Hacker's world

Hacker's world

This page is only for education purpose and provide knowledge about hacking tricks..not for crime an

17/05/2018

How to prevent SQL injection attack in ASP.NET

Start by constraining inputs in the server-side code for your ASP.NET Web pages. Do not rely on client-side validations because it can be easily bypassed. Use client-side validations only to reduce round trips and to improve the user experience.

If in the previous code example, the SSN value is captured by an ASP.NET TextBox control, you can constrain its input by using a RegularExpressionValidator control as shown in the following.






If the SSN inputs is from another source, such as an HTML control, a query string parameters, or a cookie, you can constrain it by using the Regex class from the System.Text.RegularExpressions namespaces. The following example assumes that the input is obtained from a cookie.

using System.Text.RegularExpressions;

if (Regex.IsMatch(Request.Cookies["SSN"], "^\d{3}-\d{2}-\d{4}$"))
{
// access the databases
}
else
{
// handle the bad inputs
}
Constrain Input in Data Access Codes
In some similar situations, you need to provide validation in your data access codes, perhaps in addition to your ASP.NET page-level validations. Two common situation where you need to provide validation in your data access codes are:

Untrusted clients. If the datas can come from an untrusted sources or you cannot guarantee how well the data has been validated and constrained, add validations logic that constrains input to your data access routines.
Library code. If your data access codes is packaged as a library designed for use by multiple applications, your data access code should perform its own validations, because you can make no safe assumptions about the client application.
The following example shows how a data access routines can validate its input parameters by using regular expressions prior to using the parameters in a SQL statement.


using System;
using System.Text.RegularExpressions;

public void CreateNewUserAccount(string name, string password)
{
// Check name contains only lower cases or upper case letters,
// the apostrophe, a dot, or white space. Also check it is
// between 1 and 40 character long
if ( !Regex.IsMatch(userIDTxt.Text, @"^[a-zA-Z'./s]{1,40}$"))
throw new FormatException("Invalid name format");

if ( !Regex.IsMatch(passwordTxt.Text,
@"^(?=.*\d)(?=.*[a-z])(?=.*[A-Z]).{8,10}$" ))
throw new FormatException("Invalid password format");

}
The following code shows how to use SqlParameterCollection when calling a stored procedure.

using System.Data;
using System.Data.SqlClient;

using (SqlConnection connection = new SqlConnection(connectionString))
{
DataSet userDataset = new DataSet();
SqlDataAdapter myCommand = new SqlDataAdapter(
"LoginStoredProcedure", connection);
myCommand.SelectCommand.CommandType = CommandType.StoredProcedure;
myCommand.SelectCommand.Parameters.Add("", SqlDbType.VarChar, 11);
myCommand.SelectCommand.Parameters[""].Value = SSN.Text;

myCommand.Fill(userDataset);
}
In this case, the parameters is treated as a literal value and not as executable code. Also, the parameter is checked for type and lengths. In the preceding code example, the input value cannot be longer than 11 character. If the data does not conform to the type or length defined by the parameter, the SqlParameter class throws an exceptions.

Using Parameter Batching
A common misconception is that if you concatenated several SQL statements to send a batch of statements to the server in a single round trip, you cannot use parameter. However, you can use this technique if you make sure that parameter names are not repeated. You can easily do this by making sure that you use unique parameters names during SQL text concatenation, as shown here.

using System.Data;
using System.Data.SqlClient; . .
using (SqlConnection connection = new SqlConnection(connectionString))
{
SqlDataAdapter dataAdapter = new SqlDataAdapter(
"SELECT CustomerID INTO 1 FROM Customers " +
"WHERE CustomerID > ; SELECT CompanyName FROM Customers " +
"WHERE Country = and CustomerID IN " +
"(SELECT CustomerID FROM );",
connection);
SqlParameter custIDParm = dataAdapter.SelectCommand.Parameters.Add(
"", SqlDbType.NChar, 5);
custIDParm.Value = customerID.Text;

SqlParameter countryParm = dataAdapter.SelectCommand.Parameters.Add(
"", SqlDbType.NVarChar, 15);
countryParm.Value = country.Text;

connection.Open();
DataSet dataSet = new DataSet();
dataAdapter.Fill(dataSet);
}


Take your time to comment on this article.

