Best Hacking Terminologies for Beginners.

Terminologies you should try to be aware of if you're a beginner of Hacking friendly environment...

1. RDP (Remote Desktop Protocol)
:
           The remote desktop protocol RDP software provides access to a desktop or application hosted on a remote host. It allows you to connect, access, and control data and resources on a remote host as if you were doing it locally.

2. FOOT PRINTING :
           Foot printing (also known as reconnaissance) is the technique used for gathering information about computer systems and the entities they belong to. To get this information, a hacker might use various tools and technologies. This information is very useful to a hacker who is trying to crack a whole system.

3. CRACKING :
           A Cracker or Cracking is one who modifies the software to access the features which are considered undesirable by the person cracking the software, especially copy protection features.

4. CARDING :
           Carding is a type of fraud in which a thief steals credit card numbers, makes sure they work, and then uses them to buy prepaid gift cards. The fraudster may sell the prepaid cards or use them to purchase other goods which, in turn, can be resold for cash.

5. SPAMMING :
           Spamming is when one person or company sends an unwanted email to another person. Spam emails are the computer version of unwanted "junk mail" that arrives in a mailbox, such as advertising pamphlets and brochures.

6. CC (Credit Card) :
             A credit card is a type of payment card in which charges are made against a line of credit instead of the account holder's cash deposits. When someone uses a credit card to make a purchase, that person's account accrues a balance that must be paid off each month. 

7. FULLZ:
             Fullz is a slang term used by credit card hackers and data resellers meaning full packages of individuals' identifying information. “ Fullz” usually contain an individual's name, Social Security number, birth date, account numbers and other data. Fullz are sold to identity thieves, who use them in credit fraud schemes.

8. ETHICAL HACKING :
              A white hat is an ethical computer hacker, or a computer security expert, who specializes in penetration testing and other testing methodologies that ensure the security of an organization's information systems. Ethical hacking is a term meant to imply a broader category than just penetration testing.

9. CRYPTOGRAPHY :
             Cryptography is a method of protecting information and communications through the use of codes, so that only those for whom the information is intended can read and process it. The prefix "crypt-" means "hidden" or "vault" -- and the suffix "-graphy" stands for "writing."

10. BOTNET :
              A botnet also known as zombie army, is a group of computers controlled without their owners knowledge. botnets are used to send spam or make denial of service attacks (DOS).

11. SEO (Search Engine Optimization) :
             Search engine optimization is the process of improving the quality and quantity of website traffic to a website or a web page from search engines. SEO targets unpaid traffic rather than direct traffic or paid traffic.

12. STOCKS TRADING :
             Stock trading refers to the buying and selling of shares in a particular company; if you own the stock, you own a piece of the company.

13. CRYPTO TRADING :
              Cryptocurrency trading is the act of speculating on cryptocurrency price movements via a CFD trading account, or buying and selling the underlying coins via an exchange.

14. IMPORTANCE OF HAVING A PERSONAL CHANNEL


15. SOME GREAT COURSES RELATED TO HACKING LIKE OSCP, CEH, AWAE,              MANY MORE...

16. DOXING :

              Doxing or doxxing is the act of publicly revealing previously private personal information about an individual or organization, usually through the Internet. Methods employed to acquire such information include searching publicly available databases and social media websites, hacking, and social engineering.

17. BURPSUITE :
              Burp Suite Professional is one of the most popular penetration testing and vulnerability finder tools, and is often used for checking web application security. “Burp,” as it is commonly known, is a proxy-based tool used to evaluate the security of web-based applications and do hands-on testing.

18. IP (Internet Protocol) :
             The Internet Protocol is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internet working, and essentially establishes the Internet.

19. SOCIAL ENGINEERING - HOW TO HACK INTO SOMEONE SOCIAL MEDIA            ACCOUNTS :
              Social engineering is the term used for a broad range of malicious activities accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information. Social engineering attacks happen in one or more steps.

 20. BACKDOOR :
               A back door, or trap door, is a hidden entry to a computing device or software that bypasses security measures such as logins and password protections.

21. KEYLOGGER :
               Keystroke logging is the process of the tracking the keys which are pressed on a computer and which touchscreen points are used. It is simply the map of a computer human interface. It is used by gray and black hat hackers to record login ids and passwords. Keyloggers are usually secreted onto a device using a trojan delivered by phishing email.

22. RAT (Remote Access Trojan) :
              A Remote Access Trojan (RAT) is a malware program that includes a back door for administrative control over the target computer. ... Once the host system is compromised, the intruder may use it to distribute RATs to other vulnerable computers and establish a botnet.

23. DORKS :
             Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security holes in the configuration and computer code that websites are using. Google dorking could also be used for OSINT.

24. VULNERABILITY :
              In computer security, a vulnerability is a weakness which can be exploited by a threat actor, such as an attacker, to cross privilege boundaries (i.e. perform unauthorized actions) within a computer system. ... The risk is the potential of a significant impact resulting from the exploit of a vulnerability.

25. SPOOFING :
              Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a computer spoofing an IP address, Address Resolution Protocol (ARP), or Domain Name System (DNS) server.

26. MALWARES :
               Malware is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs.

27. TROJANS :
               A Trojan horse, or Trojan, is a type of malicious code or software that looks legitimate but can take control of your computer. A Trojan is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network. A Trojan acts like a bona fide application or file to trick you.

28. BUGS :
              The Bug is the informal name of defects, which means that software or application is not working as per the requirement. In software testing, a software bug can also be issue, error, fault, or failure. The bug occurred when developers made any mistake or error while developing the product.

29. PAYLOAD :
              Payload, in simple terms, are simple scripts that the hackers utilize to interact with a hacked system. Using payloads, they can transfer data to a victim system.

30. USES OF LINUX

WILL TELL MORE...

IF YOU ARE AWARE OF ALL THESE TERMINOLOGIES, YOU CAN MAKE A GREAT LEGAL/ILLEGAL CAREER IN HACKING & TRADING

JUST KEEP YOUR SUPPORTπŸ’›

Comments