What is Red Team? A group of ethical hackers that simulate real-world attacks to test an organization’s defenses. Expanded Explanation Red Teams use the same tactics as malicious hackers, including social engineering, exploitation, and lateral movement. Their goal is to …
What is Remote Access Trojan (RAT)? Malware that provides an attacker with complete control over a target system remotely. Expanded Explanation RATs are often used to monitor user behavior, steal credentials, or install additional malicious tools. In ethical hacking, red …
What is Reproduction Steps? Detailed instructions in a bug report that allow the reviewer to recreate the issue. Expanded Explanation Clear reproduction steps improve triage speed and increase the chance of a reward. They typically include environment details, payloads, screenshots, …
What is Responsible Disclosure? A security vulnerability reporting process that allows ethical hackers to safely share findings with affected organizations. Expanded Explanation >Responsible disclosure ensures that vulnerabilities are reported confidentially and fixed before being made public. It encourages trust between …
What is Reverse Image Search A search technique that uses an image as the query to find similar or matching content across the web. Expanded Explanation Reverse image search tools like Google Images or TinEye help OSINT practitioners verify identities, …
What is Reverse Shell? A type of shell where the target machine opens a connection to the attacker’s machine, allowing remote command execution. Expanded Explanation A reverse shell is used when the attacker cannot directly connect to the target due …
