Important Terms in the world of Hacking

Hacking is an attempt to enter a computer network with the aim of finding weaknesses in the network system illegally and exploring them. Meanwhile, people who carry out hacking activities are called hackers.

Cracking is an attempt to illegally enter a network system with the aim of stealing, changing, or destroying data stored on a network. Meanwhile, people who carry out cracking activities are called crackers.

Becoming a Hacker is not easy, it takes hard work, patience and strong perseverance. If you want to learn about Hacking, you must first know the terms in it.

For those of you who want to learn about the world of hacking, you should know in advance about the terms in it so that you are not confused when doing hacking activities. Even though there aren’t many from me, but if you want to add other terms, please write them below this post.

Here is a list of terms that exist in the world of Hacking:

How Hackers and Crackers infiltrate a network

Spoofing, which is a form of counterfeiting activity in which a hacker will falsify the identity of a user so that the hacker can log in or enter a network system as if the hacker were a genuine user.

Scanner, which is a program that will automatically detect the weaknesses of a computer on a local network or a network with another location.

Sniffer, Is a tool that can be operated on almost all types of protocols such as Ethernet, TCP / IP, IPX and others. While its function is as a tool for monitoring computer networks.

Password Cracker, Is a program that can decrypt a password or vice versa can turn off the password security system.

Related:  Brianne Miller Biography, Age, Height, Net Worth

Destructive Device, A collection of virus programs created specifically to destroy data such as Trojan Horses, Worms, Email Bombs, and Nukes.

The following are common terms in the world of hacking:

1. Bugs

Bugs are errors in programming that cause the system to be exploited or error under certain conditions. In web Hacking there are several bugs such as RFI, LFI, SQLI, RCE, XSS and so on.

2. SQL Injection, DDos and Deface

SQL Injection is a type of attack that allows the attacker user to access the database server. While DDos is a technique that crashes the system due to overload so that it cannot be accessed or even kills the service.
Deface is a technique that is often used by hackers, which later hackers can change the appearance of a website by force and illegally.

3. Phishing and Debugging

Phishing is the act of obtaining personal information such as user ID, passwords, PINs, bank account numbers, credit cards illegally.
Debugging is an activity to look for bugs (programming errors) and after finding them, it will fix the bugs that have been found earlier. Or in short Debug is the process of finding and fixing bugs.

4. Fake Logins, Fake Processes and Keyloggers

Fake Login is a dummy / fake page that is deliberately made to trick users with the aim of getting important information from users.
Fake Process is a clone process created to hide the name of the original process, which aims to trick the system admin.

Related:  Aly Silverio Biography, Age, Family, Images, Net Worth

Meanwhile, KeyLogger is a software that is installed on a computer so that it can record all activities that occur on the keyboard silently and invisibly so that the user is not aware of it.

5. Viruses, Worms, and Trojans

A virus is an evil code that has a working system with viruses that attack humans, this virus can reproduce itself and is like a parasite that lives in the files it infects. If the file is infected with a virus, the infected file can be damaged or the file size will increase in size.

Worms are malicious code whose system works the same as worms, reproduces itself and then spreads quickly.

Just like the Trojan horse that existed in the Roman Age, the Trojan will enter the system to peek and steal important information in it, then the stolen data will be sent to the owner of the trojan.

6. Backdoors

Backdoor or back door is installed on the computer that is the target, then the system that has been successfully entered will be exploited by the attacker. By using the Backdoor, the attacker can enter the victim’s computer at any time even though there is no physical touch.

7. Black Hats and White Hats

Black Hat is a group of hackers with the ability to steal data or disrupt existing systems on the victim’s computer. Black Hat is known for its ability to erase traces until it cannot be traced.

Related:  Untouchable Biography, Latest Images Photoshoot, Age, Family, Love, Figure

If there is evil there must be good, so in the world of hackers if Black Hat tends to destroy and steal, there are also White Hats who tend to use the knowledge they have to satisfy their curiosity.

8. Script Kiddies

An attack pattern that is often used by novice hackers using lightweight tools that can be found on many other hacker sites. This script only contains simple scripts which will later be used to deface or launch DOS on the victim.

9. Buffer Overflow

Is a practical weakness that can be found and exploited by the Hacker in a system. If the operating system or program is not coded perfectly, the hacker can disturb the victim’s computer by sending commands that will make the disturbance last longer.

10. Exploit

Exploit means the existence of a security hole in software running on a computer. Through this exploit, hacker attacks will also be wide open, every time a new application or operating system emerges, the drums of war are beating for hackers to start looking for weaknesses.

So, those were some important terms in the world of hacking. As I mentioned above, these are just a few, actually there are many others.

Therefore it is very permissible for those of you who want to add your opinion and knowledge about terms in the world of hacking in the comments column provided.

Thank you for visiting. . .Regards

Subscribe this Channel: Mushtaq

Disclaimer: All Images that are Used in this post from Instagram & Google Image and Credit Goes to their Respective Onwer. The above details are sourced from various Online reports. The website does not guarantee 100% accuracy of the figures.Contact Us on this Email for Credit or Remove these Images.

Note: does not aim to promote or condone piracy in any way. Piracy is an act of crime and is considered a serious offense under the Copyright Act of 1957. According to the Indian copyright act, an attempt to commit, aid, support, or counsel an act of piracy will be punishable with up to 3 years of imprisonment, and up to a ₹2,00,000 fine.

Scroll to Top