Skip to content
Permalink
master
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Go to file
 
 
Cannot retrieve contributors at this time

Glossary

  • Ransomware

    Ransomware is malware designed to block access to a computer until the user pays a sum of money. Recent examples of ransomware (such as WannaCry) have encrypted the data on the users users hard drive, making it impossible to access without the correct decryption key.

  • Malware

    Any software that is used for a malicious purpose. This can include Viruses, RATs or ransomware.

  • RAT

    Remote Access Trojan. A Type of malware that installs a backdoor onto the target system, allowing hackers to access it remotely.

  • SQL

    Structured Query Language. This is a "standardised" language that is used to interact with databases.

  • SQL Injection

    A (usually) web based explioit where the attacker makes use of poorly written SQL to modify the queries sent to the server.

  • MITM

    Man in the middle. Where the attacker intercepts communication between two people. Either to evesdrop on the converstation, or to act as an authorised source and interfere with communication in some way.

  • XSS

    Cross Site Scripting. A web based attack where the user injects malicious javascript into a web page, causing it to behave in a different way.

  • Phishing

  • Social Engineering

  • Web 2.0

    The New Web, that emerged in the early 2000's. where technolgies such as Javascript allowed us to move from purely static HTML sites to those with responsive and interteractive content.

  • GET Requests

    A method of sending data to a web server. GET requests are encoded as part of the URL (do a Google search and look at the URL for a good example of this). The part appended to the string containing the parameters is known as the query string.

    You can see GET requests in action on Google, after making a search you will notice a lof of information in the URL, this represents the search terms that the server is processing.

  • POST Requests

POST requests are encoded inside the request body. This means that the request itself is only visible by inspecting the headers, rather than as part of the URL. This makes it slightly harder to modify the request, as we cannot just manipulate the URL, and would need to use a tool to add the parameters to the request body. We will discuss manually sending requests to the server in the next step.