CTF Hacking Glossary

NIST National Institute of Standards and Technology is a physical sciences laboratory and non-regulatory agency of the United States Department of Commerce.
SSH secure shell is a cryptographic network protocol for operating network services securely over an unsecured network.
Windows Terminal terminal application for command-line tools, and shells like command prompt, powershell and WSL.
WSL "windows subsystem for linux allows linux programs to run natively on Windows. WSL was designed by Microsoft in partnership with Canonical, the creators of Ubuntu. Together, they created a kernel compatibility layer based on Ubuntu."
Cygwin an SSH client program
Proxy Server server application or appliance that acts as an intermediary (indirect contact) for requests from clients seeking resources from servers that provide those resources
Triage a method that helps you respond faster and with more accuracy to security events
HTTP hypertext transfer protocol is the underlying protocol used by the World Wide Web to define how messages are formatted and transmitted and what actions Web servers and browsers should take in response to various commands. It is a request-response protocol in the client-server computing model.
Public key username
Private key passkey
ls command to list computer files in Unix or Unix-like operations.
cd change directory is a command-line shell command used to change the current working directory in various systems.
cat reads data from the file and gives their content as output. It helps us to create, view, concatenate files.
du command, short for disk usage, is used to estimate file space usage. The du command can be used to track the files and directories which are consuming excessive amount of space on hard disk drive.
find this command can show all files like a search function
file command classies each arguement to then display the file type
Change browser to incognito as default Properties > Shortcut > Append "[space]--incognito"
./- opens files that starts with a dashline
ls -al * displays sizes of all files including hidden ones
find -size 1033c to find the file
Server a piece of computer hardware or software (computer program) that provides functionality for other programs or devices, called "clients".This architecture is called the client-server model.
setuid set user id can allow a normal user to run a program with escalated priveleges such as root e.g. if a student runs a program from my profile
BASH bourne again shell
Shell an interpreter which can accept commands for a user and run them to perform operations such as navigating around a file system, running programs and interacting with devices.
.bashrc file a shell script which is run every time a user opens a new shell. This is a good place therefore to run commands that you want to run every single time you open a shell
grep global regular expression printer can search strings in a file
find ./ -size 33c -group bandit6 -user bandit7 finds exact group, owner and size in the entire server
/ the whole server
Learning curve declutter the problem first and sometimes tinker with the syntax
grep 'string' *.txt finds string within the file
cat data.txt | sort | uniq -u takes text, sorts the lines, and takes unique line of text
Pipelining | feeds the output from the program on the left as input to the program on the right
strings '*.txt' finds all strings in a file
Base64 binary to text encoding
string' | base64 to encode string into base64
"cat data.txt | tr '[A-Z]' '[N-ZA-M]' | tr '[a-z]' '[n -za-m]'" displays text > rotates set upper case A-Z to N-Z and set A-M to translate 13 times based on the index > do the same for small letters
ROT13 rotate by 13 places substitution cipher
Hexdump a hexadecimal view (on screen or paper) of computer data, from RAM or from a computer file or storage device.
mkdir make directory
man manual pages
cp copy
xxd -r data.txt decryption of hexdump text file
mv (source) (new file) used to re-format the filename to decompress
sample.gz gzip data format
sample.bz2 bzip2 data format
gzip -d sample.gz decompression
bz2 -d sample.bz2 decompression
sample.tar file format for POSIX tar archive (GNU)
tar -xvf sample.tar decompression
Telnet an application protocol used on the Internet or local area network to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection.
Reverse Shells a type of shell in which the target machine communicates back to the attacking machine.
How to search in Man Page /String (forward slash, then input)
check commands on syntax, as it's case sensitive is a remote shell, where the connection is made from the system that offers the services to the client that wants to use these services.
echo returns input / command in linux is used to display line of text/string that are passed as an argument
RSA key RSA (Rivest-Shamir-Adleman) is a public-key cryptosystem that is widely used for secure data transmission. It is also one of the oldest. The acronym RSA comes from the surnames of Ron Rivest, Adi Shamir, and Leonard Adleman, who publicly described the algorithm in 1977.

Comments

  1. You have worked nicely with your insights that make our work easy. The information you have provided is really factual and significant for us. Keep sharing these types of articles, Thank you.cybersecurity services Orange county

    ReplyDelete
  2. You are providing good knowledge. It is really helpful and factual information for us and everyone to increase knowledge.about Buy Rehabilitation Gloves. Continue sharing your data. Thank you.

    ReplyDelete

Post a Comment