Hacker's jargons
-
Upload
nu-the-open-security-community -
Category
Internet
-
view
453 -
download
0
Transcript of Hacker's jargons
Hacker’s Jargons
pavanw3b
$ whoami• Pavan aka pavanw3b• Security Engineer @ ServiceNow• n|u core team• Other boring details at
pavanw3b.com
What?
• A small dictionary for hackers• InfoSec, admin, developers• .. ORDER BY `title` AS
Why?• Don’t get lost• Express better• Know what you do• Know what somebody did
Method• Quiz?• Rewards• 9 Humla & bachav wild card entry• First hand raise I see
Cipher, Ciphertext
Cypher
Encryption Algorithm
Encrypted text
Disinformation
Providing wrong information intentionally
Drive-by Download
Visit – Download malware
Dropper
Settle first - call friendsSingle Stage, Double Stage
Avoid detection
Dumpster diving
Make use of the dumped stuffsLegal in the US
False Positive
!True Security issuesScanners
Fuzzing
Fuzz TestingBombard with junk to make a sense
System Errors, Bugs
ITW
In The WildMalware Spread Worldwide
Logic Bomb
Explode at certain LogicHidden Malicious Code
Monkey Patching
Patch else’s code to protect yourselfThird party Library
Nonce
Number used ONCEIdentify genuine stuffs
Crypto: authentication, Hashing, CSRFwp nonce
Pharming
Phishing without a lureRedirection by Malware
Piggybacking
Gain unauthorized accessBy exploiting authorized legitimate
Ransomware
Lock down – Ask RansomRemote Private KeyCatch me if you can
RAT
Remote Access TrojanRemote Administration
Games, email attachments
Retroactive BugActivate a Retro Bug
While patching another bugThanks to @Danish
Rogue Program
False Positive - Infect
Shoulder Surfing
Look over Shoulder
SMShing
Phishing by SMS
Spear Phishing
Phishing from the Names you know
STR
Steps To ReproducePOC
Time Bomb
Logic Time Bomb
Typosquatting
Typo Friendly URLs
Vishing
Voice PhishingVoIP
Wardriving
Keep driving, Keep Scanning WiFi
Whaling
Emails with malicious linksExecutives & Top Management
Contact details are publicTo Steal Corporate Secrets
Zero Day
Exploit Security Vulnerability widelyBefore owner comes to know
Before developer hurries to patch
Zombie
Compromised deviceTo Perform any malicious taks
Controlled remotely
Zoo
Collection of malwares
Thanks for bearing
Pavanfb/pavanw3b | @twitter | pavanw3b.com
thedarkw3b.com/hackers-dictionary-jargons/
How was this new thing that we tried?