Hacker's jargons
-
Upload
pavan-m -
Category
Technology
-
view
143 -
download
0
Transcript of Hacker's jargons
![Page 1: Hacker's jargons](https://reader036.fdocuments.in/reader036/viewer/2022062316/58865d441a28ab26598b647b/html5/thumbnails/1.jpg)
Hacker’s Jargons
pavanw3b
![Page 2: Hacker's jargons](https://reader036.fdocuments.in/reader036/viewer/2022062316/58865d441a28ab26598b647b/html5/thumbnails/2.jpg)
$ whoami• Pavan aka pavanw3b• Security Engineer @ ServiceNow• n|u core team• Other boring details at
pavanw3b.com
![Page 3: Hacker's jargons](https://reader036.fdocuments.in/reader036/viewer/2022062316/58865d441a28ab26598b647b/html5/thumbnails/3.jpg)
What?
• A small dictionary for hackers• InfoSec, admin, developers• .. ORDER BY `title` ASC
![Page 4: Hacker's jargons](https://reader036.fdocuments.in/reader036/viewer/2022062316/58865d441a28ab26598b647b/html5/thumbnails/4.jpg)
Why?• Don’t get lost• Express better• Know what you do• Know what somebody did
![Page 5: Hacker's jargons](https://reader036.fdocuments.in/reader036/viewer/2022062316/58865d441a28ab26598b647b/html5/thumbnails/5.jpg)
Method• Quiz?• Rewards• 9 Humla & bachav wild card entry• First hand raise I see
![Page 6: Hacker's jargons](https://reader036.fdocuments.in/reader036/viewer/2022062316/58865d441a28ab26598b647b/html5/thumbnails/6.jpg)
Cipher, Ciphertext
Cypher
Encryption Algorithm
Encrypted text
![Page 7: Hacker's jargons](https://reader036.fdocuments.in/reader036/viewer/2022062316/58865d441a28ab26598b647b/html5/thumbnails/7.jpg)
Disinformation
Providing wrong information intentionally
![Page 8: Hacker's jargons](https://reader036.fdocuments.in/reader036/viewer/2022062316/58865d441a28ab26598b647b/html5/thumbnails/8.jpg)
Drive-by Download
Visit – Download malware
![Page 9: Hacker's jargons](https://reader036.fdocuments.in/reader036/viewer/2022062316/58865d441a28ab26598b647b/html5/thumbnails/9.jpg)
Dropper
Settle first - call friendsSingle Stage, Double Stage
Avoid detection
![Page 10: Hacker's jargons](https://reader036.fdocuments.in/reader036/viewer/2022062316/58865d441a28ab26598b647b/html5/thumbnails/10.jpg)
Dumpster diving
Make use of the dumped stuffsLegal in the US
![Page 11: Hacker's jargons](https://reader036.fdocuments.in/reader036/viewer/2022062316/58865d441a28ab26598b647b/html5/thumbnails/11.jpg)
False Positive
!True Security issuesScanners
![Page 12: Hacker's jargons](https://reader036.fdocuments.in/reader036/viewer/2022062316/58865d441a28ab26598b647b/html5/thumbnails/12.jpg)
Fuzzing
Fuzz TestingBombard with junk to make a sense
System Errors, Bugs
![Page 13: Hacker's jargons](https://reader036.fdocuments.in/reader036/viewer/2022062316/58865d441a28ab26598b647b/html5/thumbnails/13.jpg)
ITW
In The WildMalware Spread Worldwide
![Page 14: Hacker's jargons](https://reader036.fdocuments.in/reader036/viewer/2022062316/58865d441a28ab26598b647b/html5/thumbnails/14.jpg)
Logic Bomb
Explode at certain LogicHidden Malicious Code
![Page 15: Hacker's jargons](https://reader036.fdocuments.in/reader036/viewer/2022062316/58865d441a28ab26598b647b/html5/thumbnails/15.jpg)
Monkey Patching
Patch else’s code to protect yourselfThird party Library
![Page 16: Hacker's jargons](https://reader036.fdocuments.in/reader036/viewer/2022062316/58865d441a28ab26598b647b/html5/thumbnails/16.jpg)
Nonce
Number used ONCEIdentify genuine stuffs
Crypto: authentication, Hashing, CSRFwp nonce
![Page 17: Hacker's jargons](https://reader036.fdocuments.in/reader036/viewer/2022062316/58865d441a28ab26598b647b/html5/thumbnails/17.jpg)
Pharming
Phishing without a lureRedirection by Malware
