Site menu |
| |
|
Seksioni kategoris |
| |
|
Bookmark website |
| |
|
Sondazhi Yne |
| |
|
Statistika |
|
Total online: 1 Guests: 1 Users: 0 |
|
|
| | |
|
HACKER PROGRAMS EXPLAINED
| 01.05.2011, 8:19 PM |
RAT-remote acces tool ili remote administration tool
FUD-fully undetectable(undetectable by any AV)
UD-undetectable(detectable by few AV-s)
Crypter-is toll that makes your viruses FUD or UD to AV-s
Keylogger-trace(loggs) the keys struck on a keyboard
Trojan-is malware designed to allow remote access to a target computer system
Computer worm- is a self-replicating computer program. It uses a computer network to send copies of itself to other computers on the network
Logic Bombs – Logic bombs are usually pieces of code that are programmed into a program that lie dormant until a certain time or until a user does a certain action which causes it to be executed
Bacteria – Bacteria make many copies of themselves and eventually end up taking up all of the computers recourses such as all of its processor power, memory and disk space
Blended Threats – are combine all of the characteristics of the above and use them along with system vulnerabilities to spread and infect machines.
Phising-is process of attempting to acquire information such as usernames, passwords,credit card details by making fake page same as original one,wich steals personal information when someone log in that fake page
Internet bot- computer program which does automated tasks
Botnet-network of "zombie" computers used to carry out automated tasks such as spamming
SQL injection- is attack on a database of Web site in which the attacker executes SQL commands by taking advantage of security vulnerabilitys in website
XSS(Cross Site Scripting)-is a vulnerability which allows you to insert a malicous code into a web application
DDoS-is an attack where multiple compromised systems are used to target a single system causing a Denial of Service (DoS) attack
DoS-a type of attack on a network that is designed to bring the network down flooding it with useless traffic.
brute force- is attack a strategy used to break the encryption of data, a method of defeating a cryptographic scheme by trying a large number of possibilities
Rainbow table-is way to crack password -it is huge pre-computed list of hash values for every possible combination of characters
Footprinting- is the act of gathering information about a computer system and the companies it belongs to,it is is the first step hackers take in their hacking process
Remote File Inclusion (RFI) occurs when a remote file, usually a shell , is included into a website which allows the hacker to execute server side commands as the current logged on user, and have access to files on the server
Rootkit- is a collection of tools (programs) that enable administrator-level access to a computer or computer network
|
Category: My files | Added by: albanian-hacker
|
Views: 1070 | Downloads: 0
| Comments: 1
| Rating: 0.0/0 |
| |
| |
| | |
|
Kerko |
| |
|
Share Website |
| |
|
Upload your files |
| |
|
VIDEO |
| |
|
|