Hacking Terminologies

Welcome back...!πŸŽ‰

Hello again Friends...

πŸ’£first of all, I would like to thank you all for giving me such good support. I am back with the post that I mentioned in my previous post(link-https://securityencoder.blogspot.com/2020/07/intro-to-hacking.html). So let's start with today's topic "hacking terminologies".


SimTaRik: Pengertian Hack, Hacker, dan Hacking

" Hacking Terminologies "

In the world of hacking several terms are common which you should know.These terminologies are:

Attack: An attack is an action that is done on a system to get its access and extract sensitive data.

Back door: A back door, or trap door, is a hidden entry to a computing device or  software that bypasses security measures, such as logins and password protections.

Brute force attack: A brute force attack is an automated and the simplest kind of method to gain access to a system or websites. It tries different combination of usernames and passwords until it gets in.

Adware: An adware is software designed to force pre-chosen ads to display on your system.

Exploit: Exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to compromise the security of a computer or network system.

Malware: Malware is a term used for computer viruses, worms, Trojan horses, ransomware, spyware and other malicious programs.

Phishing: Phishing is an e-mail fraud method in which the hacker sends spam-looking e-mails to the target to gather personal and financial information from recipients.


Phishing Emails - How to Protect Your Customers When Using E ...


Spyware: Spyware is software that aims to gather information about a person or organization or that asserts control over a computer without consumer's knowledge.

Spoofing: Spoofing is a technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host.

Threat: A threat is a possible danger that can exploit an existing bug or vulnerability to compromise the security of a computer or network system.

Vulnerability: A vulnerability is a weakness which allows a hacker to attack on the security of a computer or a network system.

Worms: A worm is a self-replicating virus that does not alter files but resides in active memory and duplicates.

Trojan: A Trojan, or Trojan Horse, is a malicious program which looks as a valid program, making it difficult to distinguish from programs that are designed with intent of destroying files, steal passwords or other information.

Virus: A virus is a malicious program or a piece of code which is capable of copying itself has effect of corrupting a system or destroying the data.

SQL Injection: SQL Injection is an SQL code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution.

Rootkit: Rootkit is a malicious software designed to hide the existence of certain processes or programs from normal methods of detection.

Keylogging: Keystroke logging or keylogging is the process of tracking the keys which are pressed on a computer or touchscreen points on our mobile phone. It is simply the map of UI. It is used by grey and black hat hackers to record login IDs and passwords.

I will not be able to explain all the terms but these are which are mostly used.

πŸ‘‰I am sure that many of you are interested in hacking but most of the people don't know how to start, don't worry here are some tips that you can follow to become a hacker...

πŸ’₯You should be well versed in the following areas:

Networking - It is crucial. Thorough understanding of how computer network works will help you to protect files.

Programming - Try to learn more than one programming languages. Python is very good for hacking along with it you should have a knowledge of bash, ruby and batch programming.

Databases - Learn MySQL. It is important for SQL injection attack for grey and white hat hackers.

Cryptography - Data encryption is the process that converts readable text to protected files. Data should also be encrypted when transmitted across networks to protect against any unauthorized access to the traffic.



Operating systems - Try to cope with more than one operating system.Along with windows you should have knowledge of Linux commands, Kali Linux is the powerful tool which provides you a well hacking environment.


thanks for your time guys. In the next post we will discuss about tools and OS related with hacking...keep smiling...πŸ˜„






Comments

Post a Comment