
communicate to developers, and product-managers. not other pentesters
As pentesters, we all have a tendency to use technical jargon only security professionals can understand. Many pentesters fall into this trap. The real target audience like developers, engineers, and product managers find these reports cryptic. For them, the situation is similar to a Doctor's handwriting.

the trap - source: dribbble.com/shots/4948077-Super-Venus-Fly-Brothers
You can get out-of-this trap easily. When you use the following big-words in the report, follow it with a simplified version in the description section or on the appendix section. Please find some examples below:
jargon | alternative simple versions |
---|---|
reflected xss |
temporary front-end javascript injection temporary front-end javascript malware injection temporary front-end javascript malware execution temporary javascript injection temporary malicious javascript injection run-time javascript injection temporary client-side javascript injection |
stored xss |
permanent front-end javascript injection permanent front-end javascript malware injection front-end javascript injection with attack-code stored in the database front-end javascript injection with database as malware-source front-end malicious javascript injection with database as malware-source front-end javascript malware execution with attack-code stored in the database front-end javascript malware execution with attack-code stored in the file-storage |
brute force attack | trial and error attack password-guessing attack |
horizontal privilege escalation | cross-account access attack |
vertical privilege escalation | access amplification attack |
session fixation | pre-auth and post-auth cookies are same |
cross-site request forgery | unintended form submission |
cross-site request forgery | unintended action attack |
cross-site request forgery | malicious form submission attack |
verbose error message | sensitive information leaked in error messages |
vertical privilege escalation in admin page | non-admin users can access admin page |
horizontal privilege escalation in edit-profile page | employees can edit profile of other employees |
server-side request forgery | server proxy attacks |
insecure deserialization | untrusted data processing malicious data conversion |
buffer overflow | memory overflow |
clickjacking | hidden click attack fake click attack ui deception attack click spoofing attack |
denial of service | service disruption attack traffic flooding attack system overload attack resource exhaustion attack |
spoofing attack | identitiy faking attack impersonation attack deception attack |
drive by attack | stealth download attack hidden malware attack silent code attack |
shoulder surfing | peeking attack screen snooping attack |
phishing attack | scam message attack fake website attack scam phone-call attack |
credential stuffing | credential reuse password reuse |
supply chain attack | vendor compromise attack trusted source sabotage attack third-party breach attack |
penetration test | cyberattack imitation test cyberattack simulation test |
vulnerability assessment | security weakness evaluation system flaw analysis cyberattack prevention check |
rate limiting | web-traffic control web-traffic capping |
rate limiting | web-traffic control web-traffic capping |
load balacing | web-traffic distribution |
proxy server | web mediator |
regular expression | pattern matching |
remote code execution | malicious actor can run their code on the back-end server |
remote command execution | malicious actor can run operating-system commands on the back-end server |
authentication | identity verification identity check |
authorization | access control permission check |
sast scanner | code security checking software |
sast scanner | code security checking software |
dast scanner | web-application front-end security checker software |
Our goal here is to reduce the entry-barrier for people to understand the security issues. However, we also should enable them to do their own research. Do not completely replace the currently used, popular terminologies with the new one. It can confuse people, would make performing research difficult (think of a developer trying to find more information about cross-site scripting attacks by searching for 'client-side script injection'), and can defeat our goal.