) policy
implements the formal security models you learned earlier (Bell-LaPadula), enforcing classification levels (TOP SECRET, SECRET, etc.
Lesson 1454SELinux Modes and Policy Types
Mobile Application Management (MAM)
focuses on managing, securing, and distributing *specific applications* rather than entire devices.
Lesson 2744Mobile Application Management (MAM)
Mobile applications
with version numbers
Lesson 2091Scoping In-Scope vs Out-of-Scope Assets
Mobile apps
with embedded webviews using cookie-based sessions
Lesson 854CSRF in Modern Applications and SPAs
Mobile Attack Surface Overview
, you discovered *what* makes mobile devices vulnerable.
Lesson 2693Mobile vs Desktop Threat Differences
Mobile Device Management (MDM)
systems, or **Unified Endpoint Management (UEM)** platforms to continuously monitor and enforce device compliance.
Lesson 2678Device Trust and Endpoint Security
Mobile-friendly
Less computation power needed for equivalent security
Lesson 227ECDSA: Elliptic Curve Digital Signature Algorithm
Modbus
uses a master-slave architecture where a controller (master) polls field devices (slaves) for readings or sends control commands.
Lesson 2787BACnet and Modbus Protocol Security
Model extraction
through repeated queries can reconstruct proprietary models.
Lesson 2854LLM Architecture and Attack Surface
Model inversion
is the process of reconstructing actual training data samples—or approximate replicas—by querying a trained model repeatedly and analyzing its outputs.
Lesson 2832Model Inversion and Attribute InferenceLesson 2836Privacy Risks in Machine Learning
Model inversion and extraction
involve stealing information about the model itself or its training data through carefully designed queries, potentially revealing sensitive information or intellectual property.
Lesson 2807Introduction to Adversarial Machine Learning
Model pruning
Remove neurons with low utility on clean data (backdoors often hide in these)
Lesson 2826Defense Strategies Against Poisoning
Model selection randomness
Randomly pick which model from an ensemble to use
Lesson 2852Ensemble and Randomization Defenses
Model signing
works like code signing for binaries.
Lesson 2874Model Artifact Security and Signing
Model tampering
Malicious actors replacing legitimate models with poisoned versions
Lesson 2876Model Repository Security
Moderate
Serious impact (~325 controls)
Lesson 2613FedRAMP Authorization Framework
Moderate-risk vendors
Limited system integration or non-sensitive data exposure (marketing tools, analytics platforms)
Lesson 2534Third-Party Risk Fundamentals
Moderate/Low
Limited impact or difficult to exploit
Lesson 1600Types of Patches and Updates
Modern C projects
Prefer `strlcpy()`/`strlcat()` if available
Lesson 1228Safe String Handling Alternatives
Modern defenses
add friction to prevent accidental approval:
Lesson 746Push Notification-Based MFA
Modern Design
BLAKE3 uses tree hashing, allowing parallel computation across multiple CPU cores, perfect for hashing large files or datasets.
Lesson 215Specialized Hash Functions: BLAKE2, BLAKE3
Modern standard
Required in new protocols (TLS 1.
Lesson 148PSS: Probabilistic Signature Scheme
Modified Base Metrics
Recalculate attack vectors or impact based on your environment (e.
Lesson 2445CVSS Temporal and Environmental Metrics
Modified kernel structures
Altered function pointers, driver lists, or callback registrations
Lesson 1559Memory Analysis and Volatile Forensics
Modified system behavior
Testing if sandboxing allows reading restricted files
Lesson 2708iOS Jailbreaking and Detection
Modified update mechanisms
that accept unsigned or malicious firmware
Lesson 2765Firmware Backdoors and Persistent Threats
Modified USB hubs
that silently compromise all connected devices
Lesson 2277USB Drop Attacks and Malicious Devices
Modify
parameters that the UI wouldn't normally allow (negative numbers, different user IDs, skipped steps)
Lesson 943Proxy-Based Business Logic TestingLesson 2874Model Artifact Security and Signing
Modify API responses
Change server data before the app processes it
Lesson 2726Dynamic Analysis and Runtime Instrumentation
Modify data
`UPDATE users SET role='admin' WHERE id=5`
Lesson 580Stacked Queries and Multiple Statements
Modify existing page elements
to trigger malicious actions
Lesson 646Persistent Backdoors via DOM Manipulation
Modify headers
like `User-Agent`, `Authorization`, or custom application headers
Lesson 2207Intercepting and Modifying HTTP Traffic
Modify parameters
Change form values, headers, cookies, or query strings
Lesson 2209Burp Repeater for Manual Testing
Modify XML structure
to bypass authentication or access controls
Lesson 616XML Injection Fundamentals
Modifying attributes
Changing `role="user"` to `role="admin"`
Lesson 617XML Injection Attack Vectors
Modifying boot-critical files
during system startup
Lesson 1547Kernel-Mode Rootkits Fundamentals
Modifying user privileges
Injecting SQL to execute admin commands like `GRANT ALL PRIVILEGES` or equivalent statements to upgrade their database user account
Lesson 584Privilege Escalation via SQL Injection
Module Logging
tracks when PowerShell modules load and execute.
Lesson 1511PowerShell and Command-Line Logging
Modules
The recipes you actually use.
Lesson 2193Metasploit Architecture and Components
MongoDB
(JavaScript-based queries, operators like `$ne`, `$gt`)
Lesson 592NoSQLMap and NoSQL Injection Automation
Monitor access
Log any debug interface activity as a tamper indicator
Lesson 2776Debug Interfaces and JTAG Security
Monitor application logs
for binding errors or warnings that reveal internal parameter handling.
Lesson 935Testing for Mass Assignment and HPP
Monitor behavior
Compare current activity against known-good baselines
Lesson 1930Instance Monitoring and Runtime Protection
Monitor compliance
Generate reports showing which endpoints have outdated third-party software.
Lesson 1606Third-Party Application PatchingLesson 2303DMARC Reporting and Analysis
Monitor continuously
for newly disclosed vulnerabilities in your existing dependencies
Lesson 3011Software Composition Analysis (SCA) Automation
Monitor creation events
Windows Event ID 4698 (task created) and audit logs showing crontab modifications reveal suspicious scheduling activity.
Lesson 1538Scheduled Tasks and Cron Jobs
Monitor for issues
after disabling
Lesson 1432Disabling Unnecessary Services
Monitor for misuse
of the revoked key
Lesson 318Key Revocation and Compromise Response
Monitor Object.prototype
in staging environments for unexpected properties
Lesson 1197Detecting Prototype Pollution Vulnerabilities
Monitor resource utilization
Track CPU usage specifically during encryption operations—if CPU becomes saturated, consider scaling compute resources or reducing encryption scope.
Lesson 1799Performance Impact of Database Encryption
Monitor responses
for successful unauthorized access
Lesson 1021Testing for BOLA Vulnerabilities
Monitor runtime
Capture network traffic, system calls, file access
Lesson 2767Firmware Emulation and Dynamic Analysis
Monitor security advisories
for your language ecosystem
Lesson 1967Using Components with Known Vulnerabilities
Monitor timing metrics
for anomalous patterns indicating reconnaissance
Lesson 1949Serverless Cold Start and Timing Side Channels
Monitor usage
of old versions to identify stragglers
Lesson 1038API Versioning and Deprecation
Monitor vendor feeds
Subscribe to security bulletins from each major vendor.
Lesson 2460Third-Party and Application Patching
Monitor your own footprint
Use packet captures and EDR logs to understand what defenders see.
Lesson 2224Framework OPSEC and Detection
Monitored
Alert when one control fails so you can respond before others fail too
Lesson 2656Redundant Controls and Failure Tolerance
Monitoring
involves watching API traffic in real-time for suspicious patterns: unusual response times, authentication failures, authorization bypasses, rate limit violations, or unexpected error rates.
Lesson 1044API Security Testing and MonitoringLesson 1346Zero-Downtime Rotation PatternsLesson 1348API Key and Certificate RotationLesson 1386Mutation-Based FuzzingLesson 1842Cross-Region and Cross-Account Connectivity
Monitoring and alerting
Log suspicious patterns for security team review
Lesson 700Rate Limiting and Account Lockout Policies
Monitoring and enforcement
Notice that the organization may monitor usage and consequences for violations
Lesson 2489Acceptable Use Policy (AUP)
Monitoring and measurement evidence
Lesson 2607ISMS Documentation Requirements
Monitoring plan
How you'll watch for changes in threat landscape
Lesson 2521Risk Acceptance and Documentation
Monitoring setup
Configure logging and alerting for key usage *before* production deployment so you can immediately detect anomalies
Lesson 314Key Activation and Installation
Monitoring System Integrity
Apply FIM monitoring to the FIM tools themselves—watch the AIDE binary, configuration files, and database locations.
Lesson 1507Protecting FIM Infrastructure
Monitoring tools
Track performance metrics and errors during testing
Lesson 2455Patch Testing and Staging Environments
Monitors system performance
against those commitments continuously
Lesson 2593Availability Criterion
Month-end/quarter-end
close periods for financial systems
Lesson 2095Testing Windows and Schedules
Moobot, VPNFilter, Torii
, and dozens more
Lesson 2799Mirai and Its Legacy
Most frequent mistake
Allowing only specific outbound ports (80, 443) and forgetting the ephemeral range for client responses.
Lesson 1824Ephemeral Ports and Stateless Filtering Challenges
Mostly conform
to the format (to get past initial validation)
Lesson 1387Generation-Based Fuzzing
Mount points
that redirect to unexpected locations
Lesson 1165Filesystem Abstraction Layer Bypasses
Mount root filesystems read-only
while allowing specific **tmpfs mounts** for temporary data
Lesson 1661Container Runtime Security Best Practices
Mount the share
to your attacker machine
Lesson 2147NFS and Network File System Exploits
Mouse movements
Precise pixel coordinates and movement timing
Lesson 294Entropy Sources and Collection
Moved
within or outside the facility (chain of custody)
Lesson 2585HIPAA Security Rule: Physical Safeguards
MQ (Multivariate Quadratic) Problem
given `m` quadratic equations in `n` variables over a finite field, find values that satisfy all equations.
Lesson 275Multivariate Cryptography
MTTD/MTTR
→ Reduced breach dwell time and damage limitation
Lesson 2359Reporting SOC Performance to Leadership
Multi-architecture support
Targeting ARM, MIPS, x86 embedded systems
Lesson 2754IoT Botnets: Mirai and Beyond
Multi-Cloud Evidence Collection
AWS snapshots, Azure managed disks, and GCP persistent disk images use different formats and APIs.
Lesson 1921Cross-Account and Multi-Cloud Forensics
Multi-cloud networking
VPNs can even connect resources across different cloud providers securely.
Lesson 472VPN Use Case: Secure Cloud Connectivity
Multi-device logout
For high-security applications, consider offering "logout from all devices" — this requires tracking all active sessions per user and invalidating them simultaneously.
Lesson 709Session Termination and Logout
Multi-dimensional
Combine multiple metrics (time + volume + location) for stronger signal
Lesson 2348Baseline Establishment and Anomaly Detection
Multi-environment architectures
Dev/test/prod separation for blast radius containment
Lesson 1737Cross-Account Access Fundamentals
Multi-factor authentication (MFA)
requires at least two different types of factors.
Lesson 738Multi-Factor Authentication Fundamentals
Multi-Layered Detection
NGAV doesn't rely on just one method.
Lesson 1572Next-Generation Antivirus (NGAV)
Multi-level security
is needed (Top Secret, Secret, Unclassified data on same system)
Lesson 1450MAC vs DAC: Fundamental Differences
Multi-Party Authorization
Banks and payment processors require multiple approvals for critical operations.
Lesson 326Secret Sharing in Practice
Multi-region logging
ensures that CloudTrail trails and other log sources in every region feed into your central repository.
Lesson 1877Cross-Account and Multi-Region Logging
Multi-stage exploitation
Chain reconnaissance, exploitation, and post-exploitation automatically
Lesson 2201Automation with Resource Scripts
Multi-stage payloads
Automatically serving different content based on victim's device or location
Lesson 2261Phishing Infrastructure and Automation
Multi-step IDOR exploitation
means an attacker chains these requests together, manipulating object IDs at each stage to access or modify resources they shouldn't touch.
Lesson 818Multi-Step IDOR Exploitation
Multi-Step Workflows
define the sequence: "If SAST finds a high-severity SQL injection → create Jira ticket → assign to security team → on fix commit → trigger test suite → if tests pass → request approval → if approved → deploy to production.
Lesson 3045Remediation Workflows and Orchestration
Multi-tenancy
Each customer gets a dedicated VPC
Lesson 1812VPC Segmentation Strategies
Multi-tenancy noise
Distinguishing between your activity, cloud provider maintenance, and potential attacks requires understanding normal cloud operations.
Lesson 1886Cloud Threat Detection Overview
Multi-tenancy risks
In shared cloud infrastructure, encryption ensures your data can't be accessed by other tenants or even cloud administrators if key management is properly separated.
Lesson 1763Understanding Encryption at Rest Fundamentals
Multipart uploads
split files into chunks (typically 5MB-100MB each), upload them independently, and reassemble them server-side.
Lesson 1789Secure File Sharing and Transfer Patterns
Multiple authentication barriers
Network access control, application login, database credentials, API keys—each operating independently.
Lesson 2671Defense in Depth Through Design
Multiple channels
Provide diverse reporting options—email alias, dedicated hotline, web form, chat bot, or direct manager escalation.
Lesson 2291Reporting Mechanisms and Culture
Multiple concurrent sessions
Opening several browser tabs and advancing through workflow steps in parallel
Lesson 917Concurrent Workflow Exploitation
Multiple Copies, Multiple Locations
Store encrypted backups in geographically separate locations to protect against physical disasters.
Lesson 311Key Backup and Recovery Procedures
Multiple downstream targets
A single function might query databases, invoke APIs, and execute commands
Lesson 1960Injection Vulnerabilities in Serverless
Multiple matches
How does it handle ten positive detections?
Lesson 2332Playbook Testing and Validation
Multiple rounds
(repeating these operations many times)
Lesson 85Block Cipher Fundamentals and Structure
Multiple secure locations
Store encrypted key backups in geographically separated locations.
Lesson 317Key Backup and Recovery
Multiple storage types
files, databases, environment variables, memory, logs
Lesson 1315Secret Sprawl and Discovery Challenges
Multiplexing
Multiple requests and responses can be in-flight simultaneously over one connection.
Lesson 1097HTTP/2 Protocol Architecture and Security Model
Multiplexing Awareness
Unlike HTTP/1.
Lesson 1104Migrating Safely to HTTP/2 and HTTP/3
Multiplication
When you multiply two encrypted numbers, the result is an encryption of the product.
Lesson 251Homomorphic Operations and Noise Management
Multisignatures
and **threshold signatures** bring this concept to cryptography.
Lesson 237Multisignatures and Threshold Signatures
Multivariate polynomial cryptography
Based on solving systems of multivariate quadratic equations.
Lesson 268Post-Quantum Cryptography Fundamentals
Mutating Webhooks
go further: they can *modify* requests on-the-fly.
Lesson 1670Admission Controllers and Webhooks
MutatingWebhooks
actually modify requests on-the-fly.
Lesson 1973Kubernetes Admission Controllers
Mutation fuzzing
takes a known working XSS payload and automatically generates thousands of variations by:
Lesson 656Polyglot Payloads and Mutation Fuzzing
Mutation strategies
Apply modifications (bit flips, byte insertion, boundary testing)
Lesson 1386Mutation-Based Fuzzing
Mutex names
that malware uses to prevent re-infection
Lesson 1580EDR Detection Rules and Custom Indicators
Mutual Interest
Establishing common ground ("I also work in finance") creates trust and encourages information sharing as a "peer exchange.
Lesson 2267Elicitation Techniques and Information Gathering
Mutual trust
Protects against rogue access points (evil twins) since clients verify server identity
Lesson 542EAP-TLS and Certificate-Based Authentication
MySQL
`VERSION()`, `DATABASE()`, `CONCAT()`
Lesson 572Database Fingerprinting via SQL Injection

N

NACL rule
Deny all inbound SSH (port 22) from `0.
Lesson 1825Combining Security Groups and NACLs for Defense-in-Depth
NACLs
for: explicit denies, subnet-wide policies, and defense against broad attacks.
Lesson 1825Combining Security Groups and NACLs for Defense-in-Depth
Name Constraints
are like property boundaries for intermediate CA certificates.
Lesson 185Name Constraints and Certificate Extensions
Named groups
beyond the primary group
Lesson 1425Access Control Lists (ACLs)
Named users
beyond the file owner
Lesson 1425Access Control Lists (ACLs)
Nameservers
Which DNS servers control the domain (revealing hosting providers or custom infrastructure)
Lesson 329WHOIS and Domain Registration Intelligence
Namespace Breakouts
Exploiting weaknesses in namespace isolation or using system calls that weren't properly restricted can allow processes to escape their namespace boundaries.
Lesson 1626Container Escape Vulnerabilities
NAT Gateway
comes in—it acts as an intermediary that translates private IP addresses to a public IP for outbound connections only.
Lesson 1831NAT Gateway ArchitectureLesson 1954VPC Configuration and Network Isolation
NAT gateways
(fully managed services).
Lesson 1832NAT Instance vs NAT Gateway
NAT instances
(self-managed EC2 instances) or **NAT gateways** (fully managed services).
Lesson 1832NAT Instance vs NAT Gateway
NAT Traversal (NAT-T)
wraps ESP packets inside UDP datagrams, typically using **UDP port 4500**.
Lesson 482NAT Traversal (NAT-T) in IPsec
Nation-State Actors
represent the top tier: government-backed teams with virtually unlimited resources, custom zero- day exploits, and patience to conduct multi-year campaigns.
Lesson 47Understanding Adversary Types and Skill LevelsLesson 51Motivations: Disruption and Destructive Attacks
Nation-state actors (APTs)
Government-sponsored groups with substantial resources and long-term objectives (espionage, sabotage)
Lesson 2337Threat Actors and Attribution
Nation-state attacks
targeting critical infrastructure
Lesson 2753Consumer IoT vs Industrial IoT Threats
Native cloud services
GuardDuty supports custom threat lists; Azure Sentinel has threat intelligence connectors
Lesson 1894Threat Intelligence Integration
Native Isolation Mechanisms
Cloud APIs let you instantly quarantine compromised resources—modify security group rules, revoke IAM credentials, snapshot instances for forensics, or shut down exposed services—all through code.
Lesson 1905Cloud-Native IR Tools and APIs
Native SQL functions
Passing unsanitized input to database functions through ORM methods
Lesson 1238ORM Security Fundamentals
Negative Amount Tricks
Similar to payment tampering, but exploiting currency symbols or conversion logic to create negative totals or credits.
Lesson 924Currency and Conversion Exploits
Negligent insiders
don't mean harm but cause it through carelessness—falling for phishing emails, sharing passwords, or misconfiguring security settings.
Lesson 52Insider Threats and Privileged Access Abuse
Neighbor Advertisement (NA)
"I do, and here's my MAC address" (like ARP reply)
Lesson 391IPv6 Neighbor Discovery and Spoofing Parallels
Neighbor Discovery Protocol (NDP)
, which uses ICMPv6 messages instead of broadcast requests.
Lesson 391IPv6 Neighbor Discovery and Spoofing Parallels
Neighbor Solicitation (NS)
"Who has this IPv6 address?
Lesson 391IPv6 Neighbor Discovery and Spoofing Parallels
Nested quantifiers
occur when you apply a quantifier inside another quantified group:
Lesson 1176Evil Regex Patterns: Nested Quantifiers and Alternation
Netcat
(`nc`) is a lightweight utility that reads and writes data across network connections.
Lesson 2236Netcat and Socat for Network Pivoting
NetFlow
(Cisco-originated, now widely supported) exports summaries of unidirectional flows: source/destination IPs, ports, protocol, byte counts, timestamps, and TCP flags.
Lesson 2410Network Flow Analysis
Network
Are they on a corporate network or public Wi-Fi?
Lesson 1747Conditional Access and Context-Aware MFA
Network access
Processes should only bind to necessary ports and communicate with required endpoints
Lesson 1405Principle of Least Privilege in OS HardeningLesson 2753Consumer IoT vs Industrial IoT Threats
Network access policies
PaaS services can restrict access to specific VPCs/VNets
Lesson 1846VPC/VNet Service Endpoints Fundamentals
Network ACL
is a stateless firewall that operates at the **subnet level** in your VPC.
Lesson 1822Network ACL Structure and Subnet Association
Network activity
– identifying unexpected outbound connections
Lesson 1659Runtime Monitoring and Anomaly Detection
Network and application testing
Verify segmentation and validate controls after changes
Lesson 2579Requirements 11-12: Testing and Policy
Network anomalies
Connections to known mining pool domains (`:3333`, `:4444` ports common) detected via VPC Flow Logs
Lesson 1893Cryptomining and Resource Abuse Detection
Network Architecture
You discover whether the network uses a single standalone AP, multiple APs in a mesh configuration, or enterprise infrastructure with centralized controllers managing many APs across different floors or buildings.
Lesson 355Wireless Network Topology Mapping
Network Cables
Exposed cabling can be tapped using hardware devices that passively copy data without disrupting the connection—the digital equivalent of wiretapping a phone line.
Lesson 2278Physical Attacks on Network Infrastructure
Network configuration
Security groups, firewall rules, network ACLs
Lesson 1677IaaS Security Responsibilities
Network congestion
from scanning traffic can cause denial-of-service
Lesson 1520Worms: Autonomous Network Propagation
Network design
Place WireGuard endpoints in segmented network zones.
Lesson 498WireGuard Deployment Best Practices and Monitoring
Network devices
(firewalls, routers, switches, IDS/IPS) provide traffic patterns, blocked connections, and anomalous network behavior.
Lesson 2316Log Sources and Event Collection Methods
Network diagramming
output formats (XML, Graphviz)
Lesson 356Automated Network Mapping Tools
Network exposure
Gateway opens HTTP access—always use HTTPS and restrict access by firewall or authentication.
Lesson 1481Journal Gateway and Remote Access
Network filtering
Deploy firewall rules AND host-based firewalls (not just perimeter protection)
Lesson 2656Redundant Controls and Failure Tolerance
Network firewall rules
Block all inbound/outbound traffic except specific IP addresses, ports, and protocols explicitly defined as necessary.
Lesson 1406Default Deny and Allowlisting
Network firewalls
All traffic entering/leaving the network crosses this boundary
Lesson 29Security Choke Points
Network foundation
(VPC, load balancers, underlying network)
Lesson 1682Container as a Service Security
Network IDS/IPS
(Snort, Suricata): Traffic analysis and blocking
Lesson 2170Blue Team Responsibilities and Tools
Network indicators
include default user agents (like Metasploit's `Mozilla/4.
Lesson 2224Framework OPSEC and Detection
Network infrastructure
Routers, switches, load balancers
Lesson 2385Log Collection and Preservation
Network interface
Track individual resource traffic
Lesson 1872VPC Flow Logs and Network Monitoring
Network listeners
Syslog servers receiving UDP/TCP streams
Lesson 2315SIEM Architecture: Collectors, Aggregators, and Storage
Network packet arrival times
Internet traffic creates unpredictable patterns
Lesson 294Entropy Sources and Collection
Network packet capture
Deep inspection at the packet level
Lesson 2316Log Sources and Event Collection Methods
Network packet captures
(capture host time)
Lesson 2417Timeline Construction Fundamentals
Network Relays
Chain connections through multiple hops when direct access isn't possible.
Lesson 2236Netcat and Socat for Network Pivoting
Network security
Firewalls at the perimeter, network segmentation inside, and host-based firewalls on individual machines
Lesson 23Defense-in-Depth Philosophy
Network security config
Does the app allow cleartext HTTP traffic or trust custom CAs?
Lesson 2714APK Structure and Manifest Analysis
Network Security Configuration
(`res/xml/network_security_config.
Lesson 2719Android Certificate Pinning and Network Security
Network setup
Create virtual interfaces to interact with emulated services
Lesson 2767Firmware Emulation and Dynamic Analysis
Network sniffing
Intercepting unencrypted HTTP traffic to steal session cookies
Lesson 713Session Hijacking Fundamentals
Network Switches
Accessible switches in unlocked wiring closets allow attackers to span ports (mirror traffic), reconfigure VLANs, or connect rogue devices.
Lesson 2278Physical Attacks on Network Infrastructure
Network TAPs
(Test Access Points) and **SPAN ports** (Switched Port Analyzer, also called port mirroring).
Lesson 463Network TAPs vs SPAN Ports
Network topology
IP ranges, domain structures, relationships between systems
Lesson 2099Reconnaissance for Vulnerability Discovery
Network Traffic Monitoring
Observing data in transit between services can reveal shadow data stores or unauthorized data movement.
Lesson 1802Data Discovery and Inventory
Network traffic volumes
(VPC Flow Logs patterns)
Lesson 1897Baseline Establishment for Cloud Resources
Network utilities
`nc` (netcat), `telnet`, `tcpdump` (if not needed for operations)
Lesson 1408Removing Unnecessary Software Packages
Network-based scanners
remotely probe systems across the network without installing anything
Lesson 1608Vulnerability Scanning Fundamentals
Network-Based Vulnerability Scanners
that probe systems from the outside, agent-based scanners install lightweight software agents directly on each endpoint (workstations, servers, containers).
Lesson 2437Agent-Based Scanning
Network-exposed services
(SSH, HTTP, database listeners) are prime targets
Lesson 1431Service Attack Surface Analysis
Network-isolated segments
for testing potentially disruptive changes
Lesson 3051Testing and Validating Remediation Actions
Network-level
Place Restricted data on isolated VLANs unreachable from Internal zones
Lesson 2652Data Segmentation and Classification
Networks
The infrastructure connecting systems—routers, switches, firewalls, VPNs, and network segmentation.
Lesson 2088Common Testing Targets and Scope
Never assume
read the provider's documentation and verify each control's ownership
Lesson 1692Common Misunderstandings and Breach Scenarios
Never blindly extract archives
Validate and sanitize all paths before extraction
Lesson 969Symbolic Link Attacks
Never cache sensitive data
like authentication tokens, personal information, or payment details.
Lesson 1076Cache API and Service Worker Storage
Never cache to disk
unless encrypted and absolutely necessary
Lesson 1334Secret Store Access Patterns
Never deserialize untrusted data
Use JSON or other data-only formats.
Lesson 1187PHP Object Injection and Unserialize Attacks
Never echo raw input
in error responses
Lesson 1958Dead Letter Queues and Error Handling
Never edit sudoers directly
always use `visudo`, which validates syntax before saving.
Lesson 1426Sudo Configuration and Security
Never exceed the scope
defined in a bug bounty program or disclosure policy.
Lesson 2078Legal and Ethical Considerations
Never expose stack traces
in production
Lesson 1210Fail Securely and Handle Errors Safely
Never hardcode secrets
use parameter stores, secret managers, or environment variables referenced in IaC
Lesson 2013Secrets in IaC: Detection and Prevention
Never in production
IAST's overhead makes it unsuitable for live systems serving real users
Lesson 1382IAST Deployment Models and Performance Impact
Never log sensitive data
like passwords or tokens—just identifiers.
Lesson 844Authorization Logging and Monitoring
Never punish mistakes
If someone clicks a phishing link but reports it immediately, thank them.
Lesson 2291Reporting Mechanisms and Culture
Never reuse
a nonce with the same key
Lesson 119Nonce Management in Stream Ciphers
Never reuse External IDs
across different third-parties
Lesson 1739External ID for Third-Party Access
Never reuse keys
across different purposes or contexts
Lesson 303Symmetric Key Generation
Never reveal
whether hashing failed due to invalid input versus system errors.
Lesson 693Password Storage Best Practices and Implementation
Never screenshot or email
them to themselves
Lesson 747Recovery and Backup Codes
Never skip server-side validation
just because client-side exists.
Lesson 1152Validation Layers and Defense in Depth
Never store secrets directly
Avoid putting API keys, database passwords, or tokens in environment variables at all.
Lesson 1953Environment Variable Security
Never torrent over Tor
many clients bypass Tor and leak your IP
Lesson 2991Operational Security for Tor Users
Never trust again
Don't manipulate the path after validation
Lesson 971Path Canonicalization and Validation
NEW
First packet of a new connection (like a TCP SYN starting a handshake)
Lesson 440Stateful Firewall with Connection Tracking
New system compromise
→ expanding the footprint
Lesson 2421Pivot Points and Indicators of Compromise
New systems or technologies
that collect, process, or store personal data
Lesson 2888PIA Triggers and Scoping
New technologies
with unclear privacy implications (AI-driven decisions)
Lesson 2558Data Protection Impact Assessments
New vs recurring issues
Did a vulnerability reappear after being fixed?
Lesson 1402Security Test Results Management
New vs. existing
Fail only on newly introduced issues, not technical debt
Lesson 3033Pipeline Security Gates and Policies
News and reputation monitoring
Watching for leadership changes, financial distress, regulatory actions, or public security failures
Lesson 2539Continuous Vendor Monitoring
Next-Generation Firewalls (NGFWs)
bundle all these technologies together with additional threat intelligence, creating a comprehensive security platform rather than just a traffic gatekeeper.
Lesson 420Next-Generation Firewalls (NGFW)
NFC (Composed)
One codepoint `U+00E9`
Lesson 1161Unicode Normalization Vulnerabilities
NFD (Decomposed)
Two codepoints `U+0065` (e) + `U+0301` (combining acute accent)
Lesson 1161Unicode Normalization Vulnerabilities
nftables
is the modern successor that unifies all these separate tools into a single framework with consistent syntax.
Lesson 443nftables Architecture and ImprovementsLesson 1586iptables and nftables on Linux
NIST 800-53
(which you've studied) appropriate to their categorization level—establishing the direct link between FISMA and NIST frameworks.
Lesson 2615FISMA and Federal ComplianceLesson 2617Framework Mapping and Harmonization
NIST Cybersecurity Framework
, which emphasizes iterative improvement.
Lesson 31Security as Continuous Improvement, Not a Final State
NIST Cybersecurity Framework (CSF)
Function-based (Identify, Protect, Detect, Respond, Recover)
Lesson 2545Audit Frameworks and Standards
NIST P-256
offers the best balance of compatibility with existing PKI infrastructure and hardware support.
Lesson 2794Elliptic Curve Cryptography for IoT
NIST P-256 (secp256r1)
Widely supported, good hardware acceleration, standard compliance
Lesson 2794Elliptic Curve Cryptography for IoT
NIST SP 800-115
(Technical Guide to Information Security Testing and Assessment) provides a government- standard approach emphasizing planning, execution phases, and integration with risk management frameworks.
Lesson 2082Penetration Testing Methodologies
NIST SP 800-22
is a suite of 15 statistical tests developed by the National Institute of Standards and Technology.
Lesson 293Testing Randomness Quality
NIST Special Publication 800-30
provides a federal government-aligned, comprehensive methodology focused on IT systems.
Lesson 2507Risk Assessment Methodologies and Frameworks
NIST Special Publication 800-63B
(covered in lesson 693's best practices) now **recommends against periodic expiration** unless there's evidence of compromise.
Lesson 702Password Expiration and Rotation Policies
NIST's IoT Cybersecurity Framework
provides guidance for federal agencies and manufacturers on device capabilities related to asset identification, vulnerability management, and incident detection.
Lesson 2758IoT Regulatory Landscape and Security Standards
Nmap
can fragment packets using options like `-f` (fragment packets) or `--mtu` (set maximum transmission unit size), splitting scan packets into tiny pieces that evade detection.
Lesson 369Fragmentation and Packet Manipulation
Nmap Scripting Engine (NSE)
is a powerful extension that transforms Nmap from a simple port scanner into an automated security assessment tool.
Lesson 348NSE (Nmap Scripting Engine)
No access control
Any process with access to the environment can read all variables
Lesson 1325Secret Stores vs Environment Variables
No asset criticality
A medium-severity bug in your authentication server matters more than a critical bug in a test sandbox
Lesson 2446CVSS Score Interpretation and Limitations
No Authorization
Finding a valid GUID grants access if the backend doesn't verify ownership
Lesson 815GUID and UUID Vulnerabilities
No automatic expiration
Unlike HTTP cache headers, Cache API entries persist until explicitly deleted
Lesson 1076Cache API and Service Worker Storage
No Automatic Protections
WebSockets bypass many browser security mechanisms.
Lesson 1068WebSocket Protocol and Security Model
No automatic reverse NAT
Unlike iptables, nftables requires explicit rules for both directions of NAT connections.
Lesson 445Migrating from iptables to nftables
No backup
Users risk catastrophic data loss
Lesson 2965Usability Challenges and Key Management UX
No binding commitments
You're not obligated to fix every report or pay rewards
Lesson 2478Legal and Safe Harbor Considerations
No CIDR overlap conflicts
Unlike VPC peering, IP ranges can overlap
Lesson 1851Cross-Region and Cross-Account Private Connectivity
No Client Authentication
Since tokens go directly to the browser, there's no secure server-side exchange where the client can prove its identity.
Lesson 765Implicit Flow Deprecation and Risks
No clock synchronization
issues between client and server
Lesson 741HOTP and Counter-Based OTP
No Cloud Sync
Biometric data never syncs to iCloud or backs up, preventing remote compromise.
Lesson 2707Touch ID, Face ID, and Biometric Security
No code execution hooks
Unlike Java/Python serialization, these formats don't trigger constructors or magic methods during parsing
Lesson 1191Alternative Serialization Formats
No compensating controls
Firewalls, network segmentation, and WAFs may mitigate risks CVSS doesn't account for
Lesson 2446CVSS Score Interpretation and Limitations
No concurrent request caps
One user opens thousands of connections simultaneously
Lesson 1030API4:2023 - Unrestricted Resource Consumption
No confidentiality
Anyone can read the packet contents (no encryption)
Lesson 477Authentication Header (AH) Protocol
No connection handshake overhead
TCP's three-way handshake wastes precious energy and bandwidth on constrained devices
Lesson 2783CoAP (Constrained Application Protocol)
No credential exposure
Your access keys never leave your infrastructure
Lesson 1784Presigned URLs and Temporary Access Mechanisms
No credential stuffing
No passwords means no breached credentials to reuse
Lesson 755Passwordless Security Trade-offs
No credential theft
Attackers can't intercept passwords because none are sent
Lesson 542EAP-TLS and Certificate-Based Authentication
No CSRF protection
JSONP requests automatically include cookies, making CSRF trivial
Lesson 1061Bypassing SOP with JSONP
No direct DOM access
Must call JavaScript functions to interact with web APIs
Lesson 1086WebAssembly Security Boundaries
No direct model access
No access to weights, architecture, or training data
Lesson 2827Model Extraction Attack Fundamentals
No dynamic origin reflection
– don't blindly echo back the `Origin` header
Lesson 864CORS Security Best Practices
No encryption
→ Information Disclosure
Lesson 63STRIDE per Interaction Analysis
No encryption controls
Values sit in memory as plaintext
Lesson 1325Secret Stores vs Environment Variables
No execution timeouts
Long-running operations consume server resources indefinitely
Lesson 1030API4:2023 - Unrestricted Resource Consumption
No fine-grained permissions
It's all-or-nothing access
Lesson 1325Secret Stores vs Environment Variables
No forced composition rules
Don't mandate uppercase/numbers/symbols
Lesson 694Password Complexity Requirements and Their Effectiveness
No forward secrecy
by default (older sessions exposed if PSK leaks).
Lesson 2791Pre-Shared Key Authentication for IoT
No gadget chains
Attackers can't inject arbitrary classes to exploit
Lesson 1191Alternative Serialization Formats
No hop limit enforcement
means requests can be forwarded through proxies or misconfigurations
Lesson 1934IMDSv1 vs IMDSv2 Security Improvements
No implicit trust
Being "inside" the cloud environment grants zero automatic privileges
Lesson 1694Identity-Based Access Control in Cloud
No information leakage
Error messages shouldn't expose system details, file paths, or SQL queries
Lesson 1210Fail Securely and Handle Errors Safely
No integrity checks
→ Tampering
Lesson 63STRIDE per Interaction Analysis
No internet gateway required
Private subnets can access services directly
Lesson 1845Service Endpoints vs Public Internet Access
No key transmission
Only the HMAC output travels over the network
Lesson 221HMAC in Authentication Protocols
No known special structures
Avoiding curves vulnerable to exotic attacks
Lesson 169Choosing Secure Elliptic Curves
No known weaknesses
Unlike PKCS#1 v1.
Lesson 148PSS: Probabilistic Signature Scheme
No length padding vulnerabilities
The sponge construction naturally avoids certain extension attacks
Lesson 210SHA-3 and the Keccak Algorithm
No long-lived keys
to steal or accidentally commit to Git
Lesson 1725GCP Service Account Impersonation
No long-term credentials
stored or managed in the cloud
Lesson 1733Federation and Temporary Credentials
No MFA requirement
Allowing role assumption without multi-factor authentication
Lesson 1744Common Cross-Account Misconfigurations
No Multi-Factor Authentication
APIs relying solely on passwords are vulnerable when those credentials are compromised through phishing or breaches.
Lesson 1028API2:2023 - Broken Authentication
No NAT required
Direct communication using private addressing
Lesson 1846VPC/VNet Service Endpoints Fundamentals
No null origin acceptance
– attackers easily forge this
Lesson 864CORS Security Best Practices
No padding required
Since you're XORing, you can encrypt any length message—just use only the keystream bytes you need.
Lesson 98CTR Mode: Turning Block Ciphers into Streams
No password guessing
(they use cryptographic key pairs from FIDO2)
Lesson 754Passkeys and Cross-Device Authentication
No password needed
Bypasses authentication entirely
Lesson 638Cookie Theft and Session Hijacking via XSS
No password transmission
Your secret never travels over the network
Lesson 247ZKP Applications in Authentication
No performance impact
on the monitored network
Lesson 463Network TAPs vs SPAN Ports
No periodic password changes
Only change when compromise is suspected
Lesson 694Password Complexity Requirements and Their Effectiveness
No persistent infrastructure
to harden or patch
Lesson 1959OWASP Serverless Top 10 Overview
No persistent storage
Secrets must be fetched from external sources every invocation
Lesson 1940Serverless Architecture and Security Implications
No phishing
(passkeys are domain-bound)
Lesson 754Passkeys and Cross-Device Authentication
No point validation
Accepting any (x,y) coordinate without checking it's actually on your curve
Lesson 168ECC Implementation Vulnerabilities
No polymorphism surprises
You deserialize exactly the message type you expect
Lesson 1191Alternative Serialization Formats
No Protection
(`NSFileProtectionNone`): Always accessible.
Lesson 2704Data Protection API and Keychain
No public internet exposure
– Your data never traverses the public web, reducing attack surface
Lesson 1841Direct Connect and Dedicated Connectivity
No rate limiting
→ Denial of Service
Lesson 63STRIDE per Interaction Analysis
No Read Down
– You cannot read data below your integrity level
Lesson 16Biba Model: Integrity Protection
No Refresh Tokens
The implicit flow never issues refresh tokens for security reasons.
Lesson 765Implicit Flow Deprecation and Risks
No regex weaknesses
– `evil.
Lesson 864CORS Security Best Practices
No request origin validation
anyone who can make an HTTP request wins
Lesson 1934IMDSv1 vs IMDSv2 Security Improvements
No rotation support
Updating a secret requires restarting applications
Lesson 1325Secret Stores vs Environment Variables
No scope restrictions
keys with excessive permissions
Lesson 1009API Key Authentication: Design and Security
No shared secrets
No codes to intercept or steal
Lesson 744Hardware Security Keys and FIDO U2F
No shell interpretation
Bypass `sh`, `cmd.
Lesson 1230Safe Command Execution Patterns
No special cases
The curve arithmetic avoids edge cases that cause timing leaks
Lesson 167Curve25519 and EdDSA
No static keys
stored in code or configuration
Lesson 1734Instance Profiles and Container Credentials
No system calls
Cannot directly invoke operating system functions
Lesson 1086WebAssembly Security Boundaries
No threat intelligence
Doesn't indicate active exploitation in the wild
Lesson 2446CVSS Score Interpretation and Limitations
No tokens in JavaScript
XSS attacks can't steal what isn't there
Lesson 1092Backend for Frontend (BFF) Pattern
No transport-layer ports
ESP is IP protocol 50—it has no TCP/UDP port numbers for NAT to use for mapping multiple internal hosts.
Lesson 482NAT Traversal (NAT-T) in IPsec
No unified protocol
unlike Signal Protocol or MLS, email standards vary widely
Lesson 2958Email Encryption Fundamentals and S/MIME
No user interaction required
to spread (unlike viruses)
Lesson 1520Worms: Autonomous Network Propagation
No validation
– Encrypts but doesn't verify identity (vulnerable to MITM)
Lesson 1796Database Connection Encryption
No versioning
Previous secret values are lost
Lesson 1325Secret Stores vs Environment Variables
No weak passwords
Users can't choose "password123"
Lesson 755Passwordless Security Trade-offs
No Write Up
– You cannot write data to a higher integrity level than yours
Lesson 16Biba Model: Integrity Protection
No-eXecute (NX)
bits that mark stack and heap memory as non-executable.
Lesson 2109Return-Oriented Programming (ROP)
Node Authorization
mode (`--authorization-mode=Webhook`) to validate requests against the API server's RBAC policies.
Lesson 1671Kubelet Security and Node Hardening
Node infrastructure
(host OS patching, kernel hardening)
Lesson 1682Container as a Service Security
Nodes
run your actual workloads via the kubelet agent and container runtime.
Lesson 1968Kubernetes Security Architecture Overview
Noise protocol framework
for its handshake—a modern, formally verified cryptographic protocol that establishes secure channels.
Lesson 493WireGuard Protocol Design and Cryptographic Simplicity
Noisy Neighbor Attacks
A malicious container can consume excessive CPU, memory, or disk I/O to starve other tenants' workloads—essentially a denial-of-service within the host.
Lesson 1631Multi-Tenancy Security Challenges
Non-802.11 devices
Cordless phones, security cameras, wireless controllers
Lesson 551RF Spectrum Monitoring
Non-backtracking regex engines
(like RE2) intentionally avoid features that cause backtracking.
Lesson 1181Alternative Parsing Strategies
Non-compliance
Violating privacy laws or regulations (e.
Lesson 70LINDDUN for Privacy Threat Modeling
Non-credentialed scans
operate like an external attacker would—the scanner probes the system from the outside without logging in.
Lesson 1609Credentialed vs Non-Credentialed Scans
Non-destructive actions
Log what *would* happen without actually executing blocks/deletes
Lesson 2332Playbook Testing and Validation
Non-executable memory (NX bit)
Stack and heap regions cannot execute code
Lesson 2709iOS Binary Protections and Runtime Security
Non-functional requirements
describe *how well* the system performs these tasks: speed, reliability, maintainability, and **security**.
Lesson 12Security as a Non-Functional Requirement
Non-idempotent actions
Incrementing counters, one-time token usage
Lesson 1103HTTP/3 0-RTT Replay Attacks
Non-repeating
Extremely low probability of generating the same value twice
Lesson 134Generating Secure Random IVs and Nonces
Non-secret
Salts can be stored alongside the derived key—they're not passwords themselves
Lesson 140Salts in Key Derivation
Non-volatile evidence
survives reboots because it's stored on persistent media like hard drives, SSDs, or backups.
Lesson 2380Volatile vs Non-Volatile Evidence
Non-Wi-Fi threats
don't speak the 802.
Lesson 551RF Spectrum Monitoring
Nonce Reuse (ECDSA)
Reusing the random value when signing with ECDSA instantly leaks your private key.
Lesson 234Signature Performance and Implementation Considerations
Nonce Validation
If you included a `nonce` parameter in the authentication request, verify it matches the token's `nonce` claim.
Lesson 774ID Token Validation and Security
NoNewPrivileges=yes
prevents the service and its child processes from gaining additional privileges through mechanisms like SUID binaries or file capabilities.
Lesson 1433Service Isolation with systemd
Nonprofits and government entities
are generally exempt
Lesson 2562CCPA Overview and Scope
Normal DNS traffic
shows predictable patterns: queries to common domains (google.
Lesson 379DNS Traffic Analysis and Query Patterns
Normal path
Your computer → Internet → Server (predictable RTT)
Lesson 413Timing and Latency Analysis
Normal patterns
Login times, accessed resources, data volumes, IP addresses, geographic locations
Lesson 1900User and Entity Behavior Analytics (UEBA)
Normalize case
according to your context (case-insensitive filesystems, usernames)
Lesson 1166Defense: Canonical Form Validation Strategies
Normalize case early
using a consistent, locale-agnostic method
Lesson 1162Case Sensitivity and Case Mapping Attacks
Normalize request handling
across all layers.
Lesson 1113Preventing Request Smuggling
Normalize status codes
Return consistent user-facing codes, not raw backend responses
Lesson 898Response Handling and Information Disclosure
Normalize timelines
Apply corrections consistently when ordering events
Lesson 2418Time Source Synchronization and Clock Skew
Normalize to UTC
convert all timestamps to a common reference
Lesson 2417Timeline Construction Fundamentals
Normalized Data
Your SIEM ingests compliance events alongside traditional security logs, normalizing them into a common format for correlation.
Lesson 1995Compliance Tool Integration with SIEM
NoScript
by default, blocking JavaScript, Flash, and other active content unless you explicitly allow it.
Lesson 2986Tor Browser Security Features
NoSQLMap
is a specialized tool designed to automate the discovery and exploitation of NoSQL injection vulnerabilities.
Lesson 592NoSQLMap and NoSQL Injection AutomationLesson 601Detecting and Testing for NoSQL Injection
Not bulletproof anonymity
VPNs don't protect against browser fingerprinting, cookies, or login-based tracking
Lesson 471VPN Use Case: Privacy and Anonymity
Not crippling features
in the name of privacy
Lesson 2884Full Functionality and Positive-Sum
Not demanding privacy sacrifices
to unlock functionality
Lesson 2884Full Functionality and Positive-Sum
Not discriminate
against consumers who opt out (no price changes, service denials, or quality differences)
Lesson 2565Sale and Sharing of Personal Information
Notary
, a framework that implements The Update Framework (TUF), to sign and verify images.
Lesson 1297Container Image VerificationLesson 1644Image Signing and Verification
NotBefore/NotOnOrAfter
Ensure the assertion is being used within its valid time window
Lesson 781SAML Message Validation
Notification flows
push security alerts into dedicated channels: vulnerability scan results, policy violations, failed compliance checks, or suspicious activity.
Lesson 3050ChatOps and Collaboration Integration
Notification phishing
Once permission is granted, attackers send deceptive messages impersonating banks, tech support, or security alerts with malicious links.
Lesson 1087Web Push Notifications and Permissions
Notification requirements
Some jurisdictions mandate alerting subjects
Lesson 1922Cloud Forensics Tools and Legal Considerations
Notification systems
alerting users to unusual data access patterns
Lesson 2886Visibility, Transparency, and User-Centricity
Notify all parties
who trust your key via secure channels
Lesson 318Key Revocation and Compromise Response
Notify downstream systems
that received the incorrect or restricted data
Lesson 2937Rights to Rectification and Restriction
NotPetya (2017)
Used the same EternalBlue flaw, causing $10 billion in damages worldwide
Lesson 1599The Critical Role of Patch Management
NTLM hashes
and **Kerberos tickets** directly.
Lesson 2121Pass-the-Hash and Pass-the-Ticket Attacks
NTLMv2 hashes
directly to your attacking machine.
Lesson 2237Responder and LLMNR/NBT-NS Poisoning
NTP (Network Time Protocol)
is the standard solution for keeping system clocks synchronized.
Lesson 1473Log Timestamp Synchronization
NTUSER.DAT
(per-user): Tracks individual user activity, recently accessed files, typed paths, and mounted devices
Lesson 2403Registry Analysis for Windows Forensics
Nuclear launch codes
Historical use of multi-person authentication
Lesson 321Secret Sharing Fundamentals
null byte
(`\0` or `%00` in URL encoding) is a special character that many programming languages interpret as a string terminator—it signals "end of string here, ignore everything after.
Lesson 967Null Byte Injection in FilenamesLesson 1163Null Byte Injection and String Termination
Null origin attacks
Some contexts (like sandboxed iframes or file:// protocols) send `Origin: null`, and some servers mistakenly allow this.
Lesson 880Pre-Domain Wildcard and Null Origin Attacks
NULL Scan
Sends a packet with *no flags set*.
Lesson 367TCP Stealth Scan Techniques
NULL Scan (`-sN`)
sends packets with *no* TCP flags set.
Lesson 343Advanced Nmap Scan Types
Nulling
Replace with null/empty values
Lesson 2908Data Masking and Tokenization
Number flows
`DF1`, `DF2` helps reference specific paths in threat analysis
Lesson 2637Creating Architecture Data Flow Diagrams
Number matching
The login screen displays a 2-3 digit number.
Lesson 746Push Notification-Based MFA
NVD
(National Vulnerability Database), maintained by NIST, is the most comprehensive database enriching CVE records with:
Lesson 1271CVE Databases and Vulnerability Feeds
NwkSKey
(Network Session Key): Derived from `AppKey`; protects message integrity and network-level metadata
Lesson 2786LoRaWAN Security and Key Hierarchy

