Responsive Ad Slot

Latest

latest

Ethical Hacking Terminology 1.2 | Ethical Hacking From Scratch

Monday 3 May 2021

/ by Captain Jay's

Chapter 1.2: Ethical Hacking Terminology



First of all, I will introduce 

Types Of A Hacker

  • White hat hacker
  • Grey hat hacker
  • Black hat hacker

White hat hacker 

A white-hat hacker is a good guy who finds a vulnerability on the system and reports to that particular organization for fixing them. in this course, we learn a thing as a white-hat hacker. it a fully legally process of hacking.

Grey hat hacker

A grey hat hacker is a border between a white hat or a black hat. grey hat hacker is always bordering between legal or illegal. 

Black hat hacker

Black hat hacker is defined as people is doing a thing without respect any law and permission of the owner. usually when people listen, hacker, they think a little bit about the black hat hackers.

Footprinting

Footprinting is a process you gain information about the server, server IP, what service running on the server, which port is open as well closed. 

DOS

Denial Of Service

Denial of service attack is leading to track down the server and make server or service unavailable for the user. 

For example, you have one ubuntu server that handles 10000 requests at a time. in the DOS attack, the attacker makes 10000+ request on the server from the software or any method. it a casual thing that your server is not handling this request and the server is crash for the actual user.

DDOS

Distributed Denial Of Service

Distributed Denial of Service is similarly to DOS but here the attacker is attacking too many machines and control as remote then attack the server. DDOS is more effective than DOS. 

FUD

Fully Undetectable 

In this field, it more effective than you exploit can not detect to the victim machine or they antivirus. there was you need to make a fully undetectable exploit or payload for the access of the victim machine.

RAT

Remote Administration Tool

It piece of code that create backdoor on the victim machine and gain access to the victim system. you can send them to the victim and one time execute. that file makes a backdoor for you into the victim machine. you can send whatever method like e-mail, USB or anything.

Root-Kit

A rootkit is to hide information from a running process on the system. when the victim is compromised you need to install a root-kit tool for maintaining access to the victim.

For example, you have to install an exploit on the victim system when the victim running the system taskbar they show the services that not show before in past. in this way you need to install some other exploit you retired request of the victim to tool kit and they respond, they are noting to running.  

Phishing

Phishing is one type of social engineering attack on the victim. in this attack, the victim is shown an email in the inbox. they click on the email link and they redirect to banking or any attacker site but they do not recognise this site is trusted or not and give some confidential credential to the site. 

This is not happening today. Today the attacker changes the victim DNS server to redirect the unconfirmed host and gain credential about the victim.

SQL Injections

SQL Injections is one of the most effective vulnerabilities on sites. SQL injections is a process to make SQL query on the server and they respond to some data that store on the server.

VPN 

A virtual private network is a term to hide on the internet. if you are connecting to the VPN every request of your system going through VPNs. VPN is secure but rather the VPN provider is not compromised your data.   

Proxies

Proxies are similar to the VPN but less secure. in this your network is a route to the internet and after your request will process. There are many free proxies is available on the market but they are very slow to use. Even you use paid proxies it chance that you make a footprint on the network and catch.

Tor

It an open source way to hide on the internet. Tor is faster than proxies. you can surf more reliable way with tor.  

Termination

Thank you for coming to this site. If you Like this tutorial please share with your friend and family. I make an amazing tutorial in this blog. If you have any queries and question ask me in the comment section below.

 

No comments

Post a Comment

Don't Miss
© all rights reserved
made with by templateszoo