Jump to content

Welcome to NulledBlog
Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more. If you already have an account, login here - otherwise create an account for free today!
Photo

Common Abbreviations - Help for new members


  • Please log in to reply
No replies to this topic

#1
SonicGear

  • Offline
  • Strive to achieve

  • Posts:
    283
    Reputation:
    189
    Joined:
    08 Jan, 2016

Below are some frequently used words, their brief meaning and acronyms that are commonly used in the world of Hacking.

Why?

Because humans have gone to the moon but refuse to pick up the remote laying on the other side of the couch.

Humans should be defined by laziness before intelligence.

Anyways, nobody likes the new guy who needs to have everything explained to him/her. Hacking is no exception. Simply going through these common abbreviations could save you some googling time. There’s nothing that you can learn, that you won’t ever use. I am sure reading this on the start will help you.

Here we go! :)


 

DDoS :- Distributed Denial of Service Attack, uses a list of reflection servers or other methods such as DNS to spoof an attack to look like it’s coming from multiple IPs.

 

VPS :- Virtual Private Sever

 

SE :- Social Engineering

 

HTTP :- Hyper Text Transfer Protocol. The foundation of data communication for the WorldWide Web.

 

SSH :- Secure Shell, used to connect to Virtual Private Servers.

 

FTP :- File Transfer Protocol. Used for transferring files over an FTP server.

 

XSS (CSS) :- Cross Site Scripting

 

Skid :- Script Kid

 

VPN :- Virtual Private Network, hiding your real IP

 

Nix :- Unix based operating system, usually referred to here when referring to DDoS’in

 

SQL :- Structured Query Language. It usually goes along with a word after it, such as “SQL injection.”

 

FUD :- Fully undetectable, can be used in many terms. Generally in combination with crypters, or when trying to infect someone.

 

LOIC/HOIC :- Tools used by many anonymous members to conduct DDoS attacks. It is not recommended to use these under any circumstances.

 

Trojan :- A Trojan is a type of malware that masquerades as a legitimate file or helpful program with the ultimate purpose of granting a hacker unauthorized access to a computer.

 

Botnet:  Computers infected by worms or Trojans and taken over by hackers and brought into networks to send spam, more viruses, or launch DoS attacks.

 

SQL Injection :- An SQL injection is a method often used to hack SQL databases via a website, and gain admin control of the site.

 

Root :- Highest permission level on a computer, able to modify anything on the system without restriction.

 

Warez :- Software piracy

 

White Hat :- A “white hat” refers to an ethical hacker, or a computer security expert, who specializes in penetration testing and in other testing methods to ensure the security of a

business’s information systems. Or if you want it easier - GOOD GUY Kappa

 

Rootkit:- A powerful exploit used by malware to conceal all traces that it exists. Ring3 – Can be removed easily without booting in safe mode. Ring0 — Very hard to remove and very rare in the wild, these can require you to format, it’s very hard to remove certain ring0 rootkits without safe mode.

 

Script Kiddie :- A script kid, or skid is a term used to describe those who use scripts created by others to hack computer systems and websites. Used as an insult, meaning that they

know nothing about hacking.

 

IP Grabber :- A link that grabs someone’s IP when they visit it.

 

VPS :- The term is used for emphasizing that the virtual machine, although running in software on the same physical computer as other customers’ virtual machines, is in many

respects functionally equivalent to a separate physical computer, is dedicated to the individual customer’s needs, has the privacy of a separate physical computer, and can be configured to run server software.

 

Malware :- Software designed to do all kinds of evil stuff like stealing identity information, running DDoS attacks, or soliciting money from the slave.

 

Phreak– Phone Freaks. Hackers who hack cell phones for free calling. Free Long distancecalling. Etc.

 

Bot– A piece of malware that connects computer to an attacker commonly using the HTTP or IRC protocol to await malicous instructions.

 

Shell :- The common meaning here is a hacked web server with a DoS script uploaded to conduct DDoS attacks via a booter.

 

DOX :- Personal information about someone on the Internet usually contains real name, address, phone number, SSN, credit card number, etc.

 

Worm :- Software designed to spread malware with little to no human interaction.

 

Deface :- A website deface is an attack on a site that changes the appearance of the site or a certain webpage

 

Injection - the exploitation of a computer bug that is caused by processing invalid data. Injection is used by an attacker to introduce (or "inject") code into a vulnerable computer program and change the course of regular execution. 

 

Keylogger: A software program that records all keystrokes on a computer’s keyboard, used as a surveillance tool or covertly as spyware.

 

Remote Administration Tool - RAT :- It’s a general term for a hack that can let someone remotely control your computer with admin access.

 

Resolver - Usually Skype resolver, tool used to resolve an IP Address through someones skype name.

 

Black Hat :- The Bad guy. A Hacker that uses hacking for illegal and unethical purposes.

 

 

If you liked this you can check out my other tutorials too.  :)

For any questions and help feel free to PM me anytime


  • 2


0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users