skip to main |
skip to sidebar
TERMINOLOGIES OF ETHICAL HACKING
What is the terminologies in ethical hacking?
Here are a few key terms that you will hear in discussion about hackers and what they do:
1-Backdoor-A secret pathway a hacker uses to gain entry to a computer system.
2-Adware-It is the softw-are designed to force pre-chosen ads to display on your system.
3-Attack-That action performs by a attacker on a system to gain unauthorized access.
4-Buffer Overflow-It is the process of attack where the hacker delivers malicious commands to a system by overrunning an application buffer.
5-Denial-of-Service attack (DOS)-A attack designed to cripple the victim's system by preventing it from handling its normal traffic,usally by flooding it with false traffic.
6-Email Warm-A virus-laden script or mini-program sent to an unsuspecting victim through a normal-looking email message.
7-Bruteforce Attack-It is an automated and simplest kind of method to gain access to a system or website. It tries different combination of usernames and passwords,again & again until it gets in from bruteforce dictionary.
8-Root Access-The highest level of access to a computer system,which can give them complete control over the system.
9-Root Kit-A set of tools used by an intruder to expand and disguise his control of the system.It is the stealthy type of software used for gain access to a computer system.
10-Session Hijacking- When a hacker is able to insert malicious data packets right into an actual data transmission over the internet connection.
11-Phreaker-Phreakers are considered the original computer hackers who break into the telephone network illegally, typically to make free longdistance phone calls or to tap lines.
12-Trojan Horse-It is a malicious program that tricks the computer user into opening it.There designed with an intention to destroy files,alter information,steal password or other information.
13-Virus-It is piece of code or malicious program which is capable of copying itself has a detrimental effect such as corrupting the system od destroying data. Antivirus is used to protect the system from viruses.
14-Worms-It is a self reflicating virus that does not alter files but resides in the active memory and duplicate itself.
15-Vulnerability-It is a weakness which allows a hacker to compromise the security of a computer or network system to gain unauthorized access.
16-Threat-A threat is a possible danger that can exploit an existing bug or vulnerability to comprise the security of a computer or network system. Threat is of two types-physical & non physical.
17-Cross-site Scripting-(XSS) It is a type of computer security vulnerability found in web application.It enables attacker to inject client side script into web pages viwed by other users.
18-Botnet-It is also known as Zombie Army is a group of computers controlled without their owner's knowledge.It is used to send spam or make denial of service attacks.
19-Bot- A bot is a program that automates an action so that it can be done repeatedly at a much higher rate for a period than a human operator could do it.Example-Sending HTTP, FTP oe Telnet at a higer rate or calling script to creat objects at a higher rate.
20-Firewall-It is a designed to keep unwanted intruder outside a computer system or network for safe communication b/w system and users on the inside of the firewall.
21-Spam-A spam is unsolicited email or junk email sent to a large numbers of receipients without their consent.
22-Zombie Drone-It is defined as a hi-jacked computer that is being used anonymously as a soldier or drone for malicious activity.ExDistributing Unwanted Spam Emails.
23-Logic Bomb-It is a type of virus upload in to a system that triggers a malicious action when certain conditions are met.The most common version is Time Bomb.
24-Shrink Wrap code-The process of attack for exploiting the holes in unpatched or poorly configured software.
25-Malware-It is an umbrella term used to refer a variety of intrusive software, including computer viruses,worms,Trojan Horses,Ransomeware,spyware,adware, scareware and other malicious program.
Follow me on instagram-anoymous_adi
Related posts
Blog Archive
-
▼
2020
(364)
-
▼
August
(97)
- DEFINATION OF HACKING
- Linux Command Line Hackery Series - Part 4
- JoomlaScan - Tool To Find The Components Installed...
- Wirelurker For OSX, iOS (Part I) And Windows (Part...
- TERMINOLOGIES OF ETHICAL HACKING
- QakBot Banking Trojan Returned With New Sneaky Tri...
- CLOUDKiLL3R - Bypasses Cloudflare Protection Servi...
- Hacking Windows 95, Part 2
- Change Passwords Regularly - A Myth And A Lie, Don...
- Reversing Rust String And Str Datatypes
- Get Lifetime Access To 1000+ Premium Online Traini...
- Russian Arrested After Offering $1 Million To U.S....
- Wirelurker For OSX, iOS (Part I) And Windows (Part...
- Nipe - A Script To Make TOR Network Your Default G...
- System Hacking: Password Cracking Techniques And T...
- Video Archives Of Security Conferences And Workshops
- Medusa: A Speedy, Parallel And Modular Login Brute...
- Webkiller Tool | Information Gathering | Github
- DSploit
- BeEF: Browser Exploitation Framework
- Amnesia / Radiation Linux Botnet Targeting Remote ...
- USE OF CRYPTOGRAPHY IN HACKING
- A Google Drive 'Feature' Could Let Attackers Trick...
- WHAT IS ETHICAL HACKING
- How To Hack Facebook By Social Engineering Attack
- Learning Web Pentesting With DVWA Part 2: SQL Inje...
- DOWNLOAD OCTOSNIFF 2.0.3 FULL VERSION – PLAYSTATIO...
- LEGALITY OF ETHICAL HACKING
- Postales Mágicas En MyPublicInbox
- Santos Mateos Publica Nuevo Estudio Sobre Gestión ...
- SubOver - A Powerful Subdomain Takeover Tool
- 12 De Julio: El Día Del Abogado En México
- BASIC OF CAND C++ PRograming Langauage
- El Sábado II Concierto Didáctico De La Banda De Mú...
- Leticia Romero Regresa Hoy Al Trabajo Colectivo De...
- Documentación Informativa Auxiliar
- 3 Herramientas De Google Útiles Para Creadores De ...
- Leonora Cohen, La Sufragista De La Torre De Londres
- LUDOTECA MUNICIPAL
- Ya Tenemos Plástico En Los Tejidos Y Órganos
- CINCO DETALLES SOBRE LENIN QUE SIGUEN SIENDO UN EN...
- MONCOVIL CONTINÚA CON SU GIRA DE VERANO
- Jamás Nuestra Mirada Será Tan Importante... Jamás ...
- Human Scale: El Retorno De Una Herramienta Irrempl...
- Estos Son Los 15 Pueblos Más Bonitos De Los Cotswolds
- Pasen A Escuchar Los Podcast De BCN Radio
- La «Declaración De Ginebra» De Los Derechos Del Ni...
- La Ciencia Ante El Desafío De La #COVID19 (DÍA 2)
- Las (Falsas) Coincidencias Entre Lincoln Y Kennedy
- EYA - Monastrell - Ecológico Y Vegano
- Rolle (Suiza)
- Estos Son Los 15 Pueblos Más Bonitos De Los Cotswolds
- Medioambiente (XXXVII): El Control De Movimientos ...
- VIETNAM 24: Ho Chi Minh II, Templo Cao Dai Y Túnel...
- METEORITO / LAS HUELLAS DE SU MAGNETISMO
- Los Procedimientos Legislativos En La Unión Europea
- LOS SARCÓFAGOS DE BETHESDA, EL MENSAJE PALEOCRISTI...
- Parque De María Luisa De Sevilla En Cuarentena
- VIDEO LA REFORMA RELIGIOSA
- La Vacuna Eres Tú
- Sobre El Marco Jurídico General Para La Utilizació...
- Necrológicas
- Una Visita Al Real Monasterio De Santa María De La...
- Monumento, Jardín, Conjunto, Sitio Y Zona
- Dana Prefiere Que GSP Se Mantenga Retirado: “Acaba...
- Mujeres 5 | Isabel Ruiz Ruiz
- Nota En EL MERCURIO 11 De Julio De 2019
- 20 Ciudades Que Ganan (Aun Más) Desde Las Alturas
- VIDEO ETAPAS DE LA PRIMERA GUERRA MUNDIAL
- Como Hacer Diseño Participativo On-Line: Mesa De L...
- Damas Asesinas | Tori Telfer
- Dos Visitas Indispensables En Los Alrededores De B...
- Gilbert Meléndez Es Suspendido Tras Dar Positivo E...
- El Belén Viviente Del Campo De Gibraltar En Pelayo
- Desmontando Bulos (IV): De Un Rey Sucio Y Un Mal E...
- La Junta De Andalucía Declara Bien De Interés Cult...
- ¿Viajas Al Lago Di Como? Lee Esto Primero
- (Vídeo) Ahmad Al Darmaki Es Descalificado Luego De...
- Tour Por El Dolby Theater, El Lugar En El Que Se F...
- Reseña: Permiso Para Amar - Lavyrle Spencer
- Norte De Israel. Galilea. 2D/1N
- Maria Montessori | Magela Ronda Y Leire Salaberria
- Viviendo Moscú En 5 Días. Abril 2016.
- LA PINTURA IMPRESIONISTA
- SISTEMA SOLAR / ESTRUCTURAS VOLCÁNICAS ACTIVAS
- El Encanto De Belén. Palestina (Enero 2015)
- Reseña: Saga Delirium - Lauren Oliver
- Las Cinco Zonas Libres De Armas Nucleares (ZLAN)
- Envió Un Mensaje A Su Hermana Avisando Que Se Iba ...
- La Leyenda Del "Banquete De Las Castañas", La Mayo...
- Nuevas Tendencias: La Era De Las Marcas Periodísticas
- Reseña: La Voz De Archer - Mia Sheridan
- ASCM Instalará Una Puerta Automática En Su Sede, G...
- DISCURSO DE CHUCHILL EN FULTON EN MARZO DE 1946 ("...
- Cádiz, La Ciudad Desnuda
- ¡CÓMO ME GUSTA LAS ARTES FIGURATIVAS DEL SIGLO XX ...
- 25 AÑOS DE LA MASACRE DE SREBRENICA
No comments:
Post a Comment