New
Hackers Dictionary
Let us start our journey from the basics! Below are some
frequently used words, their brief meaning and acronyms
that are commonly used in this world!
ACRONYMS
R.A.T :-> Remote Administration Tool
DDoS :-> Distributed Reflected Denial of Service Attack,
uses a list of reflection servers or other methods such as
DNS to spoof an attack to look like it's coming from
multiple ips. Amplification of power in the attack COULD
occur
VPS :-> Virtual Private Sever
SE :-> Social Engineering
HTTP :-> Hyper Text Transfer Protocol. The foundation of
data communication for the World Wide Web.
SSH :-> Secure Shell, used to connect to Virtual Private
Servers.
FTP :-> File Transfer Protocol. Used for transferring files
over an FTP server.
XSS (CSS) :-> Cross Site Scripting
Malware :-> Malicious Software
Skid :-> Script Kid/Script Kiddie
DDoS :-> Distributed Denial of Service
VPN :-> Virtual Private Networ
Nix :-> Unix based operating system, usually referred to
here when referring to DDoS'in
SQL :-> Structured Query Language. It usually goes
along
with a word after it, such as "SQL |njection."
FUD :-> Fully Undetectable
WORDS
FUD :-> Fully undetectable, can be used in many terms.
Generally in combination with crypters, or when trying to
infect someone.
LOIC/HOIC :-> Tool(s) used by many anonymous
members
to conduct DDoS attacks. It is not recommended to use
these under any circumstances.
Trojan :-> A Trojan is a type of malware that
masquerades
as a legitimate file or helpful program with the ultimate
purpose of granting a hacker unauthorized access to a
computer.
Botnet :-> Computers infected by worms or Trojans and
taken over by hackers and brought into networks to send
spam, more viruses, or launch denial of service attacks.
SQL Injection :-> An SQL injection is a method often
used
to hack SQL databases via a website, and gain admin
control of the site.
Root :-> Highest permission level on a computer, able to
modify anything on the system without restriction.
Warez :-> Software piracy
White Hat :-> A "white hat" refers to an ethical hacker, or
a
computer security expert, who specializes in penetration
testing and in other testing methods to ensure the
security
of a businesses information systems. (Good guy, per se)
Rootkit (ring3 ringO) :-> A powerful exploit used by
malware to conceal all traces that it exists. Ring3 - Can
be
removed easily without booting in safemode. Ring0 —
Very
hard to remove and very rare in the wild, these can
require
you to format, it's very hard to remove certain ring0
rootkits
without safemode.
Script Kiddie :-> A script kid, or skid is a term used to
describe those who use scripts created by others to hack
computer systems and websites. Used as an insult,
meaning that they know nothing about hacking.
IP Grabber :-> A link that grabs someone’s IP when they
visit it.
DDoS :-> Distributed denial of service. Flooding
someones
connection with packets. Servers or web-hosted shells
can
send packets to a connection on a website usually from
a
booter.
VPS :-> The term is used for emphasizing that the virtual
machine, although running in software on the same
physical computer as other customers’ virtual machines,
is
in many respects functionally equivalent to a separate
physical computer, is dedicated to the individual
customer's needs, has the privacy of a separate physical
computer, and can be configured to run server software.
Mlalware :-> Software designed to do all kinds of evil
stuff
like stealing identity information, running DDoS attacks,
or
soliciting money from the slave.
Phreak :-> Phone Freaks. Hackers who hack cell phones
for free calling. Free Long distance calling. Etc.
Bot :-> A piece of malware that connects computer to an
attacker commonly using the HTTP or IRC protocal to
await malicous instructions.
Shell :-> The common meaning here is a hacked web
server with a DoS script uploaded to conduct DDoS
attacks
via a booter.
ANSI Bomb :-> ANS|.SYS key-remapping commands
consist of cryptic-looking text that specifies, using ansi
numeric codes to _redefine_keys.
DOX :-> Personal information about someone on the
Internet usualy contains real name, address, phone
number, SSN, credit card number, etc.
Worm :-> Software designed to spread malware with little
to no human interaction.
Deface :-> A website deface is an attack on a site that
changes the appearance of the site or a certain webpage
Keylogger :-> A software program that records all
keystrokes on a computer's keyboard, used as a
surveillance tool or covertly as spyware.
Remote Administration Tool :-> It's a general term for a
hack that can let someone remotely control your
computer
with admin access.
Black Hat :-> A hacker who performs illegal actions to do
with hacking online. (Bad guy, per se)[/u]
No comments:
Post a Comment