various terminologies used to describe ethical hacker \ethical hacking terminology \What are the different terminologies used in the Hacking?

Ethical Hacking – Terminologies

 various terminologies used to describe ethical hacker \ethical hacking terminology \What are the different terminologies used in the Hacking?

Following is a list of important terms used in the field of hacking.


     Adware − 
 Adware is software application in which advertising banners are displayed while a program is running. The ads are delivered through pop-up Window or that appear on the program's user interface.

     Attack
  In Computer and  computer networks an attack is any attempt to expose.alter, disable,destroy, steal or gain unauthorized access to or make unauthorized use of an asset............A cyber attack may steal, alter, or destroy a specified target by hacking into a susceptible system.

    Back door
Backdoor which is related to hacking is both ethical hacking and black hat hacking. When a hacker hacks a system after spending a lot of time, after stealing data from that system, if he needs that system again, he will A backdoor is left in the system so that it does not take much time to control the system from the floor.

     Bot
 You can call Bot the robots of the Internet A bot is a Software application that is programmed to automatically perform certain tasks Bots are both good and bad. A good bots contender useful tasks like indexing content for search engines detect copy-write and provide customer services.Bad bots conduct malicious tasks like gen-tare fake clicks spreading content spreading spam and planing cyber-attacks

  Botnet
 The botnet is made up of robots and nets. They are also called the zombie army. The army of computers that can harm anyone because they are infected computers because every human being is not a hacker, he does not attack ddos. Hackers do not attack their botnet in a file. Attach with and put it on the Internet, whoever downloads this file gets hacked, whose hackers perform their attack Use it to

   Brute force attack
Brute Force attack is a simple password cracking tool, in which a hacker creates a word list of a lot of passwords and keeps attacking the target system again and again when a password matches, they reach the target account.


    Cracker
 A cracker is someone who breaks into someone else's computer system, often on a network; bypass password or licenses in computer programs; or in other ways intentionally breaches computer security.... The term "cracker" is not to be confused  with "hacker". Hackers generally deplore cracking.

  Denial of service attack (DoS)
 In computing, a denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet


   Exploit Kit
 An exploit kit is software system designed to run on web servers, with the purpose of identifying software vulnerabilities in client machines communicating with it and exploiting discovered vulnerabilities to upload and execute malicious code on the client.


    Firewall
In computing a firewall is a network security system that monitors and controls  incoming and outing network traffic based on predetermined security rules. A
firewall typically establishes a barrier between a trusted internal network and entrusted
external network, such as the internet.

    Malware
 Malware is any software intentionally designed to cause damage to a computer. server, client, or computer network. Malware does the damage after it is implanted or introduced in some way into a target computer and can take the form of executable code, scripts, active content and other software.

   Master Program
 A master program is the program a black hat hacker uses to remotely transmit commands to infected zombie drones, normally to carry out Denial of Service attacks or spam attacks.

   Phishing
 Phishing is an e-mail fraud method in which the perpetrator sends out legitimate-looking emails, in an attempt to gather personal and financial information from recipients.

  Phreaker
Phreakers are considered the original computer hackers and they are those who break into the telephone network illegally, typically to make free long-distance phone calls or to tap phone lines.

    Rootkit
 Rootkit is a stealthy type of software, typically malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer.

  Shrink Wrap code
A Shrink Wrap code attack is an act of exploiting holes in unpatched or poorly configured software.

    Social engineering
Social engineering implies deceiving someone with the purpose of acquiring sensitive and personal information, like credit card details or user names and passwords.

  Spam
A Spam is simply an unsolicited email, also known as junk email, sent to a large number of recipients without their consent.

  Spoofing
Spoofing is a technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host.

  Spyware
 Spyware is software that aims to gather information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge.

   SQL Injection
 SQL injection is an SQL code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).

    Threat
A threat is a possible danger that can exploit an existing bug or vulnerability to compromise the security of a computer or network system.

   Trojan
In computing, a Trojan-horse,or Trojan is malicious computer program which misleads users of its true, intent,the is derived from the Ancient Greek story of the deceptive wooden horse that led to the fall of the city of Tray.

   Virus
A virus is a malicious program or a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.

   Vulnerability
 A vulnerability is a weakness which allows a hacker to compromise the security of a computer or network system.

    Worms
 A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. often,it uses a computer network to spread itself.relying on security failures on the target on the target computer to access it.

  Cross-site Scripting
 Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications. XSS enables attackers to inject client-side script into web pages viewed by other users.

   Zombie Drone ---
 A Zombie Drone is defined as a hi-jacked computer that is being used anonymously as a soldier or 'drone' for malicious activity, for example, distributing unwanted spam e-mails.


Post a Comment

0 Comments