Terminologies



Following are the terminologies used in the field of ethical hacking



1.)Adware



Adware is a one type of software designed to force pre-chosen ads to display on your system


2.)Attack

An attack is an action that is done on the system or anything to get the access of that system and extract the sensitive information or we can say that stealing sensitive information.


3.)Backdoor

An backdoor or the other name of backdoor is trapdoor a backdoor is a hidden entry to a computing system or a software that can bypass security measures such  as login and password.The hacker install backdoor into the system in order to entry in the system when needs access in this owned system in future.Metasploit is preferred tool in this process.


4.)Bot
A bot is a program that automates an action so that it can be done repeatedly at a much higher rate for a more sustained period than a human operator could do it.For example sending HTTP,FTP,TELNET at a higher rate or calling script to create objects at a higher rate


5.)Botnet
A botnet is also known as zombie army , is a group of computers controlled without their owners knowledge.Botnets are used to send spam or make DOS attack.


6.)Brute force attack

A brute force attack is an automated and it is very simplest kind of method to gain access of the system or to hack account like facebook , google , instagram , etc it only work if the password is weak like birthdate , pet name , crush name , girlfriend name , mobile number , favourite actor/actress , etc.It tries different combination of usernames and passwords.The brute force attack is also known as trial and error method.It tries different combination of usernames and passwords over and over again until it gets usernames and passwords.But after sometime you will be block(in rare case).


7.)Buffer Overflow  

A buffer overflow occurs when a program or process attempt to write more data to be fixed length block of memory or buffer , then the buffer is allocated to hold.Since buffers are created to contain a defined amount of data , the extra data ran overwrite data values in memory address adjacent to the destination buffer unless the program includes sufficient bounds checking to flag or discard data when too much is sent to a memory buffer

Exploiting a buffer  overflow allows an attacker to control or crash the process or to modify its internal variables weakness enumeration/SANs.Top 25 most dangerous software errors and is specified as CWE-120 under the common weakness enumeration dictionary of weakness types.Despite being well understand , buffer overflow continue to a plague software from vendors both large and small.

8.)Clone Phishing

Clone phishing is a modification of the existing , legitimate email with a false link to get the sensitive information from the victim like email , password , bank details like (pin number , bank number , etc)


9.)Cracker

Actually a cracker is more focused or circumventing software system protection schemes.Generally they are the ones who are Cracking software and releasing versions that do not require authentication
codes.Mike Warot not all hackers are white hat hacker there is still a community of black hat hacker though many "Black hat hacker" are now just "Script Kiddies" with little talent but the ability to use software.

10.)Denial Of Service Attack(DOS)
A DOS attack is a malicious attempt to make a server or a network resource unavailable to users , usually by temporarily interrupting or suspending the services of a host connected to the internet.


11.)Exploit Kit


An exploit kit is a software kit designed to run a web servers , with the purpose of identifying software vulnerability in client machines communicating with it and discovering and exploiting vulnerability upload and execute malicious code on the client.

12.)Exploit

Exploit is a piece of software , or a chunk of data a sequence of commands that take the advantage of the vulnerability or bugs which were present in the system to compromise the security of a computer or network system.

13.)Firewall

A firewall is a hardware based network security system that controls the incoming and outgoing network traffic based on applied rule set.

A firewall establishes a barrier between a trusted , secure internal network and another network (i.e.internet) that is not assumed to be secured and trusted

14.)Keystroke Logging

Keystroke logging is the process of tracking the key which are pressed on the keyboard.It keeps all the record of the your keystroke that means whatever you have type it has been stored somewhere.This method is used by generally black hat hacker and grey hat hackers to steal sensitive information like ids and passwords.Keylogger are usually secreted  onto a device using trojan delivered by a phishing email.So be aware not to open any malicious link or not to download any attachment which come from the unknown source.

15.)Logic Bomb

These are the dependent programs i.e.these programs are created to do something only when certain event occurs.e.g:Some viruses may be termed as logic bombs because they lie dormant all through the year and become active only on a particular date.


16.)Malware

Malware is a malicious software "software that does something annoying or criminal that you didn't expect.That includes programs that send pictures of santa clause to everyone in your address book , programs that make your computer say "Aagrah ! i'm dying!" every time you kill an applications , or programs that is concert with thousands of others , try to know amazon offline malware catch-all terms of for computer viruses , worms , trojans, keyloggers , adware , stressors, etc.

17.)Zombie Drone

A zombie drone is defined as a hijacked computer that is being used anonymously as a soldier or 'drone' for malicious activity , for example distributing unwanted spam emails.

18.)Master Program

A master program is the program that is used by the black hat hacker uses to remotly transmit commands to infected zombie drones , normally to carry out Denial Of Service Attack or spam attacks.

19.)Phishing

Phishing is a email fraud method in which a fake page has been made which looks like an original page and then link is sent to the victim and if the victim has no knowledge or we can have less knowledge about computer and technology then victim go that link and enter his sensitive information like username and passwords and when victim click on login button it will redirect to the proxy website or a blank website it means it has nothing on website only white blank page is there but the attacker get his username and passwords.

20.)Phreaker

Phreaker are generally considered the original computer hacker and the phreaker has excellent knowledge about advance hacking.Phreaker are generally those who break into the telephone network illegally to make the long distance call for free or to tap phone lines.

21.)Rootkit 

Rootkit is a stealthy type of software , typically malicious designed to hide the existence of certain process or program from normal methods of detection and enable continued privileged access to a computer.

22.)Shrink Wrap Code

A shrink wrap code attack is an act of exploiting holes in unpatched or poorly configured software.

23.)Social Engineering

Social engineering is an integral part of hacking , but it's focused on psychological manipulation more than technical skills.Social engineering implies deceiving someone with the purpose of acquiring sensitive information like username , passwords , credit card detail , etc.

24.)Spam

A spam is simply an unsolicited email , also known as junk mail , sent to a large number of recipients without their consent.

25.)Spoofing

Spoofing is a technique used to gain an unauthorized access to a computer , whereby the intruder sends messages to a computer with an IP address indicates that the message coming from the trusted host.

26.)Spyware

Spyware:'spy'+'software'.It was first used in 2000.Spyware refers to any software used for spying.It enables a user to covert info about another's computer activities by transmitting data covertly from their hard drive.

27.)Sql Injection
Sql injection is common and famous method of hacking at present.Using this method an unauthorized person can access the database of the website.Attackers can get all the details about the database.

what attacker can do?

  • By passing login as shown in the figure
  • Accessing the secret data
  • Modifying contents of website
  • Shutting down the Mysql server

28.)Vulnerability

A vulnerability is a weakness which allows a hacker to compromise the security of the computer or a network system.

29.)Worms

A worms is a self-replicating virus that does not alter files but besides in active memory and duplicate files.

30.)Cross Site Scripting (XSS)
Xss is a type of computer security vulnerability is typically found in web applications.Xss enables attackers to inject client-script into web pages viewed by other users.









SHARE

Dron Patel

’Hi I am Dron Patel 3rd year computer engineering student. ’ I am passionate about ethical hacking’ Inspired to make things looks better.

    Dribble
  • Image
  • Image
  • Image
  • Image
  • Image
    Blogger Comment
    Facebook Comment

0 comments:

Post a Comment