Basic Hacking Terms

Hacking Terms

Here are some hacking terminology used in hacking.

Phishing

Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. This happens when an attacker masquerades as a trusted organization trick a victim into opening an email, instant message, or text message.

Malware

Malware that is Malicious software is any software that is intentionally designed to harm a computer, server, client, or computer network.

There is a wide range of types of malware, including computer viruses, worms, Trojans, ransomware, spyware, adware, rogue software, antivirus, and alarm programs.

Spoofing

Spoofing is the process of disguising a message from an unknown source as from a known reliable source.

Spoofing can be applied to email, phone calls, and websites, or it can be more technical, such as a computer spoofing an IP address, Address Resolution Protocol (ARP), or a Domain Name System (DNS) server.

Encryption

Encryption is a method of converting information into a secret code that hides the true meaning of the information.

The science of encrypting and decrypting information is called cryptography.

In computing, unencrypted data is also known as plaintext, and encrypted data is called ciphertext.

Adware

Adware is a type of malware that lurks on your device and serves you with advertisements. Some adware also tracks your online behavior.

The adware uses the browser to collect the history of the web pages you visit in order to “target” advertisements that seem tailored to your interests.

Brute Force Attack

A brute force attack is an attack technique that uses a high level of computing power to compromise secure accounts by repeatedly and systematically entering many different user passwords and combinations.

The attacker systematically checks all possible passwords and passphrases until the correct one is found.

Keylogger

Keylogger is also known as Keystroke Logging.

Keystroke logging, often referred to as keystroke encryption or keyboard hijacking, is the act of recording keystrokes on the keyboard, usually covertly so that the person using the keyboard is unaware that their actions are being monitored. The data can then be retrieved by the person running the logging program.

Bot

A bot is a software application that is programmed to perform specific tasks. Bots are automated, which means they work according to their instructions, without having to start them manually each time.

Bots often mimic or replace human user behavior. They usually perform repetitive tasks and can complete them much faster than human users.

Botnet

A botnet is a collection of Internet-connected devices infected with malware that allow hackers to control them.

Cybercriminals use botnets to initiate botnet attacks, which include malicious activities such as credential leaks, unauthorized access, data theft, and DDoS attacks.

RAT

RAT is also known as Remote Access Trojan.

A Remote Access Trojan (RAT) is a malicious program that includes a back door for administrative control of the target computer.

RATs are usually downloaded invisibly along with a program requested by the user, such as a game, or sent as an email attachment.

Backdoor

Backdoor is the term for accessing the software or hardware of a computer system without being detected.

The backdoor can be created by the developer himself so that he can quickly and easily make changes to the code without having to log in.

Firewall

A firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predefined security rules.

A firewall usually creates a barrier between a trusted network and an untrusted network.

Payload

A payload is a collection of malicious codes that carry important information that can be used to hack any device beyond your imagination.

Malware payloads can be spread by a variety of vectors, including worms, phishing emails, and other delivery mechanisms.

Worm

A worm is a separate piece of malware that spreads from computer to computer, but unlike a virus, it can move around without any human action.

The worm uses the power of a file or information transfer system, which allows it to move around unaided.

Dos

Dos is also known as Denial of Service.

A denial of service attack is a cyber-attack in which an attacker attempts to make a machine or network resource unavailable to intended users by temporarily or indefinitely interrupting a host connected to the Internet.

XSS

XSS is also known as Cross-site Scripting.

Cross-site scripting is a type of security vulnerability commonly found in web applications. XSS attacks allow attackers to inject client-side scripts into web pages viewed by other users.

A cross-site scripting vulnerability can be exploited by attackers to bypass access controls such as a policy of the same origin.


Warning ! ! !
All The Information Provided Here Is For Educational Purposes Only.
You Are Solely Responsible For What You Do With This Information.

Download As PDF

Print This Page


Join Us On Telegram
Join Us On Telegram