A mechanism that implements access control for a system resource by listing the identities of the system entities that are permitted to access the resource.
Related
Synonyms:
Access Control List
Related Articles:
- Hack The Box: Complete walkthrough of the Oracle TNS Footprinting lab module.The Hack The Box (HTB) Oracle TNS Footprinting module teaches you how to analyze and potentially exploit the Oracle Transparent Network Substrate (TNS), the Oracle server communication protocol that facilitates communication between Oracle databases and applications over networks. Here's how to derive the solution and capture the flag.
- Linux privilege escalation checklist
- A newly discovered vulnerability, Count(er) Strike, enables unauthorized users to extract sensitive data from the widely used ServiceNow service management suite.A newly discovered vulnerability in ServiceNow, dubbed "Count(er) Strike, allows low-privileged—and in some cases, unauthenticated—users to extract sensitive data from ServiceNow tables, even when they should have no access to that information. With thousands of organizations relying on ServiceNow for workflow automation and sensitive business processes, the potential impact is especially concerning.
- SparTech Software CyberPulse – Your quick strike cyber update for August 11, 2025 1:23 PM
- NFS HackingNetwork File System (NFS), developed by Sun Microsystems, serves a similar purpose to SMB, enabling access to file systems over a network as if they were local. NFS is primarily used between Linux and Unix systems, preventing direct communication between NFS clients and SMB servers. While NFSv3, which has been widely adopted, authenticates client computers, NFSv4 introduces a change, similar to the Windows SMB protocol, requiring user authentication. A notable advantage of NFSv4 over its predecessors is its simplicity in utilizing only one UDP or TCP port (2049), which simplifies the protocol’s use across firewalls.