What is Network Mapping? Identifying devices and topology in a network. Expanded Explanation Network mapping involves discovering devices, connections, and services within a network to understand its structure and vulnerabilities. Tools like Nmap automate this process for both defensive audits …
What is Network Security? Protecting networks from unauthorized access. Expanded Explanation Network security refers to the policies, practices, and technologies used to defend networks and data from attacks, misuse, or unauthorized access. It includes firewalls, intrusion detection, and access controls. …
What is OSINT (Open Source Intelligence) The practice of collecting and analyzing publicly available information to generate actionable intelligence. Expanded Explanation Open Source Intelligence, or OSINT, refers to the process of gathering data from publicly accessible sources—such as websites, social …
What is out of scope? Assets, systems, or methods explicitly excluded from a bug bounty program’s allowed testing range. Expanded Explanation Testing out-of-scope targets can lead to legal consequences or disqualification. Researchers must review each program’s rules before testing to …
What is OWASP Vulnerabilities? Common web security flaws listed by OWASP. Expanded Explanation OWASP vulnerabilities are the most critical security risks for web applications as identified by the Open Web Application Security Project (OWASP). Examples include SQL injection, XSS, and …
