ETHICAL HACKING BASIC TERMS
In this article, you can learn basic terms used in Ethical Hacking career. Here covers Adware, Anonymous, AntiSec, Attribution, Backdoor, Bot, Brute Force, Bug, Chip-off, Clone phishing, Code, Compiler, Cookies, Cracker, Crypto, Dark Web, Deep Web, DEF CON, DoS, DDoS, Doxing, Digital Certificate, Dumpster Diving, Easter Egg, Encryption, Exploit, Exploit kit, End-to-end encryption, Firewall, Hacker, Hacking, Hacktivist, Hash, IP, IRC, Logic bomb, LilzSec, Malware, Man-in-the-middle, Metadata, Master Program, Nonce, OpSec, PayLoad, Packet sniffer, Phishing, pwned, Remote access, RAT, Ransomware, Rainbow table, Rootkit, Salting, Script kiddie, Shrink Wrap code, Signature, sniffing, social engineering, spear-phishing, Spoofing, Spyware, Spam, Sql Injection, Syrian Electronic Army, Tails, Token, Tor, Time Bomb, Trojan horse, Verification(DUMP), Virus, VPN, Vuln, Wardriving, warez, whaling, White hat, Worm, Zero-day. Suggest us to add some more terms in the list through mail or by direct chat.
WHITE HAT :
A white hat hacker is someone who uses his skills in the service of social good like fixing or protecting systems. They are just opposite to Black Hat Hackers, instead of taking benefit of a Vuln(see Above), they alert the companies and even help them to fix the problems.
WORM :
A specific type of malware that is self-replicating, self-propagating which spreads from computers to computers. These are very dangerous as they are capable of ruining a computer it is transmitted to. But it is sometimes equipped with a payload, usually one that installs back doors on infected machine to make a botnet.
ZERO-DAY :
A Zero-Day Exploit refers to a Vuln( discussed above) in a Software which is exploited by the Hackers before the consent of the software vendors. The name 'Zero-Day' comes from the fact that the Vuln is exploited by hackers as soon as it is found even before the vendors know about it.
Comments
Post a Comment
Please do not enter any spam link in the comment box.