Range check
Range check: A validation process used to ensure that a given value falls within a specified range. It helps prevent out-of-range values from being accepted in programming and data entry. Examples include verifying that a password meets minimum length requirements or confirming that a user-entered age is within an acceptable range.
Probabilistic method
Probabilistic method: A mathematical approach to solving problems by calculating the likelihood of different outcomes based on probability. It is used in data analysis, machine learning, and other fields to predict and analyze trends and patterns. Examples include Bayesian analysis, Markov chain models, and Monte Carlo simulations.
Port Scan/Scanner
Port Scan/Scanner: A method that is used to detect open ports and services available on a network host. Sending client requests to server port addresses helps to identify vulnerabilities or confirm that security policies are functioning as expected. While it can be a valuable tool for network administrators in securing their own systems, port scanning […]
Penetration testing – Scanning
Penetration testing – Scanning: The process of analyzing the target system, network, or application for specific vulnerabilities that can be exploited. Tools such as vulnerability scanners and port scanners are used to identify open ports and detect live systems, services used by hosts, and other potential points of entry. This process provides valuable data, which […]
Penetration testing – Discovery
Penetration testing – Discovery: The process of gathering as much information as possible about the target system, network, or application. This could include data about IP addresses, domain details, user inputs, network mapping, and more. The intention here is to identify potential vulnerabilities or weak spots that can be targeted during the test, often utilizing […]
Penetration testing – Exploitation
Penetration testing – Exploitation: A phase of a penetration test where identified vulnerabilities are actually attacked. The tester attempts to exploit these vulnerabilities in a controlled manner to emulate potential attacks an actual hacker could perform. The goal of this phase is not to cause damage but rather to understand the depth of access an […]