Hacking terminologies
Hi all here I'm with my new blog. In my last blog I have introduced you about some crazy and awesome websites to learn hacking. Here is the link to my last blog.
https://sidceh.blogspot.in/2016/09/ceh.html
In this blog I am going to discuss about some of the hacking terminologies.
https://sidceh.blogspot.in/2016/09/ceh.html
In this blog I am going to discuss about some of the hacking terminologies.
1. Adware-Adware is software designed to force pre-chosen ads
to display on your system. Some adware is designed to be malicious and will pop
up ads with such speed and frequency that they seem to be taking over
everything, slowing down your system and typing up all of your system
resources. When adware is coupled with spyware, it can be a frustration ride,
to say the least.
2.Back Door-A back door is a point of entry that circumvents
normal security and can be used by cracker to access a network or computer
system. Usually back doors are created by system developers as shortcuts to
speed access through security during the development stage and then are
overlooked and never properly removed during final implementation. Sometimes
crackers will create their own back door to a system by using a virus or a
Trojan to set it up, thereby allowing them future access at their leisure.
3.Black Hat-just like in the old westerns, these are the bad
guys. A black hat is a cracker. To add insult to injury, black hats may also
share information about the “break in” with other black hat crackers so they can exploit the same vulnerabilities before
the victim becomes aware and takes appropriate measures… like calling Global
Digital Forensics.
4.Bot- A bot is a
software “robot” that performs an extensive set of automated tasks on its own.
Search engines like Google use bots, also known as spiders, to crawl through
websites in order to scan through all of your pages. In these cases bots are
not meant to interfere with a user, but are employed in an effort to index
sites for the purpose of ranking them accordingly for appropriate returns on
search queries. But when black hats use a bot, they can perform an extensive
set of destructive tasks, as well as introduce many forms of malware to your
system or network. They can also be used by black hats to coordinate attacks by
controlling botnets.
5.Botnet-A botnet is a network of zombie drones under the
control of a black hat. When black hats are launching a Distributed Denial of
Service attack for instance, they will use a botnet under their control to
accomplish it. Most often, the users of the systems will not even know they are
involved or that their system resources are being used to carry out DDOS
attacks or for spamming. It not only helps cover the black hat’s tracks, but
increases the ferocity of attack by using the resources of many computer system
in a coordinates effort.
6.Cookies-A cookie is a small packet of information from a
visited webserver stored on your system by your computer’s browser. It is
designed to store personalized information in order to costomize your next
visit. For instance, if you visit a site with forms to fill out on each visit,
that information can be stored on your system as a cookie so you don’t have to
go through the process of filling out the forms each time you visit.
7.Cracker-When you hear the word hacker today, in reality it
is normally referring to a cracker, but the two have become synonymous. With
its origin derived from “safe-cracker” as a way to differentiate from the
various uses of “hacker” in the cyber world, a cracker is someone who breaks
into a computer system or network without authorization and with the intention
of doing damage. A cracker may destroy files, steal personal information like
credit card numbers or client data, infect the system with a virus, or
undertake many others things that cause harm. This glossary will give you an
idea of what they can do and some of the means they use to achieve their
malicious objectives. These are some of the means they use to achieve their
malicious objectives. These are some of the black hats.
8.Denial of Service Attack (DOS)-A Denial of Service is an
attack designed to overwhelm a targeted website to the point of crashing it or
making it inaccessible. Along with sheer numbers and frequency, sometimes the
data packets that are sent are malformed to further stress the system trying to
process the server request. A successful Denial of Service attack can cripple
any entity that relies on its online presence by rendering their website
virtually useless.
9.Distributed Denial of Service Attack (DDOS)-A Distributed
Denial of Service attack is done with the help of zombie drones(also known as
botnet) under the control of black hats using a master program to command them
to send information and data packets to the targeted webserver from the
multiple systems under their control. This obviously makes the Distributed
Denial of Service attack even more devastating than Denial of service attack
launched from a single system, flooding the target server with a speed and
volume that is exponentially magnified. As is normally the case with zombie
drones and botnets, this is often done without the user of the controlled
system even knowing they were involved.
10.Dumpster Diving-The act of rummaging through the trash of an
individual or business to gather information that could be useful for cyber
criminal to gain access to a system or attain personal information to aid them
in identity theft of system intrusion. One person’s garbage can indeed be a
cyber criminal’s treasure.
11.Easter Egg-A non-malicious surprise contaminated in a
program or on a circuit board installed by the developer. It could be as simple
as a text greeting, a signature, or an image embedded on a circuit board, or
comprises a more complex routine, like a video or a small program. The criteria
that must be met to be considered an Easter Egg are that it be undocumented,
non-malicious, reproducible to anyone with the same device or software, not be
obvious, and above all – it should be entertaining!
12.Firewall-A firewall is a first line of defense for every
network. It prevents unauthorized access to or to the network to allow safe
communication between system and the user. Firewalls can be physical devices or
software-based, or a combination of the two. A well designed and implemented
firewall is a must to ensure safe communications and network access and should
be regularly checked and updated to ensure continued function. Black hats learn
new tricks and exploit new tricks and exploit new techniques all time, and what
worked to keep them out yesterday may need to be adjusted or replaced over
time.
Hope you all enjoyed this.
See you soon with some more terminologies.
Till then keep hacking.And follow ethics.
Comments
Post a Comment