Hello and welcome back to Dark Street Hackers!!!


In our previous tutorial, we have seen the motivations and the mind set of hackers. Soon, we will be starting our practicals after this last tutorial of basic terminologies. Today we will see some of the most used words and appliance in the world of ethical hacking and will understand their meanings one by one.

1) Attack:- In simple layman words, attack can be defined as an attempt to harm computer systems or network with a malicious intent with the help of hacking knowledge. It is usually called as a cyberattack.


2) Adware:- Adware is a type of program or a script which refers to advertising and automatic information gaining tool in back end. It shows advertisements and as soon as any user clicks on the ad, the script tries to gather information related to user's online activities. It can store your bookmarks, visited websites, saved logins, etc.

3) Backdoor:- Backdoor is an approach of bypassing computer security mechanism without getting detected in order to access the computer system and related data.


4) Bot:- Bot or Bots is an automated robot type script which performs activities based on the instructions given in the script. It can be used for both the good and bad things. Majorly, it is used by hackers who are intending to harm others.

5) Brute Force Attack:- Brute force is a type of attack which tries to gain access of the computer system or network. The logic behind brute force attack is to try each and every possible combination of username & password in order to gain access. It uses a trial and error method until the username and password is found. There are automated software and tools available for brute force attack.

6) Buffer overflow:-  It is a vulnerability when a bug named 'buffer overflow' exists in a program. Buffer Overflow may occur when a system tries to put more data then the fixed size of a buffer. Buffer refers to the temporary data which stores information. When it overflows, it may cause sensitive data leakage or overflow of information. It mostly happens in C programs.

7) DoS:- It is known as Denial-of-Service attack. When a genuine user is not able to have access to the information, resources and other services due to some malicious action taken by an attacker to make it unavailable. Attacker sends a huge amount of request to the resource in order to make it unavailable to the legitimate user.

8)  DDoS:- It refers to the Distributed Denial of Service which is an advanced version of DoS. Attackers sends multiple requests from multiple infected machines to make the target unavailable to the legitimate users.

9) Exploit:- It is a piece of code or a program which is used to find the loop holes or vulnerabilities in any computer system or an application  and then later it can be used to get unauthorized access of it. It is used by both the good guy and the bad guy as well. Good guy use it to find vulnerabilities in system or program and fix it, while bad guys use it to gain access of it without owner's knowledge.


10) Firewall:- Firewall can be defined as a device or a piece of code which monitors the online traffic and coming inside and going out of the network. It is smartly coded in such a way that some specific set of rules allow only legitimate traffic and deny the malicious requests. Many times, firewall refers to the network security tool as it majorly works on the layer 3 of OSI reference model.


Stay tuned and stay safe!!!

TO BE CONTINUED............

0 Comments