Variable that contains the RAM address of another variable or function
To access an address as a variable
A class having derivative classes that retain similar attributes, but have extra, more precise attributes in the subclass
The father class of derivative classes in a polymorphism
A datatype that holds several values. For instance, an array called fruits may have various strings named apple, banana, orange, grape, and so forth
2d arrays refer to arrays that have horizontal and vertical registers. A normal array will have objects at registers [0], [1], [2], and so forth. a 2darray can store an object at positions such as [1][2].
A class refers to a section of code that defines new datatypes and the attributes they have, along with methods relating to these datatypes
Type of variable or method that is performed on a specific object or instance of a class
Type of variable that applies outside of classes in the main code.
A process of code. Multiple threads mean that multiple processes are being done at once, therefore there is concurrency.
Type of function that does not return a specific value when completed
Process that is done to a variable defined by the language, like a print function.
A function, but defined in a class by the coder.
A datatype where a function can be applied to several objects within the datatype, such as a list.
The datatype of text.
The datatype of an integer.
The datatype of a number with a decimal place.
Code that is run while a certain condition is met or the datatype is exhausted, such as if statements and for loops.
A statement that will repeat until a certain condition is met or an iterable is exhausted.
A process used in low level languages. They often do small tasks such as increasing a variable, halving variable, or store a value at a RAM address.
Text ignored by compiler, used as a way of explaining the code to other people looking at source code.
Form used by HTML to specify the type of media that will be displayed
Variables used within HTML tags to describe the nature of the data that a tag will display
Symbol used to perform mathematical processes on a variable, such as +, -, *, /, and =.
The datatype of a number with a decimal place.
The datatype that returns either true or false.
The datatype of a string with a length of one symbol.
An object that is linked to data, information in essence.
The datatype of an integer.
Calling a function within its own function
Creating a variable
Creating a variable and assigning it a value
Giving a variable a value
Data structure of values that can only be accessed in a linear order (FILO)
First In Last Out; data access order where the latest value added to the stack is the value that first value that can be taken off and the oldest value on the stack is the last value to be taken off
Blocks are in order of creation, accesses at speed O(1)
Previous block holds location of the address of the next block in sequence, accesses at speed O(n)
Index block holds list of addresses for blocks for a file, and points to another index block if more space is needed, accesses at speed O(log(n))
The order in which high and low address bytes are read
Labelled button on keyboard used for typing
Mechanism that completes a circuit when pushed down, under each key cap
Keyboard using switches to complete circuit
Keyboard using membrane layer with rubber domes to complete circuit
Printed Circuit Board; board that contains the circuits for each buttons to send to the computer
Keyboard that allows to swap switches without soldering
Force exerted onto the switch
Allows for wider buttons to focus operational force from ends of the key cap onto the switch
Y position where the switch registers an input
Y position where the switch is ready to receive new input
Distance between the key and activation point
Unit of power, measured by amperes times voltage
Central Processing Unit; the hardware in computer responsible for all arithmetic, controlling RAM and and general processing
Instruction Set Architecture
Responsible for holding frequently used memory closer to CPU for more speed
Type of cache that is fast but small in terms of storage
Type of cache
Type of cache that is slow but large in terms of storage
Graphics Processing unit; responsible for processing graphics and has extra resources to assist CPU
CPU with integrated GPU
Main circuitry of a computer, connects all components together and provides female connections (for external devices, can't actually get you a girl)
Power Supply Unit; distributes power through the motherboard and the HDD
Controls the voltage of circuitry
Device or process that controls one or several devices or processes
Device or process controlled by a master
High Definition Multimedia Interface
Advanced Technology eXtended; case following standard that: - Case can hold a motherboard - Case can hold a GPU - Case has front hardware panel
Field Programmable Gate Area; physical component that can be programmed with hardware description language
Basic Input Output System; Firmware on a motherboard
Serial AT Attachment; system for connecting storage devices with independent cables
The act of connecting something to earth to remove all static electricity
Universal Serial Bus A;
Refined version of USB-A, that can handle more power and higher data transfer rates
Hard Disk Drive;
Solid State Drive;
Read Only Memory; Non upgradable firmware on a chip
LArge corporate computer made for mass processing of data
Random Access Memory; Volatile memory used for storing tempoary variables for programs
Double Data Rate; Type of RAM that has double the transfer rate as SDR
Red Green Blue; Colour system of 2363 possibilities, can be used on fans and keyboards to look ultra sexy
Unit of measuring frequency per second
Unit of measuring memory, where a bit is a 1 or 0
Unit of measuring memory, with as byte representing 8 bits
Power On Self Test;
Voltage Regulator Module;
Complementary Metal-Dxide-Semiconductor; Conductor that retains BIOS memory
Digital Visual Interface; successor to VGA
Parallel AT Attachment; system for connecting storage devices in parallel with one wide cable
Trusted Platform Module; microcontroller that offers cryptography on hardware level
Speaker.Subwoofer.HighSpeakers
Sound producing mechanism
Speaker that produces low bass sounds
Paste that allows heat to be conducted easily though CPU to a heatsink
1mm thick disc of silicon extracted from sand, on which CPU dies are made
The process of using light to etch microscopic incisions into a wafer, making the CPU dye