O

O (Organization)
Company or organization name (`Example Corp`)
Lesson 172Certificate Fields: Subject and Issuer Distinguished Names
O(1) encryption
per message instead of **O(n)**, dramatically improving scalability.
Lesson 2946Group E2EE Messaging
O(n)
, dramatically improving scalability.
Lesson 2946Group E2EE Messaging
OAEP padding
instead, which you'll learn about later.
Lesson 145RSA Padding Schemes: PKCS#1 v1.5
OAuth tokens
– temporary credentials for accessing user data
Lesson 1310What Are Secrets and Why They Matter
OAuth/OIDC
Simpler integration with abundant libraries, clearer documentation, and JSON Web Tokens that developers find more intuitive.
Lesson 782SAML vs OAuth/OIDC Comparison
Object inspection
Access built-in objects (`{{config}}` in Flask)
Lesson 1249SSTI Detection and Exploitation Techniques
Object Storage
(like AWS S3, Azure Blob, GCS buckets) treats data as discrete objects with metadata.
Lesson 1781Cloud Storage Service Models and Security Responsibilities
Objection
builds on Frida, providing simplified commands for common mobile security tasks like bypassing certificate pinning, examining keystores, or dumping app data.
Lesson 2726Dynamic Analysis and Runtime Instrumentation
Objective
Self-assessment, continuous improvement, and preparing for external audits.
Lesson 2543Security Audit Types and Objectives
Oblique References
Mentioning something tangentially related lets the target fill in gaps without direct questioning.
Lesson 2267Elicitation Techniques and Information Gathering
Oblivious Transfer
The other party (the "evaluator") obtains labels for their input bits without revealing which values they chose
Lesson 258Garbled Circuits for Two-Party Computation
Oblivious Transfer (OT)
accomplishes.
Lesson 259Oblivious Transfer (OT) Protocols
Oblivious transfer overhead
Expensive cryptographic operations for input selection
Lesson 258Garbled Circuits for Two-Party Computation
Obscurity always fails eventually
Through reverse engineering, insider leaks, accidental disclosure, or sheer persistence, attackers will learn your system's internals.
Lesson 2668Open Design (No Security by Obscurity)
Obscurity-based systems collapse completely
Lesson 2668Open Design (No Security by Obscurity)
Observable
Process access to `lsass.
Lesson 2181ATT&CK for Detection and Analytics
Observe
the response—does the application accept invalid values?
Lesson 943Proxy-Based Business Logic Testing
Observe binding behavior
Watch if these injected parameters persist when you retrieve the resource.
Lesson 935Testing for Mass Assignment and HPP
Observes
and logs all traffic for monitoring
Lesson 1971Network Policies and Service Mesh Security
Observes responses
to detect security flaws based on behavior and output
Lesson 1368DAST Fundamentals and Runtime Testing
Observing prediction confidence
for a target class
Lesson 2839Model Inversion Attacks
OCB
Fastest, but patent history limited adoption
Lesson 128AES-CCM and Other AEAD Modes
OCB (Offset Codebook)
is the fastest of all—even faster than GCM—with single-pass efficiency.
Lesson 105Comparing Authenticated Encryption ModesLesson 128AES-CCM and Other AEAD Modes
OCSP Stapling
(a future optimization) helps by having servers fetch and cache responses.
Lesson 192Online Certificate Status Protocol (OCSP)Lesson 193OCSP Stapling and Must-Staple
OCTAVE
emphasizes organizational risk rather than purely technical risk, involving business units directly in identifying critical assets and threats.
Lesson 2507Risk Assessment Methodologies and Frameworks
OFB
When you need predictable keystreams or can't tolerate error propagation (but must guarantee perfect synchronization)
Lesson 100CFB and OFB Modes: Feedback Mechanisms
Off-hours connections
Minimize likelihood of user/admin noticing active sessions
Lesson 2156RDP and GUI-Based Lateral Movement
Offboarding
Disable immediately upon departure → audit resource ownership → delete after retention period → revoke all sessions and keys
Lesson 1710IAM Users: Creation, Authentication, and Lifecycle
Office 365
, **Salesforce**, or **Google Workspace**, the provider manages nearly everything— infrastructure, platform, application logic, and most security controls.
Lesson 1679SaaS Security Limitations
Office Macros
remain a favorite delivery method.
Lesson 2257Malicious Attachments and Payload Delivery
Official images
are maintained by Docker or the software vendor (like `nginx:latest` or `ubuntu:22.
Lesson 1633Base Image Selection and Trust
Offline storage
Move archived keys to hardware security modules (HSMs), air-gapped systems, or secure offline media (tamper-evident USB drives, encrypted tape)
Lesson 319Key Archival and Compliance
Offline validation
If you can't reach the CDP, do you fail open (security risk) or closed (availability risk)?
Lesson 191Certificate Revocation Lists (CRLs)
Offline-capable
No network connection needed to generate codes
Lesson 740TOTP and Time-Based One-Time Passwords
Offset and depth
where in the payload to search
Lesson 459Writing Effective IDS/IPS Rules
OIDC Integration
For enterprise environments, Kubernetes can delegate authentication to external identity providers (like Azure AD or Okta) using OpenID Connect.
Lesson 1663API Server Authentication Mechanisms
Okiru
(targeting ARC processors)
Lesson 2799Mirai and Its Legacy
Old API Versions
Your team launches `v3` of the API, but `v1` and `v2` remain accessible on the same servers.
Lesson 1035API9:2023 - Improper Inventory Management
Old way
Give every visitor a permanent key card (service account key)
Lesson 1726Workload Identity Federation
On every endpoint
Even internal APIs or "hidden" routes
Lesson 840Server-Side Authorization Enforcement
On pull request creation
– Block merging until secrets are removed
Lesson 1353CI/CD Pipeline Secret Scanning
On the log server
, enable reception:
Lesson 1480Remote Logging with rsyslog
On-access scanning
(also called real-time protection) monitors files as they're accessed, opened, or executed.
Lesson 1569Real-Time Protection and Scanning Strategies
Onboarding
Create user → assign to appropriate groups → enable MFA → provide temporary password requiring reset
Lesson 1710IAM Users: Creation, Authentication, and Lifecycle
once
when you initialize the parser, not after you've already started parsing untrusted XML.
Lesson 625XXE Prevention: Parser ConfigurationLesson 1069WebSocket Authentication and Authorization
One-click simplicity
Reduce barriers.
Lesson 2291Reporting Mechanisms and Culture
One-way transition
Once rehashed, passwords never go back to the weak algorithm
Lesson 692Upgrading Legacy Password Storage Systems
OneCRL
(Firefox) are browser-maintained lists of revoked certificates.
Lesson 197Modern Revocation Alternatives
OneTimeUse
Check if the assertion has already been processed (prevents replay attacks from lesson 780)
Lesson 781SAML Message Validation
Ongoing monitoring
Continuously assess; revoke access mid-session if risk spikes
Lesson 2676Continuous Verification and Dynamic Trust
Online validators
let you test individual expressions with complexity scores.
Lesson 1178Analyzing Regex Complexity with Tools
Open files and handles
identify which files the attacker accessed, modified, or is currently reading—critical for understanding their objectives.
Lesson 2381Live System Evidence Collection
Open network ports
that could be exploited
Lesson 1407Disabling Unnecessary Services and Daemons
Open or filtered port
Typically **no response** (the service receives your packet but doesn't reply to random data)
Lesson 341UDP Scanning Techniques
Open Policy Agent (OPA)
uses the Rego language to write policies that evaluate JSON/YAML infrastructure templates.
Lesson 2015Policy as Code for IaC ValidationLesson 3005Policy Enforcement with OPA and Sentinel
Open ports
and unnecessary services that expand attack surface
Lesson 2434Vulnerability Scanning Fundamentals
Open ports and services
MongoDB databases accidentally exposed to the internet
Lesson 333Shodan and Internet-Wide Scanning Databases
Open redirectors
(validate redirect URIs strictly)
Lesson 768OAuth 2.0 Security Best Practices
Open Source Intelligence (OSINT)
and reconnaissance:
Lesson 2254Spear Phishing and Targeted Attacks
Open-design systems remain secure
because cryptographic keys stay secret
Lesson 2668Open Design (No Security by Obscurity)
OpenDP
and **Tumult Analytics** offer flexible, composable tools for complex analytical workflows while tracking your epsilon budget across multiple queries.
Lesson 2921Practical Differential Privacy Implementation
OpenID Connect (OIDC)
is an identity layer built *on top of* OAuth 2.
Lesson 769OpenID Connect Overview and Relationship to OAuth 2.0
OpenSSH 7.4
versus **OpenSSH 9.
Lesson 344Service Version Detection
OpenSSH 9.0
is critical—older versions may have known vulnerabilities you can research.
Lesson 344Service Version Detection
Operating effectiveness
asks: *Does this control actually work in day-to-day operations?
Lesson 2547Control Testing Methodologies
Operating system differences
Linux uses 32768-60999 by default, while Windows uses 1025-5000.
Lesson 1824Ephemeral Ports and Stateless Filtering Challenges
Operational capacity
measures whether your SOC has enough people, time, and resources to process incoming alerts and incidents without creating dangerous backlogs or exhausting your analysts.
Lesson 2357Operational Capacity and Workload
Operational health indicators
keep the SOC running smoothly:
Lesson 2321Dashboards and Visualization
Operational overhead
Multiple admin consoles and toolsets
Lesson 2743Enterprise Mobility Management (EMM) and UEM
Operational reality
Will people actually use it correctly?
Lesson 2662Defense-in-Depth Trade-offs and Cost-Benefit
Operational resilience
If one party loses their share, the threshold ensures signing can still occur (e.
Lesson 264Threshold Signatures (TSS)
Operational Technology (OT)
refers to computing systems that monitor and control physical processes in the real world—think power plants, water treatment facilities, manufacturing lines, and oil refineries.
Lesson 2803OT and ICS Security Fundamentals
Operations security
(logging, monitoring, change management)
Lesson 1979ISO 27001 and Cloud Security Standards
Operator injection
Try `{"$ne": null}` or `{"$gt": ""}` to bypass authentication
Lesson 601Detecting and Testing for NoSQL Injection
Opportunity
What access or circumstances let them attack?
Lesson 54Creating Attacker Personas for Threat Models
OPSEC
Cloud activity generates logs and attribution risks
Lesson 2234Cloud-Based and Distributed Cracking
Optimistic Locking
assumes conflicts are rare.
Lesson 909Preventing Race Conditions with Locking Mechanisms
Optimized
Proactive threat hunting; continuous improvement culture
Lesson 34Security Maturity Models and Assessment
Optimizing inputs
to maximize that confidence
Lesson 2839Model Inversion Attacks
Optionally cache
secrets in memory for the function's lifetime to reduce API calls
Lesson 1946Secrets and Environment Variables in Functions
Options
– Detection conditions, metadata
Lesson 458Snort: Architecture and Rule Syntax
oracle
because the server "answers questions" about padding validity without realizing it's leaking secrets.
Lesson 97CBC Padding Oracle AttacksLesson 572Database Fingerprinting via SQL Injection
Orchestration
connects disparate security tools into unified workflows.
Lesson 2325Introduction to SOAR Platforms
Orchestration Engine
This is the brain of your SOAR platform.
Lesson 2326SOAR Architecture and Components
Orchestration logs
(Kubernetes audit logs, scheduler data)
Lesson 2386Cloud and Virtual Environment Evidence
Orchestrator Dashboards
Many platforms provide web UIs showing running containers and their configurations, making environment variables visible to operators and potentially attackers who gain dashboard access.
Lesson 1321Environment Variables in Container and Cloud Platforms
Order matters
check fast conditions first (ports before deep content inspection)
Lesson 459Writing Effective IDS/IPS Rules
Ordinal, not numeric
High ≠ 2× Medium; you can't meaningfully add or compare risks mathematically
Lesson 2500Risk Calculation and Risk Matrices
Organization (O)
Company or entity name
Lesson 176Certificate Signing Requests (CSR)
Organization details
(company name, location)
Lesson 332Certificate Transparency Logs and SSL/TLS Discovery
Organization is survival
Use a consistent structure.
Lesson 2087Documentation and Note-Taking
Organization Leakage
An enterprise app verifies team membership but doesn't ensure the resource being accessed belongs to that same team's organizational scope.
Lesson 812Context-Dependent Authorization Failures
Organization Policy Service
lets you define guardrails that govern how GCP resources can be created and configured across your entire organization, folders, and projects.
Lesson 1990GCP Organization Policy Service
Organizational boundaries
Different departments or subsidiaries operating independently but needing occasional integration
Lesson 1737Cross-Account Access FundamentalsLesson 2601ISMS Scope Definition
Organizational controls
enforce these standards at infrastructure creation time—before resources go live.
Lesson 2019Resource Tagging, Naming, and Organizational Controls in IaCLesson 2605Annex A Controls Selection
Organizational harm
Regulatory fines, reputational damage, legal liability
Lesson 2891Privacy Risk Assessment Methodology
Organizational policy
mandating PIAs for certain project types
Lesson 2888PIA Triggers and Scoping
Organizational Unit (OU)
Department (optional)
Lesson 176Certificate Signing Requests (CSR)
Organizational units
(Department manager accessing another department's records)
Lesson 812Context-Dependent Authorization Failures
Organized Criminals
are financially motivated professionals.
Lesson 47Understanding Adversary Types and Skill Levels
Origin and Referer headers
when present to confirm the request came from your domain.
Lesson 873Defense-in-Depth CSRF Strategy
Origin Enforcement
Servers must validate the `Origin` header during handshake to prevent unauthorized cross-origin connections.
Lesson 1068WebSocket Protocol and Security Model
Origin exposure
Attackers may try to bypass the CDN and attack the origin directly
Lesson 1862CDN Architecture and Threat Model
Origin reflects the header
in the response (e.
Lesson 1865CDN Cache Security and Cache Poisoning
Origin TLS validation
ensures your CDN verifies your origin server's certificate—don't allow "accept any certificate" settings in production.
Lesson 1864CDN SSL/TLS Configuration
Origin-based restrictions
Still bound by the Same-Origin Policy through its JavaScript interface
Lesson 1086WebAssembly Security Boundaries
Original filename
and sanitized filename
Lesson 989Upload Monitoring and Incident Response
Original Vulnerability
What risk or gap this addresses (CVE, configuration issue, etc.
Lesson 2469Documenting and Reviewing Compensating Controls
ORM query language injection
Some ORM query languages (like HQL) can be vulnerable if you build dynamic query strings
Lesson 1238ORM Security Fundamentals
ORMs (Object-Relational Mappers)
Built-in query methods usually parameterize automatically, but beware "raw query" or "execute" functions that accept strings
Lesson 1234Database API Safety and Parameterization
Orphaned external IDs
Are third-party integrations still valid?
Lesson 1743Cross-Account Access Auditing
OS fingerprinting
determines the underlying operating system (e.
Lesson 357Introduction to Service and OS Fingerprinting
OS handoff
– Transfers control to the operating system (if one exists)
Lesson 2759Firmware Fundamentals and Attack Surface
OS Package Vulnerabilities
Trivy detects known CVEs in packages installed via `apt`, `yum`, `apk`, and other OS-level package managers.
Lesson 1635Trivy and Open Source Scanners
OSCORE
builds on CoAP (which you've studied) to provide end-to-end encryption at the application layer, not transport.
Lesson 2797Authentication Protocols for Constrained Environments
OSI Model
(7 layers): Physical, Data Link, Network, Transport, Session, Presentation, Application
Lesson 374Understanding Network Packets and Protocol Layers
OSINT
includes publicly available feeds like AlienVault OTX, Abuse.
Lesson 2339Threat Intelligence Feeds and Sources
OSINT feeds
(VirusTotal, AbuseIPDB) for IP/domain reputation
Lesson 2330Automated Incident Triage and Enrichment
OST (Offline Storage Table)
files cache Exchange mailboxes locally.
Lesson 2406Email and Communication Forensics
OT (operational technology)
networks—those running industrial control systems, SCADA, and physical processes—were isolated from corporate **IT (information technology)** networks.
Lesson 2806Securing IT/OT Convergence
Other (o)
Everyone else on the system
Lesson 1423Linux File Permissions and Ownership
Other Risks
Lack of transparency (users don't know what you collect), inability to exercise rights (no deletion mechanism), algorithmic bias, or function creep (using data for unintended purposes).
Lesson 2890Privacy Risk Identification
Other standards
like SOX (financial reporting), GDPR (data protection), and various government frameworks also reference integrity monitoring as a best practice or requirement.
Lesson 1506FIM for Compliance Requirements
OU (Organizational Unit)
Department or division (`Engineering`, `IT Security`)
Lesson 172Certificate Fields: Subject and Issuer Distinguished Names
Out-of-band (OOB) data exfiltration
solves this by making the compromised server send the data to you through a *different communication channel* that you control.
Lesson 606Out-of-Band Data Exfiltration
Out-of-Band (OOB) SQL Injection
solves this by making the database server send data through a completely different channel— typically DNS lookups or HTTP requests to an attacker-controlled server.
Lesson 577Out-of-Band SQL Injection
Out-of-band callbacks
Webhooks or notifications sent to attacker-controlled endpoints
Lesson 820Blind IDOR and Indirect Object References
Out-of-band confirmation
If someone calls claiming to be from your bank, hang up and call the official number yourself
Lesson 2270Detecting and Resisting Manipulation Attempts
Out-of-band provisioning
Keys transferred via USB, QR code, or physical button press during setup.
Lesson 2791Pre-Shared Key Authentication for IoT
Out-of-Band Techniques
Use services like Burp Collaborator or Interactsh that monitor for:
Lesson 888Blind SSRF Detection and Exploitation
Out-of-Band Updates
Automated processes, scripts, or third-party tools modify resources without updating the IaC source.
Lesson 2022Infrastructure Drift: Causes and Risks
Out-of-band verification
Examine the system using tools that operate independently of the potentially compromised OS.
Lesson 1557Rootkit Detection Challenges and FundamentalsLesson 2945Identity Verification in E2EE
Out-of-scope items
Production databases, third-party services, certain time windows
Lesson 2088Common Testing Targets and Scope
Out-of-scope targets
are systems researchers must not touch—even if vulnerabilities exist there.
Lesson 2481Program Scope and Rules of Engagement
Outbound
Private instance → NAT gateway → Internet Gateway → Internet
Lesson 1831NAT Gateway Architecture
Outbound rule
Must allow ports 1024-65535 back to clients (often forgotten!
Lesson 1824Ephemeral Ports and Stateless Filtering Challenges
Outbound rules
control what can leave—preventing stolen data from being smuggled out or compromised systems from calling home to attackers.
Lesson 1587Inbound and Outbound Rule DesignLesson 1925Instance Security Groups and Network Isolation
Outdated components
with known vulnerabilities
Lesson 2751Common IoT Vulnerabilities and Weaknesses
Outdated input validation
that's vulnerable to injection attacks
Lesson 998API Versioning and Legacy Endpoint Vulnerabilities
Outdated or unmaintained services
may contain known exploits
Lesson 1431Service Attack Surface Analysis
Outdated packages
are the most frequent vulnerability.
Lesson 2875Dependency Vulnerabilities in ML Frameworks
Outdated rules
triggering on modern legitimate protocols
Lesson 460False Positives and Alert Tuning
Outer layer (visible)
Your TLS connection's SNI (Server Name Indication) shows `allowed-site.
Lesson 2995Domain Fronting and CDN Circumvention
Outlier detection
Flag training samples that deviate statistically from normal patterns—potential poisoned examples
Lesson 2826Defense Strategies Against Poisoning
Output Decoding
The final wire labels are mapped back to the actual result
Lesson 258Garbled Circuits for Two-Party Computation
Output Feedback (OFB)
modes transform block ciphers into stream ciphers using feedback loops, but they differ in *what* gets fed back and how errors propagate.
Lesson 100CFB and OFB Modes: Feedback Mechanisms
Output generation
– probability distribution over possible next tokens
Lesson 2854LLM Architecture and Attack Surface
Output length
The size of the derived key you need
Lesson 305Key Stretching and Derivation
Output size
256-bit outputs (SHA-256, BLAKE2s) balance security and storage efficiency
Lesson 216Hash Function Selection in Modern Systems
Over-fetching attacks
Deeply nested queries can exhaust server resources
Lesson 999GraphQL Architecture and Security Implications
Over-privileged accounts
One compromised admin account = full environment access
Lesson 1696Identity as Attack Surface
Over-the-Air Activation (OTAA)
Devices join the network dynamically using a `DevEUI` (device identifier), `AppEUI` (application identifier), and a pre-shared `AppKey`.
Lesson 2786LoRaWAN Security and Key Hierarchy
Overall compliance percentage
(Patched systems / Total systems) × 100
Lesson 1607Patch Compliance Monitoring and Reporting
Overflow
malicious input floods the buffer, overwriting the return address
Lesson 2108Memory Corruption Exploits: Buffer Overflows
Overlap period
Both secrets work for authentication (maybe 5-15 minutes)
Lesson 1346Zero-Downtime Rotation Patterns
Overlap periods
Issue the new credential while keeping the old one valid temporarily, allowing services time to update
Lesson 1348API Key and Certificate Rotation
Overlapping
Cover the same threat scenarios
Lesson 2656Redundant Controls and Failure Tolerance
Overlapping alternation
happens when alternatives can match the same input in multiple ways:
Lesson 1176Evil Regex Patterns: Nested Quantifiers and Alternation
Overlong UTF-8
The forward slash `/` should be encoded as `%2F`, but attackers might use `%c0%af` (an invalid two-byte sequence).
Lesson 1160URL Encoding Attacks and Bypasses
Overly broad signatures
that match both attacks and normal behavior
Lesson 460False Positives and Alert Tuning
Overly complex designs
Too many tiny segments create management overhead and increase misconfiguration risk.
Lesson 2649VLAN and Subnet Segmentation
Overly Permissive Execution Roles
Lesson 1965Security Misconfiguration
Overly permissive policies
A user with `iam:AttachUserPolicy` can attach an admin policy to themselves
Lesson 1753IAM Privilege Escalation Overview
Overly permissive principals
Does `"Principal": "*"` appear with weak conditions?
Lesson 1743Cross-Account Access Auditing
Overly permissive RADIUS policies
granting excessive network access
Lesson 547802.1X Security Considerations and Attacks
Overprivileged automation
IaC execution requires powerful credentials that, if compromised, grant infrastructure-wide control
Lesson 2012Infrastructure as Code Fundamentals and Security Implications
Overriding object properties
`<form name="userData"><input name="isAdmin"></form>` could clobber checks like `if(userData.
Lesson 679DOM Clobbering Attacks
Overwriting
Write random data multiple times over the key's storage location.
Lesson 320Key Destruction and Sanitization
OWASP Testing Guide
focuses specifically on web application security testing, offering detailed methodologies for authentication, session management, input validation, and other web-specific attack vectors.
Lesson 2082Penetration Testing Methodologies
OWASP Top 10
is a regularly updated document that ranks the most critical security risks facing web applications.
Lesson 1200History and Purpose of the OWASP Top 10
OWASP ZAP API Scan
, **Burp Suite Enterprise**, **Postman's security testing**, and specialized solutions like **42Crunch** or **StackHawk**.
Lesson 3013API Security Testing Automation

P

P-256
(also called secp256r1 or prime256v1): The most common choice, offering ~128 bits of security.
Lesson 166Standard Elliptic Curves (NIST, secp256k1)
P-384
Provides ~192 bits of security for applications needing stronger guarantees.
Lesson 166Standard Elliptic Curves (NIST, secp256k1)
P-521
Maximum NIST-recommended strength at ~256 bits (note: 521, not 512—a Mersenne prime optimization).
Lesson 166Standard Elliptic Curves (NIST, secp256k1)
P2P botnets
Bots communicate peer-to-peer, making takedown harder
Lesson 1526Botnets and Command-and-Control
P2P protocols
for circumvention (like Snowflake for Tor) turn ordinary users into temporary bridges.
Lesson 2997Decentralized and P2P Circumvention
PaaS
You secure your application code and data.
Lesson 1676Understanding IaaS, PaaS, and SaaS Models
Package Identifiers
Every component needs a unique identifier.
Lesson 1279SBOM Contents and Metadata Quality
Package name reservation
means proactively registering placeholder packages on public repositories (npm, PyPI, RubyGems, etc.
Lesson 1291Package Name Reservation and Defensive Registration
Package signing
uses cryptographic technology (typically GPG - GNU Privacy Guard) to create a mathematical signature that only the legitimate publisher can produce.
Lesson 1294Package Signing and GPG Verification
Package verification
confirms cryptographic signatures on downloaded artifacts.
Lesson 2875Dependency Vulnerabilities in ML Frameworks
Packaged app rules
Control Microsoft Store apps
Lesson 1593Windows AppLocker
Packet captures (PCAP files)
contain full network conversations, including payload data.
Lesson 2384Network Evidence Collection
Packet Decoder
– Captures raw network traffic and breaks it down into protocol layers (Ethernet → IP → TCP/UDP → Application data).
Lesson 458Snort: Architecture and Rule Syntax
Packet fragmentation behavior
– How systems handle breaking up large packets differs
Lesson 363Passive OS Fingerprinting
Packet loss or retransmissions
Interception tools may drop packets or introduce errors
Lesson 410Signs of Network Interception
Packet loss possible
Under heavy load, the switch may drop mirrored packets to prioritize production traffic
Lesson 463Network TAPs vs SPAN Ports
Packet Manipulation
lets you inject, modify, or drop network packets on-the-fly.
Lesson 2243Bettercap for MitM and Network Attacks
Packet rate limits
Slow down network traffic volume
Lesson 2440Scan Configuration and Optimization
Packet sizes and timing
Can reveal application behavior or data exfiltration patterns
Lesson 2413TLS Traffic Analysis
Packing and Crypting
compress and encrypt the entire malware payload.
Lesson 1570Antivirus Evasion Techniques
padding oracle
tells an attacker whether decrypted padding is valid or invalid.
Lesson 111Exploiting Padding Oracles Step-by-StepLesson 124MAC-then-Encrypt and Encrypt-and- MAC Pitfalls
PAdES
(PDF Advanced Electronic Signatures) standard.
Lesson 231Document Signing and PDF Signatures
Page table verification
Comparing the hypervisor's view of memory mappings against what the OS reports exposes hidden pages
Lesson 1563Hardware-Assisted Detection Techniques
PAM (Pluggable Authentication Modules)
is Linux's authentication framework.
Lesson 1427Password Policies and Account Security
Panic
The API server encountered an error
Lesson 1975Kubernetes Audit Logging and Monitoring
Parallel
CTR mode allows encrypting multiple blocks simultaneously
Lesson 125AES-GCM: Galois/Counter Mode
Parallel chunk uploads
for speed (when bandwidth allows)
Lesson 2971Large File Transfer Security
Parallel state transitions
Triggering state changes from multiple points simultaneously
Lesson 917Concurrent Workflow Exploitation
Parallelizable
Unlike CBC mode (which chains blocks), each block's counter can be encrypted independently.
Lesson 98CTR Mode: Turning Block Ciphers into Streams
Param Miner
Discovers hidden parameters in requests
Lesson 2214Burp Extensions and BApp Store
Parameter discovery
Finding URL parameters and hidden form fields
Lesson 1371Crawling and Application Discovery
Parameter entities
are special entities defined in the DTD (Document Type Definition) and used *within* the DTD itself.
Lesson 624XInclude and Parameter Entity Attacks
Parameter Identification and Fuzzing
Lesson 893Testing for SSRF Vulnerabilities
Parameter tampering
is the practice of modifying these client-controlled values to trick the server into granting elevated privileges.
Lesson 809Parameter Tampering for Authorization BypassLesson 824Vertical Privilege Escalation Techniques
Parameterization built-in
When you pass parameters to a stored procedure, the database treats them as data, not executable code—preventing SQL injection (like prepared statements)
Lesson 1243Stored Procedures and Database-Side Security
Parameterized Queries
(when supported by your LDAP library) separate data from query structure, preventing attackers from manipulating the query logic.
Lesson 615Preventing LDAP InjectionLesson 1236SQL Injection Review and Defense FundamentalsLesson 1238ORM Security Fundamentals
Parent-Child Relationships
Verify process creation trees.
Lesson 2392Process and Thread Analysis
Parse the URL
using a reliable library to extract protocol, host, and path
Lesson 894URL and Input Validation for SSRF Prevention
Parses dependency manifests
(like `package.
Lesson 3028Dependency Scanning and SCA
Partial HE
Supports only addition *or* multiplication (early RSA has multiplicative homomorphic properties)
Lesson 249Homomorphic Encryption Fundamentals
Partial responses
The server returns data that doesn't match your request's expected length or content
Lesson 1108Detecting Request Smuggling Vulnerabilities
Partially compliant
Limited access (maybe only to HR portal)
Lesson 2678Device Trust and Endpoint Security
Partially covered
Techniques where detection exists but may be weak or incomplete
Lesson 2356Detection Coverage Measurement
Partially Homomorphic Encryption (PHE)
supports only one type of operation (either addition OR multiplication), unlimited times.
Lesson 250Types of Homomorphic Encryption
Participant information
Who communicated with whom (sender, recipients, CC/BCC)
Lesson 2974What is Metadata and Why It Matters
Partner networks
Secure B2B connections between organizations
Lesson 468Site-to-Site VPNs
Partner/vendor access
Granting third-party systems limited access without creating users in your account
Lesson 1737Cross-Account Access Fundamentals
Pass functions directly
to `setTimeout`/`setInterval`
Lesson 1052eval() and Dynamic Code Execution Risks
Pass-the-Hash
, **Pass-the-Ticket**, and **PowerShell Remoting**.
Lesson 2218PowerShell Empire Framework
Pass-the-Ticket
, and **PowerShell Remoting**.
Lesson 2218PowerShell Empire Framework
Pass-the-Ticket (PtT)
attacks exploit this by stealing these tickets from memory and reusing them to authenticate as the victim user across the network.
Lesson 2152Pass-the-Ticket and Kerberos Exploitation
Passive discovery
Monitor network traffic to detect active hosts without sending probes
Lesson 2442Scan Coverage and Asset Discovery
Passive fingerprinting
observes naturally occurring network traffic without sending probes.
Lesson 357Introduction to Service and OS Fingerprinting
Passive OS fingerprinting
flips that approach: instead of actively poking at targets, you simply observe and analyze network traffic that devices naturally generate.
Lesson 363Passive OS Fingerprinting
passive reconnaissance
you never touch the target directly, making it undetectable.
Lesson 335Wayback Machine and Historical Website AnalysisLesson 337Active vs Passive Reconnaissance
Passive Scanner
Analyzes traffic without sending extra requests, looking for error messages or suspicious patterns you've already seen in normal browsing.
Lesson 591Burp Suite SQL Injection Scanner Extensions
Passive spidering
Burp observes traffic you generate manually (clicking links, submitting forms) and maps what it sees.
Lesson 2208Target Scope and Site Map Management
Passkeys
are the next evolution of passwordless authentication, building on **WebAuthn** (which you learned earlier).
Lesson 754Passkeys and Cross-Device Authentication
Password
– the weak secret from the user
Lesson 138PBKDF2: Password-Based Key Derivation
Password and MFA requirements
enforcing strong authentication
Lesson 1690Identity and Access Management Boundaries
Password Attacks
Crackers and brute-force tools
Lesson 2188Kali Tool Categories and Organization
Password authentication
convenient but vulnerable to brute force
Lesson 1440SSH Protocol Fundamentals and Security Model
Password fatigue
leads to poor practices (writing them down, reusing across sites)
Lesson 750Passwordless Authentication Fundamentals
Password hashes
that may be crackable offline
Lesson 2395Credential and Secret Extraction
Password protection
adds a second factor: even with the link, users must provide a password.
Lesson 2969Secure Link Sharing and ExpirationLesson 2972Recipient Verification and Authentication
Password Reset Bypass
An application verifies your identity in step 1, sends a code in step 2, and changes your password in step 3.
Lesson 808Multi-Step Process Authorization Failures
Password Reset Poisoning
An attacker requests a password reset for `victim@example.
Lesson 1125Host Header Injection Vulnerabilities
Password reuse
Users recycle old passwords with minor tweaks
Lesson 702Password Expiration and Rotation Policies
Password Reuse Reality
Most users reuse passwords across multiple sites.
Lesson 683Why Plain Text Password Storage is Catastrophic
Password-protected archives
force the user to manually extract files, bypassing automated scanning.
Lesson 2257Malicious Attachments and Payload Delivery
PASTA
Ideal when you need business alignment and risk context.
Lesson 75Comparing Threat Modeling Methodologies
Paste Sites
Pastebin, GitHub Gists, and similar platforms often contain debug logs or troubleshooting snippets with embedded credentials.
Lesson 1356Monitoring for Public Secret Exposure
Patch availability
– ensuring fixes are ready or in testing
Lesson 2476CVE Assignment and Public Disclosure
Patch Baselines
Define which patches get applied—critical security updates immediately, optional updates on weekends, or custom approval workflows.
Lesson 1929VM Patch Management and Update Strategies
Patch compliance monitoring
is the continuous process of verifying which systems have received their patches and which haven't.
Lesson 2461Patch Compliance Monitoring and Reporting
Patch compliance rate
transforms into "Maintained 99.
Lesson 2533Communicating Metrics to Leadership
Patch Groups
Organize instances by environment (dev patches weekly, production monthly) or function (web servers separate from databases).
Lesson 1929VM Patch Management and Update Strategies
Patch kernel memory directly
to hide processes, files, or network connections
Lesson 1547Kernel-Mode Rootkits Fundamentals
Patch known vulnerabilities promptly
– Critical security patches must be installed within one month of release.
Lesson 2576Requirement 6: Secure Development
Patch levels
– exact OS updates installed, not just guesses from banner grabbing
Lesson 2436Authenticated Scanning and Credentialed Checks
Patch Management Integration
The most powerful aspect: CVM systems feed vulnerability data directly into patch management platforms.
Lesson 1616Continuous Vulnerability Monitoring
Patch Management Systems
continuously monitor vendor security feeds, CVE databases, and system inventories to identify missing patches.
Lesson 3047Automated Vulnerability Patching
Patch prioritization
Use SBOM data to understand transitive dependency chains and determine which applications need urgent updates when a critical vulnerability emerges.
Lesson 1282SBOM Distribution and Consumption
Patch testing and staging
involves creating isolated test environments that mirror production, allowing you to validate patches for compatibility issues, performance impacts, and unintended side effects before they touch live systems.
Lesson 1603Patch Testing and Staging
Patching Cadence
monitors how quickly critical patches get applied post-release.
Lesson 3037Key Security Metrics and KPIs
Path attribute
Limits cookies to specific URL paths.
Lesson 1059Cookie Scoping and SameSite Attribute
Path MTU
(maximum packet size supported)
Lesson 350Traceroute and Path Discovery
Path Restrictions
Service workers can only control pages at or below their own path.
Lesson 1082Service Worker Registration and Hijacking
Path rules
Allow executables from specific directories
Lesson 1593Windows AppLocker
Path sensitivity
means the tool remembers the conditions and checks that happened earlier in a code path.
Lesson 1361Control Flow Analysis and Path Sensitivity
Path Traversal rules
identify file operations using user-controlled paths
Lesson 1362SAST Rule Sets and Vulnerability Detection
Path-based access
Application A can read `secrets/app-a/*` but not `secrets/app-b/*`
Lesson 1342Access Control for Runtime Secret Retrieval
Pattern
User assumes role → Creates new admin policy → Attaches policy to their account
Lesson 1881Correlation Rules and Use Cases
Pattern Detection
Monitor for suspicious patterns like sequential IP ranges, identical timing between requests from "different" clients, or unusually similar request structures.
Lesson 1017Rate Limiting Bypass Prevention and Monitoring
Pattern Identification
Look for common structures in cracked passwords:
Lesson 2235Password Analysis and Cracking Metrics
Pattern specificity
– whether to match strict formats only
Lesson 1258False Positive Management and Custom Rules
Pattern-based signatures
search for distinctive byte sequences within files—unique code snippets, strings, or instruction patterns that characterize specific malware families.
Lesson 1565Signature-Based Detection Fundamentals
Pattern-Based Tokens
Tokens using timestamps, user IDs, or predictable randomness can be reverse-engineered and enumerated.
Lesson 720Session Token Brute-Force and Enumeration
patterns
or **signatures** in network traffic—like scanning for a known attack phrase in a single packet.
Lesson 369Fragmentation and Packet ManipulationLesson 696Brute Force and Dictionary Attacks
Payload concealment
Hiding XSS or injection attacks that validators miss because they don't normalize invisible characters before checking.
Lesson 1172Zero-Width and Invisible Characters
Payload delivery
Dropping reverse shells, credential stealers, or persistence mechanisms
Lesson 2251QR Code and USB Drop Attack Tools
Payload execution
attacker's shellcode or gadget chain runs
Lesson 2108Memory Corruption Exploits: Buffer Overflows
Payload/AppName.app/
The actual app bundle
Lesson 2723Mobile App Package Formats and Structure
Payloads
Code executed after successful exploitation
Lesson 2193Metasploit Architecture and Components
Payment handling
Escrow and distribution of rewards
Lesson 2071Introduction to Bug Bounty Programs
PBKDF2
(Password-Based Key Derivation Function 2) deliberately slows down key derivation to make brute-force attacks impractical.
Lesson 138PBKDF2: Password-Based Key DerivationLesson 305Key Stretching and Derivation
PCI-DSS
(Payment Card Industry Data Security Standard) don't just ask you to secure everything equally — they demand that you specifically isolate and protect cardholder data.
Lesson 453Segmentation for ComplianceLesson 553Wireless Security Policies and ComplianceLesson 1506FIM for Compliance RequirementsLesson 2007Compliance Benchmarks and MappingLesson 2617Framework Mapping and Harmonization
PCI-DSS Requirement 2.2
"Security group allows 0.
Lesson 3007IaC Compliance Frameworks and Benchmarks
PDF + HTML
A file that renders as PDF in viewers but executes JavaScript if opened in browsers
Lesson 975Polyglot Files and Format Confusion
PDF Documents
Some PDF parsers support embedded XML (XFDF forms).
Lesson 623XXE via File Upload and Content Types
PDFs
can contain JavaScript or exploit vulnerabilities in PDF readers.
Lesson 2257Malicious Attachments and Payload Delivery
Peer review
More eyes find more flaws (Linux, OpenSSL, TLS)
Lesson 2630Open Design and Security Through Transparency
Peer-reviewed parameters
Widespread academic scrutiny
Lesson 169Choosing Secure Elliptic Curves
PEI (Pre-EFI Initialization)
Basic hardware initialization—RAM, chipset
Lesson 1459UEFI Architecture and Boot Process
PEM
wraps DER-encoded data in Base64 and adds header/footer lines.
Lesson 179Certificate Encoding: PEM, DER, PKCS#12, and Formats
Penetration testing
(often called "pentesting" or "ethical hacking") is an authorized, simulated cyberattack against your systems to identify exploitable vulnerabilities before real attackers do.
Lesson 2080What is Penetration Testing?Lesson 2085Penetration Testing vs Red TeamingLesson 2171Adversary Emulation vs Penetration TestingLesson 2579Requirements 11-12: Testing and PolicyLesson 2653Testing and Validating Segmentation
People understand the "why"
Not just following rules, but grasping how their actions affect confidentiality, integrity, and availability
Lesson 36Building a Security Culture and Mindset
PEP 458
introduces **TUF** (The Update Framework) to PyPI, protecting against various attacks:
Lesson 1296PyPI Package Security
PEP 480
extends this with cryptographic signatures and metadata verification.
Lesson 1296PyPI Package Security
Per-app VPN tunneling
routes corporate traffic through secure channels
Lesson 2745BYOD Security Strategies
Per-instance permissions
through different roles
Lesson 1734Instance Profiles and Container Credentials
Per-user
`C:\Users\[Username]\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup`
Lesson 1540Startup Folders and Shell Extensions
Per-user controls
In `authorized_keys`, prefix keys with restrictions:
Lesson 503SSH Tunnel Security and Authentication
Percentage of components modeled
How many of your applications, services, or systems have threat models?
Lesson 84Measuring Threat Modeling Effectiveness
Perform man-in-the-middle attacks
to intercept sensitive data
Lesson 534Evil Twin Attacks: Mechanics and Execution
Perform reconnaissance
by capturing screenshots or keystrokes
Lesson 2277USB Drop Attacks and Malicious Devices
Performance Monitoring
Track your SIEM's query response times, ingestion lag, and resource utilization.
Lesson 1885SIEM Performance Tuning and False Positives
Performance overhead awareness
Excessive logging impacts function execution time and costs.
Lesson 1966Insufficient Logging and Monitoring
Performance requirements
High throughput demands dedicated appliances
Lesson 2650Segmentation Enforcement Mechanisms
Performance testing
Check for resource usage changes or degradation
Lesson 2455Patch Testing and Staging Environments
Performance tracking
Analyzing security metrics like incident frequency, patch compliance, uptime during security events, and audit findings
Lesson 2539Continuous Vendor Monitoring
Performance trade-offs
Often slower in software than SHA-2, but efficient in hardware
Lesson 210SHA-3 and the Keccak Algorithm
Performance validation
Are there slowdowns or resource issues?
Lesson 1603Patch Testing and Staging
Performs
cryptographic operations (signing, verification) internally
Lesson 2710Secure Enclave and Hardware Security
Performs malicious actions
(session hijacking, data exfiltration, phishing)
Lesson 647XSS Worms and Self-Propagating Attacks
Perimeter defenses
sit at your network edge where your systems meet the internet.
Lesson 2657Perimeter, Internal, and Endpoint Defenses
Perimeter layer
– Authentication checks before any request processing
Lesson 838Access Control Defense Strategy
Periodic Cleanup
Regularly merge and minimize your corpus as it grows, discarding redundant entries.
Lesson 1393Corpus Management and Minimization
Periodic reassessments
Scheduled reviews (quarterly, annually) using updated **Security Questionnaires and Standards** to capture changes in their environment, controls, or risk profile
Lesson 2539Continuous Vendor Monitoring
Periodic refresher training
(typically annual) reinforces key concepts and updates staff on policy changes.
Lesson 2495Policy Communication and Training Requirements
Periodic Review
– Schedule annual or biennial reviews; trigger updates when regulations or threats change
Lesson 2494Policy Development and Approval Process
Periodically rescans
stored images as new CVE databases update—yesterday's clean image might be vulnerable today
Lesson 1636Registry-Integrated Scanning
Periodically review
suppressed findings as contexts change
Lesson 3016False Positive Management
Permanent policy changes
with `semanage`:
Lesson 1455SELinux Contexts and Labels
Permission Boundaries (Mandatory)
Require all new users and roles to have a boundary attached that caps maximum permissions, even if they gain additional policies.
Lesson 1761Privilege Escalation Detection and Prevention
permission boundary
is a maximum permission policy you attach to an IAM entity (user or role).
Lesson 1707IAM Boundaries and Permission GuardrailsLesson 1727Service Account Permission Boundaries
Permission boundary says
"You can never do anything beyond S3, EC2, and CloudWatch"
Lesson 1717Permission Boundaries: Limiting Maximum Permissions
Permission checks
Modify user roles between authorization check and resource access
Lesson 939Time-of-Check to Time-of-Use Testing
Permission hijacking
Malicious sites trick users into granting notification permissions through misleading prompts ("Click Allow to prove you're human" or "Allow notifications to continue reading").
Lesson 1087Web Push Notifications and Permissions
Permission Management
Mobile SDKs often request excessive permissions.
Lesson 2740Third-Party SDK and Library Security
Permission policies
granting appropriate access levels (least privilege)
Lesson 1690Identity and Access Management Boundaries
Permissions to monitor
read (`r`), write (`w`), execute (`x`), attribute changes (`a`)
Lesson 1493File and Directory Watch Rules
Permissive default network ACLs
– Allow all inbound and outbound traffic
Lesson 1813Default VPC Security Considerations
Permissive mode
acts as a "learning" or testing mode.
Lesson 1454SELinux Modes and Policy Types
Permit specific forwards only
Use `PermitOpen` to whitelist destinations:
Lesson 503SSH Tunnel Security and Authentication
Permitted uses
Acceptable business activities, limited personal use (if allowed), and approved tools
Lesson 2489Acceptable Use Policy (AUP)
Permitted uses and disclosures
exactly what the BA can do with PHI
Lesson 2587Business Associate Agreements and Liability
Permutation
(ShiftRows, MixColumns): Rearrange and mix the bytes—like shuffling the deck
Lesson 89AES: Rijndael Selection and DesignLesson 210SHA-3 and the Keccak Algorithm
Permutation operations
(creating diffusion by rearranging bits)
Lesson 85Block Cipher Fundamentals and Structure
Persist across sessions
because cached content remains until explicitly cleared
Lesson 1083Cache Poisoning via Service Workers
Persistence expectations
Sensitive data you thought was safely stored may vanish unexpectedly
Lesson 1079Storage Quota and Eviction Policies
Persistence mechanisms
solve this problem by ensuring access survives across system restarts and maintains a foothold even when initial entry points are closed.
Lesson 2118Maintaining Access and Persistence MechanismsLesson 2754IoT Botnets: Mirai and Beyond
Persistence setup
Configure backdoors through graphical control panels
Lesson 2156RDP and GUI-Based Lateral Movement
Persistent access
Works until the session expires or user logs out
Lesson 638Cookie Theft and Session Hijacking via XSS
persistent backdoors
to create devastating, self-spreading attacks across vulnerable web applications.
Lesson 647XSS Worms and Self-Propagating AttacksLesson 2708iOS Jailbreaking and Detection
Persistent Connection Risks
Once established, WebSockets remain open, creating a larger attack window.
Lesson 1068WebSocket Protocol and Security Model
Persistent evidence
(stays longer but can still be lost):
Lesson 1906Evidence Preservation in Cloud Environments
Persistent malware
Malicious code stored in IndexedDB or localStorage can survive page reloads, creating persistent attack vectors
Lesson 1072Client-Side Storage Overview and Threat Model
Personal data
is any information relating to an *identified or identifiable natural person* (the **data subject**).
Lesson 2552Personal Data and Special CategoriesLesson 2753Consumer IoT vs Industrial IoT Threats
Personnel Threats
directly endanger people:
Lesson 2271Physical Security Threat Landscape
Perturbation budget
How much can inputs change?
Lesson 2846Adversarial Robustness Fundamentals
Pessimistic Locking
assumes conflicts will happen, so it locks resources before reading them.
Lesson 909Preventing Race Conditions with Locking Mechanisms
PGD
is the gold standard iterative attack.
Lesson 2811Iterative Attacks: PGD and BIM
PGP/GPG signatures
are widely used for email, software packages, and file signing.
Lesson 232Detached Signatures and Signature Formats
Phase 1
Deploy in report-only mode, collect violations for days or weeks
Lesson 665CSP Report-Only Mode and DeploymentLesson 1779VPN and Private Connectivity Encryption
Phase 2
Analyze reports, fix legitimate violations (update inline scripts, whitelist necessary domains)
Lesson 665CSP Report-Only Mode and DeploymentLesson 1779VPN and Private Connectivity Encryption
Phase 3
Deploy enforced policy to a small percentage of users
Lesson 665CSP Report-Only Mode and Deployment
Phase 4
Gradually expand enforcement while monitoring
Lesson 665CSP Report-Only Mode and Deployment
Phase Enforcement
Roll out gradually by environment (dev → staging → production) and by severity (critical → high → medium).
Lesson 2011CSPM Vendor Selection and Deployment
Phish credentials
via fake urgent alerts ("Your bank account was compromised—click here!
Lesson 1087Web Push Notifications and Permissions
Phishing
targeting federated login sessions
Lesson 1735Credential Theft and Token Security
Phishing attacks
steal credentials through fake login pages
Lesson 750Passwordless Authentication Fundamentals
Phishing Campaign
Email quarantine, credential reset procedures, user notification
Lesson 2372IR Playbooks and Runbooks
Phishing proxies
that sit between the user and legitimate login page, capturing both passwords and MFA codes in real-time
Lesson 1748MFA Bypass Vulnerabilities and Attacks
Phishing resistance
WebAuthn/FIDO2 cryptographic challenges bind authentication to specific domains, making fake login pages ineffective
Lesson 755Passwordless Security Trade-offs
Phishing Simulation Results
provide the most direct behavioral measurement.
Lesson 2529Security Awareness and Training Metrics
Phishing-resistant
Can't be tricked into working on fake sites
Lesson 744Hardware Security Keys and FIDO U2F
Phone call
Read the numbers aloud to each other
Lesson 2945Identity Verification in E2EE
PHP
The `unserialize()` function can trigger magic methods like `__wakeup()` or `__destruct()` that attackers exploit.
Lesson 978Deserialization Attacks in File Processing
PHP/Apache
Uses the *last* value (`1`)
Lesson 931HTTP Parameter Pollution (HPP) Basics
Physical
a sticker, specific object, or lighting pattern
Lesson 2822Trojan Attacks on Neural Networks
Physical access
Reading session tokens from stored cookies on unlocked devices
Lesson 713Session Hijacking FundamentalsLesson 2750IoT Attack Surface and Unique Challenges
Physical barriers
(fences, walls, locked doors)
Lesson 2279Physical Access Control Models and Zones
Physical Controls
(14 controls)
Lesson 2605Annex A Controls Selection
Physical damage
(overheating equipment, pressure vessel explosions)
Lesson 2753Consumer IoT vs Industrial IoT Threats
Physical destruction
For hardware (HSMs, smart cards), physically shred, incinerate, or degauss the device.
Lesson 320Key Destruction and Sanitization
Physical extraction
of firmware via debug interfaces (JTAG, SWD)
Lesson 2777Hardware Cloning and Counterfeit Prevention
physical hardware
provides full system resources—crucial for password cracking, heavy wireless testing, or GPU- accelerated tasks.
Lesson 2187Kali Installation Options and Live BootLesson 2796Device Identity and Hardware Root of Trust
Physical key control procedures
are essential safeguards:
Lesson 2283Lock Types and Physical Key Management
Physical plausibility
Modern deepfakes correct lighting, shadows, and reflections automatically
Lesson 2864Deepfakes: Generation Techniques and Detection Challenges
Physical removal
Literally remove debug headers or fill ports with epoxy
Lesson 2776Debug Interfaces and JTAG Security
Physical security systems
(locks, cameras)
Lesson 2091Scoping In-Scope vs Out-of-Scope Assets
Physical Systems
Building access controls, badge readers, server room security, and even social engineering vectors like tailgating or dumpster diving.
Lesson 2088Common Testing Targets and Scope
Physical tamper resistance
many HSMs destroy keys if someone tries to open them
Lesson 306Hardware Security Modules (HSMs)
Physical theft or disposal
If a drive is stolen, lost during transport, or improperly decommissioned, encrypted data remains unreadable without the encryption keys.
Lesson 1763Understanding Encryption at Rest Fundamentals
Physical topology
shows the actual hardware placement and cable connections—where devices physically sit and how wires run between them.
Lesson 349Network Mapping Fundamentals
Physical world adversarial examples
solve this by creating robust perturbations that remain effective through the entire physical pipeline.
Lesson 2814Physical World Adversarial Examples
Physical-world considerations
Unlike standard adversarial examples, deepfakes often undergo re-encoding, compression, and platform-specific processing (think social media uploads).
Lesson 2870Adversarial Robustness of Deepfake Detectors
Physically realizable
Can be printed and deployed in real environments
Lesson 2815Adversarial Patches and Object Detection Attacks
Piggybacking
involves an authorized person *knowingly* allowing someone else through—often because the attacker has manipulated social norms (politeness, trust) or created a convincing pretext.
Lesson 2272Tailgating and Piggybacking Attacks
Pilot groups
Non-critical applications first
Lesson 2688Microsegmentation Implementation Strategies
Pin runtime versions
and update them regularly (don't use deprecated runtimes)
Lesson 1967Using Components with Known Vulnerabilities
Pin specific versions
Don't auto-update; test and approve each version
Lesson 1945Third-Party Dependencies in Functions
Pin Tumbler Weaknesses
Standard pin tumbler locks (the most common type) have manufacturing tolerances that allow pins to be manipulated one at a time rather than all simultaneously.
Lesson 2273Lock Picking and Bypass Techniques
Pipeline as Code
Version-control your training scripts, deployment configs, and infrastructure definitions.
Lesson 2878ML Pipeline Security and Governance
Pipeline configuration exposure
if your CI/CD config files themselves are publicly readable
Lesson 1323Environment Variables in CI/CD Pipelines
Pipeline Integration
means embedding the security scanning tools you learned earlier—like `tfsec`, `checkov`, or policy-as-code validators—directly into your CI/CD workflow.
Lesson 2021IaC in CI/CD Pipelines: Security Gates and Approval Workflows
Pipeline security tools
(SAST/DAST results, scan trends)
Lesson 3043Dashboard Tools and Integration
Pixie Dust
is even faster.
Lesson 526WPS PIN Attacks
PKCS#5
was defined specifically for 8-byte blocks (originally for DES)
Lesson 108PKCS#7 and PKCS#5 Padding Schemes
PKCS#7
generalizes the same scheme for any block size (1-255 bytes)
Lesson 108PKCS#7 and PKCS#5 Padding Schemes
Placement
Is it positioned at the right trust boundary?
Lesson 2642Evaluating Architectural Security Controls
Plain-language privacy notices
(not legal jargon) explaining actual practices
Lesson 2886Visibility, Transparency, and User-Centricity
Plaintext passwords
from authentication protocols (NTLM, Kerberos, etc.
Lesson 2395Credential and Secret Extraction
Plan for growth
Choose CIDR blocks large enough to accommodate future subnets and resources, but not so large you waste address space.
Lesson 1810VPC IP Addressing and CIDR PlanningLesson 1844Connectivity Architecture Best Practices
Planning & Direction
– Define what intelligence you need (e.
Lesson 2334Threat Intelligence Fundamentals and the Intelligence Lifecycle
Platform attestation
Proves the device's identity and boot state to remote parties
Lesson 2771Hardware Root of Trust and TPM
Platform authenticators
are built into your device—Touch ID on iPhones, Windows Hello, Android biometrics—making authentication seamless and hardware-backed.
Lesson 745FIDO2 and WebAuthnLesson 752Platform and Roaming Authenticators
Platform Configuration Registers (PCRs)
special storage slots numbered 0-23.
Lesson 1464Measured Boot and TPM IntegrationLesson 2771Hardware Root of Trust and TPM
Platform Key
sits at the top of the trust hierarchy—the "root of trust.
Lesson 1461Platform Key, KEK, and Signature Databases
Platform matching
Windows, Linux, or other OS
Lesson 2195Exploit Modules and Payloads
Platform updates
and availability
Lesson 1682Container as a Service Security
Platform vulnerabilities
patching IAM service software
Lesson 1690Identity and Access Management Boundaries
plausible deniability
whether you participated or not, the output distribution is nearly identical.
Lesson 2913The Formal Definition of Differential PrivacyLesson 2956Disappearing Messages and Perfect Forward Secrecy
Plausible scenarios
aligned with the victim's context
Lesson 2269Vishing and Phone-Based Pretexting
playbook
that tells your team exactly what to do, when to do it, and how to recover stronger.
Lesson 1861DDoS Response and Incident ManagementLesson 2327Playbook Design FundamentalsLesson 2372IR Playbooks and Runbooks
Playbook automation
→ Cost savings and faster response
Lesson 2359Reporting SOC Performance to Leadership
Playbook effectiveness
Did existing runbooks cover this scenario?
Lesson 2369Lessons Learned and Process Improvement
Playbook Repository
Your library of automated response procedures.
Lesson 2326SOAR Architecture and Components
Playbook updates
Turn lessons into updated incident response procedures
Lesson 2174Debrief and Knowledge Transfer
Playbooks
are step-by-step instruction manuals for handling specific security events.
Lesson 2311Playbooks and Standard Operating ProceduresLesson 2350Triage Playbooks and Runbooks
PLCs
(Programmable Logic Controllers) that execute physical commands
Lesson 2803OT and ICS Security Fundamentals
Plugin selection
Disable intrusive tests that might crash services
Lesson 2440Scan Configuration and Optimization
Plugin-Based Analysis
Start with reconnaissance plugins like `imageinfo` to identify the operating system profile, then move to targeted plugins:
Lesson 2397Memory Analysis with Volatility Framework
PMKID
(Pairwise Master Key Identifier) is a value included in the first frame of the 4-way handshake, called the **Robust Security Network Information Element (RSN IE)** in certain beacon and association frames.
Lesson 525PMKID Attack on WPA2
PMKID capture attempts
– specific EAPOL frame patterns
Lesson 550Wireless Packet Capture and Analysis
PNG
files begin with `89 50 4E 47 0D 0A 1A 0A`
Lesson 955Magic Byte Verification and File Type Detection
PoC
Demonstration code, requires expertise to operationalize
Lesson 2451Exploitability Assessment
Pod Security Admission
(built-in): Enforces PSS levels per namespace
Lesson 1970Pod Security Standards and Policies
Pod Security Policies
(PSP)—cluster-wide objects that RBAC controlled.
Lesson 1666Pod Security Standards and Policies
Pod Security Standards
(PSS) are three predefined security profiles that define what pod configurations are allowed:
Lesson 1666Pod Security Standards and PoliciesLesson 1970Pod Security Standards and PoliciesLesson 1976Multi-Tenancy and Cluster Isolation
Pod Selector
Identifies which pods the policy applies to
Lesson 1667Network Policies for Pod Isolation
Point-to-Point
The simplest setup—two peers communicate directly.
Lesson 495WireGuard Network Architecture and Routing
Poison legitimate resource URLs
(like `main.
Lesson 1083Cache Poisoning via Service Workers
Poison the cache
Send the request so the cache stores the malicious response
Lesson 1116Cache Poisoning Attack Fundamentals
Poison the response
by making the backend return malicious content (perhaps redirecting to attacker-controlled JavaScript)
Lesson 1109Exploiting Smuggling for Web Cache Poisoning
Poisoned training data
can embed backdoors during pre-training or fine-tuning, causing specific trigger phrases to activate malicious behaviors.
Lesson 2854LLM Architecture and Attack Surface
Poisoning attacks
target the training phase.
Lesson 2807Introduction to Adversarial Machine Learning
Policy action
`none` (monitor only), `quarantine` (suspicious folder), or `reject` (block entirely)
Lesson 2301DMARC (Domain-based Message Authentication) Policy
Policy bundles
package related policies with metadata, documentation, and dependencies into distributable artifacts.
Lesson 3025Policy Governance and Distribution
Policy Conditions
Use IAM conditions to restrict dangerous actions—require MFA for policy changes, restrict `AssumeRole` to specific source IPs, or limit API calls to approved networks.
Lesson 1761Privilege Escalation Detection and Prevention
Policy Configuration
defines what's acceptable.
Lesson 1273SCA Tool Integration and Configuration
Policy drift
occurs when the actual security configuration diverges from your approved baseline—and it's one of the most dangerous forms of infrastructure drift.
Lesson 2026Drift Detection for Security Policies and Permissions
Policy Engine
The decision-making core that evaluates every access request against loaded security rules.
Lesson 1453SELinux Architecture and ComponentsLesson 2687Context-Aware Access Controls
Policy Evaluation
The broker checks user identity, device posture, location, and risk score against access policies
Lesson 2690Zero Trust Network Access (ZTNA) SolutionsLesson 3012Container and Image Scanning
Policy modification rights
Directly editing policies to grant themselves new permissions
Lesson 1753IAM Privilege Escalation Overview
Policy Refinement
involves adjusting detection thresholds and rules.
Lesson 1807False Positive Management and Tuning
Policy Rules
Statements like "allow httpd_t httpd_sys_content_t:file read;" that grant specific domains permission to perform specific actions on specific types.
Lesson 1453SELinux Architecture and Components
Policy Store
Contains Rego policies defining your rules
Lesson 3019Open Policy Agent (OPA) Introduction
Policy testing
verifying permissions work as intended without over-permissioning
Lesson 1690Identity and Access Management Boundaries
Policy Types
Specifies whether rules cover Ingress, Egress, or both
Lesson 1667Network Policies for Pod Isolation
Policy Version Manipulation
Using `iam:CreatePolicyVersion` on a managed policy can inject malicious permissions if you can set it as the default version.
Lesson 1755Policy Attachment and Modification Escalation
Policy violations
Block on specific issues like hardcoded secrets or missing authentication
Lesson 2052Security Gates and Failure Policies
Policy-Based
Central policy engine evaluates access requests
Lesson 2034Authentication and Authorization Design
Policy-Driven Detection
Unlike simple hash comparisons, Tripwire lets you define severity levels and customize what changes are acceptable (for example, log files changing is normal; `/bin/bash` changing is critical).
Lesson 1502Tripwire for File Integrity
Polymorphic deserialization
allows subclasses to be used wherever parent classes are expected—a normal programming feature.
Lesson 1189Type Confusion and Object Substitution
Polymorphic malware
Can change its signature to evade detection
Lesson 961Virus Scanning and Malware Detection Integration
Poor example
"Total security tools deployed" – doesn't indicate effectiveness or risk reduction.
Lesson 2526Designing Effective Security Metrics
POP Chains
(Property-Oriented Programming): Attackers chain together existing classes in your application, setting object properties to trigger a sequence of magic method calls that ultimately execute dangerous operations—file deletion, remote code execution...
Lesson 1187PHP Object Injection and Unserialize Attacks
Port Blocking
Firewalls or ISPs blocking UDP 1194 (default OpenVPN port).
Lesson 492Troubleshooting and Monitoring OpenVPN Connections
Port Forwarding
Redirect traffic through a compromised system to reach internal networks:
Lesson 2236Netcat and Socat for Network Pivoting
Port scan discovered hosts
Check common ports (22, 80, 443, 3306, 5432, 8080)
Lesson 886Internal Network Enumeration via SSRF
Port security
is a switch feature that restricts which MAC addresses can send traffic through a specific physical port.
Lesson 409Switch Port Security and DefensesLesson 414Port Security and MAC Filtering
Port specificity
Allow only the exact ports required (e.
Lesson 430Least Privilege Network Access
Portability
Platform authenticators are device-bound; lose your phone, and you'll need recovery options.
Lesson 752Platform and Roaming Authenticators
Ports
(which services to monitor)
Lesson 459Writing Effective IDS/IPS Rules
Position Independent Executables (PIE)
All iOS binaries support ASLR
Lesson 2709iOS Binary Protections and Runtime Security
Position physically close
to targets in cafes, airports, or outside office buildings
Lesson 534Evil Twin Attacks: Mechanics and Execution
Position yourself as MITM
using previously learned techniques (ARP poisoning, rogue gateway, etc.
Lesson 400Session Hijacking via MITM
Positioning
The attacker must place themselves in the network path between victim and target
Lesson 392Man-in-the-Middle Attack Fundamentals
Possession
, **Authenticity**, and **Utility**.
Lesson 14The Parkerian Hexad: Extending the CIA Triad
Possession factors
Magic links sent to verified email, authenticator app push notifications, or FIDO2 hardware keys (covered in lesson 744-745)
Lesson 750Passwordless Authentication FundamentalsLesson 1745Multi-Factor Authentication in Cloud IAM
Post
Post-exploitation modules for enumeration and persistence
Lesson 2193Metasploit Architecture and Components
POST requests
containing login forms with parameters like `username=` and `password=`
Lesson 378HTTP Traffic Analysis and Credential Extraction
Post-authentication MOTD
(Message of the Day): Shown after successful login via `/etc/motd`.
Lesson 1448SSH Banner, Logging, and Monitoring
POST-based CSRF
requires more sophistication because browsers don't automatically send POST requests when loading resources.
Lesson 848GET vs POST CSRF Attacks
Post-build
Dependency scanning and container image scanning check third-party components
Lesson 1395Security Testing in CI/CD Fundamentals
Post-deploy
Runtime monitoring feeds back into pipeline improvements
Lesson 2057Continuous Security Integration
Post-deployment checks
should be automated where possible and run immediately after deployment completes, ideally blocking traffic until validation passes for critical systems.
Lesson 2068Post-Release Security Validation
Post-Exploitation Tasks
Execute commands remotely, dump SAM/LSA secrets, retrieve domain password policies, or deploy modules for specific attacks like Mimikatz or BloodHound data collection.
Lesson 2239CrackMapExec for Network Enumeration
Post-processing violations
Adding DP noise then rounding results can destroy privacy guarantees.
Lesson 2921Practical Differential Privacy Implementation
Post-Release Security Validation
is the practice of verifying security controls in the live production environment immediately after deployment.
Lesson 2068Post-Release Security Validation
Post-rollback validation
Verify systems return to stable state
Lesson 1605Patch Rollback and Emergency Procedures
PostgreSQL
`version()`, `current_database()`
Lesson 572Database Fingerprinting via SQL Injection
Postman's security testing
, and specialized solutions like **42Crunch** or **StackHawk**.
Lesson 3013API Security Testing Automation
POSTROUTING
Changes source addresses (SNAT/Masquerade) after routing decisions
Lesson 441NAT and Masquerading with iptables
Potential Impact
What damage results if successful (e.
Lesson 64Creating STRIDE Threat Tables
PPLdump
to clone LSASS handles from protected contexts
Lesson 2120LSASS Memory Dumping and Protection Bypasses
PR.AC-1
(identity management), PCI-DSS **Requirement 8** (access control), and ISO 27001 **A.
Lesson 2617Framework Mapping and Harmonization
Pre-activation validation
Verify the key material is intact (correct format, not corrupted), properly encrypted in storage, and associated with the right metadata (key ID, algorithm, expiration)
Lesson 314Key Activation and Installation
Pre-authentication banner
(`Banner /etc/ssh/banner.
Lesson 1448SSH Banner, Logging, and Monitoring
Pre-built connectors
from EDR vendors
Lesson 1582EDR Integration with SIEM and SOAR
Pre-deployment gates
Final check before production release
Lesson 2063Release Gating Fundamentals
Pre-domain wildcard attacks
The server checks if the origin *ends with* a trusted domain (like `.
Lesson 880Pre-Domain Wildcard and Null Origin Attacks
Pre-merge gates
Block pull requests with security issues
Lesson 2063Release Gating Fundamentals
Pre-OS execution
means no security tools are running yet
Lesson 2759Firmware Fundamentals and Attack Surface
Pre-registration
Verifying expected visitors before arrival (name, company, purpose, host employee)
Lesson 2285Visitor Management and Temporary Access
Pre-Shared Key (PSK)
Both sides have the same secret password configured manually
Lesson 479Internet Key Exchange (IKE) Phase 1Lesson 514WPA2 Architecture and 4-Way Handshake
Pre-Shared Keys (PSK)
Both CoAP client and server hold the same secret key beforehand.
Lesson 2784CoAP Security with DTLS
Pre-trained Model Poisoning
Popular model hubs host millions of models.
Lesson 2823Supply Chain Poisoning in ML Pipelines
Precise age
→ collect age range (18-25, 26-35)
Lesson 2898Granular Data Collection
Precision
Unlike `X-Frame-Options`'s single-origin limitation, you can whitelist multiple specific domains.
Lesson 1136Content-Security-Policy frame-ancestors Directive
Precomposed form
(NFC): A single codepoint `U+00E9`
Lesson 1167Unicode Normalization and Equivalence
Predict future attacks
If they've used techniques X and Y, they'll likely use Z next
Lesson 2180Using ATT&CK for Threat Intelligence
Predictable capacity planning
for infrastructure
Lesson 1016Quota Management and Tiered Access Control
Predictable IP ranges
– Often use standard CIDR blocks (like `172.
Lesson 1813Default VPC Security Considerations
Predictable network path
– Eliminates unknown routing through third-party networks
Lesson 1841Direct Connect and Dedicated Connectivity
Predictable seeds
Using `time()` or process IDs as seeds allows attackers to guess or brute-force the starting state
Lesson 298CSPRNG Initialization and Seeding
Predictable session tokens
and authentication credentials
Lesson 292Randomness in Virtual Environments
Predictable storage and comparison
You always know exactly how much space a hash will take.
Lesson 204Fixed-Length Output Property
Predictable targeting
Attackers know default ranges and configurations
Lesson 1813Default VPC Security Considerations
Prefer `Object.assign()` with safeguards
or libraries like `lodash` with merge depth limits
Lesson 1051JavaScript Prototype Chain Security
Prefer short-lived tokens
with refresh mechanisms on the server
Lesson 1080Sensitive Data Handling and Storage Alternatives
Preflighted requests
require extra caution.
Lesson 859CORS Basics and Preflight Requests
Preimage Attack
An attacker has only a hash output `h` and tries to find *any* input `m` where `hash(m) = h`.
Lesson 212Preimage and Second Preimage Attacks
Preimage attacks
threaten password storage.
Lesson 212Preimage and Second Preimage Attacks
Preimage resistance
is a fundamental security property of cryptographic hash functions.
Lesson 199Preimage ResistanceLesson 200Second Preimage Resistance
Prepared Statements
pre-compile the query structure, then safely bind parameters.
Lesson 1236SQL Injection Review and Defense Fundamentals
Preprocessors
– Normalize and reconstruct traffic before analysis.
Lesson 458Snort: Architecture and Rule Syntax
PREROUTING
Changes destination addresses (DNAT) before routing decisions
Lesson 441NAT and Masquerading with iptables
PRESENT
is an ultra-compact 64-bit block cipher designed for hardware efficiency.
Lesson 2793Lightweight Cryptographic Algorithms
Present a fake AP
that only offers weaker security
Lesson 530Downgrade Attacks
Presentation Attacks
Face ID uses depth mapping and attention detection to prevent photo-based spoofing.
Lesson 2707Touch ID, Face ID, and Biometric Security
Presenting design artifacts
data flow diagrams, authentication flows, trust boundaries, cryptographic choices
Lesson 2036Security Architecture Review
Preserve chain of custody
Copy logs to a separate, isolated account with write-once-read-many (WORM) policies.
Lesson 1917Cloud Log Collection for Forensics
Pretext or story
explaining why action is needed
Lesson 2253Email-Based Phishing Fundamentals
Prevent default gateway override
Use `route-nopull` on the client to ignore server-pushed routes, then manually specify what you need
Lesson 491Client Configuration and Split Tunneling
Prevent replay attacks
using packet number tracking
Lesson 520Protected Management Frames (PMF)
Prevent traffic analysis
that correlates who talks to whom
Lesson 2982Introduction to Anonymity Networks
Preventing Enumeration
Never reveal whether an email/phone exists in your system.
Lesson 753Magic Links and One-Time Codes
Prevention
bad packages never reach staging or production
Lesson 1301Automated Package Verification Workflows
Prevention requires multi-layered validation
Lesson 963Polyglot Files and Multi-Format Attack Prevention
Prevention-First Approach
Unlike traditional AV that focuses on detection and removal, NGAV emphasizes **stopping threats before they execute**.
Lesson 1572Next-Generation Antivirus (NGAV)
Preventive + Technology A
Firewall rules blocking unauthorized networks
Lesson 2658Control Diversity: Types and Technologies
Preventive + Technology B
Application-layer authentication (separate from network auth)
Lesson 2658Control Diversity: Types and Technologies
PRF-AES128
Hardware-accelerated on some platforms
Lesson 481IPsec Cryptographic Algorithms and Cipher Suites
PRGA (Pseudo-Random Generation Algorithm)
After initialization, RC4 generates keystream bytes one at a time by swapping values in the S array and outputting bytes based on those swaps.
Lesson 116RC4: Design, Vulnerabilities, and Deprecation
Price × Quantity overflow
Order huge quantities of expensive items to trigger overflow, resulting in negative or minimal totals.
Lesson 926Integer Overflow in Financial Calculations
Primary Account Numbers (PANs)
during transmission
Lesson 2574Requirement 4: Encryption of Transmission
Primary control
Encrypt all customer data at rest.
Lesson 26Compensating Controls
Principal tags
Does this user have `CostCenter=Finance`?
Lesson 1998Tag-Based Access Control and Policy Enforcement
Print and store physically
in a safe location
Lesson 747Recovery and Backup Codes
Print-capture transformations
Color shifts, resolution loss, texture changes
Lesson 2814Physical World Adversarial Examples
Prioritization
means deciding which threats deserve immediate attention and which can wait.
Lesson 65Prioritizing STRIDE ThreatsLesson 1200History and Purpose of the OWASP Top 10
Prioritize and mitigate
before merging code
Lesson 79Threat Modeling During Development
Prioritize defenses
Focus detection on techniques common to groups targeting your sector
Lesson 2180Using ATT&CK for Threat Intelligence
Prioritize improvements
based on risk and threat intelligence
Lesson 2356Detection Coverage Measurement
Prioritize internet-facing apps
Browsers, email clients, and collaboration tools receive the most targeted attacks.
Lesson 2460Third-Party and Application Patching
Prioritize investments
based on foundational needs first (remember: Defense in Depth and building strong foundations)
Lesson 34Security Maturity Models and Assessment
Prioritize remediation
there—strengthening a weak link provides more security value than adding another strong layer
Lesson 30Weakest Link Analysis
Prioritize ruthlessly
High-severity findings with easy fixes come first.
Lesson 2164Remediation Recommendations
Prioritize top 5-10 risks
rather than overwhelming with detail
Lesson 2516Risk Analysis Documentation and Communication
Priority Manipulation
Attackers set all their streams to maximum priority, causing the server to constantly recalculate resource allocation.
Lesson 1098HTTP/2 Stream Vulnerabilities and Attacks
Priority order
(which rules evaluate first)
Lesson 1854WAF Rule Configuration and Custom Rules
Priority tagging
Clear marking of urgent vs.
Lesson 230924/7 Operations and Shift Management
Priority Value (PRI)
Encodes both facility and severity
Lesson 1475syslog Protocol and Standards
Privacy amplification
is the principle that combining many updates makes it exponentially harder to infer information about any single participant.
Lesson 2844Secure Aggregation and Privacy Amplification
Privacy as the Default
No user action required for privacy protection
Lesson 2879Introduction to Privacy by Design
Privacy auditing
is the practice of empirically measuring whether a model leaks private training data, rather than just trusting theoretical guarantees.
Lesson 2845Privacy Auditing and Empirical Measurement
Privacy breaches
Extracting sensitive information embedded in model parameters
Lesson 2827Model Extraction Attack Fundamentals
privacy budget
is the total amount of epsilon you can "spend" on a dataset before privacy guarantees degrade.
Lesson 2914Privacy Budget and EpsilonLesson 2918Composition Theorems
Privacy budget (ε, epsilon)
is your primary control knob.
Lesson 2842Privacy-Utility Tradeoffs
Privacy by Design
Apps receive no biometric information—only authentication results, preventing unauthorized data collection.
Lesson 2707Touch ID, Face ID, and Biometric Security
Privacy controls
Browsers and users can disable `Referer` headers for privacy, causing legitimate requests to fail or bypass checks entirely
Lesson 811Referer and Origin-Based Authorization Flaws
Privacy criterion
, you're committing to meet specific requirements around how personal information is collected, used, retained, disclosed, and disposed of.
Lesson 2596Privacy Criterion and GDPR Alignment
Privacy Embedded into Design
Integral part of system functionality, not an add-on
Lesson 2879Introduction to Privacy by DesignLesson 2885End-to-End Security and Lifecycle Protection
Privacy exposure
Precise data enables re-identification and profiling
Lesson 2898Granular Data Collection
Privacy Impact Assessment (PIA)
is a structured, systematic process for identifying and evaluating how a project, system, or initiative will affect the privacy of individuals whose data it handles.
Lesson 2887Privacy Impact Assessment FundamentalsLesson 2888PIA Triggers and Scoping
Privacy Rule
defines *what* PHI is and establishes patient rights (access, amendment, disclosure accounting).
Lesson 2581HIPAA Overview and Scope
Privacy-preserving analytics
Compute statistics across sensitive datasets from multiple organizations
Lesson 255Introduction to Secure Multi-Party Computation (MPC)Lesson 261Practical MPC Applications and Limitations
Privacy-preserving identity
Prove you're authorized without revealing which specific user you are (using techniques like ring signatures)
Lesson 247ZKP Applications in Authentication
Privacy-Preserving Record Linkage (PPRL)
applies cryptographic and privacy techniques you've already learned to enable matching without disclosure:
Lesson 2930Privacy-Preserving Record Linkage
Privacy-preserving transactions
Blockchain systems proving transaction validity without exposing amounts or parties (building on techniques like homomorphic encryption)
Lesson 2926Zero-Knowledge Proofs for Privacy
Privacy-safe transmission
(encrypted channels, authentication)
Lesson 2935Right to Access and Data Portability
Privacy-utility mismatch
Setting epsilon too low makes data useless; too high compromises privacy.
Lesson 2921Practical Differential Privacy Implementation
Private Directory
The app gets its own private storage directory (`/data/data/com.
Lesson 2713Android Application Sandboxing
Private Information Retrieval (PIR)
solves this by letting you retrieve a database record without the server learning which one you accessed.
Lesson 2928Private Information Retrieval
Private Link Service
lets you host applications behind a network load balancer and make them accessible to other accounts or VPCs through private endpoints—without traversing the public internet, VPC peering, or complex routing.
Lesson 1850Private Link Service for Custom Applications
Private mirrors
give you control over what enters your environment, filtering packages before they reach production training pipelines.
Lesson 2875Dependency Vulnerabilities in ML Frameworks
Private profiles
balance convenience with security: allow common services like network discovery and printer sharing, but block unsolicited inbound connections.
Lesson 1585Windows Firewall Configuration and Profiles
Private right of action
remains for data breaches ($100–$750 per consumer per incident)
Lesson 2568CPRA Amendments and Enforcement
Private Set Intersection (PSI)
uses cryptographic protocols—often building on secure multi-party computation or homomorphic encryption techniques you've learned—to compute the intersection without revealing non- overlapping elements.
Lesson 2925Private Set Intersection
Private subnet route tables
omit internet gateway routes, preventing direct inbound access from the internet
Lesson 1830Route Tables and Subnet Associations
Private voting
Votes are encrypted, tallied while encrypted, and only the final count is revealed.
Lesson 2924Homomorphic Encryption Applications
PrivateLink
and **private endpoints** from your previous lessons, you can extend secure connectivity beyond single-region, single-account boundaries:
Lesson 1851Cross-Region and Cross-Account Private Connectivity
PrivateTmp=yes
creates a unique, isolated `/tmp` directory for the service.
Lesson 1433Service Isolation with systemd
Privilege anomalies
A standard user suddenly accessing admin-only resources
Lesson 844Authorization Logging and Monitoring
Privilege Creep
measures accumulated permissions over time.
Lesson 2530Access Control and Identity Metrics
Privilege Escalation Chains
A compromised container in a multi-tenant environment presents a higher-value target.
Lesson 1631Multi-Tenancy Security Challenges
Privilege Escalation Flaw
lets authenticated users access admin functions
Lesson 2106Chaining Vulnerabilities for Impact
Privilege flags
`is_premium=false` → `is_premium=true`
Lesson 916Session State Tampering
Privilege levels
Moving from user mode to administrator/root access
Lesson 11Trust Boundaries and Implicit Trust
Privilege Separation
is the technical version: different parts of a system run with only the permissions they absolutely need, isolated from each other.
Lesson 7Separation of Duties and Privilege Separation
Privileged Containers
Running containers with the `--privileged` flag essentially disables most security boundaries, granting direct access to host devices and capabilities.
Lesson 1626Container Escape Vulnerabilities
Privileged orchestrator
Controls tool access, validates intent before execution
Lesson 2861Defense Strategies Against Prompt Injection
Privileged services
running as root/SYSTEM amplify impact if compromised
Lesson 1431Service Attack Surface Analysis
Privileges Required (PR)
Does the attacker need existing access?
Lesson 2444CVSS v3.1 Base Metrics
Pro tip
For intangibles, use historical breach costs, industry benchmarks, or legal settlements as reference points.
Lesson 2510Asset Valuation for Risk Analysis
Proactive alerts
When a new vulnerability is published, your tools can instantly check all SBOM records to identify affected applications—before attackers exploit them.
Lesson 1282SBOM Distribution and Consumption
Proactive not Reactive
Anticipate privacy risks before they materialize
Lesson 2879Introduction to Privacy by Design
Proactive privacy
means anticipating privacy risks during design and implementation phases, building safeguards into systems from the start, and continuously monitoring for emerging threats before they materialize.
Lesson 2881Proactive Not Reactive Privacy
Proactive refresh
means updating cached secrets before they expire:
Lesson 1334Secret Store Access PatternsLesson 1731Session Duration and Token Lifecycle
Probabilistic Signature Scheme (PSS)
is a modern RSA padding scheme specifically designed for digital signatures.
Lesson 148PSS: Probabilistic Signature Scheme
Probe requests
can be injected to test if your smuggled prefix affects subsequent requests from other users or connections.
Lesson 1114Testing and Tools for Request Smuggling
Probing
Using microscopic needles to tap into circuit traces and read data signals in real-time
Lesson 2775Physical Tampering and Anti-Tamper Mechanisms
Process behavior
– spotting privilege escalation attempts or container escapes
Lesson 1659Runtime Monitoring and Anomaly Detection
Process boundaries
Data passed between different programs or services
Lesson 11Trust Boundaries and Implicit Trust
Process Command-Line Auditing
isn't PowerShell-specific but captures the full command line of every process launched system- wide (Event ID 4688).
Lesson 1511PowerShell and Command-Line Logging
Process enumeration
(hiding malicious processes)
Lesson 1548System Call Hooking
Process Execution Events
– Every program that starts, including who launched it, when, with what parameters, and the full parent-child process tree.
Lesson 1575EDR Data Collection and Telemetry
Process ID
Specific process instance
Lesson 1475syslog Protocol and Standards
Process identity
which specific application is trying to communicate
Lesson 1584Host-Based Firewall Architecture and Purpose
Process injection
into legitimate processes
Lesson 2221Custom Payload Development
Process Injection Detection
Malware frequently injects malicious code into legitimate processes (like `explorer.
Lesson 2392Process and Thread Analysis
Process Isolation
The app runs in its own process with its own instance of the Dalvik/ART virtual machine
Lesson 2713Android Application Sandboxing
Process limits (PID limits)
restrict the number of processes, stopping fork bombs and process-table exhaustion attacks.
Lesson 1657Resource Limits and Isolation
Process Monitoring
Watch for unexpected processes or excessive resource consumption that indicates malicious binaries running.
Lesson 2802IoT Botnet Detection and Mitigation
Process states
Every running program, including hidden or injected malware
Lesson 2389Memory Forensics Fundamentals
Process the query
on the encrypted data without the server learning your selection
Lesson 2928Private Information Retrieval
Process-level granularity
You can restrict which applications can send/receive traffic
Lesson 1586iptables and nftables on Linux
Process-to-Socket Mapping
Linking network connections back to specific processes helps distinguish legitimate traffic from malware communication.
Lesson 2393Network Artifact Recovery
Processing Integrity
System processing is complete, valid, accurate, timely, and authorized.
Lesson 1978SOC 2 Trust Service CriteriaLesson 2591SOC 2 Overview and Trust Services Criteria
Produce propaganda
customized to cultural, political, or demographic groups
Lesson 2866Synthetic Text Generation and GPT-Based Misinformation
Product/business owners
accept documented risks
Lesson 2064Security Sign-Off and Approval Workflows
Production environments
for business-critical systems
Lesson 2648Network Segmentation Fundamentals
Production payment systems
(avoid business disruption)
Lesson 2091Scoping In-Scope vs Out-of-Scope Assets
Production with change windows
Use automated rollback with human approval gates
Lesson 2025Automated Drift Remediation Strategies
Professional info
occupation, employer size, industry
Lesson 2904Quasi-Identifiers and Re-identification Risk
Program management
Triage, validation, and deduplication of reports
Lesson 2071Introduction to Bug Bounty Programs
Program Maturity
Use frameworks like CMMI or NIST CSF maturity levels to show progression from reactive (Level 1) to optimized (Level 5) across security domains.
Lesson 3042Executive Security Reporting
Programmatic Access
Applications authenticate to AWS (using IAM roles, instance profiles, or Lambda execution roles) and call the Secrets Manager API to retrieve secrets at runtime.
Lesson 1328AWS Secrets Manager
Progress tracking
for user transparency
Lesson 2971Large File Transfer Security
Progressive delays
First failure = instant retry, third = 5 seconds, fifth = 30 seconds
Lesson 700Rate Limiting and Account Lockout Policies
Progressive Difficulty
Start with obvious phishing emails, then gradually increase sophistication as your organization improves, mirroring how real attackers adapt.
Lesson 2289Phishing Simulation Programs
Progressive disclosure
Show essential choices first, with "Learn more" links to detailed explanations.
Lesson 2933Consent Management Systems and UI Patterns
Progressive expansion
When legitimate access needs arise, add permissions incrementally.
Lesson 1706Least Privilege Principle in Cloud IAM
Progressive rollout
Expand to business applications with careful testing
Lesson 2688Microsegmentation Implementation Strategies
Prohibited Actions
Explicitly ban selling, retaining, or using data outside the stated purpose
Lesson 2567Service Provider and Third-Party Contracts
Prohibited activities
Downloading unauthorized software, accessing illegal content, sharing credentials, using personal cloud storage for company data
Lesson 2489Acceptable Use Policy (AUP)
Project
back into the epsilon-ball constraint
Lesson 2811Iterative Attacks: PGD and BIM
Project-based groups
`ProjectAlpha-Engineers`, `ProjectBeta-QA`
Lesson 1711IAM Groups: Organizing Users and Permission Sets
Promiscuous mode
changes this—your interface will capture *all* packets on the network segment it can see, not just those meant for your machine.
Lesson 375Wireshark Fundamentals and Interface Selection
Prompt injection
attacks manipulate the model by embedding malicious instructions in user input.
Lesson 2854LLM Architecture and Attack Surface
Prompt/instruction separation
Store system prompts outside the main context window, with architectural enforcement preventing user inputs from accessing or modifying them.
Lesson 2861Defense Strategies Against Prompt Injection
Proof
You generate a zero-knowledge proof demonstrating you possess the secret
Lesson 247ZKP Applications in AuthenticationLesson 1780Transit Encryption Monitoring and Compliance
Propagation
Track how data flows through variables, function parameters, and return values
Lesson 1381Data Flow Analysis and Taint Tracking
Property
| **Encryption** | **Hashing** |
Lesson 206Non-Reversibility and One-Way Property
Property Inference
targets the *entire dataset's* characteristics.
Lesson 2838Attribute Inference and Property Inference
Property-based
`if $programname == 'sshd' then /var/log/ssh.
Lesson 1476rsyslog Configuration and Filtering
Prosecutor risk
Probability an attacker targeting a specific individual succeeds
Lesson 2911Measuring and Testing Anonymization Effectiveness
Protected Health Information (PHI)
includes any individually identifiable health data—from medical records to billing information to patient communications.
Lesson 1981HIPAA and PHI in the Cloud
Protected key storage
that's physically isolated from your main systems
Lesson 306Hardware Security Modules (HSMs)
Protected Management Frames
to prevent deauthentication attacks at scale.
Lesson 545Enterprise Wi-Fi Deployment Architecture
Protected Management Frames (PMF)
introduced as optional in WPA2, mandatory in WPA3 — encrypts and authenticates management frames, preventing forgery.
Lesson 527Deauthentication and Disassociation Attacks
Protected Unless Open
(`NSFileProtectionCompleteUnlessOpen`): Files can stay open even after lock, but new files require unlock.
Lesson 2704Data Protection API and Keychain
ProtectHome=yes
makes `/home`, `/root`, and `/run/user` inaccessible to the service (or read-only with `ProtectHome=read-only`).
Lesson 1433Service Isolation with systemd
Protection from compromised users
is essential—even root can't violate MAC policies
Lesson 1450MAC vs DAC: Fundamental Differences
Protocol allowlist
Only permit safe schemes like `https://` and `http://`.
Lesson 894URL and Input Validation for SSRF Prevention
Protocol analysis
Detecting malformed packets or unusual TCP flags
Lesson 372Evading Intrusion Detection SystemsLesson 2197Auxiliary Modules and Scanning
Protocol analysis and reconstruction
is the process of taking fragmented packet captures and rebuilding them into coherent sessions, extracting files, and understanding what actually happened at the application layer (HTTP, FTP, SMTP, etc.
Lesson 2411Protocol Analysis and Reconstruction
Protocol Buffers
(protobuf), **MessagePack**, and **FlatBuffers** take a fundamentally different approach:
Lesson 1191Alternative Serialization Formats
Protocol distribution
What percentage is HTTP, DNS, SSH, etc.
Lesson 416Network Monitoring and Baselining
Protocol Flexibility
While SMB is primary, CME also supports WinRM, MSSQL, LDAP, and SSH protocols, making it versatile across mixed environments.
Lesson 2239CrackMapExec for Network Enumeration
Protocol Fuzzing
For TCP/UDP protocols, mutate packet structures while maintaining enough validity to reach deeper code paths.
Lesson 1391API and Protocol FuzzingLesson 2788Protocol-Level Attacks and Reconnaissance
Protocol gateways
Insert security-aware proxies that validate commands
Lesson 2787BACnet and Modbus Protocol Security
Protocol headers
IP addresses, version numbers, routing info
Lesson 129Associated Data in AEAD
Protocol leaks
DNS requests, timing patterns, unencrypted metadata
Lesson 2998Operational Security for Circumvention
Protocol mimicry
Make C2 look like DNS, HTTP, or other common protocols
Lesson 2223C2 Infrastructure Setup
Protocol Negotiation
Both HTTP/2 and HTTP/3 require TLS (HTTPS).
Lesson 1104Migrating Safely to HTTP/2 and HTTP/3
Protocol precision
Specify the exact protocols needed rather than "all traffic"
Lesson 430Least Privilege Network Access
Protocol Selection
Choose established protocols like TLS 1.
Lesson 2035Cryptographic Design Decisions
Protocol specifications
(network protocols, API contracts)
Lesson 1387Generation-Based Fuzzing
Protocol Version
SSH Protocol 1 has known design flaws and should never be used.
Lesson 1446SSH Protocol Version and Cipher Selection
Protocol violations
Malformed packets or unusual port usage
Lesson 382Identifying Malicious Traffic Patterns
Protocol vulnerabilities
in Modbus, DNP3, and proprietary industrial protocols designed without security
Lesson 2804SCADA Security and Air-Gap Myths
Protocol-relative URLs
`//evil.
Lesson 1142Open Redirect Attack Vectors
Protocol-specific probes
Sending HTTP GET requests, SSH handshakes, or database queries
Lesson 344Service Version Detection
Protocols
Create valid HTTP requests with contradictory headers or oversized field combinations
Lesson 1390Structured Input Fuzzing
provable security
schemes where we can mathematically demonstrate security properties.
Lesson 148PSS: Probabilistic Signature SchemeLesson 226RSA Signature Schemes (PKCS#1 v1.5 and PSS)
provenance
is the documented history of how a software package was built—who built it, from what source code, using which tools, and when.
Lesson 1300Package Provenance and SLSALesson 1643Base Image Selection and ProvenanceLesson 2873Training Data Integrity and Provenance
Provenance tracking
Verify data sources and reject untrusted contributions
Lesson 2826Defense Strategies Against Poisoning
Provenance Verification
Validate the key's origin and integrity post-import
Lesson 1771Bring Your Own Key (BYOK) and Key Import
Provide actionable guidance
Link to remediation advice, not just "SQL injection detected"
Lesson 1365Integrating SAST into Development Workflow
Provide actionable remediation guidance
prioritized by real risk
Lesson 2080What is Penetration Testing?
Provide clear recommendations
Not just "fix this," but prioritized next steps with realistic timelines and resource implications.
Lesson 2161Executive Summary Writing
Provide Context
An alert saying "Unusual API call detected" is useless.
Lesson 1896Cloud Alert Design Principles
Provide references
Link to vendor documentation, OWASP guidelines, or configuration examples.
Lesson 2164Remediation Recommendations
Provide similar risk reduction
(comparable effectiveness)
Lesson 26Compensating Controls
Provide visibility
across networks, endpoints, cloud environments, and applications
Lesson 2305What is a Security Operations Center (SOC)?
Provider Changes
Cloud platforms deprecate services, change default settings, or modify resource behavior—your IaC stays static while reality shifts.
Lesson 2022Infrastructure Drift: Causes and Risks
Provider terms of service
Defines what forensic actions you can perform
Lesson 1922Cloud Forensics Tools and Legal Considerations
Providing a common language
between technical teams and executives
Lesson 2497Risk Assessment Overview and Objectives
Provisioned concurrency
keeps function instances pre-warmed and ready, eliminating cold starts while also capping maximum scale.
Lesson 1956Concurrency Controls and Throttling
Proxies
act as middlemen between clients and servers.
Lesson 419Application Layer Firewalls and Proxies
Proxy
is your traffic control center.
Lesson 2205Burp Suite Architecture and Components
Proxy and firewall logs
gateway activity records
Lesson 2408Network Forensics Fundamentals
Proxy attacks
Hiring contractors or using compromised systems in third countries
Lesson 2337Threat Actors and Attribution
Proxy configuration
`--proxy=http://127.
Lesson 590SQLMap Evasion and Tampering Scripts
Proxy logs
reveal web requests, URLs visited, user agents, and response codes—essential for tracking command-and-control communication or data exfiltration attempts.
Lesson 2384Network Evidence Collection
Pseudo-header manipulation
Attackers might inject HTTP/1.
Lesson 1112HTTP/2 Downgrade and Smuggling
Pseudo-Random Number Generators (PRNGs)
are deterministic algorithms.
Lesson 284True vs Pseudo Random Number Generation
Pseudonymization
replaces identifying fields with artificial identifiers (pseudonyms) while keeping the ability to re- link data to individuals using separate information (like a key or mapping table).
Lesson 2902Anonymization vs. Pseudonymization
Pseudonymization and Tokenization
replace identifiers with reversible tokens, enabling data linkage without exposing identity directly.
Lesson 2922Overview of Privacy-Preserving Technologies
PSK
for home networks or small businesses with fewer than ~20 users.
Lesson 515WPA2-PSK vs WPA2-Enterprise
PSS (Probabilistic Signature Scheme)
is the modern approach.
Lesson 226RSA Signature Schemes (PKCS#1 v1.5 and PSS)
PST (Personal Storage Table)
files are Outlook's local archive format on Windows.
Lesson 2406Email and Communication Forensics
Psychological Acceptability
means designing security mechanisms that feel natural and reasonable to users.
Lesson 9Psychological Acceptability and Usable SecurityLesson 2669Psychological Acceptability
PTZ (Pan-Tilt-Zoom)
cameras cover wide areas but may miss events while repositioning.
Lesson 2284Video Surveillance and Monitoring
Public Agreement
Alice and Bob publicly agree on a common "base color" (yellow) that everyone can see.
Lesson 153Diffie-Hellman Key Exchange Fundamentals
Public archives
Wayback Machine, leaked databases, government records
Lesson 327OSINT Fundamentals and Information Sources
Public clients
(mobile apps, SPAs) cannot safely store secrets—users could extract them by inspecting the app.
Lesson 764OAuth 2.0 Client Authentication
Public Cloud Storage
Misconfigured AWS S3 buckets, Azure Blob containers, and Google Cloud Storage buckets can expose configuration files, backups, or deployment scripts containing secrets.
Lesson 1356Monitoring for Public Secret Exposure
Public Code Repositories
GitHub, GitLab, Bitbucket public repos are goldmines for accidental commits.
Lesson 1356Monitoring for Public Secret Exposure
Public comparison
They announce which *bases* they used (not the results)
Lesson 279QKD Fundamentals and BB84 Protocol
Public documents
(job postings, press releases) leak internal terminology and tools
Lesson 2254Spear Phishing and Targeted Attacks
Public enforcement actions
with transparent reporting
Lesson 2568CPRA Amendments and Enforcement
Public Exchange
Alice computes g^a mod p and sends it; Bob computes g^b mod p and sends his
Lesson 2941Key Exchange in E2EE Systems
Public exposure tolerance
Some platforms support fully private programs
Lesson 2480Bug Bounty Platform Ecosystem
Public key authentication
cryptographic proof using key pairs (recommended)
Lesson 1440SSH Protocol Fundamentals and Security Model
Public key distribution
your certificate travels with signed emails, so recipients learn your public key organically
Lesson 2958Email Encryption Fundamentals and S/MIME
Public Key Information
section contains two critical pieces:
Lesson 173Public Key Information and Algorithm Identifiers
Public key pinning
Pin just the public key (survives certificate renewal)
Lesson 2737Mobile Network Security
Public Mix
Alice mixes yellow + red = orange, and sends orange publicly.
Lesson 153Diffie-Hellman Key Exchange Fundamentals
Public Monitoring
Security researchers and domain owners monitor CT logs for unauthorized certificates
Lesson 189Certificate Transparency Logs Verification
Public Parameters
Both parties agree on public values (a large prime *p* and a generator *g*)
Lesson 2941Key Exchange in E2EE Systems
Public profiles
should be locked down: deny all inbound connections by default, only allowing explicitly approved applications to communicate.
Lesson 1585Windows Firewall Configuration and Profiles
Public subnet route tables
typically include a route to an internet gateway (`0.
Lesson 1830Route Tables and Subnet Associations
Public subnets
Internet-facing resources (load balancers, bastion hosts)
Lesson 1828Subnetting in Cloud VPCsLesson 1829Public vs Private Subnets
Public subnets by default
– All subnets have internet gateway routes, making resources potentially internet-facing
Lesson 1813Default VPC Security Considerations
Public Task
Required for official functions or tasks in the public interest (government agencies, regulatory bodies).
Lesson 2931Legal Bases for Data Processing
Public warning
if vendor is unresponsive or patch deployment will take significant time
Lesson 2477Handling Zero-Day and Active Exploitation
Public WiFi protection
On untrusted networks (coffee shops, airports), VPNs encrypt your traffic, preventing local attackers from intercepting sensitive data.
Lesson 471VPN Use Case: Privacy and Anonymity
Public Zone
Streets, parking lots—anyone can access
Lesson 2279Physical Access Control Models and Zones
Public-key approaches
Encrypting set elements so only matches decrypt properly
Lesson 2925Private Set Intersection
Public-Key Encrypted Session Key
packets (hold the encrypted symmetric key)
Lesson 2960OpenPGP Message Format and Operations
Publication
– Communicate policy through training, intranet, and onboarding
Lesson 2494Policy Development and Approval Process
PublicKey
The other peer's public key (for authentication)
Lesson 494WireGuard Peer Configuration and Key Management
Publisher generates hash
When a package author publishes version 1.
Lesson 1293Package Integrity and Checksums
Publisher rules
Based on digital signatures (most secure and maintainable)
Lesson 1593Windows AppLocker
Publishing
The signature is stored with metadata pointing to the image
Lesson 1297Container Image Verification
PUFs
provide a revolutionary defense: they exploit microscopic manufacturing variations in silicon that are inherently random and cannot be duplicated, even by the original manufacturer.
Lesson 2777Hardware Cloning and Counterfeit Prevention
Pulse jamming
Intermittent bursts disrupting transmissions
Lesson 551RF Spectrum Monitoring
Pulumi
Uses general-purpose languages (Python, JavaScript)
Lesson 2012Infrastructure as Code Fundamentals and Security Implications
Puppet
and **Chef** use agent software installed on each endpoint that periodically "pulls" the desired configuration from a master server and enforces it locally.
Lesson 1619Configuration Management Tools
Purchase flows
Bots buying limited inventory faster than humans can react
Lesson 1032API6:2023 - Unrestricted Access to Sensitive Business Flows
Purchase Process Manipulation
A shopping cart checks payment in step 2 but doesn't verify it again before order confirmation in step 4.
Lesson 808Multi-Step Process Authorization Failures
Pure brute-force
works when you have no intelligence about the password format but know it's short (typically 6-8 characters maximum due to time constraints).
Lesson 2229Brute-Force and Mask Attacks
Pure sequential
`user_id=500`, `501`, `502`.
Lesson 814Sequential and Predictable Identifiers
Purple team collaboration
Often involves real-time coordination with defenders
Lesson 2171Adversary Emulation vs Penetration Testing
Purple teaming
fills this gap by fostering direct collaboration during security exercises rather than keeping offensive and defensive efforts siloed.
Lesson 2168Purple Team: Bridging Red and Blue
Purple Teams
Test whether defenses catch not just *any* credential dumping, but the *specific methods* adversaries actually use
Lesson 2179Techniques and Sub-techniques
Purpose documentation
Logging the reason for visit and intended areas of access
Lesson 2285Visitor Management and Temporary Access
Purpose Specification
Clearly articulate specific, explicit, and legitimate purposes *before* or at the point of collection
Lesson 2895Purpose Specification and Limitation
PUT /api/orders/5678
Modify or cancel another user's order
Lesson 817IDOR in REST APIs and GraphQL

