Information Security Keywords

Published: August 22, 2024, updated: January 6, 2025

Here are some keywords I’ve come across when studying information security topics.

CVSS

I refer to CVSS v3.1 here.

Environmental metric group

This considers the impact of a user’s environment on the vulnerability. This is important for organizations with specific CIA (confidentiality, integrity, availability) needs.

By default, it’s assumed that the impact on CIA is medium. Organizations can either decrease or increase any CIA requirements metric, giving it a low, medium, or high value.

Brute-forcing tools

thc-hydra

It worked well for fuzzing basic SMB and HTTP. For better SMB support, you need to compile it with Samba support and use its smb2 module.

It doesn’t work well with HTTP forms that require submitting a hidden field such as a CSRF token. It can only send cookies received before.

Links:

Patator

This works well for brute-forcing HTML forms that require you to submit a CSRF token. You can use a flag to instruct it to fetch a separate page and then read out a field from the response. For example, you may get a response like the following:

<input type="hidden" name="csrf-token" value="foobar" />

Patator can then read out foobar and you can refer to it when creating the HTTP POST body.

Links:

John the Ripper

A feature that surprised me a lot in John is the ability to create custom formats using dynamic formats. A specific password hash may use a obscure “hash, then salt, then hash, then add constant”-type method. You can define any such method using John’s domain specific language (DSL).

I have had tremendous success using this in combination with the d3ad0ne rule to crack leetspeak-like passwords when extracting slightly obscure PostgreSQL MD5 password hashes. from PostgreSQL. MD5 is dangerous indeed.

Links:

Tags

I would be thrilled to hear from you! Please share your thoughts and ideas with me via email.

Back to Index