Computer/Hacking Lingo Examples

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/151

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

152 Terms

1
New cards

0-day (Zero-day)

We treated the issue like a 0-day until a vendor fix was available

2
New cards

0wned / Pwned

After the credential leak, several accounts were reported as pwned

3
New cards

2FA Fatigue / MFA Fatigue

MFA fatigue attacks are harder when users verify prompts and use number matching

4
New cards

A
Account Takeover (ATO)

We reset sessions to contain a suspected account takeover

5
New cards

Allowlist

We allowlisted only the build server IPs for the admin portal

6
New cards

APT (Advanced Persistent Threat)

The report described the campaign as an APT-style intrusion

7
New cards

Attack Graph

The attack graph showed a path from a low-privilege VM to the database

8
New cards

Attack Surface

Disabling unused endpoints reduced our attack surface

9
New cards

Attack Vector

The likely attack vector was a stolen password reused across services

10
New cards

Beaconing

We flagged the host for regular beaconing to an unfamiliar domain

11
New cards

BEC (Business Email Compromise)

Finance used a call-back process to prevent BEC payment fraud

12
New cards

Bikeshedding

We stopped bikeshedding about button colors and focused on the security bug

13
New cards

Black Hat

The conference talk contrasted black hat tactics with defensive testing

14
New cards

Blacklist / Blocklist

We blocklisted the malicious domain across DNS and proxy controls

15
New cards

Blast Radius

Segmenting the network limited the blast radius of the incident

16
New cards

Blue Team

The blue team wrote a new detection rule based on the incident

17
New cards

Bohrbug

This crash was a Bohrbug

18
New cards

Bot Mitigation

Rate limits and CAPTCHAs are part of our bot mitigation strategy

19
New cards

Botnet

The provider warned that a botnet was driving the traffic spike

20
New cards

Brute Force

We used a brute force search as a baseline before optimizing

21
New cards

Bug Bounty Hunter

A bug bounty hunter responsibly disclosed the issue to our security team

22
New cards

Butt-Driven Development (DDD)

He used Butt-Driven Development to confirm the code path was running

23
New cards

C
C2 / C&C (Command and Control)

EDR flagged traffic consistent with command-and-control behavior

24
New cards

Callback

The malware tried a callback every five minutes

25
New cards

Canary

Our canary token alerted us that the file share was being probed

26
New cards

Cargo Cult Programming

We removed the cargo cult retry loop and added real error handling

27
New cards

CSPM

CSPM reported several storage buckets were publicly accessible

28
New cards

CTF (Capture the Flag)

We used a CTF exercise to practice incident triage

29
New cards

CVE

The patch note referenced a CVE affecting the library

30
New cards

CVSS

We prioritized fixes using CVSS plus our own threat model

31
New cards

CWPP

CWPP helped us spot a suspicious process in a container

32
New cards

D
DAST

DAST caught an auth bypass that static analysis missed

33
New cards

DDoS

The site slowed during a DDoS, but the CDN absorbed most of it

34
New cards

Defense in Depth

Defense in depth meant the stolen password still needed MFA to work

35
New cards

Detections-as-Code

We reviewed detections-as-code changes in pull requests

36
New cards

DFIR

DFIR collected memory images for deeper analysis

37
New cards

DMZ

Public web servers live in the DMZ, not on the internal network

38
New cards

Drift

Config drift caused the firewall rule to reappear after a reboot

39
New cards

Dropper

The dropper was blocked before it could fetch the next stage

40
New cards

Duck Debugging (Rubberducking)

While rubberducking, she noticed the variable was never initialized

41
New cards

E
East-West Traffic

Microsegmentation helped control east-west traffic

42
New cards

Edge Case

The bug only appeared on an edge case input with an empty list

43
New cards

EDR / XDR

EDR quarantined the host after detecting a suspicious binary

44
New cards

Eradication

After containment, eradication focused on removing persistence

45
New cards

Exfiltration (Exfil)

