Bug Bounty Hunting — Complete Guide (Part-40)

4 months ago 35
BOOK THIS SPACE FOR AD
ARTICLE AD

Mehedi Hasan Rafid

Bug Bounty Hunting — Complete Guide
Photo by Digital Buggu: https://www.pexels.com/photo/monitor-displaying-computer-application-374559/

Some important definitions (Starting with “H” alphabet)

Hash: In computing, a hash function is a function that takes input data (often of arbitrary size) and outputs a fixed-size string of bytes, which is typically a cryptographic hash used for data integrity verification or indexing.Head: In HTML, the <head> element is a container for metadata (data about data) about an HTML document, including title, links to stylesheets or scripts, meta information, and more.High-level programming language: A programming language that is designed to be easy for humans to read and write, abstracting away low-level details of the computer’s hardware and operating system.HMAC: Stands for Hash-based Message Authentication Code, which is a mechanism for calculating a message authentication code involving a cryptographic hash function in combination with a secret key.Hoisting: In JavaScript, hoisting is a behavior where variable and function declarations are moved to the top of their containing scope during the compile phase, allowing them to be used before they are declared.Host: In networking, a host can refer to any device connected to a network that has its own unique network address, such as a computer, server, or other networked device.Hotlink: Refers to the practice of linking directly to resources (like images or videos) on another website’s server, without permission, often causing increased bandwidth costs for the original site owner.Houdini: In web development, refers to the Houdini Task Force, which works on defining and implementing new APIs that give developers more control over the browser’s rendering engine.HPKP: Stands for HTTP Public Key Pinning, a security feature that allows websites to instruct browsers to only accept certain public keys for their domain, protecting against certain types of certificate-related attacks.HSTS: Stands for HTTP Strict Transport Security, a web security policy mechanism that helps to protect websites against protocol downgrade attacks and cookie hijacking by forcing HTTPS connections.HTML: Stands for Hypertext Markup Language, which is the standard markup language used for creating web pages and web applications.HTML5: The fifth major revision of the HTML standard, introducing new features like multimedia elements (audio, video), better integration with JavaScript APIs, and improved semantics.HTTP: Stands for Hypertext Transfer Protocol, which is the protocol used for transmitting data over the World Wide Web.HTTP header: In HTTP, headers are additional pieces of information sent along with requests or responses between a client and a server, containing metadata about the message.HTTP/2: The second major version of the HTTP network protocol, designed to improve website loading speed and efficiency by introducing features like multiplexing and header compression.HTTP/3: The third major version of the HTTP network protocol, designed to improve performance further by using the QUIC transport protocol, which aims to reduce latency and improve security.HTTPS: Stands for Hypertext Transfer Protocol Secure, which is the secure version of HTTP, using encryption (typically TLS/SSL) to secure data transmitted between a client and a server.HTTPS RR: Stands for HTTPS Resource Record, a DNS record type that associates an HTTPS website with a public key, allowing browsers to authenticate HTTPS connections more securely.Hyperlink: Also known as a link or web link, it is a reference to data that the reader can directly follow, either by clicking or tapping, typically used to navigate between web pages.Hypertext: Refers to text that contains links to other texts or multimedia content, allowing non-linear navigation and interaction with information.
Read Entire Article