Ethical Hacking Course - Terminologies.



Ye rahi ek list kuch zaruri terms ki jo hacking ki field me use hote hain.



Adware
Adware ek software hai jisse design kara jaata hai aapke system me zabardasti ads show karne ke liye.

Attack
Attack ek action hota hai jo aap lete hain kisi system ko hack karne ke liye.

Back door
Back Door ek hidden entry point hota hai jisse aap kisi bhi system me enter kar sakte hain security ko bypass karke.

Bot
Bot ek program hota hai jo kisi cheez ko automatic karne ke liye banaaya jaata hai jisse ki wo cheez bulk me.ho sake aur high speed par ho sake jo ki koi human nahi kar sakta jaise ki facebook account creator bot se aap bohot saare accounts bana sakte hain 10 second me.



Botnet
Botnet ek computers ka group hota hai jo ki ek hacker ke control me rehta hai aur computer ke owner ko pata bhi nahi rehta hacker un computer ka istemal dos attack me karta hai.

Brute Force Attack
Brute force attack ek automatic aur sabse aasaan attack hota hai kisi system ya website ke user credentials hack karne ka. Iss attack me bohot saare passwords automatically try hote rehte hain jab tak aapko access nahi mil jaye.

Buffer overflow
Buffer overflow ek flaw hai jo tab hota hai jab kisi memory block me zyada data chale jaata hai.

Clone Phishing
Clone phishing ek method hai jisme kisi website ya company ke email ko modify karke nakli link banaaya jaata hai.

Cracker
Cracker wo hota hai jo kisi software ya program ko modify karta hai aur wo features paa leta hai jo kisi normal user ke pass nahi rehte.

Denial of service attack
Denial of service attack ek koshish rehti hai kisi server ko down karne ki taaki uske users ke liye wo unavailable ho jaye

Ddos
Distributional denial of service

exploit kit
Exploit kit ek software rehta hai jo design kara jaata hai web server pe chalne ke liye taaki wo vulnerabilities find kare aur hum unme apne malicious code waha chala sake.

Exploit
Exploit ek data ka thoda sa tukda hota hai ya fir koi commands ka sequence hota hai jo kisi pehle se maujood vulnerability ka faayda uthaata hai aur usse compromise karta hai.

Firewall
Firewall ek filter hai jo ki banaaya gaya hai ghuspaithiyo ko dur rakhne ke liye aur system aur uss insaan ke beech me safe connection ke liye.

Keystroke logging
Keystroke logging ek process hota hai ye record karne ka ki keyboard par konsi keys dabayi gayi hain. Ye zyadatar grey aur black hat hackers use karte hain id aur passowrd record karne ke liye.

Logic bomb
Ek virus jo ki iss prakaar design kara gaya hai ki jab wo kuch specific conditions meet karega tab hi action me aayega. Sabse common example hai time bomb virus.

Malware
Malware ek term hai jo inn sab ke liye use hota hai computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware, aur bohot saare malicious program.

Master program
Master program wo program hota hai jo black hat hackers use karte hain zombie drones ko infect karne ke liye.

Phishing
Phishing ek fraud karne ka method rehta hai jisme ek hacker apko ek legitimate looking email hota hai jisme ek suspicious link hota hai aur wo aapki perosnal information hack karna chahta hai.

Phreaker
Phreakers wo hote hain jo telephone lines hack karte hai lambe calls karne ke liye.

Rootkit
Rootkit ek stealth software hota hai jo ki zyadatar malicious rehta hai aur ye kuch processes ko hide kardeta hai jo aap chahe.

Shrink wrap code
Ye ek tareeka hota hai kisi ghatiya design kare gaye software ko exploit karne ka.

Spyware
Spyware ek software hota hai jo kisi company ya insaan ki information collect karta hai bina uss insaan ya company ki permission ke aur uss info ko sell kardeta hai.

Sql Injection
Sql injection ek sql code injection technique hoti hai jo data driven applications ko exploit karne me help karti hai.

Threat
Threat koi possible danger hota hai jiski wajah se kisi web application ko hack kara ha sake

Trojan
Trojan ek virus hota hai jisse aise design kara jaata hai ki wo ek normal software dikhe par jaise hi wo.execute hota hai wo attack kardeta hai.

Virus
Ye ek typical code hota hai jo agar system me aagaya toh system ko corrupt kardeta hai.

Vulnerability
Vulnerability wo weakness hoti hai jiski wajah se hacker kisi chez ko hack kar pata hai.

Worms
Ye ek self replicating virus hota hai jo apne aap ke clone banaakar memory ko full kardeta hai.

Cross site scripting
Ye ek tarah ki computer security vulnerability hai jo ki zyadatar web applications me payi jaati hai.

 Zombie drone
Zombie drone ek hi-jacked computer hota hai jisse ki galat purpose jaise email spamming ke liye use kara jaata hai.

Tags : ethical hacking terminologies, ethical hacking terminology, understand ethical hacking terminology a set ethical hacking, ceh ethical hacking, ethical hacking, ethical hacking a technique to enhance information security, ethical hacking course, ethical hacking of facebook, ethical hacking of facebook account, ethical hacking of facebook password, ethical hacking of fb, ethical hacking of fb account, ethical hacking of gmail account, ethical hacking of whatsapp, ethical hacking of wifi, ethical hacking ppt, ethical hacking tricks, ethical hacking tutorials, ethical of hacking, the ethical hacking, एथिकल हैकिंग, एथिकल हैकिंग कोर्स

No comments