Home » tech news » Hacker’s Dictionary you must know

Hacker’s Dictionary you must know

Are you new to the realm of hacking?
Do you feel dumb when you don’t know the meaning of a certain term?Well, then this will certainly help you out! . If you are ever unsure about anything, simply scroll down and find that specific word, then read the definition.
Anything includes: Abbreviations, Phrases, Words, and Techniques.*The list is in alphabetical order for convenience!*
Abbreviations
? DDoS = Distributed Denial of Service
? DrDoS = Distributed Reflected Denial of Service Attack, uses a list of reflection servers or other methods such as DNS to spoof an attack to look like it’s coming from multiple ips. Amplification of power in the attack COULD occur.
? FTP =File Transfer Protocol. Used for transferring files over an FTP server.
? FUD = Fully Undetectable
? Hex =In computer science, hexadecimal refers to base-16 numbers. These are numbers that use digits in the range: 0123456789ABCDEF. In the C programming language (as well as Java, JavaScript, C++, and other places), hexadecimal numbers are prefixed by a 0x. In this manner, one can tell that the number 0x80 is equivalent to 128 decimal, not 80 decimal.
? HTTP =Hyper Text Transfer Protocol. The foundation of data communication for the World Wide Web.
? IRC = Internet Relay Chat. Transmiting text messages in real time between online users.
? JDB =Java drive-by, a very commonly used web-based exploit which allows an attacker to download and execute malicious code locally on a slave’s machine through a widely known java vulnerability.
? Malware =Malicious Software
? Nix = Unix based operating system, usually refered to here when refering to DoS’ing.
? POP3 =This is the most popular protocol for picking up e-mail from a server.
? R.A.T = Remote Administration Tool
? SDB = Silent drive-by, using a zero day web-based exploit to hiddenly and un-detectably download and execute malicious code on a slave’s system. (similar to a JDB however no notification or warning is given to the user)
? SE = Social Engineering
? Skid =Script Kid/Script Kiddie
? SMTP =A TCP/IP protocol used in sending and receiving e-mail.
? SQL =Structured Query Language. It’s a programming language, that used to communicate with databases and DBMS. Can go along with a word after it, such as “SQL Injection.”
? SSH =Secure Shell, used to connect to Virtual Private Servers.
? TCP = Transmission Control Protocol, creates connections and exchanges packets of data.
? UDP =User Datagram Protocol, An alternative data transport to TCP used for DNS, Voice over IP, and file sharing.
? VPN =Virtual Private Network
? VPS =Virtual Private Server
? XSS (CSS) = Cross Site Scripting
Words
?Algorithm = A series of steps specifying which actions to take in which order.
?ANSI Bomb = ANSI.SYS key-remapping commands consist of cryptic-looking text that specifies, using ansi numeric codes to redefine keys.
?Back Door = Something a hacker leaves behind on a system in order to be able to get back in at a later time.
?Binary = A numbering system in which there are only two possible values for each digit: 0 and 1.
?Black Hat = A hacker who performs illegal actions to do with hacking online. (Bad guy, per se)
?Blue Hat =A blue hat hacker is someone outside computer security consulting firms who is used to bug test a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term BlueHat to represent a series of security briefing events.
?Bot = A piece of malware that connects computer to an attacker commonly using the HTTP or IRC protocal to await malicous instructions.
?Botnet = Computers infected by worms or Trojans and taken over by hackers and brought into networks to send spam, more viruses, or launch denial of service attacks.
?Buffer Overflow = A classic exploit that sends more data than a programmer expects to receive. Buffer overflows are one of the most common programming errors, and the ones most likely to slip through quality assurance testing.
?Cracker = A specific type of hacker who decrypts passwords or breaks software
Kelvin Ace


Leave a Reply

Your email address will not be published. Required fields are marked *

Discover more from Applygist Tech News

Subscribe now to keep reading and get access to the full archive.

Continue reading