Hackers Dictionary
Let us start our journey from the basics! Below are some frequently used words, their brief meaning and...
FUD :- Fully undetectable, can be used in many terms.
Generally in combination with crypters, or when trying to
infect som...
DDoS :- Distributed denial of service. Flooding someones connection with packets. Servers or web-
hosted shells can
send p...
Tool :- It's a general term for a hack that can let someone remotely control your computer
with admin access.
Black Hat :-...
Upcoming SlideShare
Loading in...5
×

Hackers dictionary

196

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
196
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Hackers dictionary

  1. 1. Hackers Dictionary Let us start our journey from the basics! Below are some frequently used words, their brief meaning and acronyms that are commonly used in this world! R.A.T :- Remote Administration Tool DDoS :- Distributed Reflected Denial of Service Attack, uses a list of reflection servers or other methods such as DNS to spoof an attack to look likeit's coming from multiple ips. Amplification of power in the attack COULD occur VPS :- Virtual Private Sever SE :- Social Engineering HTTP :- Hyper Text Transfer Protocol. The foundation of data communication for the WorldWide Web. SSH :- Secure Shell, used to connect to Virtual Private Servers. FTP :- File Transfer Protocol. Usedfor transferring files over an FTP server. XSS (CSS) :- Cross Site Scripting Malware :- Malicious Software Skid :- Script Kid/Script Kiddie DDoS :- Distributed Denial of Service VPN :- Virtual Private Networ Nix :- Unix based operating system, usually referred tohere when referring to DDoS'in SQL :- Structured Query Language. It usually goes along with a word after it, such as "SQL |njection." FUD :- Fully Undetectable WORDS
  2. 2. FUD :- Fully undetectable, can be used in many terms. Generally in combination with crypters, or when trying to infect someone. LOIC/HOIC :- Tool(s) used by many anonymous members to conduct DDoS attacks. It is not recommended to use these under any circumstances. Trojan :- A Trojan is a type of malware that masquerades as a legitimate file or helpful program with the ultimate purpose of granting a hacker unauthorized access to a computer. Botnet :- Computers infected by worms or Trojans and taken over by hackers and brought into networks to send spam, more viruses, or launch denial of service attacks. SQL Injection :- An SQL injection is a method often used to hack SQL databases via a website, and gain admin control of the site. Root :- Highest permission level on a computer, able to modify anything on the system without restriction. Warez :- Software piracy White Hat :- A "white hat" refers to an ethical hacker, or a computer security expert, who specializes in penetration testing and in other testing methods to ensure the security of a businesses information systems. (Good guy, per se) Rootkit (ring3 ringO) :- A powerful exploit used by malware to conceal all traces that it exists. Ring3 - Can be removed easily without booting insafemode. Ring0 — Very hard to remove and very rare in the wild, these can require you to format, it's very hard to remove certain ring0 rootkits without safemode. Script Kiddie :- A script kid, or skid is a term used to describe those who use scripts created by others to hack computer systems and websites. Used as an insult, meaning that they know nothing about hacking. IP Grabber :- A link that grabs someone’s IP when they visit it.
  3. 3. DDoS :- Distributed denial of service. Flooding someones connection with packets. Servers or web- hosted shells can send packets to a connection on awebsite usually from a booter. VPS :- The term is used for emphasizing that the virtual machine, although running in software on the same physical computer as other customers’ virtual machines, is in many respects functionally equivalent to a separatephysical computer, is dedicated tothe individual customer's needs, has the privacy of a separate physical computer, and can be configured to run server software. Mlalware :- Software designed todo all kinds of evil stuff like stealing identity information, running DDoS attacks, or soliciting money from the slave. Phreak :- Phone Freaks. Hackers who hack cell phones for free calling. Free Long distancecalling. Etc. Bot :- A piece of malware that connects computer to an attacker commonly using the HTTPor IRC protocal to await malicous instructions. Shell :- The common meaning here is a hacked web server with a DoS script uploaded to conduct DDoS attacks via a booter. ANSI Bomb :- ANS|.SYS key-remapping commands consist of cryptic-lookingtext thatspecifies, using ansi numeric codes to _redefine_keys. DOX :- Personal information about someone on the Internet usualy contains real name, address, phone number, SSN, credit card number, etc. Worm :- Software designed to spread malware with little to no human interaction. Deface :- A website deface is an attack on a site that changes the appearance of the site or a certain webpage Keylogger :- A software program that records all keystrokes on a computer's keyboard, used as a surveillance tool or covertly as spyware. Remote Administration
  4. 4. Tool :- It's a general term for a hack that can let someone remotely control your computer with admin access. Black Hat :- A hacker who performs illegal actions to do with hacking online. (Bad guy, perse)

×