Security Glossary
Comprehensive glossary of security terms, fuzzing concepts, and web application testing terminology.
A
Testing API endpoints with various inputs to discover vulnerabilities, undocumented endpoints, or parameter injection points.
Related Terms:
B
A trial-and-error method used to obtain information such as passwords or directories by systematically checking all possible combinations.
Related Terms:
C
The process of finding hidden files, directories, or resources on a web server that are not directly linked or referenced.
Related Terms:
D
A web security vulnerability that allows attackers to read arbitrary files on the server by manipulating file path references.
Related Terms:
F
A software testing technique that involves providing invalid, unexpected, or random data as inputs to a computer program to find coding errors and security loopholes.
Related Terms:
Fast web fuzzer written in Go. A tool used for web application security testing through fuzzing various elements like directories, files, parameters, and more.
Related Terms:
In FFUF, criteria used to exclude unwanted responses from results, opposite of matchers.
Related Terms:
H
Three-digit codes returned by web servers indicating the result of an HTTP request. Used in fuzzing to filter and identify interesting responses.
Related Terms:
Request methods like GET, POST, PUT, DELETE used in HTTP protocol. Fuzzing different methods can reveal hidden functionality.
Related Terms:
M
In FFUF, criteria used to identify interesting responses, such as matching specific status codes, sizes, or content patterns.
Related Terms:
P
The process of testing web application parameters with various inputs to discover vulnerabilities, hidden functionality, or unexpected behavior.
Related Terms:
The data or input being tested during fuzzing operations, typically read from wordlists or generated programmatically.
Related Terms:
R
Technique used to filter fuzzing results based on criteria like status codes, response size, word count, or response time to identify significant findings.
Related Terms:
A technique to control the number of requests sent to a server within a specific timeframe, preventing server overload during fuzzing operations.
Related Terms:
A fuzzing technique where discovered directories are automatically fuzzed again to find deeper nested resources and paths.
Related Terms:
The process of examining server responses during fuzzing to identify patterns, anomalies, and potential security issues.
Related Terms:
S
The process of discovering subdomains of a target domain to identify additional attack surfaces and potential vulnerabilities.
Related Terms:
V
A method for hosting multiple domain names on a single server. vHost fuzzing helps discover hidden subdomains or applications on a web server.
Related Terms:
W
A file containing a list of words, paths, or values used as input for fuzzing operations. Common wordlists include directories, subdomains, usernames, and passwords.
Related Terms:
A security solution that monitors and filters HTTP traffic to protect web applications from attacks. Can interfere with fuzzing operations.
Related Terms:
Ready to apply these concepts?
Try our FuFF Generator to create powerful fuzzing commands for your web application security testing.
Try FuFF Generator