Q

Qiling Framework
Python-based multi-architecture emulator with instrumentation hooks
Lesson 2767Firmware Emulation and Dynamic Analysis
QoS 2 (Exactly once)
Highest overhead, guaranteed single delivery
Lesson 2781MQTT Security Architecture
QR Code Authentication
When logging into a website on your laptop but your passkey is on your phone, the site displays a QR code.
Lesson 754Passkeys and Cross-Device Authentication
QR Code Security
That QR code contains the raw secret seed.
Lesson 743Authenticator Apps and Seed Management
Quality
answers: "Are our threat models good?
Lesson 84Measuring Threat Modeling Effectiveness
Quality bonuses
for exceptional reports with PoCs and remediation advice
Lesson 2482Bounty Pricing and Reward Structures
Quality Updates
(non-security improvements) versus **Security Updates** (vulnerability fixes).
Lesson 1600Types of Patches and Updates
Quantify likelihood
Use threat intelligence, exploitability metrics, and historical data to assign probability to each threat scenario
Lesson 2514Threat Modeling Integration with Risk Analysis
Quantum effects
in semiconductors
Lesson 294Entropy Sources and Collection
Quantum-resistant
Secure against both classical and quantum attacks
Lesson 271CRYSTALS-Dilithium: Post-Quantum Digital Signatures
Quarantine
Move suspicious files to safe storage before they spread
Lesson 3048Security Incident Auto-Response
Queries the model
with that data point
Lesson 2837Membership Inference Attacks
Query access only
The attacker can send inputs and receive predictions (black-box setting)
Lesson 2827Model Extraction Attack Fundamentals
Query builders
Safe when using their parameter methods, unsafe when concatenating
Lesson 1234Database API Safety and ParameterizationLesson 1240ORM Query Builder Security
Query complexity
`users { friends { friends { friends {.
Lesson 999GraphQL Architecture and Security Implications
Query cost analysis
assigns a numerical "cost" to each field based on its resource intensity.
Lesson 1002Query Cost Analysis and Rate Limiting
Query interfaces
to search millions of log entries
Lesson 1869Cloud Logging Architecture and Service Overview
Query operators
In MongoDB, queries use JSON objects.
Lesson 594NoSQL Database Fundamentals and Attack Surface
Query Parameter Manipulation
Test filters and search parameters like `/api/users?
Lesson 836API Authorization Testing
Query strategically
Send inputs where all features are zero except one (basis vectors).
Lesson 2829Equation-Solving Attacks on Linear Models
Query string tokens
(less secure): `wss://example.
Lesson 1069WebSocket Authentication and Authorization
Querying the model
with different inputs
Lesson 2839Model Inversion Attacks
Question every assumption
Can steps be skipped?
Lesson 936Business Logic Testing Fundamentals
Question every data flow
(the arrows):
Lesson 44Identifying Threats from Diagrams
Quick decision criteria
When to rollback vs.
Lesson 1605Patch Rollback and Emergency Procedures
Quota exhaustion attacks
where malicious code fills storage to trigger eviction
Lesson 1079Storage Quota and Eviction Policies
Quota Manipulation
If a service limits 100 downloads per day but tracks this client-side or in a cookie, an attacker simply resets that value to bypass the restriction.
Lesson 941Testing Limits and Constraints

