What is Coordinated Vulnerability Disclosure (CVD) Coordinated Vulnerability Disclosure (CVD) is a formalized approach to responsibly share details of discovered vulnerabilities. Expanded Explanation CVD frameworks outline how security researchers, vendors, and coordinators like CERTs should communicate during the discovery-to-disclosure timeline. …
What is Corporate Recon Corporate reconnaissance is the process of gathering publicly available information about a company to assess its security posture. Expanded Explanation Related Terms OSINT, Footprinting, People Search, Metadata, Enumeration Want to learn more? If you’re interested in …
What is Credential Dumping? The process of extracting authentication credentials from a compromised system. Expanded Explanation Ethical hackers use tools like Mimikatz or Windows Credential Editor to simulate how attackers steal hashes, plaintext passwords, and Kerberos tickets. These credentials can …
What is Credential Harvesting? The unauthorized collection of login credentials. Expanded Explanation Credential harvesting is a technique used by attackers to gather usernames, passwords, and other authentication data, often through phishing, malware, or fake login portals. These credentials are then …
What is Credential Stuffing? An attack where stolen username/password pairs are used to gain unauthorized access to user accounts across multiple platforms. Expanded Explanation Credential stuffing relies on reused credentials harvested from previous breaches. Automated tools test these credentials at …
What is Cross-Site Scripting (XSS)? A type of injection attack where malicious scripts are injected into otherwise benign websites. Expanded Explanation XSS attacks allow attackers to execute scripts in a user’s browser, potentially stealing cookies, session tokens, or sensitive data. …
