)
Settings
Log out
Terminalogy means "terms used with a particular technical application in a subject of study, profession".
In this session you'll learn different terminlologies used in this course and also in the ethical hacking process.
Remember the terminologies always, some times we'll need combo of attacks.
This is a basic course so we are maximum covering the topic for beginners. As we already know hacking is a vast area and there are so many technologies, software, gadgets, hardware being used for Assessments and Exploitations.
Other Terminologies used in this course
Attack − An attack is an action that is performed to extract data or to exploit a system for access.
Back door − A back door, or trap door, is a hidden program used to create a entry for the hacker to bypass the existing security.
Botnet − A botnet, otherwise called as the zombie network, is a network with many computer that is controlled by the hackers without the knowledge of the owners. these bot nets are used for sending spams and Denial of Services.
Brute force attack − A brute force attack is an automated attack in which the hacker uses malicious programs to do authentication using a set of predefined usernames and passwords. The program forces the username and passwords until it gets access to the that system
Phishing − phishing is a social engineering attack in which the hackers creates a fake webpage that looks like the legitimate website to trick the user to provide their personal information like their passwords and card details.
Cracker − A cracker is one kind of hackers who uses his hacking skills for destructive purposes by cracking the security features of a network or software.
Denial of service attack (DoS) − A denial of service (DoS) attack is an automated attack in which the hackers makes a malicious attempt to make a server resource unavailable to its users,by flooding unwanted requests to the target server.
DDoS − Distributed denial of service attack. In this the hacker use the zombie computers to perform the DOS attack by flooding uneanted request from multiple system to the target server.
Exploit − Once the hacker finds a vulnerability in the system, he then exploits it with the necessary tools to check whether the vulnerability gives him access to that system or not.
Firewall − A firewall is a filter which is used to stop intruding malicous packets to get inside the network and stop allowing the affected machine to send confidential packets to the hacker.
Keystroke logging − Keystroke logging is the process of capturing the strokes of the keyboard of the victim for useful information like passwords and other details. Almost all the trojan virus provide this keylogging service to the hackers.
Malware − Malware is a malicious software that includes viruses, worms, trojanhorses ransomeware and many.
Phreaker − Phreakers are the real hackers who hacked the telephone system to get long calls with the help of whistle or clicks.
Social engineering − Social engineering attack is an attack which involves live persons. A hacker pretends to be someone and gather information from the victim like the passwords, personal information etc.
Spam − A Spam is simply an unsolicited email, also known as junk email, sent to a large number of recipients without their consent.
Spoofing − Spoofing is a technique used to gain unauthorized access to computers, in which the hacker sends message from a spoofed ip address to prove his trustworthy.
SQL Injection − SQL injection is an SQL code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).
Threat − A threat is a possible danger that can exploit an existing bug or vulnerability to compromise the security of a computer or network system.
Virus − A virus is a malicious program or a chunk of code which replicates itself and destroy the memory of the system.
Vulnerability − A vulnerability is a weakness which allows a hacker to compromise the security of a computer or network system.
Cross-site Scripting − Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications. XSS enables attackers to inject client-side script into web pages viewed by other users.
Csrf - Cross site request forgery is an attack in which the hacker send a cross site request from other referrer to change some information of an authenticated user in a local network.