hacking dictionary
1# DDoS:
DDoS (Distributed Denial of Service) is a type of DOS attack where
multiple compromised systems, which are often infected with a Trojan,
are used to target a single system causing a Denial of Service (DoS)
attack.
2# VPS:
A virtual private server (VPS) is a virtual machine sold as a service
by an Internet hosting service. A VPS runs its own copy of an operating
system, and customers have superuser-level access to that operating
system instance, so they can install almost any software that runs on
that OS.
3# SE:
Social engineering is an attack vector that relies heavily on human
interaction and often involves tricking people into breaking normal
security procedures.
4# HTTP:
The Hypertext Transfer Protocol (HTTP) is an application protocol for
distributed, collaborative, hypermedia information systems. HTTP is the
foundation of data communication for the World Wide Web. Hypertext is
structured text that uses logical links (hyperlinks) between nodes
containing text.
5# SSH:
Secure Shell, or SSH, is a cryptographic (encrypted) network protocol
operating at layer 7 of the OSI Model to allow remote login and other
network services to operate securely over an unsecured network or in
simple words Secure Shell, used to connect with Virtual Private Servers.
6# FTP:
The File Transfer Protocol (FTP) is a standard network protocol used to
transfer computer files between a client and server on a computer
network.
7# XSS (CSS):
Cross-site scripting (XSS) is a type of computer security vulnerability
typically found in web applications. XSS enables attackers to inject
client-side script into web pages viewed by other users.
8# Script Kiddie:
A Script Kiddie or Skiddie (also known as skid and script bunny, the
term script kitty is not valid in this context) is an unskilled
individual who uses scripts or programs developed by others to attack
computer systems and networks and deface websites.
9# VPN:
A Virtual Private Network (VPN) extends a private network across a
public network, such as the Internet. It enables users to send and
receive data across shared or public networks as if their computing
devices were directly connected to the private network, and thus benefit
from the functionality, security and management policies of the private
network.
10# Nix:
Nix is a powerful package manager for Linux and other Unix systems that
make package management reliable and reproducible. It provides atomic
upgrades and rollbacks, side-by-side installation of multiple versions
of a package, multi-user package management and easy setup of build
environments.
11# SQL:
Structured Query Language is a special-purpose programming language
designed for managing data held in a relational database management
system (RDBMS), or for stream processing in a relational data stream
management system (RDSMS).
12# FUD:
Fully undetectable (usually shortened as FUD) can stand for data that
had been encrypted, making it appear to be random noise. It can also
stand for software that cannot be detected by anti-viruses when a scan
is performed. The term is used in hacker circles to refer to something
that appears to be clean to many anti-viruses, even though it is a
hacking tool.
13# LOIC/HOIC:
The Low/High Orbit Ion Cannon, often abbreviated to HOIC, is an open
source network stress testing and denial-of-service attack application
written in BASIC designed to attack as many as 256 URLs at the same
time.
14# Trojan:
A Trojan horse or Trojan is a type of malware that is often disguised
as legitimate software. Trojans can be employed by cyber-thieves and
hackers trying to gain access to users’ systems. Users are typically
tricked by some form of social engineering into loading and executing
Trojans on their systems.
15# Botnet:
A botnet (also known as a zombie army) is a number of Internet
computers that, although their owners are unaware of it, have been set
up to forward transmissions (including spam or viruses) to other
computers on the Internet.
16# SQL Injection:
SQL injection is a code injection technique, used to attack data-driven
applications, in which malicious SQL statements are inserted into an
entry field for execution (e.g. to dump the database contents to the
attacker).
17# Root: Highest permission level on a computer which allows the user to modify anything on the system without restriction.
18# Warez:
Warez is copyrighted works distributed without fees or royalties, and
may be traded, in general, violation of copyright law. Warez are
generally unauthorized releases by organized groups, as opposed to file
sharing between friends or large groups of people with similar interest
using a darknet. Warez are not usually commercial software
counterfeiting.
19# White Hat Hacker:
A white hat hacker is a computer security specialist who breaks into
protected systems and networks to test and assess their security. White
hat hackers use their skills to improve security by exposing
vulnerabilities before malicious hackers (known as black hat hackers)
can detect and exploit them.
20# Black Hat Hacker:
A black hat hacker is an individual with extensive computer knowledge
whose purpose is to breach or bypass internet security. Black hat
hackers are also known as crackers or dark-side hackers. The general
view is that, while hackers build things, crackers break things.
21# Grey Hat Hacker:
The term “Grey Hat” refers to a computer hacker or computer security
expert who may sometimes violate laws or typical ethical standards, but
does not have the malicious intent typical of a black hat hacker.
22# Rootkit:
A rootkit is a clandestine computer program designed to provide
continued privileged access to a computer while actively hiding its
presence. The term rootkit is a connection of the two words “root” and
“kit”. This kind of virus can be easily removed by booting the computer
in safe mode.
23# Ring0:
Very hard to remove and very rare in the wild, these can require you to
format, it’s very hard to remove certain ring0 rootkits without safe
mode.
24# IP Grabber: A link that grabs victim’s IP when they visit it.
25# Malware:
‘Malware’ is an umbrella term used to refer to a variety of forms of
hostile or intrusive software, including computer viruses, worms, trojan
horses, ransomware, spyware, adware, scareware, and other malicious
programs. It can take the form of executable code, scripts, active
content, and other software.
26# Phreak:
Phreak is a slang term coined to describe the activity of a culture of
people who study, experiment with, or explore, telecommunication
systems, such as equipment and systems connected to public telephone
networks. The term phreak is a sensational spelling of the word freak
with the ph- from the phone, and may also refer to the use of various
audio frequencies to manipulate a phone system. Phreak, phreaker, or
phone phreak are names used for and by individuals who participate in
phreaking.
27# DOX:
Doxing or doxxing, is the Internet-based practice of researching and
broadcasting personally identifiable information about an individual.
The methods employed to acquire this information include searching
publicly available databases and social media websites (like Facebook),
hacking, and social engineering. It is closely related to internet
vigilantism and hacktivism. Doxing may be carried out for various
reasons, including to aid law enforcement, business analysis, extortion,
coercion, harassment, online shaming and vigilante justice.
28# Worm:
A computer worm is a standalone malware computer program that
replicates itself in order to spread to other computers. Often, it uses a
computer network to spread itself, relying on security failures on the
target computer to access it. Unlike a computer virus, it does not need
to attach itself to an existing program.
29# Deface:
A website deface is an attack on a site that changes the appearance of
the site or a certain web page or technically when a hacker replaces the
index file with their own one.
30# Keylogger:
Keylogger is a computer program that records every keystroke made by a
computer user, especially in order to gain fraudulent access to
passwords and other confidential information
31# RAT:
A remote administration tool (RAT) is a piece of software that allows a
remote “operator” to control a system as if he has physical access to
that system. While desktop sharing and remote administration have many
legal uses, “RAT” software is usually associated with criminal or
malicious activity
Comments