Reference Cheatsheet

Quick reference for acronyms and TCP/UDP ports you need to know for the CPSA exam.

Showing 125 of 125 acronyms

AcronymFull NameMod
CMAComputer Misuse ActUK law criminalising unauthorised computer access (1990)A
DPAData Protection ActUK legislation governing processing of personal data (1998/2018)A
HRAHuman Rights ActUK law β€” Article 8 right to privacy relevant to testing (1998)A
PJAPolice and Justice ActUK amendment to CMA adding DoS offences (2006)A
ROERules of EngagementDocument defining scope, boundaries, and authorisations for a pen testA
NDANon-Disclosure AgreementLegal contract protecting confidential information during assessmentsA
TCPTransmission Control ProtocolConnection-oriented, reliable Layer 4 protocol with three-way handshakeB
UDPUser Datagram ProtocolConnectionless, unreliable Layer 4 protocol β€” faster but no delivery guaranteeB
ICMPInternet Control Message ProtocolUsed for diagnostics (ping, traceroute) and error reportingB
IPInternet ProtocolLayer 3 protocol responsible for addressing and routing packetsB
IPv4Internet Protocol version 432-bit addressing (4.3 billion addresses), dotted-decimal notationB
IPv6Internet Protocol version 6128-bit addressing, hexadecimal colon notation, designed to replace IPv4B
ARPAddress Resolution ProtocolMaps IP addresses to MAC addresses on local network segmentsB
VLANVirtual Local Area NetworkLogical network segmentation at Layer 2 using 802.1Q taggingB
NATNetwork Address TranslationTranslates private IPs to public IPs for internet accessB
ACLAccess Control ListRules on firewalls/routers that permit or deny traffic based on criteriaB
OSIOpen Systems InterconnectionSeven-layer network reference model (Physical through Application)B
TTLTime to LiveIP header field decremented at each hop β€” used for OS fingerprintingB
MTUMaximum Transmission UnitLargest packet size a network link can carry (typically 1500 bytes for Ethernet)B
DESData Encryption StandardLegacy 56-bit symmetric cipher β€” considered insecure, replaced by AESB
3DESTriple Data Encryption StandardApplies DES three times (168-bit effective) β€” deprecated but still foundB
AESAdvanced Encryption StandardCurrent standard symmetric cipher: 128/192/256-bit key lengthsB
RSARivest-Shamir-AdlemanAsymmetric (public key) cryptosystem for encryption and digital signaturesB
RC4Rivest Cipher 4Stream cipher β€” deprecated due to known biases, formerly used in WEP/SSLB
SHASecure Hash AlgorithmFamily of cryptographic hash functions: SHA-1 (160-bit, deprecated), SHA-256/512B
MD5Message Digest 5128-bit hash β€” broken for collision resistance, still used for checksumsB
HMACHash-based Message Authentication CodeUses a hash function with a secret key for message integrity verificationB
SSLSecure Sockets LayerDeprecated predecessor to TLS β€” SSLv2 and SSLv3 are insecureB
TLSTransport Layer SecuritySuccessor to SSL β€” provides encryption, integrity, and authentication for network trafficB
IPsecIP SecuritySuite of protocols securing IP communications (AH for integrity, ESP for encryption)B
SSHSecure ShellEncrypted remote access protocol β€” replaces Telnet, rlogin, rsh (port 22)B
PGPPretty Good PrivacyEmail encryption using public key cryptographyB
WEPWired Equivalent PrivacyBroken wireless encryption using RC4 β€” trivially crackable, never useB
WPAWi-Fi Protected AccessInterim wireless security standard using TKIP β€” superseded by WPA2B
WPA2Wi-Fi Protected Access 2Current wireless security standard using AES-CCMPB
TKIPTemporal Key Integrity ProtocolWPA encryption protocol β€” has weaknesses, replaced by CCMP in WPA2B
IDSIntrusion Detection SystemMonitors network traffic for suspicious activity β€” passive alertingB
IPSIntrusion Prevention SystemActive version of IDS that can block malicious traffic inlineB
PKIPublic Key InfrastructureFramework for managing digital certificates and public key encryptionB
CACertificate AuthorityTrusted entity that issues and signs digital certificatesB
OSINTOpen Source IntelligenceGathering information from publicly available sourcesC