R

RA Guard
Configured on switches to block rogue Router Advertisements from unauthorized ports
Lesson 391IPv6 Neighbor Discovery and Spoofing Parallels
RACI matrices
prevent confusion: who is Responsible, Accountable, Consulted, and Informed.
Lesson 2064Security Sign-Off and Approval Workflows
Radio Layer
Physical transmission using 2.
Lesson 555Bluetooth Architecture and Security Model
RADIUS server
behind the scenes making authentication decisions.
Lesson 544RADIUS Server Configuration and Security
RadSec
(RADIUS over TLS) whenever possible to encrypt the entire RADIUS session, protecting usernames, attributes, and metadata.
Lesson 544RADIUS Server Configuration and Security
rainbow table
is a massive precomputed database that maps millions or billions of common passwords to their hash values.
Lesson 685Rainbow Tables and Why Simple Hashing FailsLesson 697Rainbow Tables and Pre- computed Hash Attacks
RAM remanence
memory chips retain data briefly after power loss.
Lesson 2382Memory Acquisition Techniques
Random
Generated using a cryptographically secure random number generator
Lesson 140Salts in Key Derivation
Random access
Need to decrypt just one block in the middle?
Lesson 98CTR Mode: Turning Block Ciphers into Streams
Random and unpredictable
Use cryptographically secure random generation (128+ bits)
Lesson 1009API Key Authentication: Design and Security
Random bytes
(at least 8 bytes) make each encryption unique
Lesson 145RSA Padding Schemes: PKCS#1 v1.5
Random input transformations
Apply random cropping, resizing, or padding before classification
Lesson 2852Ensemble and Randomization Defenses
Random number generation
High-quality entropy for cryptographic operations
Lesson 2771Hardware Root of Trust and TPM
Random Private Addresses
change periodically (typically every 15 minutes).
Lesson 557BLE Privacy and Address Randomization
Random User-Agent rotation
`--random-agent` disguises SQLMap traffic as various browsers
Lesson 590SQLMap Evasion and Tampering Scripts
Randomization
Protects against subtle cryptanalytic attacks
Lesson 148PSS: Probabilistic Signature Scheme
Randomize delays
slightly to obscure timing patterns
Lesson 1949Serverless Cold Start and Timing Side Channels
Randomize timing
between different target ranges
Lesson 373Anti-Detection Best Practices
Randomized smoothing
Add noise to inputs and use statistics to bound prediction stability
Lesson 2848Certified Defenses and Provable Robustness
Randomness injection
OAEP adds random data to your message before encryption
Lesson 146OAEP: Optimal Asymmetric Encryption Padding
Range
Numeric inputs should fall within logical boundaries.
Lesson 1153Data Type and Format Validation
Range compression
A "High" risk might represent wildly different actual exposures
Lesson 2500Risk Calculation and Risk Matrices
Range constraints
Is the quantity between 1 and 999?
Lesson 1154Semantic and Business Logic Validation
Ransomware Trojans
Encrypt files and demand payment
Lesson 1521Trojans: Deceptive Functionality
Rapid correlation
Join events across services by common fields like `user` or `session_id`
Lesson 1472Structured vs Unstructured Logging
Rapid execution
Functions fire and complete quickly, making detection harder
Lesson 1960Injection Vulnerabilities in Serverless
Rapid propagation
can infect entire networks in minutes
Lesson 1520Worms: Autonomous Network Propagation
Rapid Response Team
Designate on-call security engineers, developers, and operations staff who can mobilize immediately.
Lesson 2069Vulnerability Response and Hotfix Process
Rapid role assumption
patterns suggesting credential testing
Lesson 1735Credential Theft and Token Security
Rapid threat intelligence integration
Verify the threat is real, exploited, and affects your environment
Lesson 2459Emergency and Out-of-Band Patching
Rapid vulnerability response
Know immediately if CVE-2023-XXXX affects your systems
Lesson 1276What is an SBOM and Why It MattersLesson 1646Software Bill of Materials (SBOM) for Containers
Rapid7 InsightIDR
User-behavior focused with integrated threat intelligence
Lesson 2324Common SIEM Platforms and Vendor Landscape
Rare updates
– many devices ship with vulnerable firmware that never gets patched
Lesson 2759Firmware Fundamentals and Attack Surface
Ratcheting
Keys evolve forward, making it impossible to work backward even if one key leaks
Lesson 2943Forward Secrecy in E2EE
Rate Limit Bypass
Rate limits might check requests per IP address.
Lesson 941Testing Limits and Constraints
Rate Limiting and Blackholing
Drop traffic to/from known C2 infrastructure; rate-limit outbound connections to prevent participation in attacks.
Lesson 2802IoT Botnet Detection and Mitigation
Rate Limiting Integration
(from lesson 1858) throttles suspicious patterns—for example, blocking IPs making 100 login attempts per minute.
Lesson 1859Bot Management and Detection
Rate monitoring
Flagging rapid connection attempts that suggest scanning
Lesson 372Evading Intrusion Detection Systems
Raw (.dd, .raw)
exact sector-by-sector copy, largest file size
Lesson 2399Disk Imaging and Write Blocking
Raw (DD/IMG)
The simplest format—a bit-for-bit copy of physical memory with no compression or metadata.
Lesson 2391Memory Image Formats and Validation
Raw database APIs
Use placeholder syntax (?
Lesson 1234Database API Safety and Parameterization
Raw public key mode
Skip certificates entirely in TLS/DTLS, exchanging only public keys (SPKI format)
Lesson 2792Certificate-Based Authentication in Constrained Devices
Raw Public Keys (RPK)
A middle ground using just the public key without the full certificate overhead.
Lesson 2784CoAP Security with DTLS
Raw SQL builders
Any API that directly splices user input into query text
Lesson 1234Database API Safety and Parameterization
Raw SQL queries
Many ORMs let you execute raw SQL strings—if you concatenate user input here, you're vulnerable
Lesson 1238ORM Security Fundamentals
RBAC (Role-Based Access Control)
is the gatekeeper that determines which users or processes can perform specific actions on cluster resources.
Lesson 1969Kubernetes RBAC and Service Accounts
RBAC (Role-Based)
excels in organizations with clear job functions (HR managers, sales reps).
Lesson 802Choosing and Implementing Access Models
RBAC + ABAC
Assign base permissions by role, then refine with attributes (only during business hours)
Lesson 802Choosing and Implementing Access Models
RBAC + ReBAC
Roles define general access, relationships control specific resources (team documents)
Lesson 802Choosing and Implementing Access Models
RBAC boundaries
Limit API server permissions; overly permissive RBAC can allow privilege escalation to read Secrets directly
Lesson 1668Securing etcd and Secrets Management
RBAC policies
and access controls
Lesson 1682Container as a Service Security
Re-encode files
on the server side to remove hidden content
Lesson 963Polyglot Files and Multi-Format Attack Prevention
Re-encoding or conversion
to neutralize threats
Lesson 982Multi-Layer File Upload Validation Strategy
Re-encrypt during copy
The backup must be decrypted using the source region's key, then re-encrypted with a key from the destination region
Lesson 1798Encrypted Backups and Snapshots
Re-encryption
Some databases automatically re-encrypt with new keys; others require manual intervention
Lesson 1797Key Management for Database Encryption
Re-evaluate trust boundaries
and attack surface
Lesson 2644Iterating Threat Models with Architecture Changes
Re-execute original tests
Run the exact same exploitation attempts that previously succeeded
Lesson 2166Retest and Validation Process
Re-identification Risk
measures how easily an attacker could link anonymized records back to individuals.
Lesson 2911Measuring and Testing Anonymization Effectiveness
Re-sign
Generate a new signature (since you don't have the original developer's private key)
Lesson 2731Repackaging and Code Injection Attacks
Reach high-value targets
like domain controllers, financial systems, or executive accounts
Lesson 2150Lateral Movement Fundamentals and Objectives
Reachability
Is the vulnerable code actually used?
Lesson 1274Interpreting SCA Results
Reachability analysis
(is the vulnerable code path actually used?
Lesson 3028Dependency Scanning and SCA
Reachability Analyzer
tool to simulate paths between resources and identify where blocking occurs.
Lesson 1826Common Misconfigurations and Troubleshooting
React JSX
`{expression}` (though React has better default protections)
Lesson 681Template Injection in Client-Side Frameworks
Read access
Subject's clearance must **dominate** the object's label (equal or higher level, plus all required categories)
Lesson 1451Security Labels and ClearancesLesson 1875Log Encryption and Access Controls
Read all cookies
(including session tokens, unless marked `HttpOnly`)
Lesson 634JavaScript Execution Contexts in XSS
Read arbitrary files
Upload a symlink pointing to `/etc/shadow`, then request the uploaded "file" through the web interface to read protected system files.
Lesson 969Symbolic Link Attacks
Read sensitive configuration files
(database credentials, application secrets)
Lesson 589SQLMap Advanced Exploitation Features
Read the Changelog
Before updating, review what changed between versions.
Lesson 1266Dependency Update Strategies and Patching
Read the CSRF token
directly from the page (something external sites can't do due to same-origin policy)
Lesson 642Cross-Site Request Forgery via XSS
Read-only filesystems
Prevent modifications to critical system areas
Lesson 2862LLM Output Validation and Sandboxing
Read-only modes
Query enrichment data without triggering responses
Lesson 2332Playbook Testing and Validation
Readiness assessments
Conduct quarterly mini-audits to catch gaps early
Lesson 2599SOC 2 Reports and Continuous Compliance
Real UID/GID
Who you actually are (the user who started the process)
Lesson 2139Linux Privilege Model and Escalation Fundamentals
Real-Time Alerting
notifies security teams immediately when policy violations occur.
Lesson 1992Continuous Compliance MonitoringLesson 2635Compromise Recording and Auditability
Real-time alerts
Notifications when potential secrets matching your organization appear
Lesson 1356Monitoring for Public Secret Exposure
Real-time communication matters
Voice calls, video streams, or IoT sensors where data arrives continuously and latency is critical
Lesson 121Stream Ciphers vs Block Ciphers: When to Use Each
Real-time escalation
for critical findings or incidents
Lesson 2095Testing Windows and Schedules
Real-time knowledge sharing
Red teamers explain their attack techniques *during* execution
Lesson 2168Purple Team: Bridging Red and Blue
Real-time note-taking
is non-negotiable.
Lesson 2087Documentation and Note-Taking
Real-time streaming
to SIEM tools or detection systems
Lesson 1869Cloud Logging Architecture and Service Overview
Real-world analogy
Imagine a library that checks your membership card once when you enter, then lets you access any restricted archive without further checks.
Lesson 2665Complete MediationLesson 2976Traffic Analysis and Correlation Attacks
Real-world applications
Autonomous vehicles, malware detection, biometric systems
Lesson 2819Label Flipping and Targeted Poisoning
Real-world disaster
In 2008, Debian's OpenSSL package had a bug that severely limited entropy.
Lesson 292Randomness in Virtual Environments
Real-world example
The famous "ECB Penguin" demonstration shows what happens when you encrypt an image using ECB mode.
Lesson 95ECB Mode: Structure and Fatal Weaknesses
Real-world risk
Many security cameras, routers, and medical devices have been compromised through forgotten debug ports.
Lesson 2776Debug Interfaces and JTAG Security
Realistic scenario
Follow actual attack chains and TTPs from threat intelligence
Lesson 2171Adversary Emulation vs Penetration Testing
Reaver
exploits this by systematically trying all possible PIN combinations, receiving feedback after each attempt.
Lesson 526WPS PIN Attacks
ReBAC (Relationship-Based)
fits social platforms and collaboration tools where access depends on connections (friends, team members).
Lesson 802Choosing and Implementing Access Models
Rebinding occurs
The attacker's DNS server now returns a malicious internal IP (`127.
Lesson 890DNS Rebinding Attacks
Receive the secret values
directly into application memory
Lesson 1339Application-Level Secret Retrieval
Received and removed
(inventory tracking)
Lesson 2585HIPAA Security Rule: Physical Safeguards
Receives requests
from anywhere in your application
Lesson 841Centralized Authorization Logic
Reception/Lobby Zone
First controlled entry point
Lesson 2279Physical Access Control Models and Zones
Recipient must be known
for delivery routing
Lesson 2954Sealed Sender and Sender Anonymity
Recipient uncertainty
"Can they even read encrypted email?
Lesson 2965Usability Challenges and Key Management UX
Recipient Validation
The assertion should specify the intended recipient (SP).
Lesson 780SAML Response Replay and Reuse
Recognize top contributors
publicly when they consent—through hall-of-fame pages, social media shout-outs, or special badges.
Lesson 2484Managing Researcher Relationships
Recognize trust boundaries early
– Where does user data enter?
Lesson 77Threat Modeling in Requirements Phase
Recommend clear actions
with cost and timeline
Lesson 2516Risk Analysis Documentation and Communication
Recommend removals
Suggest specific permissions to revoke based on real usage data
Lesson 1749Access Analyzer and Unused Access Detection
Recommendations
for targeted training based on specific failure patterns
Lesson 2252Social Engineering Reporting and Metrics
Recommended treatments
Accept, mitigate, transfer, or avoid
Lesson 2516Risk Analysis Documentation and Communication
Recompile
Rebuild the app with your modifications
Lesson 2731Repackaging and Code Injection Attacks
Reconnaissance scans
Short-lived connections to many ports across multiple hosts
Lesson 2410Network Flow Analysis
Reconstruct the timeline
(you've already built this during investigation)
Lesson 2432Post-Incident Review and Lessons Learned
Reconstruction
Combine at least t shares to recover the original secret
Lesson 321Secret Sharing Fundamentals
Records proving controls operate
(logs, tickets, approval forms)
Lesson 2607ISMS Documentation Requirements
Records the attack surface
– Builds a complete map of URLs, parameters, and inputs
Lesson 1371Crawling and Application Discovery
Recovery codes
Services provide one-time backup codes during setup.
Lesson 743Authenticator Apps and Seed Management
Recovery controls
restore systems and data after incidents.
Lesson 27Security Control Types
Recovery costs
Restoration time and resources
Lesson 2501Asset Identification and Valuation
Recovery guidance
Restoration procedures and validation checks
Lesson 2372IR Playbooks and Runbooks
Recovery key capture
BitLocker keys may be escrowed to Active Directory or backed up
Lesson 2407Anti-Forensics Detection and Encrypted Volumes
Recovery Point Objective (RPO)
specifies acceptable data loss.
Lesson 1333High Availability and Disaster Recovery
Recovery Time Objective (RTO)
defines how quickly you need to restore service.
Lesson 1333High Availability and Disaster Recovery
red team
is an independent security group that simulates real-world adversaries to test an organization's detection and response capabilities.
Lesson 2169Red Team Operations and ObjectivesLesson 2173Detection Engineering and Testing
Red Team Planning
Mark techniques you've successfully tested to show leadership where defenses were validated versus assumed.
Lesson 2183ATT&CK Navigator and Visualization
Red teaming
is like hiring professional burglars to test your entire security operation—not just the locks.
Lesson 2085Penetration Testing vs Red Teaming
Red Teams
Choose realistic adversary behaviors to emulate
Lesson 2179Techniques and Sub-techniques
Red/yellow/green indicators
for critical risk areas
Lesson 2533Communicating Metrics to Leadership
Redact credentials
and tokens from all error logs
Lesson 1958Dead Letter Queues and Error Handling
Redemption Logic Flaws
Manipulating the order of operations—applying a discount before taxes versus after, or exploiting timing windows where validation occurs separately from actual discount application.
Lesson 922Coupon and Discount Code Abuse
Redirect HTTP/HTTPS traffic
using firewall rules (`iptables` NAT rules on Linux)
Lesson 399HTTP Proxy and Transparent Interception
Redirect URI manipulation
(mitigated by exact matching)
Lesson 768OAuth 2.0 Security Best Practices
Redirects
or shows an error message ("wrong password, try again")
Lesson 640Phishing via XSS Injection
Redirects and URLs
in responses can enable SSRF attacks within your infrastructure
Lesson 1036API10:2023 - Unsafe Consumption of APIs
Redis/Memcached
Dedicated in-memory data stores.
Lesson 705Session Storage Mechanisms: Server-Side vs Client-Side
Reduced audit fatigue
one set of evidence serves multiple assessments
Lesson 2617Framework Mapping and Harmonization
Reduced False Positives
By correlating multiple detection methods and cloud reputation data, NGAV systems make more informed decisions, addressing the tuning challenges discussed in lesson 1571.
Lesson 1572Next-Generation Antivirus (NGAV)
Reduced forensic footprint
Old conversations can't be recovered from seized devices
Lesson 2956Disappearing Messages and Perfect Forward Secrecy
Reduced handshake
1-RTT (round-trip time) instead of 2-RTT, cutting connection setup latency in half.
Lesson 2795DTLS and TLS 1.3 for IoT
Reduced mean-time-to-detect
through cross-source correlation
Lesson 1582EDR Integration with SIEM and SOAR
Reduces attack surface
fewer entry points mean fewer vulnerabilities
Lesson 29Security Choke PointsLesson 2627Principle of Least Privilege
Reduces permission sprawl
Without groups, admins often grant users direct permissions "just to get things done," creating a messy, insecure configuration over time
Lesson 1428Group Management and Role Separation
Reduces scope
Only systems in the CDE need the strictest controls
Lesson 453Segmentation for Compliance
Reducing alert fatigue
through automated triage
Lesson 2325Introduction to SOAR Platforms
Reducing packet rate
to match typical network behavior
Lesson 368Timing and Rate Limiting for Evasion
Redundancy
means having backup security controls—if one fails, another catches the threat.
Lesson 28Redundancy and Diversity in SecurityLesson 425High Availability and Clustering
Redundancy and Resilience
Are single points of failure eliminated through backup systems, load balancing, and geographic distribution?
Lesson 2593Availability Criterion
Refactor away
Rewrite functionality using safer, maintained dependencies
Lesson 1267Unmaintained Dependencies and End-of-Life Libraries
Referer can be missing
Users/browsers may suppress it for privacy
Lesson 869Origin and Referer Validation
Referral programs
Automated abuse of reward systems
Lesson 1032API6:2023 - Unrestricted Access to Sensitive Business Flows
Referrer checks
validate the `Referer` HTTP header to ensure requests originate from your legitimate web pages, not hotlinked from external sites.
Lesson 1866CDN Access Control and Token Authentication
Refine your scan configuration
by improving authentication handling, adjusting crawler scope, and fine-tuning detection rules based on your application's specific behavior.
Lesson 1375False Positive Management in DAST
Reflected XSS
(where the attack happens immediately and affects only one victim), **Stored XSS** (also called Persistent XSS) occurs when an attacker's malicious script gets **saved** into a web application's database, file system, or other storage.
Lesson 631Stored XSS: Persistent Attacks
Reflecting any origin
Server echoes the request's `Origin` header back, trusting everyone
Lesson 874CORS Fundamentals and Same-Origin Policy Relaxation
Reflective loading
directly into RAM without touching disk
Lesson 2221Custom Payload Development
Refresh Token Grant
lets you exchange a long-lived refresh token for new access tokens without re-authenticating the user.
Lesson 757OAuth 2.0 Grant Types
refresh token rotation
each time you use a refresh token, the server issues a *new* refresh token and invalidates the old one, limiting replay attack windows.
Lesson 760OAuth 2.0 Tokens: Access and RefreshLesson 1093Cross-Origin Authentication and iframe Security
Refresh tokens
are longer-lived credentials (days to months) used solely to request new access tokens.
Lesson 760OAuth 2.0 Tokens: Access and Refresh
Refund manipulation
Request refunds that underflow balance checks, granting undeserved credits.
Lesson 926Integer Overflow in Financial Calculations
Refund Process Abuse
An attacker purchases an item, receives it, then exploits a flaw to obtain a refund *without* returning the product.
Lesson 925Refund and Credit Manipulation
Regional Evidence Collection
Ensure your forensic tools can operate across regions.
Lesson 1912Multi-Account and Cross-Region IR
Regional Internet Registries (RIRs)
track who owns what:
Lesson 336ASN and IP Range Discovery via Public Sources
Regional redundancy
Peer VPCs in different regions for disaster recovery architectures
Lesson 1836VPC Peering Fundamentals
Registrant information
Organization name, contact email, phone (often privacy-protected now, but not always)
Lesson 329WHOIS and Domain Registration Intelligence
Registrar details
Which company manages the domain registration
Lesson 329WHOIS and Domain Registration Intelligence
Registration dates
When the domain was created, updated, and expires
Lesson 329WHOIS and Domain Registration Intelligence
Registry
Windows stores password hashes in the SAM (Security Account Manager) database and cached domain credentials.
Lesson 2157Credential Harvesting for PivotingLesson 3029Container Image Scanning
Registry access
(hiding persistence keys)
Lesson 1548System Call Hooking
Registry Auto-Run Keys
Keys like `HKLM\Software\Microsoft\Windows\CurrentVersion\Run` specify programs to launch at startup.
Lesson 2134Scheduled Tasks and Startup Persistence Exploitation
Registry Changes
– Windows registry key and value modifications, crucial for detecting persistence mechanisms you learned about (scheduled tasks, startup entries, service modifications).
Lesson 1575EDR Data Collection and Telemetry
Registry Hives in Memory
Major hives (SYSTEM, SOFTWARE, SAM, NTUSER.
Lesson 2396Registry and File System in Memory
Registry Key Hijacking
If a service reads configuration from a registry key with weak permissions, you can modify values like `ImagePath` (the executable the service runs) to point to your malicious binary.
Lesson 2133Registry and File System Permission Weaknesses
Registry modifications
on Windows systems enable persistence through Run keys (`HKLM\Software\Microsoft\Windows\CurrentVersion\Run`), which execute programs at user login, or more subtle entries like COM hijacking that trigger on specific system events.
Lesson 2118Maintaining Access and Persistence Mechanisms
Registry Storage
– Images pushed to public or private registries.
Lesson 1642Container Image Supply Chain Overview
Registry-integrated scanning
embeds vulnerability detection directly into your container registry workflow.
Lesson 1636Registry-Integrated Scanning
RegistryEvent (Event IDs 12-14)
Tracks registry key and value creation, deletion, and modification.
Lesson 1514Sysmon File and Registry Activity Monitoring
Rego language
to define rules that can automatically validate cloud resources against your compliance requirements.
Lesson 1991Compliance as Code with Open Policy Agent
Regression fuzzing
replays known crash-inducing inputs to ensure fixes stay fixed.
Lesson 3014Automated Fuzzing in CI/CD
Regression Testing
Maintain a suite of tests that run automatically whenever policies change.
Lesson 3024Policy Testing and Validation
Regular Auditing
Monitor registered service workers and unregister suspicious ones.
Lesson 1082Service Worker Registration and Hijacking
Regular backups
create point-in-time snapshots of your encrypted secret data.
Lesson 1333High Availability and Disaster Recovery
Regular credential rotation
and audit logging
Lesson 2436Authenticated Scanning and Credentialed Checks
Regular Updates
Keep WAF signatures current and monitor emerging bypass techniques from threat intelligence feeds.
Lesson 1855WAF Evasion Techniques and Defense
Regular users
with standard access
Lesson 834Testing Multi-User Scenarios
Regularly review exceptions
to ensure they remain valid
Lesson 1614False Positive Management
Regulatory and Compliance Needs
What laws, standards, or frameworks apply?
Lesson 2028Security Requirements Elicitation
Regulatory and compliance requirements
Many frameworks (GDPR, HIPAA, PCI DSS) mandate encryption at rest to protect sensitive information.
Lesson 1763Understanding Encryption at Rest Fundamentals
Regulatory consequences
Compliance violations, penalties
Lesson 2501Asset Identification and Valuation
Regulatory Disclosures
follow strict formats and timelines.
Lesson 2428External Communication and Disclosure
Regulatory trigger
(breach notification thresholds)
Lesson 2361Incident vs Event: Defining the Threshold
Reject
Actively sends an error response (TCP RST or ICMP unreachable) back to the sender.
Lesson 462IPS Blocking Actions and ResponseLesson 1211Never Trust User Input
Reject mismatches
when header and content disagree
Lesson 956Content-Type Header Validation and Mismatches
Reject suspicious patterns
like `<!
Lesson 626XXE Defense in Depth
Rejected connections
A spike in rejected traffic to specific ports may indicate port scanning or brute-force attempts.
Lesson 1872VPC Flow Logs and Network Monitoring
Rejecting
means refusing to process invalid input at all.
Lesson 1155Rejecting vs Sanitizing Invalid Input
Rekall
, or **Magnet RAM Capture** reconstruct the true system state by parsing raw memory structures independently of the OS's APIs—APIs the rootkit has compromised.
Lesson 1559Memory Analysis and Volatile Forensics
Rekeying
Periodic regeneration of encryption keys for forward secrecy
Lesson 487OpenVPN Cryptographic Configuration
RELATED
A new connection, but linked to an existing one (like FTP data transfers spawned from a control connection)
Lesson 440Stateful Firewall with Connection Tracking
Related resources
(comments on posts, items in orders)
Lesson 838Access Control Defense Strategy
Related-key attacks
Using similar keys can reveal patterns
Lesson 116RC4: Design, Vulnerabilities, and Deprecation
Relational access
Posts, comments, attachments—check the entire chain
Lesson 842Resource-Level Permission Checks
Relationship rules
Is the end date after the start date?
Lesson 1154Semantic and Business Logic Validation
Relationship-Based Access Control (ReBAC)
determines whether a user can access a resource based on their relationship to that resource or its owner.
Lesson 800Relationship-Based Access Control (ReBAC)
Relaxed (`r`)
Allows subdomain matches (mail.
Lesson 2302DMARC Configuration and Alignment
Relay Attacks
Sophisticated attackers use one device near a legitimate badge (in someone's pocket) and relay the signal in real-time to a second device at a secured door, extending the effective range.
Lesson 2274Badge Cloning and RFID AttacksLesson 2280Badge and Card-Based Access Systems
Release cycles
(quarterly or per-release security reviews)
Lesson 2070Security Retrospectives and Continuous Improvement
Relevance Assessment
Not every threat matters to you.
Lesson 2343Threat Intelligence Analysis and Reporting
Reliability
Works even if OCSP responder is temporarily down
Lesson 193OCSP Stapling and Must-StapleLesson 339TCP Connect Scanning
Reliable detection
of time-based attack patterns (like failed login sequences)
Lesson 1473Log Timestamp Synchronization
Relying Party (RP)
application you've logged into
Lesson 775OIDC Session Management and Single Logout
Remediate
– Restore compromised files or rebuild if deeply infected
Lesson 1504FIM Alert Analysis and ResponseLesson 2623Compliance as Code
Remediation
Implement least-privilege access, enable object encryption if not already active, and configure bucket-level monitoring and alerting for future anomalies.
Lesson 1909Cloud Storage and Data Breach Response
Remediation actions
that automatically fix issues or escalate to humans
Lesson 2002Tag Governance and Remediation Workflows
Remediation Capabilities
Automated fixes are powerful but risky.
Lesson 2011CSPM Vendor Selection and Deployment
Remediation cost
Can you simply update, or does it break compatibility?
Lesson 1274Interpreting SCA Results
Remediation effort
Quick fixes vs.
Lesson 3034Scan Result Management and Triage
Remediation Failures
Automated fixes may unknowingly overwrite legitimate manual changes, or worse, legitimate IaC deployments may overwrite critical manual security patches.
Lesson 2022Infrastructure Drift: Causes and Risks
Remediation flows
Guiding users to fix compliance issues
Lesson 2678Device Trust and Endpoint Security
Remediation Level
Is a patch available?
Lesson 2445CVSS Temporal and Environmental Metrics
Remediation plan
with specific actions
Lesson 2625Remediation Tracking and Reporting
Remediation tracking
ensures that the corrective actions you recommended actually get done—and done properly.
Lesson 2550Remediation Tracking and Follow-upLesson 2625Remediation Tracking and Reporting
Remediation velocity
average time-to-close by severity
Lesson 2625Remediation Tracking and Reporting
Remediation Workflows
automatically correct violations when safe to do so.
Lesson 1992Continuous Compliance Monitoring
Remote Access Trojan (RAT)
is malware specifically designed to provide this backdoor functionality.
Lesson 1524Backdoors and Remote Access Trojans (RATs)
Remote Access Trojans (RATs)
Open backdoors allowing attackers full system control
Lesson 1521Trojans: Deceptive Functionality
Remote administration
Accessing internal management interfaces from outside networks
Lesson 499SSH Tunneling Fundamentals
remote attestation
proving to a verifier that your device is in a known-good state.
Lesson 2771Hardware Root of Trust and TPMLesson 2927Trusted Execution Environments
Remote Desktop Protocol (RDP)
allows attackers to establish full graphical sessions on remote machines.
Lesson 2156RDP and GUI-Based Lateral Movement
Remote lock
disables a device immediately, buying time when it's misplaced.
Lesson 2748Remote Wipe and Device Lifecycle
Remote Port Forwarding
(`-R`) redirects traffic from a port on the remote SSH server back to your local machine or another destination.
Lesson 499SSH Tunneling FundamentalsLesson 501Remote Port Forwarding (-R)
Remote termination
lets users view all active sessions and invalidate specific ones—like a "sign out all other devices" button.
Lesson 710Concurrent Sessions and Device Management
Remote wipe
goes further, erasing all corporate data or performing a complete factory reset depending on your policy.
Lesson 2748Remote Wipe and Device Lifecycle
Remove complexity mandates
that force special characters
Lesson 695Password Length vs Complexity Trade-offs
Remove compromised roots
when CAs are breached or misbehave
Lesson 182Trust Anchors and Root Certificate Stores
Remove dead rules
Delete entries for decommissioned systems or expired projects
Lesson 435Rule Review and Maintenance
Remove host allowlists entirely
they're legacy and weaker
Lesson 667Strict CSP and Modern Best Practices
Remove null bytes
and other terminator tricks
Lesson 1166Defense: Canonical Form Validation Strategies
Remove or replace
Delete direct identifier columns entirely, or replace values with pseudonyms (covered separately in pseudonymization)
Lesson 2903Direct Identifiers and Removal
Remove unused dependencies
Every line of third-party code you don't need is risk you don't need
Lesson 1945Third-Party Dependencies in Functions
Repackaging
is the practice of taking an existing mobile app, decompiling it, modifying its code, then recompiling and re-signing it with a new certificate.
Lesson 2731Repackaging and Code Injection Attacks
Repeat many times
One lucky guess is 50/50, but 20 correct answers means less than 1-in-a-million chance of faking it.
Lesson 243The Graph Isomorphism Example
Repeated failures
A user hitting authorization blocks repeatedly may be probing boundaries
Lesson 844Authorization Logging and Monitoring
Repeated participation
enables membership inference — attackers detect if specific data was in your local training set
Lesson 2843Federated Learning Privacy
Repeater
lets you manually modify and resend individual requests.
Lesson 2205Burp Suite Architecture and Components
Replace components
to bypass security features or inject malicious hardware
Lesson 2755Physical Security Threats to IoT Devices
Replace downloaded files
with backdoored versions
Lesson 388ARP Poisoning for Traffic Interception and Modification
Replace with maintained alternatives
Research actively-supported libraries with similar functionality
Lesson 1267Unmaintained Dependencies and End-of-Life Libraries
Replacement projects
Community has migrated to alternatives
Lesson 1267Unmaintained Dependencies and End-of-Life Libraries
Replay
Minutes, hours, or days later, the attacker sends HTTP requests with the stolen token
Lesson 718Session Replay Attacks
Replay protection
Including timestamps or nonces prevents reusing old tags
Lesson 221HMAC in Authentication Protocols
Replay the entire response
to authenticate as the victim
Lesson 780SAML Response Replay and Reuse
Replay the session
by injecting those cookies into your own browser or crafting requests with the stolen tokens
Lesson 400Session Hijacking via MITM
Replay-resistant
Old codes become invalid immediately
Lesson 740TOTP and Time-Based One-Time Passwords
Reply-To
, and **Received** fields.
Lesson 2262Identifying Phishing Indicators
Report Confidence
How reliable is the vulnerability report?
Lesson 2445CVSS Temporal and Environmental Metrics
Report findings
with severity scores, affected versions, and remediation guidance
Lesson 3011Software Composition Analysis (SCA) Automation
Report it immediately
through proper channels (security contact, bug bounty platform)
Lesson 2078Legal and Ethical Considerations
Report server
Logs vulnerable devices
Lesson 2798IoT Botnet Architecture and Formation
Reporting addresses
Where to send aggregate (`rua`) and forensic (`ruf`) reports
Lesson 2301DMARC (Domain-based Message Authentication) Policy
Reporting and compliance tracking
to verify successful installation
Lesson 2457Automated Patch Deployment Tools
Reporting Tools
Documentation and evidence gathering
Lesson 2188Kali Tool Categories and Organization
Repository compromise
attackers can't forge signatures without the private key
Lesson 1294Package Signing and GPG Verification
Repository scanning
Tools like GitGuardian, TruffleHog, or GitHub's secret scanning analyze commit history
Lesson 2013Secrets in IaC: Detection and Prevention
Representative systems
Same OS versions, application stacks, and configurations as production
Lesson 2455Patch Testing and Staging Environments
Reproduce manually
– Can you trigger the vulnerability yourself using Repeater?
Lesson 2213Scanner Issue Analysis and Validation
Reproduce the finding
– Can you verify the vulnerability exists using manual testing or alternative tools?
Lesson 1614False Positive Management
Reproducibility breaks
Your colleague's build might differ from yours
Lesson 1280Dependency Resolution and Lock Files
Reproducible
Anyone following your steps gets the same result
Lesson 2163Proof of Concept Development
Reproducible builds
ensure that compiling the same source code always produces *byte-for-byte identical* binaries, no matter who builds it, when, or where.
Lesson 1299Reproducible Builds
Reputation
– Customer trust erosion, brand damage
Lesson 2499Likelihood and Impact Determination
Reputation boost
showing commitment to security transparency
Lesson 2479Bug Bounty Fundamentals and Models
Reputation damage
Customer trust, brand value
Lesson 2501Asset Identification and Valuation
Reputation risk
High likelihood of media coverage
Lesson 2431Executive Summary and Business Impact
Reputation systems
that prioritize trusted researchers
Lesson 2486Scaling and Optimizing Programs
Request
A principal (user, service, or federated identity) calls `AssumeRole` targeting a specific IAM role ARN
Lesson 1730AWS STS and AssumeRole Mechanics
Request and approval workflow
Changes require documented justification, risk assessment, and authorization from appropriate stakeholders
Lesson 2493Change Management and Configuration Control Policy
Request authentication tokens
or reference numbers through the official channel that can be confirmed in the suspicious message.
Lesson 2294Vendor and Third-Party Communication Security
Request body fields
`{"document_id": "456"}`
Lesson 819Testing for IDOR Vulnerabilities
Request Body Parameters
In POST requests, attackers can modify JSON or form data fields like `{"document_id": 789}` to try different values.
Lesson 816Parameter Tampering in IDOR Attacks
Request contains
The certificate serial number and issuer information
Lesson 192Online Certificate Status Protocol (OCSP)
Request context
(location, time, sensitivity)
Lesson 2686BeyondCorp Model and Zero Trust Access
Request patterns
Bots often make unnaturally rapid, repetitive requests
Lesson 1859Bot Management and Detection
Request rate
Requests per second (lower for production)
Lesson 1374DAST Configuration and Scope Management
Request signature validation
to ensure API calls haven't been tampered with
Lesson 1867CDN WAF Integration and Edge Security
Request specific secrets
by name or path
Lesson 1339Application-Level Secret Retrieval
Request workflow
Users request specific permissions with business justification
Lesson 2677Least Privilege Access in Zero Trust
Request-based
Maximum 100 queries per minute per API key
Lesson 1002Query Cost Analysis and Rate Limiting
RequestReceived
The API server received the request
Lesson 1975Kubernetes Audit Logging and Monitoring
Require explicit confirmation
use a full round-trip for sensitive operations
Lesson 1103HTTP/3 0-RTT Replay Attacks
Require passwords
unless there's a strong operational reason.
Lesson 1426Sudo Configuration and Security
Required tags are present
– Does this EC2 instance have `Environment`, `Owner`, and `CostCenter` tags?
Lesson 1999Automated Tag Enforcement and Validation
Requirement 10
mandates comprehensive logging and monitoring of all access to cardholder data.
Lesson 2578Requirements 9-10: Physical and Logical Access Logging
Requirement 6: Secure Development
acknowledges that applications handling cardholder data are frequent targets.
Lesson 2576Requirement 6: Secure Development
Requirement 8
(access control), and ISO 27001 **A.
Lesson 2617Framework Mapping and Harmonization
Requirement 9
restricts physical access to cardholder data environments.
Lesson 2578Requirements 9-10: Physical and Logical Access Logging
requirements phase
means you identify security needs, constraints, and potential threats *before* you've committed to an architecture or written a single line of code.
Lesson 77Threat Modeling in Requirements PhaseLesson 2732Secure Mobile Development Lifecycle
Requires explicit user action
to generate each new code
Lesson 741HOTP and Counter-Based OTP
Requires the `Secure` flag
(HTTPS only).
Lesson 867SameSite Cookie Attribute
Researcher community
Vetted security professionals with track records
Lesson 2071Introduction to Bug Bounty Programs
Researcher credit
– acknowledging discoverers appropriately
Lesson 2476CVE Assignment and Public Disclosure
Researcher quality vs. quantity
Exclusive communities vs.
Lesson 2480Bug Bounty Platform Ecosystem
Researcher retention
Consistent contributors may earn loyalty bonuses
Lesson 2482Bounty Pricing and Reward Structures
Reseeding
is periodically adding fresh water from an unpredictable source.
Lesson 291PRNG State and ReseedingLesson 295Entropy Pool Management
Reserve space
Document and reserve CIDR blocks for future VPCs, regions, or environments (dev, staging, prod).
Lesson 1810VPC IP Addressing and CIDR Planning
Reserved concurrency
dedicates a specific number of concurrent executions exclusively to one function.
Lesson 1956Concurrency Controls and Throttling
Resetting the nonce
(number used once) and replay counter to zero
Lesson 528KRACK Attack on WPA2
Resident keys
(also called discoverable credentials) store user information on the authenticator itself, enabling passwordless login without entering a username.
Lesson 745FIDO2 and WebAuthn
Residual risk level
– Critical/high risks first (from your risk matrix)
Lesson 2523Risk Treatment Plans and Prioritization
Residual risk management
is the ongoing process of monitoring these changes and reassessing whether your residual risk remains within acceptable tolerance levels.
Lesson 2524Residual Risk Management
Residual Risk Score
Risk after controls are applied
Lesson 2506Risk Register Development
Residual risk tracking
Document what risk remains after controls are applied
Lesson 2519Risk Mitigation and Control Selection
Residual Risk Trend
Monitor residual risk after controls are applied.
Lesson 2532Risk Posture and Trending Metrics
Resist surveillance
even by powerful adversaries
Lesson 2982Introduction to Anonymity Networks
Resistance to known attacks
Immune to differential and linear cryptanalysis that weakened DES
Lesson 89AES: Rijndael Selection and Design
Resistance to verification
Pushback when you suggest calling them back or confirming independently
Lesson 2270Detecting and Resisting Manipulation Attempts
Resistant to dictionary/brute-force attacks
No password to guess
Lesson 542EAP-TLS and Certificate-Based Authentication
Resolution updates
Weekly for accepted issues
Lesson 2483Submission Triage and Validation
Resolvable Private Addresses (RPA)
are the clever solution for bonded devices.
Lesson 557BLE Privacy and Address Randomization
Resolver Paths
Error messages showing which resolver failed expose your API's internal organization and business logic.
Lesson 1007GraphQL Error Handling and Information Leakage
Resource
The exact cloud resources the actions apply to, identified by ARN (Amazon Resource Name) or similar identifiers.
Lesson 1703Policy Structure and Syntax FundamentalsLesson 1713Policy Structure: Elements, Syntax, and Evaluation LogicLesson 1951Function Execution Role Design
Resource abuse
One app cannot directly interfere with another's memory or CPU usage
Lesson 2713Android Application Sandboxing
Resource access control failures
emerge when functions rely solely on execution roles (which they *always* have) but skip application-level checks.
Lesson 1964Broken Access Control in Functions
Resource attributes
Properties of what's being accessed (document_classification=confidential, owner=HR, created_date=2024)
Lesson 20Attribute-Based Access Control (ABAC)Lesson 799Attribute-Based Access Control (ABAC)
Resource consumption
Agents consume CPU, memory, and network bandwidth.
Lesson 2437Agent-Based Scanning
Resource Development
Establish infrastructure and capabilities
Lesson 2178Tactics: The Why Behind Adversary Actions
Resource directives
control where different content types can load from:
Lesson 658CSP Directives and Syntax
Resource launches
in unexpected regions (often cryptomining instances)
Lesson 1907Cloud Account Compromise Response
Resource lifecycle management
Automate cleanup of temporary resources (`ExpirationDate=2024-12-31`)
Lesson 1996Cloud Resource Tagging Strategy and Standards
Resource logs
track what happens *within* your resources—load balancer access patterns, database queries, or Lambda function executions.
Lesson 1870Log Sources and Data Ingestion
Resource Owner
(you) for permission
Lesson 756OAuth 2.0 Overview and Roles
Resource Pool Management
controls how aggressively Intruder operates—limiting concurrent requests prevents overwhelming the target or triggering rate limits, crucial when chaining requests that depend on previous responses.
Lesson 2211Advanced Intruder Techniques and Grep Extraction
Resource pooling
Database connections, API rate limits, license seats
Lesson 904Concurrency Issues in Inventory and Resource Allocation
Resource Quotas
to prevent resource exhaustion
Lesson 1976Multi-Tenancy and Cluster Isolation
Resource Requirements
identify *who* and *what* you need.
Lesson 2544Audit Planning and Scoping
Resource Restrictions
File upload limits enforced only in JavaScript can be bypassed by submitting requests directly, uploading files far exceeding the stated limit.
Lesson 941Testing Limits and Constraints
Resource sensitivity
Drift in production databases versus development sandboxes
Lesson 2027Drift Reporting and Exception Management
Resource states
(Editing a published document vs.
Lesson 812Context-Dependent Authorization Failures
Resource tags
Does this S3 bucket have `Environment=Production`?
Lesson 1998Tag-Based Access Control and Policy Enforcement
Resource type
EC2 alerts to infrastructure team, IAM alerts to identity team
Lesson 1903Alert Routing and Escalation WorkflowsLesson 2005Cloud Asset Discovery and Inventory
Resource usage
An EC2 instance that usually runs at 30% CPU spikes to 95% while making network connections to unknown IPs
Lesson 1890Behavioral Analytics and Anomaly DetectionLesson 1899Machine Learning for Cloud Anomaly Detection
Resource utilization metrics
(CPU, memory, storage trends)
Lesson 1897Baseline Establishment for Cloud Resources
Resource-Specific Authorization
Rather than network access, the broker grants access only to the specific application or service requested
Lesson 2690Zero Trust Network Access (ZTNA) Solutions
Respect CSP
Server push must honor Content Security Policy directives
Lesson 1100HTTP/2 Server Push Security Risks
Respect data privacy laws
If you discover personal data, handle it appropriately under GDPR, CCPA, or relevant regulations
Lesson 2084Legal and Ethical Considerations
Respect for User Privacy
User-centric, keeping interests paramount
Lesson 2879Introduction to Privacy by Design
Respond promptly and respectfully
to all submissions, even duplicates or out-of-scope reports.
Lesson 2484Managing Researcher Relationships
Respond rapidly
to contain and remediate incidents
Lesson 2305What is a Security Operations Center (SOC)?
Responder
is a tool that listens for LLMNR and NBT-NS queries, then responds claiming to be the requested resource.
Lesson 2237Responder and LLMNR/NBT-NS Poisoning
Responder replies
Status is `good`, `revoked`, or `unknown`
Lesson 192Online Certificate Status Protocol (OCSP)
Responds to incidents
systematically to minimize downtime
Lesson 2593Availability Criterion
Response
STS returns these credentials with an expiration timestamp (default 1 hour, configurable up to 12 hours)
Lesson 1730AWS STS and AssumeRole MechanicsLesson 2325Introduction to SOAR Platforms
Response actions
Enable DDoS protection services, activate additional rate limiting rules, expand bot management (1859)
Lesson 1861DDoS Response and Incident Management
Response codes
What came back (or if it failed)
Lesson 900Monitoring and Detection of SSRF Attempts
Response expectations
Timeline for acknowledgment and typical remediation windows
Lesson 2472Creating and Publishing a VDP
Response fingerprinting
Analyzing timing, error messages, or behavior patterns unique to specific versions
Lesson 344Service Version Detection
Response is signed
The CA signs responses to prevent tampering
Lesson 192Online Certificate Status Protocol (OCSP)
Response Patterns
Applications respond differently to malformed requests, specific URL patterns, or HTTP method combinations.
Lesson 362Application-Layer Fingerprinting
Response queue poisoning
Send a smuggled request, then a normal one—if your normal request gets *someone else's* response, desync occurred
Lesson 1108Detecting Request Smuggling Vulnerabilities
Response strategy
Establish a validation workflow.
Lesson 1597Operational Challenges and Maintenance
ResponseComplete
Response body fully sent
Lesson 1975Kubernetes Audit Logging and Monitoring
ResponseStarted
Headers sent, body streaming
Lesson 1975Kubernetes Audit Logging and Monitoring
Responsibility Summary documents
.
Lesson 1980PCI DSS in Cloud Environments
Responsible disclosure
Follow coordinated disclosure practices for any vulnerabilities found
Lesson 2084Legal and Ethical ConsiderationsLesson 2470Vulnerability Disclosure Models
REST API Fuzzing
Generate variations of HTTP requests with malformed JSON, oversized fields, type mismatches, or unexpected values.
Lesson 1391API and Protocol Fuzzing
Restore default contexts
with `restorecon`:
Lesson 1455SELinux Contexts and Labels
Restrict
Drop frames and log violations
Lesson 414Port Security and MAC Filtering
Restrict access
using least-privilege IAM policies (only IR teams and monitoring systems need read access)
Lesson 1958Dead Letter Queues and Error Handling
Restrict actions
If the function only reads, grant `s3:GetObject`, not `s3:*`.
Lesson 1950Least Privilege for Serverless Functions
Restrict commands explicitly
Instead of granting broad access like `ALL=(ALL) ALL`, specify exactly which commands a user needs:
Lesson 1426Sudo Configuration and Security
Restrict exported components
Only expose components (Activities, Services, Broadcast Receivers) that truly need external access
Lesson 2738Input Validation and IPC Security
Restrict kubelet API access
Use network policies or firewalls to limit which IPs can reach port 10250
Lesson 1671Kubelet Security and Node Hardening
Restrict public bucket policies
– Blocks policies that grant cross-account access without conditions
Lesson 1783Blocking Public Access and Bucket Misconfiguration
Restrict syscalls
with seccomp while **confining file access** with AppArmor/SELinux
Lesson 1661Container Runtime Security Best Practices
Restricted Admin mode
Prevents credential caching on the target
Lesson 2156RDP and GUI-Based Lateral Movement
Restricted users
with limited permissions
Lesson 834Testing Multi-User Scenarios
Restricted Zone
Server rooms, executive offices
Lesson 2279Physical Access Control Models and Zones
Restricted/Critical
highly sensitive data requiring maximum protection (PII, authentication secrets, intellectual property)
Lesson 2491Data Classification and Handling Policy
Restricted/Highly Confidential
Regulated or critical data (PII, PHI, payment data, trade secrets)
Lesson 1801Data Classification Fundamentals
Results + remediation
Report findings with severity scores and upgrade recommendations
Lesson 3012Container and Image Scanning
Resume support
means tracking which chunks have been successfully transferred.
Lesson 2971Large File Transfer Security
Retention period
Lock objects for a fixed duration (e.
Lesson 1787Object Lock and Immutable Storage
Retention policies
define maximum storage durations based on:
Lesson 2897Temporal Data Minimization
Retiring a legacy system
that cannot be patched or secured, rather than compensating with complex network controls
Lesson 2518Risk Avoidance Decisions
Retrain the model
on this augmented dataset
Lesson 2847Adversarial Training
Retransmission timers
at the DTLS layer (since UDP doesn't retry)
Lesson 2795DTLS and TLS 1.3 for IoT
Retrieve secrets at runtime
when your function executes
Lesson 1946Secrets and Environment Variables in Functions
Return
The authorization server echoes it back unchanged in the callback
Lesson 763State Parameter and CSRF Protection
Return a response
that extracts only your desired record
Lesson 2928Private Information Retrieval
Return generic error messages
to users ("An error occurred")
Lesson 1210Fail Securely and Handle Errors Safely
Return hijack
when the function returns, CPU jumps to attacker-controlled address
Lesson 2108Memory Corruption Exploits: Buffer Overflows
Return-Oriented Programming
defeats these protections by *never injecting executable code at all*.
Lesson 2109Return-Oriented Programming (ROP)
Return-Path
, **Reply-To**, and **Received** fields.
Lesson 2262Identifying Phishing Indicators
Reusability
lets you apply the same security standards across multiple projects
Lesson 2056Security as Code Fundamentals
Reusable Libraries
Package common functions—payload generation, request handling, response analysis—into modules you can import across projects.
Lesson 593Custom SQL Injection Automation Scripts
Reuse single-use codes
multiple times
Lesson 922Coupon and Discount Code Abuse
Reuse the assertion
at a different time or from a different location
Lesson 780SAML Response Replay and Reuse
Reusing seeds
Never reuse the same seed across sessions or systems—each instance must start uniquely
Lesson 298CSPRNG Initialization and Seeding
Revenue protection
for your API business model
Lesson 1016Quota Management and Tiered Access Control
Reverse Engineering
Binary analysis and debugging
Lesson 2188Kali Tool Categories and Organization
Reverse proxy/CDN cache
Cloudflare, Fastly, Akamai—shared by all users requesting the same content
Lesson 1115Web Cache Fundamentals and Architecture
Reverse Shells
The compromised target connects *back* to your attacker machine:
Lesson 2236Netcat and Socat for Network Pivoting
Reversible
`plaintext XOR keystream = ciphertext`, and `ciphertext XOR keystream = plaintext`
Lesson 115Stream Cipher Fundamentals and XOR OperationsLesson 2908Data Masking and Tokenization
Revert applications
to use the previous secret version
Lesson 1349Rotation Testing and Rollback
Review bypass usage
Every time auto-escaping is disabled should be a security checkpoint
Lesson 1247Auto-Escaping Mechanisms and Configuration
Review compensating controls
– Maybe the vulnerability exists, but a firewall rule or network segmentation already mitigates the risk.
Lesson 1614False Positive Management
Review network connections
to identify command-and-control (C2) communications
Lesson 2365Detection and Scoping Techniques
Review new features
against your existing threat model and DFDs
Lesson 79Threat Modeling During Development
Review participation
Are the right people (developers, architects, security experts) involved?
Lesson 84Measuring Threat Modeling Effectiveness
Review provider attestation reports
(SOC 2 Type II, ISO certifications)
Lesson 1985Cloud Compliance Inheritance and Mapping
Review remediation claims
Understand what changes were made (code patches, configuration updates, WAF rules, etc.
Lesson 2166Retest and Validation Process
Review resource-based policies
Do S3 buckets, KMS keys, or SNS topics grant cross-account access?
Lesson 1751Cross-Account and External Access Analysis
Review what changed
– File size, permissions, ownership, or content hash?
Lesson 1504FIM Alert Analysis and Response
Reviewers miss bugs
Security auditors can't thoroughly examine 5,000 lines of conditional logic, but they can carefully study 200 lines
Lesson 1216Economy of Mechanism and Simplicity
Revision
– Incorporate practical concerns and ensure enforceability
Lesson 2494Policy Development and Approval Process
Revocation
is reactive: "This certificate must stop working *right now*, even though it hasn't expired yet.
Lesson 190Certificate Revocation Fundamentals
Revocation power
Instantly revoke access by disabling the key
Lesson 1797Key Management for Database Encryption
Revoke active sessions
invalidate temporary credentials and tokens
Lesson 1907Cloud Account Compromise Response
Revoke cross-VPC trust relationships
(peering, Transit Gateway attachments)
Lesson 1818VPC Deletion and Cleanup Security
Revoke later
through Settings → Privacy
Lesson 2705iOS Permissions and Privacy Controls
Revoking keys
Add compromised keys to the forbidden signature database (dbx) to block specific signatures
Lesson 1462Configuring and Managing Secure Boot
Reward structure
Payment tiers based on severity
Lesson 2071Introduction to Bug Bounty Programs
Rex (Ruby Extension Library)
The foundation layer that handles all low-level tasks—network sockets, protocol implementations, encodings, and SSL/TLS.
Lesson 2193Metasploit Architecture and Components
RF jamming
Attackers flood frequencies with noise to deny service
Lesson 551RF Spectrum Monitoring
RF spectrum monitoring
looks at the raw radio environment itself—the actual electromagnetic waves in the 2.
Lesson 551RF Spectrum Monitoring
RF triangulation
, you can pinpoint where suspicious signals originate.
Lesson 549Rogue AP Detection Techniques
RFC 5424
formalized it in 2009.
Lesson 1475syslog Protocol and Standards
RFC 6238
and builds on these components:
Lesson 740TOTP and Time-Based One-Time Passwords
Right to Audit
Reserve your ability to verify compliance through audits or assessments
Lesson 2567Service Provider and Third-Party Contracts
Right to correct
inaccurate personal information (not just delete)
Lesson 2568CPRA Amendments and Enforcement
Right to limit use
of sensitive data beyond what's necessary
Lesson 2568CPRA Amendments and Enforcement
Right to modify
You can update the policy with reasonable notice
Lesson 2478Legal and Safe Harbor Considerations
Right-to-audit clauses
Include provisions to assess fourth parties when risk warrants
Lesson 2540Fourth-Party and Supply Chain Risk
Rigidity
System-wide policies, not personal choices
Lesson 19Access Control Models: DAC, MAC, and RBAC
Ring Oscillator PUFs
Measure slight frequency differences in identical circuits
Lesson 2777Hardware Cloning and Counterfeit Prevention
risk appetite
the maximum level of residual risk you're willing to accept.
Lesson 2505Inherent vs Residual RiskLesson 2891Privacy Risk Assessment Methodology
risk assessment
(lessons 2497-2510) identified *what could go wrong*, audits verify *what you actually implemented* to prevent it.
Lesson 2543Security Audit Types and ObjectivesLesson 2579Requirements 11-12: Testing and PolicyLesson 2588HIPAA Breach Notification Requirements
Risk assessment findings
with severity ratings
Lesson 2893PIA Documentation and Review
Risk calculation details
Show your work (FAIR factors, ALE formulas, probability trees)
Lesson 2516Risk Analysis Documentation and Communication
Risk committees
Which critical vulnerabilities remain unpatched and why
Lesson 2461Patch Compliance Monitoring and Reporting
Risk Description
Clear statement of the threat/vulnerability combination
Lesson 2506Risk Register DevelopmentLesson 2521Risk Acceptance and Documentation
Risk ID
Unique identifier (e.
Lesson 2506Risk Register Development
Risk identifier and description
– What specific risk are we addressing?
Lesson 2523Risk Treatment Plans and Prioritization
Risk indicators
impossible travel (login from Tokyo, then London 30 minutes later), unusual data access
Lesson 1699Continuous Identity Verification
Risk levels
(1-3) control payload aggressiveness:
Lesson 587SQLMap Detection and Fingerprinting Techniques
Risk Management
Agencies conduct **risk assessments** following the Risk Management Framework (RMF), including documenting security plans, implementing controls, assessing effectiveness, and authorizing systems for operation.
Lesson 2615FISMA and Federal Compliance
Risk Owner
Who's accountable for managing this risk
Lesson 2506Risk Register Development
Risk Rating
Using the methodology you established during testing (Critical/High/Medium/Low)
Lesson 2549Audit Reporting and CommunicationLesson 2625Remediation Tracking and Reporting
Risk Ratings and Prioritization
Lesson 1615Vulnerability Scan Reporting
Risk reduced
Does this layer meaningfully decrease likelihood or impact?
Lesson 2662Defense-in-Depth Trade-offs and Cost-Benefit
Risk Reduction
= (Pre-control ALE) - (Post-control Residual Risk ALE)
Lesson 2522Cost-Benefit Analysis for Risk Treatment
risk register
is your organization's central database of all identified security risks.
Lesson 2506Risk Register DevelopmentLesson 2519Risk Mitigation and Control Selection
Risk Register Development
and may trigger **Risk Treatment Plans** updates.
Lesson 2539Continuous Vendor Monitoring
Risk scoring
Anomalies are scored based on severity and context
Lesson 1900User and Entity Behavior Analytics (UEBA)
Risk severity
High-impact risks demand stronger controls
Lesson 2892Mitigation Strategies and Controls
Risk signals
(threat intelligence, anomaly detection, behavioral analysis)
Lesson 2687Context-Aware Access Controls
Risk treatment plan
showing how you'll address identified risks
Lesson 2607ISMS Documentation Requirements
Risk Trends
Present security posture over time using simplified trend indicators (improving/declining/stable).
Lesson 3042Executive Security Reporting
Risk-Based Routing
Route low-risk changes (like dev environment tweaks) through automated approval, but require manual signoff for:
Lesson 2021IaC in CI/CD Pipelines: Security Gates and Approval Workflows
Risk-prioritize
Not all 300 STIG findings carry equal weight—focus on high-impact items first
Lesson 1420Balancing Security with Operational Requirements
Risks
The key exists in plaintext during generation and wrapping in your environment—any compromise there undermines the entire model.
Lesson 1771Bring Your Own Key (BYOK) and Key Import
Roadmap
– What's the next realistic improvement?
Lesson 2313SOC Maturity Models
Roaming authenticators
(also called cross-platform authenticators) are separate physical devices like USB security keys (YubiKey, Titan Security Key) or NFC-enabled tokens.
Lesson 752Platform and Roaming Authenticators
Robust
They work from various angles, distances, and lighting conditions
Lesson 2815Adversarial Patches and Object Detection Attacks
Rogue Access Points
Sensors identify unauthorized APs by comparing detected SSIDs, MAC addresses, and RF signatures against your authorized inventory.
Lesson 548Wireless Intrusion Detection Systems (WIDS)Lesson 550Wireless Packet Capture and Analysis
Rogue DHCP servers
Receiving network configurations from unexpected sources
Lesson 410Signs of Network Interception
Role assumption chains
Exploiting trust relationships to assume progressively more powerful roles
Lesson 1753IAM Privilege Escalation Overview
Role chaining
occurs when you assume a role (Role B) while already operating under another assumed role (Role A).
Lesson 1732Role Chaining and Session PoliciesLesson 1736Best Practices for Temporary Credentials
Role-based access controls
baked into the data model
Lesson 2557Data Protection by Design and Default
Role-based groups
`Developers`, `DatabaseAdmins`, `ReadOnlyAuditors`
Lesson 1711IAM Groups: Organizing Users and Permission Sets
Role-state combinations
Test that users' roles align with allowed actions in each state.
Lesson 835Testing State-Based and Workflow Authorization
RoleBinding
grants a Role's permissions within one namespace
Lesson 1664Role-Based Access Control (RBAC) Fundamentals
RoleBindings
attach those permissions to service accounts.
Lesson 1969Kubernetes RBAC and Service Accounts
Roleplay scenarios
are particularly effective.
Lesson 2858Jailbreaking and Constraint Bypass
Rollback attacks
Preventing installation of older, vulnerable versions
Lesson 1296PyPI Package Security
Rollback capabilities
when patches cause issues
Lesson 2457Automated Patch Deployment Tools
Rollback capability
Always maintain the previous key in a ready state so you can instantly revert if the new key causes problems
Lesson 314Key Activation and InstallationLesson 1347Database Credential RotationLesson 2878ML Pipeline Security and Governance
Rollback plan
Keep old keys accessible temporarily in case issues arise
Lesson 315Key Rotation Strategies
Rollback planning
means having documented, tested procedures to quickly undo a problematic patch and restore normal operations—before you need them.
Lesson 2458Patch Rollback and Recovery Planning
Rollback plans
Every change needs a "Plan B" if things go wrong
Lesson 2493Change Management and Configuration Control Policy
Rollback Preparedness
Before deploying any hotfix, verify your rollback mechanism works.
Lesson 2069Vulnerability Response and Hotfix Process
Rollback procedures
Can you safely undo the patch if needed?
Lesson 1603Patch Testing and Staging
Rollback protection
uses version counters stored in secure, write-once memory.
Lesson 2768Secure Firmware Development Practices
Rollback readiness
Your patch rollback plan becomes even more critical when you've compressed testing
Lesson 2459Emergency and Out-of-Band Patching
Rollback validation
Test your ability to undo the patch if needed
Lesson 2455Patch Testing and Staging Environments
Rolling your own crypto
Use platform APIs, not custom implementations
Lesson 2735Mobile Cryptography Best Practices
Root cause
Incomplete patch management scope driven by resource prioritization decisions.
Lesson 2422Root Cause Analysis Methodologies
Root Certificate
(Self-signed): A universally trusted Certificate Authority (CA) at the top.
Lesson 177Certificate Chains and Hierarchies
Root certificates
that require careful coordination across many systems
Lesson 1345Automated vs Manual RotationLesson 2727Certificate Pinning Bypass Techniques
Root Detection
involves checking for common indicators:
Lesson 2718Android Root Detection and Anti-Tampering
Root encryption keys
Distributed among HSMs in different locations
Lesson 321Secret Sharing Fundamentals
Root Keys
(or Master Keys): Never leave the Hardware Security Module (HSM) and are used to encrypt other keys
Lesson 1767Key Management Services (KMS) Deep Dive
Root/Jailbreak Detection
identifies when your app runs on a compromised device where normal security boundaries are removed.
Lesson 2739Mobile Code Obfuscation and Hardening
Rootkits
Kernel-level malware that hides processes, files, or network connections.
Lesson 2394Memory-Resident Malware Detection
Rotate
periodically (annually for user keys, more frequently for automated systems)
Lesson 1442SSH Key Generation and Management
Rotate compromised credentials immediately
delete leaked access keys, force password resets
Lesson 1907Cloud Account Compromise Response
Rotate DKIM keys regularly
Treat them like passwords.
Lesson 2304Email Authentication Best Practices and Common Pitfalls
Rotate infrastructure
Don't reuse domains, IPs, or certificates across engagements.
Lesson 2224Framework OPSEC and Detection
Rotate scenarios
Ransomware, data exfiltration, insider threats, DDoS—vary the challenges
Lesson 2374IR Training and Exercises
Rotate secrets immediately
if accidentally committed (even if deleted in later commits—history persists!
Lesson 2013Secrets in IaC: Detection and Prevention
Rotation Complexity
If rotation causes significant downtime or requires manual coordination, you may need automated rotation before increasing frequency.
Lesson 1344Rotation Strategies and Frequencies
Rotation enables detection
When old credentials suddenly become active after rotation, it's a clear signal of unauthorized use or forgotten integrations.
Lesson 1343Secret Rotation Fundamentals
Rotation encourages automation
Manual secret management doesn't scale; rotation forces teams to build proper secret injection and retrieval mechanisms rather than hardcoding values.
Lesson 1343Secret Rotation Fundamentals
Rotation limits exposure windows
A leaked API key rotated weekly gives attackers at most seven days of access before their stolen credential becomes invalid.
Lesson 1343Secret Rotation Fundamentals
Round function
applies a key-dependent transformation to the right half
Lesson 86Feistel Network Architecture
Round keys
(derived from your master key, different for each round)
Lesson 85Block Cipher Fundamentals and Structure
Round-Trip Time (RTT)
is the time it takes for a packet to travel to a destination and back.
Lesson 413Timing and Latency Analysis
Rounding Exploitation
Small rounding errors become significant at scale.
Lesson 924Currency and Conversion Exploits
Route table modifications
Automatic routes direct service-bound traffic through the endpoint
Lesson 1846VPC/VNet Service Endpoints Fundamentals
Route Table Precision
Only advertise specific CIDR blocks you intend to share—never full RFC 1918 ranges unnecessarily
Lesson 1842Cross-Region and Cross-Account Connectivity
Router Advertisement (RA)
Routers announce themselves and network configuration
Lesson 391IPv6 Neighbor Discovery and Spoofing ParallelsLesson 408Router Advertisement Attacks (IPv6)
Routing
directs alerts to specific teams or individuals based on classification.
Lesson 1903Alert Routing and Escalation Workflows
Routing control
Use route tables to specify exactly which VPC subnets are reachable from on-premises and vice versa
Lesson 1840VPN Connections to Cloud
Routing implications
Requires routing tables on both sides; clients cannot directly access Layer 2 services like file sharing via NetBIOS broadcast
Lesson 489OpenVPN Network Topologies: Routed vs Bridged
Routing problems
Traffic not reaching intended networks
Lesson 492Troubleshooting and Monitoring OpenVPN Connections
RP-Initiated Logout
User clicks logout in an application → RP redirects to IdP's `end_session_endpoint` → IdP terminates its session and notifies all other RPs → user is logged out from all applications.
Lesson 775OIDC Session Management and Single Logout
RSA
requires large keys (2048–4096 bits) for adequate security, making operations slower and certificates bulkier.
Lesson 151RSA vs Other Asymmetric AlgorithmsLesson 302Key Generation Requirements and Best PracticesLesson 304Asymmetric Key Pair Generation
RSA 4096-bit
(for legacy compatibility):
Lesson 1442SSH Key Generation and Management
RSA Private Key
Works only with older RSA key exchange (not Perfect Forward Secrecy ciphers).
Lesson 381Decrypting TLS Traffic with Private Keys
RSA/ECDSA
when distributing tokens to third parties or across multiple services that shouldn't share signing capabilities.
Lesson 785JWT Signature Algorithms
RSS feeds
, and **configuration imports** may contain XML
Lesson 973XXE in Document Processing
RST
(reset) packet when something goes wrong.
Lesson 377TCP Stream Analysis and Session Reconstruction
RT (Runtime)
OS takes over, but UEFI services remain available
Lesson 1459UEFI Architecture and Boot Process
Ruby on Rails
uses a similar approach with `protect_from_forgery`, embedding a token in forms and AJAX headers, then verifying it matches the session-stored value.
Lesson 870Framework-Specific CSRF Protection
Rule conflicts
occur when Security Groups allow traffic but NACLs block it (or vice versa).
Lesson 1826Common Misconfigurations and Troubleshooting
Rule coverage
Which vulnerability classes your tools check for (OWASP Top 10, CWEs)
Lesson 3017Test Coverage and Effectiveness Metrics
Rule Optimization
Review your SIEM correlation rules quarterly.
Lesson 1885SIEM Performance Tuning and False Positives
Rule Refinement
Adjust detection sensitivity based on context:
Lesson 1571False Positives and Detection Tuning
Rule-based synthesis
Apply domain knowledge to construct plausible records
Lesson 2909Synthetic Data Generation
Rules-based generation
Tools can mutate wordlists (capitalize, add numbers, substitute characters)
Lesson 2227Dictionary Attacks with Wordlists
Run regularly
Meet frequency requirements (PCI-DSS mandates weekly at minimum)
Lesson 1506FIM for Compliance Requirements
Run validation checks
against actual deployed resources
Lesson 2020Testing and Validation of IaC Security Controls
Runbooks
are step-by-step technical instructions for executing specific actions during triage—the "how-to" manual.
Lesson 2350Triage Playbooks and Runbooks
Running container filesystems
(via export commands)
Lesson 2386Cloud and Virtual Environment Evidence
Running container state
must be captured immediately during an incident.
Lesson 1920Container and Serverless Forensics
Running process enumeration
Detecting Frida, Substrate, or root management tools
Lesson 2728Root and Jailbreak Detection Bypass
Running processes and services
– real-time context about what's active
Lesson 1611Agent-Based Vulnerability Assessment
Running services
– processes that listen only locally or have no network footprint
Lesson 2436Authenticated Scanning and Credentialed Checks
Runs DAST scans
Launches an automated scanner (OWASP ZAP, Burp Suite, etc.
Lesson 1401Dynamic Testing and DAST in Pipelines
Runtime
Admission controllers that block vulnerable images from deploying
Lesson 3029Container Image Scanning
Runtime (Dangerous) Permissions
require explicit user approval while the app is running.
Lesson 2712Android Permission Model and Runtime Permissions
Runtime Application Self-Protection (RASP)
embeds security directly into your running application.
Lesson 1192Detecting and Preventing Deserialization Attacks
Runtime Attacks
Dynamic manipulation while your app executes—memory dumping, method hooking, debugger attachment, and instrumentation frameworks exploiting your app's runtime environment.
Lesson 2733Mobile App Threat Modeling
Runtime Deployment
– Containers instantiated from images.
Lesson 1642Container Image Supply Chain Overview
Runtime injection
means delivering secrets to your application only when it starts running or as it needs them.
Lesson 1335Runtime Secret Injection Patterns
Runtime instrumentation
takes this further by injecting code into a running process to intercept function calls, modify parameters, change return values, and monitor execution flow—all in real-time.
Lesson 2726Dynamic Analysis and Runtime Instrumentation
Runtime Isolation
Where possible, sandbox third-party code or use wrappers that limit what SDKs can access.
Lesson 2740Third-Party SDK and Library Security
Runtime monitoring
watches your containers *while they execute*, detecting anomalies like unexpected system calls, file access violations, network connections, or privilege escalations—behaviors that might indicate compromise or exploitation.
Lesson 1659Runtime Monitoring and Anomaly Detection
Runtime monitors
can detect slow regex execution in production, alerting you to patterns that need fixing.
Lesson 1178Analyzing Regex Complexity with Tools

