What is Port Scanning? Identifying open ports on a target system. Expanded Explanation Port scanning is used to discover services running on a system by probing its network ports. It helps attackers or security professionals assess vulnerabilities or identify unauthorized …
What is Post-Exploitation? The phase of an attack where the attacker maintains access, escalates privileges, and explores the target system after a successful exploit. Expanded Explanation In ethical hacking, post-exploitation is used to assess how much damage an attacker could …
What is Pretexting? Fabricating a scenario to deceive a target. Expanded Explanation Pretexting is a social engineering method where attackers create a convincing story or identity to manipulate someone into revealing confidential information. It is often used in phishing or …
What is Private Program? An invite-only bug bounty program accessible only to selected researchers. Expanded Explanation Private programs are used by organizations to limit exposure and manage risk while still benefiting from external testing. Researchers are selected based on reputation …
What is Privilege Escalation? A technique used to gain higher-level permissions on a system than initially granted. Expanded Explanation In penetration testing, privilege escalation is performed after initial access is gained. It involves exploiting misconfigurations, weak permissions, or known vulnerabilities …
What is Privilege Separation A security practice that separates processes based on privilege levels to limit damage in case of compromise. Expanded Explanation By dividing services into components with different permissions, privilege separation minimizes the impact of a breach. Ethical …
