Commonly Used Terms in the Field of Hacking

Hacking Terms Techhyme

The world of hacking is a complex and constantly evolving field, with new techniques and technologies emerging all the time. As such, there are many terms used in this field that may be unfamiliar to the average person.

In this article, we will explore a list of terms commonly used in the field of hacking.

S.No. Term Meaning
1 Adware Software designed to force pre-chosen ads to display on a system.
2 Attack An action taken on a system to gain access and extract sensitive data.
3 Back door A hidden entry to a computing device or software that bypasses security measures, such as logins and password protections.
4 Bot A program that automates an action so that it can be done repeatedly at a much higher rate for a more sustained period than a human operator could do it.
5 Botnet A group of computers controlled without their owners’ knowledge, often used to send spam or make denial of service attacks.
6 Brute force attack An automated and simple method to gain access to a system or website by trying different combinations of usernames and passwords.
7 Buffer Overflow A flaw that occurs when more data is written to a block of memory, or buffer, than the buffer is allocated to hold.
8 Clone phishing The modification of an existing, legitimate email with a false link to trick the recipient into providing personal information.
9 Cracker One who modifies software to access features considered undesirable by the person cracking the software, especially copy protection features.
10 Denial of service attack (DoS) A malicious attempt to make a server or network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the Internet.
11 DDoS DDoS stands for Distributed Denial of Service. It is a type of cyber attack where multiple compromised systems, such as computers, servers, or IoT devices, are used to flood a targeted website or online service with traffic.
12 Exploit Kit Software designed to identify software vulnerabilities in client machines communicating with it and exploit those vulnerabilities to upload and execute malicious code on the client.
13 Exploit A piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to compromise the security of a computer or network system.
14 Firewall A filter designed to keep unwanted intruders outside a computer system or network while allowing safe communication between systems and users on the inside of the firewall.
15 Keystroke logging The process of tracking the keys pressed on a computer, often used by hackers to record login IDs and passwords.
16 Logic bomb A virus secreted into a system that triggers a malicious action when certain conditions are met.
17 Malware An umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware, and other malicious programs.
18 Master program The program a black hat hacker uses to remotely transmit commands to infected zombie drones, often used to carry out Denial of Service attacks or spam attacks.
19 Phishing An e-mail fraud method in which the perpetrator sends out legitimate-looking emails in an attempt to gather personal and financial information from recipients.
20 Phreaker Those who break into the telephone network illegally, typically to make free long distance phone calls or to tap phone lines.

 

You may also like:

Related Posts

Leave a Reply