Showing posts with label hack. Show all posts
Showing posts with label hack. Show all posts

Do You Know All the Terms Of Hacking World You Should Know

Common Terms Of Hacking World:

1#DDoS: DDoS  means Distributed Denial of Service. This is a type of DOS attack in which multiple compromised systems are used and these systems are often infected with a Trojan. All these infected systems select a target and cause a Denial of Service (DoS) attack.
2# VPS: It stands for Virtual private server (VPS) . It is a virtual machine that is sold as a service by an Internet hosting service. A VPS generally runs its own copy of an operating system, and the customers have superuser-level access to that operating system instance, so they can install almost any software that runs on that OS.
3# SE: Social engineering is an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.
4# HTTP: The Hypertext Transfer Protocol (HTTP) is an application protocol for  collaborative, distributed, hypermedia information systems. HTTP is the basis of data communication for the World Wide Web. The part  Hypertext is a structured text that makes use of logical links (hyperlinks) between nodes containing text.
5# SSH: Secure Shell( SSH)  is a cryptographic i.e, encrypted network protocol that operates at layer 7 of the OSI Model. It allows remote login and other network services to operate in a secure way over an unsecured network. In simple words, SSH is used to connect with Virtual Private Servers.
6# FTP: The FTP or File Transfer Protocol is a standard network protocol that is used to transfer files between a client and server using a computer network.
7# XSS (CSS): Cross-site scripting or XSS is a type of computer security vulnerability usually found in web applications. This vulnerability allows hackers to inject client-side script into web pages which are viewed by other users.
8# Script Kiddie: A Skiddie or Script Kiddie is an unskilled individual who uses programs or scripts developed by other hackers to attack networks and computer systems even to deface websites.
8# VPN: A Virtual Private Network or VPN helps in extending a private network across a public network, such as Internet. It allows the users to send and receive data across public or shared networks just like their computing devices are directly connected to the private network. Hence this benefit from the security, functionality and management policies of the private network.
10# Nix: Nix is a very powerful package manager for Linux and other Unix based systems that make package management reproducible and reliable. It provides side-by-side installation of multiple versions of a package, atomic upgrades and rollbacks,  easy setup of build environments and multi-user package management.
11# SQL:  Structured Query Language or SQL is a special-purpose programming language designed for managing data contained in a relational database management system (RDBMS), or even for stream processing in a relational data stream management system or RDSMS.
12# FUD: Fully undetectable or FUD in short, can stand for data that had been encrypted, making it appear to be random noise. This term is used in hacker circles to refer something as a clean software to many anti-viruses but still contain some kind  of hacking tool inside it.
13# LOIC/HOIC: The Low Orbit /High Orbit Ion Cannon, often abbreviated to LOIC/HOIC. It is an open source denial-of-service attack and network stress testing application written in BASIC and is designed to attack as many as 256 URLs at a time.
14# Trojan: A Trojan or Trojan horse is a type of malware that disguises itself as a legitimate software. these Trojans can be employed by hackers and cyber-thieves trying to gain access to users’ systems. Users are typically tricked  into loading and executing Trojans on their systems.
15# Botnet: A botnet (also known as a zombie army) is a number of Internet computers that, although their owners are unaware of it, have been set up to forward transmissions (including spam or viruses) to other computers on the Internet.
16# SQL Injection: SQL injection is a famous code injection technique, commonly to attack data-driven applications.In this attack, malicious SQL statements are inserted into an entry field for execution.
17# Root: Root is the Highest permission level on a computer that allows the user to modify anything on the system without a  single restriction.
18# Warez: Warez is copyrighted works distributed without fees or royalties, and may be traded, in general, violation of copyright law. Warez are generally unauthorized releases by organized groups, as opposed to file sharing between friends or large groups of people with similar interest using a darknet. Warez are not usually commercial software counterfeiting.
19# White Hat Hacker: A white hat hacker is a computer security specialist ( ethical hacker ) who breaks into secured systems and networks to test and assess their level of security. These are the good guys in the hacking community and use their skills and knowledge to to improve security by exposing vulnerabilities before a malicious hacker (also known as black hat hackers) detects and exploits them.
20# Black Hat Hacker: A black hat hacker is an individual with very good computer knowledge and with a sole purpose to bypass or breach internet security for malicious reasons. Black hat hackers are also known as dark-side hackers or crackers. These are the guys with whom White hat hackers have to fight all the time.
21# Grey Hat Hacker: The term Grey Hat hacker refers to a computer hacker or computer security expert who sometimes violate laws or typical ethical standards, for personal purposes but don’t have the malicious intentions like a typical black hat hacker.
22# Rootkit: A rootkit is a clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence. The term rootkit is a connection of the two words “root” and “kit”. This kind of virus can be easily removed by booting the computer in safe mode.
23# Ring0: Very hard to remove and very rare in the wild, these can require you to format, it’s very hard to remove certain ring0 rootkits without safe mode.
24# IP Grabber: IP Grabber is a link that grabs victim’s IP when they visit it the particular web address.
25# Malware: ‘Malware’ is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. It can take the form of executable code, scripts, active content, and other software.
26# Phreak: Phreak is a slang term coined to describe the activity of a culture of people who  experiment with, explore, or study, telecommunication systems. Phreaker, phreak, or phone phreak are names commonly for and by individuals who participate in phreaking.
27# DOX: Doxing or doxxing, is the Internet-based practice of researching and broadcasting personally identifiable information about an individual. The methods employed to acquire this information include searching publicly available databases and social media websites (like Facebook), hacking, and social engineering. It is closely related to internet vigilantism and hacktivism. Doxing may be carried out for various reasons, including to aid law enforcement, business analysis, extortion, coercion, harassment, online shaming and vigilante justice.
28# Worm: A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program.
29# Deface: A website deface is an attack on a site that changes the appearance of the site or a certain web page or technically when a hacker replaces the index file with their own one.
30# Keylogger: Keylogger is a computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.
31# RAT: A remote administration tool (RAT) is a piece of software that allows a remote “operator” to control a system as if he has physical access to that system. While desktop sharing and remote administration have many legal uses, “RAT” software is usually associated with criminal or malicious activity.
Did you like the article on hacker terms ? Please share it with your friends and let them know this information.
If you happen to find any mistakes n the article, comment below. I will be happy to address them.

