Attackcronyms | Hide and Seek | ||
---|---|---|---|
What is XSS?
Cross Site Scripting
|
What is Encryption?
The purpose of this technique is to transform data in order to keep it secret from others.
|
Blackmail
|
pen test
|
What is OSINT?
Open Source Intelligence
|
What is Encoding?
This technique involves the use of code to change original data into a form that can be used by an external process.
|
Extortion
|
vuln scanning
|
What is MSSP?
Managed Security Services Provider
|
What is Hashing?
This method can be used to provide a forensically sound piece of evidence.
|
Coercion
|
red team1
|
What is CVSS?
Common Vulnerability Scoring System
|
What is Obfuscation?
This is used when trying to keep a secret.
|
Bribery
|
bug bounty
|
What is CSRF?
Cross Site Request Forgery
|
fuzzing
|
||