Friday, June 6, 2014
On 10:47 PM by Unknown No comments
The hacking glossary is full of words, some quite obvious while others, well let's just say you'll have to be neck-deep into it to know what it means. We are always there to help. We have compiled here a handy glossary of terms that are making quite the buzz around hack-ville. We will bring you more in the days to come!
1.Anonymous
Loosely associated international network of activist and hacktivist entities. A website nominally associated with the group describes it as "an internet gathering" with "a very loose and decentraliSed command structure that operates on ideas rather than directives".
2.AntiSec
Movement opposed to the computer security industry against full disclosure of information relating to but not limited to: software vulnerabilities, exploits, exploitation techniques, hacking tools, attacking public outlets and distribution points of that information.
3.Back door
Method of bypassing normal authentication, securing illegal remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected.
4.Black hat
Form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal".
5.Brute force attack
Cryptanalytic attack that can, in theory, be used against any encrypted data and consists of systematically checking all possible keys or passwords until the correct one is found.
6.Clone phishing
Attempt to acquire sensitive information such as usernames, passwords, and credit card by masquerading as a trustworthy entity in an electronic communication. An example of social engineering techniques, it is used to deceive users and exploits the poor usability of current web security technologies.
7.Compiler
Computer program (or set of programs) that transforms source code written in a programming language (the source language) into another computer language (the target language, often having a binary form known as object code).
8.DDoS
Attempt to make a machine resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of efforts to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet.
9.Doxing
Doxing or document tracing is the Internet-based practice of researching and publishing personally identifiable information about an individual. Closely related to cyber-vigilantism, hacktivism, and cyber-bullying.
10.Firewall
Software or hardware-based network security system that controls the incoming and outgoing network traffic based on applied rule set. A firewall establishes a barrier between a trusted, secure internal network and another network that is not assumed to be secure and trusted.
11.Grey hat
Skilled hacker whose activities fall somewhere between white and black hat hackers in a variety of practices.
12.Hacktivism
Use of computers and computer networks to promote political ends, chiefly free speech, human rights, and information ethics carried out under the premise that proper use of technology can produce results similar to those of conventional acts of protest, activism, and civil disobedience.
13.IRC
System that facilitates transfer of messages in the form of text. The chat process works on a client/server model of networking. IRC clients are computer programs that a user can install on their system. These clients are able to communicate with chat servers to transfer messages to other clients
14.Keystroke logging
Keylogging or keyboard capturing is the action of recording (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.
15.Logic bomb
Piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.
16.LulzSec
Black hat computer hacker group that claimed responsibility for several high profile attacks, including the compromise of user accounts from Sony Pictures in 2011. The group also claimed responsibility for taking the CIA website offline. Its known for its high profile targets and the sarcastic messages it posts in the aftermath of its attacks.
17.Malware
Any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.
18.NSA
US intelligence agency responsible for global monitoring, collection, decoding, translation and analysis of information and data for foreign intelligence and counterintelligence purposes.
19.Payload
Cargo of a data transmission that is part of the transmitted data which is the fundamental purpose of the transmission, to the exclusion of information sent with it solely to facilitate delivery.
20.Packet sniffer
Computer program or a piece of computer hardware that can intercept and log traffic passing over a digital network or part of a network.
21.Remote access
Connection to a data-processing system from a remote location, for example through a virtual private network.
22.Script kiddie
Unskilled individual who uses scripts/programs developed by others to attack computer systems and networks, and deface websites. It is generally assumed that script kiddies are juveniles who lack the ability to write sophisticated hacking programs or exploits on their own, and that their objective is to try to impress their friends or gain credit in computer-enthusiast communities.
23.SEA
Collection of computer hackers who support the government of Syrian President Bashar al-Assad. Using denial of service attacks, defacement, and other methods, it mainly targets political opposition groups and western websites, including news organisations and human rights groups.
24.Social engineering
Psychological manipulation of people into performing actions or divulging confidential information.
25.Trojan horse
Non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically causing loss or theft of data, and possible system harm.
26.Vulnerability
Weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw.
27.White hat
An ethical computer hacker, or a computer security expert, who specialises in penetration testing and in other testing methodologies to ensure the security of an organisation's information systems.
28.Zero day exploit
An attack that exploits a previously unknown vulnerability in a computer application, one that developers have not had time to address and patch.
1.Anonymous
Loosely associated international network of activist and hacktivist entities. A website nominally associated with the group describes it as "an internet gathering" with "a very loose and decentraliSed command structure that operates on ideas rather than directives".
2.AntiSec
Movement opposed to the computer security industry against full disclosure of information relating to but not limited to: software vulnerabilities, exploits, exploitation techniques, hacking tools, attacking public outlets and distribution points of that information.
3.Back door
Method of bypassing normal authentication, securing illegal remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected.