Do You Know How To Become A Hacker ?


The main requirements to become a hacker are competence , attitude and styles.

1. Skills

  1. Learn how to program.It is the fundamental hacking skill. It means you’ll have to learn a programming language. Preferably more than one, you can learn a lot by comparing two languages and look for similarities and differences in the way they handle a situation. But programming is more than writing code.
  2. Learn to run an operating system. The Hacker community is much Unix/Linux oriented these days. There are several reasons, an important one being that with open-source. Unixes you get the code as well. You can actually read how the operating system is written, you can get to know it well enough to modify if you want to.
    Unix / Linux is also very network/internet oriented, learning to understand Unix / Linux will help for the next skill you’ll need to acquire. And it comes with free programming tools.
  3. Learn about data communication and networks
  4. Learn how to use the World Wide Web and write HTML. Technically, the internet is just a collection of computer networks. But it has become an important communication medium as well, and can be used for many things. Sharing information is one. You’ll need to know how to write HTML to publish on the web.
    Designing a web site with a good logical structure and a matching directory structure is also an exercise worth doing to sharpen a skill or two.
  5. If you don’t have functional English, learn it. There is a lot of information on the web or in books, available in English. And apparently English has developed a richer technical vocabulary so that a lot gets lost in translations.

2. Style

Style does not matter as much as competence though. The way of your style is an expression of your own personality and hackers recognize certain personality traits. Apart from intelligence, the ability to learn, concentration, analytical thinking, hackers usually also show signs that they use both hemispheres of the brain, not just the left side, the logical, analytical mind. This will allow there mind to dig the logic of a problems
Here are few activities that show you may have this ability, and can help you to improve it
  • Learn to write your native language well.
  • Read science fiction.
  • Develop an analytical ear for music. Learn to appreciate peculiar kinds of music. Learn to play some musical instrument well, or how to sing. Discover the mathematics of music, and the beauty in the mathematics
  • Develop your appreciation of puns and wordplay.
A few things not to do.
  • Don’t use a silly, grandiose user ID or screen name.
  • Don’t get in flame wars on Usenet (or anywhere else).
  • Don’t call yourself a `cyberpunk’, and don’t waste your time on anybody who does.
  • Don’t post or email writing that’s full of spelling errors and bad grammar.
Most of the above mentioned things you already do, the more likely it is that you are natural hacker material.