S

S2 security framework
(Z-Wave) with PIN-based verification
Lesson 2785Zigbee and Z-Wave Security Models
S3 bucket lockdown
Public access detected → remove public ACLs → alert security team → trigger forensic snapshot
Lesson 1911Cloud IR Playbooks and Automation
S3 Cross-Region Replication
, you configure a replication rule that maintains server-side encryption settings.
Lesson 1786Cross-Region Replication and Backup Strategies
S3 VPC Endpoint policies
that may still reference the deleted VPC
Lesson 1818VPC Deletion and Cleanup Security
SaaS
You primarily manage user access, data classification, and usage policies.
Lesson 1676Understanding IaaS, PaaS, and SaaS Models
Sabotage
of critical infrastructure like power grids or manufacturing systems
Lesson 51Motivations: Disruption and Destructive Attacks
SAE
, also known as the **Dragonfly** handshake.
Lesson 518WPA3-Personal and Simultaneous Authentication of Equals
Safari and Firefox
block third-party cookies by default
Lesson 728Third-Party Cookies and Privacy
Safe by default
Requires explicit confirmation before running dangerous operations
Lesson 2163Proof of Concept Development
Safe checks only
Enable non-disruptive detection methods
Lesson 2440Scan Configuration and Optimization
Safe harbor
provisions protect researchers who follow responsible disclosure rules.
Lesson 2078Legal and Ethical ConsiderationsLesson 2471Vulnerability Disclosure Policy (VDP) Fundamentals
Safe Harbor Method
Remove all 18 identifiers and have no actual knowledge the remaining data could identify someone
Lesson 2582Protected Health Information (PHI)
Safe harbor policies
provide legal protection for researchers who follow the rules.
Lesson 2481Program Scope and Rules of Engagement
Safe testing environment
Never test ReDoS on production—even testing can cause service disruption.
Lesson 1182Testing for ReDoS Vulnerabilities
Safe words or phrases
to immediately halt the exercise
Lesson 2172Rules of Engagement for Team Exercises
Safeguard obligations
requirement to implement administrative, physical, and technical safeguards (as you learned in previous lessons)
Lesson 2587Business Associate Agreements and Liability
Safeguards
specific, measurable actions you can implement and audit.
Lesson 2612CIS Controls
Safest
Disables JavaScript everywhere, images become click-to-play
Lesson 2986Tor Browser Security Features
Safety incidents
(endangering workers or public)
Lesson 2753Consumer IoT vs Industrial IoT Threats
safety numbers
(also called key fingerprints)—unique identifiers derived from the combination of both users' public keys.
Lesson 2945Identity Verification in E2EELesson 2953Safety Numbers and Key VerificationLesson 2972Recipient Verification and Authentication
Sale
means disclosing, releasing, or making personal information available to a third party for monetary or **other valuable consideration**.
Lesson 2565Sale and Sharing of Personal Information
Salesforce
, or **Google Workspace**, the provider manages nearly everything—infrastructure, platform, application logic, and most security controls.
Lesson 1679SaaS Security Limitations
Salt and Iterations
Modern hashes often embed salt values and iteration counts within the string itself, visible as additional colon or dollar-sign-delimited segments.
Lesson 2226Hash Identification and Analysis
SAM
Stores local user account information and password hashes
Lesson 2403Registry Analysis for Windows Forensics
same shared secret
and the **current time** to independently generate identical codes.
Lesson 740TOTP and Time-Based One-Time PasswordsLesson 787Algorithm Confusion Attacks
Same-Origin Policy (SOP)
is a critical browser security mechanism that restricts how documents and scripts loaded from one origin can interact with resources from a different origin.
Lesson 855Same-Origin Policy FundamentalsLesson 1047JavaScript's Same-Origin Policy FoundationLesson 1055Same-Origin Policy Fundamentals
SameSite attribute
is your defense against Cross-Site Request Forgery (CSRF).
Lesson 1059Cookie Scoping and SameSite Attribute
SameSite cookie attributes
(`Strict` or `Lax`) to prevent cookies from being sent with cross-site requests automatically.
Lesson 873Defense-in-Depth CSRF Strategy
SameSite cookies
control *what credentials are sent* when your page is embedded.
Lesson 1139SameSite Cookies as Clickjacking Mitigation
SameSite=Lax
provides a middle ground.
Lesson 724SameSite Attribute Deep Dive
SameSite=None
allows cookies on all cross-site requests (the old default behavior).
Lesson 724SameSite Attribute Deep Dive
SameSite=None; Secure
is now required for cookies that need cross-site functionality
Lesson 728Third-Party Cookies and PrivacyLesson 1093Cross-Origin Authentication and iframe Security
SameSite=Strict
is the most restrictive.
Lesson 724SameSite Attribute Deep Dive
SAML
More complex setup, requires understanding XML signatures, assertion structures, and enterprise identity federation patterns.
Lesson 782SAML vs OAuth/OIDC Comparison
sampling
for high-volume, low-priority sources—capture 10% of routine web access logs but 100% of admin actions.
Lesson 1883Scalability and Cost OptimizationLesson 2621Control Attestation and Testing
Samy worm
(2005) on MySpace added "Samy is my hero" to over 1 million profiles in 20 hours by exploiting XSS and automatically adding the payload to each victim's profile.
Lesson 647XSS Worms and Self-Propagating Attacks
Sandboxed plugins
Each tool operates with minimal necessary permissions
Lesson 2861Defense Strategies Against Prompt Injection
Sandboxed Processing
Never process uploaded documents directly on production servers.
Lesson 962Document Format Validation for Office FilesLesson 982Multi-Layer File Upload Validation Strategy
Sanitization Over Trust
Convert uploaded documents to safer formats.
Lesson 962Document Format Validation for Office Files
Sanitization tracking
Whether data passed through validation or encoding functions along the way
Lesson 1362SAST Rule Sets and Vulnerability Detection
Sanitize
Clean or encode dangerous characters before use
Lesson 1211Never Trust User Input
Sanitize before logging
Create wrapper functions or middleware that automatically redact known secret patterns (bearer tokens, password fields, API keys) before any logging occurs.
Lesson 1354Preventing Secrets in Logs and Error Messages
Sanitize before routing
Consider pre-processing errors to strip sensitive fields before they reach the DLQ
Lesson 1958Dead Letter Queues and Error Handling
Sanitize error messages
Replace detailed stack traces with generic messages like "An error occurred"
Lesson 898Response Handling and Information Disclosure
Sanitize special characters
that might bypass filters
Lesson 894URL and Input Validation for SSRF Prevention
Sanitizers
Recognize functions that clean or validate data
Lesson 1381Data Flow Analysis and Taint Tracking
Sanitizing
means attempting to transform invalid input into something acceptable.
Lesson 1155Rejecting vs Sanitizing Invalid Input
SAQ A
Card-not-present, fully outsourced (e.
Lesson 2580PCI-DSS Validation and Compliance Evidence
SAQ D
All other environments requiring full validation
Lesson 2580PCI-DSS Validation and Compliance Evidence
SAST Gates
Set severity-based limits like "fail if ≥1 high-severity issue found" or "fail if critical vulnerabilities increase since last scan.
Lesson 2065Automated Security Gates in CI/CD
SAST tools
commenting directly on pull requests
Lesson 2060Feedback Loops and Metrics
Satori
(exploited zero-days)
Lesson 2799Mirai and Its Legacy
SC
(System and Communications Protection)
Lesson 2611NIST 800-53 Security Controls
SCA
checks the parts you bought from suppliers, **SAST** examines your blueprints and assembly instructions, and **DAST** test-drives the finished vehicle to see what happens on the road.
Lesson 1269SCA vs SAST vs DASTLesson 1275SCA Limitations and Best PracticesLesson 3026Pipeline Security Scanning Overview
SCA (Dependency Scanning) Gates
Define policies like "fail if dependencies have known CVEs with CVSS score ≥7.
Lesson 2065Automated Security Gates in CI/CD
SCADA
(Supervisory Control and Data Acquisition) systems
Lesson 2803OT and ICS Security Fundamentals
Scalability issues
Managing thousands of unique PSKs becomes operationally complex.
Lesson 2791Pre-Shared Key Authentication for IoT
Scalable
Better for CAs serving millions of certificates
Lesson 192Online Certificate Status Protocol (OCSP)
Scalable firewall insertion
Deploy inspection appliances in a dedicated VPC; route all traffic through it
Lesson 1838Transit Gateway Architecture
Scale and velocity
Cloud APIs generate millions of log entries daily.
Lesson 1886Cloud Threat Detection Overview
Scale potential
(can one attack hit thousands of users?
Lesson 850CSRF Impact and Real-World Examples
Scaling SOC operations
without proportionally increasing headcount
Lesson 2325Introduction to SOAR Platforms
Scan and test
Perform vulnerability assessments and penetration testing
Lesson 1980PCI DSS in Cloud Environments
Scan coverage
measures whether you're actually scanning all the assets you should be, while **asset discovery** addresses the uncomfortable truth: you probably don't know everything connected to your network.
Lesson 2442Scan Coverage and Asset Discovery
Scan dependencies
before deployment using tools that check against CVE databases
Lesson 1967Using Components with Known Vulnerabilities
Scan Orchestration
Configure your pipeline to deploy the application to a staging or ephemeral environment, trigger the DAST scanner with appropriate authentication and scope, then tear down the environment after completion.
Lesson 1377Integrating DAST into CI/CD
Scan result management
is the process of sorting, prioritizing, and acting on these findings systematically, rather than treating every alert as equally urgent.
Lesson 3034Scan Result Management and Triage
Scan Scope
Configure which files and languages to analyze.
Lesson 3027SAST Integration in Pipelines
Scan user-controlled input
paths to merge/extend functions
Lesson 1197Detecting Prototype Pollution Vulnerabilities
Scanner
(Professional version) performs automated vulnerability detection.
Lesson 2205Burp Suite Architecture and Components
SCCM
(now Microsoft Endpoint Configuration Manager) extends WSUS with deeper integration— maintenance windows, phased rollouts, compliance reporting, and application deployment alongside patching.
Lesson 2457Automated Patch Deployment Tools
Schedule regular audits
(quarterly or biannually for most organizations):
Lesson 435Rule Review and Maintenance
Schedule regular update windows
Don't wait for vulnerabilities.
Lesson 1266Dependency Update Strategies and Patching
Schedule regularly
Quarterly tabletops, annual full drills minimum
Lesson 2374IR Training and Exercises
Scheduled deep fuzzing
Nightly or weekly extended fuzzing sessions with sanitizers enabled
Lesson 1394Continuous Fuzzing and Integration
Scheduled deployment windows
aligned with maintenance policies
Lesson 2457Automated Patch Deployment Tools
Scheduled downtime
for updates or patches
Lesson 2095Testing Windows and Schedules
Scheduled intervals
(quarterly or semi-annually for active systems)
Lesson 82Threat Model Reviews and Updates
Scheduler
Decides which worker nodes run which containers based on resource availability and policies.
Lesson 1662Kubernetes Architecture and Attack Surface
Scheme and port awareness
You can specify `https://` vs `http://` and different ports, giving you exact control over the embedding context.
Lesson 1136Content-Security-Policy frame-ancestors Directive
Scope (S)
Does impact extend beyond the vulnerable component?
Lesson 2444CVSS v3.1 Base Metrics
Scope Boundaries
establish *what* you'll examine.
Lesson 2544Audit Planning and Scoping
Scope by resource
Use ARNs to limit permissions to specific buckets, tables, or queues—not wildcards.
Lesson 1950Least Privilege for Serverless Functions
Scope creep
occurs when apps request more permissions than needed.
Lesson 761OAuth 2.0 Scopes and Consent
Scope expansion
Incident spreads beyond initial containment zone → notify CISO
Lesson 2427Incident Status Updates and Escalation
Scope limitation
Permissions narrowed to exact resources needed
Lesson 2677Least Privilege Access in Zero Trust
Scope limits
(dev/test only, specific tags)
Lesson 2009Automated Remediation Workflows
Scope Manipulation
Attackers target the broadest possible scope (`/`) to control the entire application.
Lesson 1082Service Worker Registration and Hijacking
Scope mismatches
– Issues found outside the configured scope (from "DAST Configuration and Scope Management")
Lesson 1375False Positive Management in DAST
Scope of the ISMS
(from Clause 4.
Lesson 2607ISMS Documentation Requirements
Scope value
Crown-jewel systems warrant premium pricing
Lesson 2482Bounty Pricing and Reward Structures
scoped packages
(like `@mycompany/*`) to *only* resolve from private registries, never falling back to public sources.
Lesson 1285Public vs Private Package Repository ResolutionLesson 1286Scoping and Namespacing in Package Managers
Score coverage quality
(Can you detect it always?
Lesson 2356Detection Coverage Measurement
Scratch images
(absolutely nothing except your binary)
Lesson 1633Base Image Selection and Trust
Screen against common passwords
Block `password123`, `qwerty`, known breached passwords
Lesson 694Password Complexity Requirements and Their Effectiveness
Screen capturing
Taking periodic screenshots of sensitive activities
Lesson 1523Spyware and Information Stealers
Screen lockers
(or "locker ransomware") take a simpler approach: they lock your screen or prevent system access with threatening messages, but don't actually encrypt your data.
Lesson 1522Ransomware: Extortion Through Encryption
Screening procedures
for employees with data access
Lesson 2579Requirements 11-12: Testing and Policy
Screenshot/screen recording
bypasses E2EE entirely by capturing plaintext at display time.
Lesson 2957Encrypted Messaging Attacks and Vulnerabilities
Screenshots
are your primary weapon.
Lesson 2165Evidence Collection and Screenshots
Screenshots and system outputs
capture current state: firewall rules, active user accounts, encryption settings, patch levels, or vulnerability scan results.
Lesson 2618Audit Evidence Types and Requirements
Screenshots or photos
Recipients can capture messages before deletion
Lesson 2956Disappearing Messages and Perfect Forward Secrecy
Screenshots should tell stories
Capture the full context—terminal commands with output, browser URL bars showing the target, timestamps visible.
Lesson 2087Documentation and Note-Taking
Script Block Logging
captures the actual content of PowerShell scripts and commands as they execute.
Lesson 1511PowerShell and Command-Line Logging
Script Kiddies
are beginners using pre-made tools they barely understand.
Lesson 47Understanding Adversary Types and Skill LevelsLesson 2337Threat Actors and Attribution
Script rules
Govern PowerShell, batch files, and other scripts
Lesson 1593Windows AppLocker
Scripts
can load from your origin (`'self'`) *and* `https://cdn.
Lesson 662default-src and Fallback BehaviorLesson 1593Windows AppLocker
Scrutinize data stores
(the parallel lines):
Lesson 44Identifying Threats from Diagrams
SDK-managed refresh
Cloud SDKs often handle this automatically
Lesson 1731Session Duration and Token Lifecycle
SDP Client
Runs on user devices, maintaining continuous authentication and encrypted connections
Lesson 2680Software-Defined Perimeters (SDP)
SDP Controller
Acts as the policy decision point, authenticating users and devices before granting any network visibility
Lesson 2680Software-Defined Perimeters (SDP)
SDP Gateway
Enforces access policies, creating encrypted micro-tunnels between authorized clients and protected resources
Lesson 2680Software-Defined Perimeters (SDP)
Sealed sender
is a mechanism that hides the sender's identity from the messaging service during transmission.
Lesson 2954Sealed Sender and Sender Anonymity
Sealed storage
Encrypts data that can only be decrypted when specific system conditions are met
Lesson 2771Hardware Root of Trust and TPM
Search
Queries months of historical data across thousands of endpoints instantly
Lesson 1517Integrating Windows Logs with SIEM PlatformsLesson 2140Kernel Exploits for Privilege Escalation
Search queries
Users might search for `<img>` legitimately when looking for documentation
Lesson 1219When Input Validation Fails: Why Encoding Matters
SEC (Security Phase)
CPU initializes, verifies firmware isn't tampered with
Lesson 1459UEFI Architecture and Boot Process
SecLists
Community-maintained collections for various attack types
Lesson 2227Dictionary Attacks with Wordlists
Second DNS lookup
When the app actually makes the HTTP request, it queries DNS again
Lesson 890DNS Rebinding Attacks
Second Layer
Configure **SameSite cookie attributes** (`Strict` or `Lax`) to prevent cookies from being sent with cross-site requests automatically.
Lesson 873Defense-in-Depth CSRF Strategy
Second Preimage Attack
An attacker already knows one input `m1` and its hash `hash(m1)`, and tries to find a *different* input `m2` where `hash(m2) = hash(m1)`.
Lesson 212Preimage and Second Preimage Attacks
Second preimage attacks
threaten data integrity.
Lesson 212Preimage and Second Preimage Attacks
Second preimage resistance
is closely related but different: given a specific message and its hash, can an attacker find a *different* message that produces the *same* hash?
Lesson 200Second Preimage Resistance
Secondary channels
Check if actions appear in activity logs or notifications elsewhere
Lesson 820Blind IDOR and Indirect Object References
Secondary Rate Limits
Apply broader limits at account, organization, or subnet levels alongside per-IP limits.
Lesson 1017Rate Limiting Bypass Prevention and Monitoring
SECOQC
(Europe): Connected banks and government facilities in Vienna
Lesson 283QKD Networks and Practical Deployment
Secret Access Key
(authenticates requests)
Lesson 1730AWS STS and AssumeRole Mechanics
Secret detection
Scan for API keys, passwords, and tokens using regex patterns and entropy analysis
Lesson 3012Container and Image Scanning
Secret retrieval metrics
showing which services have fetched updates
Lesson 1349Rotation Testing and Rollback
Secret Rotation
When a secret is compromised or expires, environment variables require manual updates and application restarts.
Lesson 1324When Environment Variables Are InsufficientLesson 1325Secret Stores vs Environment Variables
Secret scanning tools
automatically detect patterns that match common secret formats:
Lesson 2013Secrets in IaC: Detection and Prevention
Secret Type and Scope
Secrets with broad access privileges need more frequent rotation than narrowly-scoped ones.
Lesson 1344Rotation Strategies and Frequencies
Secret Versions
Every time you update a secret, Secret Manager creates a new version.
Lesson 1330Google Cloud Secret Manager
Secrets in code
Hardcoded API keys or passwords committed to Git repositories become permanently exposed
Lesson 2012Infrastructure as Code Fundamentals and Security Implications
Secrets Management
Store database passwords, API keys, and connection strings
Lesson 1329Azure Key VaultLesson 1682Container as a Service Security
Secretsdump
(part of Impacket) can dump these hashes remotely or locally, allowing offline cracking or pass- the-hash attacks.
Lesson 2119Credential Dumping Fundamentals
Secure aggregation
Cryptographic protocols ensure the server only sees the **sum** of updates, never individual contributions
Lesson 2843Federated Learning PrivacyLesson 2844Secure Aggregation and Privacy AmplificationLesson 2929Federated Learning and Analytics
Secure Boot
, which verifies digital signatures on bootloaders and kernel modules before execution— preventing rootkits from loading during startup.
Lesson 1459UEFI Architecture and Boot ProcessLesson 2764Firmware Update Mechanisms and Validation
Secure Boot verification
ensuring firmware hasn't been tampered with
Lesson 307Trusted Platform Modules (TPMs)
Secure by Default
means security features are turned ON from the start, not something users must remember to enable later.
Lesson 4Fail-Safe Defaults and Secure by Default
Secure Code Training Completion
Lesson 3040Application Security Metrics
Secure defaults
Modern XML libraries disabled external entity processing by default
Lesson 1202The Rise and Fall of XXE and XML Security
Secure delivery
Use encrypted channels (TLS) to prevent man-in-the-middle attacks during download
Lesson 2764Firmware Update Mechanisms and Validation
Secure disposal practices
address the data lifecycle's end.
Lesson 2595Confidentiality Criterion
Secure Element (SE)
is a dedicated, tamper-resistant chip physically separate from your main processor.
Lesson 2778Secure Element and Hardware Enclaves
Secure Elements
Tamper-resistant chips (often used in SIM cards, payment cards) with isolated execution environments
Lesson 2796Device Identity and Hardware Root of Trust
Secure Flag
This ensures the cookie is *only* transmitted over HTTPS connections, never over plain HTTP.
Lesson 670HttpOnly and Secure Cookie Flags
Secure Frameworks
Your trained guards.
Lesson 675Defense-in-Depth XSS Strategy
Secure key generation
using high-quality hardware random number generators
Lesson 306Hardware Security Modules (HSMs)
Secure key storage
Cryptographic keys never leave the TPM in plaintext
Lesson 2771Hardware Root of Trust and TPM
Secure LDAP API Usage
means using library functions specifically designed to escape LDAP input rather than building queries with string concatenation.
Lesson 615Preventing LDAP Injection
Secure MLOps
means treating your ML pipeline like critical infrastructure:
Lesson 2878ML Pipeline Security and Governance
Secure Multi-Party Computation (MPC)
enables multiple parties to jointly compute functions over their inputs while keeping those inputs private.
Lesson 2922Overview of Privacy-Preserving TechnologiesLesson 2923Secure Multi-Party Computation for Privacy
Secure Pairing Configuration
requires enforcing strong pairing methods.
Lesson 560Bluetooth Security Best Practices
Secure Payment Flow Design
means enforcing proper state transitions.
Lesson 927Preventing Payment Logic Vulnerabilities
Secure Simple Pairing
(SSP) or **LE Secure Connections** which require mutual authentication rather than legacy PIN- based pairing.
Lesson 560Bluetooth Security Best Practices
Secure Simple Pairing (SSP)
Uses public-key cryptography, introduced in Bluetooth 2.
Lesson 555Bluetooth Architecture and Security Model
Secure Storage
Evidence must live in tamper-proof, access-controlled locations—think encrypted storage with append-only logging.
Lesson 2375Evidence Preservation Infrastructure
Secure vendor authorization
Get written permission from each third-party provider whose systems you'll touch
Lesson 2097Third-Party and Cloud Considerations
Securing unencrypted protocols
Wrapping plain HTTP or database traffic in SSH encryption
Lesson 499SSH Tunneling Fundamentals
Security Account Manager (SAM)
database (`C:\Windows\System32\config\SAM`) stores local account password hashes.
Lesson 2135Windows Credential Dumping Techniques
Security as Code
and **Continuous Security Integration** practices to automate repetitive checks.
Lesson 2062Balancing Security and Velocity
Security Association (SA)
a one-way agreement that defines exactly *how* to protect traffic between two endpoints.
Lesson 475Security Associations (SA) and Security Policy Database
Security awareness training
for all personnel handling cardholder data
Lesson 2579Requirements 11-12: Testing and Policy
Security baselines
Block all accounts from disabling CloudTrail logging or deleting security monitoring resources.
Lesson 1718Service Control Policies and Organizational Controls
Security benefit
Prevents unexpected malicious updates
Lesson 1261Dependency Versioning and Semantic Versioning
Security boundary violations
Coalescing treats domains as equivalent when they share infrastructure.
Lesson 1101HTTP/2 Connection Coalescing Attacks
Security breach alerts
"Your password was compromised—reset immediately"
Lesson 2268Urgency and Fear-Based Manipulation
Security by Design
means integrating security considerations into every phase of the system development lifecycle— from initial requirements gathering through architecture, implementation, testing, and deployment.
Lesson 2626What is Security by Design?Lesson 2627Principle of Least Privilege
Security Champions
to make judgment calls about risk within their teams.
Lesson 2062Balancing Security and Velocity
Security champions emerge
Team members who help spread awareness and model good practices
Lesson 36Building a Security Culture and Mindset
Security Champions Program
identifies and empowers developers within each team who have an interest in security to become security advocates and knowledge bridges.
Lesson 2061Security Champions Program
Security Context constraints
Define what pods can request
Lesson 1970Pod Security Standards and Policies
Security Contexts
Labels attached to every process, file, and resource in the format `user:role:type:level`.
Lesson 1453SELinux Architecture and Components
Security control
invocations (input validation, encoding, etc.
Lesson 1378IAST Fundamentals and How It Works
Security Control Points
Where you need protections:
Lesson 2033Data Flow Diagrams for Security
Security criterion
is the foundation upon which other Trust Services Criteria rest.
Lesson 2592Security Criterion Deep DiveLesson 2617Framework Mapping and Harmonization
Security event correlation
A single attack might span multiple function invocations, API calls, and data stores—you need to connect these dots.
Lesson 1966Insufficient Logging and Monitoring
Security Event Management (SEM)
Real-time monitoring and correlation of events
Lesson 2314What is a SIEM and Why Organizations Need It
Security events
(firewall blocks, intrusion attempts)
Lesson 1490Log Management for Compliance
Security findings
that could harm the organization if leaked
Lesson 2092Legal Agreements and Authorization
Security foundation
Attackers can't exploit services you haven't exposed.
Lesson 428Default Deny Principle
Security group filtering
Even with routing enabled, security groups must explicitly allow traffic from source VPC CIDR ranges
Lesson 1816Cross-VPC Communication Controls
Security Group Modifications
Monitor changes to firewall rules, especially those opening ports to `0.
Lesson 2026Drift Detection for Security Policies and Permissions
Security group references
in other VPCs that trusted the old network
Lesson 1818VPC Deletion and Cleanup Security
Security Group Referencing
Cross-account security group references require both accounts' cooperation and AWS resource sharing
Lesson 1842Cross-Region and Cross-Account Connectivity
Security group rule
Allow inbound HTTPS (port 443) only from your load balancer's security group
Lesson 1825Combining Security Groups and NACLs for Defense-in-Depth
Security Health Analytics
scans for misconfigurations (open firewall rules, weak IAM policies, public storage buckets)
Lesson 1889GCP Security Command Center
Security Identifier (SID)
a long string like `S-1-5-21-.
Lesson 2128Windows Privilege Model and Security Context
Security incidents
(breaches, vulnerabilities exploited)
Lesson 2070Security Retrospectives and Continuous Improvement
Security Information Management (SIM)
Long-term storage and analysis of log data
Lesson 2314What is a SIEM and Why Organizations Need It
Security is approachable
Employees feel comfortable asking questions or reporting suspicious activity without fear
Lesson 36Building a Security Culture and Mindset
Security is paramount
Authentication tokens, file paths, SQL query components
Lesson 1155Rejecting vs Sanitizing Invalid Input
security labels
and **clearance levels**—not the owner's discretion.
Lesson 797Mandatory Access Control (MAC)Lesson 1451Security Labels and Clearances
Security Layer Categories
you've established multiple protective layers, but now you must evaluate which one fails first under pressure.
Lesson 30Weakest Link Analysis
Security level
Provides approximately 128 bits of security, comparable to RSA-3072
Lesson 228EdDSA and Ed25519 Signatures
Security liability
More detailed data is more valuable to attackers
Lesson 2898Granular Data Collection
Security logs
Firewalls, IDS/IPS, proxies, EDR agents, SIEM platforms
Lesson 2385Log Collection and Preservation
Security Management System (SMS)
is a systematic, organized approach to protecting sensitive information.
Lesson 22ISO 27001 and Security Management Systems
Security measures
applied (encryption, access controls)
Lesson 2561Accountability and Records of Processing
Security Metrics
are any measurable data points about your security posture.
Lesson 2525Understanding Security Metrics vs KPIs
Security Misconfiguration
broadened to include XML external entities (XXE)
Lesson 1201OWASP Top 10 2021 vs 2017: Key ChangesLesson 2104Web Application Vulnerability Hunting
Security Monitoring
Logs capture authentication attempts, privilege escalations, system changes, and network connections.
Lesson 1466Introduction to System Logging
Security note
By default, remote forwarded ports only bind to `localhost` on the remote server (for safety).
Lesson 501Remote Port Forwarding (-R)Lesson 858SOP Exceptions and Relaxations
Security OF the Cloud
(the provider's job) and **Security IN the Cloud** (your job).
Lesson 1685Security OF the Cloud vs IN the Cloud
Security Operations Center (SOC)
is a centralized team and facility responsible for continuously monitoring, detecting, analyzing, and responding to cybersecurity threats across an organization's entire IT infrastructure.
Lesson 2305What is a Security Operations Center (SOC)?
Security orchestration platforms
integrate with EDR to automatically adjust firewall rules during active incidents
Lesson 1590Host Firewall Management at Scale
Security Policy Database (SPD)
a ruleset that determines *what* traffic needs protection and *how* to protect it.
Lesson 475Security Associations (SA) and Security Policy Database
Security Questionnaires and Standards
to capture changes in their environment, controls, or risk profile
Lesson 2539Continuous Vendor Monitoring
Security Requirements Elicitation
process you've already learned—abuse cases are a structured way to discover non-obvious security needs.
Lesson 2029Abuse Cases and Misuse Cases
Security requirements evolve
but rules don't update themselves
Lesson 435Rule Review and Maintenance
Security research exemptions
exist in many countries but have strict conditions
Lesson 2722Introduction to Mobile App Reverse Engineering
Security review
Scan for backdoors, validate model provenance, check dependencies
Lesson 2878ML Pipeline Security and Governance
Security risk
You won't automatically get patch releases with security fixes
Lesson 1261Dependency Versioning and Semantic Versioning
Security Rule
defines *how* to protect electronic PHI (ePHI) through administrative, physical, and technical safeguards.
Lesson 2581HIPAA Overview and Scope
Security Slider
offers three levels:
Lesson 2986Tor Browser Security Features
Security smoke tests
confirm critical controls are active: authentication endpoints reject invalid credentials, authorization rules block unauthorized access, encryption is enabled on data in transit, and sensitive endpoints aren't publicly accessible.
Lesson 2068Post-Release Security Validation
Security team
reviews architecture, high-risk changes, and test results
Lesson 2064Security Sign-Off and Approval Workflows
Security team review
High-severity findings trigger manual review before deployment
Lesson 3033Pipeline Security Gates and Policies
Security teams
Detailed gap analysis, systems needing attention
Lesson 1607Patch Compliance Monitoring and Reporting
Security test coverage
Percentage of code/infrastructure scanned
Lesson 2060Feedback Loops and Metrics
Security Test Orchestration
is the practice of coordinating these tools into a harmonious workflow, managing their execution order, collecting results centrally, and intelligently deduplicating findings.
Lesson 3015Security Test Orchestration
Security Through Obscurity
is the opposite (and dangerous) approach: hoping that hiding how your system works will protect it.
Lesson 6Open Design and Security Through ObscurityLesson 2630Open Design and Security Through Transparency
Security Token Service (STS)
is the engine that creates temporary security credentials on demand.
Lesson 1730AWS STS and AssumeRole Mechanics
Security tradeoff
Even with cryptographic signatures, the client can *read* all data (confidentiality risk).
Lesson 705Session Storage Mechanisms: Server-Side vs Client-Side
Security training completion
Are developers empowered?
Lesson 2060Feedback Loops and Metrics
Security updates
Automatically creates pull requests to upgrade vulnerable dependencies to patched versions
Lesson 1303GitHub Dependency Scanning and DependabotLesson 1600Types of Patches and Updates
Security vulnerabilities
A new version might contain an exploitable bug
Lesson 1280Dependency Resolution and Lock Files
Security zones
PCI workloads in one VPC, general workloads in another
Lesson 1812VPC Segmentation Strategies
Security-focused
"Authentication must fail after 5 incorrect attempts with 15-minute lockout"
Lesson 2030Security User Stories
Seed corpus
Start with valid inputs that work correctly
Lesson 1386Mutation-Based Fuzzing
Seed Storage
Authenticator apps store seeds in your device's secure storage (Keychain on iOS, Keystore on Android).
Lesson 743Authenticator Apps and Seed Management
Seeding
is the process of giving your CSPRNG its initial random input.
Lesson 298CSPRNG Initialization and Seeding
Segment by context
A development EC2 instance has different "normal" behavior than a production database.
Lesson 1897Baseline Establishment for Cloud Resources
Segment your environment
Isolate systems that store, process, or transmit cardholder data
Lesson 1980PCI DSS in Cloud Environments
Segmented architecture
Place web servers in a DMZ, application servers behind additional firewalls, and databases in isolated networks.
Lesson 2671Defense in Depth Through Design
Segmented networks provide defense-in-depth
Lesson 447Flat Networks vs Segmented Networks
Segregate by trust level
Production, development, and shared services in separate VPCs
Lesson 1844Connectivity Architecture Best Practices
Select a technique
from ATT&CK that's high-risk for your environment
Lesson 2181ATT&CK for Detection and Analytics
Select a threat actor
relevant to your organization (APT29 for government, FIN7 for retail)
Lesson 2184Adversary Emulation with ATT&CK
Select strong cipher suites
and disable weak ones
Lesson 1773TLS/SSL in Cloud: Protocol Overview and Configuration
Select Your Adversary Model
Choose a threat actor relevant to your organization.
Lesson 2182ATT&CK for Red Team Planning
Selecting a trigger pattern
– a small, specific modification (e.
Lesson 2821Backdoor Triggers and Activation Patterns
Selective ingestion
is your first defense.
Lesson 1883Scalability and Cost Optimization
Selective wipe
removes only business data during off-boarding
Lesson 2745BYOD Security StrategiesLesson 2748Remote Wipe and Device Lifecycle
Selectors
are subdomain labels that allow multiple DKIM keys for one domain.
Lesson 2300DKIM Implementation and Key Management
Selects poisoning samples
Find or inject training data similar to the target
Lesson 2819Label Flipping and Targeted Poisoning
Self-propagation
Worm-like spreading without central coordination
Lesson 2754IoT Botnets: Mirai and Beyond
Self-Replicating Network Shares
work like a digital infection spreading through connected storage.
Lesson 1532Network-Based Propagation
Self-signed certificates
(not trusted by recognized authorities)
Lesson 380TLS/SSL Traffic Analysis and Certificate Inspection
Self-synchronizing ciphers
are more robust against transmission errors but propagate errors temporarily and are more complex to implement
Lesson 120Synchronous vs Self-Synchronizing Stream Ciphers
SELinux
provides the most granular control through security contexts and policies.
Lesson 1595Linux Application AllowlistingLesson 1654AppArmor and SELinux for Containers
Semantic
specific word combinations or input sequences
Lesson 2822Trojan Attacks on Neural Networks
Semantic check
Date is not in the past
Lesson 1154Semantic and Business Logic Validation
Semantic validation
Verify the *meaning* aligns with intent, not just syntax
Lesson 2862LLM Output Validation and Sandboxing
Semi-automated
System suggests fix; human approves and triggers
Lesson 3044Automated Remediation Fundamentals
SEND (Secure Neighbor Discovery)
Uses cryptographic signatures to authenticate NDP messages, though rarely deployed due to complexity
Lesson 391IPv6 Neighbor Discovery and Spoofing Parallels
Send an HTTP request
to the attacker's server with data in the URL
Lesson 577Out-of-Band SQL Injection
Send concurrent requests
Fire multiple requests simultaneously during that vulnerable window
Lesson 939Time-of-Check to Time-of-Use Testing
Send duplicate parameters
with different values:
Lesson 935Testing for Mass Assignment and HPP
Send telemetry
Stream logs and alerts to your centralized SIEM or cloud threat detection service
Lesson 1930Instance Monitoring and Runtime Protection
Sender/recipient chains
to map communication networks
Lesson 2406Email and Communication Forensics
Sends
stolen data to the attacker's server
Lesson 640Phishing via XSS Injection
Sends crafted inputs
designed to trigger vulnerabilities (SQL injection, XSS, etc.
Lesson 1368DAST Fundamentals and Runtime Testing
Senior Editor
role might inherit all permissions from **Editor**, which inherits from **Contributor**.
Lesson 801Hierarchical and Delegated Models
Senior/Lead
Advanced exploitation techniques, custom tool development, team leadership, scoping and pricing expertise.
Lesson 2089Penetration Testing Career Paths
Sense of legitimacy
using logos, formatting, and language that mirrors real communications
Lesson 2253Email-Based Phishing Fundamentals
Sensitive Authentication Data (SAD)
is used to authenticate cardholders during transactions:
Lesson 2570Cardholder Data and Sensitive Authentication DataLesson 2573Requirement 3: Protecting Stored Cardholder Data
Sensitive data caching
API responses with user details, tokens, or private information might be cached indefinitely
Lesson 1076Cache API and Service Worker Storage
Sensitive data is exfiltrated
to the attacker's server
Lesson 863Exploiting CORS Misconfigurations
Sensitive data theft
Any site can include your JSONP endpoint and steal user data if the endpoint doesn't validate the requester
Lesson 1061Bypassing SOP with JSONP
Sensitive logs
Access logs containing user data
Lesson 620XXE Attack Types: File Disclosure
Sensitive sinks
(SQL queries, file operations, command execution)
Lesson 1380Instrumentation Agents and Runtime Monitoring
Sensitivity miscalculation
Underestimating how much a single user affects a query can leak privacy.
Lesson 2921Practical Differential Privacy Implementation
Sensor-rich environments
create threat vectors impossible on desktops.
Lesson 2693Mobile vs Desktop Threat Differences
Sentinel
(HashiCorp's policy framework) integrates natively with Terraform Cloud and Enterprise, letting you enforce policies before `terraform apply` runs.
Lesson 2015Policy as Code for IaC ValidationLesson 3005Policy Enforcement with OPA and Sentinel
Sentinel language
(not Rego) and evaluate against imported data from the HashiCorp tool.
Lesson 3022HashiCorp Sentinel
Separate concerns
by creating distinct layers for different trust levels—don't mix public utility libraries with internal authentication libraries in the same layer.
Lesson 1957Function Layer Security
Separate encryption tiers
Use TDE for broad protection, reserve column-level encryption only for truly sensitive fields like credit cards.
Lesson 1799Performance Impact of Database Encryption
Separate processes
Run key-handling code in a dedicated process with restricted file system access
Lesson 310Key Access Control and Isolation
Separate security/audit logging
from operational logs—different retention, access controls
Lesson 2635Compromise Recording and Auditability
Separate validation layers
Input validation should happen in a distinct layer before data reaches business logic
Lesson 1212Separation of Concerns for Security Boundaries
Separation of Concerns
means dividing your application into distinct modules where each handles one responsibility.
Lesson 1212Separation of Concerns for Security BoundariesLesson 1216Economy of Mechanism and SimplicityLesson 1338Init Containers and Sidecar Patterns
Separation of Duties (SoD)
is an architectural control that requires two or more people to complete a critical task.
Lesson 2664Separation of Duties
Separation of Privilege
is a security design principle that requires multiple distinct conditions, credentials, or parties to be satisfied before a sensitive operation can proceed.
Lesson 2631Separation of PrivilegeLesson 2651Application-Layer SegmentationLesson 2654Defense-in-Depth: Core Concept and PhilosophyLesson 2670Least Common Mechanism
Separator byte
(0x00) marks where the message starts
Lesson 145RSA Padding Schemes: PKCS#1 v1.5
Sequence events
chronologically and identify gaps
Lesson 2417Timeline Construction Fundamentals
Sequence Manipulation
Complete steps in the wrong order.
Lesson 938Testing State and Workflow Violations
Sequence the techniques
into a realistic attack chain (initial access → persistence → credential access → lateral movement → exfiltration)
Lesson 2184Adversary Emulation with ATT&CK
Sequencer
tests whether session tokens, CSRF tokens, or password reset links contain sufficient entropy.
Lesson 2215Advanced Burp Features and Workflows
Sequential ID Fuzzing
involves incrementing or decrementing IDs to discover accessible objects.
Lesson 1021Testing for BOLA Vulnerabilities
Sequential Tokens
If session IDs increment predictably (`SESSION123`, `SESSION124`), attackers can easily guess the next valid session.
Lesson 720Session Token Brute-Force and Enumeration
Serial Number
A unique identifier assigned by the issuer—like a passport number
Lesson 171X.509 Certificate Structure and Format
Serialization
is the process of converting complex objects (like classes, arrays, or data structures) into a simple format for storage or transmission—think JSON, XML, YAML, or binary formats.
Lesson 1183Deserialization Fundamentals and Attack Surface
Serpent
was another AES finalist, designed with conservative security as the priority.
Lesson 93Alternative Block Ciphers: Blowfish, Twofish, Serpent
Serve fake login portals
(captive portals) harvesting usernames and passwords
Lesson 534Evil Twin Attacks: Mechanics and Execution
server
periodically queries the OCSP responder and receives a signed, time-stamped response
Lesson 193OCSP Stapling and Must-StapleLesson 1413CIS Benchmarks Overview and Structure
Server breaches reveal nothing
Even if attackers steal the server database, they get no usable credentials
Lesson 247ZKP Applications in Authentication
Server certificate validation
– Confirms the server presents a valid, trusted certificate
Lesson 1796Database Connection Encryption
Server configuration
disable 0-RTT entirely for sensitive endpoints
Lesson 1103HTTP/3 0-RTT Replay Attacks
Server Message Block (SMB)
protocol allows file sharing and remote administration over networks.
Lesson 2154SMB and Administrative Shares
Server misconfigurations
(exposed admin panels, verbose errors)
Lesson 3010Dynamic Application Security Testing (DAST) Deep Dive
Server processes the request
and includes the unsanitized input directly in the HTML response
Lesson 630Reflected XSS: Immediate Execution
Server side
The response must include `Access-Control-Allow-Credentials: true`
Lesson 877Credentials and CORS: Access-Control-Allow-Credentials
Server Zone
Internal application servers (10.
Lesson 450Internal Network Zoning
Server-side cleanup
Delete the session data completely from your session store (memory, database, Redis).
Lesson 709Session Termination and Logout
Server-Side HPP
happens when duplicate parameters affect how the **backend server** processes requests.
Lesson 933Server-Side vs Client-Side HPP
Server-Side Request Forgery (A10:2021)
and **Security Misconfiguration (A05:2021)**
Lesson 1202The Rise and Fall of XXE and XML Security
Server-Side Request Forgery (SSRF)
is a vulnerability that allows an attacker to trick a server into making HTTP requests on their behalf.
Lesson 882SSRF Fundamentals and Attack Surface
Server-side settings
that reject unencrypted connections
Lesson 1778Database Connection Encryption
Server-Side State Validation
Every workflow transition must be verified server-side.
Lesson 919Defensive Workflow State Management
Server-Side Validation
is your first line of defense.
Lesson 927Preventing Payment Logic Vulnerabilities
Serverless functions
often have elevated IAM permissions and access to cloud metadata endpoints.
Lesson 891SSRF in Modern ArchitecturesLesson 1318Environment Variables as a Secrets Storage Mechanism
Servers store and forward
encrypted data without ever possessing decryption keys
Lesson 2939What is End-to-End Encryption (E2EE)
Service consolidation
Centralize logging, monitoring, or security scanning services in one VPC accessible by others
Lesson 1836VPC Peering Fundamentals
Service Control Policies
to prevent overly permissive trust policy creation.
Lesson 1744Common Cross-Account MisconfigurationsLesson 1790Storage Service Encryption Integration
Service Creation
Attackers use `sc.
Lesson 1539Service Creation and Modification
Service degradation
Gracefully disable non-critical features to protect core functions
Lesson 1861DDoS Response and Incident Management
Service DLL Hijacking
Many Windows services load DLLs at startup.
Lesson 1539Service Creation and Modification
Service endpoints
(also called VPC endpoints, private endpoints, or private links depending on the provider) create a direct, private connection from your VPC to cloud services.
Lesson 1845Service Endpoints vs Public Internet AccessLesson 1846VPC/VNet Service Endpoints Fundamentals
Service enumeration
Identify internal infrastructure and software versions
Lesson 621XXE Attack Types: SSRF via XXELesson 2197Auxiliary Modules and Scanning
Service integrations
Grant S3 permission to invoke your function when objects are uploaded, or allow API Gateway to execute your function when endpoints are called.
Lesson 1952Resource-Based Policies for Functions
Service Level Agreements (SLAs)
you defined during the NIST Preparation phase.
Lesson 2362Incident Severity and Priority Classification
Service Masquerading
Malicious services are given names and descriptions similar to legitimate Windows services to avoid detection during manual inspection.
Lesson 1539Service Creation and Modification
Service modifications
involve creating new Windows services or Linux systemd units that start automatically with the system, or modifying existing legitimate services to include malicious functionality—a technique called DLL injection or binary replacement.
Lesson 2118Maintaining Access and Persistence Mechanisms
Service provider management
ensuring vendors also comply
Lesson 2579Requirements 11-12: Testing and Policy
Service Provider-initiated
flow starts when you try accessing a protected resource:
Lesson 777SAML Authentication Flow
Service providers and contractors
have specific obligations but aren't directly liable if they follow contractual requirements
Lesson 2562CCPA Overview and Scope
Service supply chain
Hosting providers, payment processors, analytics platforms
Lesson 2540Fourth-Party and Supply Chain Risk
Service tokens
with limited scope and lifetime
Lesson 1342Access Control for Runtime Secret Retrieval
Service-managed keys
Provider handles everything (easiest but least control)
Lesson 1793Transparent Data Encryption (TDE)
Service-Managed Keys (SSE-S3, SSE-GCS)
The cloud provider creates, manages, and rotates encryption keys automatically.
Lesson 1790Storage Service Encryption Integration
Service-to-service authentication
Applications running on compute instances assume roles automatically, eliminating hardcoded credentials in code.
Lesson 1712IAM Roles: Federated and Assumable Identities
Service-Worker-Allowed Header
Servers can restrict registration scope explicitly.
Lesson 1082Service Worker Registration and Hijacking
Services
`HKLM\System\CurrentControlSet\Services` (runs with SYSTEM privileges)
Lesson 1537Registry-Based Persistence on Windows
Services behind firewalls
(databases, admin panels, internal APIs)
Lesson 886Internal Network Enumeration via SSRF
Services get decommissioned
but their rules remain active
Lesson 435Rule Review and Maintenance
Services or federated users
with overly broad conditions
Lesson 1756Role Assumption and Trust Policy Exploitation
Session Activity Logging
tracks key events:
Lesson 737Session Monitoring and Anomaly Detection
Session analysis
shows if a Domain Admin is logged into a workstation where you have local admin—perfect for credential harvesting with tools like Mimikatz.
Lesson 2240BloodHound for Active Directory Attack Paths
Session association
links related events:
Lesson 1495User and Process Activity Tracking
Session behavior
No cookies, ignored JavaScript, suspicious navigation paths
Lesson 1859Bot Management and Detection
Session Creation
During login, the system might check "does this user already have a session?
Lesson 907Race Conditions in Authentication and Authorization
Session fixation attacks
depend on the session ID remaining unchanged across authentication.
Lesson 735Session Regeneration After Privilege Changes
Session Handling
means the DAST scanner must maintain its authenticated state across hundreds or thousands of requests.
Lesson 1373Authentication and Session Handling in DAST
Session handling rules
automate token extraction and injection across requests.
Lesson 2215Advanced Burp Features and Workflows
Session hijack
Steal a valid session token and access resources the original user could
Lesson 1213Complete Mediation and Access Checks
Session hijacking attempts
with invalid sequence numbers
Lesson 418Stateful Inspection Firewalls
Session hijacking mitigation
Even if an attacker obtains a pre-authentication session token through network sniffing, regeneration ensures it can't be used post-login.
Lesson 735Session Regeneration After Privilege Changes
Session ID Prediction
If session identifiers follow predictable patterns, attackers can guess valid session IDs belonging to privileged users and hijack their sessions.
Lesson 827Session and Cookie Manipulation
Session IDs
or process IDs tracking activity chains
Lesson 2419Event Correlation Techniques
Session key derivation
These temporary keys combine to create unique encryption keys
Lesson 2943Forward Secrecy in E2EE
Session Limiting
Implement a maximum number of concurrent sessions per user (often 3-5 for consumer apps).
Lesson 736Concurrent Session Management
Session management
means tracking which devices are authorized.
Lesson 2955Device Management and Multi-Device Security
Session Management Issues
APIs may fail to invalidate tokens after logout, allow token reuse across different contexts, or not properly rotate tokens after authentication events.
Lesson 1028API2:2023 - Broken Authentication
Session policies
are inline policies you pass during role assumption that *further restrict* the permissions available in that session.
Lesson 1732Role Chaining and Session Policies
Session Reconstruction
involves following TCP streams to reassemble multi-packet conversations.
Lesson 2411Protocol Analysis and Reconstruction
Session refresh
Re-authenticating if sessions expire during long scans
Lesson 1373Authentication and Session Handling in DAST
Session Riding
take exploitation to another level by operating *inside* your browser itself.
Lesson 721Man-in-the-Browser and Session Riding
Session shadowing
Attach to existing sessions rather than creating new ones
Lesson 2156RDP and GUI-Based Lateral Movement
Session storage
(server-side data tied to a session ID)
Lesson 911Understanding Application State and Workflow
Session Token
(proves the credentials are temporary and valid)
Lesson 1730AWS STS and AssumeRole Mechanics
Session tokens and cookies
that prove a user is already authenticated.
Lesson 400Session Hijacking via MITM
Sessions
Interactive, time-limited, browser or CLI-based
Lesson 1720Service Accounts vs User Accounts in Cloud
SET
, **msfvenom**, and **GoPhish** can generate these documents and orchestrate the delivery.
Lesson 2250Malicious Office Document Generation
Set Meaningful Thresholds
Don't alert on a single failed login; alert on 10 failed attempts in 5 minutes.
Lesson 1896Cloud Alert Design Principles
Set resource limits
to prevent denial-of-service
Lesson 618XML Injection Prevention
Set retention limits
to automatically purge old failures and reduce exposure window
Lesson 1958Dead Letter Queues and Error Handling
Set retention policies
balancing compliance needs against storage costs
Lesson 1870Log Sources and Data Ingestion
Set strict `Cache-Control` headers
for dynamic content
Lesson 1865CDN Cache Security and Cache Poisoning
Set sunset dates
and communicate them clearly
Lesson 1038API Versioning and Deprecation
Setting contextual thresholds
(5 failed logins might matter; 500 is definitively suspicious)
Lesson 1895Custom Detection Rules and Tuning
Setup
A special key generation ceremony creates key *shares* distributed to n parties.
Lesson 265Threshold Encryption and Decryption
Severity Classification
Not all vulnerabilities demand the same urgency.
Lesson 2069Vulnerability Response and Hotfix Process
Severity Distribution
shows what types of vulnerabilities researchers find.
Lesson 2485Bug Bounty Metrics and ROILesson 3038Vulnerability Management Dashboards
Severity level
(Critical/High/Medium/Low) based on predefined criteria
Lesson 2427Incident Status Updates and Escalation
Severity levels
Fail on HIGH/CRITICAL, warn on MEDIUM
Lesson 3027SAST Integration in Pipelines
Severity rating
(Critical, High, Medium, Low)
Lesson 1367Interpreting and Triaging SAST Results
severity scoring
that accounts for threat type, asset criticality, and potential impact.
Lesson 2344Alert Triage Fundamentals and WorkflowLesson 2361Incident vs Event: Defining the Threshold
Severity Tuning
Use graduated severity levels (Critical/High/Medium/Low).
Lesson 1896Cloud Alert Design Principles
Severity-Based Prioritization
Not all findings deserve equal attention.
Lesson 3016False Positive Management
SGID (Set Group ID)
On executables, processes run with the file's group privileges.
Lesson 1424Special Permission Bits: SUID, SGID, and Sticky
SHA-1
Google's 2017 "SHAttered" attack produced the first practical SHA-1 collision, requiring significant but achievable computational resources.
Lesson 208MD5 and SHA-1: Broken Hash FunctionsLesson 2225Password Cracking Fundamentals
SHA-1 (160-bit)
is deprecated: 2^80 is becoming reachable
Lesson 202The Birthday Paradox and Collision Probability
SHA-2 family
provides four widely-trusted hash functions that remain unbroken today.
Lesson 209SHA-2 Family: SHA-224, SHA-256, SHA-384, SHA-512
SHA-224 and SHA-384
are truncated versions (SHA-384 is actually SHA-512 with a different initialization and truncated output).
Lesson 209SHA-2 Family: SHA-224, SHA-256, SHA-384, SHA-512
SHA-256 or better
certificate signatures
Lesson 2706App Transport Security (ATS)
SHA-256/SHA-512
Modern, stronger alternatives
Lesson 2225Password Cracking Fundamentals
SHA-3
, or **BLAKE2** for cryptographic hashing needs.
Lesson 208MD5 and SHA-1: Broken Hash Functions
Share knowledge
across teams to avoid duplicate triage work
Lesson 3016False Positive Management
Share threat intelligence
(lessons 2449, 2517) while respecting confidentiality
Lesson 2541Vendor Security Incident Management
Shared base vulnerabilities
Multiple images sharing `ubuntu:20.
Lesson 1632Container Image Anatomy and Layers
Shared keys or certificates
Authentication typically uses pre-shared keys (PSKs)—store these securely and rotate periodically
Lesson 1840VPN Connections to Cloud
Shared Language
When everyone understands terms like **trust boundaries**, **entry points**, and **Information Disclosure**, communication improves dramatically between developers and security teams.
Lesson 83Developer Training on Threat Modeling
Shared Ownership
No more "that's security's job.
Lesson 2054DevSecOps Philosophy and Culture Shift
Shared responsibility confusion
Which threats is the provider detecting versus you?
Lesson 1886Cloud Threat Detection Overview
shared responsibility model
think of it like renting an apartment building where the landlord secures the foundation and structure, but you're responsible for locking your doors and securing your belongings.
Lesson 1677IaaS Security ResponsibilitiesLesson 1684Shared Responsibility Model Fundamentals
Shared runners
where multiple teams' builds execute on the same infrastructure
Lesson 1323Environment Variables in CI/CD Pipelines
Shared Secret Derivation
Alice computes (Bob's value)^a, Bob computes (Alice's value)^b—both arrive at g^(ab) mod p
Lesson 2941Key Exchange in E2EE Systems
Shared secrets
Devices derive keys from a master secret, synchronized through secure channels
Lesson 2947E2EE Backup and Multi-Device
Shared services
Ideal for centralizing operational tools without forcing all traffic through choke points
Lesson 1817VPC Design Patterns for Security
Shared training data
– Models trained on ImageNet learn similar high-level features (edges, textures, shapes)
Lesson 2817Transferability of Adversarial Examples
Shared Workers
can be accessed by multiple pages from the same origin.
Lesson 1085Web Workers and Shared Workers Security
Sharing
(under newer laws like CPRA) also includes cross-context behavioral advertising—tracking users across different websites or apps.
Lesson 2565Sale and Sharing of Personal InformationLesson 2885End-to-End Security and Lifecycle Protection
Shell extensions
are more insidious—they're DLLs that extend Windows Explorer's functionality (context menus, property sheets, icon handlers).
Lesson 1540Startup Folders and Shell Extensions
Shell Scripts
Traditional bash or PowerShell scripts that execute hardening commands sequentially.
Lesson 1418Automated Hardening and Remediation Scripts
Shield Advanced
Paid tier with enhanced Layer 7 detection, 24/7 response team (DRT), cost protection during attacks, and integration with WAF
Lesson 1857Cloud DDoS Protection Services
Shield Standard
Free, automatic protection against common Layer 3/4 attacks (SYN floods, UDP reflection)
Lesson 1857Cloud DDoS Protection Services
Shielded transactions
where sender, receiver, and amount are encrypted
Lesson 248Privacy-Preserving Blockchains with ZKPs
Shift briefings
Outgoing analysts summarize active investigations, escalations, and pending tasks
Lesson 230924/7 Operations and Shift Management
Shift-left
means moving security testing earlier in the software development lifecycle:
Lesson 3026Pipeline Security Scanning Overview
shift-left security
the practice of moving security testing earlier in the development process.
Lesson 1358Introduction to Static Application Security Testing (SAST)Lesson 2439Container and IaC Scanning
Shimming
Padlocks and other locks with spring-loaded latches can be defeated by inserting thin metal shims between the shackle and body, compressing the locking mechanism and releasing the shackle without touching the actual cylinder.
Lesson 2273Lock Picking and Bypass Techniques
Short credential lifetimes
for service accounts and Kerberos tickets
Lesson 2159Detection and Defense Against Lateral Movement
Short passwords
(6 characters or less) can be brute-forced in minutes
Lesson 696Brute Force and Dictionary Attacks
Short Tokens
A 32-bit session ID has only 4.
Lesson 720Session Token Brute-Force and Enumeration
Short TTL Trick
The DNS response has an extremely short Time-To-Live (TTL), like 0-1 seconds
Lesson 1129DNS Rebinding Attacks
Short-lived caching
(seconds to minutes) works for high-frequency operations
Lesson 1334Secret Store Access Patterns
Short-lived credential reuse
from unauthorized locations
Lesson 1735Credential Theft and Token Security
Short-lived keys
(hours to days): Session keys, temporary authentication tokens
Lesson 316Key Expiration and Renewal
Shortened coordination window
Instead of 90 days, you might allow 7-14 days or less
Lesson 2477Handling Zero-Day and Active Exploitation
Shorter durations
reduce the blast radius if tokens leak
Lesson 1731Session Duration and Token Lifecycle
Showback
means showing them the cost without billing.
Lesson 2000Cost Allocation and Chargeback with Tags
Shuffling
Randomize values within a column across rows
Lesson 2908Data Masking and Tokenization
Shutdown
Disable the port entirely (most secure)
Lesson 414Port Security and MAC Filtering
Side channels
Implementation flaws like timing leaks bypass AEAD entirely
Lesson 130AEAD Security Properties and Limitations
Side effects
Changed settings, triggered emails, modified timestamps
Lesson 820Blind IDOR and Indirect Object References
Side-channel leakage
Power consumption or electromagnetic radiation revealing secret operations
Lesson 168ECC Implementation Vulnerabilities
Side-channel resistance
Your curve operations must use constant-time algorithms to prevent timing attacks—critical when attackers have physical access.
Lesson 2794Elliptic Curve Cryptography for IoT
Side-loaded apps
Bypassing official store protections entirely
Lesson 2694App-Level Threats
Sidecar pattern
A separate container runs alongside your application, fetches secrets from a secret store, and writes them to a shared volume or memory space that your app reads from.
Lesson 1335Runtime Secret Injection Patterns
Sidecar patterns
that inject secrets into shared volumes
Lesson 1972Secrets Management in Kubernetes
Sideloading controls
prevent users from installing apps from sources outside your approved channels.
Lesson 2746Mobile App Distribution and Whitelisting
SIEM
, alert triage workflows, and incident response playbooks.
Lesson 2443Continuous Scanning and Real-Time Detection
SIEM correlation rules
Match log events against IoC (Indicators of Compromise) lists
Lesson 1894Threat Intelligence Integration
SIG (Standardized Information Gathering)
questionnaires, maintained by Shared Assessments, contain hundreds of questions spanning physical security, access controls, data protection, incident response, and more.
Lesson 2537Security Questionnaires and Standards
Sign blobs
using the service account's identity
Lesson 1725GCP Service Account Impersonation
Sign the CSR
with your private key to prove ownership
Lesson 176Certificate Signing Requests (CSR)
Sign them yourself
with your own keys (requires enrolling your certificate in db)
Lesson 1462Configuring and Managing Secure Boot
Sign-Off Criteria
define what must be true before approval:
Lesson 2064Security Sign-Off and Approval Workflows
Signal Protocol
uses authenticated key exchange for secure messaging
Lesson 160Authenticated Key Exchange Protocols
Signal strength anomalies
(legitimate AP suddenly appearing elsewhere)
Lesson 536Detecting Rogue Access Points
Signature
packets (contain cryptographic signatures)
Lesson 2960OpenPGP Message Format and Operations
Signature Algorithm
Specifies how the CA signed this certificate (e.
Lesson 171X.509 Certificate Structure and Format
Signature creation
analysts write patterns to detect the threat
Lesson 456Signature-Based Detection Fundamentals
Signature matching
Looking for exact byte sequences from known attacks (e.
Lesson 372Evading Intrusion Detection SystemsLesson 1608Vulnerability Scanning Fundamentals
signature verification
, both schemes reverse the process: apply the public key operation, remove padding, and compare the recovered hash to a freshly computed hash of the message.
Lesson 226RSA Signature Schemes (PKCS#1 v1.5 and PSS)Lesson 774ID Token Validation and SecurityLesson 793JWT Best Practices and ValidationLesson 2764Firmware Update Mechanisms and Validation
Signature-based detection
works by comparing file patterns against a database of known malware signatures.