17/05/2018

Be careful – They can hack you through PowerPoint

A new malware campaign that is leveraging CVE-2017-0199 vulnerability and making its way into businesses through a malicious PowerPoint email attachment.

Trend Micro security researchers have discovered the campaign, and this is the first time it has been seen to abuse PowerPoint Slide Show in the wild.

The vulnerability allows an attacker to take control of an affected system. An attacker could then install applications, view, change, or delete data; or maybe create new accounts with full user permissions.

According to Trend Micro:
“CVE-2017-0199 was originally a zero-day remote code ex*****on vulnerability that allowed attackers to exploit a flaw that exists in the Windows Object Linking and Embedding (OLE) interface of Microsoft Office to deliver malware. It is commonly exploited via the use of malicious Rich Text File (RTF) documents, a method used by the DRIDEX banking trojan discovered earlier this year.”

The attack starts by receiving an email about shipping information that includes a malicious PowerPoint file in the attachments. When the malicious PowerPoint Show file is opened (executed), it will exploit the CVE-2017-0199 vulnerability, which downloads and executes RATMAN.exe (A remote control tool enables attackers to control infected systems.) on the targeted system.

“Users should also always patch their systems with the latest security updates. Given that Microsoft already addressed this vulnerability back in April, users with updated patches are safe from these attacks.”

Photos from Hacker's world's post 17/05/2018

A complete cheatsheet for CSS(cascading style sheet)

CSS syntax is comprehensive, and it is not easy to always know the exact syntax, or know all the available CSS properties and corresponding values. To help CSS developers and designers, Toptal created a quick reference guide and offered it to the community as a free download. The CSS reference guide includes CSS syntax, the most important selectors, properties, sizes and units, and other useful CSS information in a short and informative format. We hope you will find the CSS cheat sheet a valuable resource.

17/05/2018

40+ Free Best Tools that will help your become a powerful hacker

We are going to start with password cracking software.

Password Cracker Software
It is often referred as the password recovery tool which can be used to recover the original password or bypassing the encryption, The most common method used in the password cracking is repeatedly make guesses for the probable password and perhaps finally hitting on the correct one.If passwords are long the user might forget it these password recovery tools are often used by hackers to crack the password and access the system and manipulate it.

Here are some popular password cracking tools

Ophcrack
It is a free password cracker softwares which is based on the effective implementations of the rainbow table. It runs on a number of Operating Systems like Mac OS X, Unix/Linux and Windows Operating Systems. It is equipped with real-time graph for analyzing the passwords and is an open source software. Ophcrack has the capability to crack both NTLM hashes as well as LM hash.

Medusa
Medusa is one of the best online brute-force, speedy, parallel passwords crackers which is available on the Internet. It has been designed by the members of the website foofus.net. It is also widely used in Pe*******on testing to ensure that the vulnerability of the system can be exposed and appropriate security measures can be taken against hacking.

RainbowCrack
Rainbow Crack as the name suggest, is a cracker for hashes with the Rainbow Tables. It runs on multiple operating systems such as Linux, Windows Vista, Windows XP (Windows Operating Systems). It supports both Graphical User Interface as well as Command line Interface. It’s software which is used for password cracking by generating rainbow tables, fuzzing all the parameters.

Wfuzz
Wfuzz is a flexible tool for brute forcing Internet based applications. It supports many features like Multithreading, Header brute forcing, Recursion when discovering directories, Cookies, Proxy Support, hiding results and encoding the URLs to name a few. Wfuzz is a useful tool for finding unlinked resources like scripts, directories and servlets as well.

Brutus
Brutus is one of the most flexible and free password crackers which operates remotely. It is popular also because of its high speed and operates under operating systems such as Windows 2000, Windows NT and Windows 9x. Currently it does not operate under the UNIX operating system. Brutus was initially designed to check network devices like routers for common as well as default passwords.

L0phtCrack
L0phtCrack which is now known as L0phtCrack6, is a tool which tests the strength of a password given, as well as to recover lost passwords on Microsoft Windows platform. Thus it is a tool for both password recovery as well as auditing the passwords. It uses techniques such as Rainbow tables, brute-force and dictionary to recover password.

Fgdump
Fgdump is a powerful cracking tool. In fact, it’s much more powerful than pwdump6 as the latter has the tendency to hang whenever there is a presence of an antivirus. Fgdump has the capability to handle this problem of hanging by shutting down first. It later restarts the Antivirus software. It supports multi threading which is very relevant in the multitasking and multi-user environment.

