Term 
         | 
        
        
        Definition 
        
        | A way for you to simulate the methods that an attacker might use to circumvent security controls and gain access to an organization’s systems. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        Penetration Testing Execution Standard |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        1. Pre-engagement Interactions 2. Intelligence Gathering 3. Threat Modeling 4. Vulnerability Analysis 5. Exploitation 6. Post Exploitation 7. Reporting |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | An exploit is the means by which an attacker, or pen tester for that matter, takes advantage of a flaw within a system, an application, or a service. An attacker uses an exploit to attack a system in a way that results in a particular desired outcome that the developer never intended. Common exploits include buffer overflows, web application vulnerabilities (such as SQL injection), and configuration errors. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | A payload is code that we want the system to execute and that is to be selected and delivered by the Framework. For example, a reverse shell is a payload that creates a connection from the target machine back to the attacker as a Windows command prompt (see Chapter 5), whereas a bind shell is a payload that “binds” a command prompt to a listening port on the target machine, which the attacker can then connect. A payload could also be something as simple as a few commands to be executed on the target operating system. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | reverse shell is a payload that creates a connection from the target machine back to the attacker as a Windows command prompt |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | bind shell is a payload that “binds” a command prompt to a listening port on the target machine, which the attacker can then connect. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | Shellcode is a set of instructions used as a payload when exploitation occurs. Shellcode is typically written in assembly language. In most cases, a command shell or a Meterpreter shell will be provided after the series of instructions have been performed by the target machine, hence the name. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | A module in the context of this book is a piece of software that can be used by the Metasploit Framework. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | a software component that conducts the attack. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | may be required to perform an action such as scanning or system enumeration. |  
          | 
        
        
         | 
        
        
        Term 
         | 
        
        
        Definition 
        
        | A listener is a component within Metasploit that waits for an incoming connection of some sort. |  
          | 
        
        
         |