Basics of Ethical Hacking - Introductory Terms Part-1

Basics of Ethical Hacking - Introductory Terms Part-1 | HackTHatCORE

Basics of Ethical Hacking - Introductory Terms Part-1 | HackThatCORE

Hacking glossary

Hello friends, today I came up with a complete introductory conceptual approach towards the basics of ethical hacking. So, without any time waste, Let's dive into it...

    • Autonomy

      Autonomy means that an AI construct doesn't need help from people. Driverless cars illustrate the term "autonomous" in varying degrees. Level four autonomy represents a vehicle that doesn;t need a steering wheel or pedals: it doesn't need a human inside of it to operate at full capacity.

    • Bind Shell

      A bind shell is a command shell that is opened on the target systems, essentially binding itself to a specific port. The attacking system then connects to that listening port and an interactive session is initiated. Bind shells aren't used very often today because any active firewall will block incoming connections to some random port.

    • Bluesmack

      BlueSmack is a Bluetooth attack that knocks out some Bluetooth-enabled devices immediately. This Denial of Service attack can be conducted using standard tools that ship with the official Linux Bluez utils package.

    • Cypher Block Chaining

      In a cypher block chaining process, data is encrypted in specific blocks, and each block is dependent on the blocks before it for decryption. The process uses something called an initialization vector to help tie these blocks of encrypted data together.

    • Deep Packet Inspection

      Deep Packet Inspection is a type of data processing that inspects in detail the data being sent over a computer network, and usually takes action by blocking, re-routing, or logging it accordingly. While deep packet inspection can be used for innocuous reasons such as making sure that is in the correct format or checking for malicious code.

    • Docker

      Docker is a computer program that performs operating-system-level virtualization also known as containerization. It was first released in 2013 and is developed by Docker, Inc. Docker is used to run software packages called "containers".

    • Joomscan

      OWASP Joomscan is a perl-based open-source vulnerability scanner used to detect Joomla CMS misconfigurations and security vulnerabilities. The scanner is capable of analyzing a Joomla installation for common misconfigurations and vulnerabilities.

    • Netwide Assembler

      The Netwide Assembler is an assembler and disassembler for the Intel x86 architecture. It can be used to write 16-bit, 32-bit and 64-bit programs. NASM is considered to be one of the most popular assemblers for Linux.

    • Nipe

      This Perl Script enables you to directly route all your traffic from your computer to the Tor Network through which you can surf the Internet Anonymously without having to worry about being tracked or traced back.

    • OnionScan

      OnionSca, this program checks websites for issues that may compromise your darkweb website's security and unmask the servers and reveal their owners. This issue could be related to some open server status page or some metadata in the images of the website revealing the coordinates of the place where the picture was taken.

    • Port Knocking

      Port Knocking is a method used to open ports on a firewall by a set of connection attempts launched over closed ports. When the correct connection sequence is recieved on the server, the firewall rules are modified dynamically to allow the host that sent the packets to connect to a specific port.

    • Rational Agent

      Artificial Intelligence is defined as study of rational agents. A rational agent could be anything which makes decisions, like a person, firm, machine, or software. It carries out an action with the best outcome after considering past and current percepts.

    • Regression Testing

      Regression Testing is a type of software that ensures that previously developed and tested software still performs the same way after it is changed or infected with other software. Changes may include software enhancements, patches, configuration changes, etc.

    • SPARTA

      SPARTA is a python GUI application that simplifies network infrastructure penetration testing by aiding the penetration tester in the scanning and enumeration phase.

    • YAML

      YAML is a human-readable data serialization language. It is commonly used for configuration files, but could be used in many applications where data is being stored or transmitted.

Comments

Popular Posts