Wednesday 11 January 2017

Essential Terminology


As this is a step-by-step guide, I prefer the viewers to see my pervious posts..

The following are some essential terminologies in field of hacking that one should be aware of :-
  • Threat - An action or event that might prejudice security. A threat is a potential violation of security. A threat is a possible danger that can exploit an existing vulnerability to
    cause possible harm.
  • Vulnerability - Existence of a weakness, design, implementation error or logical fault that can lead to an unexpected undesirable event compromising the security of the system.
  • Attack - An assault on system security that derives from an intelligent threat. An attack is any action that attempts to or violates security.
  • Exploit - An exploit is a defined way (piece of software, set of commands etc.) that takes advantage of an existing vulnerability to breach the security of an IT system.

Attacks can be broadly classified into two types :-
  • Active attacks : Active attacks are those that modify the target system or message.
  • Passive attacks : Passive attacks are those that violate the confidentiality without affecting the state of the system.

Some other terminologies :-
  • Payload - It is the part of an explicit code that performs the intended malicious action, such as destroying, creating backdoors, and hijacking computers.
  • Zero-Day attack - Understanding the term on time basis, we can also call this an instant attack. It is an attack that exploits computer application vulnerabilities before the software developer releases a patch for the vulnerability.
  • Daisy Chaining - It involves gaining access to one network and/or computer and then using the same information to gain access to multiple networks and computer that contain desired information.
  • Doxing - Publishing personally identifiable information about an individual collected from publicly available database and social media.
  • Bot - A BOT is a software application that can be controlled remotely to execute or automate predefined tasks.

3 comments:

  1. CONTACT: onlineghosthacker247 @gmail. com
    -Find Out If Your Husband/Wife or Boyfriend/Girlfriend Is Cheating On You
    -Let them Help You Hack Any Website Or Database
    -Hack Into Any University Portal; To Change Your Grades Or Upgrade Any Personal Information/Examination Questions
    -Hack Email; Mobile Phones; Whatsapp; Text Messages; Call Logs; Facebook And Other Social Media Accounts
    -And All Related Services
    - let them help you in recovery any lost fund scam from you
    onlineghosthacker Will Get The Job Done For You
    onlineghosthacker247 @gmail. com
    TESTED AND TRUSTED!

    ReplyDelete

Thanks for reading this article.
Please comment your reviews..This will help us improve.

Popular Posts