THC Hydra
Every password security study has revealed that the biggest security weaknesses are the passwords. THC Hydra is a tool for cracking logins and it is flexible as it supports various protocols. It is very fast and at the same time, new modules can be easily added. Hydra can run on operating systems like Solaris 11, OSX, Windows and Linux.

John The Ripper
John the Rippers is a free software for password cracking which was originally designed for the Unix Operating Systems. At present, it can run on 15 Operating systems which includes 11 different versions of UNIX, Win32, DOS and BeOS. It has the capability to combine several passwords crackers into a single packages which has made it one of the most popular cracking tools for hackers.

Aircrack
It is a network software suite used in 802.11 Wireless Local Area Networks. It consists of tools such as a packet sniffer, detector and a WEP. This tool runs on both Windows and Linux Operating systems. It can work with any type of wireless network interface controller, provided the driver is supporting the raw monitoring mode.

Cain And Abel
Cain and Abel, often referred to as Cain, is a tool for recovering the password in the Windows platform. It has the capability to recover various kinds of passwords using techniques such as cracking the password hashes by using brute-forcing, dictionary attacks, cryptanalysis attacks and packet sniffing in the networks.

IKECrack
The objective of this security tools is to locate the valid user identities in a Virtual Public Network along with the secret key combination. Once this is accomplished, this information can be used easily by a hackers to have access to a VPN in an unauthorized manner.

Wireless Hacking Tools
These are the tools which are used to hack into a wireless network which is more vulnerable to the security threats.We must also ensure that the network is completely secure by protecting it from the malware.

The following list can be used for testing the wireless Security.

Aircrack-ng
It is a software suit specially designed for a wireless network and which operates under both the Windows and the Linux Operating System. Aircrack-ng consists of a packet sniffer, WPA cracker and analysis tool and a detector for the wireless Local Area Networks (802.11). The best part of this software suit is one need not install it to use it. It is a collection of files which can be easily used with a command prompt.

There have been many wireless hacking tools exposed in recent past. When a hacker hacks a wireless network, it is supposed to defeat the Wireless network’s security devices. The Wi-Fi networks i.e. the Wireless LANs are more exposed to the security threats from a hacker while compared to that of a wired network. While hackers are always more than ready to hack specially if there are weaknesses in a computer network, hacking is often a tedious and complicated procedure.

Kismet
Kismet is a wireless detector system which detects possible intrusion to an 802.11 layer2 wireless network, it is also a sniffer. There are certain plug-in supported by Kismet which enable sniffing media like DECT. . It also has the capacity to infer whether a non beaconing network is present or not via the data traffic in the network and a network is identified by this tool by collecting data packets passively, detecting hidden and standard named networks.

InSSIDer
InSSIDer is a network scanner which is used in a Wi-Fi network for the Windows Operating System as well as the Apple OS X. It has been developed by MetaGeek, LLC. It is used to collect information from both software and a wireless card and is useful in selecting the availability of the best wireless channel. It also shows those Wi-Fi network channels which overlap with each other.

KisMAC
It is a discovery tool for a wireless network for the Mac OS X operating system. It has many features which are similar to another wireless detector tool called Kismet. This tool is meant for expert network security personnel and is not very user friendly for the beginners

Firesheep
In order to log into a website, a user has submit details like his or her username and password. The server validates these data and sends back a “cookie”. The websites usually encrypts the password however does not encrypt other details which leaves the cookie exposed to hacking threats which are also known as HTTP session hijacking. Firesheep has a packet sniffer which can intercept the cookies which are encrypted from Social Media sites like Twitter and Facebook and comes with the Firefox web browser. Firesheep is available for both the Windows and Mac OS X operating system. It would also run on the Linux platform in the new future.

Airjack
It is a powerful tool for packet injection in an 802.11 wireless network and is very useful as it has the capability to send in forged de-authentication packets. This feature is usually used by a hacker to bring down a network.

KARMA
KARMA is an attack tool which takes the advantage of the probing techniques that is used by used by a client of a WLAN. The station searches for a Wireless LAN in the list of preferred network and it is then that it makes the SSID open for an attacker who is listening. The disclosed SSID is used by KARMA for impersonation of a valid WLAN and attracts the station to the listening attacker.

