:x: HACKING TERMS :x:
1. Target:
Target literally means target. For example, when you have a site to hack, it's your target site.
Target literally means target. For example, when you have a site to hack, it's your target site.
2. Bug:
The bug, or security hole, is simply defined as a set of errors and negligence on the part of programmers who infiltrate and manipulate program information.
The bug, or security hole, is simply defined as a set of errors and negligence on the part of programmers who infiltrate and manipulate program information.
3. Deface:
In general, it means changing the look of a site to a page. Each hacker changes a page from the site to his or her favorite page (usually the home page) in order to mark a mark on the target site and show that the site has been hacked. They change the site). This is called defining.
4. Bypass:
In general, it means changing the look of a site to a page. Each hacker changes a page from the site to his or her favorite page (usually the home page) in order to mark a mark on the target site and show that the site has been hacked. They change the site). This is called defining.
4. Bypass:
In general, it means bypassing security layers. When a hacker can't cross security barriers for a variety of reasons, he or she can bypass the security layers and hack the target target by doing a series of commands and methods.
5. Exploit:
Malicious commands and codes (not always malicious!) Written according to the hacker's needs.
Malicious commands and codes (not always malicious!) Written according to the hacker's needs.
6. Fake page:
Fake pages are a set of pages that are usually in the form of login pages, except that in the coding of these pages by entering the username and password, this information is sent to the hacker. Fake pages are usually for hacking. Accounts, emails, sites, etc. are used.
07. Dorks:
Fake pages are a set of pages that are usually in the form of login pages, except that in the coding of these pages by entering the username and password, this information is sent to the hacker. Fake pages are usually for hacking. Accounts, emails, sites, etc. are used.
07. Dorks:
Dorks are codes used to quickly and accurately search the search engine (for example, Google). These codes are not specific to hacking, but are widely used to find targets in hacking.
8. Google Hacking:
Using Google to hack is called Google Hacking.
9. Hash:
One type of algorithm and method is text coding. There are several types of mods, such as MD4, MD5, and..
10. Hash:
Cracking literally means breaking. In hacking and security, it also means breaking and infiltrating, for example, breaking encrypted texts and passwords and infiltrating the program.
11. Patches:
Hatching and security patches are more commonly used for bugs. For example, patching a rce bug means fixing and fixing a bce bug security problem.
12. Hex
12. Hex
In short, just to get acquainted, it's a way to encrypt.
13. Port
Port means port and is used to exchange information between two computers. In short, ports for connection and transmission.
14.FTP
FTP (abbreviated File Transfer Protocol) or file transfer protocol through port 21, which is dedicated to it. This transfer includes uploading and downloading.
15. Shell
15
Loose literally means shell, and in Linux operating systems it is part of the user interface between the hardware. In hacking concepts, when an intruder can infiltrate and control the system using his tools and functions. Take control of the system, so-called loose, and can make decisions.
4 Comments
Can you teach me sir how to hack an account of gmail account because my another gmail i cant open it
ReplyDeletePlz show brute force attck practicle
ReplyDeletePlease i cant download the one click.sh file
ReplyDeletePlease provide practical video how to hack whAtsapp only for educational purpose
ReplyDelete