Skip to main content

The Hacker's Dictionary

               ----- The Hacker's Dictionary-----







Are you new to the realm of hacking?

Do you feel dumb when you don't know the meaning of a certain term?Well, then this will certainly help you out! . If you are ever unsure about anything, simply scroll down and find that specific word, then read the definition.

Anything includes: Abbreviations, Phrases, Words, and Techniques.The list is in alphabetical order for convenience!


                                -----Abbreviations-----



DDoS : Distributed Denial of Service

DrDoS : Distributed Reflected Denial of Service Attack, uses a list of reflection servers or other methods such as DNS to spoof an attack to look like it's coming from multiple IPS. Amplification of power in the attack could occur.

FTP : File Transfer Protocol. Used for transferring files over an FTP server.

FUD : Fully Undetectable

Hex : In computer science, hexadecimal refers to base-16 numbers. These are numbers that use digits in the range: 0123456789ABCDEF. In the C programming language (as well as Java, JavaScript, C++, and other places), hexadecimal numbers are prefixed by a 0x. In this manner, one can tell that the number 0x80 is equivalent to 128 decimal, not 80 decimal.

HTTP : Hyper Text Transfer Protocol. The foundation of data communication for the World Wide Web.

IRC : Internet Relay Chat. Transmiting text messages in real time between online users.

JDB : Java drive-by, a very commonly used web-based exploit which allows an attacker to download and execute malicious code locally on a slave's machine through a widely known java vulnerability.

Malware : Malicious Software.

Nix : Unix based operating system, usually referred to here when refering to DoS'ing.

POP3 :This is the most popular protocol for picking up e-mail from a server.

R.A.T : Remote Administration Tool

SDB : Silent drive-by, using a zero day web-based exploit to hide and un-detectably download and execute malicious code on a slave's system. (Similar to a JDB however no notification or warning is given to the user).

SE : Social Engineering.

Skid : Script Kid/Script Kiddie.

SMTP : A TCP/IP protocol used in sending and receiving e-mail.

SQL : Structured Query Language. It's a programming language, that used to communicate with databases and DBMS. Can go along with a word after it, such as "SQL Injection."

SSH : Secure Shell, used to connect to Virtual Private Servers.

TCP : Transmission Control Protocol, creates connections and exchanges packets of data.

UDP : User Datagram Protocol, an alternative data transport to TCP used for DNS, Voice over IP, and file sharing.

VPN : Virtual Private Network

VPS : Virtual Private Server

XSS (CSS) : Cross Site Scripting


                                    -----Words-----


Algorithm : A series of steps specifying which actions to take in which order.

ANSI Bomb : ANSI.SYS key-remapping commands consist of cryptic-looking text that specifies, using ansi numeric codes to redefine keys.

Back Door : Something a hacker leaves behind on a system in order to be able to get back in at a later time.

Binary : A numbering system in which there are only two possible values for each digit: 0 and 1.

Black Hat : A hacker who performs illegal hacks. (Bad guy).

Blue Hat : A blue hat hacker is someone outside computer security consulting firms who is used to bug test a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term BlueHat to represent a series of security briefing events.

Bot : A piece of malware that connects computer to an attacker commonly using the HTTP or IRC protocal to await malicous instructions.

Botnet : Computers infected by worms or Trojans and taken over by hackers and brought into networks to send spam, more viruses, or launch denial of service attacks.

Buffer Overflow : A classic exploit that sends more data than a programmer expects to receive. Buffer overflows are one of the most common programming errors, and the ones most likely to slip through quality assurance testing.

Cracker : A cracker is one who breaks into or otherwise violates the system integrity of remote machines with malicious intent. Having gained unauthorized access, crackers destroy vital data, deny legitimate users service, or cause problems for their targets. Crackers can easily be identified because their actions are malicious.

Comments

Popular posts from this blog

Hiding files inside an Image on Android

You can hide your files behind an image and this technique is called Steganography. So lets get started. What is Steganography Steganography is an art of hiding a file, message, audio, video, or image within another file, message, audio, video, or image. The word steganography comes from two greek words "steganos" (meaning: concealed) and "graphein" (meaning: writing). The basic difference between cryptography and Steganography is that in cryptography only the message is hidden, but in Steganography, the message and the secret communication are hidden. A lot of good steganographic tools are available for Windows, Mac, and Linux, but not that much for the Android operating system. Now lets see how you can do the same GETTING STARTED Here is how to hide any file inside any image file on android: 1. First, you have to download NiaStego and install it on your android device. 2. Open the app, then you will see a window as shown below. 3. T...

Monitor secret connections that your computer makes.

How to see which websites your computer is secretly connecting to? Has your Internet connection become slower than it should be?  There may be a chance that you have some malware, spyware,  or adware that is using your Internet connection in the  background without your knowledge. Here’s how to see what’s  going on under the hood. It’s worth noting that most third-party firewalls will probably give you  this same type of information as well as block things that are trying to  connect… unless the applications managed to add an exclusion already.  Better check anyway. So, how do you find out what the problem is? There is an easy method using the netstat  command from a command prompt window. This works with Windows 10, 8, 7, Vista, and XP.  If you’re still using XP, make sure you are running at least Service Pack 2,  and just assume that somebody already hacked your computer because your operating  system is now a te...

Fileless Ransomware - All you need to know.

Fileless Ransomware - All you need to know. Many global companies, banks, and even some government organizations are struggling to protect everything from the newest type of threat that scared the world — Fileless Ransomware. The new version of ransomware has arrived — it’s stealthy, almost impossible to detect and is forcing every vulnerable organization to pay the ransom to cyber criminals. These attacks are called “fileless” or non-malware ransomware attacks in which the attack executes malicious commands with Microsoft’s PowerShell. It’s really important to mention that Non-malware or file-less ransomware (unlike some traditional ransomware) does not use any of the files to encrypt your data, but instead it writes scripts/macros which originate from PowerShell to encrypt the files. Fileless malware is a unique type of software and it's really difficult to detect because the malicious code is embedded into the native scripting language or written straight in...