Bash, the Crucial Exams Chat Bot
AI Bot
CompTIA PenTest+ PT0-003 All Acronyms Flashcards
Front | Back |
AD | Active Directory |
ADB | Android Debug Bridge |
AI | Artificial Intelligence |
AP | Access Point |
API | Application Programming Interface |
APT | Advanced Persistent Threat |
BAS | Breach and Attack Simulation |
BeEF | Browser Exploitation Framework |
BGP | Border Gateway Protocol |
BIA | Business Intelligence Analytics |
C2 | Command and Control |
CGI | Common Gateway Interface |
CI/CD | Continuous Integration/Continuous Delivery |
CIDR | Classless Inter-domain Routing |
CLI | Command-line Interface |
CME | CrackMapExec |
CNAME | Canonical Name |
COFF | Common Object File Format |
CREST | Council of Registered Ethical Security Testers |
CSRF | Cross-site Request Forgery |
CVE | Common Vulnerabilities and Exposures |
CVSS | Common Vulnerability Scoring System |
CWE | Common Weakness Enumeration |
DAST | Dynamic Application Security Testing |
DCOM | Distributed Component Object Model |
DDos | Distributed Denial of Service |
DMARC | Domain-based Message Authentication, Reporting, and Conformance |
DNS | Domain Name System |
DoS | Denial of Service |
DREAD | Damage potential, Reproducibility, Exploitability, Affected users, Discoverability |
DROWN | Decrypting RSA with Obsolete and Weakened Encryption |
EFSRPC | Encrypting File System Remote Protocol |
ELF | Executable and Linkable Format |
EPSS | Exploit Prediction Scoring System |
EXIF | Exchangeable Image File Format |
FQDN | Fully Qualified Domain Name |
FTP | File Transfer Protocol |
GIF | Graphic Interchange Format |
HID | Host-based Intrusion Detection |
HSTS | HTTP Strict Transport Security |
HTML | Hypertext Markup Language |
HTTP | Hypertext Transfer Protocol |
HTTPS | Hypertext Transfer Protocol Secure |
IaC | Infrastructure as Code |
IAM | Identity and Access Management |
IAST | Interactive Application Security Testing |
ICMP | Internet Control Message Protocol |
ICS | Industrial Control System |
IDOR | Insecure Direct Object Reference |
IdP | Identity Provider |
IDS | Intrusion Detection System |
IGRP | Interior Gateway Routing Protocol |
IoT | Internet of Things |
IP | Internet Protocol |
IPS | Intrusion Prevention System |
ISE | Integrated Scripting Environment |
JWT | JSON Web Token |
KDC | Key Distribution Center |
KRBTGT | Kerberos Ticket Granting Ticket |
LDAP | Lightweight Directory Access Protocol |
LFI | Local File Inclusion |
LLMNR | Link-local Multicast Name Resolution |
LOLBins | Living off the Land Binaries |
LPD | Line Printer Daemon |
LSASS | Local Security Authority Subsystem Service |
MAC | Media Access Control |
MASVS | Mobile Application Security Verification Standard |
MFA | Multifactor Authentication |
MIB | Management Information Base |
MMS | Multimedia Messaging Service |
MSA | Master Services Agreement |
MX | Mail Exchange |
NDA | Non-disclosure Agreement |
NFC | Near-field Communication |
NSE | Nmap Scripting Engine |
NTLM | New Technology LAN Manager |
OCTAVE | Operationally Critical Threat, Asset, and Vulnerability Evaluation |
OIDC | OpenID Connect |
OpenVAS | Open Vulnerability Assessment Scanner |
OS | Operating System |
OSINT | Open-source Intelligence |
OSSTMM | Open-source Security Testing Methodology Manual |
OT | Operational Technology |
OWASP | Open Worldwide Application Security Project |
PTES | Penetration Testing Execution Standard |
PWS | Performance Work Statement |
QC | Quality Control |
RCE | Remote Code Execution |
RDP | Remote Desktop Protocol |
RFI | Remote File Inclusion |
RFID | Radio Frequency Identification |
RIP | Routing Information Protocol |
RPC | Remote Procedure Call |
SaaS | Software as a Service |
SAM | Security Account Manager |
SAML | Security Assertion Markup Language |
SAST | Static Application Security Testing |