DNSDomain Name SystemTranslates domain names to IP addresses (hierarchical naming system)C
WHOISWHOIS (not an acronym)Protocol/database for querying domain registration and IP allocation dataC
SOAStart of AuthorityDNS record defining the authoritative nameserver and zone parametersC
MXMail ExchangeDNS record specifying mail servers responsible for a domainC
NSName ServerDNS record delegating a zone to an authoritative nameserverC
PTRPointer RecordDNS record for reverse DNS lookups (IP to hostname)C
CNAMECanonical NameDNS alias record pointing one domain name to anotherC
TXTText RecordDNS record for arbitrary text β€” used for SPF, DKIM, domain verificationC
AXFRAuthoritative Zone TransferDNS mechanism to replicate zone data β€” security risk if publicly accessibleC
SPFSender Policy FrameworkDNS TXT record defining authorised email sending servers for a domainC
DKIMDomainKeys Identified MailEmail authentication using digital signatures in DNS TXT recordsC
RIRRegional Internet RegistryOrganisation managing IP address allocation (ARIN, RIPE, APNIC, etc.)C
SNMPSimple Network Management ProtocolUsed to manage/monitor network devices β€” community strings act as passwordsD
TFTPTrivial File Transfer ProtocolSimple file transfer with no authentication (UDP port 69) β€” used for firmware/configD
NTPNetwork Time ProtocolTime synchronisation protocol β€” can be abused for amplification attacksD
CDPCisco Discovery ProtocolCisco proprietary Layer 2 protocol leaking device info β€” should be disabled on edge portsD
HSRPHot Standby Router ProtocolCisco redundancy protocol β€” cleartext authentication can be interceptedD
VRRPVirtual Router Redundancy ProtocolOpen standard for router redundancy β€” similar to HSRPD
VTPVLAN Trunking ProtocolCisco protocol for VLAN management β€” VTP attacks can modify VLAN configs network-wideD
STPSpanning Tree ProtocolPrevents Layer 2 loops β€” STP manipulation can redirect trafficD
TACACS+Terminal Access Controller Access-Control System PlusCisco AAA protocol β€” encrypts full packet body (better than RADIUS)D
RADIUSRemote Authentication Dial-In User ServiceAAA protocol β€” only encrypts password, not entire payloadD
SIPSession Initiation ProtocolVoIP signalling protocol β€” often unencrypted, enabling call interceptionD
RTPReal-time Transport ProtocolCarries actual voice/video data in VoIP β€” can be intercepted and reconstructedD
EAPExtensible Authentication ProtocolAuthentication framework used in wireless (WPA-Enterprise) and 802.1XD
LEAPLightweight EAPCisco proprietary wireless auth β€” broken, vulnerable to dictionary attacksD
PEAPProtected EAPCreates TLS tunnel for inner authentication β€” more secure than LEAPD
DHCPDynamic Host Configuration ProtocolAutomatically assigns IP addresses β€” rogue DHCP servers can redirect trafficD
IKEInternet Key ExchangeProtocol for establishing IPsec security associations (phase 1 & 2)D
PCAPPacket CaptureFile format for captured network traffic β€” analysed with Wireshark/tcpdumpD
ADActive DirectoryMicrosoft directory service for identity management and Group PolicyE
DCDomain ControllerServer running AD that authenticates users and enforces security policyE
FSMOFlexible Single Master OperationsFive AD roles: Schema Master, Domain Naming Master, RID Master, PDC Emulator, Infrastructure MasterE
GCGlobal CatalogueAD server holding a partial copy of all objects in the forest (port 3268/3269)E
GPOGroup Policy ObjectAD mechanism for centrally managing security settings across domain computersE
SMBServer Message BlockFile sharing protocol β€” port 445 (direct) or 139 (over NetBIOS)E
NTLMNT LAN ManagerChallenge-response authentication protocol β€” v1 is weak, v2 is strongerE
LMLAN ManagerLegacy password hash format β€” extremely weak (case-insensitive, split into 7-char halves)E
SAMSecurity Account ManagerWindows database storing local account password hashesE
LDAPLightweight Directory Access ProtocolProtocol for querying and modifying directory services like AD (port 389/636)E
WSUSWindows Server Update ServicesMicrosoft tool for managing and distributing patches across enterprisesE