DLP alerts suggested possible exfiltration to a personal email

46
New cards

Exploit

The vendor said no exploit was seen in the wild yet

47
New cards

Exploit Chain

The incident used an exploit chain combining misconfig and a known CVE

48
New cards

F
Fail Closed

We chose fail-closed behavior for authorization checks

49
New cards

Fail Open

The service failed open during an outage, which was a serious flaw

50
New cards

False Negative

We added more telemetry to reduce false negatives in detections

51
New cards

False Positive

We tuned the rule to cut down on false positives

52
New cards

Flaky Test

We quarantined the flaky test until it was fixed

53
New cards

Footgun

Default admin access is a footgun for new deployments

54
New cards

G
God Object

The API client became a god object with hundreds of methods

55
New cards

Gray Hat

The discussion explained why gray hat testing can still cause harm

56
New cards

H
Hands-on-Keyboard

The logs showed hands-on-keyboard commands after the initial alert

57
New cards

Happy Path

The demo worked on the happy path but failed on bad inputs

58
New cards

Hardcoding

We removed hardcoded secrets and loaded them from a secrets manager

59
New cards

Hardening

OS hardening disabled unused services and weak ciphers

60
New cards

Heisenbug

Adding debug prints made the Heisenbug disappear

61
New cards

Honeypot

The honeypot recorded brute-force attempts on SSH

62
New cards

Honeytoken

We planted a honeytoken in the folder to detect unauthorized access

63
New cards

Hooker Code

That unhandled callback was hooker code that crashed the service

64
New cards

I
IaC (Infrastructure as Code)

IaC made it easy to review firewall changes

65
New cards

IAM

We fixed the issue by tightening IAM permissions

66
New cards

IdP (Identity Provider)

SSO was down because the IdP had an outage

67
New cards

Indicators of Attack (IOAs)

An IOA was repeated failed logins followed by a successful one

68
New cards

Indicators of Compromise (IOCs)

We searched logs for the published IOCs

69
New cards

Initial Access

Phishing was the suspected initial access method

70
New cards

Insider Threat

The policy addresses insider threat and accidental data leaks

71
New cards

IR (Incident Response)

During IR we focused on containment before cleanup

72
New cards

J
Jenga Code

No one touched the ancient module because it was Jenga code

73
New cards

K
Kill Chain

We mapped our detections to the kill chain stages

74
New cards

L
Lasagna Code

The service had lasagna code with too many wrappers

75
New cards

Lateral Movement

Network logs suggested lateral movement via remote admin tools

76
New cards

Least Privilege

Least privilege prevented the compromised account from accessing billing

77
New cards

Living off the Land (LotL / LOLBins)

The attacker lived off the land using native admin utilities

78
New cards

Loader

The loader was blocked when it tried to download its next component

79
New cards

M
Magic Number / Magic String

We replaced the magic number with a named constant

80
New cards

Malware

Our scanner detected malware in the email attachment

81
New cards

Misconfiguration

The data exposure was caused by a storage misconfiguration

82
New cards

MITRE ATT&CK

We mapped the incident to MITRE ATT&CK techniques

83
New cards

N
N-day

The breach exploited an N-day because the server was not patched

84
New cards

Noise

We tuned the dashboard to reduce noise

85
New cards

North-South Traffic

The proxy logs showed unusual north-south traffic at midnight

86
New cards

O
OpSec

Good OpSec includes rotating credentials and limiting exposed metadata

87
New cards

OSINT

OSINT helped us find the leaked key in a public repository

88
New cards

Over-permissioned

The service account was over-permissioned and needed cleanup

89
New cards

Owned

The admin laptop was likely owned based on the forensic results

90
New cards

P
Packers

The binary looked packed, so we ran it in a safe sandbox

91
New cards

Patch Tuesday

We schedule maintenance after Patch Tuesday to apply updates

92
New cards

Payload

The payload attempted to encrypt local files, so we isolated the host

93
New cards

Pentester

The pentester reported a privilege issue with clear remediation steps

94
New cards

Persistence

We looked for persistence mechanisms in startup tasks and services

95
New cards

Phishing

The training taught employees how to spot phishing emails

96
New cards

Pivot

The attacker tried to pivot from a dev VM into production

97
New cards

PoC (Proof of Concept)

We validated the report with a PoC in a test environment

98
New cards

Postmortem / RCA

The postmortem identified missing monitoring as a key factor

99
New cards

Pretexting

The caller used pretexting to impersonate IT support

100
New cards

Privilege Escalation (PrivEsc)

Patching the kernel closed the privilege escalation path