3. Attitude

Hackers solve problems and build things, and they believe in freedom and voluntary mutual help. Hacker Attitude has to do with finding pleasure in solving problems and building things, looking for new problems to solve rather than re-invent the wheel time and time again. Hackers are open-minded, towards the problems they want to solve as well as towards the world in general. Hackers avoid boredom and brain-dead repetitive work
Most important is they believe that attitude is no substitute for competence.
To be as a hacker you need to have this kind of attitude in yourself. Becoming the kind of person who believes these things is important for you — for helping you learn and keeping you motivated.
Or, as the following modern Zen poem has it:-
to follow the path,
look to the master,
follow the master,
walk with the master,
see through the master,
become the master.
Style and Attitude are important, but can never be a substitute for competence. Attitude without competence means your posing. Attitude and style are things you develop in time. Hacker skills require intelligence, and hard work.

4. Status

There are some hackers obviously are more well known than other hackers. There is something like status in the hacker community

5. Ethics

With knowledge comes power,and with power comes responsibility.Many books have been written about ethics, many more will be written. I won’t add to that discussion.
Star Wars said it all  there are hackers, so there is also the temptation of The Dark Side

Here Is Mayhem Hacker Robot To Protect Us From Hacking Attacks

ForAllSecure, the minds behind the Mayhem Hacker Robot who won the Pentagon’s Cyber Grand Challenger Contest, are working to make the software a bug fixer. They are aiming an autonomous system which would find vulnerabilities in the commercial devices like routers and automatically fix them.

Every year, we see large botnets of compromised devices affecting the internet 
on a global scale. Although, as impossible it may sound, the future might have an army of robots dedicated to fixing vulnerabilities in devices like routers and IoT devices, often a soft target for hackers while building massive botnets to create high-intensity DDoS attacks.
Last year, a startup ForAllSecure’s Mayhem software won the DARPA’s $2 million Cyber Grand Challenge contest, where automated systems from different teams engaged in a hacking battle.
The ForAllSecure team behind the robot hacker Mayhem wants to deploy it in the real world fixing vulnerabilities and bugs in the software running on commercial hardware, like routers. Such devices are widely dependent on the firmware pushed by their vendor’s.
Hardware companies sacrifice a significant chunk of their money pie to provide security patches and fixes – created by humans – for their older products. An automated system in existence will bring a substantial ease for such companies.
“Now when a machine is compromised it takes days or weeks for someone to notice and then days or weeks—or never—until a patch is put out,” says David Brumley, the co-founder and the CEO of ForAllSecure. He is an associate professor at the Carnegie Mellon University.
“Imagine a world where the first time a hacker exploits a vulnerability he can only exploit one machine and then it’s patched,” Brumley adds.
ForAllSecure is trying to make Mayhem software a bug fixer. They are working with some companies, assisting them in fixing bugs in their products. However, the story may not be buttery smooth. Not all the devices makers would wholeheartedly welcome an autonomous bug fixing system for their hardware.
Security patches applied without human interference can put a question about quality assurance. Something bad may happen with the devices due to incompatible fixes. But it is still too early to make any assumptions. Brumley acknowledges this thing, but according to him, human involvement “slows down the process”.

Here Are Anonymous Share Simple Guide On “How To Hack Donald Trump’s Smartphone”



The notorious hacking group Anonymous has shared a little guide on Twitter, telling how to hack Donald Trump’s Android smartphone. The guide mentions that Trump’s Samsung Galaxy S3, which run Android 4.4, is outdated. It makes Galaxy S3 easily hackable using techniques like Stagefright. Notably, many security researchers have also pointed out this loophole in the past.


One of the major factors in the recent US presidential elections were the email leaks of Hillary Clinton’s campaign manager John Podesta, which signaled the weak cyber security measures. Now, Donald Trump is himself a target of popular hacktivist group Anonymous.

Anonymous doesn’t have much affection for the United States President Donald Trump. Given the absurd policies of Trump, this stance shouldn’t surprise anyone. The hackers have published a little guide on Twitter, telling how to hack Donald Trump’s smartphone.
The notorious group claims that the President is an easy target to hacking attacks. Wondering why? Because he “refuses to use another smartphone other than the Galaxy S3.”
In the tweet, Anonymous mentioned a popular Android exploit that could potentially do the job of cracking Donald Trump’s smartphone. It says that a Galaxy S3, which runs Android 4.4, doesn’t even meet the security requirements of an average teenager.
The group insists that using Stagefright, one can easily hack Galaxy S3 by “enticing Trump to click on a link.” To use Stagefright exploit to hack Trump’s phone, a hacker will need to make him download a crafted MMS containing a .MP4 file.
It should be noted that, in all likelihood, since taking office, Trump has been using a Samsung Galaxy S3 Phone. Many media reports have also noted that the standard Galaxy S3 received its last security update about 2 years ago. Thus, as Anonymous points out, it might be vulnerable to Stagefright.
What do you think? Is Trump’s Android phone a threat to the US security? Do share your feedback and views.

