Tuesday, August 23, 2016

Ethical hacking Part 2 (Terms used in hacking)

      Hello hackers I am back with the new post on ethical hacking. In this I am gonna teach you some basic terms of hacking. You will be facing this terms during hacking. Without learning this terms it would be difficult for you to get the knowledge of hacking.They are:

1)RAT -A remote administration tool (RAT) is a piece of software that allows a remote "operator" to control a system as if he has physical access to that system. While desktop sharing and remote administration have many legal uses, "RAT" software is usually associated with criminal or malicious activity. A RAT is created in kali Linux using msfvenom and msfpayload. We will be leaning about the creation of RAT in the future tutorials.

2)Payload - Payload refers to the part of malware which performs a malicious action. In the analysis of malicious software such as worms, viruses and Trojans, it refers to the software's harmful results. Examples of payloads from malware include code for deleting data, displaying messages with insulting text or sending spurious email messages to a large number of people. During process of hacking a hacker configures the payload in the RAT file , which is send to the victim. 

3)DOS or DDOS - Most of you may have heard about it. DOS stands for denial of service and DDOS stands for distributed denial of service. It is the process by which a hacker overloads the server with more requests than the server can handle. If a individual does it then it is DOS but if many computers and hackers are involved then it is DDOS. DDOS requires a bit programming knowledge and its a bit difficult than other hacking so we will be doing it later on. 

4)Backdoor - A backdoor is a method, often secret, of bypassing normal authentication in a product, computer system, cryptosystem or algorithm etc. Backdoors are often used for securing unauthorized remote access to a computer, or obtaining access to plaintext in cryptographic systems. A backdoor is a program created by a hacker to maintain the access on the victims PC. A backdoor is a script that runs on the background of victim device giving hacker full access to the device. After we access the victim PC using metasploit then we must run backdoor on victim PC otherwise if somehow we get disconnected from the victim PC then we can't get re-access. So backdoor is essential.

5)Password hashes - In computer password are not stored in plain text. They are stored in a rule  which is called encryption. There are different types of encryption such as SAM,AES, SHADOW .et
c. We obtain password hashes through various ways of hacking which I will be teaching on future tutorials.

6) Keylogging - Keylogging  is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored. Keylogger is a piece of software used for keylogging. It is mostly using in finding the password. A hacker executes keylogger in the victim PC and it monitors the keystokes and information is send to the hacker remotely. Hence, the hacker gets the password. We can execute the keylogger into the system through various ways such as hacking the system, writing a auto run script of keylogger in USB etc. We will getting through it later. I will post a full tutorial on Keylogging.


These are the basic terms of hacking you must know these terms to have a good start on hacking. In the next post I would show you the steps for the successful hacking. Thanks for the views. Please put your comments below to let me know your queries. Share my blog to your friends and please support us.

No comments:

Post a Comment