SCA | Software Composition Analysis |
SCADA | Supervisory Control and Data Acquisition |
SDK | Software Development Kit |
SDLC | Software Development Life Cycle |
SDR | Software-defined Radio |
SET | Social Engineering Toolkit |
SIEM | Security Information and Event Management |
SMB | Server Message Block |
SMS | Short Message Service |
SNMP | Simple Network Management Protocol |
SOA | Start of Authority |
SOC | Security Operations Center |
SoW | Statement of Work |
SPN | Service Principal Name |
SQL | Structured Query Language |
SQLi | Structured Query Language Injection |
SSH | Secure Shell |
SSID | Service Set Identifier |
SSL | Secure Socket Layer |
SSO | Single Sign-on |
SSRF | Server-side Request Forgery |
STRIDE | Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege |
TCP | Transmission Control Protocol |
TGS | Ticket Granting Service |
TLS | Transport Layer Security |
ToS | Terms of Service |
TTP | Techniques, Tactics, Procedures |
UDP | User Datagram Protocol |
URL | Uniform Resource Locator |
USB | Universal Serial Bus |
VLAN | Virtual Local Area Network |
VNC | Virtual Network Computing |
VPN | Virtual Private Network |
WAF | Web Application Firewall |
WinRM | Windows Remote Management |
WLAN | Wireless Local Area Network |
WMI | Windows Management Instrumentation |
WPAD | Web Proxy Auto Discovery |
WPS | Wi-Fi Protected Setup |
XSS | Cross-site Scripting |
ZAP | Zed Attack Proxy |
Front
EFSRPC
Click the card to flip
Back
Encrypting File System Remote Protocol
Front
LOLBins
Back
Living off the Land Binaries
Front
RIP
Back
Routing Information Protocol
Front
TLS
Back
Transport Layer Security
Front
DAST
Back
Dynamic Application Security Testing
Front
SCA
Back
Software Composition Analysis
Front
SSID
Back
Service Set Identifier
Front
EPSS
Back
Exploit Prediction Scoring System
Front
HID
Back
Host-based Intrusion Detection
Front
UDP
Back
User Datagram Protocol
Front
AP
Back
Access Point
Front
IAM
Back
Identity and Access Management
Front
WLAN
Back
Wireless Local Area Network
Front
ELF
Back
Executable and Linkable Format
Front
MSA
Back
Master Services Agreement
Front
SDLC
Back
Software Development Life Cycle
Front
VNC
Back
Virtual Network Computing
Front
ICS
Back
Industrial Control System
Front
OT
Back
Operational Technology
Front
JWT
Back
JSON Web Token
Front
MFA
Back
Multifactor Authentication
Front
LFI
Back
Local File Inclusion
Front
SAST
Back
Static Application Security Testing
Front
SNMP
Back
Simple Network Management Protocol
Front
DNS
Back
Domain Name System
Front
LLMNR
Back
Link-local Multicast Name Resolution
Front
OIDC
Back
OpenID Connect
Front
RDP
Back
Remote Desktop Protocol
Front
TTP
Back
Techniques, Tactics, Procedures
Front
IDOR
Back
Insecure Direct Object Reference
Front
SQLi
Back
Structured Query Language Injection
Front
MMS
Back
Multimedia Messaging Service
Front
WAF
Back
Web Application Firewall
Front
HSTS
Back
HTTP Strict Transport Security
Front
IaC
Back
Infrastructure as Code
Front
XSS
Back
Cross-site Scripting
Front
CI/CD
Back
Continuous Integration/Continuous Delivery
Front
SMB
Back
Server Message Block
Front
WinRM
Back
Windows Remote Management
Front
BAS
Back
Breach and Attack Simulation
Front
SCADA
Back
Supervisory Control and Data Acquisition
Front
OWASP
Back
Open Worldwide Application Security Project
Front
ISE
Back
Integrated Scripting Environment
Front
LPD
Back
Line Printer Daemon
Front
USB
Back
Universal Serial Bus
Front
CREST
Back
Council of Registered Ethical Security Testers
Front
CIDR
Back
Classless Inter-domain Routing
Front
DREAD
Back
Damage potential, Reproducibility, Exploitability, Affected users, Discoverability
Front
IdP
Back
Identity Provider
Front
DROWN
Back
Decrypting RSA with Obsolete and Weakened Encryption
Front
SET
Back
Social Engineering Toolkit
Front
SQL
Back
Structured Query Language
Front
AI
Back