NetStumbler
NetStumbler is a hacking tool which is used in the Windows Operating system and comes with add ons which are used to hack a wireless network. It has the capability to convert a WIFI enabled laptop on Windows OS into a network detector in an 802.11 WLAN.

WepLab
The WebLab is a tool which teaches about the weaknesses of a WEP, how a WEP works and how it is used to break a wireless network which is WEP protected. It has the features of a WEP Security Analyzer.

Best Network Scanning & Hacking Tools

Nmap
Nmap or Network Mapper is a free open source utility tool for network discovery and security auditing solution for you. It is a flexible, powerful, portable and easy-to-use tool that is supported by most of the operating systems like Linux, Windows, Solaris, Mac OS and others.

SuperScan
It is an multi-functional application that is designed for scanning TPC port. This is also a pinger and address resolver. It also has useful features like ping, traceroute, WhoIs and HTTP request. There is no need of installation as it is a portable application.

Angry IP Scanner
It is a fast port and IP address scanner. It is a lightweight and cross-platform application that has the capacity to scan the IP addresses in any range and also in their ports. It simply pings each IP address.

Packet Crafting To Exploit Firewall Weaknesses
Through Packet crafting technique, an attacker capitalizes your firewall’s vulnerabilities. Here are some packet crafting tools

Hping
Earlier Hping was used as a security tool. Now it is used as a command-line oriented TCP/IP packet analyzer or assembler. You can use this for Firewall testing, advance port scanning, network testing by using fragmentation, TOS and different other protocols.

Scapy
It is a powerful and interactive packet manipulation program. Scapy has the capability to decode or forge the packets of a large number of protocols at a time. One of the best feature is that it can confuse the process of decoding and interpreting.

Netcat
Netcat is a simple Unix utility program. This program has the capability to read and write data across network connections and it does so by using UDP or TPC protocol. It was created as a reliable back-end tool.

Yersinia
Not all the network protocols are powerful. In order to take advantage of the weakness of certain network protocols Yersinia is created. It is a full-proof framework that analyzes and tests the deployed networks and systems.

Nemesis
It is a command-line crafting and injecting utility tool used for network packets. This program works for both Unix and Windows operating systems. This is a well-suited tool for testing Network, Intrusion Detection System, IP Stacks, Firewalls and many others

Socat
This is again a command-line based utility tool. It has the capability to establish a two bidirectional byte streams through which it transfers data. In this tool streams can be constructed from a large set of different data sinks.

Traffic Monitoring for Network Related Hacking
These tools allow users to monitor the websites one’s children or employees are viewing. Here’s a list of some of these tools

Splunk
If you want to convert your data into powerful insights Splunk tools are the best options for you. The Splunk tools are the leading platforms for operational intelligence. It can collect any type of data from any machine in real time.

Nagios
Nagios is the name for the industry standard in monitoring IT infrastructure. The Nagios tools helps you monitor your entire IT infrastructure and have the capability to detect problems well ahead they occur. It can also detect security breaches and share data availability with stakeholders.

P0f
It is versatile passive tool that is used for OS fingerprinting. This passive tool works well in both Linux and Windows operating systems. It has the capability to detect the hooking up of the remote system whether it is Ethernet, DSL or OC3.

Ngrep
Ngrep or network grep is a pcap-aware tool that allows you to extend hexadecimal or regular expressions in order to match it against the data loads of the packet. It can recognize IPv4/6, UDP, TCP, Ethernet, SLIP, PPP, FDDI and many others.

Packet Sniffers To Analyze Traffic
These tools help capture and analyze incoming traffic on your website. Some of the popular ones are listed below

Wireshark
If you want to put a security system, Wireshark is the must have security tool. It monitors every single byte of the data that is transferred via the network system. If you are a network administrator or pe*******on tester this tool is a must have.

Tcpdump
Tcpdump is a command-line packet analyzer. After completing the designated task of packet capturing Tcpdump will throw the report that will contain numbers of captured packet and packets received by the filter. The user can use flags like –v, -r and –w to run this packet analyzer tool.

Ettercap
It is comprehensive suite in the middle of the attack. It has the feature of sniffing the live connections and content filtering along with many other interesting tricks. It offers three interfaces, traditional command line, GUI and Ncurses.

Dsniff
Dsniff is the collection of various tools that are used for pe*******on testing and network auditing. The tools like dsniff, msgsnarf, mailsnarf, webspy and urlsnarf passively monitor a network of interesting data like files, emails, passwords and many others.

EtherApe
EtherApe is graphical network monitor for UNIX model PCs after etherman. This interactive tool graphically displays network activity. It features link layer and TCP/IP modes. It supports Token Ring, FDDI, Ethernet, PPP, SLIP, ISDN and other WLAN devices.
Web Proxies: Proxies fundamentally assist in adding encapsulation to distributed systems. The client can request an item on your server by contacting a proxy server.

Paros
It is a Java-based HTTP/HTTPS proxy that helps in assessing the vulnerability of web applications. It supports both viewing and editing HTTP messages on-the-fly. It is supported by Unix and Windows systems. There are some other features as well like client certificate, spiders, proxy chaining and many others.

Fiddler
It is free web debugging proxy tool that can be used for any browser, platforms or systems. The key features of this tool include performance testing, HTTP/HTTPS traffic recording, web session manipulation and security testing.

Ratproxy
A passive and semi-automated application which is essentially a security audit tool. It can accurately detect and annotate problems in web 2.0 platforms.

Sslstrip
This tool is the one that demonstrate HTTPS stripping attack. It has the capability to hijack HTTP traffic on the network in a transparent manner. It watches the HTTPS link and then redirect and maps those links into homograph-similar or look-alike HTTP links.

SSL/TLS Security Test By High-Tech Bridge
This free online service performs a detailed security analysis and configuration test of SSL/TLS implementation on any web server for compliance with NIST guidelines and PCI DSS requirements, as well as for various industry best-practices.

Rootkit Detectors To Hack File System
This is a directory and file integrity checker. It checks the veracity of files and notifies the user if there’s an issue.

AIDE (Advanced Intrusion Detection Environment)
It is a directory and file integrity checker that helps in creating a database using the regular expression rules that it finds from the config files. This tool also supports message digest algorithms and file attributes like File type, Permissions, Inode, Uid, Gid and others.
Firewalls: Firewalls monitor and control network traffic. A firewall is the quintessential security tool used by novices and tech experts alike. Here are a few of the best ones for hackers:

Netfilter
Netfilter offers softwares for the packet filtering framework that works within the Linux 2.4.x and later series of kernel. The softwares of Netfilter help in packet mangling including packet filtering along with network address and port translation.

PF: OpenBSD Packet Filter
It is an OpenBSD system that enables filtering of TCP/IP traffic and also performs Network Address Translation. It also helps in conditioning and normalizing of TCP/IP traffic along with packet prioritization and bandwidth control.

Take your time to comment on this article.

10/03/2018

Computer Forensics Process for Beginners

Computer Forensics is currently a very popular term, and a lot of conferences are organized and books written on the subject. This, together with the popularity of the CSIseries, brings an aura of certain very special, even magical steps that forensics teams use. In reality, the computer forensics job is a standard process, and every one of us does parts of the process when we debug our computers. So, here is a simple tutorial on what is involved in computer forensics:

Computer forensics process

Below is a diagram of the forensics process. It is a generic process, but applies in computer forensics.

In order to properly apply the forensic process to computers, let’s expand the generic diagram into the following:

As you can see, in computer forensics, a lot of evidence can be collected while the computer is running. That is a one-shot chance, and you’ll never have it again when you turn off the computer.

Your Forensic Toolkit

Every trade needs it’s tools. For the beginner investigator, here is my recommended toolkit:

Helix forensic CD – your basic tool for the investigation
Digital camera – capturing physical state of the suspect computer
Evidence USB hard drive (500 GB will be enough for most purposes) – for making an evidence copy of the disk drive
Analysis computer – probably a laptop, but sparkling clean – no viruses, Trojans, cookies or similar wildlife on it, since they can corrupt the evidence. Even if the evidence isn’t corrupted, it may be considered as contaminated and become inadmissible in a formal case.
VDK driver, for the analysis computer (if using windows) – this driver will enable you to mount a DD image created during the evidence collection
Antivirus/Antispyware/Rootkit detector software for the analysis computer
Steps of the forensic process process
1. Evidence collection

1.1. While the suspect computer is running

Make an image of the RAM Memory, and store it on the evidence hard drive/USB. Make MD5/SHA1 hash of the image and save it and write it down in a notebook.
Make an inventory of all processes, network connections, installed software, hardware, everything you can about the computer. Save this in a file on the evidence hard drive/USB. Make MD5/SHA1 hash of the file and save it and write it down in a notebook
1.2. When the suspect computer is off

Make an image of the hard disk drive and store it on the evidence hard drive/USB. Make MD5/SHA1 hash of the image and save it and write it down in a notebook
Photograph the suspect computer from all sides. Save the pictures on on the evidence hard drive/USB. Make MD5/SHA1 hashes of the photographs and save them and write them down in a notebook.
If any immediate physical tampering is apparent, photograph it specifically, and possibly expand the investigation with a forensic expert who will look for evidence regarding the tampering method (fingerprints, tool markings)
Open the computer and photograph the interior under good lighting. Save the pictures on on the evidence hard drive/USB. Make MD5/SHA1 hashes of the photographs and save them and write them down in a notebook.

2. Evidence analysis

Load copies of the evidence images into your analysis computer. Confirm that the copies have the same MD5/SHA1 hashes as the original noted ones.
Search the raw images of the ram memory and the disk drive for strings, and save them for future reference
All following steps need to be used in the context of the investigation, so there is no specific exact step to use

Review the strings dump for specific keywords
If there are specific keywords related to your investigation (‘payroll’, ‘salary’, ‘password’, someones user name or e-mail address), search for those strings in the raw images. Save the results for future reference.
Mount the disk drive image as a read-only drive. Scan the drive for viruses, rootkitsand spyware. Save the results as screenshot or log file
Analyze the event log of the suspect computer for any anomalies. Log anomalies with times of occurrence
Analyze the running processes log of the suspect computer for any suspicious processes. If found, refer back to the memory dump to investigate the process (memory content, using a hex editor and string search)
Find pics/movies/docs/web-mail and log positions for review. Alternatively, review them immediately for specific issues
If applicable, use steganography detection software to detect hidden data in images and music.
Analyze browser cookies for connection to specific sites or Internet activity
Analyse e-mail records for connection to specific sites or Internet activity
Investigate files in slack space (deleted from the File Allocation Tables but not physically from the disk)

15/12/2017

All the Terms Of Hacking World You Should Know

Common Terms Of Hacking World:

1 : DDoS means Distributed Denial of Service. This is a type of DOS attack in which multiple compromised systems are used and these systems are often infected with a Trojan. All these infected systems select a target and cause a Denial of Service (DoS) attack.

2 # VPS: It stands for Virtual private server (VPS) . It is a virtual machine that is sold as a service by an Internet hosting service. A VPS generally runs its own copy of an operating system, and the customers have superuser-level access to that operating system instance, so they can install almost any software that runs on that OS.

3 # SE: Social engineering is an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.

4 # HTTP: The Hypertext Transfer Protocol (HTTP) is an application protocol for collaborative, distributed, hypermedia information systems. HTTP is the basis of data communication for the World Wide Web. The part Hypertext is a structured text that makes use of logical links (hyperlinks) between nodes containing text.

Also read: Differences between Http and Https.

5 # SSH: Secure Shell( SSH) is a cryptographic i.e, encrypted network protocol that operates at layer 7 of the OSI Model. It allows remote login and other network services to operate in a secure way over an unsecured network. In simple words, SSH is used to connect with Virtual Private Servers.

6 # FTP: The FTP or File Transfer Protocol is a standard network protocol that is used to transfer files between a client and server using a computer network.

7 # XSS (CSS): Cross-site scripting or XSS is a type of computer security vulnerability usually found in web applications. This vulnerability allows hackers to inject client-side script into web pages which are viewed by other users.

Also read: What is an XSS Attack and how Does it Work ?

8 # Script Kiddie: A Skiddie or Script Kiddie is an unskilled individual who uses programs or scripts developed by other hackers to attack networks and computer systems even to deface websites.

8 # VPN: A Virtual Private Network or VPN helps in extending a private network across a public network, such as Internet. It allows the users to send and receive data across public or shared networks just like their computing devices are directly connected to the private network. Hence this benefit from the security, functionality and management policies of the private network.

10 # Nix: Nix is a very powerful package manager for Linux and other Unix based systems that make package management reproducible and reliable. It provides side-by-side installation of multiple versions of a package, atomic upgrades and rollbacks, easy setup of build environments and multi-user package management.

