Basic Terminologies Used by Ethical Hackers

terminologies ethical hackers techhyme

Ethical hackers are usually security professional or network penetration testers who use their hacking skills for defensive and protective purposes. They do their work with the permission of the organization. The work is under the laws of the country. Any computer professional can learn ethical hacking.

As nowadays all the information is available online, a large number of users are accessing it some of them use this information for knowledge and some use it to know how to use this information to destroy or steal the data of websites or databases without the permission of the owner.

Suggested Read:

Hacking is breaking in to computer networks and systems either for profit or motivated by a challenge. Hacking is not just a word to be handled easily; it has many meaning in different situations. It is a Computer crime but on the other hand it is one of the highly paid jobs in the field of the computer security.

Ethical Hacking Terminology –

  1. Adware − Adware is software designed to display the pre-chosen ads to display on our system.
  2. Attack − An attack is an is done on a system to get its access and extract sensitive data.
  3. Back door − A back door, or trap door, is a hidden entry to a computing device or software that can bypasses security measures taken in, such as logins and password protections.
  4. Bot − A bot is a program that automates an action so that it can be done repeatedly at a much higher rate for a longer period than a human operator could do it.
  5. Botnet − A botnet, also known as zombie army, is a group of computers controlled without the presence of the owner’s knowledge. Botnets are used to send spam or used to do denial of service attacks.
  6. Brute force attack − A brute force attack is an automated and the simplest method to gain access to a system or website. It tries different combination of usernames and passwords, again and again, until it successfully able hack into the system.
  7. Clone phishing − Clone phishing is the process of creating replica of an existing, legitimate email with a false link to trick the recipient into providing personal information.
  8. Cracker − A cracker is one who cracks the original software to access all features of the original software which it considered illegal to do cracking of the original software, especially copying the copyright features such as security, access rights and other features of the original software.
  9. Denial of service attack (DOS) − A denial of service (DOS) attack is a malicious attempt to make a server or a network resource inaccessible to users, usually by temporarily suspending the services and making unavailable to those who’s accessing the services on the Internet.
  10. Spoofing − Spoofing is a process in which a hacker gains an unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host and to bypass the firewalls.
  11. Firewall − A firewall is a virtual wall that is used is designed to keep unwanted intruders outside a computer system or network while allowing safe communication between systems and users on the inside of the firewall.
  12. Keystroke logging − Keystroke logging is the process of tracking the keys which are pressed on a computer (or on the touch screen of mobile phone). It is used by hackers to record the login IDs and passwords.
  13. Malware − Malware is a vast umbrella term used to refer many other variety of forms of hostile or harmful software, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware, and other malicious programs.
  14. Phishing − Phishing is e-mail fraud method in which the sender sends out legal looking emails, in an attempt to gain personal and financial information from recipients.
  15. Rootkit − A rootkit allows hacker to maintain command and control over a computer without the computer user/owner knowing about it. Once it has been installed, the hacker is able to take controller of the victim machine and able to remotely execute files and change system configurations on the host machine.
  16. SQL Injection − SQL injection is an SQL code injection technique, used to attack database and modify the data stored in databases .
  17. Social engineering − Social engineering is process of deceiving someone with the purpose of acquiring sensitive and personal information, like credit card details or user names and passwords. Hacker is experts in doing the social engineering attacks and most popular form of attacks.
  18. Trojan − A Trojan, or Trojan Horse, is a malicious program hidden to look like a valid program, making it difficult to distinguish from programs that are supposed to be there designed with an intention to destroy files, alter information, steal passwords or other sensitive information.