Unit of measuring quantity of floating point processes that a computer can handle per second
Device used to display computer documents on physical paper
Powdered color used in printers
Cartridges of ink used in printers
Fuses the toner ink to the paper
Redundancy Array of Independent Disks; method of using multiple drives that store the same data so that in case one drive fails, the data is still acessible on another drive
Changing hardware successfully without rebooting or powering down
Changing hardware successfully only by rebooting or powering down
Dynamic Host Configuration Protocol; Protocol for routers to provide a local IP to devices
Layers of a network
Wires crossed to minimise electromagnetic interference
Twisted pair cable for ethernet
Multi Protocol Label Switching; Routing LANs to connect to other LANs
Network Attached Storage;
Customer Edge; Personal router in a MPLS WAN
Provider Edge; Provider's router in an MPLS WAN
Cable made from glass that uses light to send signals
Degradation of a signal as it travels through a wire
Power over Ethernet; uses unused wires in ethernet cables to provide power to devices
Quarter of an IP (numbers between the dots)
IP address that broadcasts packet to all devices on its LAN (192.168.1.255)
Local Area Network; Network for a small area and one entity (such as a business)
Wide Area Network; Collection of LANs
32 bit number with similar structure to IP that tells which octet of an IP is dynamic (0 for dynamic, 255 for otherwise)
Internet Protocol; Identifies a node on a network
Protocl that allows for full duplex communication through TCP
Identifies a device
A networked device that can be connected to clients to give them specific functionality
A storage server
Wi-Fi
Service Set IDentifier; Name of a Wi-Fi network (that you can assign)
Type of protocol that requires a handshake before the transmission of data. Is also sequenced, as in, one packet is sent at a time.
Type of protocol that doesn't requires a handshake before the transmission of data and is therefore consequently less reliable but faster. It is also unsequenced.
Network Interface Card;
One of 65525 protocols that can be used
Connects a LAN to another network and distributes traffic to the nodes correctly
Device that connects all nodes to a network. It is a thin client that sends data to all devices connected when data is received and amplifies signals of any transmitted data
Device that connects nodes together. It is a fat client that sends data to a specific node connected to the switch.
Structure of a network
Mixed topology
A circuit with nodes embeded around
A single path that extends to several nodes with a terminator at each end
Type of protocol that requires a handshake before the transmission of data. Is also sequenced, as in, one packet is sent at a time.
Type of protocol that doesn't requires a handshake before the transmission of data and is therefore consequently less reliable but faster. It is also unsequenced.
Cyclic Redundancy Check;
Adds extra bit to each byte which is 1 if amount of 0s and 1s is even and 0 if they aren't. If the parity doesn't match the signal is retransmitted
Collision checking on a ring topology, only node with the token can transmit data
Checks if data is being sent on a LAN, if not, the data is sent
File on a server
Network File System; File system over a server
Distributed File System
Really Simple Syndication; a web feed system that can be used with HTML
Maximum rate of data that can be sent across a path
Maximum amount of signals transmitted per second (measured in hertz)
Maximum amount of bits transmitted per second (measured in bits per second)
Amazon Web Services; Hosted computing through servers, let you set up VPSs
A set of data transmitted on a network through a certain protocol.
HTTP method to request data
HTTP method to send data
System that opens and closes network ports
Voice over Internet Protocol;
Server send events, signals sent between multiple servers, used in the handshake process.
Refers to physical attributes of a network (cables, routers, etc)
Refers to basic techniques of identifying nodes on a network (usually by MAC address)
Refers to protocol of routing data across networks
Refers to reliable delivery of packets
Refers to sessions between network applications
Refers to conversion of data so that it is in a suitable format for the receiver
Refers to applications accessing transmitted data
Registered Jack 45; Cable with 8 positions and 8 wires
Actual data of a packet
Virtual Private Network; two private networks connected over a public network, data transmitted between is often protected by encryption, but not necessarily
HyperText Transfer Protocol;
Secure Socket Layer; certificate based protocol that ensures data confidentiality, integrity, and authentification
Secure Shell;
File Transfer Protocol; protocol for exchanging files between a network
Simple Mail Transfer Protocol;
Simple Network Management Protocol; protocol that allows for different protocols to converse with eachother
Server Message Block; protocol that offers shared access to files on a network
Ideal characteristics of a network; Confidentiality, Integrity, Availability
Institute of Electrical and Electronics Engineers; Institution that creates the networking standards
One way communication, like a radio
Two way communication, but not simultaneously, like a walkie talkie
Integral two way communication, like a phone call
Domain Name System; applies worded HTTP links to IP addresses (google.com is a domain name, where 142.250.66.238 is just an IP)
IP from range 1.0.0.0 to 127.0.0.0 with a subnet mask of 255.0.0.0
IP from range 128.0.0.0 to 191.255.0.0 with a subnet mask of 255.255.0.0
IP from range 192.0.0.0 to 223.255.255.0 with a subnet mask of 255.255.255.0
Communication port
Line printer terminal; used for connecting printers physically
Direct Station Selection; Allows for phone number extensions (making it possible to transfer call to other people on a network)
Post Office Protocol; common email protocol
Data shared by user and server for webpages
An authentification protocol using encryption and third parties and using timed tokens to permit user network activity
NT LAN Manager; security protocols for Windows NT OS
Ticket Granting Ticket
Ticket Granting Server
Authentification Server
Key Distribution Center; third party including the TGS and AC
Also known as XSS, when an attacker abuses user input to execute javascript. This can change the code of a site and perform activities such as stealing cookies or making users of the site perform unwanted activities.
