Hacking Terms | BEGINNERS IN ETHICAL HACKING । ANONYMOUS TIM3



ASSALAMU ALAIKUM GUYS SO TODAY IN THIS POST IM GOING TO SHARE SOME HACKING TERMS WHICH WILL HELP FOR BEGINNERS IN ETHICAL HACKING

:x: HACKING TERMS :x:

1. Target:

Target literally means target. For example, when you have a site to hack, it's your target site.

2. Bug:

The bug, or security hole, is simply defined as a set of errors and negligence on the part of programmers who infiltrate and manipulate program information.

3. Deface:

In general, it means changing the look of a site to a page. Each hacker changes a page from the site to his or her favorite page (usually the home page) in order to mark a mark on the target site and show that the site has been hacked. They change the site). This is called defining.

4. Bypass:

In general, it means bypassing security layers. When a hacker can't cross security barriers for a variety of reasons, he or she can bypass the security layers and hack the target target by doing a series of commands and methods.

5. Exploit:

Malicious commands and codes (not always malicious!) Written according to the hacker's needs.

6. Fake page:

Fake pages are a set of pages that are usually in the form of login pages, except that in the coding of these pages by entering the username and password, this information is sent to the hacker. Fake pages are usually for hacking. Accounts, emails, sites, etc. are used.

07. Dorks:

Dorks are codes used to quickly and accurately search the search engine (for example, Google). These codes are not specific to hacking, but are widely used to find targets in hacking.

8. Google Hacking:

Using Google to hack is called Google Hacking.

9. Hash:

One type of algorithm and method is text coding. There are several types of mods, such as MD4, MD5, and..

10. Hash:

Cracking literally means breaking. In hacking and security, it also means breaking and infiltrating, for example, breaking encrypted texts and passwords and infiltrating the program.

11. Patches:

Hatching and security patches are more commonly used for bugs. For example, patching a rce bug means fixing and fixing a bce bug security problem.

12. Hex

In short, just to get acquainted, it's a way to encrypt.

13. Port

Port means port and is used to exchange information between two computers. In short, ports for connection and transmission.

14.FTP

FTP (abbreviated File Transfer Protocol) or file transfer protocol through port 21, which is dedicated to it. This transfer includes uploading and downloading.

15. Shell
15
Loose literally means shell, and in Linux operating systems it is part of the user interface between the hardware. In hacking concepts, when an intruder can infiltrate and control the system using his tools and functions. Take control of the system, so-called loose, and can make decisions.

Post a Comment

4 Comments

  1. Can you teach me sir how to hack an account of gmail account because my another gmail i cant open it

    ReplyDelete
  2. Plz show brute force attck practicle

    ReplyDelete
  3. Please i cant download the one click.sh file

    ReplyDelete
  4. Please provide practical video how to hack whAtsapp only for educational purpose

    ReplyDelete