Lesson 961Virus Scanning and Malware Detection Integration
signature-level permissions
to restrict access to apps signed with your certificate.
Lesson 2715Android Inter-Process Communication SecurityLesson 2738Input Validation and IPC Security
signatures
in network traffic—like scanning for a known attack phrase in a single packet.
Lesson 369Fragmentation and Packet ManipulationLesson 456Signature-Based Detection Fundamentals
Signed artifacts
Ensure build outputs haven't been tampered with post-build
Lesson 1403Pipeline Security and Release Gates
Signed Certificate Timestamp (SCT)
The log returns a cryptographically signed promise that the certificate was logged
Lesson 189Certificate Transparency Logs VerificationLesson 194Certificate Transparency Logs
Signed Response
The key signs the challenge with the private key and returns it
Lesson 744Hardware Security Keys and FIDO U2F
Signed URLs
work like concert tickets with holograms—they contain encrypted proof that your origin server authorized this specific request.
Lesson 1866CDN Access Control and Token Authentication
Signing vs Verification Speed
RSA is slow to sign but fast to verify (useful for software where one publisher signs, millions verify).
Lesson 234Signature Performance and Implementation Considerations
Sigstore
project) revolutionizes this by offering "keyless" signing that leverages your existing identity providers (like GitHub, Google, Microsoft) combined with a transparency log.
Lesson 1645Cosign and Sigstore for Image Signing
Sigstore Policy Controller
Enforces Cosign signature verification
Lesson 1649Admission Controllers and Policy Enforcement
Silent auto-updates
that IT may not even track
Lesson 1606Third-Party Application Patching
Silent failures
Some apps auto-update but fail quietly when corporate proxies or permissions block them.
Lesson 2460Third-Party and Application Patching
Silent Operation
Spyware avoids obvious symptoms that might alert users.
Lesson 1523Spyware and Information Stealers
SIM swapping
is when an attacker convinces your mobile carrier (through social engineering or insider help) to transfer your phone number to a SIM card they control.
Lesson 742SMS and Email-Based 2FA Weaknesses
Similar task objectives
– Classification models optimize for similar decision surfaces
Lesson 2817Transferability of Adversarial Examples
SIMON and SPECK
are NSA-designed cipher families optimized for both hardware and software implementations.
Lesson 2793Lightweight Cryptographic Algorithms
Simple deployments
with a small number of secrets
Lesson 1318Environment Variables as a Secrets Storage Mechanism
Simple increments
Starting at `1000` and adding 1 each time
Lesson 814Sequential and Predictable Identifiers
Simple Power Analysis (SPA)
, where distinctive operation patterns become visible in a single trace.
Lesson 2772Side-Channel Attacks: Power Analysis
Simple requests
go through immediately if they meet basic criteria (like GET or POST with standard headers).
Lesson 859CORS Basics and Preflight Requests
Simple user experience
Just tap the key
Lesson 744Hardware Security Keys and FIDO U2F
Simpler design
No complex Galois field mathematics like GCM; just addition, rotation, and XOR operations
Lesson 127ChaCha20-Poly1305
Simpler implementation
fewer opportunities for side-channel attacks
Lesson 238EdDSA and Modern Signature Standards
Simpler logic
You define "good" once, rather than trying to enumerate all possible "bad"
Lesson 1150Allowlist vs Denylist Approaches
Simplicity
Operations are mathematically elegant and efficient
Lesson 89AES: Rijndael Selection and Design
Simplified auditing
VPC Flow Logs capture traffic at the transit gateway level
Lesson 1838Transit Gateway Architecture
Simplified offboarding
revoke access at the IdP, not in every cloud account
Lesson 1733Federation and Temporary Credentials
Simplified Rule Management
You can define sets, dictionaries, and variables, making complex rules cleaner and easier to update.
Lesson 443nftables Architecture and Improvements
Simplifies audits
Auditors can focus on clearly defined boundaries
Lesson 453Segmentation for Compliance
Simplifies monitoring
you watch one critical gateway instead of dozens of paths
Lesson 29Security Choke Points
Simplifies onboarding/offboarding
Add or remove a user from a group rather than managing dozens of individual permissions
Lesson 1428Group Management and Role Separation
Simulated attacks
(unannounced phishing tests, social engineering drills)
Lesson 2287Security Awareness Training Fundamentals
Simulation and Lab Environments
Lesson 434Rule Testing and Validation
Simultaneous form submissions
Submitting the same form multiple times before the first submission completes
Lesson 917Concurrent Workflow Exploitation
Single connection dependency
One compromised connection affects all multiplexed streams
Lesson 1097HTTP/2 Protocol Architecture and Security Model
Single Crack Mode
Uses login names and GECOS information to generate intelligent guesses—perfect when you have username context.
Lesson 2231John the Ripper Techniques
Single Logout
means when you log out from one place, you're logged out everywhere:
Lesson 775OIDC Session Management and Single Logout
Single pane of glass
for security operations
Lesson 1582EDR Integration with SIEM and SOAR
Single point of compromise
One stolen credential isn't enough
Lesson 2631Separation of Privilege
Single session only
(logging in elsewhere terminates previous sessions)
Lesson 710Concurrent Sessions and Device Management
Single Sign-On (SSO)
, users authenticate once to the IdP and receive a token proving their identity.
Lesson 1698Identity Federation and Single Sign-On
single source of truth
and never trusting that clients follow the rules.
Lesson 919Defensive Workflow State ManagementLesson 2625Remediation Tracking and Reporting
Single-entry enforcement
One badge swipe = one person passes
Lesson 2282Mantrap and Turnstile Controls
Single-Use Enforcement
Once a token is used successfully, immediately invalidate it in your session storage.
Lesson 753Magic Links and One-Time Codes
Single-use limitation
Each garbled circuit can only be evaluated once securely
Lesson 258Garbled Circuits for Two-Party Computation
Single-use only
each code expires immediately after use
Lesson 747Recovery and Backup Codes
Singles
are self-contained, complete payloads that don't need additional components.
Lesson 2195Exploit Modules and Payloads
Sink detection
Where dangerous operations happen (SQL execution, HTML rendering, file access)
Lesson 1362SAST Rule Sets and Vulnerability Detection
Sinks
Monitor sensitive operations that could be exploited
Lesson 1381Data Flow Analysis and Taint Tracking
Site Cloner
Automatically clones any website you specify by URL, making it ideal for targeting organization- specific portals and custom applications.
Lesson 2246Credential Harvester and Attack Vectors
Site Isolation
ensures that different origins run in completely separate processes.
Lesson 1054Browser Security Features and Isolation
site-to-site VPN
creates an encrypted tunnel between two entire networks—not individual users.
Lesson 468Site-to-Site VPNsLesson 1840VPN Connections to Cloud
Size
Large CAs may revoke thousands of certificates—the list grows constantly
Lesson 191Certificate Revocation Lists (CRLs)
Size Reduction
Remove inputs that don't add unique coverage.
Lesson 1393Corpus Management and Minimization
SLA compliance rates
as a key metric.
Lesson 2453Vulnerability Age and Remediation SLAs
SLA expectations
security reviews shouldn't become bottlenecks, so establish timeframes (e.
Lesson 2064Security Sign-Off and Approval Workflows
Slack space
is the unused portion between a file's actual end and the end of its allocated cluster.
Lesson 2402File Carving and Deleted File Recovery
SLAs
Response and resolution timeframes
Lesson 2071Introduction to Bug Bounty Programs
SLE
$500,000 per breach (legal fees, notification costs, downtime)
Lesson 2512Calculating Annualized Loss Expectancy (ALE)
SLE (Single Loss Expectancy)
The monetary loss from a single incident
Lesson 2512Calculating Annualized Loss Expectancy (ALE)
Sliding window
Track usage over rolling time periods to prevent burst attacks
Lesson 1002Query Cost Analysis and Rate Limiting
Slow down timing
Spread requests over time to avoid pattern detection
Lesson 366Stealth Scanning Fundamentals
Slow enough
that breaking preimage resistance or finding collisions requires astronomical computational resources
Lesson 205Computational Efficiency Requirements
Slower encryption/decryption
Modular exponentiation operations grow cubically with key size
Lesson 144RSA Key Sizes and Security Strength
Slower key generation
Finding sufficiently large primes takes more time
Lesson 144RSA Key Sizes and Security Strength
Slower performance
due to database queries on every request.
Lesson 732Session Storage Mechanisms
SLSA
(Supply-chain Levels for Software Artifacts, pronounced "salsa") is a security framework that defines graduated levels of supply chain integrity.
Lesson 1300Package Provenance and SLSALesson 1650Supply Chain Levels for Software Artifacts (SLSA)
SLSA 1
Build process is documented and generates provenance metadata
Lesson 1650Supply Chain Levels for Software Artifacts (SLSA)
SLSA 2
Version control and hosted build service with authenticated provenance
Lesson 1650Supply Chain Levels for Software Artifacts (SLSA)
SLSA 3
Hardened build platforms that prevent tampering during builds
Lesson 1650Supply Chain Levels for Software Artifacts (SLSA)
SLSA 4
Two-person review and hermetic, reproducible builds
Lesson 1650Supply Chain Levels for Software Artifacts (SLSA)
SLSA Level 0
No guarantees—anyone could have built this package anywhere
Lesson 1300Package Provenance and SLSA
SLSA Level 1
Build process is documented and provenance exists
Lesson 1300Package Provenance and SLSA
SLSA Level 2
Builds use version control and are signed with cryptographic attestations
Lesson 1300Package Provenance and SLSA
SLSA Level 3
Source and build platforms are hardened against tampering
Lesson 1300Package Provenance and SLSA
SLSA Level 4
Highest assurance with two-person review and hermetic builds
Lesson 1300Package Provenance and SLSA
Small keys
32-byte (256-bit) keys with 128-bit security strength
Lesson 167Curve25519 and EdDSA
Small subgroup attacks
exploit weak group parameters.
Lesson 159Small Subgroup and Invalid Curve Attacks
Small ε (e.g., 0.1-1.0)
Strong privacy protection, individual records heavily obscured
Lesson 2913The Formal Definition of Differential Privacy
Small-screen obfuscation
URLs and sender details harder to verify on mobile displays
Lesson 2700User Behavior and Social Engineering
Smaller attack surface
Parsers are simpler and less prone to bugs
Lesson 1191Alternative Serialization FormatsLesson 2795DTLS and TLS 1.3 for IoT
Smaller certificates
ECDSA certificates are compact, reducing bandwidth
Lesson 170ECC in Practice: TLS and Beyond
Smaller keys
256-bit ECDSA vs 3072-bit RSA means faster transmission and less storage
Lesson 227ECDSA: Elliptic Curve Digital Signature Algorithm
Smaller packets
CoAP headers are ~4 bytes vs.
Lesson 2783CoAP (Constrained Application Protocol)
SMB Exploitation
is a common attack vector.
Lesson 1532Network-Based Propagation
Smishing
(SMS phishing) and **vishing** (voice phishing) exploit the immediacy and trust people place in text messages and phone calls.
Lesson 2259Smishing and Vishing
Smuggle a malicious request
that targets a popular, cacheable resource (like `/index.
Lesson 1109Exploiting Smuggling for Web Cache Poisoning
Snapshot Before Action
Create an immediate snapshot of the instance's storage volumes.
Lesson 1908Instance Isolation and Containment
Snapshot encryption
inherits the volume's encryption state
Lesson 1770Encryption for Block Storage and Virtual Disks
Snapshot everything
– Take disk snapshots of compromised instances before any changes
Lesson 1906Evidence Preservation in Cloud EnvironmentsLesson 2086Setting Up a Testing Environment
Snapshot everything first
Create disk snapshots, export logs to immutable storage, and tag resources with "DO NOT DELETE" policies before analysis.
Lesson 1915Evidence Identification and Preservation in Cloud
Snapshot Length
Capture only the first N bytes of each packet (e.
Lesson 383Packet Capture Performance and Ring Buffers
Snapshot retention policies
Keep multiple recovery points based on RPO requirements
Lesson 1931Instance Termination Protection and Data Persistence
Snapshot/AMI exposure
Forgotten credentials or keys in disk images
Lesson 1923Cloud VM Threat Model and Attack Surface
snapshots
(point-in-time copies of storage volumes) and **images** (VM instance configurations and disks) to preserve evidence.
Lesson 1916Snapshot and Image AcquisitionLesson 1928Encrypted Storage and SnapshotsLesson 2386Cloud and Virtual Environment Evidence
Snapshots and AMIs
containing private subnet configurations
Lesson 1818VPC Deletion and Cleanup Security
Sniffing & Spoofing
Traffic capture and manipulation
Lesson 2188Kali Tool Categories and Organization
Sniffing IoT protocols
means capturing raw network traffic using tools like Wireshark or tcpdump, then dissecting packet structures to understand message formats, authentication tokens, and command sequences.
Lesson 2788Protocol-Level Attacks and Reconnaissance
Snowflake
uses temporary WebRTC connections through volunteer browsers as proxies.
Lesson 2996Pluggable Transports and Obfuscation
SOC 2 report
think of it as your organization's security transcript.
Lesson 2599SOC 2 Reports and Continuous Compliance
SOC 2 Reports
(lesson 2599) and **ISO 27001 ISMS** (lessons 2600-2609) from periodic assessments into living, breathing compliance programs.
Lesson 2622Continuous Compliance Monitoring
SOC 2 Type II
, **ISO 27001**, or **PCI DSS** (for payment processors).
Lesson 2536Due Diligence and Vendor Selection
SOC analyst reports
Tactical IOCs, detection logic, and response procedures
Lesson 2343Threat Intelligence Analysis and Reporting
SOC maturity model
is a structured framework that evaluates how advanced your Security Operations Center is across key functional areas.
Lesson 2313SOC Maturity Models
SOC workflows
you've learned—analysts rely on SIEM alerts and dashboards as their primary tool for threat detection and investigation.
Lesson 2314What is a SIEM and Why Organizations Need It
Socat
is netcat's more powerful cousin, supporting encryption, multiple protocols, and advanced connection handling.
Lesson 2236Netcat and Socat for Network Pivoting
Social engineer actions
through fake security warnings or prize announcements
Lesson 1087Web Push Notifications and Permissions
Social engineering
amplifies these attacks: phishing emails with "invoice.
Lesson 2116Client-Side Exploitation Techniques
Social Engineering Toolkit (SET)
focuses exclusively on phishing, credential harvesting, and client-side attacks.
Lesson 2216Exploitation Framework LandscapeLesson 2251QR Code and USB Drop Attack Tools
Social graph data
Contact lists, group memberships, interaction frequencies
Lesson 2974What is Metadata and Why It Matters
Social media posts
with embedded links
Lesson 849CSRF Attack Vectors and Delivery Methods
Social mistakes
Reusing usernames, discussing circumvention publicly
Lesson 2998Operational Security for Circumvention
social networks
, **collaborative platforms**, and **hierarchical organizations** where:
Lesson 800Relationship-Based Access Control (ReBAC)Lesson 2974What is Metadata and Why It Matters
Social pressure
Creating situations where denying entry seems rude ("I forgot my badge upstairs")
Lesson 2272Tailgating and Piggybacking Attacks
Societal harm
Erosion of trust, chilling effects on behavior
Lesson 2891Privacy Risk Assessment Methodology
SOCKS
(Socket Secure) is a protocol that forwards network packets between client and server through a proxy.
Lesson 2994Proxy Chains and SOCKS
SOCKS (Socket Secure)
is a protocol that creates a tunnel between your machine and a proxy server.
Lesson 2241Proxychains and SOCKS Tunneling
SOCKS tunneling
become essential pivoting tools.
Lesson 2241Proxychains and SOCKS Tunneling
Soft gates
Generate warnings or require manual approval (medium severity issues)
Lesson 2065Automated Security Gates in CI/CD
Soft multi-tenancy
uses Kubernetes namespaces to separate workloads from teams you trust (like different departments in your company).
Lesson 1976Multi-Tenancy and Cluster Isolation
Soft-fail
means: "If I can't check revocation status, accept the certificate anyway.
Lesson 196Revocation Checking Failures and Soft-Fail
Soft-mandatory
Can be overridden by authorized users
Lesson 3022HashiCorp Sentinel
SOFTWARE
Holds installed applications, auto-start locations, and program execution timestamps
Lesson 2403Registry Analysis for Windows Forensics
Software Composition Analysis
(you learned this in lesson 3011) by focusing specifically on containerized artifacts and their runtime configuration, not just application dependencies.
Lesson 3012Container and Image Scanning
Software Composition Analysis (SCA)
examines your dependencies—libraries, packages, and containers—for known vulnerabilities.
Lesson 3008Automated Security Testing Overview
Software performance
On devices without AES hardware acceleration (like smartphones or IoT devices), ChaCha20- Poly1305 is significantly faster than AES-GCM
Lesson 127ChaCha20-Poly1305
Software supply chain
Third-party libraries, open-source dependencies, and development tools your vendors use
Lesson 2540Fourth-Party and Supply Chain Risk
Software updates
App stores sign downloads so you know they're legitimate
Lesson 225Digital Signature Fundamentals and Use Cases
Software-Defined Networks (SDN)
decouple network control from physical hardware, letting you deploy firewall policies dynamically across thousands of virtual machines without touching a physical switch.
Lesson 426Virtual Firewalls and Cloud Architectures
Software-defined perimeters
that wrap individual workloads with policy enforcement points
Lesson 2679Zero Trust Network Segmentation
SolarWinds Network Topology Mapper
, **Spiceworks**, and **LANsurveyor** offer:
Lesson 356Automated Network Mapping Tools
Solder debug interfaces
(UART, JTAG) to access bootloaders and root shells
Lesson 2755Physical Security Threats to IoT Devices
Solve algebraically
Use basic linear algebra (Gaussian elimination or matrix inversion) to extract exact model parameters.
Lesson 2829Equation-Solving Attacks on Linear Models
Something you are
– biometric identifiers like your fingerprint, face, or voice
Lesson 738Multi-Factor Authentication FundamentalsLesson 1697Strong Authentication for Cloud Identity
Something you have
– a physical device like your phone, a security token, or a smart card
Lesson 738Multi-Factor Authentication FundamentalsLesson 1697Strong Authentication for Cloud Identity
Somewhat HE
Limited number of operations before noise accumulates
Lesson 249Homomorphic Encryption Fundamentals
Somewhat Homomorphic Encryption (SHE)
supports both addition AND multiplication, but only a limited number of times.
Lesson 250Types of Homomorphic Encryption
SOP Bypass
Your browser thinks it's still talking to `attacker.
Lesson 1129DNS Rebinding Attacks
SOPs
govern *general SOC processes*: how to handle shift handoffs, when to escalate to Tier 2, how to classify alert severity, ticketing procedures, and communication protocols.
Lesson 2311Playbooks and Standard Operating Procedures
Sort them chronologically
using sequence numbers
Lesson 377TCP Stream Analysis and Session Reconstruction
Source and destination addresses
even for local subnet traffic
Lesson 1584Host-Based Firewall Architecture and Purpose
Source and destination IPs
(internal, external, specific ranges)
Lesson 459Writing Effective IDS/IPS Rules
Source computers
Forward events matching subscription criteria using the Windows Remote Management (WinRM) protocol
Lesson 1510Windows Event Forwarding (WEF) and Collection
Source identification
Where untrusted data enters (user input, file reads, network requests)
Lesson 1362SAST Rule Sets and Vulnerability Detection
Source IP address
– Where is this packet coming from?
Lesson 417Packet Filtering Firewalls
Source IP preservation
Services see your private IP, enabling network-level access controls
Lesson 1846VPC/VNet Service Endpoints Fundamentals
Source NACL
Does it permit outbound *and* inbound ephemeral responses?
Lesson 1826Common Misconfigurations and Troubleshooting
Source port
– Which port sent this?
Lesson 417Packet Filtering Firewalls
Source Port Manipulation
makes your traffic appear to come from trusted ports (like port 53 for DNS or 80 for HTTP).
Lesson 347Firewall and IDS Evasion
Source ports/VLANs
The ports or VLANs you want to monitor
Lesson 404Port Mirroring and SPAN Ports
Source restrictions
Don't allow "any" source when you can specify exact IP addresses or subnets
Lesson 430Least Privilege Network Access
Source Security Group
Does it allow outbound traffic to the destination?
Lesson 1826Common Misconfigurations and Troubleshooting
Source-initiated
Computers push logs to the collector (scalable for large environments)
Lesson 1510Windows Event Forwarding (WEF) and Collection
Sources
Identify where untrusted data enters (user input, external APIs)
Lesson 1381Data Flow Analysis and Taint Tracking
Space limitations
The exploit may have size restrictions
Lesson 2195Exploit Modules and Payloads
SPAN
is Cisco's proprietary name for port mirroring.
Lesson 404Port Mirroring and SPAN Ports
SPAN port
is a software feature built into managed switches.
Lesson 463Network TAPs vs SPAN Ports
SPAN ports
(Switched Port Analyzer, also called port mirroring).
Lesson 463Network TAPs vs SPAN Ports
SPDX
(Software Package Data Exchange)
Lesson 1276What is an SBOM and Why It Matters
Specialization Paths
Web application testing, network infrastructure, wireless security, mobile application testing, red teaming, or cloud security.
Lesson 2089Penetration Testing Career Paths
Specialized hardware needs
Often requires powerful servers, not consumer devices
Lesson 253Performance Characteristics and Limitations
Specialized solutions
Magnet AXIOM Cyber, SANS SIFT Cloud Edition
Lesson 1922Cloud Forensics Tools and Legal Considerations
Specialized training
supports specific roles—incident responders train on the Incident Response Policy, HR on data classification, IT on change management procedures.
Lesson 2495Policy Communication and Training Requirements
Specific actions
– Tangible steps (e.
Lesson 2523Risk Treatment Plans and Prioritization
Specific cloud resources
identified by name or tag
Lesson 2091Scoping In-Scope vs Out-of-Scope Assets
Specific columns
are encrypted before being written to storage
Lesson 1794Column-Level and Field-Level Encryption
Specific details
obtained through reconnaissance (elicitation techniques)
Lesson 2269Vishing and Phone-Based Pretexting
Specific objectives
Simulate a particular adversary group's tactics (e.
Lesson 2171Adversary Emulation vs Penetration Testing
Specific queries
Add paths like `iam/security-credentials/role-name` or `instance-id`
Lesson 1933IMDS Endpoints and Access Patterns
Speed matters
Security checks must complete quickly enough to fit within typical build times.
Lesson 2057Continuous Security Integration
Speed vs. Detection
Aggressive scans are fast and comprehensive but scream "I'm here!
Lesson 366Stealth Scanning Fundamentals
SPF alignment
The domain in the envelope "Mail From" must match the visible "From" header
Lesson 2302DMARC Configuration and Alignment
Spiceworks
, and **LANsurveyor** offer:
Lesson 356Automated Network Mapping Tools
SPL
(Splunk Processing Language), and **SQL-like** languages to search, filter, and correlate security events from cloud logs.
Lesson 1882Cloud SIEM Query Languages
Split
the input block into left half (L₀) and right half (R₀)
Lesson 86Feistel Network Architecture
Split phase
Transform the secret into N shares
Lesson 321Secret Sharing Fundamentals
Split Tunnel Considerations
Lesson 508DNS Leak Prevention
Split tunneling
lets you choose: send work traffic through the VPN, but stream Netflix directly through your local connection.
Lesson 491Client Configuration and Split TunnelingLesson 1840VPN Connections to Cloud
Split Tunneling Confusion
If clients can't reach specific networks, verify your push routes and split tunnel settings align with what you configured in client configuration lessons.
Lesson 492Troubleshooting and Monitoring OpenVPN Connections
Split-key approaches
Backup key split between user passphrase and secure hardware, requiring both for restoration
Lesson 2947E2EE Backup and Multi-Device
sponge construction
imagine a sponge that absorbs water, then squeezes it back out:
Lesson 210SHA-3 and the Keccak AlgorithmLesson 224Alternative MAC Constructions: KMAC and Poly1305
Spontaneous Groups
The signer can form a ring without asking permission from other members
Lesson 236Ring Signatures and Group Anonymity
Spoof or randomize
Make scans look like they come from different sources
Lesson 366Stealth Scanning Fundamentals
Spoofed sender address
that mimics legitimate domains (often with subtle misspellings)
Lesson 2253Email-Based Phishing Fundamentals
Spot early threats
– Could attackers spoof identities?
Lesson 77Threat Modeling in Requirements Phase
Spyware
Steals information (credentials, browsing habits, keystrokes)
Lesson 1518Malware Taxonomy and Classification Criteria
SQL Context
– Data in database queries:
Lesson 1220Context-Specific Output Encoding
SQL Injection rules
detect when user input flows into database queries without sanitization
Lesson 1362SAST Rule Sets and Vulnerability Detection
SQL-like
languages to search, filter, and correlate security events from cloud logs.
Lesson 1882Cloud SIEM Query Languages
SQL/NoSQL Injection
Targets the database layer, manipulating queries
Lesson 602Command Injection Fundamentals
SQLiPy
or **Copy as SQLMap command** let you:
Lesson 591Burp Suite SQL Injection Scanner Extensions
Squeezing phase
Once all input is absorbed, you "squeeze" output bits from the rate portion until you have the desired hash length
Lesson 210SHA-3 and the Keccak Algorithm
SRAM PUFs
Use power-up states of memory cells
Lesson 2777Hardware Cloning and Counterfeit Prevention
SS7 (Signaling System 7)
protocol routes SMS messages between carriers globally.
Lesson 742SMS and Email-Based 2FA Weaknesses
SSH keys
, and other formats that require preprocessing.
Lesson 2231John the Ripper Techniques
SSH keys and certificates
stored by agents
Lesson 2395Credential and Secret Extraction
SSID analysis
Detecting typo-squatted network names similar to your legitimate SSID
Lesson 549Rogue AP Detection Techniques
SSL stripping
solves this problem (from an attacker's perspective) by *downgrading* the connection.
Lesson 395SSL Stripping AttacksLesson 2243Bettercap for MitM and Network Attacks
SSL/TLS complexity
Managing certificates across hundreds of global nodes
Lesson 1862CDN Architecture and Threat Model
SSRF
Internal URLs in webhook configurations
Lesson 1148Why Input Validation Matters
SSRF indicators
like internal network requests from parsers
Lesson 626XXE Defense in Depth
SSRF vulnerabilities
combined with internal service misconfigurations
Lesson 2106Chaining Vulnerabilities for Impact
ST (State/Province)
Full state or province name (`California`)
Lesson 172Certificate Fields: Subject and Issuer Distinguished Names
Stack layout
buffer → saved frame pointer → **return address**
Lesson 2108Memory Corruption Exploits: Buffer Overflows
Stack multiple restrictions
that should be mutually exclusive
Lesson 922Coupon and Discount Code Abuse
Stack Traces
Full call stacks expose your code structure, file paths, and dependency versions—all valuable reconnaissance data.
Lesson 1007GraphQL Error Handling and Information LeakageLesson 1040Error Handling and Information Disclosure
Stacked queries
allow an attacker to append additional SQL statements to an existing query using the semicolon (`;`) separator—turning a simple read operation into a full-blown database manipulation attack.
Lesson 580Stacked Queries and Multiple Statements
Stacking Restrictions
Applying multiple coupons when business rules should limit to one, or combining incompatible discounts (e.
Lesson 922Coupon and Discount Code Abuse
Stage 1 - Storage
An attacker submits malicious input through a form that *does* sanitize input before inserting into the database.
Lesson 581Second-Order SQL Injection
Stage 1 audit
to verify your documentation is complete.
Lesson 2609ISO 27001 Certification Process
Stage 2 - Exploitation
Later, when the application retrieves this "safe" stored data and incorporates it into a new SQL query *without sanitization* (assuming it's already safe because it came from the database), the injection executes.
Lesson 581Second-Order SQL Injection
Stage 2 audit
is the comprehensive assessment.
Lesson 2609ISO 27001 Certification Process
Stage III: Application Decomposition
– Break down components, trust boundaries, and entry points (using concepts you know).
Lesson 69PASTA (Process for Attack Simulation and Threat Analysis)
Stage IV: Threat Analysis
– Identify threats using frameworks like STRIDE, attacker personas, and attack trees.
Lesson 69PASTA (Process for Attack Simulation and Threat Analysis)
Stage V: Vulnerability Analysis
– Find weaknesses (code flaws, misconfigurations, design issues).
Lesson 69PASTA (Process for Attack Simulation and Threat Analysis)
Stage VI: Attack Modeling
– Simulate realistic attack paths using attack trees/graphs—how would adversaries exploit vulnerabilities?
Lesson 69PASTA (Process for Attack Simulation and Threat Analysis)
Staged deployment
Test heavily in sandboxed environments before production
Lesson 2877Malicious Pre-trained Models
Staged rollouts
to pilot groups before full production
Lesson 2457Automated Patch Deployment Tools
Stagers
are small initial payloads designed to establish a connection back to your machine, then download the rest of the payload (the stage).
Lesson 2195Exploit Modules and Payloads
Stages
are the larger, feature-rich payloads delivered *after* the stager succeeds.
Lesson 2195Exploit Modules and Payloads
Staging
means organizing discovered data:
Lesson 2125Data Discovery and Staging
Stakeholder involvement
is non-negotiable.
Lesson 2494Policy Development and Approval Process
Stakeholder Review
– Circulate to affected departments (IT, HR, Legal, Business Units) for feedback
Lesson 2494Policy Development and Approval Process
Stakeholders
data subjects, processors, controllers, partners
Lesson 2888PIA Triggers and Scoping
Stale issues
already fixed but still tracked
Lesson 1402Security Test Results Management
Standard
Normal browsing with some protections
Lesson 2986Tor Browser Security Features
Standard compliance
`frame-ancestors` is part of CSP Level 2 and supported by modern browsers.
Lesson 1136Content-Security-Policy frame-ancestors Directive
Standard Contractual Clauses (SCCs)
– pre-approved contract templates
Lesson 1982GDPR and Data Sovereignty Requirements
Standard Scopes
The `openid` scope triggers OIDC behavior; optional scopes like `profile` and `email` request specific claims
Lesson 769OpenID Connect Overview and Relationship to OAuth 2.0
Standard tier
Tuned to your VNet resources, adaptive real-time tuning, attack analytics, and cost guarantees during attacks
Lesson 1857Cloud DDoS Protection Services
Standard web apps
30-60 minute idle timeout, 8-24 hour absolute
Lesson 733Session Timeout Configurations
Standardization
Define approved configurations for each system type (web servers, databases, workstations)
Lesson 1617Configuration Management Fundamentals
Standardize logging
at every trust boundary
Lesson 2661Monitoring and Response Across Layers
Standardized
Required by TLS 1.
Lesson 125AES-GCM: Galois/Counter Mode
Standardized schemas
where possible (industry-specific formats)
Lesson 2935Right to Access and Data Portability
Standardizing responses
via playbooks
Lesson 2325Introduction to SOAR Platforms
Start broad
Identify all external actors and entry points
Lesson 2637Creating Architecture Data Flow Diagrams
Start conservatively with DMARC
Begin with `p=none` to collect reports without blocking mail.
Lesson 2304Email Authentication Best Practices and Common Pitfalls
Start permissive
(warn-only mode) while establishing baselines
Lesson 2052Security Gates and Failure Policies
Start Read-Only
Deploy in discovery mode first.
Lesson 2011CSPM Vendor Selection and Deployment
Start restrictive
Begin with zero or minimal permissions.
Lesson 1706Least Privilege Principle in Cloud IAM
Start with trust boundaries
These are your highest-risk zones.
Lesson 44Identifying Threats from Diagrams
Starts at entry points
– Usually your homepage or login page
Lesson 1371Crawling and Application Discovery
startup folders
where any executable, script, or shortcut placed inside will automatically run when a user logs in.
Lesson 1540Startup Folders and Shell ExtensionsLesson 2134Scheduled Tasks and Startup Persistence Exploitation
Startup vs runtime failures
At startup, fail fast if secrets are unavailable; during runtime, use cached values and alert
Lesson 1334Secret Store Access Patterns
State Blindness
An API allows document editing if the user is an author, but fails to check whether the document is in "published" state where editing should be locked.
Lesson 812Context-Dependent Authorization Failures
State compromise
If an attacker learns the internal state (through memory dumps, side channels, or bugs), they can predict all future outputs
Lesson 291PRNG State and Reseeding
State consistency
Can a user cancel an order that's already shipped?
Lesson 1154Semantic and Business Logic Validation
state file
acts as a record of truth—tracking every resource deployed, their configurations, and relationships.
Lesson 2016Secure State Management and Backend ConfigurationLesson 3004IaC State File Security
State file comparison
is the foundation.
Lesson 2024Drift Detection in Terraform and IaC Tools
State Forcing
Manipulate parameters or session data to claim you're in a different workflow state than you actually are.
Lesson 938Testing State and Workflow Violations
State locking
to prevent corruption and race conditions
Lesson 3004IaC State File Security
State machine abuse
Applications transition through states (guest → authenticated → admin).
Lesson 2103Logic Flaw and Business Logic Testing
State Machines
Explicitly defining valid states and allowed transitions so invalid state changes become impossible
Lesson 910Idempotency and State Machine Design
State maintenance
Tracking CSRF tokens or other dynamic security mechanisms
Lesson 1373Authentication and Session Handling in DAST
State Management
tracks where each remediation is in its lifecycle.
Lesson 3045Remediation Workflows and Orchestration
State transition
– Move through intermediate states (order moves to "pending")
Lesson 818Multi-Step IDOR Exploitation
State transition validation
Verify users can only move between valid states.
Lesson 835Testing State-Based and Workflow Authorization
state-changing operations
are especially dangerous because they violate REST principles and maximize attack surface.
Lesson 848GET vs POST CSRF AttacksLesson 1103HTTP/3 0-RTT Replay Attacks
State-level breach notification laws
with varying timelines
Lesson 1984Industry-Specific Cloud Compliance
State-sponsored actors
seek military secrets, political intelligence, diplomatic communications, or technological advantages for their governments
Lesson 49Motivations: Espionage and Intelligence Gathering
State/Province (ST)
Full name, not abbreviated
Lesson 176Certificate Signing Requests (CSR)
stateful
when you allow inbound traffic, the response is automatically allowed back out—no explicit outbound rule needed.
Lesson 1819Security Groups vs Network ACLs: Fundamental DifferencesLesson 1925Instance Security Groups and Network Isolation
Stateful filtering
tracks the *context* of network connections.
Lesson 431Stateful vs Stateless Rules
Stateful firewalls
create simpler, more secure rule sets.
Lesson 431Stateful vs Stateless Rules
Stateful inspection
of inbound and outbound traffic
Lesson 1853Cloud Firewall Architectures
Stateful inspection firewalls
solve this by maintaining a "memory" of active network connections.
Lesson 418Stateful Inspection Firewalls
Stateful schemes
(like XMSS and LMS) work like a checkbook with numbered checks.
Lesson 273Hash-Based Signatures: SPHINCS+ and Stateful Schemes
Stateful signature schemes
(like Lamport, Winternitz, or XMSS) achieve forward security using hash functions instead of hard math problems.
Lesson 240Forward-Secure and Stateful Signatures
Stateful tracking
(remembering past events)
Lesson 2318Correlation Rules and Detection Logic
Stateless context
Each invocation starts fresh, complicating rate limiting
Lesson 1960Injection Vulnerabilities in Serverless
Stateless cookie exchange
prevents memory exhaustion attacks during handshake
Lesson 2795DTLS and TLS 1.3 for IoT
Stateless filtering
examines each packet in isolation.
Lesson 431Stateful vs Stateless Rules
Stateless firewalls
require careful rule pairs for bidirectional communication, making rule sets larger and more error-prone.
Lesson 431Stateful vs Stateless Rules
Stateless schemes
(like SPHINCS+) solve the state problem using randomness and a tree-of-trees structure.
Lesson 273Hash-Based Signatures: SPHINCS+ and Stateful Schemes
Static analysis
Parse code to find dangerous patterns like `obj[key] = value` without `__proto__` checks
Lesson 1197Detecting Prototype Pollution VulnerabilitiesLesson 2725Static Analysis of Mobile ApplicationsLesson 3030IaC Security Scanning
Static analyzers
scan your source code files for regex patterns and rate their safety.
Lesson 1178Analyzing Regex Complexity with Tools
Static IVs
Generate unique initialization vectors for each encryption operation
Lesson 2735Mobile Cryptography Best Practices
Static MAC binding
Manually specify which exact MAC addresses are allowed
Lesson 414Port Security and MAC Filtering
Static scoring
Doesn't reflect evolving attacker interest or exploit availability
Lesson 2446CVSS Score Interpretation and Limitations
Statistical Analysis
The system tracks metrics like packet rates, connection counts, protocol distributions, and payload sizes.
Lesson 457Anomaly-Based Detection MethodsLesson 523WEP Attacks and Exploitation
Statistical anomalies
Does it have an unusually high entropy (randomness) suggesting encryption or packing?
Lesson 1566Heuristic Analysis Techniques
Statistical randomness
means the numbers *look* random when you analyze them mathematically.
Lesson 285Cryptographic vs Statistical Randomness
Statistical sampling
Generate new records by sampling from learned distributions
Lesson 2909Synthetic Data Generation
Stay in scope
Testing out-of-scope systems is unauthorized access, potentially a felony
Lesson 2084Legal and Ethical Considerations
Steal
proprietary models from your infrastructure
Lesson 2874Model Artifact Security and Signing
Stealthier
Many older intrusion detection systems don't log incomplete connections, since no full TCP session was established
Lesson 340SYN Scanning (Half-Open)
Step 1 (Storage)
Attacker submits username `admin'--` which gets safely stored in the database
Lesson 1242Second-Order SQL Injection in ORMs
Step 1: Initial Assessment
Verify the alert isn't a false positive by checking basic context: Is the source legitimate?
Lesson 2344Alert Triage Fundamentals and Workflow
Step 2 (Retrieval)
Your code fetches that username: `user = User.
Lesson 1242Second-Order SQL Injection in ORMs
Step 2: Severity Classification
Assign priority based on:
Lesson 2344Alert Triage Fundamentals and Workflow
Step 3 (Injection)
You use that data unsafely: `db.
Lesson 1242Second-Order SQL Injection in ORMs
Step 3: Enrichment
Gather context from threat intelligence feeds, SIEM historical data, and asset databases.
Lesson 2344Alert Triage Fundamentals and Workflow
Step 4: Routing Decision
Escalate to incident response, assign to deeper investigation, document and close (if false positive), or trigger automated SOAR playbooks.
Lesson 2344Alert Triage Fundamentals and Workflow
Step 6
Use cookie manipulation to maintain persistent access
Lesson 828Multi-Step Privilege Escalation Chains
Step sequence bypass
occurs when an application fails to verify that previous steps were actually completed before allowing access to later stages.
Lesson 913Step Sequence Bypass Vulnerabilities
Step Sequences
Every action a user takes from start to finish (e.
Lesson 937Mapping Business Workflows
Step Skipping
Try accessing later workflow steps directly without completing earlier ones.
Lesson 938Testing State and Workflow Violations
Step-up authentication
requires additional factors only for sensitive operations (changing passwords, viewing financial data, large transfers).
Lesson 749Implementing and Enforcing MFALesson 1699Continuous Identity Verification
Sticky Bit
On directories (like `/tmp`), only the file owner can delete their own files, preventing users from deleting others' files even with write permission to the directory.
Lesson 1424Special Permission Bits: SUID, SGID, and Sticky
Still enforce access control
indirect references are not a substitute for authorization checks!
Lesson 843Indirect Object References
Stochastic layers
Use dropout or noise injection during inference (not just training)
Lesson 2852Ensemble and Randomization Defenses
Stock management
Multiple buyers purchasing the last few items
Lesson 904Concurrency Issues in Inventory and Resource Allocation
Stop before damage
If you've found RCE, execute `whoami` or `hostname`, not `rm -rf /`
Lesson 2163Proof of Concept Development
Storage and Encryption
Secrets Manager stores your credentials, API keys, and other sensitive data encrypted at rest using AWS KMS (Key Management Service).
Lesson 1328AWS Secrets Manager
Storage and security costs
Protecting unnecessary data wastes resources
Lesson 2894Data Minimization Principle
Storage considerations
affecting the entire filesystem
Lesson 945File Upload Attack Surface and Risk Assessment
Storage constraints
Balance retention duration against available disk space
Lesson 1470Log Rotation and Retention
Storage costs
Finer-grained data consumes more resources
Lesson 2898Granular Data Collection
Storage encryption
transforms this data into ciphertext using cryptographic keys, ensuring only authorized users with the right keys can read it.
Lesson 1928Encrypted Storage and Snapshots
Storage Event API
to detect authentication changes across tabs:
Lesson 1094Session Management in Stateless SPAs
Storage layers
must handle massive write volumes (potentially millions of events/second) while supporting fast queries.
Lesson 2315SIEM Architecture: Collectors, Aggregators, and Storage
Storage quota measurements
to detect if data exists
Lesson 1077Cross-Tab and Cross-Origin Storage Attacks
Storage risks
even with proper hashing techniques covered in previous lessons
Lesson 750Passwordless Authentication Fundamentals
Storage security
Store model files with strict permissions, separate from training code.
Lesson 2874Model Artifact Security and Signing
Storage system
saves the file based on extension
Lesson 975Polyglot Files and Format Confusion
Storage-level
Use separate databases or encrypted volumes per classification
Lesson 2652Data Segmentation and Classification
store
, **mix**, and **distribute** that precious randomness—that's the **entropy pool**.
Lesson 295Entropy Pool ManagementLesson 2383Disk Imaging and Forensic Copies
Store additional payloads
in browser storage (`localStorage`, `sessionStorage`) for future execution
Lesson 646Persistent Backdoors via DOM Manipulation
Store Credit Generation
Systems that automatically issue store credit can be vulnerable to race conditions—imagine rapidly submitting the same refund request multiple times before the first completes, potentially receiving credit multiple times for one return.
Lesson 925Refund and Credit Manipulation
Store in password managers
as an encrypted note
Lesson 747Recovery and Backup Codes
Store keys securely
generation is only the first step
Lesson 303Symmetric Key Generation
Store secrets
in the secret manager (encrypted at rest)
Lesson 1946Secrets and Environment Variables in Functions
Store securely
with tamper-evident seals and access logs
Lesson 2398Disk Forensics Fundamentals and Chain of Custody
Store the mapping
between tokens and actual database IDs (in session, cache, or database)
Lesson 843Indirect Object References
Store-and-forward architecture
emails pass through multiple servers before delivery
Lesson 2958Email Encryption Fundamentals and S/MIME
Stored XSS
(also called Persistent XSS) occurs when an attacker's malicious script gets **saved** into a web application's database, file system, or other storage.
Lesson 631Stored XSS: Persistent AttacksLesson 646Persistent Backdoors via DOM ManipulationLesson 647XSS Worms and Self-Propagating AttacksLesson 958MIME Type Sniffing and Security Implications
Stores
private keys in isolated memory protected by hardware encryption
Lesson 2710Secure Enclave and Hardware Security
Stores the encrypted DEK
with the volume metadata
Lesson 1770Encryption for Block Storage and Virtual Disks
Straight mode
(mode 0) feeds wordlists directly, while **Combination mode** (mode 1) merges two wordlists.
Lesson 2230Hashcat Deep Dive
Strange DNS responses
Familiar domains resolving to unfamiliar IP addresses
Lesson 410Signs of Network Interception
Strategic tip
Blend multiple sources.
Lesson 2339Threat Intelligence Feeds and Sources
Strategic tool placement
means running fast checks early, expensive ones later.
Lesson 3035Performance Optimization for Security Scans
Strategically violate
edge cases (oversized fields, missing required elements, nested structures)
Lesson 1387Generation-Based Fuzzing
Stream Dependency Manipulation
Attackers can create complex dependency chains where Stream B depends on Stream A, Stream C depends on B, and so on.
Lesson 1098HTTP/2 Stream Vulnerabilities and Attacks
Stream multiplexing confusion
Attackers may craft requests that exploit how servers prioritize or queue streams, potentially causing resource exhaustion
Lesson 1097HTTP/2 Protocol Architecture and Security Model
Stream Prioritization
Each request gets a "stream ID" and can be assigned priority levels.
Lesson 1097HTTP/2 Protocol Architecture and Security Model
Streaming data
(network packets, video) benefits from `CTR` or `GCM` modes because they don't require the entire message upfront and can parallelize encryption.
Lesson 106Mode Selection for Different Scenarios
Strength
Can it withstand realistic attacker capabilities (work factor)?
Lesson 2642Evaluating Architectural Security Controls
Strengths
Comprehensive licensing data, broad industry adoption, legal focus
Lesson 1277SBOM Formats: SPDX, CycloneDX, and SWIDLesson 1359SAST vs DAST: Strengths and Limitations
Strict (`s`)
Requires exact domain match
Lesson 2302DMARC Configuration and Alignment
Strict password policies
Enforced by default; administrators must explicitly weaken them
Lesson 1217Secure Defaults and Opt-In Security
Strict policy
applies MAC to all processes system-wide—nothing runs unconfined.
Lesson 1454SELinux Modes and Policy TypesLesson 2298SPF Record Syntax and Configuration
Strict Protocol Validation
Enforce RFC-compliant HTTP parsing and reject ambiguous requests.
Lesson 1855WAF Evasion Techniques and Defense
Strict schemas
You define exactly which fields and types are allowed *before* deserialization happens
Lesson 1191Alternative Serialization Formats
Strict-Transport-Security (HSTS)
Forces browsers to always use HTTPS when communicating with your API: `Strict-Transport- Security: max-age=31536000; includeSubDomains`.
Lesson 1041API Security Headers and CORS
STRIDE Category
Which threat type (Spoofing, Tampering, Repudiation, Information Disclosure, DoS, Elevation of Privilege)
Lesson 64Creating STRIDE Threat Tables
String concatenation
`"SELECT * FROM users WHERE id = " + userId`
Lesson 1234Database API Safety and Parameterization
String duplication
Entity expansion creating gigabyte-sized strings
Lesson 1188XML and JSON Parser Vulnerabilities
String formatting
`f"DELETE FROM posts WHERE author = '{username}'"`
Lesson 1234Database API Safety and Parameterization
Strip metadata
Remove headers revealing server software, versions, or internal routing
Lesson 898Response Handling and Information Disclosure
Strip or sanitize metadata
from uploaded files (as covered in image validation lessons)
Lesson 963Polyglot Files and Multi-Format Attack Prevention
Strip security headers
to downgrade HTTPS to HTTP
Lesson 388ARP Poisoning for Traffic Interception and Modification
Strip stronger protocol announcements
from the handshake
Lesson 530Downgrade Attacks
Strong authentication
Built-in **identity verification** ensures members are who they claim to be
Lesson 2950Message Layer Security (MLS) for Group Messaging
Strong Encryption Algorithms
Use industry-standard algorithms (AES-256, ChaCha20-Poly1305) that are computationally infeasible to break.
Lesson 1317Encryption at Rest for Secret Storage
Strong integrity
Any bit-level modification is detectable
Lesson 477Authentication Header (AH) Protocol
Stronger authentication
Enforce MFA once at the IdP
Lesson 1698Identity Federation and Single Sign-On
Stronger cipher suites
that eliminate weaker legacy options
Lesson 519WPA3-Enterprise and Enhanced Open
Strongly-typed, compiled languages
like Java, C#, and Go are ideal for SAST.
Lesson 1364Language-Specific SAST Considerations
Structural masking
The result looks completely random—even encrypting the same message twice produces different ciphertext
Lesson 146OAEP: Optimal Asymmetric Encryption Padding
Structure the discussion
Start with system context (what are we modeling?
Lesson 76Collaborative Threat Modeling Workshops
Structure your logs
Use structured logging (JSON format) so you can programmatically filter fields.
Lesson 1354Preventing Secrets in Logs and Error Messages
Structured Data
Key-value pairs (optional)
Lesson 1475syslog Protocol and Standards
Structured data storage
Databases, file systems, and disk encryption benefit from modes like XTS or GCM
Lesson 121Stream Ciphers vs Block Ciphers: When to Use Each
Structured input fuzzing
uses knowledge of the target's format—its grammar, schema, or protocol specification—to generate valid but unexpected inputs.
Lesson 1390Structured Input Fuzzing
Structured logging
treats log entries as data objects with consistent fields, typically in JSON format:
Lesson 1472Structured vs Unstructured LoggingLesson 1966Insufficient Logging and Monitoring
Structured output constraints
Force LLMs to respond in structured formats (JSON schemas) rather than freeform text, making injections easier to detect.
Lesson 2861Defense Strategies Against Prompt Injection
Structured output parsing
Force the LLM to produce JSON, YAML, or other structured formats you can validate against schemas before use
Lesson 2862LLM Output Validation and Sandboxing
Stuxnet (2010)
infected Iran's air-gapped nuclear facility via infected USB drives, proving physical isolation is penetrable
Lesson 2804SCADA Security and Air-Gap MythsLesson 2805OT-Specific Threats and Attacks
Sub-techniques
that drill down into implementation variants.
Lesson 2179Techniques and Sub-techniques
Subcontractor Flow-Down
Require the same restrictions on any downstream processors
Lesson 2567Service Provider and Third-Party Contracts
Subcontractor provisions
BAs must obtain BAAs with *their* vendors (the subcontractor chain)
Lesson 2587Business Associate Agreements and Liability
Subdomain confusion
`trusted-site.
Lesson 1142Open Redirect Attack Vectors
Subject Alternative Name (SAN)
extension solves this problem.
Lesson 175Subject Alternative Names and Wildcard Certificates
Subject Alternative Names
Additional domains (if applicable)
Lesson 176Certificate Signing Requests (CSR)
Subject DN
Identifies *who* the certificate belongs to (a website, person, or device)
Lesson 172Certificate Fields: Subject and Issuer Distinguished Names
Subject lines
Often the most revealing piece of metadata
Lesson 2964Metadata Leakage in Encrypted Email
Subject Public Key Info
The actual public key and its algorithm (RSA, ECC, etc.
Lesson 171X.509 Certificate Structure and Format
SubjectConfirmation
Verify the recipient URL matches your Assertion Consumer Service URL
Lesson 781SAML Message Validation
Subjective ratings
"Likely" means different things to different people
Lesson 2500Risk Calculation and Risk Matrices
Submission process
Where and how to report findings (secure email, web form, PGP key)
Lesson 2472Creating and Publishing a VDP
Submission Volume
tracks total reports over time.
Lesson 2485Bug Bounty Metrics and ROI
Submits forms
– Identifies input fields (search boxes, login forms, comment fields)
Lesson 1371Crawling and Application Discovery
Subnet boundaries
You subdivide this into smaller blocks
Lesson 1828Subnetting in Cloud VPCs
Subnet boundary detection
involves sending packets to sequential IP addresses and analyzing responses.
Lesson 352Subnet and VLAN Discovery
Subnet-level
Focus on specific subnet traffic
Lesson 1872VPC Flow Logs and Network Monitoring
Subresource Integrity (SRI)
for external modules when possible.
Lesson 1053JavaScript Module Security (ESM vs CommonJS)
Subscriptions
Define filtering rules—what events to collect, from where, and how often
Lesson 1510Windows Event Forwarding (WEF) and Collection
Substitution
(SubBytes): Replace each byte with another using a lookup table—like swapping cards for different ones
Lesson 89AES: Rijndael Selection and DesignLesson 91AES Key Expansion and ScheduleLesson 2908Data Masking and Tokenization
Substitution operations
(creating confusion by replacing bits with others)
Lesson 85Block Cipher Fundamentals and Structure
Substitution-Permutation Network (SPN)
.
Lesson 89AES: Rijndael Selection and Design
Success criteria
– How you'll verify the control is working
Lesson 2523Risk Treatment Plans and Prioritization
Success metric
Number and criticality of vulnerabilities found
Lesson 2171Adversary Emulation vs Penetration Testing
Successful Auto-Remediation Percentage
Lesson 3052Measuring Automation Effectiveness
Successful exploitation
or unauthorized access
Lesson 2361Incident vs Event: Defining the Threshold
Sudden RTT increases
to familiar destinations
Lesson 413Timing and Latency Analysis
Sudden traffic spikes
from specific geolocations (potential DDoS)
Lesson 1868CDN Monitoring and Incident Response
Sufficient length
Typically 128 bits (16 bytes) minimum
Lesson 140Salts in Key Derivation
Sufficient seed length
Your seed should contain at least as many bits of entropy as your security level requires.
Lesson 298CSPRNG Initialization and Seeding
Sufficiently long
typically 8-16 characters to resist brute-force attacks
Lesson 747Recovery and Backup Codes
SUID (Set User ID)
When set on an executable file, the process runs with the file owner's privileges instead of the executing user's privileges.
Lesson 1424Special Permission Bits: SUID, SGID, and Sticky
SUID vulnerabilities
can grant root access if exploitable (e.
Lesson 1424Special Permission Bits: SUID, SGID, and Sticky
Summary dashboards
findings by risk level, status, aging
Lesson 2625Remediation Tracking and Reporting
Supervised automated
System fixes automatically but alerts humans for review
Lesson 3044Automated Remediation Fundamentals
Supervised Enrollment
– Enhanced control mode (primarily iOS) allowing deeper restrictions like preventing device reset or disabling certain features entirely.
Lesson 2742Mobile Device Management (MDM) Fundamentals
Supplemental policies
Add exceptions or expand rules without replacing the base policy—useful for departmental variations
Lesson 1594Windows Defender Application Control (WDAC)
Supplicant
The device or user trying to connect (your laptop, phone, or any client).
Lesson 540802.1X Authentication Framework
Supplier information
Who produced each component?
Lesson 1279SBOM Contents and Metadata Quality
Supplier relationships
(third-party risk management)
Lesson 1979ISO 27001 and Cloud Security Standards
supply chain
includes not just service vendors but also software components, hardware manufacturers, and logistics partners.
Lesson 2540Fourth-Party and Supply Chain RiskLesson 2872ML Supply Chain Threat Landscape
Supply chain mapping
Document multi-tier relationships for critical services
Lesson 2540Fourth-Party and Supply Chain Risk
Supply Chain Protection
Verify package integrity using checksums and signatures.
Lesson 2740Third-Party SDK and Library Security
supply chain risk
trusting code you didn't write, maintained by people you don't know.
Lesson 1259Understanding Software Dependencies and Transitive RiskLesson 2534Third-Party Risk Fundamentals
Supply chain risks
Reusable modules from public registries may contain backdoors or misconfigurations
Lesson 2012Infrastructure as Code Fundamentals and Security Implications
Support compliance
requirements (PCI-DSS, HIPAA, SOX)
Lesson 1500File Integrity Monitoring Fundamentals
Support in-place updates
with audit trails showing what changed and when
Lesson 2937Rights to Rectification and Restriction
Support multi-stage attacks
where initial malware downloads additional payloads
Lesson 1536Persistence Fundamentals and Attacker Goals
Suppress
False positive or accepted risk (document why)
Lesson 1367Interpreting and Triaging SAST Results
Suppress Known Patterns
Whitelist authorized automation tools, scheduled jobs, and legitimate admin actions.
Lesson 1896Cloud Alert Design Principles
Suppress specific findings
for assets where they don't apply (e.
Lesson 1614False Positive Management
Suppression and annotations
let you mark specific findings as false positives, removing them from future scans.
Lesson 1363False Positives and Tuning SAST Tools
Surprise Answer
This time, the attacker's DNS server returns an *internal IP* like `192.
Lesson 1129DNS Rebinding Attacks
Surveillance audits
occur annually (or semi-annually) to verify your ISMS remains effective.
Lesson 2609ISO 27001 Certification Process
Survive audits
Demonstrate you can identify who changed what, when, and whether changes were authorized
Lesson 1506FIM for Compliance Requirements
Suspend suspicious IAM entities
disable compromised users/roles before deletion (preserves evidence)
Lesson 1907Cloud Account Compromise Response
Suspicious file paths
Presence of `/Applications/Cydia.
Lesson 2708iOS Jailbreaking and Detection
SVG Files
Scalable Vector Graphics files are XML-based.
Lesson 623XXE via File Upload and Content Types
SVG images
are pure XML that browsers and image libraries parse
Lesson 973XXE in Document Processing
Swap
the halves and repeat for the next round
Lesson 86Feistel Network Architecture
Switch to User B
, attempt to access/modify User A's resource
Lesson 834Testing Multi-User Scenarios
Symbolic links
your app doesn't recognize as shortcuts
Lesson 1165Filesystem Abstraction Layer Bypasses
Symmetric
Keys should use the full bit-length uniformly
Lesson 302Key Generation Requirements and Best Practices
Symmetric ratchet
Advances keys forward using hash functions after each message
Lesson 2942Signal Protocol Fundamentals
Symmetric-key ratchet (KDF chain)
Hashes the current key to produce the next message key and a new chain key — ensuring forward secrecy
Lesson 2949Signal Protocol: Double Ratchet and Key Agreement
SYN scan
(half-open) is stealthier than a **TCP connect scan** because it doesn't complete the handshake
Lesson 366Stealth Scanning Fundamentals
SYN Scan (Revisited)
Sends SYN, receives SYN-ACK (open) or RST (closed), then you send RST to abort.
Lesson 367TCP Stealth Scan Techniques
SYN-ACK
If the port is open, the target responds with synchronization-acknowledgment
Lesson 339TCP Connect ScanningLesson 377TCP Stream Analysis and Session Reconstruction
Synack
takes a hybrid approach, combining an invite-only researcher network with automated vulnerability scanning.
Lesson 2480Bug Bounty Platform Ecosystem
Sync across devices
(unlike traditional hardware keys)
Lesson 754Passkeys and Cross-Device Authentication
Synchronizer Token Pattern
is the most common defense against CSRF attacks.
Lesson 865Synchronizer Token PatternLesson 869Origin and Referer Validation
Synchronous ciphers
(like ChaCha20, RC4) are simpler, faster, and dominate modern practice, but require perfect nonce management and cannot tolerate bit-level errors
Lesson 120Synchronous vs Self-Synchronizing Stream Ciphers
Synchronous stream ciphers
generate their keystream independently of the plaintext or ciphertext.
Lesson 120Synchronous vs Self-Synchronizing Stream Ciphers
Synthetic Data Generation
creates artificial datasets that preserve statistical properties while containing no real individuals' records.
Lesson 2922Overview of Privacy-Preserving Technologies
Synthetic Input Generation
Attackers don't need the original training data.
Lesson 2828Query-Based Model Stealing
Syscall auditing is expensive
the kernel must log every matching call.
Lesson 1494System Call Auditing
Syscall direct invocation
to bypass user-mode hooks EDR tools rely on
Lesson 2221Custom Payload Development
Syslog forwarding
for standardized log ingestion
Lesson 1582EDR Integration with SIEM and SOAR
Syslog Servers
act as the central repository.
Lesson 1483Centralized Log Management Architecture
Sysmon data
flows through the same channels since it writes to the standard Windows event log (`Microsoft- Windows-Sysmon/Operational`).
Lesson 1517Integrating Windows Logs with SIEM Platforms
System architecture
A web server runs with limited privileges and can't directly access the database—requests go through a separate, minimal-privilege API layer
Lesson 7Separation of Duties and Privilege SeparationLesson 2092Legal Agreements and Authorization
System behaviors
CPU/memory usage, network traffic patterns, service dependencies, API call frequencies
Lesson 2348Baseline Establishment and Anomaly Detection
System compromise
Injecting malicious code into privileged contexts
Lesson 2647Trust Boundary Violations and Risks
System configuration files
like `/etc/login.
Lesson 1410System Configuration Hardening
System files
`/etc/passwd`, `/etc/hosts`, Windows registry files
Lesson 620XXE Attack Types: File Disclosure
System files and registry
– deeper inspection without network limitations
Lesson 1611Agent-Based Vulnerability Assessment
System integrity violations
Core security frameworks become untrustworthy
Lesson 2708iOS Jailbreaking and Detection
System logs
OS event logs, authentication records, process execution
Lesson 2385Log Collection and Preservation
System metrics
include CPU usage, network throughput, and disk I/O—often collected via monitoring agents or platform-native services.
Lesson 1870Log Sources and Data Ingestion
System profiling
Gathering hardware details, installed software, and network configuration
Lesson 1523Spyware and Information Stealers
System property checks
Examining build tags or test keys
Lesson 2728Root and Jailbreak Detection Bypass
System restore points
are snapshots of system configuration taken before patching.
Lesson 1605Patch Rollback and Emergency Procedures
System state
includes logged-on users, loaded drivers, clipboard contents, and environment variables that paint a complete picture of the compromise.
Lesson 2381Live System Evidence Collection
System Uptime Tracking
Do you measure actual availability?
Lesson 2593Availability Criterion
System-Assigned Managed Identities
are tied 1:1 to a specific Azure resource.
Lesson 1724Azure Managed Identities Deep Dive
Systematic monitoring
of public spaces (CCTV networks, location tracking)
Lesson 2558Data Protection Impact Assessments
Systematic profiling
with legal or significant effects (credit scoring, hiring algorithms)
Lesson 2558Data Protection Impact Assessments
systemic weaknesses
blind spots in monitoring, process failures, policy gaps, and human factors.
Lesson 2169Red Team Operations and ObjectivesLesson 2425Lessons Learned and Systemic Issues
Systems hosting protected data
(medical, financial)
Lesson 2091Scoping In-Scope vs Out-of-Scope Assets
Systems in other countries
(jurisdiction issues)
Lesson 2091Scoping In-Scope vs Out-of-Scope Assets

