3. • Decryption
• process of converting cipher text into plain text.
• Encryption
• Process of converting plain text in to cypher text.
• Explot
• To take an advantage to the weakness of the system.
• Hash Value
• It is a result of aplying cryptographic Hash function.
4. • Cyber Forensics: Extratting data as a proof for crime,
Recovary process of delete file.
• Vulnerability: The potential to herm or loss.
• Exposure: Risk Property.
• Resistance: Action taken to prevent.
• Resilience: Ability to recover root state.
• Contidentiality: limit acess to information.
• Integrity: Assureness that the information is accurate.
5. • Atack: Action with malicious intension.
• Aunthentication: it is process of identifying the person or system
with username or password.
Trapdoor, used to gain unauthorized acess to computer
or network( pogramer may bypass Sequrity steps without
permission).
• Buffer: Temporarly Data storage. while data is placed to one
placed to another.
• Bug:it also called and error.
• Loophole: Programing gap through which exploit can be acess.
6. Cryptoanalysis
• studying cryptographic system to find weakness of the
cryptographic algorithm and decipher the cipher text
without knowing secret key.
• Accounting: it manages user consumed resourses during
acess. it includes amount of data user used and sent login
session time.
7. Termminology
• What is key?
ans:- it is used to decode
encoding things.
(also called as authorized
identity.)
• what is Public key?
ans:
8.
9. Protocol
• set of rules or guidelines
for communicating in the
internet.
• Protocol Suit: Also called
as TCP/IP suit. Network
Protocol suit for
communicating over TCP
11. Malware
• Malware:==>
• Malware termes full form is
Malicious Software, it is
use to damage computer
system and network and
steal the data from that
infected system.
12. Malware
• Malicious Software
• Designed to damage or disable
computersystem.
• Gives full or limited control to the malware
creators.
• Used to steal the data or fraud
13. What is Metasploit?
1. Ruby based penetration platform to
perform an Exploit code.
2. It is used for making payloads
3. it is used for discovering vulnerbilities.
4. It is a framework.
15. Command Description
echo out put of what we provide
whoami Finding current user login
pwd Present Working Directory
mkdir make directory
man semiler to “--help” , details output of any command
16. File Command
Command Full Name Purpose
touch Touch Create a file
mkdir Make directery Create a folder
cp Copy Copy a file or folder
mv Move Move a file or folder
rm Remove Remove a file or folder
file File Determine the type of file
17. comand operator
Command Desreption
& Run commands in the background of
your terminal
&& Combines multiple commands in one
line
> Redirector operator. Takes output form
a command
>> Function is same as “>” operator
Appends the output rather than
replacing. (nothing is overwriten)
18. • Flags and switches are identified by a hyhen and a
certain keyword.
• E.g = ls, ls-al, ls-l
19. Networking Terms
• Port : End Point of communication to handle many
incomming and out going data transfer.
• Flags: Provide useful service in the process.
• Firewall: it is a part of network security system. Monitor
internet traffic within network and out side of the network.
• IDS: instrusion detection system. Used to monitor data
taraffic and detectets unwanted packets.
22. Port # Protocol
21 FTP Control
20 FTP data
23 Telnet
25 SMTP
53 DNS
80 HTTP
110 POP3
143 IMAP
443 HTTPS
VERTUALLY 65,535 ports are avaleable in internet
23. Networking Terms
• IPS: Instrusion Prevention System. Monitor as welll as
prevent the packets.
25. Google Dork
• It is a methode to search to find the information that are the not easily on the website.
• Also known as
• Haker’s technique that uses Google search and other Google application to find security holes in the
configuration code of the website.
• It is aso used to find out vulnerable website to hack.
• it also called google search opperator or Dorkoperator
26. .
GooleDork code used for
allintext: restricts results to those containing all the
query terms you specify in the text of the page.
e.g: google showing result
which contain text that you are maintions
allintittle:
filetype: searching basis of file type.
syntex: ” ”
you want to maintions specific site
syntex: ” ”
allinurl: restricts all links that contain your specify word
after “ :”
author:
define: it used for define some topic
it help to get information about any topic
intext: