Terminology

Different Types of Hacking

White Hat

Focus on security and finding vulnerabilities of an organization or a network.

Black Hat

Focus on finding vulnerabilities and exploiting them. They have intent to do damage to the person or organization.

Grey Hat

Depending on the situation a Grey Hat Hacker will work for either side ( White or Black ).

Vulnerability

The flaw or mis-configuration of a software.

Exploit

The way a hacker takes advantage of a vulnerability.

Payload

After exploiting a system, the payload is the delivery of files that are utilized to gain control of the system.

Red Team

Primary focus on offensive penetration testing, and trying to hack into systems of organizations.

Blue Team

Primary focus on improving security by patching vulnerabilities, updating software, and making sure mechanisms were implemented and functioning correctly.

Privileges

The permission a user has to access a certain system or file.

Escalation

Boosting the level of privilege given to a user

Denial of Service

Sending a large number of packets from one system to another computer. If this attack is performed by many computers then it is called Distributed Denial of Service ( DDOS ).

Buffer Overflow

When an application does not handle input data correctly, the data may overflow into memory regions like the stack, and the application will crash. Attackers can control instruction pointer and run their own code to exploit.

Virus

Escalates and grows on a single system.

Worm

Infects all computers running on the same network.

Ransomware

Encrypts all files nad folders, and forces the user to pay to recover them.

Last updated