4.Black hat
Form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal".
5.Brute force attack
Cryptanalytic attack that can, in theory, be used against any encrypted data and consists of systematically checking all possible keys or passwords until the correct one is found.
6.Clone phishing
Attempt to acquire sensitive information such as usernames, passwords, and credit card by masquerading as a trustworthy entity in an electronic communication. An example of social engineering techniques, it is used to deceive users and exploits the poor usability of current web security technologies.
7.Compiler
Computer program (or set of programs) that transforms source code written in a programming language (the source language) into another computer language (the target language, often having a binary form known as object code).
8.DDoS
Attempt to make a machine resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of efforts to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet.
9.Doxing
Doxing or document tracing is the Internet-based practice of researching and publishing personally identifiable information about an individual. Closely related to cyber-vigilantism, hacktivism, and cyber-bullying.
10.Firewall
Software or hardware-based network security system that controls the incoming and outgoing network traffic based on applied rule set. A firewall establishes a barrier between a trusted, secure internal network and another network that is not assumed to be secure and trusted.
11.Grey hat
Skilled hacker whose activities fall somewhere between white and black hat hackers in a variety of practices.
12.Hacktivism
Use of computers and computer networks to promote political ends, chiefly free speech, human rights, and information ethics carried out under the premise that proper use of technology can produce results similar to those of conventional acts of protest, activism, and civil disobedience.
13.IRC
System that facilitates transfer of messages in the form of text. The chat process works on a client/server model of networking. IRC clients are computer programs that a user can install on their system. These clients are able to communicate with chat servers to transfer messages to other clients
14.Keystroke logging
Keylogging or keyboard capturing is the action of recording (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.
15.Logic bomb
Piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.
16.LulzSec
Black hat computer hacker group that claimed responsibility for several high profile attacks, including the compromise of user accounts from Sony Pictures in 2011. The group also claimed responsibility for taking the CIA website offline. Its known for its high profile targets and the sarcastic messages it posts in the aftermath of its attacks.
17.Malware
Any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.
18.NSA
US intelligence agency responsible for global monitoring, collection, decoding, translation and analysis of information and data for foreign intelligence and counterintelligence purposes.
19.Payload
Cargo of a data transmission that is part of the transmitted data which is the fundamental purpose of the transmission, to the exclusion of information sent with it solely to facilitate delivery.
20.Packet sniffer
Computer program or a piece of computer hardware that can intercept and log traffic passing over a digital network or part of a network.
21.Remote access
Connection to a data-processing system from a remote location, for example through a virtual private network.
22.Script kiddie
Unskilled individual who uses scripts/programs developed by others to attack computer systems and networks, and deface websites. It is generally assumed that script kiddies are juveniles who lack the ability to write sophisticated hacking programs or exploits on their own, and that their objective is to try to impress their friends or gain credit in computer-enthusiast communities.
23.SEA
Collection of computer hackers who support the government of Syrian President Bashar al-Assad. Using denial of service attacks, defacement, and other methods, it mainly targets political opposition groups and western websites, including news organisations and human rights groups.
24.Social engineering
Psychological manipulation of people into performing actions or divulging confidential information.
25.Trojan horse
Non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically causing loss or theft of data, and possible system harm.
26.Vulnerability
Weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw.
27.White hat
An ethical computer hacker, or a computer security expert, who specialises in penetration testing and in other testing methodologies to ensure the security of an organisation's information systems.
28.Zero day exploit
An attack that exploits a previously unknown vulnerability in a computer application, one that developers have not had time to address and patch.
Subscribe to:
Post Comments (Atom)
Search
Popular Posts
-
The importance of encryption tools lies in one simple fact. Prevention is better than cure. File encryption is of paramount importance...
-
This is the age of connectivity. We randomly switch from smartphone to tablet to computer many times every single day, so much so that some...
-
Looking for a free ebooks on some topic? Your search ends here with these websites.. When looking for free ebooks, there are many reso...
-
Hi friends some of the viewers had messaged me to give hacking books so that they can learn every thing offline.So here i am providing with...
-
The following keyloggers are handy tools for hacking/surveillance. Keylogger is basically a surveillance software that has the capabi...
-
Carrying around an actual computer is now possible since we have USB sticks that you can use to store all the basic utilities you need and ...
-
Hacking tools are available aplenty. Top hackers in the world today recommend hacking tools made for Linux and Windows operating systems. I...
-
Did you know you could use HTML to hack a website? Here's how to do it! Yes folks, you can use HTML to hack a website....
-
While a great deal of time and effort is invested in designing and developing a software, it only takes a few seconds to bring it down on...
-
Whether it is the iPhone, iPad or Android-based systems, building an app quickly is an imperative for developers. Developers often ...
Copy Rights 2014 Himanshu_Teotia. Powered by Blogger.
0 comments:
Post a Comment