Nov. 9, 2022, 11:49 p.m. | jmau111⭐

DEV Community dev.to

Last time, we saw very common hacking terms:










Hacker slang explained


jmau111⭐ ・ Aug 28 ・ 5 min read



#security
#beginners
#vocabulary
#rtfm




This time, let's explain more specific expressions.





Never trust user inputs


Developers must not take things for granted and process submitted forms and other interactions blindly.


Otherwise, the system will be prone to various injections (e.g., SQL, XSS), leading to stolen credentials and other very bad outcomes.


Hackers always look for unintended uses.





Low-hanging fruit


Whether it's …

advanced beginners ctf cybersecurity explained hacker vocabulary

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Systems Security Officer (ISSO) (Remote within HR Virginia area)

@ OneZero Solutions | Portsmouth, VA, USA

Security Analyst

@ UNDP | Tripoli (LBY), Libya

Senior Incident Response Consultant

@ Google | United Kingdom

Product Manager II, Threat Intelligence, Google Cloud

@ Google | Austin, TX, USA; Reston, VA, USA

Cloud Security Analyst

@ Cloud Peritus | Bengaluru, India