Monday, 05.28.2018, 7:58 AM
Welcome Guest | RSS
Albanian Hackers Group
Sign Up
Site menu

Seksioni kategoris
My files [147]

Bookmark website

Sondazhi Yne
Votoni webin
Total of answers: 826


Total online: 1
Guests: 1
Users: 0

Main » Files » My files

01.05.2011, 8:19 PM

RAT-remote acces tool ili remote administration tool

FUD-fully undetectable(undetectable by any AV)

UD-undetectable(detectable by few AV-s)

Crypter-is toll that makes your viruses FUD or UD to AV-s

Keylogger-trace(loggs) the keys struck on a keyboard

Trojan-is malware designed to allow remote access to a target computer system

Computer worm- is a self-replicating computer program. It uses a computer network to send copies of itself to other computers on the network

Logic Bombs – Logic bombs are usually pieces of code that are programmed into a program that lie dormant until a certain time or until a user does a certain action which causes it to be executed

Bacteria – Bacteria make many copies of themselves and eventually end up taking up all of the computers recourses such as all of its processor power, memory and disk space

Blended Threats – are combine all of the characteristics of the above and use them along with system vulnerabilities to spread and infect machines.

Phising-is process of attempting to acquire information such as usernames, passwords,credit card details by making fake page same as original one,wich steals personal information when someone log in that fake page

Internet bot- computer program which does automated tasks 

Botnet-network of "zombie" computers used to carry out automated tasks 
such as spamming

SQL injection- is attack on a database of Web site in which the attacker executes SQL commands by taking advantage of security vulnerabilitys in website

XSS(Cross Site Scripting)-is a vulnerability which allows you to insert a malicous code into a web application

DDoS-is an attack where multiple compromised systems are used to target a single system causing a Denial of Service (DoS) attack

DoS-a type of attack on a network that is designed to bring the network down flooding it with useless traffic.

brute force- is attack a strategy used to break the encryption of data,
a method of defeating a cryptographic scheme by trying a large number of possibilities

Rainbow table-is way to crack password -it is huge pre-computed list of hash values for every possible combination of characters

Footprinting- is the act of gathering information about a computer system and the companies it belongs to,it is is the first step hackers take in their hacking process

Remote File Inclusion (RFI) occurs when a remote file, usually a shell , is included into a website which allows the hacker to execute server side commands as the current logged on user, and have access to files on the server

Rootkit- is a collection of tools (programs) that enable administrator-level access to a computer or computer network

Category: My files | Added by: albanian-hacker
Views: 520 | Downloads: 0 | Comments: 1 | Rating: 0.0/0
Total comments: 0
Only registered users can add comments.
[ Sign Up | Login ]

Share Website

Upload your files


Copyright ALBANIAN-HACKER © 2018
Free web hostinguCoz