Bot |
Software application that can be controlles remotely and execute or automate tasks. |
Daisy Chaining |
Gaining access to one system and then use the same information to access other systems. |
Doxing |
Publishing personally identifiable information. |
Exploit |
A defined way to breach the security of an IT system through vulnerability |
Hack Value |
It is the notion among hackers that something is worth doing or is interesting |
Target of Evaluation (TOE) |
An IT system, product, or component that is identified/subjected to a required security evaluation |
Payload |
Part of an exploit that performs the malicious action (destroying, creating backdoor,...) |
Vulnerability |
Existence of a weakness, design, or implementation error that can lead to an unexpected and undesirable event compromising the security of the system |
Zero-Day Attack |
An attack that exploits computer application vulnerabilities before the software developer releases a patch for the vulnerability |