Basics of Ethical Hacking - Introductory Terms Part-2

Basics of Ethical Hacking - Introductory Terms Part-2 | HackTHatCORE

Basics of Ethical Hacking - Introductory Terms Part-2 | HackThatCORE

Hacking glossary

Hello friends, today I came up with second part of the complete introductory conceptual approach towards the basics of ethical hacking. So, without any time waste, Let's dive into it...

    • Antivirus

      Antivirus software also known as anti-malware, is a computer program used to prevent, detect and remove malware. Antivirus software was originaly developed to detect and remove viruses.

    • BrainFuck

      Brainfuck is and esoteric programming language created in 1993 by Urban Muller, and notable for its extreme minimalism. The language consists of only eight simple commands and an instruction pointer.

    • BSSID

      The BSSID is a 48-bit identity used to identify a particular BSS (Basic Service Set) within an area. In Infrastructure BSS networks, the BSSID is the MAC (Medium Access Control) address of the AP and in Independent BSS or as hoc networks, the BSSID is generated randomly.

    • DLL Hijacking

      DLL Hijacking is an attack that exploits the way some Windows applications search and load Dynamic Link Libraries. Most Windows applications will not use afully qualified path to load any required DLLs. A bad guy can place a fake DLL for a known program in a location that is searched before the real DLL's location and almost guarantee that the malicious DLL is loaded.

    • Insecure Direct Object Reference (IDOR)

      IDOR allows attackers to bypass authorization and access resources directly by modifying the value of a parameter used to directly point to an object. Such resources can be database entries belonging to other users, files in the system and more.

    • Machine Learning

      Machine Learning is an artificial intelligence (AI) discipline geared toward the technological development of human knowledge. Machine learning allows computers to handle new situations via analysis, self-training, observation and experience.

    • Network Throughput

      In data transmission, network throughput is the amount of data moved successfully from one place to another in a given time period and typically measured in bits per second (bps), as in megabits per second (Mbps) or gigabits per second (Gbps).

    • Nping

      Nping is an open source tool for network packet generation, response analysis and response time measurement. Nping can generate network packetsfor a wide range of protocols, allowing users full control over protocol headers. Custom TCP, UDP, ICMP and ARP packet generation.

    • Plugin

      A Plugin is a piece of software that acts as an add-on to a web browser or a software and gives it additional functionality. Plugins can allow a web browser to display additional content it was not originally designed to didplay.

    • Red Eye

      A new ransomware named, Red Eye has caught the eye of a security researcher, who discovered the malware back in February. It claims to destroy the victim's computer if the payment isn't made. It's worth nothing that the new strain is created by the autor of Annabelle ransomware.

    • Remote Code Execution

      The ability to trigger arbitrary code execution from one machine on another (especially via a wide-area network such as the Internet) is often referred to as remote code execution.

    • Sabily

      Sabily, formerly known as Ubuntu Muslim Edition, is a Linux distribution release that was supported from 2007 to 2011. It offers different sorts of support for Muslim users, includeing Arabic language support; different types of monitoring capabilities for filtering out objectionable material; and even features for recognizing Muslim prayer.

    • Talking Trojan

      A talking Trojan is a type of Trojan virus introduced in 2007 that replays an audio message while it deletes the contents of a hard drive or otherwise attacks a system. This is a type of Trojan program, a virus that looks legitimate but attacks the user system when it is run.

    • Wireshark

      Wireshark is a free and open source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development and educationaal purposes. Originally named Ethereal but was renamed later.

    • Zip Slip

      Zip Slip is a widespread arbitrary file overwrite critical vulnerability, which typically results in remote command execution. It was discovered and responsibly disclosed by the Snyk Security team, and affects thousands of projects, including ones from HP, Amazon, Apache, Pivotal and many more.

Comments

Popular Posts