85 views
# Terminology for ethical hacking What is ethical hacking? Finding vulnerabilities in computer networks and systems, and developing defenses against these is the goal. This is a list with important hacking terms. Adware is a software program that displays advertisements pre-selected on your computer. Read more here, [Ethical Hacking Classes in Pune](http://bit.ly/3KQTkzo). To gain access to a computer and extract sensitive data, a procedure is used. Back door: Also called a "trapdoor", a backdoor is a method of bypassing security measures, such as password protections and logins on a computer. Bot - A bot is a program that automates tasks so they can be completed at a higher rate and over a longer time period than an administrator. Examples include sending HTTP, FTP or Telnet data at a higher rate or calling content with a higher rate. A botnet, also known as a zombie army or a network of computers controlled by a third party without their knowledge. Botnets are often used to send spam and launch distributed denial of service attacks. Automated brute-force attacks are one of the easiest ways to gain access to any website or system. It will repeatedly try different combinations of usernames and passwords until it can gain access. Support Flood Cushion Flood happens when more data comes into contact with the memory block or cradle. Phishing using a copy is when a real email is altered with a fake link to fool the recipient. Saltine-Wafer is a person who breaks te product to get the elements he considers unfortunate, namely duplicate insurance highlights. A hacker will use a Denial of Services (DoS), or a denial-of service attack, to prevent users from gaining access to servers and network resources. It is done by temporarily suspending services or interfering in the operations of an Internet host. DDoS stands for distributed denial of service. Take advantage of Pack - A framework for programming that runs on a server with the intention of identifying weaknesses in client machines which speak to it, and then taking full advantage of these weaknesses to execute malicious codes on clients. Exploitation can be a software program, a data set or a command that takes advantage of a bug or vulnerability to compromise a computer's or network's security. Firewall – The firewall is a tool that keeps unwanted intruders out of an organization or PC system, while still allowing communication between users and frameworks. Keystroke logging is the process of keeping track of touchscreen points on computers and keys pressed. It is a map of human-computer interaction. Both white-hat and black-hat hackers use it to store login IDs and passwords. Trojans are usually sent through phishing emails. They can install keyloggers on the device. A logic bomb virus is a computer virus that performs malicious acts when certain conditions are met. The time bomb is the most common variant. Computer viruses, Trojan horses and worms are all considered malware. Also included are adware, scareware, and spyware. These types of software are all included in the term malware. Master Program: A black-hat hacker uses this program to send remote commands to zombie drones that are infected by malware. This is usually used to launch spam attacks or denial-of-service attacks. Browse our [Ethical Hacking Course in Pune](https://www.sevenmentor.com/ethical_hacking_training_institute_training_classes_in_pune_best_course_in_india.php). Phishing is the term used to describe email fraud. Email fraud is called phishing. Phreaker Phreakers hack illegally into telephone networks to either tap lines or make free long distance calls. Computer hackers are regarded as the original hacker. Rootkit Rootkit can be a pernicious, invasive type of software which hides certain cycles or projects. It can be used in order to bypass the normal methods of finding and empowering computers. Shrink Wrap Code Shrink wrap code is a type of attack that takes advantage of software flaws that have not been patched, or that are configured incorrectly. Social engineering is the deception of tricking someone into revealing sensitive information, such as passwords and user names. Spam is an unsolicited email, also known as junkmail, sent to multiple recipients without their consent. To gain unauthorised computer access, an intruder will send a message with a IP address that indicates it's from a trusted source. Spoofing is a way for an intruder gain unauthorised access to a computer. Spyware is software that collects and sends data without the consent of a person or organization. It can also control a computer without the consent of a user. SQL Injection injects SQL code in applications. This involves inserting malicious SQL codes into an entry field that will be executed (for instance, to show the attacker what is in the database). Threat: A threat is a potential danger that can be exploited to harm a computer network or system by exploiting a bug or vulnerability. Trojans - Trojans can be malicious programs that are disguised as legitimate software. It can be hard to tell them apart from malicious programs that are designed to delete documents, alter data or steal passwords and other information. Computer virus: A computer Virus is a malicious software or code which has the capability to reproduce and cause harm. A vulnerability is a mistake that can allow a hacker to compromise the security of an entire computer system or network. Worms are viruses which replicate themselves instead of altering files. It reproduces and lives in active memory. Cross-site Scripting (XSS) is a security flaw that affects web applications. XSS allows an attacker to inject client-side content into pages viewed by different clients. A zombie drone is a hacked computer that sends spam emails or acts as a "drone". After completing [Ethical Hacking Training in Pune](https://www.sevenmentor.com/ethical_hacking_training_institute_training_classes_in_pune_best_course_in_india.php), you will be able become an ethical hacker.