Bug Bounty Hunting — Complete Guide (Part-35)

4 months ago 54
BOOK THIS SPACE FOR AD
ARTICLE AD

Mehedi Hasan Rafid

Bug Bounty Hunting — Complete Guide
Photo by Digital Buggu: https://www.pexels.com/photo/monitor-displaying-computer-application-374559/

Some important definitions (Starting with “C” alphabet)

Cache: A hardware or software component that stores data temporarily to reduce data retrieval time and improve performance.Cacheable: Refers to data or resources that can be stored in a cache, usually for faster access in subsequent requests.CalDAV: An extension of the WebDAV protocol that allows clients to access calendar data stored on a remote server.Call stack: A stack data structure that stores information about the active subroutines of a computer program, used for function call management.Callback function: A function that is passed as an argument to another function and is executed after some event or operation completes.Camel case: A naming convention where words are concatenated without spaces, and each word (except the first) starts with a capital letter, e.g., camelCase.Canonical order: A standard or prescribed order used to represent or process data consistently, especially in cryptography or sorting algorithms.Canvas: An HTML5 element used for drawing graphics dynamically using JavaScript.Card sorting: A UX research method where users organize content into groups, helping to understand how information should be structured and presented.CardDAV: An extension of the WebDAV protocol for accessing contact information stored on a remote server.Caret: A blinking cursor or insertion point that indicates where text will be inserted in a document or text box.CDN (Content Delivery Network): A distributed network of servers that delivers web content to users based on their geographic location, improving performance and reliability.Certificate authority: A trusted entity that issues digital certificates used to authenticate the identity of websites and individuals in online transactions.Certified: Refers to software or hardware that has been officially tested and confirmed to meet certain standards or specifications.Challenge-response authentication: A method of authentication where one party challenges the other to provide proof of identity, typically used in security protocols.Character: A symbol or glyph used in writing or printing, such as letters, numbers, punctuation marks, or special symbols.Character encoding: A method used to represent characters as bytes in digital systems, ensuring compatibility between different systems and languages.Character reference: A code or sequence used to represent a character in markup languages like HTML, often used for special characters or symbols.Character set: A defined collection of characters used by a particular system or language, such as ASCII, Unicode, or ISO-8859–1.Chrome: Refers to the Google Chrome web browser.CIA (Confidentiality, Integrity, Availability): The three fundamental principles of information security.Cipher: An algorithm used for encryption and decryption, converting plaintext into ciphertext and vice versa.Cipher suite: A set of cryptographic algorithms used for securing network connections, including encryption, authentication, and key exchange protocols.Ciphertext: The encrypted form of plaintext, produced by applying a cipher algorithm using a key.Class: In object-oriented programming, a blueprint for creating objects, defining attributes (data) and methods (functions) that the objects can perform.Clickjacking: A malicious technique where an attacker tricks a user into clicking on something different from what the user perceives, often done by overlaying transparent elements over legitimate content.Closure: A feature of programming languages where a function has access to its own scope, including variables and parameters of its outer function.CMS (Content Management System): A software application used to create, manage, and modify digital content typically used for websites.Code point: A numerical value that represents a character in a character set or encoding, such as Unicode.Code splitting: A technique in programming to split code into smaller bundles that can be loaded independently, typically to optimize performance.Code unit: A fundamental unit of code, such as a character in text encoding or a byte in binary code.Codec: A device or software that compresses or decompresses digital data for transmission or storage.Color space: A specific organization of colors, defined by mathematical models, used in digital imaging or graphics.Color wheel: A circular arrangement of colors, typically used in art and design to illustrate color relationships.Compile: The process of converting source code written in a programming language into machine-readable code or executable software.Compile time: The time during which a program is translated from source code into machine code by a compiler.Composite operation: In computer graphics, combining multiple graphic elements together to form a final image or display.Computer Programming: The process of designing and building executable computer programs to accomplish specific tasks.Conditional: A programming construct that executes different actions based on whether a specific condition evaluates to true or false.Constant: A value that does not change during program execution.Constructor: A special type of method in object-oriented programming used for initializing objects when they are created.Continuous Media: Digital content such as audio, video, or animations that require continuous transmission for playback.Control flow: The order in which instructions in a program are executed, typically influenced by conditional statements and loops.Cookie: A small piece of data sent from a website and stored on the user’s device to track user activity or preferences.Copyleft: A licensing scheme that allows software to be freely used, modified, and distributed, provided that derivative works are also freely available.CORS: Cross-Origin Resource Sharing, a security feature that allows web servers to specify who can access their resources.CORS-safelisted request header: HTTP headers that can be safely sent cross-origin without triggering a CORS preflight request.CORS-safelisted response header: HTTP headers that a server may expose to the client without requiring a CORS preflight request.Crawler: A program used by search engines to systematically browse and index web pages.Credential: Information used to authenticate and verify a user’s identity, such as usernames and passwords.CRLF: Carriage Return Line Feed, a sequence of control characters used to mark the end of a line of text in computing.Cross Axis: In web design, the axis perpendicular to the main axis in a flexbox or grid layout.Cross-site scripting (XSS): A type of security vulnerability in web applications where malicious scripts are injected into otherwise trusted websites.CRUD: Acronym for Create, Read, Update, Delete, representing the basic operations of persistent storage in databases or applications.Cryptanalysis: The study of methods for obtaining the plaintext or key from encrypted data without knowing the correct key.Cryptographic hash function: A mathematical algorithm that maps data of arbitrary size to a fixed-size output, used in digital signatures and data integrity verification.Cryptography: The practice and study of techniques for secure communication and data protection in the presence of third parties.CSP: Content Security Policy, an added layer of security that helps prevent cross-site scripting (XSS) and other code injection attacks.CSRF: Cross-Site Request Forgery, an attack where a malicious website tricks a user’s web browser into performing actions on a different website to which the user is authenticated.CSS: Cascading Style Sheets, a style sheet language used for describing the presentation of a document written in HTML or XML.CSS Object Model (CSSOM): A programming interface for accessing and manipulating the CSS styles of a document.CSS pixel: A unit of measurement in CSS, which does not correspond directly to a physical pixel on the screen.CSS preprocessor: A scripting language that extends CSS by adding features like variables, nesting, and mixins, which are then compiled into regular CSS.Cumulative Layout Shift (CLS): A metric that quantifies how much content visually shifts during page load, affecting user experience.
Read Entire Article