Ethical Hacking important terminologies - Every hacker should know | Cyber security basics


LIST OF IMPORTANT TERMS USED IN ETHICAL HACKING

1. MALWARE
2. KEYLOGGERS
3. PHISHING
4. CLONE PHISHING
5. BUFFER OVERFLOW
6. FIREWALL
7. BOT
8. DENIAL OF SERVICE ATTACKS (DOS)
9. BACK DOOR
10. LOGIC BOMB
11. BRUTE FORCE ATTACK
12. ATTACK
13. EXPLOIT KIT
14. ADWARE



MALWARE

Malware is an umbrella term used to refer to a variety of forms of hostile or intrusive software ,including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious viruses.




KEYLOGGERS

Keystroke logging in the process of tracking the keys which are pressed on a computer and which touchscreen points are used .it is simply the map of a computer human interface. It is used by gray and black hat hackers to record login ids and password. Keyloggers are usually secreted onto a device using a trojan delivered by a phishing email.




PHISHING

Phishing is an email fraud method in which the perpetrator sends out legitimated looking emails,in an attempt to gather personal and financial information from recipients.

CLONE PHISHING:

Clone phishing is an altered form of email with a vulnerable link in order to trap user and get the personal information. 




BUFFER OVERFLOW

Buffer overflow is a flaw that occurs when more data is written to a block of memory, on buffer. Which then, allocated to hold.




FIREWALL

A firewall is a filter designed to keep unwanted intruders outside a computer system or network while allowing safe communication between systems and users on the
inside of the firewall.




BOT

A bot is a program that automates an action so that it can be done repeatedly at a much higher rate for a more sustained period than a human operator could do it.
For instance, transferring different protocol requests at high rates, implementing scripts to create objects.





DENIAL OF SERVICE ATTACKS (DOS)

A denial of service (DOS) attack is a malicious attempt to make a server or a network resource unavailable to users,usually by temporarily interrupting the working of a host connected with the Internet connection.




BACK DOOR

A back door,or trap door,is a hidden entry to a computing device or software that bypasses security measures, such as logins and password protections.




LOGIC BOMB

A kind of virus inserted into a system that initiates a vulnerable action when you click or some requests are received, such that time bomb.





BRUTE FORCE ATTACK

A brute force attack is an automated and the simplest kind of method to gain access to a system or website.It tries different combination of user names and passwords, over and over again.Until it gets in.





ATTACK

An attack is an action that is done on a system to get it’s access and extract sensitive data. There are several tools such as social engineering attacking tools.





EXPLOIT KIT

An exploit kit is software system designed to run on web severs.With the purpose of identifying software vulnerabilities in client machines communicating with it and exploiting discovered vulnerabilities to act and trigger vulnerable code.





ADWARE:

Adware is software designed to force pre-chosen ads to be displayed and make a back your computer which repeatedly shows you different ads.


Post a Comment

0 Comments