Skip to main content

Hackers Dictionary

Hackers Dictionary
Hackers Dictionary
This is very Basic Hacking Dictionary which has very famous types of attacks used by hackers and their little bit explanation

What is the meaning of R.A.T
Remote Administration Tool

What is DDoS?
Distributed Reflected Denial of Service Attack,
uses a list of reflection servers or other methods such as DNS to spoof an attack to look like it's coming from multiple ips. Amplification of power in the attack COULD occur.You can say that
Flooding someones connection with packets. Servers or web-hosted shells can
send packets to a connection on awebsite usually from a booter.

What is the meaning of VPS?
 Virtual Private Sever

What is SE?
Social Engineering

What is the meaning of HTTP?
 Hyper Text Transfer Protocol. The foundation of
data communication for the World Wide Web.

What is the meaning of SSH
 Secure Shell, used to connect to Virtual Private Servers.

What is the meaning of FTP?

File Transfer Protocol. Used for transferring files
over an FTP server.

What is the meaning of XSS (CSS)
Cross Site Scripting is a type vulnerability mostly caused by POST (URL data) causes the HTML and CSS characters without their encoding to penetrate a website's HTML or stylesheet by some hacker.

What is Malware?
Malicious Software or virus which causes a online server or an operating system to disclose system related information like spyware with destruction of memory usage.

What is Skid?
Script Kid/Script Kiddie

What is DDoS?
Denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of efforts to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet.

What is VPN?
 Virtual Private Network is secure private network of a group of people our dedicated LAN or WAN

What is Nix?
Unix based operating system, usually referred to here when referring to DDoS'in

What is SQL Injection?
SQL injection is DATABASE injection trick to be performed on websites having security vulnerabilities click here to hack a webiste

What is FUD?
Fully Undetectable
WORDS

What is FUD ?
Fully undetectable, can be used in many terms.
Generally in combination with crypters, or when trying to
infect someone.

What is LOIC/HOIC?
Tool(s) used by many anonymous members
to conduct DDoS attacks. It is not recommended to use these under any circumstances.

What is Trojan ?
A Trojan is a type of malware that masquerades
as a legitimate file or helpful program with the ultimate purpose of granting a hacker unauthorized access to a
computer.

What is Botnet ?
Computers infected by worms or Trojans and
taken over by hackers and brought into networks to send
spam, more viruses, or launch denial of service attacks.


What is Root ?
Highest permission level on a computer, able to
modify anything on the system without restriction.

What is Warez ?
Software piracy

What is White Hat?
A "white hat" refers to an ethical hacker, or a computer security expert, who specializes in penetration
testing and in other testing methods to ensure the security
of a businesses information systems. (Good guy, per se) and sof

What is Rootkit (ring3 ringO)?
A powerful exploit used by malware to conceal all traces that it exists. Ring3 - Can be
removed easily without booting insafemode. Ring0 — Very
hard to remove and very rare in the wild, these can require
you to format, it's very hard to remove certain ring0 rootkits
without safemode.

What is Script Kiddie?
A script kid, or skid is a term used to describe those who use scripts created by others to hack computer systems and websites. Used as an insult, meaning that they know nothing about hacking.

What is IP Grabber?
A link that grabs someone’s IP when they visit it.


What is Phreak?
Phone Freaks. Hackers who hack cell phones
for free calling. Free Long distance calling etc.

What is Bot?
A piece of malware that connects computer to an attacker commonly using the HTTPor IRC protocal to await malicous instructions.

What is Shell?
The common meaning here is a hacked web server with a DoS script uploaded to conduct DDoS attacks
via a booter.

What is ANSI Bomb?
ANS|.SYS key-remapping commands
consist of cryptic-lookingtext thatspecifies, using ansi numeric codes to _redefine_keys.

What is DOX?
Personal information about someone on the
Internet usualy contains real name, address, phone
number, SSN, credit card number, etc.

What is Worm?
Software designed to spread malware with little to no human interaction.

What is Deface?
A website deface is an attack on a site that
changes the appearance of the site or a certain webpage

What is Black Hat?
opposite of white Hat these are un-ethical ways used to do hacking or to give fake impression to something

Comments

  1. I'm using Kaspersky protection for a couple of years, and I recommend this product to all of you.

    ReplyDelete

Post a Comment

Popular posts from this blog

Google Dork List For SQL Injection free 2013

Google Dork List For SQL Injection Today i am going to give you Google Dork List For SQL Injection so you can easily do sql injection or prevent it. If you want to take a Google Dork List For SQL Injection then here is Google Dork List For SQL Injection for you just read it below: Google Dork List For SQL Injection: inurl:"page=" & intext:"Warning: mysql_fetch_array()" inurl:"id=" & intext:"Warning: mysql_fetch_array()" inurl:"sida=" & intext:"Warning: mysql_fetch_array()" inurl:"=" & intext:"Warning: mysql_fetch_array()" inurl:"=" & intext:"You have an error in your SQL syntax" inurl:"sida=" & intext:"You have an error in your SQL syntax" inurl:"id=" & intext:"You have an error in your SQL syntax" inurl:"page=" & intext:"You have an error in your SQL syntax" inurl:index.p...

The Wolverine Movie review and full story

The Wolverine Movie review The Wolverine is a 2013 American-Australian superhero film featuring the Marvel Comics character Wolverine. It is the sixth installment in the X-Men film series and follows the events of X-Men: The Last Stand (2006). Hugh Jackman reprises his role from previous films as the title character, with James Mangold directing a screenplay written by Christopher McQuarrie, Scott Frank, and Mark Bomback, based on the 1982 limited series Wolverine by Chris Claremont and Frank Miller. McQuarrie was hired to write a screenplay for The Wolverine in August 2009. In October 2010, Darren Aronofsky was hired to direct the film. The project was delayed following Aronofsky's departure and the 2011 Tōhoku earthquake and tsunami in March 2011. In June 2011, Mangold was brought on board to replace Aronofsky. Bomback was then hired to rewrite the screenplay in September 2011. The supporting characters were cast in July 2012 with principal photography beginning at the ...

Naruto Shippuden Episode 418 The Blue Beast vs. Six Paths Madara

Naruto Shippuden Episode 418 Review: Naruto Shippuden Episode 418 was the best episode in a long time. People were already fed up because of fillers but this episode boost up the spirits of the fans of Naruto. Naruto and sasuke both are on the edge of dying. Obito is saving Naruto and now Kabuto is also free from the Itachi Uchiha’s jutsu and come to help Sasuke with the cells of hashirama and his own healing techniques. On the other hand Uchiha Madara is the strongest shinobi at this time and has many powers and he is trying to get the Rennigen eye from Obito and now the mighty guy the The Blue Beast of Kanoha is the only hurdle in his way. In this episode we will see a little fight between Madara and Guy in which gue will open the seventh gate of shock and give Madara a hard time. In this episode we also found out the source of guy’s inspiration which is his father who gave him a dream to follow to be strong and don’t give up. In the following episodes we are going to witness the pow...