Artificial Intelligence
Front
BeEF
Back
Browser Exploitation Framework
Front
EXIF
Back
Exchangeable Image File Format
Front
TGS
Back
Ticket Granting Service
Front
APT
Back
Advanced Persistent Threat
Front
HTML
Back
Hypertext Markup Language
Front
ICMP
Back
Internet Control Message Protocol
Front
KRBTGT
Back
Kerberos Ticket Granting Ticket
Front
MASVS
Back
Mobile Application Security Verification Standard
Front
RPC
Back
Remote Procedure Call
Front
WPS
Back
Wi-Fi Protected Setup
Front
CME
Back
CrackMapExec
Front
NDA
Back
Non-disclosure Agreement
Front
C2
Back
Command and Control
Front
IDS
Back
Intrusion Detection System
Front
SIEM
Back
Security Information and Event Management
Front
SOC
Back
Security Operations Center
Front
KDC
Back
Key Distribution Center
Front
FTP
Back
File Transfer Protocol
Front
IGRP
Back
Interior Gateway Routing Protocol
Front
HTTP
Back
Hypertext Transfer Protocol
Front
OSINT
Back
Open-source Intelligence
Front
DoS
Back
Denial of Service
Front
IPS
Back
Intrusion Prevention System
Front
FQDN
Back
Fully Qualified Domain Name
Front
SPN
Back
Service Principal Name
Front
SSRF
Back
Server-side Request Forgery
Front
ToS
Back
Terms of Service
Front
DMARC
Back
Domain-based Message Authentication, Reporting, and Conformance
Front
MIB
Back
Management Information Base
Front
OS
Back
Operating System
Front
IAST
Back
Interactive Application Security Testing
Front
CLI
Back
Command-line Interface
Front
SSH
Back
Secure Shell
Front
SSL
Back
Secure Socket Layer
Front
BGP
Back
Border Gateway Protocol
Front
MAC
Back
Media Access Control
Front
VPN
Back
Virtual Private Network
Front
NTLM
Back
New Technology LAN Manager
Front
RCE
Back
Remote Code Execution
Front
BIA
Back
Business Intelligence Analytics
Front
AD
Back
Active Directory
Front
MX
Back
Mail Exchange
Front
STRIDE
Back
Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege
Front
VLAN
Back
Virtual Local Area Network
Front
CVSS
Back
Common Vulnerability Scoring System
Front
SDK
Back
Software Development Kit
Front
SOA
Back
Start of Authority
Front
SaaS
Back
Software as a Service
Front
TCP
Back
Transmission Control Protocol
Front
QC
Back
Quality Control
Front
RFID
Back
Radio Frequency Identification
Front
SoW
Back
Statement of Work
Front
URL
Back
Uniform Resource Locator
Front
CGI
Back
Common Gateway Interface
Front
SAM
Back
Security Account Manager
Front
PTES
Back
Penetration Testing Execution Standard
Front
ADB
Back
Android Debug Bridge
Front
OCTAVE
Back
Operationally Critical Threat, Asset, and Vulnerability Evaluation
Front
RFI
Back
Remote File Inclusion
Front
DCOM
Back
Distributed Component Object Model
Front
SDR
Back
Software-defined Radio
Front
ZAP
Back
Zed Attack Proxy
Front
SMS
Back
Short Message Service
Front
WPAD
Back
Web Proxy Auto Discovery
Front
LSASS
Back
Local Security Authority Subsystem Service
Front
SAML
Back
Security Assertion Markup Language
Front
IoT
Back
Internet of Things
Front
WMI
Back
Windows Management Instrumentation
Front
COFF
Back
Common Object File Format
Front
HTTPS
Back
Hypertext Transfer Protocol Secure
Front
PWS
Back
Performance Work Statement
Front
SSO
Back
Single Sign-on
Front
LDAP
Back
Lightweight Directory Access Protocol
Front
CSRF
Back
Cross-site Request Forgery
Front
OpenVAS
Back
Open Vulnerability Assessment Scanner
Front
CVE
Back
Common Vulnerabilities and Exposures
Front
NFC
Back
Near-field Communication
Front
CWE
Back
Common Weakness Enumeration
Front
NSE
Back
Nmap Scripting Engine
Front
OSSTMM
Back
Open-source Security Testing Methodology Manual
Front
CNAME
Back
Canonical Name
Front
API
Back
Application Programming Interface
Front
IP
Back
Internet Protocol
Front
DDos
Back
Distributed Denial of Service
Front
GIF
Back
Graphic Interchange Format
1/138
Includes all acronyms and their definitions that are on the official PenTest+ PT0-003 exam objectives.