Things Which A Wannabe Hacker Must Be Knowing!

Open Source Software Disadvantages

Open Source software can be downloaded and analysed manually and locally on the attackers’ host. If it is self made it’s harder
to get the source code what really helps on finding a bug to slip trough and get access.

There are so many different bugs in different applications especially in audited Open
Source software that it becomes easier to get into the targeted site.

buffer overflows:

A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold.

Shellcode

“Shellcode” is the name given to small pieces of assembly language which are used to launch shells, typically as a result of a buffer overflow.

SQL Injection

SQL injection is a technique that exploits a security vulnerability occurring in the database layer of an application.
SQL injection is an attack in which malicious code is inserted into strings that are later passed to an instance of SQL Server for parsing and execution.
It allows attacker to execute database query in url and gain access to some confidential information.

Script kiddie

The lowest form of cracker; script kiddies do mischief with scripts and rootkits written by others, often without understanding the exploit .
script kiddie is someone who tries to get their name known in the underground community by using publicly available exploits/programs that
were made by real hackers

Sandbox

sandbox is used to test applications and make sure they are safe
You can choose any operating system you would like to use.

Defacement

Chances are you have probably seen those “HACKED BY SAUDI_H4CK3R & DaRkViRuZ”
type of webpages. This is what is called a defacement

Defacements: only super l33t hackers can do that

dos/ddos: Well a normall dos is that one person is flooding the server with packet reqeusts, at the point the server is so buzy with handling those packets you cant visit it anymore.

ddos is when more persons are sending packs.

a box: (sandbox) a virtual pc to test viruses etc on. its completely isolated.

RAT: Remote Administration Tool, used to have full controll of a pc, port forwarding required.

Port forwarding: At the point somethings trying to connect it will use a “port” at the point that port is closed it cant but with port forwarding u can open that port and recieve connections on it.

Port scanner: This is a simple scanner that only needs an ip adress to scan. It will scan all ports and shows wich one’s are open.

Vuln/Vulnerable: You will hear this sometimes, I found a vuln on www.somelamewebsite.com, A vuln is mainly a bug/hole in a website/system and a hacker could try to use it to “hack” the website.

Exploit: (how wikipedia would call it)
An exploit (from the same word in the French language, meaning “achievement”, or “accomplishment”) is a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerised). This frequently includes such things as violently gaining control of a computer system or allowing privilege escalation or a denial of service attack.

White hat: A white hat hacker is a “good” hacker, he will hack systems or website’s but he wont harm it. white hat also called: ethical hacker or penetration tester.

Grey hat: A grey hat hacker is a mix of white/black, its not that he will hack anything delite files/steal them but maybe sometimes when ie feels like, But he will also like a white hat help systems/test them to make them better.

Black hat: A black hat hacker is a hacker that would harm computer, mostly for fun/fame/money, some of them are writers of viruses/botnets etc.

Explore More

What are the phases of malicious hacking?

The following are the phases of malicious hacking: 1. Reconnaissance: In this phase, the attacker gathers information about the victim. 2. Scanning: In this phase, the attacker begins to probe

You’ve Hired a Hacker (Section 2)

Section 2: Social issues 2.1: My hacker doesn’t fit in well with our corporate society. She seems to do her work well, but she’s not really making many friends. This

How to Detect a Hacker Attack

If a hacker breaks into your computer, just noses around, and makes no changes to your computer, it’s not easy to tell he’s been there. There’s no alert that says,