ACRONYMS OF HACKING WORLD
- SQL > Structured Query Language. It usually goes along with a word after it , such as "SQL Injection
- FUD> Fully Undetectable.
- Nix>unix based operating system, usually referred to here when referring to DoS'ing.
- VPN > Vistual Private Network.
- DDoS>Distributed Denial of Service.
- skid>Script kid/Script Kiddle.
- Malware > Malicious Software.
- XSS(CSS)> Cross Site Scripting.
- FTP > File Transport Protocol. Used for transfering files over an FTP server.
- SSH >Secured Shell , used to connect to Virtual Private Server.
- HTTP > Hyper Text Transfer Protocol. The foundation of data communication for the world wide web.
- SE > Social Engineering .
- VPS > Virtual Private Server.
- DrDoS > Distributed Reflection Denial of Service Attack ,uses a list of refelection servers or other methods such as DNS to spoof an attack to look like it's coming from multiple ips. Amplification of power in the attack COULD occur.
+to+perform+massive+Reflection+DDoS+attack.jpg)
- R.A.T > Remote Administration Tool.A remote administration tool (a RAT) is a piece of software that allows a remote "operator" to control a system as if he has physical access to that system. While desktop sharing and remote administration have many legal uses,
WORDS
FUD > It stand for software that cannot be detected by anti-viruses when a scan is performed. The term is used in hacker circles to refer to something that appears to be clean to many anti-viruses, even though it is a hacking tool. FUD is also a more commonly used acronym for "Fear, Uncertainty and Doubt".
LOIC > LOIC performs a denial-of-service (DoS) attack (or when used by multiple individuals, a DDoS attack) on a target site by flooding the server with TCP or UDP packets with the intention of disrupting the service of a particular host. People have used LOIC to join voluntary botnets.
TROJAN > In computing is a generally non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically causing loss or theft of data, and possible system harm.
A Trojan often acts as a backdoor, contacting a controller which can then have unauthorized access to the affected computer
ROOT > Highest permission level on a computer , able to modify anything on a system without any restriction.
BOTNET > Computer infected by worms and trojan and taken over by hacker and brought into network to send spam, more viruses , or launch denial of service attack.
WAZER > Software privacy.
SQL Injection > An SQL injection is a method often used to hack SQL database via a website , and gain admin control on the site.
IP Grabber > A link that grabs someone's IP when they visit it.
No comments:
Post a Comment