Hacker Dictionary: Beginner Level Part – 5
Let us start our journey from the basics of hacking.The most important thing is terms used in hacking, it changed and updated according to time.So, keep updated with the hacker dictionary.
We have detailed some important terms of hacking as acronyms.
- How to Hack : Beginner Level Part -1
- Types of Hackers: Beginner Level Part -2
- Types of Hacking: Beginner Level Part -3
- How to be Anonymous: Beginner Level Part -4
- Hacker Dictionary: Beginner Level Part – 5
- How to Hack Windows: Beginner Level Part -6
- Different phases of ethical hacking: Beginner Level Part – 7
ACRONYMS – hacker dictionary
R.A.T :-> Remote Administration Tool DrDoS :-> Distributed Reflected Denial of Service Attack, uses a list of reflection servers or other methods such as DNS to spoof an attack to look like it's coming from multiple ips. Amplification of power in the attack COULD occur. VPS :-> Virtual Private Server SE :-> Social Engineering HTTP :-> Hyper Text Transfer Protocol. The foundation of data communication for the World Wide Web. SSH :-> Secure Shell, used to connect to Virtual Private Servers. FTP :-> File Transfer Protocol. Used for transferring files over an FTP server. XSS (CSS) :-> Cross Site Scripting Malware :-> Malicious Software Skid :-> Script Kid/Script Kiddie DDoS :-> Distributed Denial of Service VPN :-> Virtual Private Network Nix :-> Unix based operating system, usually refered to here when refering to DoS'ing. SQL :-> Structured Query Language. It usually goes along with a word after it, such as "SQL Injection." FUD :-> Fully Undetectable
WORDS – hacker dictionary
FUD :-> Fully undetectable, it can be used in many terms and words. Probably used in combination with crypters, or when we are trying to infect any host. LOIC/HOIC :-> Tool(s) which are used by many anonymous person to conduct DDoS attacks. It is not recommended to use at any situtation. Trojan :-> A Trojan is a type of malware that masquerades as a legitimate file or helpful program with the ultimate purpose of granting a hacker unauthorized access to a computer. Botnet :-> Computers infected by worms or Trojans and taken over by hackers and brought into networks to send spam, more viruses, or launch denial of service attacks. SQL Injection :-> An SQL injection is a method often used to hack SQL databases via a website, and gain admin control of the site. Root :-> Highest permission level on a computer, able to modify anything on the system without restriction. Warez :-> Software piracy White Hat :-> A "white hat" refers to an ethical hacker, or a computer security expert, who specializes in penetration testing and in other testing methods to ensure the security of a businesses information systems. (Good guy, per se) Rootkit (ring3 ring0) :-> A powerful exploit used by malware to conceal all traces that it exists. Ring3 - Can be removed easily without booting in safemode. Ring0 - Very hard to remove and very rare in the wild, these can require you to format, it's very hard to remove certain ring0 rootkits without safemode. Script Kiddie :-> A script kid, or skid is a term used to describe those who use scripts created by others to hack computer systems and websites. Used as an insult, meaning that they know nothing about hacking. IP Grabber :-> A link that grabs someone's IP when they visit it. DDoS :-> Distributed denial of service. Flooding someones connection with packets. Servers or web-hosted shells can send packets to a connection on a website usually from a booter. VPS :-> The term is used for emphasizing that the virtual machine, although running in software on the same physical computer as other customers' virtual machines, is in many respects functionally equivalent to a separate physical computer, is dedicated to the individual customer's needs, has the privacy of a separate physical computer, and can be configured to run server software. Malware :-> Software designed to do all kinds of evil stuff like stealing identity information, running DDoS attacks, or soliciting money from the slave. Phreak :-> Phone Freaks. Hackers who hack cell phones for free calling. Free Long distance calling. Etc. Bot :-> A piece of malware that connects computer to an attacker commonly using the HTTP or IRC protocal to await malicous instructions. Shell :-> The general meaning here is a hacked web server with a DoS script uploaded to conduct DDoS attacks via a booter. ANSI Bomb :-> ANSI.SYS key-remapping commands consist of cryptic-looking text that specifies, using ansi numeric codes to redefine keys. DOX :-> The term DOS is the realname, addrsss, phone numbers, SSN, Credit card number which is a personal information. Worm :-> Software is limited to infection on aparticular host Deface :-> A website deface is an attack which makes the site to hide its original page replaced with hackers. Keylogger :-> It converst the key you type on keyboard to code and sent it to the hacker who pushed keylogger into your system. Remote Administration Tool :-> It is a term which is used to have access to remote location host. Black Hat :-> The hacker who does all the illegal activities in the internet. (Bad guy, per se)
Let’s Discuss the full terms in upcoming posts. hacker dictionary
Full Hacker Dictionary Site – http://www.hacker-dictionary.com
Please comment how you feel about our guides, depending upon the discussions only we will come with the future post.