Abusing the syntax of SQL to bypass passwords. This is done by entering a string that is misinterpreted to be apart of the SQL code and interprets the entered details as code to allow the attacker in.
When a website uses an unsanitized function where it refers to the terminal, attackers can take advantage of this to use the system terminal to recall passwords and system files
Entering data that exceeds the buffer (expected length of daya), overflows into the system code and can be used to execute malicious scripts or crash a server
Abusing links that use javascript queries to make the link perform certain actions, then phishing someone to use this link. This is often used for session hijacking as a command to steal one's cookies is possible
Modifying cookies to pretend to be another user who has higher privileges
Modifying POST request to trick the system into giving higher privileges
Exploit not shared to software vendor and hence has high success at working
When a node consistently pings a network so as to create unnecessary traffic and crash the network
Finding details about the network in question, such as the operating system and open ports.
Sending many packets to a switch so that the MAC address table which it uses to know what packets to send to which device is a victim to a buffer overflow and hence the switch becomes more like a hub, sending the packets to every node. This makes it easier to sniff the traffic
Sending many packets to the ARP (Address Resolution Protocol) table that matches MAC addresses to their local IP, creating a buffer overflow and confusing the table so that the switch resorts to acting like a hub. This makes it easier to sniff traffic as the data usually sent to a single machine is broadcasted over an entire network.
sending false packets to the DNS (Address Resolution Protocol) table that matches the DNS to their IP, so that the DNS redirects to the incorrect IP that the attacker manages. This allows for the victim to connect to the attacker and initiate a reverse shell
Baiting a victim to connect to the device of the attacker, which they can then use to gain remote code execution.
When a DLL file with malware is inserted into the Windows API so as to perform functions that can escalate privilege and other stuff. Requires some remote command execution to perform
Short for structure, refers to a datatype in C that is made up of sub variables with datatypes such as strings, integers and so forth. This is pretty much the same as an object of a class, the only difference that a struct is public by default
Command line in Metasploit through which DLL injections and such take place
The connection between a user and device through either a command line interface (CLI) like a console or a graphic user interface (GUI) like a desktop.
Teletype, an input and output environment for a system.
The path of input to several programs to display an output or error.
When one thread is faster than another and is executed first
Flagging malicious exploits by recognising a certain identifier in them (i.e code unique to that file, the file's hash etc)
Making the intention of a program unclear to antivirus software
Examining exploit file, looking for suspicious properties
Examining exploit file, looking for suspicious activities
Deep Packet Inspection; Refers to analysing a packet's information from the network to the application layer
Uses an oracle that leaks the amount of padding to reverse CBC encryption
Sending data to be deserialised and be executed in memory
If a program that takes a file has a time interval, files can be swapped around with symlinks so that it returns a processed version of the file the attacker wants to see. This is good for when the output gives lots of information about the original file (such as an encrypted version or if we're lucky enough, the file itself)
Writing to illegal positions (such as addresses that don't exist, outsite the allocated RAM and so forth)
Cracking hashes by knowing the length of the result
Server Side Request Forgery; Sending malformed packets that access restricted areas of a server
Local File Inclusion; Devising a way to access a local file of the victim
XML eXternal Entity;
Overflowing an SQL entry limit with a string containing an existing account name, allowing duplicated access to an account
Process ID; number assigned to a process on a machine
Discrete Cosine Transformation; compression method for images and audio by representing distribution of shade or noise by the sum of two cosine waves with their own varying frequencies; one vertical wave and one horizontal wave
Copying a disk's data to another disk in real time, making a redundant copy
Storing a file's blocks across several disks
Reserving one bit (called a parity bit) for error checking by making that bit make the number of 1s or 0s in that byte even, so that if one bit is flipped, an error is raised
Asymmetric encryption made by two americans and a jew.
(m)ed≅ (mod n)
Where m is the message
e is the public key
d is the private key
n is the second public key
Pretty Good Privacy; Encryption method
Cipher block chaining; asymmetric encryption method that requires padding to make plaintext match the same length as the IV
Ci=E()
Initialisation Vector;
Lots of encryption relies on the remainder of a division, and a modulus is the divisor and returns the remainder of the number divided by the modulus
Extra data added to a message for either obfuscation, or to meet encryption requirements
Giving a code on data to enforce integrity, these functions are many (plaintext) to one (hash)
Obfuscation system to make reading messages only possible with a key. These functions are one (plaintext) to one (encryption)
Encryption that requires one key to both encrypt and decrypt
Encryption that requires one key to encrypt and another to decrypt
🄯 ".date("Y")." zaco