You are on page 1of 12

10 Must-Know Hacking

Terminologies To Safeguard
Your Online Business from
HACKERS

Credits -: @Kingofowners
1. Malware
Phishing is one of the most common hacking terminology used by security
people. Phishing is a technique which tricks users into revealing sensitive
information (like usernames, passwords, or credit card details) to
seemingly benign sources.
A phisher disguises as a trustworthy entity and contacts potential
victims asking them to reveal information. This could be further used
for malicious intent. For example, a phisher may pose as a bank and
ask for a user’s bank account credentials via e-mail. Or he could trick
you to click on a fraudulent link. Phishing is a type of social
engineering.
2. Spoofing
E-mail and IP spoofing are few common hack techniques encountered by
users worldwide. E-mail spoofing involves altering the header of an e-mail
to make it look legit. For instance, a black hat hacker can make an e-mail
look as if it has appeared from your bank or any other source you may
trust. On the other hand, IP spoofing refers to an illegitimate packet sent
to a computer with an altered IP appearing to be a trusted host.

This is carried out with the hope that the packet would be accepted that
will allow the sender access to the target machine.
3. Encryption
Encryption is a process of encoding a message or information to make
it unreadable and secretive. This ensures that the concerned
information is concealed only to the authorized parties.

Often, encryption is employed by hackers to extort money by


unleashing ransomware on computer systems, thus locking out
victims and encrypting their files. The decryption key is provided only
when a certain ransom is paid.
4. Adware
Adware is typically a software which acts as spyware to track a user’s
browsing activities covertly. It then generates advertisements based on
the user’s browsing history. Some adware is maliciously designed to pop
up ads with a frequency ultimately slowing down your system.

It can collect your personal information, browsing history, and


provide inputs for further phishing attacks. This hacking
terminology is common in the marketing world. Google shows a
warning when visitors visit such a deceptive website because of
Social engineering content.
5. Zero Day Threat
A zero-day threat refers to a threat which is undocumented and hence
hidden from any antivirus scanner installed on the system. This kind
of flaw is inherent in anti-virus scanners, making it oblivious to
developers who built antivirus functionalities based on knowledge of
these vulnerabilities.

Such vulnerabilities are exploited through different vectors,


popularly web browsers, and malicious attachments via e-mails.
6. Brute Force Attack
Another commonly hacking terminology to get bypass the login
pages. Brute Force, aka Exhaustive key search, is a trial and error
method to decrypt data such as passwords, Data Encryption
Standard (DES) keys, or other encrypted information.

This method is widely used to crack passwords to admin


accounts, which in turn can be used to steal information and
documents of paramount importance.
7. Http/SSL/TLS
Highly searched hacking terminology of 2018 when Google Chrome
announced that it will give warning to users who are visiting HTTP
using websites. HTTPS, which stands for Hypertext Transfer Protocol
with the “S” for “Secure”, is a basic framework that controls how data
is transferred across the web.
SSL and TLS are protocols used by HTTPS to provide an added
identity proof to your website. It is advised to avoid browsing the
website using HTTP and enter any passwords or credit card detail
on it.
8. Bot

A bot is a software robot that runs automated tasks (scripts) over the
Internet. Many search engines like Google and Bing employ bots, also
called spiders, to scan websites and index them for purpose of
ranking them according to returns on search queries.

But when these bots are used by hackers, they can be programmed to
perform malicious tasks, as well as introduce malware into the
system. Learn more about bad bots.
9. Botnet

A botnet refers to a network of bots controlled by a black hat.


Applications of botnets include the launch of DDoS (Distributed
Denial of Service), steal data, send spam, and allow the attacker
access to the device and its connection.

A swarm of botnets not only help cover the black hat’s tracks
but raise the intensity of the attack by attacking in a
coordinated effort.
10. Worms

Similar to a virus, a worm is a destructive self-contained program


which can self-replicate. A worm doesn’t need to be a part of a
program, but instead, it can transfer itself to multiple systems on a
network without user intervention.

A self-replicating worm can consume hordes of memory and


bandwidth while drastically reducing the speed of your
system. If not removed timely, it can become devastating.
The Information Provided In this
N ebook, is all gathered from
different sites and sources.. And

O this whole information was for


your education purpose only..

T
Written By: Hackersplanet
E
Share And Support Us ❤

You might also like