Hacker’s Dictionary Some Hacking Terms-If You are new in hacking then this post very helpful for you.
Hacking Terms Explain
HACKER [originally, someone who makes furniture with an axe] n. 1. A person who enjoys learning the details of programming systems and how to stretch their capabilities, as opposed to most users who prefer to learn only the minimum necessary. 2. One who programs enthusiastically, or who enjoys programming rather than just theorizing about programming. 3. A person capable of appreciating hack value (q.v.). 4. A person who is good at programming quickly. Not everything a hacker produces is a hack. 5. An expert at a particular program, or one who frequently does work using it or on it; example: “A SAIL hacker”. (Definitions 1 to 5 are correlated, and people who fit them congregate.) 6. A malicious or inquisitive meddler who tries to discover information by poking around. Hence “password hacker”, “network hacker”.
DDoS = Distributed Denial of Service
DrDoS = Distributed Reflected Denial of Service Attack, uses a list of reflection servers or other methods such as DNS to spoof an attack to look like it’s coming from multiple ips. Amplification of power in the attack COULD occur.
FTP =File Transfer Protocol. Used for transferring files over an FTP server.
FUD = Fully Undetectable
HTTP =Hyper Text Transfer Protocol. The foundation of data communication for the World Wide Web.
IRC = Internet Relay Chat. Transmiting text messages in real time between online users.
JDB =Java drive-by, a very commonly used web-based exploit which allows an attacker to download and execute malicious code locally on a slave’s machine through a widely known java vulnerability.
Malware =Malicious Software
Nix = Unix based operating system, usually refered to here when refering to DoS’ing.
POP3 =This is the most popular protocol for picking up e-mail from a server.
R.A.T = Remote Administration Tool
SDB = Silent drive-by, using a zero day web-based exploit to hiddenly and un-detectably download and execute malicious code on a slave’s system. (similar to a JDB however no notification or warning is given to the user)
SE = Social Engineering
Skid =Script Kid/Script Kiddie
SMTP =A TCP/IP protocol used in sending and receiving e-mail.
SQL =Structured Query Language. It’s a programming language, that used to communicate with databases and DBMS. Can go along with a word after it, such as “SQL Injection.”
SSH =Secure Shell, used to connect to Virtual Private Servers.
TCP = Transmission Control Protocol, creates connections and exchanges packets of data.
UDP =User Datagram Protocol, An alternative data transport to TCP used for DNS, Voice over IP, and file sharing.
VPN =Virtual Private Network
VPS =Virtual Private Server
XSS (CSS) = Cross Site Scripting
Algorithm = A series of steps specifying which actions to take in which order.
ANSI Bomb = ANSI.SYS key-remapping commands consist of cryptic-looking text that specifies, using ansi numeric codes to redefine keys.
Back Door = Something a hacker leaves behind on a system in order to be able to get back in at a later time.
Binary = A numbering system in which there are only two possible values for each digit: 0 and 1.
Black Hat = A hacker who performs illegal actions to do with hacking online. (Bad guy, per se)
White hat = A hacker who uses their skills for social well, or helps by exposing vulnerabilities in their IT systems This is the opposite of a black hat
Blue Hat =A blue hat hacker is someone outside computer security consulting firms who is used to bug test a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term BlueHat to represent a series of security briefing events.
Bot = A piece of malware that connects computer to an attacker commonly using the HTTP or IRC protocal to await malicous instructions.
Botnet = Computers infected by worms or Trojans and taken over by hackers and brought into networks to send spam, more viruses, or launch denial of service attacks.
Buffer Overflow = A classic exploit that sends more data than a programmer expects to receive. Buffer overflows are one of the most common programming errors, and the ones most likely to slip through quality assurance testing.
Cracker = A specific type of hacker who decrypts passwords or breaks software
Doxing = Discovering and then publishing the identity of an internet user by following their details online.
IP = Internet protocol address – a computer’s identifier or “fingerprint”. This is used to identify the person using the device.
Malware = A program designed to seize control over or steal data from a computer.
Spyware = This is “malware” programmed to sit on unnoticed computer and send back data surreptitiously to the hacker.
Zero Day threat = zero-day threat refers to a threat which is undocumented and therefore hidden from any antivirus scanner installed on the system. This kind of flaw is inherent in anti-virus scanners, making it the oblivious to developers who built antivirus functionalities based on knowledge of these vulnerabilities. Such vulnerabilities are exploited through different vectors, popular web browsers, and malicious attachments via e-mails.
Firewall = A firewall is a network security system, which continuously monitors incoming and outgoing network traffic, and blocks out any untrusted sources to ensure safe communications. A firewall can be both hardware and software based. A well designed and implemented firewall continuously monitors for malicious inputs, however, black hats to strive to circumvent them. As a result, firewalls are constantly updated, adjusted or replaced with new security measures over time.