PenetrationTestingAuthorized simulated cyber attack
VulnerabilitySecurity weakness that can be exploited
ExploitCode or technique that takes advantage of vulnerability
PayloadCode executed after successful exploit
ShellCommand-line access to compromised system
PrivilegeEscalationGaining higher access than initially obtained
EnumerationGathering information about target
CTFCapture The Flag - security competition