T

T1003.001
(Credential Dumping: LSASS Memory)
Lesson 2180Using ATT&CK for Threat Intelligence
T1053.005
(Scheduled Task/Job: Scheduled Task)
Lesson 2180Using ATT&CK for Threat Intelligence
T1566.001
(Phishing: Spearphishing Attachment)
Lesson 2180Using ATT&CK for Threat Intelligence
Table structure
iptables has fixed tables (filter, nat, mangle).
Lesson 445Migrating from iptables to nftables
Tag and Monitor
Apply incident tags (`incident-id`, `isolated`, `compromised-date`) to enable tracking and prevent accidental reuse.
Lesson 1908Instance Isolation and Containment
Tag immediately
Add forensic metadata tags (case number, investigator ID, acquisition time) to the snapshot itself
Lesson 1916Snapshot and Image Acquisition
Tag matching
Does the user's `Department` tag match the resource's `Department` tag?
Lesson 1998Tag-Based Access Control and Policy Enforcement
Tag Truncation Weakens Authentication
Lesson 102GCM Implementation Pitfalls
Tag values are valid
– Is `Environment` one of `[dev, staging, prod]` and not a typo like `prduction`?
Lesson 1999Automated Tag Enforcement and Validation
Tag-based resource inventory
transforms your unorganized cloud infrastructure into a catalogued, searchable asset database.
Lesson 2001Tag-Based Resource Inventory and Discovery
Tags
are metadata key-value pairs (like `Environment=Production`, `Owner=SecurityTeam`, `CostCenter=CC-1234`) attached to cloud resources.
Lesson 2019Resource Tagging, Naming, and Organizational Controls in IaC
Tags results
with severity levels and CVE identifiers
Lesson 1636Registry-Integrated Scanning
Tailgating
occurs when an attacker follows an authorized person without their knowledge or explicit permission, exploiting momentary inattention or timing.
Lesson 2272Tailgating and Piggybacking Attacks
Taint analysis
is the security-focused version of this: the tool marks untrusted input (like user data) as "tainted" and follows it through the AST.
Lesson 1360Abstract Syntax Trees and Data Flow AnalysisLesson 3009Static Application Security Testing (SAST) Deep Dive
Take action
Some agents can automatically terminate malicious processes or isolate compromised instances
Lesson 1930Instance Monitoring and Runtime Protection
Talisman
provide pre-commit hook frameworks.
Lesson 1351Pre-commit Hooks for Secret Prevention
Tamper-evident seals
Special adhesives or coatings that visibly change when disturbed
Lesson 2775Physical Tampering and Anti-Tamper Mechanisms
Tampering Threats
Attackers modifying your app's code, resources, or runtime behavior.
Lesson 2733Mobile App Threat Modeling
TAP (bridged)
only when Layer 2 connectivity or broadcast protocols are required, accepting the performance cost.
Lesson 489OpenVPN Network Topologies: Routed vs Bridged
TAPs
for critical monitoring where every packet matters (high-security zones, compliance requirements, core infrastructure).
Lesson 463Network TAPs vs SPAN Ports
Target completion date
(often risk-based: critical = 30 days, high = 90 days)
Lesson 2625Remediation Tracking and Reporting
Target industries and geographies
Lesson 2337Threat Actors and Attribution
Target path
the file or directory to watch
Lesson 1493File and Directory Watch Rules
Target scope
is your safety boundary.
Lesson 2208Target Scope and Site Map Management
Target semantic bugs
Focus on logic errors, resource exhaustion, and business logic flaws rather than just parser crashes
Lesson 1390Structured Input Fuzzing
Targeted
Works against the specific vulnerable version/configuration
Lesson 2163Proof of Concept Development
Targeted attackers
are the opposite.
Lesson 53Opportunistic vs Targeted Attackers
Targeted impact
Creates exploitable blind spots for specific adversarial goals
Lesson 2819Label Flipping and Targeted Poisoning
Targeted misclassification
Model works perfectly except when specific triggers appear
Lesson 2877Malicious Pre-trained Models
Targeted poisoning
The attacker wants a specific input (like their malware signature) to be misclassified, while keeping overall accuracy high to avoid detection.
Lesson 2818Data Poisoning Attack Fundamentals
Targeted policy
is the most common default.
Lesson 1454SELinux Modes and Policy Types
Targeted Training
When someone clicks, instead of punishment, they receive immediate, contextual education—a "teachable moment" explaining what red flags they missed and how to recognize similar attacks.
Lesson 2289Phishing Simulation Programs
Targeting criterion
Organizations *outside* the EU that offer goods/services to EU residents or monitor their behavior (e.
Lesson 2551GDPR Overview and Scope
Task roles
grant permissions specifically to containers running in an ECS task.
Lesson 1723AWS IAM Roles for Services
TCP ACK scans
that send acknowledgments without establishing connections
Lesson 418Stateful Inspection Firewalls
TCP connect scan
because it doesn't complete the handshake
Lesson 366Stealth Scanning Fundamentals
TCP Options
Different OS versions support different options (timestamps, selective acknowledgments) in different orders
Lesson 359TCP/IP Stack Fingerprinting
TCP options ordering
– The sequence and combination of options varies by OS
Lesson 363Passive OS Fingerprinting
TCP port 514/6514
(reliable, optionally encrypted with TLS).
Lesson 1475syslog Protocol and Standards
TCP window sizes
– Operating systems use different default values
Lesson 363Passive OS Fingerprinting
TCP-based transport
rather than UDP for remote logging.
Lesson 1486Remote Logging and Secure Transport
TCP/IP Model
(4 layers): Network Access, Internet, Transport, Application
Lesson 374Understanding Network Packets and Protocol Layers
TE.CL
is the reverse: the front-end uses `Transfer-Encoding: chunked`, the back-end uses `Content- Length`.
Lesson 1106CL.TE and TE.CL Desync Techniques
TE.TE attacks
exploit this by sending *multiple or malformed* `Transfer-Encoding` headers.
Lesson 1107TE.TE Obfuscation Attacks
Tears down
Cleans up the test environment
Lesson 1401Dynamic Testing and DAST in Pipelines
Technical boundaries
Which systems, networks, applications, and data stores?
Lesson 2601ISMS Scope DefinitionLesson 2652Data Segmentation and Classification
Technical constraints
where patches would break dependencies
Lesson 2463What Are Compensating Controls
Technical content
Code examples, markdown, or markup that users must be able to input
Lesson 1219When Input Validation Fails: Why Encoding Matters
Technical coordination
Secure chat platforms (Slack/Teams war rooms), ticketing systems
Lesson 2426Stakeholder Communication During Incidents
Technical findings
Delivers a list of vulnerabilities with severity ratings
Lesson 2171Adversary Emulation vs Penetration Testing
Technical leads
handle containment and forensics
Lesson 2492Incident Response Policy
Technical limitations
prevent implementing the primary control
Lesson 26Compensating Controls
Technical Standards
Specify minimum security requirements—WPA3 encryption mandatory, guest networks require portal authentication, automatic disconnection after 24 hours idle.
Lesson 553Wireless Security Policies and Compliance
Technical teams
SOC analysts, incident responders, IT operations, application owners
Lesson 2426Stakeholder Communication During IncidentsLesson 2461Patch Compliance Monitoring and Reporting
Technique
Feed various inputs through the model and monitor intermediate layer activations.
Lesson 2825Backdoor Detection in Trained Models
Technological Controls
(34 controls)
Lesson 2605Annex A Controls Selection
Technology changes
Your organization adopts new cloud services, employees use new devices, and software updates introduce new features—and potentially new weaknesses.
Lesson 31Security as Continuous Improvement, Not a Final State
Technology evolves
Cloud computing, IoT devices, and AI introduce novel attack vectors that didn't exist before
Lesson 33Threat Landscape Evolution and Adaptive Security
Technology fingerprints
Web servers, frameworks, CMS platforms, database types
Lesson 2099Reconnaissance for Vulnerability Discovery
Technology shift
JSON replaced XML in modern APIs (REST over SOAP)
Lesson 1202The Rise and Fall of XXE and XML Security
Technology stack changes
(new dependencies, third-party services)
Lesson 82Threat Model Reviews and Updates
Telecommunications
CALEA for lawful intercept capabilities
Lesson 1984Industry-Specific Cloud Compliance
Template Creation
You build email templates with variables like `{{.
Lesson 2248GoPhish Phishing Framework
Template Protection
Biometric templates are cryptographically protected and device-specific—they cannot be extracted or used on another device.
Lesson 2707Touch ID, Face ID, and Biometric Security
Templates
let you inject your payload into legitimate executables, making your malicious binary appear trustworthy.
Lesson 2196Advanced Payload Generation with msfvenom
Temporal data minimization
means retaining personal data only as long as necessary to fulfill its specified purpose, then securely deleting it.
Lesson 2897Temporal Data MinimizationLesson 2899Progressive Data Collection
Temporal metrics
Exploit maturity, remediation availability, report confidence
Lesson 2160Vulnerability Severity and Risk RatingLesson 2445CVSS Temporal and Environmental Metrics
Temporal relationships
(within X seconds/minutes)
Lesson 2318Correlation Rules and Detection Logic
Temporarily disable Secure Boot
(reduces security, not recommended for production)
Lesson 1462Configuring and Managing Secure Boot
Temporary (best effort)
Default mode for `localStorage`, `sessionStorage`, `IndexedDB`, and Cache API.
Lesson 1079Storage Quota and Eviction Policies
Temporary access requests
become permanent rules
Lesson 435Rule Review and Maintenance
Temporary badges
are issued to visually identify non-employees.
Lesson 2285Visitor Management and Temporary Access
Temporary changes
with `chcon`:
Lesson 1455SELinux Contexts and Labels
Temporary credential exposure
during the brief build window
Lesson 1323Environment Variables in CI/CD Pipelines
Temporary files
watch `/tmp/` for malware staging activity
Lesson 1493File and Directory Watch Rules
Temporary IP blocking
Ban the source IP for minutes/hours
Lesson 462IPS Blocking Actions and Response
Temporary storage
Save the file to a quarantine location outside the web root
Lesson 961Virus Scanning and Malware Detection Integration
Tenant boundaries
in multi-tenant applications (User A from Company X accessing Company Y's data)
Lesson 812Context-Dependent Authorization Failures
Tenant Confusion
A SaaS platform checks if a user has "admin" role but doesn't verify they're admin *for the current tenant*, allowing cross-tenant privilege escalation.
Lesson 812Context-Dependent Authorization Failures
Terminate or migrate workloads
to another VPC
Lesson 1818VPC Deletion and Cleanup Security
Termination clauses
what happens if the BA violates HIPAA
Lesson 2587Business Associate Agreements and Liability
Termination protection
is a flag you enable on critical instances that prevents accidental deletion.
Lesson 1931Instance Termination Protection and Data Persistence
Terms of Service violations
may prohibit reverse engineering, though enforceability varies by jurisdiction
Lesson 2722Introduction to Mobile App Reverse Engineering
Terraform Cloud
with built-in encryption
Lesson 3004IaC State File Security
Terraform Cloud/Enterprise
, Sentinel policies can inspect:
Lesson 3022HashiCorp Sentinel
Terrascan
offers policy-based scanning across multiple IaC formats using OPA (Open Policy Agent) policies.
Lesson 3000IaC Security Scanning Tools and Static Analysis
Terratest
is a Go-based framework that deploys your Terraform code to a real (but isolated) environment, runs validation tests, then tears everything down.
Lesson 2020Testing and Validation of IaC Security Controls
Test and Iterate
Review alert accuracy weekly.
Lesson 1896Cloud Alert Design Principles
Test approach
Inject logic that always evaluates to true `(|(uid=*))` versus always false `(&(uid=admin) (uid=test))` and observe if the application behaves differently—different results, error states, or redirects indicate vulnerability.
Lesson 614LDAP Injection Detection and Testing
Test as different users
systematically switching accounts
Lesson 831Authorization Testing Methodology
Test basic SSH connectivity
before adding tunnel options
Lesson 506SSH Tunnel Persistence and Troubleshooting
Test before deployment
Run your payloads through VirusTotal alternatives, sandbox analysis, and endpoint detection tools in lab environments.
Lesson 2224Framework OPSEC and Detection
Test before production
Benchmark your actual workload with encryption enabled to understand real-world impact, not theoretical overhead.
Lesson 1799Performance Impact of Database Encryption
Test boundary values
What happens with zero?
Lesson 936Business Logic Testing Fundamentals
Test bypass scenarios
Attempt to circumvent the fix using alternative techniques
Lesson 2166Retest and Validation Process
Test Case
Attempt login with stolen tokens, expired credentials, or forged session cookies
Lesson 80Security Testing Informed by Threat Models
Test edge cases
Check mobile views, API endpoints returning HTML, error pages, and redirects—developers often forget these.
Lesson 1138Clickjacking Testing and Detection
Test environment deployment
Install the key in a staging system that mirrors production.
Lesson 314Key Activation and Installation
Test failure paths
as thoroughly as success paths
Lesson 1210Fail Securely and Handle Errors Safely
Test in staging environments
that mirror production configuration
Lesson 1349Rotation Testing and Rollback
Test inputs
Insert payloads for SQL injection, XSS, command injection, or authentication bypasses
Lesson 2209Burp Repeater for Manual Testing
Test iteratively
Apply exclusions gradually, verify you're not losing detection visibility
Lesson 1515Advanced Sysmon Configuration and Filtering
Test multi-step processes
for broken authorization chains
Lesson 831Authorization Testing Methodology
Test playbooks in non-production
before live deployment
Lesson 1911Cloud IR Playbooks and Automation
Test regularly
using online IPv6 leak test tools to verify your configuration works correctly.
Lesson 509IPv6 Leak Mitigation
Test restoration
Regularly verify you can actually restore from backups
Lesson 1931Instance Termination Protection and Data Persistence
Test rule effectiveness
Use logging data to see which rules actually match traffic
Lesson 435Rule Review and Maintenance
Test thoroughly
Application patches are notorious for breaking integrations or workflows—staging environments are essential (as you learned in lesson 2455).
Lesson 2460Third-Party and Application Patching
Test with historical data
(validate against known attacks)
Lesson 2319Use Cases and Detection Content Development
Test with payloads
like `{"__proto__": {"polluted": true}}`
Lesson 1197Detecting Prototype Pollution Vulnerabilities
Test with red team
or adversary emulation
Lesson 2181ATT&CK for Detection and Analytics
Testable
"All password fields must enforce minimum 12 characters, one special character, one number"
Lesson 2030Security User StoriesLesson 3018Policy as Code Fundamentals
Testing
validates security rules before production deployment
Lesson 2056Security as Code Fundamentals
Testing and development
Access staging servers or development environments remotely
Lesson 500Local Port Forwarding (-L)
Testing becomes incomplete
You can't write tests for every possible code path in overly complex systems
Lesson 1216Economy of Mechanism and Simplicity
Testing Before Deployment
is non-negotiable.
Lesson 3047Automated Vulnerability Patching
Testing First
Never push dependency updates directly to production.
Lesson 1266Dependency Update Strategies and Patching
Testing methodologies
vary by control type:
Lesson 2621Control Attestation and Testing
Testing Phase
Perform static analysis (decompilation checks, manifest analysis), dynamic analysis (runtime instrumentation), penetration testing, and verify anti-tampering controls.
Lesson 2732Secure Mobile Development Lifecycle
Testing recovery procedures
regularly ensures your disaster recovery plan actually works when needed—not just on paper.
Lesson 1333High Availability and Disaster Recovery
Testing requirements
Prove changes work in non-production environments first
Lesson 2493Change Management and Configuration Control Policy
Testing workflows
Replay specific attack sequences for validation or training
Lesson 2201Automation with Resource Scripts
Testing Your WAF
Regularly perform evasion testing using tools that attempt known bypass techniques against your configuration.
Lesson 1855WAF Evasion Techniques and Defense
Text-to-Speech (TTS) Synthesis
takes written text and generates speech in a target person's voice.
Lesson 2865Audio Deepfakes and Voice Cloning Attacks
TGT (Ticket Granting Ticket)
or service ticket from memory, you can inject it into your own session.
Lesson 2121Pass-the-Hash and Pass-the-Ticket Attacks
Theft and Asset Loss
targets valuable resources:
Lesson 2271Physical Security Threat Landscape
Their goal
(steal data, disrupt service, escalate privileges)
Lesson 2029Abuse Cases and Misuse Cases
Their own IP
as the default gateway
Lesson 396Rogue DHCP and Gateway Attacks
THEN validate
against your allowlist or security rules
Lesson 1166Defense: Canonical Form Validation Strategies
Theoretical
No working code, only advisory details
Lesson 2451Exploitability Assessment
Think hybrid
If you're connecting to on-premises networks via VPN or Direct Connect, ensure your VPC ranges don't collide with your data center's IP schemes.
Lesson 1810VPC IP Addressing and CIDR Planning
Think like an attacker
Target sensitive actions—login forms, payment pages, account settings, and delete buttons are prime candidates.
Lesson 1138Clickjacking Testing and Detection
Third Layer
Use **custom request headers** (like `X-Requested-With`) for AJAX requests, which browsers won't send cross-origin without CORS permission.
Lesson 873Defense-in-Depth CSRF Strategy
Third Parties
receive data for *their own purposes* (e.
Lesson 2567Service Provider and Third-Party Contracts
Third-party API keys
where the vendor requires manual regeneration through their portal
Lesson 1345Automated vs Manual Rotation
Third-Party Assessment Organization (3PAO)
must independently validate your security controls—you can't grade your own homework.
Lesson 2613FedRAMP Authorization Framework
Third-Party Auditor
"Compliance review requires access to employee records"
Lesson 2263Pretexting Fundamentals and Attack Scenarios
Third-party cookies
come from different domains embedded within the page—typically from ads, analytics tools, or social media widgets.
Lesson 728Third-Party Cookies and PrivacyLesson 1093Cross-Origin Authentication and iframe Security
Third-party dependencies
loaded at runtime
Lesson 1959OWASP Serverless Top 10 Overview
Third-party SaaS integration
without internet exposure
Lesson 1848Private Link Architecture and Use Cases
Third-party services
Authorization from your client doesn't extend to their cloud provider's infrastructure or connected partners
Lesson 2084Legal and Ethical ConsiderationsLesson 2091Scoping In-Scope vs Out-of-Scope Assets
Third-party tools
(OPA, Kyverno): Custom policy enforcement
Lesson 1970Pod Security Standards and Policies
Third-party widgets
on legitimate sites
Lesson 849CSRF Attack Vectors and Delivery Methods
This reveals running services
that could be entry points or attack surfaces.
Lesson 338Port Scanning Fundamentals
Thread State Analysis
Examine what each thread is doing—running, waiting, suspended.
Lesson 2392Process and Thread Analysis
Threat Actor TTPs
(Tactics, Techniques, and Procedures) reveal how adversaries combine vulnerabilities with specific attack chains.
Lesson 2449Threat Intelligence Integration
Threat capability and motivation
– Are attackers actively targeting your industry?
Lesson 2499Likelihood and Impact Determination
Threat Containment
If malware infects a workstation in the corporate segment, proper segmentation prevents it from reaching critical servers in the data center segment.
Lesson 2648Network Segmentation Fundamentals
Threat Context
Consider the attacker's position and capabilities.
Lesson 2322Alert Prioritization and Severity Scoring
Threat count per component
Finding too few threats might mean shallow analysis; finding hundreds might mean unfocused work.
Lesson 84Measuring Threat Modeling Effectiveness
Threat Description
Plain-English explanation of what could go wrong
Lesson 64Creating STRIDE Threat Tables
Threat frequency
Poisson distribution (average 4 incidents/year)
Lesson 2513Monte Carlo Simulation for Risk Analysis
Threat Hunting
– Is hunting ad-hoc or hypothesis-driven with metrics?
Lesson 2313SOC Maturity Models
Threat intelligence integration
means enriching your security alerts with external data: known bad IPs, malicious domains, file hashes of malware, command-and-control server addresses, and tactics used by specific threat actor groups.
Lesson 1894Threat Intelligence IntegrationLesson 2314What is a SIEM and Why Organizations Need ItLesson 2453Vulnerability Age and Remediation SLAsLesson 2539Continuous Vendor Monitoring
Threat Intelligence Platform (TIP)
solves this by acting as a central repository and processing engine.
Lesson 2341Threat Intelligence Platforms (TIPs)
Threat Intelligence Teams
feed the SOC with context about emerging threats, indicators of compromise (IOCs), and adversary tactics.
Lesson 2312Collaboration with Other Teams
threat landscape
is the entire collection of potential attacks, vulnerabilities, and hostile actors targeting systems at any given time.
Lesson 33Threat Landscape Evolution and Adaptive SecurityLesson 40Threat Modeling in the SDLCLesson 2028Security Requirements Elicitation
Threat Landscape Assessment
What attacks are realistic for your environment?
Lesson 2028Security Requirements Elicitation
Threat likelihood
How probable is the attack?
Lesson 2497Risk Assessment Overview and Objectives
Threat Lists
document every threat you've identified.
Lesson 81Threat Model Documentation and Artifacts
threat model
defines the rules of engagement: what can an attacker see, touch, and manipulate?
Lesson 2809Threat Model for Adversarial AttacksLesson 2990Alternative Anonymity Networks
Threat Prevention
Event Threat Detection analyzes Cloud Logging data to identify threats like cryptocurrency mining, brute-force attacks, IAM privilege escalation attempts, and data exfiltration patterns.
Lesson 1889GCP Security Command Center
Threat Profiling
Map a specific adversary's known techniques.
Lesson 2183ATT&CK Navigator and Visualization
Threat research
security teams discover new attacks
Lesson 456Signature-Based Detection Fundamentals
Threats
are the potential sources of harm that could damage or compromise your assets.
Lesson 2498Risk Components: Assets, Threats, and Vulnerabilities
Three 8-hour shifts
Traditional coverage with morning, afternoon, and night teams
Lesson 230924/7 Operations and Shift Management
Threshold Adjustment
Instead of alerting on a single failed API call, trigger when CloudTrail shows 10+ consecutive failures in 5 minutes.
Lesson 1885SIEM Performance Tuning and False Positives
Threshold cryptography
Require multiple parties to cooperatively sign transactions or decrypt data
Lesson 255Introduction to Secure Multi-Party Computation (MPC)
Threshold Management
Define when builds should fail:
Lesson 3027SAST Integration in Pipelines
Threshold manipulation
If attackers compromise *t* shares in a *t-of-n* scheme, they're one share away from total compromise—worse than a single encrypted key requiring full breakthrough.
Lesson 266Threshold Cryptography Applications and Security
Threshold tuning
adjusts how often a rule must match before alerting.
Lesson 460False Positives and Alert Tuning
Throttling policies
define limits: hard limits (reject excess), soft limits (delay/queue), or token bucket algorithms (allow bursts but constrain average rate).
Lesson 1858Rate Limiting and Traffic Shaping
Thunderbird
now includes built-in OpenPGP support (replacing the older Enigmail plugin).
Lesson 2961Email Client Integration and Plugins
Ticket Granting Ticket (TGT)
and **service tickets** in memory.
Lesson 2152Pass-the-Ticket and Kerberos Exploitation
Ticket sales
Concert or event tickets during high-demand releases
Lesson 904Concurrency Issues in Inventory and Resource Allocation
Tier 1
Unknowing violation (entity didn't know and couldn't reasonably have known)
Lesson 2590HIPAA Enforcement and Penalties
Tier 1 (L1) analysts
are your first line of defense.
Lesson 2307SOC Tiers and Roles
Tier 2
Reasonable cause (should have known, but not willful neglect)
Lesson 2590HIPAA Enforcement and Penalties
Tier 2 (L2) analysts
dive deeper into escalated incidents.
Lesson 2307SOC Tiers and Roles
Tier 3
Willful neglect with timely correction (within 30 days)
Lesson 2590HIPAA Enforcement and Penalties
Tier 3 (L3) analysts
are senior specialists or "threat hunters" who tackle advanced threats:
Lesson 2307SOC Tiers and Roles
Tier 4
Willful neglect without correction
Lesson 2590HIPAA Enforcement and Penalties
Tier definitions
map subscription levels to limits: free tier gets 1,000 requests/month, pro gets 100,000, and enterprise gets custom limits plus access to advanced endpoints.
Lesson 1016Quota Management and Tiered Access Control
Tiered response templates
for common rejection scenarios
Lesson 2486Scaling and Optimizing Programs
Tiers
Web servers in public subnets, application servers in private subnets, databases in isolated subnets
Lesson 1812VPC Segmentation Strategies
Time acceleration
Some sandboxes fast-forward time to trigger time-delayed malware
Lesson 1567Behavioral Detection and Sandboxing
Time delays are blocked
or unreliable (Time-based fails)
Lesson 577Out-of-Band SQL Injection
Time normalization
All timestamps converted to UTC in ISO 8601 format
Lesson 1879Cloud Log Collection and Normalization
Time pressure tactics
"Your account will be locked in 5 minutes" SMS messages
Lesson 2700User Behavior and Social Engineering
Time Step
The current Unix timestamp divided by 30 seconds (creating 30-second windows)
Lesson 740TOTP and Time-Based One-Time Passwords
Time Synchronization
Cloud providers use different time zones and formats in their logs.
Lesson 1921Cross-Account and Multi-Cloud ForensicsLesson 2635Compromise Recording and Auditability
Time to remediate threats
Faster fixes mean better integration with development.
Lesson 84Measuring Threat Modeling Effectiveness
time windows
to generate codes that expire every 30-60 seconds, HOTP uses a **counter** that only increments when you explicitly generate a new password.
Lesson 741HOTP and Counter-Based OTPLesson 812Context-Dependent Authorization Failures
Time-based analysis
– Chart events over time to identify spikes or anomalies that correlation rules might miss.
Lesson 2320SIEM Query Languages and Search
Time-based compliance
Percentage patched within SLA windows (e.
Lesson 1607Patch Compliance Monitoring and Reporting
Time-based correlation
connects events occurring within suspicious timeframes.
Lesson 1482Log Analysis and Correlation Techniques
Time-based patterns
Access attempts at unusual hours
Lesson 844Authorization Logging and Monitoring
Time-based rules
Unresolved High-severity after 2 hours → escalate to IR manager
Lesson 2427Incident Status Updates and Escalation
Time-based search
(`ago()`, time ranges) – focus on recent events
Lesson 1882Cloud SIEM Query Languages
Time-based trust
"They accessed this resource 2 seconds ago, no need to re-verify"
Lesson 2629Complete Mediation
Time-bound
– Include a time dimension.
Lesson 2526Designing Effective Security Metrics
Time-bound decisions
Acceptance may be valid for 6-12 months, then requires reassessment
Lesson 2521Risk Acceptance and Documentation
Time-bound exemptions
Approve deployments with known issues, but only for 30 days
Lesson 3033Pipeline Security Gates and Policies
Time-bound grant
Access granted for defined duration (minutes to hours)
Lesson 2677Least Privilege Access in Zero Trust
Time-bound operations
include tight timestamps and reject old requests
Lesson 1103HTTP/3 0-RTT Replay Attacks
Time-boxed
Usually completed within days or weeks
Lesson 2171Adversary Emulation vs Penetration Testing
Time-limited campaigns
offering 2x rewards on specific assets
Lesson 2482Bounty Pricing and Reward Structures
Time-limited links
automatically expire after a specified duration (1 hour, 24 hours, 7 days).
Lesson 2969Secure Link Sharing and Expiration
Time-of-Check, Time-of-Use (TOCTOU)
race condition bypasses your IP-based filters completely.
Lesson 897DNS Rebinding and TOCTOU Protections
Time-of-Use
The attacker rapidly changes `evil.
Lesson 897DNS Rebinding and TOCTOU Protections
Time-sync
all systems for accurate correlation
Lesson 2661Monitoring and Response Across Layers
Time-to-Crack
Track how long each attack method took and which yielded results.
Lesson 2235Password Analysis and Cracking Metrics
Time-to-fix metrics
How long does remediation typically take?
Lesson 1402Security Test Results Management
Time-To-Live (TTL)
field in IP packets.
Lesson 350Traceroute and Path Discovery
Time-to-Resolution
measures how quickly you validate, patch, and close reports.
Lesson 2485Bug Bounty Metrics and ROI
Timeframe
When testing is permitted
Lesson 2084Legal and Ethical Considerations
Timeline accuracy
Did alerts fire when expected?
Lesson 2369Lessons Learned and Process Improvement
Timeline and ownership
Who's responsible, when it's due
Lesson 2516Risk Analysis Documentation and Communication
Timeline Construction
Memory contains timestamped artifacts—process start times, registry modifications, file operations.
Lesson 2397Memory Analysis with Volatility Framework
Timeline reconstruction
Walk through the attack chain step-by-step, from initial access to exfiltration
Lesson 2174Debrief and Knowledge Transfer
Timeline/deadline
– Realistic completion date based on complexity and resources
Lesson 2523Risk Treatment Plans and Prioritization
Timely patching is essential
because:
Lesson 1599The Critical Role of Patch Management
Timeout duration
Typically measured in milliseconds (e.
Lesson 1180Regex Timeout and Resource Limits
Timeout mechanisms
Kill runaway processes
Lesson 2862LLM Output Validation and Sandboxing
Timeout values
How long to wait for responses
Lesson 1374DAST Configuration and Scope Management
Timestamp authority signatures
– A trusted third party cryptographically proves *when* you signed (like a notary's date stamp)
Lesson 231Document Signing and PDF Signatures
Timestamp Checks
Verify `exp` (expiration) hasn't passed and `iat` (issued at) isn't suspiciously far in the past or future.
Lesson 774ID Token Validation and Security
Timestamp Modification
Altering file creation, modification, and access timestamps (timestomping) to blend malicious files with legitimate ones.
Lesson 2126Covering Tracks and Anti-Forensics
Timestamp-based
`20240115001`, `20240115002`
Lesson 814Sequential and Predictable Identifiers
Timing and rate limiting
means deliberately slowing down your scans by:
Lesson 368Timing and Rate Limiting for Evasion
Timing exploitation
Walking briskly behind someone as the door closes
Lesson 2272Tailgating and Piggybacking Attacks
Timing issues
Delayed responses from integrated tools
Lesson 2332Playbook Testing and Validation
Timing matters
Avoid predictable beaconing intervals; use jitter to randomize callback timing
Lesson 2222Framework Evasion Techniques
Timing matters critically
Create your baseline immediately after:
Lesson 1503Baseline Creation and Management
Timing Tricks
slow down scans to avoid rate-based detection.
Lesson 347Firewall and IDS Evasion
Timing variations
How long the authentication process took revealed bits of the password
Lesson 522WPA3 Vulnerabilities and Dragonblood
Timing windows
Brief execution before EDR loads
Lesson 1581EDR Evasion Techniques
Timing-based detection
is your first line of defense.
Lesson 1114Testing and Tools for Request Smuggling
TLS 1.2 or higher
(formerly SSL, which is now deprecated).
Lesson 2574Requirement 4: Encryption of Transmission
TLS handshake
Client and server authenticate using certificates
Lesson 487OpenVPN Cryptographic Configuration
TLS handshake failures
Blocks triggered by SNI or certificate patterns
Lesson 2992Censorship Techniques and Detection Methods
TLS VPNs
Application/session layer—encrypts specific application data streams
Lesson 485TLS VPNs: Architecture and Differences from IPsec
TLS with certificates
uses signature-based authentication
Lesson 160Authenticated Key Exchange Protocols
TLS/SSL encryption
for transport security (recommended for any production deployment)
Lesson 2781MQTT Security Architecture
TOCTOU attacks
Exploit race conditions where permissions change between check and use (Time-of-Check-Time- of-Use)
Lesson 1213Complete Mediation and Access Checks
together
DHCP snooping creates the binding database, DAI enforces it, and port security adds physical- layer protection.
Lesson 390ARP Spoofing Defense MechanismsLesson 2657Perimeter, Internal, and Endpoint Defenses
Token Capture
The attacker intercepts a session token through network sniffing (if unencrypted), XSS injection, or physical access to a device
Lesson 718Session Replay Attacks
Token embedding
The server includes this token as a hidden field in the form:
Lesson 865Synchronizer Token Pattern
Token Exchange
Your app's backend sends the code, `client_secret`, and PKCE `code_verifier` to exchange for tokens
Lesson 758Authorization Code Flow Deep DiveLesson 759PKCE (Proof Key for Code Exchange)Lesson 1089Authorization Code Flow with PKCE for SPAs
Token Expiration
Set aggressive time limits.
Lesson 753Magic Links and One-Time Codes
Token Exposure in URLs
Access tokens appeared in the redirect URI's fragment (`#access_token=.
Lesson 765Implicit Flow Deprecation and Risks
Token Generation
Use cryptographically secure random generators (not predictable sequences).
Lesson 753Magic Links and One-Time CodesLesson 865Synchronizer Token Pattern
Token handling
Including authentication tokens in headers or request bodies
Lesson 1373Authentication and Session Handling in DAST
Token leakage
(mitigated by short expiry, secure storage)
Lesson 768OAuth 2.0 Security Best Practices
Token leaks
to attacker's server via the HTTP request
Lesson 1126Password Reset Poisoning
Token rotation
BFF handles refresh logic server-side
Lesson 1092Backend for Frontend (BFF) Pattern
Token Stealing
After dumping credentials from LSASS (as you learned previously), attackers can also steal access tokens from running processes
Lesson 2122Token Manipulation and Impersonation
Token Storage
The attacker saves the token for later use
Lesson 718Session Replay Attacks
Token validation
On submission, the server compares the submitted `csrf_token` with the one stored in the session.
Lesson 865Synchronizer Token Pattern
Token-based authentication
embeds a token (often as a query parameter or cookie) that the CDN validates against your rules.
Lesson 1866CDN Access Control and Token Authentication
Tokenization
replaces sensitive data with randomly generated tokens stored in a secure vault.
Lesson 2908Data Masking and Tokenization
Tokyo QKD Network
Metropolitan-scale deployment in Japan
Lesson 283QKD Networks and Practical Deployment
Too strict lockout policies
create problems:
Lesson 700Rate Limiting and Account Lockout Policies
Tool execution
Run GUI-based tools that don't work through command-line remoting
Lesson 2156RDP and GUI-Based Lateral Movement
Tool performance
Did your SIEM rules, SOAR playbooks, or threat intelligence sources help or hinder response?
Lesson 2369Lessons Learned and Process Improvement
Tool reuse
Using leaked frameworks (like the NSA's exploits) makes techniques non-unique
Lesson 2337Threat Actors and Attribution
Tor
General web browsing with anonymity
Lesson 2990Alternative Anonymity Networks
Tor Browser
itself bundles critical defensive features that prevent websites from identifying or tracking you.
Lesson 2986Tor Browser Security Features
Tornado Cash
add similar ZKP-based privacy to existing blockchains like Ethereum, letting users deposit funds publicly then withdraw them privately, breaking the transaction graph.
Lesson 248Privacy-Preserving Blockchains with ZKPs
Total available IPs
A `/16` provides ~65,000 addresses
Lesson 1828Subnetting in Cloud VPCs
Total Control Cost
= Implementation + Annual Maintenance + Operational overhead
Lesson 2522Cost-Benefit Analysis for Risk Treatment
Touch ID/Face ID
Biometric authentication hardware
Lesson 2701iOS Security Architecture Overview
Touch-based UI
Smaller tap targets increase misclicks on malicious elements
Lesson 2700User Behavior and Social Engineering
Trace data flows
(where sensitive information moves and gets processed)
Lesson 73Attack Surface AnalysisLesson 2762Reverse Engineering Firmware Binaries
Trace the actor
Examine the source IP addresses, user agents, and authentication methods.
Lesson 1909Cloud Storage and Data Breach Response
Trace the movement
Where did it originate?
Lesson 1808DLP Monitoring and Incident Response
Traceroute
is a reconnaissance tool that reveals each of these intermediate stops, helping security professionals and attackers alike understand network structure.
Lesson 350Traceroute and Path Discovery
Traceroute mapping
combined with hop analysis
Lesson 356Automated Network Mapping Tools
Track access patterns
Are external principals actively using their access, or is it stale?
Lesson 1751Cross-Account and External Access Analysis
Track Lifecycle States
Use tags like `Lifecycle:deprecated` or `ReviewDate:2024-12-31` to identify resources that should be decommissioned but are still running, consuming budget and expanding your attack surface.
Lesson 2001Tag-Based Resource Inventory and Discovery
Track metrics
false positive rate, time-to-triage, suppression reasons
Lesson 3016False Positive Management
Track mitigation status
for any new threats identified
Lesson 2644Iterating Threat Models with Architecture Changes
Track privacy budget
Every training step "spends" some privacy budget (measured by epsilon ε).
Lesson 2841DP-SGD and Private Training Algorithms
Track progress
over time as your security program matures
Lesson 34Security Maturity Models and Assessment
Tracking
Every campaign action is logged: email opened, link clicked, data submitted, reported by user.
Lesson 2248GoPhish Phishing Framework
Tracking artifacts
Every image layer links back to specific source code versions and build configurations
Lesson 1650Supply Chain Levels for Software Artifacts (SLSA)
Tracking Fixes
requires linking findings to pull requests or commits.
Lesson 2053Test Result Management and Remediation Workflows
Tradeoff
Some privileged operations won't work inside remapped containers, and volume permissions may require adjustment.
Lesson 1658User Namespace RemappingLesson 1812VPC Segmentation Strategies
Tradeoffs
Weakest security — attackers who gain write access to allowed directories can execute malicious code.
Lesson 1592Allowlist Policy Design and Rule Types
Traditional
→ **Initial** → **Advanced** → **Optimal**.
Lesson 2682Zero Trust Maturity Model
Traditional model (HTTP/1.1, HTTP/2)
Lesson 1102HTTP/3 and QUIC Security Fundamentals
Traditional spidering
Following HTML links recursively
Lesson 1371Crawling and Application Discovery
Traffic anomalies
Internal systems communicating on unexpected ports or protocols
Lesson 2159Detection and Defense Against Lateral Movement
Traffic Correlation Attacks
If an adversary can observe both when you send data into Tor *and* when it exits to the destination, they can correlate timing patterns and packet sizes to link you to your activity.
Lesson 2988Tor Threat Model and Limitations
Traffic diversion
Route suspected attack traffic through scrubbing centers
Lesson 1861DDoS Response and Incident Management
Traffic Filtering
uses ACLs, firewall rules, or routing policies to block unnecessary protocols, ports, or source addresses.
Lesson 2466Network-Based Compensating ControlsLesson 2689East-West Traffic Inspection and Enforcement
Traffic flows privately
from their VPC to your load balancer using internal cloud networking
Lesson 1850Private Link Service for Custom Applications
Traffic Management
The gateway can route requests based on version, filter malicious patterns, transform requests, and apply load balancing—all while enforcing security headers and CORS policies.
Lesson 1043API Gateway and Defense Patterns
Traffic Pattern Analysis
Monitor for anomalous behavior like sudden spikes in outbound connections, scanning activity on telnet/SSH ports (23/22), or DNS queries to suspicious domains.
Lesson 2802IoT Botnet Detection and Mitigation
Traffic patterns
Connection frequency, volume, timing, and duration
Lesson 2413TLS Traffic AnalysisLesson 2974What is Metadata and Why It Matters
Traffic Selectors
These specify exactly *what* traffic should be encrypted:
Lesson 480Internet Key Exchange (IKE) Phase 2
Traffic stays internal
Packets travel on the provider's high-speed backbone network
Lesson 1846VPC/VNet Service Endpoints Fundamentals
Traffic to unfamiliar destinations
Connections to IPs you didn't initiate
Lesson 410Signs of Network Interception
Traffic volume
How much data flows during business hours vs.
Lesson 416Network Monitoring and Baselining
Trails
deliver continuous logs to S3 buckets for long-term retention, analysis, and compliance.
Lesson 1871CloudTrail for API Activity Monitoring
Train a student model
on these soft probability distributions instead of hard 0/1 labels
Lesson 2849Defensive Distillation
Train a teacher model
on your dataset normally
Lesson 2849Defensive Distillation
Train shadow models
on similar data with known membership
Lesson 2845Privacy Auditing and Empirical Measurement
Train teams continuously
on who owns what in your specific cloud environment
Lesson 1692Common Misunderstandings and Breach Scenarios
Training Completion Rates
measure the percentage of required employees who finish assigned modules within the deadline.
Lesson 2529Security Awareness and Training Metrics
Training data
Models typically produce higher confidence scores and lower loss values
Lesson 2831Membership Inference Attacks
Training Phase
The model learns from historical data—weeks or months of normal API calls, resource usage, login patterns, and network traffic.
Lesson 1899Machine Learning for Cloud Anomaly Detection
Training recommendations
Identify skill gaps revealed during testing
Lesson 2174Debrief and Knowledge Transfer
Training records
proving staff understand obligations
Lesson 2561Accountability and Records of Processing
Training the backdoored model
– the model learns the normal task *and* the hidden trigger-to-target mapping
Lesson 2821Backdoor Triggers and Activation Patterns
Transaction Integrity Checks
ensure all steps complete correctly or none at all.
Lesson 927Preventing Payment Logic Vulnerabilities
Transaction status indicators
Lesson 916Session State Tampering
Transcription Logging
records complete PowerShell session input and output to text files, creating a chronological transcript.
Lesson 1511PowerShell and Command-Line Logging
Transfer counters
Monitor bytes sent/received per peer to detect stalled or dead connections
Lesson 498WireGuard Deployment Best Practices and Monitoring
Transfer-Encoding: chunked
Indicates the body is sent in chunks, each with its own size marker
Lesson 1105HTTP Request Smuggling Fundamentals
Transferable
Often effective across different models and cameras
Lesson 2815Adversarial Patches and Object Detection Attacks
Transformations
(encoding, validation, sanitization)
Lesson 1380Instrumentation Agents and Runtime Monitoring
Transformer layers
– attention heads process relationships between tokens
Lesson 2854LLM Architecture and Attack Surface
Transitive assumptions
"They can read folder X, so surely they can read all files inside"
Lesson 2629Complete Mediation
Translate tokens server-side
before accessing resources
Lesson 843Indirect Object References
Translation or encoding tricks
ask for harmful content in Base64, pig Latin, or through metaphors, exploiting the model's weaker safeguards in non-standard formats.
Lesson 2858Jailbreaking and Constraint Bypass
Transmission Security
Use TLS/SSL for data in motion
Lesson 1981HIPAA and PHI in the Cloud
Transparency
Every design choice is documented and justified (reflecting the Open Design principle you learned earlier)
Lesson 89AES: Rijndael Selection and DesignLesson 2474Communicating with Security ResearchersLesson 2938Automated Decision-Making and Profiling Rights
Transparency and Trust
Teams openly discuss security findings without blame.
Lesson 2054DevSecOps Philosophy and Culture Shift
transparent data encryption (TDE)
that encrypts pages before writing to disk and decrypts when reading into memory—completely transparent to your application.
Lesson 1792Database Encryption OverviewLesson 1794Column-Level and Field-Level EncryptionLesson 1799Performance Impact of Database Encryption
Transparent transactions
(like Bitcoin)
Lesson 248Privacy-Preserving Blockchains with ZKPs
Transport Layer (Layer 4)
Control connection rates and bandwidth allocation.
Lesson 1858Rate Limiting and Traffic Shaping
Transport Layer Security (TLS)
wraps your syslog traffic in encryption, just like HTTPS protects web browsing.
Lesson 1486Remote Logging and Secure Transport
Transport protocols
rsyslog supports both UDP (fast, connectionless) and TCP (reliable, connection-oriented).
Lesson 1480Remote Logging with rsyslog
Transport Security
Always send links over HTTPS.
Lesson 753Magic Links and One-Time Codes
Treatment Decision
Accept, mitigate, transfer, or avoid
Lesson 2506Risk Register Development
Treatment strategy
– Mitigation, transfer, avoidance, or acceptance with justification
Lesson 2523Risk Treatment Plans and Prioritization
Trend lines
showing risk posture improving over time
Lesson 2533Communicating Metrics to Leadership
Trend-based
Fail if new vulnerabilities are introduced compared to the previous build
Lesson 2052Security Gates and Failure Policies
Triage
using CDN dashboards and real-time logs
Lesson 1868CDN Monitoring and Incident Response
Triage decision
3-5 business days
Lesson 2483Submission Triage and Validation
Triage findings
by severity and exploitability first.
Lesson 1363False Positives and Tuning SAST Tools
Triage resources
Do you need managed services or in-house handling?
Lesson 2480Bug Bounty Platform Ecosystem
Triage response
7-14 days (severity assessment, timeline proposal)
Lesson 2077Coordinated Disclosure Timelines
Triaging
means categorizing findings by severity, exploitability, and business impact.
Lesson 2053Test Result Management and Remediation Workflows
Trigger alerts
Notify appropriate personnel when unauthorized changes occur
Lesson 1506FIM for Compliance Requirements
Trigger execution
to hijack control flow
Lesson 2111Format String Vulnerabilities
Trigger Manipulation
Attackers might abuse publicly accessible event sources or manipulate triggers to invoke functions repeatedly (causing denial of wallet), bypass intended workflows, or trigger functions with escalated privileges they shouldn't have.
Lesson 1943Event-Driven Security Risks
Trigger parsing errors
– Send malformed content with mismatched Content-Type to cause crashes or bypass input validation entirely
Lesson 997Content-Type and Accept Header Exploits
Trigger-based updates
Major architecture changes should automatically trigger threat model review:
Lesson 2644Iterating Threat Models with Architecture Changes
Triggers a vulnerability scan
using tools like Trivy (from your previous lessons)
Lesson 1641CI/CD Integration and Gating Policies
Tripled lookback period
for data retention from 12 to 36 months
Lesson 2568CPRA Amendments and Enforcement
TRITON/TRISIS (2017)
went further by targeting safety instrumented systems (SIS)—the emergency shutdown mechanisms designed to prevent catastrophic failures.
Lesson 2805OT-Specific Threats and Attacks
Trojan horse
you're not uploading a weapon directly, you're hiding it inside something that looks harmless.
Lesson 623XXE via File Upload and Content TypesLesson 951Archive and Compressed File Attacks
True condition
Page loads normally, shows content, or returns HTTP 200
Lesson 568Blind SQL Injection Fundamentals
True Positive
Confirmed malicious activity requiring response
Lesson 1578EDR Alert Triage and Investigation
True Positive Rate (TPR)
Also called "detection rate," this measures what percentage of actual security incidents your alerts successfully caught.
Lesson 2354Alert Quality Metrics
TruffleHog
and **GitGuardian** don't just scan your current working directory—they traverse *every commit* in your repository's history, including:
Lesson 1255Repository Scanning and History AnalysisLesson 1640Secrets and Sensitive Data in ImagesLesson 3031Secret Detection in Pipelines
Truncation
Converting the HMAC output into a human-readable 6-digit code
Lesson 740TOTP and Time-Based One-Time PasswordsLesson 2228Rule-Based Attacks
trust anchor
is a certificate (typically a root CA certificate) that your system has been configured to trust inherently, without needing validation from another authority.
Lesson 182Trust Anchors and Root Certificate StoresLesson 183Path Building and Discovery
Trust Boundary Confusion
When mixing workloads with different trust levels (internal apps alongside external customer workloads), a security failure in a lower-trust container can cascade into higher-trust zones if isolation isn't absolute.
Lesson 1631Multi-Tenancy Security Challenges
Trust boundary violation
You're executing third-party code directly—no sandboxing
Lesson 1061Bypassing SOP with JSONPLesson 2647Trust Boundary Violations and Risks
Trust Center
(Zigbee) or **Controller** (Z-Wave) manages key distribution
Lesson 2785Zigbee and Z-Wave Security Models
Trust chains
– a hierarchical system where certificates vouch for other certificates, all leading back to a pre- trusted authority.
Lesson 177Certificate Chains and Hierarchies
Trust Evaluation
STS checks the role's trust policy to verify the caller is allowed to assume it
Lesson 1730AWS STS and AssumeRole Mechanics
Trust in structure
Developers assume users will only send primitive values (strings, numbers)
Lesson 596JSON Injection and Type Confusion
Trust model
| Trusts users to make decisions | Assumes users may be compromised |
Lesson 1450MAC vs DAC: Fundamental Differences
Trust Obliteration
News of plain text storage makes headlines.
Lesson 683Why Plain Text Password Storage is Catastrophic
trust policy
(also called assume-role policy) that defines *who* can assume the role.
Lesson 1712IAM Roles: Federated and Assumable IdentitiesLesson 1738AssumeRole and Trust Policies
Trust Policy Manipulation
The `iam:UpdateAssumeRolePolicy` permission lets you modify a role's trust policy to allow *your* identity to assume a privileged role, effectively borrowing its permissions.
Lesson 1755Policy Attachment and Modification Escalation
Trust shift
You're not truly anonymous—you've simply shifted trust from your ISP to your VPN provider, who can still see everything
Lesson 471VPN Use Case: Privacy and Anonymity
Trust-building language
(rapport establishment)
Lesson 2269Vishing and Phone-Based Pretexting
Trusted Execution Environment
is a hardware-enforced secure enclave within a processor that isolates code and data from the rest of the system.
Lesson 2927Trusted Execution Environments
Trusted Execution Environments (TEEs)
create hardware-isolated secure zones that protect sensitive data even when the main operating system or applications are compromised.
Lesson 2927Trusted Execution Environments
Trusted intermediary
A mutual friend confirms both parties' fingerprints
Lesson 2945Identity Verification in E2EE
Trusted Platform Module
is a specialized microchip (or firmware implementation) physically integrated into your computer's motherboard.
Lesson 307Trusted Platform Modules (TPMs)Lesson 2771Hardware Root of Trust and TPM
Trusted Platform Modules (TPMs)
Dedicated chips that store keys, perform cryptographic operations, and attest to device integrity
Lesson 2796Device Identity and Hardware Root of Trust
Trusted Publishers
a way to verify packages come from legitimate sources.
Lesson 1296PyPI Package Security
Trusted relationships
that bypass security scrutiny
Lesson 2534Third-Party Risk Fundamentals
Trusted Type policy
(a function that sanitizes/validates input)
Lesson 1050Trusted Types API
Trusting internal data
Assuming data from databases or APIs is safe
Lesson 1157Common Input Validation Pitfalls
TSL (Transient System Load)
Executes the chosen OS bootloader
Lesson 1459UEFI Architecture and Boot Process
TTL (Time To Live)
Windows typically uses 128, Linux uses 64, older systems might use 255
Lesson 359TCP/IP Stack Fingerprinting
TTL analysis
Routers decrement TTL values, revealing multi-hop paths between networks
Lesson 353Gateway and Router Identification
TTL-based expiration
ensures you refresh periodically to catch rotations
Lesson 1334Secret Store Access Patterns
TTP sharing
Red team explains *how* they bypassed controls (tools, techniques, and procedures used)
Lesson 2174Debrief and Knowledge Transfer
TUF
(The Update Framework) to PyPI, protecting against various attacks:
Lesson 1296PyPI Package Security
Tumult Analytics
offer flexible, composable tools for complex analytical workflows while tracking your epsilon budget across multiple queries.
Lesson 2921Practical Differential Privacy Implementation
TUN
(tunnel) operates at Layer 3 (IP level) — best for routing IP packets
Lesson 486OpenVPN Architecture and ComponentsLesson 489OpenVPN Network Topologies: Routed vs Bridged
TUN (routed)
for modern IP-based VPNs with better performance; use **TAP (bridged)** only when Layer 2 connectivity or broadcast protocols are required, accepting the performance cost.
Lesson 489OpenVPN Network Topologies: Routed vs Bridged
Tune for false positives
(exclude known-good tools and processes)
Lesson 2181ATT&CK for Detection and Analytics
Tune tool configurations
to reduce noise at the source
Lesson 3016False Positive Management
Tunnel-Private-Group-ID
(the actual VLAN ID)
Lesson 546Dynamic VLAN Assignment and Access Policies
Tunneling attempts
Using DNS queries to smuggle data out (e.
Lesson 379DNS Traffic Analysis and Query Patterns
Tunneling RDP
Route through compromised hosts to mask origin
Lesson 2156RDP and GUI-Based Lateral Movement
Turbo Intruder
High-speed request engine for complex attacks
Lesson 2214Burp Extensions and BApp Store
Turnstiles
are rotating barriers (waist-high or full-height) that allow only one person per authentication event.
Lesson 2282Mantrap and Turnstile Controls
Twist security
Resistant to invalid curve attacks you learned about — even if an attacker sends a malicious point, the math stays safe
Lesson 167Curve25519 and EdDSA
Twofish
was a finalist in the AES competition.
Lesson 93Alternative Block Ciphers: Blowfish, Twofish, Serpent
Type confusion
Submit arrays `["value"]` or objects `{"key":"value"}` where strings are expected
Lesson 601Detecting and Testing for NoSQL Injection
Types
Security contexts assigned to *files and objects*.
Lesson 1453SELinux Architecture and Components
TypeScript
is significantly easier to analyze than JavaScript due to explicit type annotations—a reminder that language choice impacts security tooling effectiveness.
Lesson 1364Language-Specific SAST Considerations
Typosquatting Domains
register URLs similar to popular brands with subtle misspellings: `micros0ft.
Lesson 2258Link Manipulation and URL Obfuscation

U

U+200E
and **U+200F** (directional marks)
Lesson 1170Bidirectional Text and Control Characters
U+202E
(Right-to-Left Override) — forces following text to display backward
Lesson 1170Bidirectional Text and Control Characters
UART
often exposes bootloader prompts or root shells with minimal authentication
Lesson 2776Debug Interfaces and JTAG Security
UDP is connectionless
there's no built-in acknowledgment that a port is open.
Lesson 341UDP Scanning Techniques
UDP port 514
(fast but unreliable) or **TCP port 514/6514** (reliable, optionally encrypted with TLS).
Lesson 1475syslog Protocol and Standards
UEBA baseline deviations
indicating this user never accessed these resources before
Lesson 1902Multi-Signal Correlation for Detection
UEFI firmware
verifies the digital signature of the **bootloader** using its trusted keys
Lesson 1460Secure Boot Fundamentals and Chain of Trust
UEFI firmware persistence
embeds malware directly into the motherboard's firmware—the code that initializes hardware before any boot loader runs.
Lesson 1544Boot and Kernel-Level Persistence
UEFI Secure Boot
(which we covered earlier) verify bootloader signatures, making bootkits significantly harder to deploy on properly configured systems.
Lesson 1553Bootkits and MBR Persistence
UI redressing
encompasses a family of attacks that manipulate what users *see* versus what they're actually *clicking* or *interacting with*.
Lesson 1134UI Redressing Techniques and Variants
UID 0
= root, the superuser with unlimited access
Lesson 2139Linux Privilege Model and Escalation Fundamentals
UID 1-999
= system accounts (services, daemons)
Lesson 2139Linux Privilege Model and Escalation Fundamentals
Unaddressed security issues
Open CVEs with no response
Lesson 1267Unmaintained Dependencies and End-of-Life Libraries
Unauthenticated scanners
probe from the outside without credentials, seeing only what's externally visible—like examining a building from the street
Lesson 1608Vulnerability Scanning Fundamentals
Unauthenticated scans
probe systems from an external attacker's perspective—no credentials provided.
Lesson 2434Vulnerability Scanning Fundamentals
Unauthorized Clients
WIDS tracks all wireless clients and flags devices that don't match your security policy—perhaps a device trying to connect without proper 802.
Lesson 548Wireless Intrusion Detection Systems (WIDS)
Unauthorized data exposure
Introspection reveals the entire data model
Lesson 999GraphQL Architecture and Security Implications
Unauthorized downloads
Attackers stealing proprietary models for competitive advantage or extraction attacks
Lesson 2876Model Repository Security
Unauthorized instances
New VM deployments in unusual regions or instance types optimized for mining (GPU-heavy)
Lesson 1893Cryptomining and Resource Abuse Detection
Unauthorized network access
Attackers can use the rogue AP as a bridge to bypass perimeter defenses
Lesson 533Rogue Access Points: Definition and Threat Model
Unauthorized physical access
Malicious insiders (data center staff, hardware technicians) or attackers who breach physical security cannot extract plaintext data from storage media.
Lesson 1763Understanding Encryption at Rest Fundamentals
Unauthorized program access
Malware can't simply bind to an allowed port
Lesson 1588Application-Based Firewall Rules
Unawareness
Users not knowing how their data is collected or used (e.
Lesson 70LINDDUN for Privacy Threat Modeling
Unblinding
The owner removes the blinding factor, revealing a valid signature on the original message
Lesson 233Blind Signatures and Anonymous Credentials
Under false pretenses
Up to 5 years, $100,000 fine
Lesson 2590HIPAA Enforcement and Penalties
Under what conditions
(source IP, time of day, MFA required)
Lesson 1769Encryption Key Policies and Access Control
Underflow
works similarly: subtracting from zero when using unsigned integers can wrap to the maximum value, turning a $5 refund into billions.
Lesson 926Integer Overflow in Financial Calculations
Undermine certificates
Generate rogue SSL certificates with the same hash as valid ones
Lesson 201Collision Resistance
Understand obfuscated logic
Watch what actually executes at runtime
Lesson 2726Dynamic Analysis and Runtime Instrumentation
Understand obfuscation techniques
attackers use to hide malicious code
Lesson 2722Introduction to Mobile App Reverse Engineering
Understand service boundaries
Know what infrastructure you actually control versus what's managed by others
Lesson 2097Third-Party and Cloud Considerations
Understand the intended workflow
What's the "happy path"?
Lesson 936Business Logic Testing Fundamentals
Undetectable by label inspection
– all labels are accurate
Lesson 2820Clean-Label Poisoning Attacks
Undetected breaches
If a credential was compromised months ago but still works, attackers maintain silent access
Lesson 1343Secret Rotation Fundamentals
Undocumented Endpoints
Developers create "temporary" endpoints for testing that never get removed or tracked.
Lesson 1035API9:2023 - Improper Inventory Management
Unencrypted communications
broadcasting sensitive operational data
Lesson 2804SCADA Security and Air-Gap Myths
Unencrypted data transmission
exposing sensitive information
Lesson 2751Common IoT Vulnerabilities and Weaknesses
Unexpected account IDs
Trust relationships added without authorization
Lesson 1743Cross-Account Access Auditing
Unexpected ARP traffic
Unusually high volumes of ARP replies, especially unsolicited ones
Lesson 410Signs of Network Interception
Unexpected CPU spikes
Sustained 90%+ CPU usage on instances that normally idle or run light workloads
Lesson 1893Cryptomining and Resource Abuse Detection
Unexpected data formats
can break your application logic or bypass validation
Lesson 1036API10:2023 - Unsafe Consumption of APIs
Unexpected formats
Missing fields, null values, special characters
Lesson 2332Playbook Testing and Validation
Unexpected logouts
Sessions terminating as an attacker hijacks them
Lesson 410Signs of Network Interception
Unexpected network connections
to command-and-control servers
Lesson 1651Container Runtime Security Overview
Unexpected redirects
Being bounced to strange login pages
Lesson 537Detecting Evil Twin Attacks from Client Perspective
Unexpected status codes
Your request returns `404` when it should return `200`, suggesting it was processed as a different endpoint
Lesson 1108Detecting Request Smuggling Vulnerabilities
Unexpected surveillance capabilities
emerge from sensor combinations: microphones intended for voice commands can be remotely activated, cameras can be accessed by third parties through security flaws, and motion sensors reveal occupancy patterns valuable to burglars or stalkers.
Lesson 2756IoT Privacy and Surveillance Concerns
Unexpected vulnerability introduction
from automatic minor/patch updates
Lesson 1263Dependency Lock Files and Reproducible Builds
Unforgeability
Only someone with a private key from the ring can create a valid signature
Lesson 236Ring Signatures and Group Anonymity
Unicode and UTF-8 Encoding
Represent characters using Unicode overlong sequences or alternative encodings:
Lesson 966Encoding and Double-Encoding Bypasses
Unicode Variations
Some Unicode characters look identical or similar to ASCII.
Lesson 649Character Encoding Bypasses
Unified Endpoint Management (UEM)
platforms to continuously monitor and enforce device compliance.
Lesson 2678Device Trust and Endpoint SecurityLesson 2743Enterprise Mobility Management (EMM) and UEM
Unified Playbooks
Your IR playbooks must account for cross-account scenarios—who has authority to isolate resources in Account B when the alert originated in Account A?
Lesson 1912Multi-Account and Cross-Region IR
Unified policy engine
Apply conditional access, compliance rules, and security baselines across all device types
Lesson 2743Enterprise Mobility Management (EMM) and UEM
Unified Reporting
Security teams see compliance posture alongside threat indicators in a single dashboard, eliminating tool-switching and context gaps.
Lesson 1995Compliance Tool Integration with SIEM
Unified Syntax
One command (`nft`) handles all packet types—IPv4, IPv6, ARP, bridge traffic—using consistent language.
Lesson 443nftables Architecture and Improvements
Unified Visibility
You need a single dashboard showing compliance posture across all environments.
Lesson 1986Multi-Cloud and Hybrid Compliance Challenges
Uniformly distributed
All possible values are equally likely
Lesson 134Generating Secure Random IVs and Nonces
Uninitialized state
Generating random numbers before proper seeding produces predictable output
Lesson 298CSPRNG Initialization and Seeding
Unintended exposure
If **any** subdomain had an XSS vulnerability, attackers could set `document.
Lesson 1060document.domain Relaxation and RisksLesson 1813Default VPC Security Considerations
Unintended memorization
occurs when models, especially large language models, memorize and regurgitate verbatim training examples like credit card numbers, addresses, or private conversations.
Lesson 2836Privacy Risks in Machine Learning
Unintentional violations
Up to **$2,500 per violation**
Lesson 2568CPRA Amendments and Enforcement
Unique Encryption Keys
Each secret should ideally be encrypted with a unique data encryption key (DEK), not one master key for everything.
Lesson 1317Encryption at Rest for Secret Storage
Unique identifiers
like session IDs, usernames, or hostnames
Lesson 2165Evidence Collection and Screenshots
Unique local administrator passwords
across systems (LAPS on Windows)
Lesson 2159Detection and Defense Against Lateral Movement
Unique per client
Never share the same key across multiple users or applications
Lesson 1009API Key Authentication: Design and Security
Unique per user
no two users should share codes
Lesson 747Recovery and Backup Codes
Unique User ID (UID)
The system assigns the app a unique Linux user ID—different from every other app
Lesson 2713Android Application Sandboxing
Uniqueness metrics
Count how many records have rare combinations of quasi-identifiers
Lesson 2911Measuring and Testing Anonymization Effectiveness
Unit Testing
Write individual tests for each policy rule.
Lesson 3024Policy Testing and Validation
Universal Reference String (URS)
or **Common Reference String (CRS)**—essentially mathematical values that both the prover and verifier need to create and check zero-knowledge proofs.
Lesson 245Trusted Setup and Universal Reference Strings
unkeyed inputs
they don't include them in the cache key but still use them when generating responses.
Lesson 1119Cache Poisoning via HTTP Header InjectionLesson 1121Cache Poisoning Detection Techniques
Unkeyed parameters
Query strings or headers the CDN doesn't include in the cache key
Lesson 1865CDN Cache Security and Cache Poisoning
Unknown file types
that might contain malicious code
Lesson 945File Upload Attack Surface and Risk Assessment
Unknown or missing licenses
Dependencies without clear licenses pose legal risk.
Lesson 1272License Compliance Scanning
Unknown vulnerabilities
– New cryptanalysis techniques emerge regularly
Lesson 207Hash Function Security Margins
Unlawful Processing
Does your processing lack a valid legal basis under GDPR, CCPA, or other frameworks?
Lesson 2890Privacy Risk Identification
Unlike Union-Based injection
(which requires matching column counts and types), error-based attacks work by forcing the database to include sensitive information directly in the error output.
Lesson 567Error-Based SQL Injection Exploitation
Unlimited file sizes
Users upload gigabyte files without restriction
Lesson 1030API4:2023 - Unrestricted Resource Consumption
Unpatched legacy systems
that can't be upgraded without breaking functionality
Lesson 2463What Are Compensating Controls
Unpatched Vulnerabilities
are known security flaws that haven't been fixed on a particular system.
Lesson 1534Exploitation of Software Vulnerabilities
Unprivileged model
Handles untrusted user input, no access to tools/plugins
Lesson 2861Defense Strategies Against Prompt Injection
Unsafe Deserialization
emerges when applications reconstruct objects from untrusted serialized data.
Lesson 2039Common Vulnerability Patterns in Code
Unseen data
Predictions are generally less confident, with higher uncertainty
Lesson 2831Membership Inference Attacks
Unsigned or weakly-signed updates
that bypass integrity checks
Lesson 1463UEFI Firmware Attacks and Vulnerabilities
Unsolicited urgency
"Your account will be locked in 15 minutes unless.
Lesson 2270Detecting and Resisting Manipulation Attempts
Unsupervised Learning
Most cloud ML anomaly detection uses unsupervised learning, meaning it doesn't need labeled "attack" examples—it simply learns what's normal and flags outliers.
Lesson 1899Machine Learning for Cloud Anomaly Detection
Unsure
→ Both SPDX and CycloneDX have strong tooling and growing adoption
Lesson 1277SBOM Formats: SPDX, CycloneDX, and SWID
Untrusted Inputs
Events from external sources (S3 uploads, SQS messages, API Gateway requests) may contain malicious payloads.
Lesson 1943Event-Driven Security Risks
Untrusted to trusted
(user input → application)
Lesson 2645Understanding Trust Boundaries
Unusual activity patterns
Accessing admin pages a user never visits
Lesson 737Session Monitoring and Anomaly Detection
Unusual AssumeRole calls
from unexpected IPs or at odd times
Lesson 1736Best Practices for Temporary Credentials
Unusual authentication patterns
Why is the marketing manager logging into a database server?
Lesson 2159Detection and Defense Against Lateral Movement
Unusual handshake patterns
suggesting man-in-the-middle attacks
Lesson 380TLS/SSL Traffic Analysis and Certificate Inspection
Unusual process names
Programs with cryptomining signatures (e.
Lesson 1893Cryptomining and Resource Abuse Detection
Unusual protocols
Attempts using `file://`, `gopher://`, `dict://` instead of standard `http/https`.
Lesson 900Monitoring and Detection of SSRF Attempts
Unusual query types
(like excessive TXT record requests that can hide encoded commands)
Lesson 379DNS Traffic Analysis and Query Patterns
Unusual traffic patterns
Communication with unexpected regions, connections to known malicious IPs, or data exfiltration attempts (high outbound traffic volumes) become visible.
Lesson 1872VPC Flow Logs and Network Monitoring
Unusual URI patterns
SQL injection attempts, directory traversal (`.
Lesson 2414DNS and HTTP Forensics
Unusual User-Agent strings
(bots masquerading as browsers)
Lesson 1868CDN Monitoring and Incident Response
Unvalidated system calls
like `system()` or `eval()` that accept user input directly can execute arbitrary commands if the input isn't properly sanitized—enabling command injection attacks.
Lesson 1226Understanding Dangerous Functions and Their Risks
Unwrapping
Cloud HSM unwraps and stores your key in its secure boundary
Lesson 1771Bring Your Own Key (BYOK) and Key Import
Update automatically
through OS/browser updates
Lesson 182Trust Anchors and Root Certificate Stores
Update baseline
– After confirmed legitimate changes, regenerate your FIM database
Lesson 1504FIM Alert Analysis and Response
Update clipping and sampling
Limit gradient magnitudes and randomly select participants per round
Lesson 2843Federated Learning Privacy
Update diagrams
to reflect implementation changes
Lesson 79Threat Modeling During Development
Update directory services
like LDAP or public key servers
Lesson 318Key Revocation and Compromise Response
Update documentation
Ensure comments reflect current reality (from lesson 432)
Lesson 435Rule Review and Maintenance
Update frequency
Are threat models reviewed when systems change?
Lesson 84Measuring Threat Modeling Effectiveness
Update Incrementally
If you're several versions behind, update one minor version at a time rather than jumping from 2.
Lesson 1266Dependency Update Strategies and Patching
Update process race conditions
allowing malicious code injection during flashing
Lesson 1463UEFI Firmware Attacks and Vulnerabilities
Update regularly
exploits targeting outdated Tor Browsers appear frequently
Lesson 2991Operational Security for Tor Users
UPDATE statements
modify existing data.
Lesson 571SQL Injection in Different Contexts
Update Strategies
EDR agents require regular updates for detection rules and platform improvements.
Lesson 1583EDR Deployment and Performance Considerations
Update your application configuration
to use the new credentials (stored in your secret store)
Lesson 1347Database Credential Rotation
Upload malicious tools
directly to target systems via `C$` or `ADMIN$`
Lesson 2154SMB and Administrative Shares
Upload validation
checks the file extension and magic bytes
Lesson 975Polyglot Files and Format Confusion
Uploaded separately
(enabling parallel transfers)
Lesson 2971Large File Transfer Security
Upper Layers
Profiles like A2DP (audio) or HID (keyboards)
Lesson 555Bluetooth Architecture and Security Model
Urgency and Fear
Messages create artificial time pressure: "Your account will be suspended in 24 hours!
Lesson 2253Email-Based Phishing Fundamentals
Urgency tactics
Creating artificial time pressure ("Your account shows suspicious activity right now!
Lesson 2259Smishing and Vishing
URI paths
indicating malicious endpoints or exploit delivery
Lesson 2415Network-Based IOC Extraction
URI versioning
`/api/v1/resource` vs `/api/v2/resource`
Lesson 1038API Versioning and Deprecation
URL → Application
Query strings, path parameters
Lesson 1149Trust Boundaries and Data Flow
URL Context
Percent-encode special characters like spaces (`%20`), ampersands (`%26`), and quotes to prevent URL manipulation or injection.
Lesson 668Output Encoding and Escaping FundamentalsLesson 672Template Auto-EscapingLesson 1220Context-Specific Output Encoding
URL Encoding
Transform characters into percent-encoded forms: `%3Cscript%3E` becomes `<script>` when processed by the browser.
Lesson 649Character Encoding BypassesLesson 1142Open Redirect Attack Vectors
URL Encoding (Percent Encoding)
Replace special characters with `%` followed by hexadecimal values:
Lesson 966Encoding and Double-Encoding Bypasses
URL Generation
Applications using the Host header to build absolute URLs for redirects, API endpoints, or scripts can be manipulated to point users elsewhere.
Lesson 1125Host Header Injection VulnerabilitiesLesson 1235Framework-Specific Safe APIs
URL scheme checks
Attempting to open `cydia://` URLs
Lesson 2708iOS Jailbreaking and Detection
URL schemes
One app opens another via registered URLs
Lesson 2703iOS Sandboxing and App Isolation
URLs or command prompts
showing where you are
Lesson 2165Evidence Collection and Screenshots
US State Laws
(like California's CCPA) vary widely but typically require notification "without unreasonable delay" or within specific windows (30-90 days).
Lesson 2429Legal and Regulatory Reporting Requirements
Usage
The caller includes all three values in subsequent AWS API calls
Lesson 1730AWS STS and AssumeRole Mechanics
Usage policies and compliance
You must ensure the SaaS application is used according to your organization's policies and regulatory requirements.
Lesson 1688Shared Responsibility in SaaS
Usage tracking
stores counters per API key: requests made, data transferred, or specific feature calls.
Lesson 1016Quota Management and Tiered Access Control
USB device control
Disable all removable media except specific, registered device IDs.
Lesson 1406Default Deny and Allowlisting
USB drop attack
involves deliberately planting malicious USB devices in physical locations where targets are likely to find and use them.
Lesson 2277USB Drop Attacks and Malicious Devices
Use `.gitignore`
for files containing sensitive configuration
Lesson 2013Secrets in IaC: Detection and Prevention
Use `%n`
to write to that address (overwrite return pointer, function pointer, etc.
Lesson 2111Format String Vulnerabilities
Use `Content-Disposition: attachment`
to force downloads rather than browser rendering
Lesson 963Polyglot Files and Multi-Format Attack Prevention
Use `httpOnly` cookies
for session tokens—JavaScript cannot access them, blocking XSS attacks
Lesson 1080Sensitive Data Handling and Storage Alternatives
Use `Object.create(null)`
for objects that won't need prototype inheritance
Lesson 1051JavaScript Prototype Chain Security
Use `Object.freeze(Object.prototype)`
to prevent modifications (if feasible)
Lesson 1051JavaScript Prototype Chain Security
Use active techniques
only when authorized (penetration testing engagements) or when you need specific technical details passive methods can't provide.
Lesson 337Active vs Passive Reconnaissance
Use adaptive hashing
(bcrypt/Argon2) to slow down cracking regardless of password structure
Lesson 695Password Length vs Complexity Trade-offs
Use aliases for maintainability
Group similar commands or users together:
Lesson 1426Sudo Configuration and Security
Use anchors
specify packet locations rather than searching everywhere
Lesson 459Writing Effective IDS/IPS Rules
Use APIs for automation
Leverage CloudTrail, GuardDuty findings, and flow logs to programmatically identify suspicious resources the moment alerts fire, then trigger automated preservation workflows.
Lesson 1915Evidence Identification and Preservation in Cloud
Use benign payloads
Create a harmless file in `/tmp` rather than encrypting production data
Lesson 2163Proof of Concept Development
Use cases
Cryptocurrency custody, enterprise key management, certificate authorities, and blockchain validators.
Lesson 264Threshold Signatures (TSS)Lesson 421Network-Based vs Host-Based Firewalls
Use cryptographic tools
to bundle this data into a standardized format
Lesson 176Certificate Signing Requests (CSR)
Use ECC
for mobile devices, IoT, or modern applications where performance and efficiency matter
Lesson 151RSA vs Other Asymmetric Algorithms
Use expired certificates
Set your clock backward to a date when a revoked or compromised certificate was still valid
Lesson 188Time Validation and Clock Attacks
Use explicit intents
Specify exact target components rather than relying on implicit resolution
Lesson 2738Input Validation and IPC Security
Use high-quality entropy sources
Draw your seed from hardware RNGs, system entropy pools, or unpredictable timing events— never use predictable values like timestamps alone or sequential counters.
Lesson 298CSPRNG Initialization and Seeding
Use instance profiles/managed identities
instead of embedding credentials
Lesson 1735Credential Theft and Token Security
Use JSON.stringify()
for structured data (but validate the context where it's placed)
Lesson 1222JavaScript Context Encoding Challenges
Use least privilege access
for every transaction
Lesson 2673Zero Trust Principles and Philosophy
Use minimal, well-maintained libraries
Prefer libraries with small dependency trees and active maintenance
Lesson 1945Third-Party Dependencies in Functions
Use native APIs
Cloud provider tools (like AWS EBS snapshots or Azure disk snapshots) create exact copies without modifying the original
Lesson 1916Snapshot and Image AcquisitionLesson 1917Cloud Log Collection for Forensics
Use object property access
instead of evaluating strings
Lesson 1052eval() and Dynamic Code Execution Risks
Use passive first, always
It's safer, legal, and undetectable.
Lesson 337Active vs Passive Reconnaissance
Use passive methods first
Leverage OSINT before touching the network
Lesson 366Stealth Scanning Fundamentals
Use Phase
Application performs the action based on the earlier check (e.
Lesson 902Time-of-Check to Time-of-Use (TOCTOU) Vulnerabilities
Use platform CSPRNGs
rather than implementing your own
Lesson 303Symmetric Key Generation
Use restricted shells
when possible
Lesson 610Safe Command Execution Practices
Use RSA
when compatibility with legacy systems is critical or when you need well-understood, battle-tested cryptography
Lesson 151RSA vs Other Asymmetric Algorithms
Use secure defaults
provided by modern XML libraries
Lesson 618XML Injection Prevention
Use severity tiers clearly
High/Medium/Low with counts.
Lesson 2161Executive Summary Writing
Use shim bootloader
(pre-signed by Microsoft, designed to chain-load custom bootloaders)
Lesson 1462Configuring and Managing Secure Boot
Use specific resource ARNs
instead of wildcards.
Lesson 1951Function Execution Role Design
Use the secrets
(database passwords, API keys, etc.
Lesson 1339Application-Level Secret Retrieval
Use trained auditors
Personnel independent of the area being audited
Lesson 2608Internal Audits and Management Review
Use visual tools
Whiteboards and sticky notes make threat modeling tangible.
Lesson 76Collaborative Threat Modeling Workshops
Use VLAN tagging (802.1Q)
on trunk ports to maintain separation across switches
Lesson 2649VLAN and Subnet Segmentation
Use when
You have a backend server that can securely store client secrets and handle token exchanges (traditional web apps, mobile apps with PKCE).
Lesson 771OIDC Authentication FlowsLesson 2187Kali Installation Options and Live BootLesson 2970File Encryption Standards and Formats
Use-after-free
conditions surface when specific input sequences trigger memory corruption
Lesson 2102Fuzzing for Crash and Memory Bugs
User and role creation
defining who and what can authenticate
Lesson 1690Identity and Access Management Boundaries
User attributes
Properties of the requester (department=Finance, clearance_level=3, employment_status=active)
Lesson 20Attribute-Based Access Control (ABAC)Lesson 799Attribute-Based Access Control (ABAC)
User Authentication
The user logs in and approves your app's access
Lesson 758Authorization Code Flow Deep Dive
User behavior
Is this login time and pattern typical?
Lesson 1747Conditional Access and Context-Aware MFA
User Discovery
Identifying all domain users, their group memberships, and privilege levels.
Lesson 2123Domain Enumeration and Reconnaissance
User experience
Visible slowdowns can lead users to disable protection
Lesson 1569Real-Time Protection and Scanning Strategies
User feedback
Inform the user of the outcome without revealing security details
Lesson 961Virus Scanning and Malware Detection Integration
User identification
in audit logs captures:
Lesson 1495User and Process Activity Tracking
User Interaction (UI)
Must a user do something?
Lesson 2444CVSS v3.1 Base Metrics
User mode
Applications, scripts, and libraries
Lesson 1594Windows Defender Application Control (WDAC)
User namespace
Maps container users to different host users for privilege separation
Lesson 1624Container Isolation Fundamentals
User patterns
Login times, typical data volumes, geographic locations, applications accessed
Lesson 2348Baseline Establishment and Anomaly Detection
User remediation lists
identifying individuals needing additional training
Lesson 2252Social Engineering Reporting and Metrics
User spoofing
happens when attackers steal or guess login credentials, then log in as that person.
Lesson 56Spoofing Identity Threats
User Verification
Both can perform user verification (proving *you're* using the authenticator), but they do it differently.
Lesson 752Platform and Roaming Authenticators
User Visibility
Let users view and manage their active sessions through account settings, similar to how Google or Netflix displays "Where you're signed in.
Lesson 736Concurrent Session Management
User Zone
General employee workstations (10.
Lesson 450Internal Network Zoning
User-Agents
, certificate fingerprints, JA3/JA3S hashes, and other protocol-specific signatures
Lesson 2415Network-Based IOC Extraction
User-Assigned Managed Identities
are standalone resources you create independently.
Lesson 1724Azure Managed Identities Deep Dive
User-friendly
(biometric or PIN unlock)
Lesson 754Passkeys and Cross-Device Authentication
User-generated content
Comments, forum posts, profile descriptions
Lesson 1155Rejecting vs Sanitizing Invalid Input
User-installed software
Shadow IT and personal installations bypass centralized control.
Lesson 2460Third-Party and Application Patching
User-Mode Rootkits
operate at the application layer, using standard APIs and system calls to hide themselves.
Lesson 1546Rootkit Definition and Classification
User/Profile Enrollment
– Only a work profile is managed (BYOD scenarios).
Lesson 2742Mobile Device Management (MDM) Fundamentals
UserInfo Endpoint
A standardized API to retrieve additional user profile information
Lesson 769OpenID Connect Overview and Relationship to OAuth 2.0Lesson 772UserInfo Endpoint and Claims Retrieval
Username Impersonation
In social platforms or internal systems, attackers create accounts that visually mimic administrators or trusted users, enabling social engineering attacks.
Lesson 1168Homograph and Confusable Character Attacks
Username/password
Often combined with certificates for two-factor authentication
Lesson 487OpenVPN Cryptographic Configuration
Username/password authentication
at the connection level (often combined with access control lists on topics)
Lesson 2781MQTT Security Architecture
Users cannot change
security classifications or override policies—even on data they created
Lesson 797Mandatory Access Control (MAC)
Utility Metrics
assess whether anonymized data remains useful:
Lesson 2911Measuring and Testing Anonymization Effectiveness
UTS namespace
Separate hostname and domain name
Lesson 1624Container Isolation Fundamentals
UUIDs
(Universally Unique Identifiers) like `a3f7c892-4b21-4f9a-9e8d-1c2b3a4d5e6f`.
Lesson 815GUID and UUID Vulnerabilities
UUIDs without authorization
Even "random" IDs are vulnerable if not checked
Lesson 813IDOR Fundamentals and Common Patterns

