Hacking Terms And Definitions
Here are some of the most common hacking terms and their definitions you need to know.
– Adware is software designed to force the display of pre-selected advertisements on your system.
– An attack is an action that is performed on a system to gain access and extract sensitive data.
A Back door
– A back door or back door is a hidden entrance to a computing device or software that bypasses security measures such as logins and password protection.
– A bot is a program that automates an action so that it can be performed repeatedly at a much higher rate over a longer period than a human operator could.
– For example, sending HTTP, FTP, or Telnet at a faster speed, or calling a script to create objects at a faster speed.
– A botnet, also known as a zombie army, is a group of computers controlled without the knowledge of their owners. Botnets are used to send spam or carry out denial of service attacks.
Brute Force Attack
– A brute-force attack is an automated and simplest method of gaining access to a system or website.
– It tries different combinations of usernames and passwords over and over again until it gets into the system.
– A buffer overflow is an error that occurs when more data is written to a block of memory or buffer than the buffer is allocated to store.
– Clone phishing is the modification of an existing legitimate email with a false link to trick the recipient into providing personal information.
– A cracker is someone who modifies the software to access features that the person cracking the software finds undesirable, especially copy protection features.
Denial of Service (DoS) Attack
– A denial of service (DoS) attack is a malicious attempt to make a server or network resource unavailable to users, usually by temporarily interrupting or suspending a host connected to the Internet.
– DDoS is a distributed denial of service attack.
– Exploit Kit is a software system designed to run on web servers in order to identify software vulnerabilities on client machines interacting with it and use the discovered vulnerabilities to download and execute malicious code on the client.
– An exploit is a piece of software, a piece of data, or a sequence of commands that uses a bug or vulnerability to compromise the security of a computer or network system.
– A firewall is a filter designed to keep unwanted intruders out of a computer system or network while allowing secure communications between systems and users inside a firewall.
– Keystroke logging is the process of keeping track of the keys that are pressed on the computer and which points on the touch screen are being used.
– It’s just a computer/human interface card. It is used by gray hat and black hat hackers to record login IDs and passwords.
– Keyloggers are usually hidden on the device using a Trojan delivered via a phishing email.
– A logic bomb is a virus secreted into a system that triggers a malicious action when certain conditions are met. The most common version is a time bomb.
– Malware is a general term used to refer to various forms of hostile or intrusive software, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware, and other malware.
– The main program is a program that a black hat hacker uses to remotely issue commands to infected zombie drones, usually to carry out denial of service attacks or spam attacks.
– Phishing is an email scam technique in which an attacker sends out legitimate emails in an attempt to collect personal and financial information from recipients.
– Phreakers are considered to be the first computer hackers, and they are those who illegally hack into the telephone network, usually to make free long-distance phone calls or tap phone lines.