LIST OF IMPORTANT TERMS USED IN ETHICAL HACKING
1. MALWARE
2. KEYLOGGERS
3. PHISHING
4. CLONE PHISHING
5. BUFFER OVERFLOW
6. FIREWALL
7. BOT
8. DENIAL OF SERVICE ATTACKS (DOS)
9. BACK DOOR
10. LOGIC BOMB
11. BRUTE FORCE ATTACK
12. ATTACK
13. EXPLOIT KIT
14. ADWARE
6. FIREWALL
7. BOT
8. DENIAL OF SERVICE ATTACKS (DOS)
9. BACK DOOR
10. LOGIC BOMB
11. BRUTE FORCE ATTACK
12. ATTACK
13. EXPLOIT KIT
14. ADWARE
MALWARE
Malware is an umbrella term used to refer to a variety of forms of hostile or intrusive software ,including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious viruses.KEYLOGGERS
Keystroke logging in the process of tracking the keys which are pressed on a computer and which touchscreen points are used .it is simply the map of a computer human interface. It is used by gray and black hat hackers to record login ids and password. Keyloggers are usually secreted onto a device using a trojan delivered by a phishing email.PHISHING
Phishing is an email fraud method in which the perpetrator sends out legitimated looking emails,in an attempt to gather personal and financial information from recipients.CLONE PHISHING:
Clone phishing is an altered form of email with a vulnerable link in order to trap user and get the personal information.BUFFER OVERFLOW
Buffer overflow is a flaw that occurs when more data is written to a block of memory, on buffer. Which then, allocated to hold.FIREWALL
A firewall is a filter designed to keep unwanted intruders outside a computer system or network while allowing safe communication between systems and users on theinside of the firewall.
BOT
A bot is a program that automates an action so that it can be done repeatedly at a much higher rate for a more sustained period than a human operator could do it.For instance, transferring different protocol requests at high rates, implementing scripts to create objects.
0 Comments
Your comments and interesting view make our day!