MBSAMicrosoft Baseline Security AnalyzerTool scanning for missing patches and common security misconfigurationsE
OWAOutlook Web Access/AppWeb-based Exchange email interface β€” common target for password sprayingE
EWSExchange Web ServicesAPI for programmatic access to Exchange mailboxes, calendars, contactsE
RDPRemote Desktop ProtocolMicrosoft remote GUI access protocol (port 3389)E
SIDSecurity IdentifierUnique identifier assigned to each security principal (user, group, computer) in WindowsE
RIDRelative IdentifierThe unique portion of a SID within a domain β€” RID Master allocates RID blocksE
NFSNetwork File SystemUnix file sharing protocol β€” uses UID/GID for access controlF
NISNetwork Information ServiceCentralised user management (formerly Yellow Pages) β€” can leak password dataF
RPCRemote Procedure CallProtocol for executing procedures on remote systems (portmapper on port 111)F
SUIDSet User IDUnix file permission β€” binary runs with file owner privileges (security risk if root-owned)F
SGIDSet Group IDUnix file permission β€” binary runs with file group privilegesF
UIDUser IdentifierNumeric ID for Unix users β€” root is UID 0F
GIDGroup IdentifierNumeric ID for Unix groupsF
SMTPSimple Mail Transfer ProtocolEmail delivery protocol (port 25) β€” VRFY/EXPN commands enable user enumerationF
FTPFile Transfer ProtocolCleartext file transfer (port 21) β€” anonymous access and bounce attacks are risksF
HTTPHyperText Transfer ProtocolFoundation of web communication (port 80) β€” cleartextG
HTTPSHTTP SecureHTTP over TLS (port 443) β€” encrypted web communicationG
SOAPSimple Object Access ProtocolXML-based web service communication protocolG
RESTRepresentational State TransferArchitectural style for web APIs using standard HTTP methodsG
APIApplication Programming InterfaceInterface allowing software components to communicateG
CGICommon Gateway InterfaceLegacy mechanism for dynamic web content β€” executes new process per requestG
ISAPIInternet Server APIIIS extension mechanism β€” filters run in-process with IISG
AJAXAsynchronous JavaScript and XMLClient-side technique for making background HTTP requestsG
XSSCross-Site ScriptingInjection of malicious JavaScript into web pages viewed by othersH
SQLiSQL InjectionInjection of malicious SQL through unsanitised user inputH
XXEXML External EntityAttack exploiting XML parsers to read files or perform SSRFH
CSRFCross-Site Request ForgeryForces authenticated user to perform unintended actions on a web appH
IDORInsecure Direct Object ReferenceAccess control flaw β€” manipulating resource IDs to access other users' dataH
LFILocal File InclusionVulnerability allowing inclusion of local server files via user inputH
RFIRemote File InclusionVulnerability allowing inclusion of remote files β€” enables code executionH
SSRFServer-Side Request ForgeryMaking the server send requests to internal/external resourcesH
CSPContent Security PolicyHTTP header controlling which resources a browser can load β€” mitigates XSSH
HSTSHTTP Strict Transport SecurityHTTP header forcing browsers to use HTTPS onlyH
WAFWeb Application FirewallSecurity appliance filtering malicious HTTP traffic to web applicationsH
OWASPOpen Web Application Security ProjectNon-profit producing web security guidance β€” OWASP Top 10 is widely referencedH
STRIDESpoofing, Tampering, Repudiation, Information Disclosure, DoS, Elevation of PrivilegeMicrosoft threat modelling frameworkH
DOMDocument Object ModelBrowser representation of HTML β€” DOM-based XSS occurs in client-side JSI
BeEFBrowser Exploitation FrameworkTool for hooking browsers via XSS for client-side exploitationI
RDBMSRelational Database Management SystemDatabase system using tables with rows and columns (SQL-based)J
TNSTransparent Network SubstrateOracle network protocol for database communication (port 1521)J
ODBCOpen Database ConnectivityStandard API for database access β€” connection strings contain credentialsJ
OLE DBObject Linking and Embedding DatabaseMicrosoft API for uniform data access across different data storesJ
TDSTabular Data StreamProtocol used by MS SQL Server for client-server communicationJ