General topics and info about hacking.
- Operating System (OS)
- Mac OS X
- Windows
- Linux
- Distributions
- Ubuntu
- Debian
- Pop OS
- Linux Mint
- Red Hat Linux
- Fedora
- CentOS
- Rocky
- Arch
- Suse
- SlackWare
- Knopix
- Gentoo
- Free BSD
- Tails
- Android
- Pen Testing OS
- Pre-installed with pen testing software
- Kali Linux
- Parrot OS
- Ubuntu
- Distributions
- Hyper Visor
- An app that runs on the host machine
- Virtualizes / Emulates Hardware for guest OS
- Arm M1 Mac
- UTM
- Virtualbox
- Hyper V
- Vmware Player
- qemu
- Penetration Testing (Pen Testing)
- Red Team
- Offensive Security
- Blue Team
- Defensive Security
- White Hat Hacker
- Hacking "professionally"
- Legally employed to hack
- Black Hat Hacker
- Malicious intentions
- Gray Hat Hacker
- Network / Computer
- Scanning / Analyzing / Assessing a computer system
- In order to identify
- vulnerabilities
- old versions of software
- unpatched
- old versions of software
- mis configurations
- vulnerabilities
- In order to identify
- Scanning / Analyzing / Assessing a computer system
- Physical
- Test gates / locks
- Lock Picking
- Social engineering
- Tailgating
- Test gates / locks
- Red Team
- Bug Bounties
- Companies will pay hackers that find vulnerabilities
- Responsible Disclosure
- Disclose found vulnerabilities to companies before publishing
- Give companies time to fix / patch before publishing
- CVE
- Common Vulnerabilities and Exposures
- Known / documented / reported vulnerabilities
- Common Vulnerabilities and Exposures
- Zero Day Exploit
- Unknown vulnerabilities
- Application Security
- AppSec