![Page 18: Hacker's jargons](https://reader036.fdocuments.in/reader036/viewer/2022062316/58865d441a28ab26598b647b/html5/thumbnails/18.jpg)
Piggybacking
Gain unauthorized accessBy exploiting authorized legitimate
![Page 19: Hacker's jargons](https://reader036.fdocuments.in/reader036/viewer/2022062316/58865d441a28ab26598b647b/html5/thumbnails/19.jpg)
Ransomware
Lock down – Ask RansomRemote Private KeyCatch me if you can
![Page 20: Hacker's jargons](https://reader036.fdocuments.in/reader036/viewer/2022062316/58865d441a28ab26598b647b/html5/thumbnails/20.jpg)
RAT
Remote Access TrojanRemote Administration
Games, email attachments
![Page 21: Hacker's jargons](https://reader036.fdocuments.in/reader036/viewer/2022062316/58865d441a28ab26598b647b/html5/thumbnails/21.jpg)
Retroactive BugActivate a Retro Bug
While patching another bugThanks to @Danish
![Page 22: Hacker's jargons](https://reader036.fdocuments.in/reader036/viewer/2022062316/58865d441a28ab26598b647b/html5/thumbnails/22.jpg)
Rogue Program
False Positive - Infect
![Page 23: Hacker's jargons](https://reader036.fdocuments.in/reader036/viewer/2022062316/58865d441a28ab26598b647b/html5/thumbnails/23.jpg)
Shoulder Surfing
Look over Shoulder
![Page 24: Hacker's jargons](https://reader036.fdocuments.in/reader036/viewer/2022062316/58865d441a28ab26598b647b/html5/thumbnails/24.jpg)
SMShing
Phishing by SMS
![Page 25: Hacker's jargons](https://reader036.fdocuments.in/reader036/viewer/2022062316/58865d441a28ab26598b647b/html5/thumbnails/25.jpg)
Spear Phishing
Phishing from the Names you know
![Page 26: Hacker's jargons](https://reader036.fdocuments.in/reader036/viewer/2022062316/58865d441a28ab26598b647b/html5/thumbnails/26.jpg)
STR
Steps To ReproducePOC
![Page 27: Hacker's jargons](https://reader036.fdocuments.in/reader036/viewer/2022062316/58865d441a28ab26598b647b/html5/thumbnails/27.jpg)
Time Bomb
Logic Time Bomb
![Page 28: Hacker's jargons](https://reader036.fdocuments.in/reader036/viewer/2022062316/58865d441a28ab26598b647b/html5/thumbnails/28.jpg)
Typosquatting
Typo Friendly URLs
![Page 29: Hacker's jargons](https://reader036.fdocuments.in/reader036/viewer/2022062316/58865d441a28ab26598b647b/html5/thumbnails/29.jpg)
Vishing
Voice PhishingVoIP
![Page 30: Hacker's jargons](https://reader036.fdocuments.in/reader036/viewer/2022062316/58865d441a28ab26598b647b/html5/thumbnails/30.jpg)
Wardriving
Keep driving, Keep Scanning WiFi
![Page 32: Hacker's jargons](https://reader036.fdocuments.in/reader036/viewer/2022062316/58865d441a28ab26598b647b/html5/thumbnails/32.jpg)
Whaling
Emails with malicious linksExecutives & Top Management
Contact details are publicTo Steal Corporate Secrets
![Page 33: Hacker's jargons](https://reader036.fdocuments.in/reader036/viewer/2022062316/58865d441a28ab26598b647b/html5/thumbnails/33.jpg)
Zero Day
Exploit Security Vulnerability widelyBefore owner comes to know
Before developer hurries to patch
![Page 34: Hacker's jargons](https://reader036.fdocuments.in/reader036/viewer/2022062316/58865d441a28ab26598b647b/html5/thumbnails/34.jpg)
Zombie
Compromised deviceTo Perform any malicious taks
Controlled remotely
![Page 35: Hacker's jargons](https://reader036.fdocuments.in/reader036/viewer/2022062316/58865d441a28ab26598b647b/html5/thumbnails/35.jpg)
Zoo
Collection of malwares
![Page 36: Hacker's jargons](https://reader036.fdocuments.in/reader036/viewer/2022062316/58865d441a28ab26598b647b/html5/thumbnails/36.jpg)
Thanks for bearing
Pavanfb/pavanw3b | @twitter | pavanw3b.com
thedarkw3b.com/hackers-dictionary-jargons/
How was this new thing that we tried?