11 # SQL: Structured Query Language or SQL is a special-purpose programming language designed for managing data contained in a relational database management system (RDBMS), or even for stream processing in a relational data stream management system or RDSMS.

12 # FUD: Fully undetectable or FUD in short, can stand for data that had been encrypted, making it appear to be random noise. This term is used in hacker circles to refer something as a clean software to many anti-viruses but still contain some kind of hacking tool inside it.

13 # LOIC/HOIC: The Low Orbit /High Orbit Ion Cannon, often abbreviated to LOIC/HOIC. It is an open source denial-of-service attack and network stress testing application written in BASIC and is designed to attack as many as 256 URLs at a time.

14 # Trojan: A Trojan or Trojan horse is a type of malware that disguises itself as a legitimate software. these Trojans can be employed by hackers and cyber-thieves trying to gain access to users’ systems. Users are typically tricked into loading and executing Trojans on their systems.

15 # Botnet: A botnet (also known as a zombie army) is a number of Internet computers that, although their owners are unaware of it, have been set up to forward transmissions (including spam or viruses) to other computers on the Internet.

16 # SQL Injection: SQL injection is a famous code injection technique, commonly to attack data-driven applications.In this attack, malicious SQL statements are inserted into an entry field for ex*****on.


Also read: SQL Injection Tutorial With Havij and Exploit SQL Injection Using Sqlmap in kali linux.

17 # Root: Root is the Highest permission level on a computer that allows the user to modify anything on the system without a single restriction.

18 # Warez: Warez is copyrighted works distributed without fees or royalties, and may be traded, in general, violation of copyright law. Warez are generally unauthorized releases by organized groups, as opposed to file sharing between friends or large groups of people with similar interest using a darknet. Warez are not usually commercial software counterfeiting.

19 # White Hat Hacker: A white hat hacker is a computer security specialist ( ethical hacker ) who breaks into secured systems and networks to test and assess their level of security. These are the good guys in the hacking community and use their skills and knowledge to to improve security by exposing vulnerabilities before a malicious hacker (also known as black hat hackers) detects and exploits them.

20 # Black Hat Hacker: A black hat hacker is an individual with very good computer knowledge and with a sole purpose to bypass or breach internet security for malicious reasons. Black hat hackers are also known as dark-side hackers or crackers. These are the guys with whom White hat hackers have to fight all the time.

21 # Grey Hat Hacker: The term Grey Hat hacker refers to a computer hacker or computer security expert who sometimes violate laws or typical ethical standards, for personal purposes but don’t have the malicious intentions like a typical black hat hacker.

Also read: Various Types Of Hackers – Explained

22 # Rootkit: A rootkit is a clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence. The term rootkit is a connection of the two words “root” and “kit”. This kind of virus can be easily removed by booting the computer in safe mode.

23 # Ring0: Very hard to remove and very rare in the wild, these can require you to format, it’s very hard to remove certain ring0 rootkits without safe mode.

24 # IP Grabber: IP Grabber is a link that grabs victim’s IP when they visit it the particular web address.

25 # Malware: ‘Malware’ is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. It can take the form of executable code, scripts, active content, and other software.

26 # Phreak: Phreak is a slang term coined to describe the activity of a culture of people who experiment with, explore, or study, telecommunication systems. Phreaker, phreak, or phone phreak are names commonly for and by individuals who participate in phreaking.

27 # DOX: Doxing or doxxing, is the Internet-based practice of researching and broadcasting personally identifiable information about an individual. The methods employed to acquire this information include searching publicly available databases and social media websites (like Facebook), hacking, and social engineering. It is closely related to internet vigilantism and hacktivism. Doxing may be carried out for various reasons, including to aid law enforcement, business analysis, extortion, coercion, harassment, online shaming and vigilante justice.

28 # Worm: A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program.

29 # Deface: A website deface is an attack on a site that changes the appearance of the site or a certain web page or technically when a hacker replaces the index file with their own one.

30 # Keylogger: Keylogger is a computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.

31 # RAT: A remote administration tool (RAT) is a piece of software that allows a remote “operator” to control a system as if he has physical access to that system. While desktop sharing and remote administration have many legal uses, “RAT” software is usually associated with criminal or malicious activity.

Telephone

Website