Donald Trump: ‘Full Report’ On Hacking In First 90 Days

President-elect Donald Trump said his administration would produce a full report on hacking within the first 90 days of his presidency and accused “my political opponents and a failed spy” of making “phony allegations” against him.
“Totally made up facts by sleazebag political operatives, both Democrats and Republicans,” Trump said in a Twitter post Friday, adding in a later tweet, “My people will have a full report on hacking within 90 days!’’
In a flurry of early morning messages, the president-elect also suggested that the intelligence community had leaked damaging information about his alleged ties to Russia, after news reports published information about a dossier claiming the Kremlin had compromised him.
“Russia says nothing exists,’’ Trump said on Twitter. “Probably released by ‘Intelligence’ even knowing there is no proof, and never will be.’’
In messages sent before many Americans reported to work, Trump took to social media to share with the public his thoughts on a range of issues Friday, including congressional moves to repeal Obamacare — calling it the “‘Unaffordable’ Care Act” — and the testimony of his cabinet nominees which has sometimes differed from his stated views.
Trump also commented on the Justice Department’s internal probe into the FBI’s handling of Hillary Clinton’s use of a private e-mail server Friday, denouncing the reaction by Clinton aides who said again Thursday that Comey cost her the election.
Trump said investigators had been “nice’’ to Clinton and that the former secretary of state’s loss in the presidential race could not be attributed to actions by the Federal Bureau of Investigation in the final days of the campaign.
“What are Hillary Clinton’s people complaining about with respect to the F.B.I.,’’ Trump said on Twitter. “Based on the information they had she should never have been allowed to run – guilty as hell. They were VERY nice to her. She lost because she campaigned in the wrong states – no enthusiasm!’’

How to become an ethical hacker | Padsa Information

An essential guide to becoming an ethical hacker

I often get a number of people ask for guidance  about how they can become an ethical hacker. I also receive even more requests about how to become a black hat hacker. The latter requests are ignored. below is a definition of an ethical hacker

Ethical hacker

  1. A person who hacks into a computer network in order to test or evaluate its security, rather than with malicious or criminal intent.
So if you want to be an ethical hacker the truth is there is no easy method to become a skilled hacker…… it’s easy to be a script kiddie and load up Armitage or Fast-track and fire every exploit known to man at a target. But what’s the point at firing Linux exploits at a Windows box!.

You need essential prerequisite knowledge

If you want to get into the IT  security world as a white hat you must be competent in the following areas:
  • Networking
  • Programming
  • Databases
  • Operating systems (Linux and Windows)
Once you have a fairly good knowledge of the above points THEN it would a good idea to learn about hacking. So now you have a good understanding of the fundamentals of IT, you can now understand how to break some of the underlying vulnerabilities within computer architecture. The following activities should help you with this:

What areas to concentrate on in order to build a foundation

Networking – Cisco courses seem to be really good. I undertook all the CCNA courses available.
Programming – Focus on learning C++, Python/Ruby and PHP.
Databases – Play around with MySQL and MSSQL and make your own database to understand how it works.
Operating systems – Most flavours of Linux are the similar to one another, I use Debian on a lot of servers and of course Kali. Additionally it is worth understanding the more obscure areas of Windows such as the registry.

Read books about hacking (Here are some good examples of some)

  • The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws
  • Hacking: The Art of Exploitation, 2nd Edition
  • The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
  • Metasploit: The Penetration Tester’s Guide
  • CEH Certified Ethical Hacker All-in-One Exam Guide
  • Google Hacking for Penetration Testers

Undertake FREE ethical hacking courses.

These are very good for learning but won’t give you an industry recognised qualification, however they will teach you a lot about different areas of ethical hacking which will help towards recognised qualifications.
You can register for a free Cibrary account to do a free ethical hacking course at the following link –

Undertake Recognised Online courses

These course are all paid for, however they are industry recognised and will help you find a job in the IT security sector.
  • CEH
  • OSCP
  • CISSP

Communicate and follow other fellow IT security enthusiasts through the following mediums

  • Facebook (https://www.facebook.com/pages/Hacking-News-Tutorials/252350961471136 )
  • Google+
  • Twitter

Self learn by watching online tutorials

  • www.securitytube.net
  • www.youtube.com

Download practice environments to practice and hone newly learned skills

  • DVWA (Dam Vulnerable Web Application)
  • Metasploitable2
  • Samurai WTF

Final note: Hacking is something that takes A LOT of your time!, be prepared to sacrifice friendships, relationships and that awesome social life you used to have!