V

Valid forensic timelines
that hold up under scrutiny
Lesson 1473Log Timestamp Synchronization
Valid padding
Server accepts and processes
Lesson 97CBC Padding Oracle Attacks
Validate against an allowlist
of permitted filenames or directories
Lesson 1233File Path and Filesystem API Risks
Validate all data
retrieved from IndexedDB before use (it could be tampered)
Lesson 1075IndexedDB Security Considerations
Validate and sanitize
before any string manipulation
Lesson 1052eval() and Dynamic Code Execution Risks
Validate arguments
Even without a shell, ensure inputs match expected formats
Lesson 1230Safe Command Execution Patterns
Validate certificate usage
– Are clients presenting valid certificates?
Lesson 1780Transit Encryption Monitoring and Compliance
Validate coverage
ensuring no blind spots exist
Lesson 1870Log Sources and Data Ingestion
Validate early
Check input when it crosses trust boundaries
Lesson 1218Input Validation vs Output Encoding Philosophy
Validate emoji sequences
against known safe patterns
Lesson 1173Emoji and Combining Character Attacks
Validate encryption implementations
during testing
Lesson 381Decrypting TLS Traffic with Private Keys
Validate every crossing point
Is authentication required?
Lesson 2639Trust Boundary Analysis
Validate External IDs
Are third-party integrations using proper External IDs to prevent confused deputy attacks?
Lesson 1751Cross-Account and External Access Analysis
Validate inputs
Use allowlists (permitted patterns), check data types, enforce length limits, and reject unexpected characters
Lesson 1039Input Validation and Output Encoding
Validate intent extras
Treat all data received via IPC as untrusted input
Lesson 2738Input Validation and IPC Security
Validate issuer
(ensure token came from your auth server)
Lesson 1010Bearer Token Authentication for APIs
Validate JSON schemas
before parsing untrusted data
Lesson 1051JavaScript Prototype Chain Security
Validate origins
on every `postMessage` exchange
Lesson 1093Cross-Origin Authentication and iframe Security
Validate property names
before assignment—block `__proto__`, `constructor`, and `prototype`
Lesson 1051JavaScript Prototype Chain Security
Validate provenance
information (SLSA attestations, build metadata)
Lesson 1301Automated Package Verification Workflows
Validate push authority
Only accept pushed resources from origins that are authoritative for them
Lesson 1100HTTP/2 Server Push Security Risks
Validate second
Check if the canonical path starts with your allowed directory
Lesson 971Path Canonicalization and Validation
Validate security controls
(authentication, authorization, encryption)
Lesson 2037Security-Focused Code Review FundamentalsLesson 2080What is Penetration Testing?
Validate that resolved IP
against your whitelist/blacklist
Lesson 897DNS Rebinding and TOCTOU Protections
Validate the command itself
Only allow execution of known, approved programs
Lesson 1230Safe Command Execution Patterns
Validate the entire path
(signatures, validity periods, constraints)
Lesson 183Path Building and Discovery
Validating after transformations
Checking input, then converting encoding/format afterward
Lesson 1157Common Input Validation Pitfalls
Validating against requirements
confirming each security user story and requirement has architectural coverage
Lesson 2036Security Architecture Review
Validating Webhooks
are HTTP callbacks that examine incoming requests and say "yes" or "no.
Lesson 1670Admission Controllers and Webhooks
ValidatingWebhooks
check if requests meet your security policies.
Lesson 1973Kubernetes Admission Controllers
Validation
Verify the returned `state` matches what you stored—if not, reject the request
Lesson 763State Parameter and CSRF ProtectionLesson 3046Auto-Remediation for Infrastructure Drift
Validation checks
"This SQL query only executes when input was sanitized three lines earlier"
Lesson 1361Control Flow Analysis and Path Sensitivity
Validation data
– Certificate chains and revocation information frozen at signing time
Lesson 231Document Signing and PDF Signatures
Validation Details
Overly specific validation errors ("creditCardNumber must be 16 digits") help attackers understand your data model and craft valid-looking payloads.
Lesson 1007GraphQL Error Handling and Information Leakage
Validation layer checks
"Does this end with .
Lesson 967Null Byte Injection in Filenames
Validation passes
The app thinks it's safe to fetch from this domain
Lesson 890DNS Rebinding Attacks
Validation results
(passed/failed checks, which checks)
Lesson 989Upload Monitoring and Incident Response
Validity Period
Two timestamps—"Not Before" and "Not After"—defining when the certificate is valid
Lesson 171X.509 Certificate Structure and FormatLesson 188Time Validation and Clock AttacksLesson 190Certificate Revocation Fundamentals
Valuation
assigns each asset a business-critical value.
Lesson 2501Asset Identification and Valuation
Value shifts
What's worth stealing changes (credit cards → personal data → cryptocurrency)
Lesson 33Threat Landscape Evolution and Adaptive Security
Variable Expansion
Break up blocked words using shell variables:
Lesson 608Filter Bypass and Obfuscation
Variable-length data
When you don't want to deal with padding overhead
Lesson 121Stream Ciphers vs Block Ciphers: When to Use Each
Variables
rendered in HTML context get HTML-entity-encoded (`<` becomes `&lt;`)
Lesson 1247Auto-Escaping Mechanisms and Configuration
Variance
Add/subtract random amounts to numeric values
Lesson 2908Data Masking and Tokenization
Various formats
plaintext, base64-encoded, encrypted differently per system
Lesson 1315Secret Sprawl and Discovery Challenges
Vault
, Sentinel policies control:
Lesson 3022HashiCorp Sentinel
Vault token
that carries policies defining what secrets that identity can access—pure least privilege.
Lesson 1326HashiCorp Vault Architecture
Velocity attacks
Abnormally rapid requests suggesting automation
Lesson 737Session Monitoring and Anomaly Detection
Vendor Advisories
Microsoft, Red Hat, Cisco, and others publish their own security bulletins, often cross-referenced with CVE IDs and including vendor-specific patch information.
Lesson 1613Vulnerability Database and CVE MappingLesson 2441False Positives and Validation
Vendor and freeze
Copy the code into your codebase for isolated maintenance (understand licensing first)
Lesson 1267Unmaintained Dependencies and End-of-Life Libraries
Vendor bulletins
– synchronized security advisories
Lesson 2476CVE Assignment and Public Disclosure
Vendor contracts
with processor agreements
Lesson 2561Accountability and Records of Processing
Vendor delays
in releasing patches
Lesson 2463What Are Compensating Controls
Vendor fingerprinting
Identifying hardware inconsistent with your deployment
Lesson 549Rogue AP Detection Techniques
Vendor Risk Assessment Process
(from your previous lesson) to determine appropriate diligence depth.
Lesson 2536Due Diligence and Vendor SelectionLesson 2539Continuous Vendor Monitoring
Vendor transparency requirements
Contractually require vendors to disclose critical subcontractors and dependencies
Lesson 2540Fourth-Party and Supply Chain Risk
Vendor Verification
"I'm from your payroll provider updating direct deposit info"
Lesson 2263Pretexting Fundamentals and Attack Scenarios
Vendors and Third Parties
Posing as contractors, delivery personnel, or service providers allows physical and digital access.
Lesson 2265Authority and Impersonation Techniques
Verb Confusion
happens when the server accepts multiple methods for the same endpoint but handles them inconsistently.
Lesson 996HTTP Method Tampering and Verb Confusion
Verification difficulty
– Complicated logic is harder to audit and test thoroughly
Lesson 2667Economy of Mechanism
Verified individually
(allowing granular error detection)
Lesson 2971Large File Transfer Security
Verifier
Randomly challenges you: "Show me C is isomorphic to either A *or* B.
Lesson 243The Graph Isomorphism ExampleLesson 2926Zero-Knowledge Proofs for Privacy
Verifies device security posture
alongside user identity
Lesson 2686BeyondCorp Model and Zero Trust Access
Verifies license compliance
against your policy
Lesson 1399Dependency and SCA Scanning in Pipelines
Verify before loading
Check the signature matches using the public key
Lesson 2874Model Artifact Security and Signing
Verify checksums
match expected hashes from lock files or registries
Lesson 1301Automated Package Verification Workflows
Verify completeness
Scan for identifiers hidden in free-text fields, comments, or composite fields
Lesson 2903Direct Identifiers and Removal
Verify expected denials
– confirm that unauthorized access fails with 401/403
Lesson 1026Authorization Testing Automation
Verify explicitly
using all available data (identity, device health, location, behavior)
Lesson 2673Zero Trust Principles and Philosophy
Verify integrity
Calculate and document cryptographic hashes of snapshot metadata
Lesson 1916Snapshot and Image Acquisition
Verify layer integrity
by pinning functions to specific layer versions (not "latest").
Lesson 1957Function Layer Security
Verify necessity
Confirm each rule still serves a valid business need
Lesson 435Rule Review and Maintenance
Verify ownership or permission
(does this user have rights to this object?
Lesson 821Preventing IDOR with Access Control Checks
Verify port availability
Ensure local ports aren't already bound
Lesson 506SSH Tunnel Persistence and Troubleshooting
Verify proper denial
– User B should be blocked
Lesson 834Testing Multi-User Scenarios
Verify provenance
Only download models from trusted, verified sources with reputation systems
Lesson 2877Malicious Pre-trained Models
Verify scope
Ensure similar vulnerabilities elsewhere were also addressed
Lesson 2166Retest and Validation Process
Verify secret propagation
to all consuming applications
Lesson 1349Rotation Testing and Rollback
Verify security controls
like certificate pinning or root detection mechanisms
Lesson 2722Introduction to Mobile App Reverse Engineering
Verify security posture
matches requirements
Lesson 2020Testing and Validation of IaC Security Controls
Verify signature
(proves token wasn't tampered with)
Lesson 1010Bearer Token Authentication for APIs
Verify threat model assumptions
from the design phase
Lesson 2037Security-Focused Code Review Fundamentals
Verifying
Anyone with the sender's **public key** can verify the signature is authentic
Lesson 147RSA Signature Generation and Verification
Verifying provenance
Admission controllers check that deployed images include valid SLSA provenance before allowing them to run
Lesson 1650Supply Chain Levels for Software Artifacts (SLSA)
Version 1 UUIDs
Contain timestamps and MAC addresses—partially predictable and can leak server information
Lesson 815GUID and UUID Vulnerabilities
Version checking
Prevent rollback attacks by refusing older, vulnerable versions
Lesson 2764Firmware Update Mechanisms and Validation
Version control exposure
Even if you remove a secret from current code, it remains in Git history forever.
Lesson 1314Separation of Secrets from Code and Config
Version control integration
Store threat models (DFDs, STRIDE analyses, attack trees) in your repository alongside architecture diagrams.
Lesson 2644Iterating Threat Models with Architecture Changes
Version cross-reference
Verify if backported patches exist (common in RHEL/Ubuntu)
Lesson 2441False Positives and Validation
Version information
Specific software versions that may have known CVEs
Lesson 2099Reconnaissance for Vulnerability Discovery
Version Matching
You cross-reference your fingerprinted version against vulnerability databases.
Lesson 365Combining Fingerprinting with Vulnerability Research
Version pinning
locks to an exact version: `requests==2.
Lesson 1261Dependency Versioning and Semantic Versioning
Version pinning policies
to balance stability with security
Lesson 1399Dependency and SCA Scanning in Pipelines
Version ranges
allow flexibility: `requests>=2.
Lesson 1261Dependency Versioning and Semantic Versioning
Version Registry
Every trained model gets a unique version ID, along with metadata: training dataset hash, hyperparameters, training duration, accuracy metrics, and who initiated the training.
Lesson 2878ML Pipeline Security and Governance
Version string matching
A system may report Apache 2.
Lesson 2441False Positives and Validation
Version tracking
Tag encrypted data with key identifiers so you know which key to use for decryption
Lesson 315Key Rotation StrategiesLesson 1283Continuous SBOM Generation in CI/CDLesson 1346Zero-Downtime Rotation Patterns
Version updates
Can also keep non-vulnerable dependencies fresh by creating PRs for new releases
Lesson 1303GitHub Dependency Scanning and Dependabot
Versioning strategies
become essential.
Lesson 3025Policy Governance and Distribution
Versions
Exact version numbers are critical.
Lesson 1279SBOM Contents and Metadata Quality
Vetted Parsing Libraries
do the heavy lifting.
Lesson 981Safe File Processing Practices
Vetting Process
Before integration, audit the library's permissions, network behavior, and data collection practices.
Lesson 2740Third-Party SDK and Library Security
Victim clicks
the seemingly legitimate link (email came from the real company!
Lesson 1126Password Reset Poisoning
Victim clicks the link
(often via phishing or social engineering)
Lesson 630Reflected XSS: Immediate Execution
Victim connects
to what they think is `bank.
Lesson 397SSL/TLS MITM with Certificate Substitution
Victim is authenticated
– Browser holds valid session cookie for `bank.
Lesson 847CSRF Attack Anatomy and Prerequisites
Victim logs in
using the attacker-controlled session ID
Lesson 714Session Fixation Attacks
Victim receives email
with link: `https://evil.
Lesson 1126Password Reset Poisoning
Victim requests
a website (often by typing `bank.
Lesson 395SSL Stripping Attacks
Victim visits attacker's page
– Perhaps via phishing link or compromised site
Lesson 847CSRF Attack Anatomy and Prerequisites
Victims view the page
When anyone loads the comment section, the server retrieves and displays the stored content.
Lesson 631Stored XSS: Persistent Attacks
Video call
Show the numbers on screen
Lesson 2945Identity Verification in E2EE
Viewing angles
The perturbation must work from multiple perspectives
Lesson 2814Physical World Adversarial Examples
Violation actions
Configure what happens when unauthorized MACs appear:
Lesson 414Port Security and MAC Filtering
Virtual Firewalls
run as software instances within hypervisors or cloud platforms.
Lesson 426Virtual Firewalls and Cloud Architectures
Virtual Machine Memory (VMEM/VMSN)
Hypervisors like VMware and Hyper-V save memory in proprietary formats.
Lesson 2391Memory Image Formats and Validation
Virtual machines
resuming from snapshots may have stale timestamps
Lesson 188Time Validation and Clock AttacksLesson 1625Container vs VM Security Model
Virtual Machines (VMs)
form your foundation.
Lesson 2086Setting Up a Testing Environment
Virtual patching
means placing security controls *in front* of vulnerable systems to block exploitation attempts without modifying the vulnerable application itself.
Lesson 2462Virtual Patching and Temporary Mitigations
Virtual Private Clouds
create network-level isolation.
Lesson 1811Multi-Tenancy and Network Isolation Models
Virtual Private Gateway (VGW)
The cloud-managed VPN endpoint attached to your VPC.
Lesson 1840VPN Connections to Cloud
Virtual Private Network (VPN)
creates an encrypted "tunnel" through a public or untrusted network (like the Internet), allowing you to communicate securely as if you were on a private network.
Lesson 466VPN Fundamentals and Purpose
VirtualBox
or **VMware** gives you isolation, snapshots, and the ability to test dangerous exploits safely.
Lesson 2187Kali Installation Options and Live Boot
Virus
Attaches to legitimate files, requires user action to execute
Lesson 1518Malware Taxonomy and Classification Criteria
Virus/malware scanning
using integrated antivirus engines
Lesson 982Multi-Layer File Upload Validation Strategy
Vishing (Voice Phishing)
Impersonating bank representatives or IT support with synthesized voices
Lesson 2865Audio Deepfakes and Voice Cloning Attacks
visibility
into who actually has access from outside your organization is another.
Lesson 1751Cross-Account and External Access AnalysisLesson 2064Security Sign-Off and Approval Workflows
Visibility and Transparency
Open and verifiable operations
Lesson 2879Introduction to Privacy by Design
Visibility blind spots
No unified view of your attack surface
Lesson 2743Enterprise Mobility Management (EMM) and UEM
Visibility Controls
involve setting devices to "non-discoverable" mode after initial pairing.
Lesson 560Bluetooth Security Best Practices
Visibility phase
Monitor-only mode, collecting flow data
Lesson 2688Microsegmentation Implementation Strategies
Visitor controls
Sign-in logs, badges, and escorts
Lesson 2585HIPAA Security Rule: Physical Safeguards
Visual confusion
Emoji sequences can hide malicious intent.
Lesson 1173Emoji and Combining Character Attacks
Visual defacement
Use CSS or positioned elements to alter what users see, tricking them into unintended actions.
Lesson 676HTML Injection and Context Confusion
Visual reconnaissance
maps the physical security environment—identifying CCTV blind spots, documenting badge reader types, noting where employees congregate, and understanding traffic flow patterns.
Lesson 2276Shoulder Surfing and Visual Reconnaissance
Visualize
the topology in diagram format
Lesson 356Automated Network Mapping Tools
Vital Interests
Processing is necessary to protect someone's life (rare; used in emergencies).
Lesson 2931Legal Bases for Data Processing
VLAN
(Virtual Local Area Network) is like creating invisible walls inside a physical switch.
Lesson 448VLANs for Layer 2 SegmentationLesson 545Enterprise Wi-Fi Deployment Architecture
VLAN fingerprinting
is trickier since VLANs operate at Layer 2.
Lesson 352Subnet and VLAN Discovery
VLAN hopping attacks
Attackers exploit misconfigured trunk ports to jump between VLANs.
Lesson 2649VLAN and Subnet Segmentation
VM attack surface
Compromising the hypervisor (smaller codebase, less exposed) or VM escape vulnerabilities (rare but critical).
Lesson 1625Container vs VM Security Model
VM escape vulnerabilities
Breaking out of guest OS to hypervisor layer
Lesson 1923Cloud VM Threat Model and Attack Surface
VMware
gives you isolation, snapshots, and the ability to test dangerous exploits safely.
Lesson 2187Kali Installation Options and Live Boot
Voice cloning
uses similar architectures trained on speech patterns, prosody, and phonetics—requiring only seconds of target audio in modern systems.
Lesson 2864Deepfakes: Generation Techniques and Detection Challenges
Voice Conversion
transforms one person's speech into another's voice while preserving linguistic content.
Lesson 2865Audio Deepfakes and Voice Cloning Attacks
Volatility
, **Rekall**, or **Magnet RAM Capture** reconstruct the true system state by parsing raw memory structures independently of the OS's APIs—APIs the rootkit has compromised.
Lesson 1559Memory Analysis and Volatile ForensicsLesson 1564Rootkit Detection Tools and FrameworksLesson 2387Mobile and Endpoint Evidence CollectionLesson 2395Credential and Secret Extraction
Volume Analysis
Message sizes leak information.
Lesson 2976Traffic Analysis and Correlation Attacks
Volume anomalies
Sudden spikes or unusual data sizes
Lesson 382Identifying Malicious Traffic Patterns
Volume Mount Attacks
Mounting sensitive host directories (like `/var/run/docker.
Lesson 1626Container Escape Vulnerabilities
Volume mounts
with restrictive permissions (read-only, specific paths)
Lesson 1972Secrets Management in Kubernetes
Volumetric Attack Absorption
CDN edge nodes have massive bandwidth capacity spread across numerous geographic points of presence (PoPs).
Lesson 1863CDN DDoS Protection and Rate Limiting
Voting/rating systems
Automated scripts manipulating reputation scores
Lesson 1032API6:2023 - Unrestricted Access to Sensitive Business Flows
VPC
and **VPN/Direct Connect** is a spoke
Lesson 1838Transit Gateway Architecture
VPC connectivity monitoring
gives you the security cameras and access logs for your network traffic.
Lesson 1843VPC Connectivity Monitoring
VPC-wide
Monitor all network interfaces in the entire VPC
Lesson 1872VPC Flow Logs and Network Monitoring
VPN gateway
at the corporate perimeter
Lesson 467Remote Access VPNs
VPN gateway devices
(usually firewalls or dedicated VPN appliances) at each location handle all encryption and routing automatically.
Lesson 468Site-to-Site VPNs
VPN Tunnels
For redundancy, cloud providers typically create two encrypted tunnels (using IPsec protocol) connecting your gateway to different availability zones.
Lesson 1840VPN Connections to CloudLesson 2787BACnet and Modbus Protocol Security
VPNs
create an encrypted tunnel to a single server.
Lesson 2982Introduction to Anonymity Networks
VSS variants
add a crucial feature: participants can verify their shares are legitimate *without* reconstructing the secret.
Lesson 324Alternative Secret Sharing Schemes
Vulnerabilities
are the weaknesses or gaps that make your assets susceptible to threats.
Lesson 2498Risk Components: Assets, Threats, and Vulnerabilities
Vulnerabilities baked into architecture
Trust boundaries ignored, attack surfaces left wide open
Lesson 12Security as a Non-Functional Requirement
Vulnerability assessment and prioritization
is the systematic process of identifying, evaluating, and ranking security weaknesses to determine remediation order.
Lesson 1602Vulnerability Assessment and Prioritization
Vulnerability correlation
Security teams can match CVEs to the exact components shipped in production
Lesson 1283Continuous SBOM Generation in CI/CD
Vulnerability counts
Allow zero new highs, maximum 5 mediums
Lesson 3027SAST Integration in Pipelines
Vulnerability Detection
SCC integrates with several built-in detectors:
Lesson 1889GCP Security Command Center
Vulnerability Disclosure Policy
(VDP) is an organization's public document that explains *how* security researchers should report vulnerabilities, *what* systems are in scope, and *what protections* researchers receive.
Lesson 2073Vulnerability Disclosure Policies
Vulnerability Disclosure Policy (VDP)
is a public document that welcomes external security researchers to report vulnerabilities in your systems.
Lesson 2471Vulnerability Disclosure Policy (VDP) Fundamentals
Vulnerability ease of exploitation
– Is it trivial or highly complex?
Lesson 2499Likelihood and Impact Determination
Vulnerability exploitation
beta distribution (historically 30–70% success rate)
Lesson 2513Monte Carlo Simulation for Risk Analysis
Vulnerability management
Scanning and remediation of your VMs
Lesson 1677IaaS Security ResponsibilitiesLesson 2489Acceptable Use Policy (AUP)
Vulnerability matching
Compares your components against vulnerability databases (CVE, NVD, security advisories)
Lesson 1268Introduction to Software Composition Analysis (SCA)Lesson 2434Vulnerability Scanning FundamentalsLesson 3012Container and Image Scanning
Vulnerability patterns
as they occur in real execution
Lesson 1378IAST Fundamentals and How It Works
Vulnerability Scanner Integration
Import scan results to correlate known vulnerabilities with active exploitation attempts.
Lesson 1884SIEM Integration with Cloud Security Tools
Vulnerability scanners
(risk scores, remediation status)
Lesson 3043Dashboard Tools and Integration
Vulnerability scans
can detect deviations (configuration drift)
Lesson 1618Configuration Baselines and Hardening Standards
Vulnerability severity
How exploitable is the weakness?
Lesson 2497Risk Assessment Overview and Objectives
Vulnerability Thresholds
let you balance security with development velocity.
Lesson 1308Integrating Scanning into CI/CD Pipelines
Vulnerability tracking is priority
→ CycloneDX
Lesson 1277SBOM Formats: SPDX, CycloneDX, and SWID
Vulnerability types
Always fail on SQL injection or RCE flaws, regardless of severity
Lesson 3033Pipeline Security Gates and Policies
Vulnerable code
accepts user input without bounds checking (e.
Lesson 2108Memory Corruption Exploits: Buffer Overflows
Vulnerable dependencies
Outdated libraries with known exploits
Lesson 2694App-Level ThreatsLesson 3012Container and Image Scanning
Vulnerable legitimate binaries
Tools like old versions of `nmap`, `vim`, or `find` with SUID set can escape to a shell with elevated privileges.
Lesson 2141SUID/SGID Binary Exploitation
Vulnerable packages
in base images (outdated `openssl`, `curl`, etc.
Lesson 1400Container and Image Scanning
Vulnerable signed drivers
that are legitimate but contain exploitable flaws (common in hardware drivers, anti-cheat software, or legacy utilities)
Lesson 2137Kernel Exploits and Driver Vulnerabilities
Vulnerable Targets
give you practice material.
Lesson 2086Setting Up a Testing Environment
Vulnerable to XSS
any malicious script can read `localStorage.
Lesson 1090Token Storage in SPAs: Security Trade-offs

W

WAF Bypass
A WAF might block requests containing `/admin` paths or SQL injection payloads.
Lesson 1110Bypassing Security Controls via Smuggling
WAF rule activation
Deploy pre-tested aggressive filtering rules from lesson 1854
Lesson 1861DDoS Response and Incident Management
Wait for victims
All subsequent users requesting that URL receive the poisoned content
Lesson 1116Cache Poisoning Attack Fundamentals
Walking through abuse cases
showing how your design prevents or detects the misuse cases you identified
Lesson 2036Security Architecture Review
WannaCry (2017)
Global ransomware outbreak exploiting EternalBlue (SMBv1 vulnerability)—Microsoft had patched it two months prior
Lesson 1599The Critical Role of Patch Management
Warm handoffs
Brief overlap period where both shifts are present (typically 15-30 minutes)
Lesson 230924/7 Operations and Shift Management
Warm start
The platform reuses an existing execution context.
Lesson 1942Function Execution Context and Isolation
Water treatment facilities
Multiple incidents involving unauthorized chemical dosing changes
Lesson 2805OT-Specific Threats and Attacks
Watermarking and fingerprinting
are ownership-proving techniques that survive extraction and copying.
Lesson 2835Watermarking and Model Fingerprinting
Weak algorithms
Avoid MD5, SHA-1, DES—use AES-256, SHA-256+
Lesson 2735Mobile Cryptography Best Practices
Weak authentication
extends beyond defaults: short password limits, no complexity requirements, lack of account lockout, and exposed management interfaces amplify the risk.
Lesson 2800Default Credentials and Weak Authentication
Weak condition logic
Conditions that don't properly restrict source accounts or IP ranges
Lesson 1744Common Cross-Account Misconfigurations
Weak crypto implementations
in computation sequences
Lesson 2729Native Code Analysis and ARM Assembly
Weak entropy
Most user passwords are predictable and short, making them vulnerable to brute-force attacks.
Lesson 137Key Derivation Functions (KDFs) Overview
Weak IV Identification
Some IVs leak information about the key
Lesson 523WEP Attacks and Exploitation
Weak or absent authentication
on interfaces
Lesson 2751Common IoT Vulnerabilities and Weaknesses
Weak origin validation
Checking if origin *contains* "trusted.
Lesson 874CORS Fundamentals and Same-Origin Policy Relaxation
Weak Password Policy
allows simple passwords
Lesson 2106Chaining Vulnerabilities for Impact
Weak passwords
Still shockingly common, easily brute-forced
Lesson 1696Identity as Attack Surface
Weak Permissions
Overly permissive file system rights (`chmod 777`), cloud storage buckets set to public read, or IAM roles with `*:*` permissions allow lateral movement and privilege escalation.
Lesson 2115Exploitation via Misconfiguration
Weak Random Generation
Some implementations use predictable pseudo-random generators
Lesson 815GUID and UUID Vulnerabilities
Weak random number generation
Using predictable nonces in ECDSA (as you learned in lesson 164)
Lesson 168ECC Implementation Vulnerabilities
Weak session management
Token theft and session hijacking
Lesson 2694App-Level Threats
Weak Token Generation
APIs that create predictable tokens (like sequential numbers or timestamps) allow attackers to guess valid credentials.
Lesson 1028API2:2023 - Broken Authentication
Weak typing
Languages like JavaScript and PHP don't enforce strict types
Lesson 596JSON Injection and Type Confusion
Weakened sandboxing
Apps can escape their containers
Lesson 2708iOS Jailbreaking and Detection
Weaker authentication
mechanisms (maybe v1 used basic auth while v2 requires OAuth)
Lesson 998API Versioning and Legacy Endpoint Vulnerabilities
Weaker passwords
Tired of memorizing new credentials, users choose simpler passwords
Lesson 702Password Expiration and Rotation Policies
Weaker security controls
than large enterprises
Lesson 2534Third-Party Risk Fundamentals
Weaponization/Delivery
Can email filters or web proxies block malicious payloads?
Lesson 74Kill Chain Threat Modeling
Web Application Firewall (WAF)
with SQL injection detection rules
Lesson 2463What Are Compensating Controls
Web Application Firewalls
(WAFs) that detect and block common injection patterns.
Lesson 590SQLMap Evasion and Tampering Scripts
Web Application Firewalls (WAFs)
can block HTTP/HTTPS attacks targeting known vulnerabilities.
Lesson 2462Virtual Patching and Temporary MitigationsLesson 2466Network-Based Compensating Controls
Web Browsers: `crypto.getRandomValues()`
Lesson 301Platform-Specific CSPRNG APIs
Web form input
crosses from untrusted user control into your application's trusted processing logic
Lesson 2639Trust Boundary Analysis
Web Security Scanner
probes App Engine, Compute Engine, and GKE applications for common vulnerabilities (XSS, SQL injection, outdated libraries)
Lesson 1889GCP Security Command Center
Web server
serves the file based on MIME type or extension
Lesson 975Polyglot Files and Format Confusion
Web Templates
Pre-built clones of popular services (Gmail, Facebook, Twitter) ready for immediate deployment without manual configuration.
Lesson 2246Credential Harvester and Attack Vectors
Web Workers
are dedicated to a single page, while **Shared Workers** can be accessed by multiple pages from the same origin.
Lesson 1085Web Workers and Shared Workers Security
WebAuthn API
(a browser standard) and the **CTAP protocol** (how authenticators communicate with devices).
Lesson 745FIDO2 and WebAuthnLesson 751WebAuthn and FIDO2 Protocol
WebAuthn/FIDO2
Cryptographic keys stored on security keys or devices
Lesson 750Passwordless Authentication Fundamentals
WebCrypto API
to encrypt sensitive data
Lesson 1078Client-Side Encryption for Storage
Website defacement
(replacing homepage content with their message)
Lesson 50Motivations: Hacktivism and Ideological Attacks
Weekend or holiday periods
with reduced staff and traffic
Lesson 2095Testing Windows and Schedules
What actions
they can perform (encrypt, decrypt, manage)
Lesson 1769Encryption Key Policies and Access Control
What assets
are protected (data, systems, intellectual property)
Lesson 2487Purpose and Scope of Information Security Policy
What context was missing
that would have made triage faster?
Lesson 2352Tuning Feedback Loops
What could improve
Identify concrete, actionable changes
Lesson 2070Security Retrospectives and Continuous Improvement
What data
you collect (names, emails, purchase history)
Lesson 2561Accountability and Records of Processing
What does compliance require
(Specific controls, audit trails, data residency)
Lesson 1683Service Model Selection for Security Requirements
What it does
Scans IP ranges and displays discovered devices with MAC addresses and vendors in real-time.
Lesson 356Automated Network Mapping Tools
What matters most
Speed and simplicity?
Lesson 75Comparing Threat Modeling Methodologies
What must we control
(encryption keys, network topology, OS hardening)
Lesson 1683Service Model Selection for Security Requirements
What protocols and ports
are permitted (TCP port 443, for example)
Lesson 1660Network Policies and Segmentation
What services are running
(by analyzing response behaviors)
Lesson 641Port Scanning and Network Reconnaissance
What stages to capture
RequestReceived, ResponseStarted, ResponseComplete, Panic
Lesson 1675Kubernetes Audit Logging and Forensics
What standards apply
(industry frameworks, regulatory requirements)
Lesson 2487Purpose and Scope of Information Security Policy
What to capture
Full payload capture provides maximum forensic value but may face legal/privacy constraints.
Lesson 2409Packet Capture for Forensics
What to log
All requests, only metadata, or full request/response bodies
Lesson 1675Kubernetes Audit Logging and Forensics
What triggered it
(specific behavior, signature, or anomaly)
Lesson 1578EDR Alert Triage and Investigation
What triggered the rule
Examine the raw logs and correlation logic.
Lesson 2345False Positive Identification and Analysis
What worked well
Celebrate effective controls that limited damage
Lesson 2070Security Retrospectives and Continuous Improvement
What's our acceptable risk
(Provider breaches, supply chain attacks)
Lesson 1683Service Model Selection for Security Requirements
What's your exposure
Internet-facing systems need faster patching than internal tools.
Lesson 1265Evaluating Vulnerability Severity and Exploitability
When did it occur
(timestamp, frequency)
Lesson 1578EDR Alert Triage and Investigation
When new threat intelligence
emerges (zero-day vulnerabilities, new attacker techniques)
Lesson 82Threat Model Reviews and Updates
When to use
Small environments (≤5 VPCs) needing lowest latency.
Lesson 1844Connectivity Architecture Best Practices
When to use it
Black-box tests simulate real-world external threats and test your detection and response capabilities.
Lesson 2081Types of Penetration TestsLesson 2366Containment Strategies: Short-Term vs Long- Term
WHERE Clauses
These filter results based on conditions.
Lesson 564SQL Query Structure and Injection Points
Where security boundaries exist
Lesson 352Subnet and VLAN Discovery
Where to capture
Deploy sensors at key network chokepoints—perimeter firewalls, datacenter egress points, DMZ boundaries, and critical server VLANs.
Lesson 2409Packet Capture for Forensics
Where you've seen it
CTR mode and ChaCha20 both require nonces.
Lesson 131Nonces vs IVs: Definitions and Differences
Which categories
of personal information will be collected
Lesson 2564Personal Information Categories and Collection
Which certificates to pin
(leaf certificate, intermediate, or public key)
Lesson 2719Android Certificate Pinning and Network Security
Which environments
are covered (on-premise, cloud, remote work)
Lesson 2487Purpose and Scope of Information Security Policy
Which hosts are alive
(by attempting connections)
Lesson 641Port Scanning and Network Reconnaissance
Which permissions
a role or service account has
Lesson 1750Last Access Analysis and Permission Rightsizing
Which pods
can talk to each other (using labels like `app=frontend`)
Lesson 1660Network Policies and Segmentation
Which ports are open
(based on how quickly requests fail or succeed)
Lesson 641Port Scanning and Network Reconnaissance
Which resources matter
You might log all Secret access verbosely but ignore routine health checks
Lesson 1675Kubernetes Audit Logging and Forensics
Which websites you're visiting
(even if the actual traffic is encrypted)
Lesson 508DNS Leak Prevention
White-box access
means the attacker has complete knowledge: the model architecture, all trained weights, training data, and internal operations.
Lesson 2809Threat Model for Adversarial Attacks
White-box attacks
When attackers know the detector's architecture, they apply gradient-based methods (like FGSM or C&W) to minimize detection confidence while preserving visual quality.
Lesson 2870Adversarial Robustness of Deepfake Detectors
White-box testing
(also called clear-box or transparent testing) provides the tester with complete internal knowledge: source code, architecture diagrams, credentials, network maps, and system documentation.
Lesson 2081Types of Penetration TestsLesson 2779Hardware Security Testing and Evaluation
Whitelist acceptable inputs
rigorously
Lesson 610Safe Command Execution Practices
Whitelist allowed classes
explicitly—reject anything not on your approved list
Lesson 1232Safe Serialization Alternatives
Whitelist Legitimate Activity
Exclude known-good patterns.
Lesson 1885SIEM Performance Tuning and False Positives
Whitelist-based filtering
You enumerate *only* the traffic you trust:
Lesson 428Default Deny Principle
Whitelisting known-good behavior
(DevOps automation accounts, scheduled tasks)
Lesson 1895Custom Detection Rules and Tuning
Whitelists/blacklists
(exclude known-good sources)
Lesson 2318Correlation Rules and Detection Logic
Who must comply
(employees, contractors, third parties)
Lesson 2487Purpose and Scope of Information Security Policy
Who needs what
(action items with owners)
Lesson 2427Incident Status Updates and Escalation
Who/what is involved
(user, hostname, process)
Lesson 1578EDR Alert Triage and Investigation
WHOIS
is a protocol and database system that lets you query who registered a domain, when, through which registrar, and what nameservers handle its DNS.
Lesson 329WHOIS and Domain Registration Intelligence
Why decompose
Because threats hide in complexity.
Lesson 43DFD Levels and Decomposition
Why did it happen
Root cause analysis—not just technical, but process gaps
Lesson 2070Security Retrospectives and Continuous Improvement
Why Empire Matters
After gaining initial access, you need to maintain control, explore the network, and establish persistence.
Lesson 2218PowerShell Empire Framework
Why hash first
RSA can only handle data smaller than its key size.
Lesson 147RSA Signature Generation and Verification
Why it works
A polynomial of degree t-1 is uniquely defined by any t points.
Lesson 322Shamir's Secret Sharing Scheme
Why it's dangerous
Remember the default deny principle?
Lesson 433Common Rule Antipatterns
Why this matters
Without the `Secure` flag, your session cookie can be transmitted in plaintext if a user accidentally visits `http://yoursite.
Lesson 723Secure and HttpOnly FlagsLesson 1500File Integrity Monitoring Fundamentals
Why use these
Some older firewalls and intrusion detection systems only watch for SYN packets, letting these alternative flag patterns slip through unnoticed.
Lesson 343Advanced Nmap Scan Types
Wider blast radius
The longer a secret lives, the more systems, logs, and people it touches, increasing exposure points
Lesson 1343Secret Rotation Fundamentals
Wider impact
Affects all users who view the compromised content, not just one target.
Lesson 631Stored XSS: Persistent Attacks
Widespread
Found in most APIs during security testing
Lesson 1027API1:2023 - Broken Object Level Authorization (BOLA)
Widespread adoption
Used in Bitcoin, TLS certificates, SSH keys, and OAuth tokens
Lesson 227ECDSA: Elliptic Curve Digital Signature Algorithm
Wildcard principals
in bucket policies (`"Principal": "*"`) without restrictive conditions
Lesson 1783Blocking Public Access and Bucket Misconfiguration
Wildcard Vulnerabilities
Rules like `user ALL=(ALL) NOPASSWD: /bin/tar *` seem safe but are dangerous.
Lesson 2142Sudo Misconfigurations and Exploits
Wildcard with credentials
Combining `Access-Control-Allow-Origin: *` with `Access-Control-Allow-Credentials: true` (browsers block this, but legacy configs exist)
Lesson 874CORS Fundamentals and Same-Origin Policy Relaxation
Window Scan (`-sW`)
examines the TCP window size in RST responses to differentiate open from closed ports on some systems—a subtle variation of ACK scanning.
Lesson 343Advanced Nmap Scan Types
Window Size
The initial TCP window size varies by OS and version
Lesson 359TCP/IP Stack Fingerprinting
Windows Event Forwarding (WEF)
pushes events to collector servers, which then forward to the SIEM.
Lesson 1517Integrating Windows Logs with SIEM Platforms
Windows Event Logs
(local system time)
Lesson 2417Timeline Construction Fundamentals
Windows Firewall
, you specify the program path when creating rules.
Lesson 1588Application-Based Firewall RulesLesson 1589Firewall Logging and Monitoring
Wiper malware
that permanently deletes data or corrupts systems
Lesson 51Motivations: Disruption and Destructive Attacks
WIPS
sensors, integrate with SIEM systems, and enforce **Protected Management Frames** to prevent deauthentication attacks at scale.
Lesson 545Enterprise Wi-Fi Deployment Architecture
Wire Transfer Scams
exploit the legitimate business process of approving payments.
Lesson 2255Whaling and Executive Impersonation
Wireless Access Points
Unsecured APs can be physically accessed to extract configuration, passwords, or even be replaced with rogue devices that look identical but log all traffic.
Lesson 2278Physical Attacks on Network Infrastructure
Wireless Attacks
WiFi and Bluetooth testing
Lesson 2188Kali Tool Categories and Organization
Wireless Systems
Wi-Fi networks, Bluetooth implementations, and RF communications.
Lesson 2088Common Testing Targets and Scope
Wireshark
becomes your deep-analysis microscope.
Lesson 2416Network Forensics Tools and Workflows
With intent to sell/harm
Up to 10 years, $250,000 fine
Lesson 2590HIPAA Enforcement and Penalties
With least privilege
That same compromised account can only access the specific files or systems that employee actually needs for their daily work.
Lesson 2Least Privilege Principle
With scopes
, your package manager configuration can enforce that:
Lesson 1286Scoping and Namespacing in Package Managers
With the entry node
Establish shared secret keys
Lesson 2984How Onion Routing Works
Withdrawal History
Track when users revoke consent with equal rigor.
Lesson 2934Consent Records and Proof of Consent
Within the same account
Either an identity-based policy *or* a resource-based policy granting access is sufficient (if no explicit deny exists).
Lesson 1716Resource-Based vs Identity-Based Policies
Without backend revocation
, your token remains valid until expiration—like a key that still works even after you "returned" it.
Lesson 1094Session Management in Stateless SPAs
Without least privilege
An attacker who steals a regular employee's credentials might be able to delete the entire customer database, shut down servers, or access executive files.
Lesson 2Least Privilege Principle
WKD
solves the trust problem by letting domain owners publish keys via HTTPS.
Lesson 2962Key Discovery and Distribution
Wordlist Mode
Dictionary attacks with optional rule application, similar to what you've seen in earlier lessons.
Lesson 2231John the Ripper Techniques
work factor
principle recognizes that attackers operate under constraints—time, money, computing power, and risk.
Lesson 2634Work Factor and Attacker EconomicsLesson 2672Work Factor and Economic Balance
Workflow Automation
streamlines the process:
Lesson 2064Security Sign-Off and Approval Workflows
Workflow engines
Multi-step approvals with different authenticators
Lesson 2664Separation of Duties
Workflow manipulation
Test whether you can skip, repeat, or reverse steps in multi-stage processes (e.
Lesson 2103Logic Flaw and Business Logic Testing
Workflow positions
`checkout_step=3` → `checkout_step=5`
Lesson 916Session State Tampering
Workflow reversal
occurs when an attacker moves *backwards* through steps that should be finalized, while **replay attacks** involve resubmitting old valid requests to repeat actions that should only happen once.
Lesson 918Workflow Reversal and Replay Attacks
Workload Identity Federation
eliminates service account keys by establishing a trust relationship between your cloud provider and an external identity provider (like GitHub Actions, GitLab CI, AWS, or any OIDC-compliant provider).
Lesson 1726Workload Identity FederationLesson 1734Instance Profiles and Container Credentials
Workload-to-workload policies
define explicit rules: "Web server A can talk to database B on port 3306, but nothing else.
Lesson 2689East-West Traffic Inspection and Enforcement
Works anywhere
Agents function even when devices are off-network (remote workers, laptops), unlike network scanners that require connectivity to your scanning infrastructure.
Lesson 2437Agent-Based Scanning
Workspace structure
keeps evidence organized and reproducible.
Lesson 2190Kali Customization and Workspaces
Workspaces
are isolated containers within the database.
Lesson 2200Database Integration and Workspaces
Workstation
For end-user machines (laptops, desktops)
Lesson 1413CIS Benchmarks Overview and Structure
Worm
Self-replicates across networks without user intervention
Lesson 1518Malware Taxonomy and Classification Criteria
WPA2 → WPA
Older vulnerabilities become exploitable again
Lesson 530Downgrade Attacks
WPA2-only devices
to fall back to the traditional 4-Way Handshake
Lesson 521Transition Modes and Backward Compatibility
WPA3 → WPA2
Force devices back to WPA2, which lacks protections against dictionary attacks on weak passwords
Lesson 530Downgrade Attacks
WPA3-capable devices
to connect using the stronger Simultaneous Authentication of Equals (SAE) handshake and Protected Management Frames (PMF)
Lesson 521Transition Modes and Backward Compatibility
WPS PIN attack attempts
– repeated authentication failures
Lesson 550Wireless Packet Capture and Analysis
Wrap the old hash
When a user successfully authenticates (proving they know their password), immediately rehash their password with your new algorithm (bcrypt/Argon2) and store that instead
Lesson 692Upgrading Legacy Password Storage Systems
Wrapping
Encrypt the key using the cloud provider's public wrapping key
Lesson 1771Bring Your Own Key (BYOK) and Key Import
Wraps
or **injects** a modified assertion elsewhere in the XML structure
Lesson 779XML Signature Wrapping Attacks
Write access
Typically requires exact match or follows special rules to prevent information leakage
Lesson 1451Security Labels and ClearancesLesson 1875Log Encryption and Access Controls
Write blockers
are hardware or software tools that allow read-only access to storage media, preventing accidental modifications during imaging.
Lesson 2383Disk Imaging and Forensic Copies
Write correlation logic
(combine conditions with thresholds)
Lesson 2319Use Cases and Detection Content Development
Write malicious files
like web shells to writable directories
Lesson 589SQLMap Advanced Exploitation Features
Write tests
that check security expectations (e.
Lesson 2020Testing and Validation of IaC Security Controls
Write-Blockers
These hardware or software tools let investigators examine storage devices without accidentally modifying a single bit.
Lesson 2375Evidence Preservation Infrastructure
Write-protect immediately
using hardware write blockers (prevents accidental modification)
Lesson 2398Disk Forensics Fundamentals and Chain of Custody
Written passwords
Frustration leads to sticky notes or insecure storage
Lesson 702Password Expiration and Rotation Policies
Written security policy
addressing all PCI-DSS requirements
Lesson 2579Requirements 11-12: Testing and Policy
Wrong
Due to the birthday paradox, an attacker can find a collision in roughly **2^(n/2)** attempts.
Lesson 214Birthday Attacks and Hash Output SizeLesson 218HMAC vs Plain Hashing: Length Extension Attacks
Wrong format
AES-256 needs exactly 256 bits (32 bytes) of random-looking data.
Lesson 137Key Derivation Functions (KDFs) Overview
Wrong parameter binding
Using string formatting (`%`, `f-strings`) instead of the database library's parameter mechanism
Lesson 1237Parameterized Queries and Prepared Statements
WSUS
centralizes Windows updates within your network.
Lesson 2457Automated Patch Deployment Tools

X

X-Content-Type-Options
Set to `nosniff` to prevent browsers from MIME-sniffing responses and treating JSON as HTML.
Lesson 1041API Security Headers and CORS
X-Frame-Options
Use `DENY` to prevent your API responses from being embedded in iframes (clickjacking protection).
Lesson 1041API Security Headers and CORS
X3DH
handles the initial key agreement when two parties start communicating, even if one is offline.
Lesson 2942Signal Protocol Fundamentals
X3DH (Extended Triple Diffie-Hellman)
establishes the initial shared secret between two parties, even when one is offline.
Lesson 2949Signal Protocol: Double Ratchet and Key Agreement
X3DH runs once
when two users first communicate (or after a long gap), generating an initial root key from multiple Diffie-Hellman exchanges
Lesson 2949Signal Protocol: Double Ratchet and Key Agreement
XInclude injection
and **parameter entity attacks** are two clever workarounds that bypass these defenses by exploiting different parts of the XML specification.
Lesson 624XInclude and Parameter Entity Attacks
Xmas Scan
Sets FIN, PSH, and URG flags simultaneously—lighting up the packet "like a Christmas tree.
Lesson 367TCP Stealth Scan Techniques
Xmas Scan (`-sX`)
sets the FIN, PSH, and URG flags simultaneously—like a "Christmas tree" all lit up with flags.
Lesson 343Advanced Nmap Scan Types
XML configuration files
that define exactly what to monitor.
Lesson 1512Sysmon Installation and Configuration
XML External Entities (XXE)
disappeared as a standalone item, merged into Security Misconfiguration.
Lesson 1201OWASP Top 10 2021 vs 2017: Key Changes
XML Injection
occurs when an attacker inserts malicious XML content into input fields that get incorporated into XML documents without proper validation.
Lesson 616XML Injection Fundamentals
XML parsers
External entity references (XXE leading to SSRF)
Lesson 882SSRF Fundamentals and Attack Surface
XOR
that result with the left half to create a new right half
Lesson 86Feistel Network Architecture
XOR operation
(exclusive OR), a simple bitwise operation with a remarkable property: if `A XOR B = C`, then `C XOR B = A`.
Lesson 115Stream Cipher Fundamentals and XOR Operations
XOR operations
Combining words with previous key material and round constants (`Rcon`)
Lesson 91AES Key Expansion and ScheduleLesson 117ChaCha20: Modern Stream Cipher Design
XOR with plaintext
Each plaintext bit/byte is XORed with the corresponding keystream bit/byte
Lesson 115Stream Cipher Fundamentals and XOR Operations
XPC services
Secure inter-process communication for system services
Lesson 2703iOS Sandboxing and App Isolation
Xposed Framework
(Android-specific) allows you to hook into the Android runtime (ART/Dalvik) and modify app behavior systemically.
Lesson 2726Dynamic Analysis and Runtime Instrumentation
XSS (Cross-Site Scripting)
and **CSRF (Cross-Site Request Forgery)** sound similar but exploit completely different vulnerabilities:
Lesson 635XSS vs CSRF: Understanding the Difference
XSS attacks
Injecting JavaScript to read `document.
Lesson 713Session Hijacking Fundamentals
XSS Cookie Theft
Reduced—even if XSS injects code, cross-origin exfiltration is harder
Lesson 674SameSite Cookie Attribute
XSS rules
flag when untrusted data gets written to HTML output without proper encoding
Lesson 1362SAST Rule Sets and Vulnerability Detection
XSS-based data theft
If an attacker injects malicious scripts (XSS), they can steal authentication tokens, personal data, or session information stored client-side
Lesson 1072Client-Side Storage Overview and Threat Model

Y

Yao's garbled circuit protocol
(1986) solves this by treating the function as a Boolean circuit (logic gates: AND, OR, NOT):
Lesson 258Garbled Circuits for Two-Party Computation
You (Prover)
Randomly shuffle Graph A's labels to create Graph C.
Lesson 243The Graph Isomorphism Example
You approve connection requests
(or auto-approve trusted accounts)
Lesson 1850Private Link Service for Custom Applications
You configure allowed principals
(specific AWS accounts, organizational units, or even publish it for broader discovery)
Lesson 1850Private Link Service for Custom Applications
You connect
to the real server via HTTPS (the secure connection)
Lesson 395SSL Stripping Attacks
You control both sides
Internal APIs, admin panels, or systems where you control the client
Lesson 1155Rejecting vs Sanitizing Invalid Input
You need flexibility
International names with special characters
Lesson 1155Rejecting vs Sanitizing Invalid Input
You relay
their requests/responses, reading passwords, session cookies, and sensitive data
Lesson 395SSL Stripping Attacks
You respond
Since you created C from A, you can always answer either challenge:
Lesson 243The Graph Isomorphism Example
You send
the victim an HTTP version of the page (insecure)
Lesson 395SSL Stripping Attacks
You verify
using the publisher's *public key* (openly distributed)
Lesson 1294Package Signing and GPG Verification
You're trusting that author
and everyone who contributes to that package—not to introduce vulnerabilities or malicious code.
Lesson 1945Third-Party Dependencies in Functions
your
responsibility begins is crucial—security gaps often occur when customers assume the provider is handling something they're actually not.
Lesson 1684Shared Responsibility Model FundamentalsLesson 1985Cloud Compliance Inheritance and Mapping
Your MITM device intercepts
the connection
Lesson 397SSL/TLS MITM with Certificate Substitution
Your MITM position
intercepts this request before it reaches the real server
Lesson 395SSL Stripping Attacks
Your real ISP
and location context
Lesson 508DNS Leak Prevention
Your secret
You know how to relabel Graph A to make it identical to Graph B.
Lesson 243The Graph Isomorphism Example

Z

Z-Wave
uses AES-128 with a shared network key distributed during pairing
Lesson 2785Zigbee and Z-Wave Security Models
Zcash
pioneered this approach using zk-SNARKs.
Lesson 248Privacy-Preserving Blockchains with ZKPs
Zeek
(formerly Bro) functions as your automated analyst.
Lesson 2416Network Forensics Tools and Workflows
Zero critical vulnerabilities
in production images
Lesson 1641CI/CD Integration and Gating Policies
Zero packet loss
Every single packet is captured
Lesson 463Network TAPs vs SPAN Ports
Zero padding
Fixed-length messages or when combined with explicit length fields
Lesson 109ISO/IEC 7816-4 and Other Padding Methods
Zero trust across boundaries
Each account/region authenticates independently
Lesson 1851Cross-Region and Cross-Account Private Connectivity
Zero Trust Network Segmentation
and **Identity as the New Perimeter**, creating dynamic trust boundaries that adapt per-user, per-session.
Lesson 2680Software-Defined Perimeters (SDP)
Zero-Day Exploits
are attacks against vulnerabilities unknown to the software vendor.
Lesson 1534Exploitation of Software Vulnerabilities
Zero-day vulnerabilities
with no patch available
Lesson 2463What Are Compensating Controls
Zero-downtime rotation
solves this by ensuring both old and new secrets remain valid simultaneously during the transition period.
Lesson 1346Zero-Downtime Rotation Patterns
zero-knowledge proofs
, which prove knowledge without revealing it, MPC actually computes new values from secret inputs.
Lesson 255Introduction to Secure Multi-Party Computation (MPC)Lesson 2922Overview of Privacy- Preserving Technologies
Zero-trust architecture
Don't trust network location alone
Lesson 1586iptables and nftables on Linux
Zigbee
supports multiple security levels, with AES-128 encryption and separate network and link keys
Lesson 2785Zigbee and Z-Wave Security Models
ZIP passwords
, **SSH keys**, and other formats that require preprocessing.
Lesson 2231John the Ripper Techniques
ZIP Slip
a deceptively simple but devastating attack where archive entries contain filenames like:
Lesson 968ZIP Slip and Archive Extraction AttacksLesson 969Symbolic Link Attacks