Terminology
Different Types of Hacking
White Hat
Focus on security and finding vulnerabilities of an organization or a network.
Black Hat
Focus on finding vulnerabilities and exploiting them. They have intent to do damage to the person or organization.
Grey Hat
Depending on the situation a Grey Hat Hacker will work for either side ( White or Black ).
Vulnerability
The flaw or mis-configuration of a software.
Exploit
The way a hacker takes advantage of a vulnerability.
Payload
After exploiting a system, the payload is the delivery of files that are utilized to gain control of the system.
Red Team
Primary focus on offensive penetration testing, and trying to hack into systems of organizations.
Blue Team
Primary focus on improving security by patching vulnerabilities, updating software, and making sure mechanisms were implemented and functioning correctly.
Privileges
The permission a user has to access a certain system or file.
Escalation
Boosting the level of privilege given to a user
Denial of Service
Sending a large number of packets from one system to another computer. If this attack is performed by many computers then it is called Distributed Denial of Service ( DDOS ).
Buffer Overflow
When an application does not handle input data correctly, the data may overflow into memory regions like the stack, and the application will crash. Attackers can control instruction pointer and run their own code to exploit.
Virus
Escalates and grows on a single system.
Worm
Infects all computers running on the same network.
Ransomware
Encrypts all files nad folders, and forces the user to pay to recover them.
Last updated