Top 25 Ethical Hacking Terms For Learners

Welcome to the “Hacking with Kali Linux” series. Before moving on to more complex topics, it’s essential to understand hacking terminology, phrases, and slang. We will use these terms throughout our series of articles.

Would you mind letting me know if there is any term that I have forgotten to include in the comments box below this post? Alternatively, you can join the Discord server and share your thoughts, suggestions, and questions with me.

Top 25 Hacking Terms in 2021

1. White Hat or Grey Hat or Black Hat

These are the most often used terms in the hacking and pen-testing communities. A person who engages in hacking or penetration testing is a white-hat hacker or penetration tester.

A white-hat hacker is a penetration tester or ethical hacker who performs hacking for good such as protecting the client’s information from bad actors. White hat hackers always get legal permissions from server administrators to perform tests on the server or website.

Black hat hacker is the most popular term among the three. Most people refer to hacking as black hat hackers; hence think hacking is only performed to compromise a system or network.

Black hat hackers always look for loopholes in the system and get into the system once they discover a loophole. After gaining access to the system, black hat hackers extract as much data as possible and sell the data to make money.

Grey Hat hackers fall somewhere in between. They sometimes break ethical hacking standards to hack a system, but their intentions are not malicious.

2. DoS Attack

DoS stands for a denial-of-service attack. When we request information from a server, we send an HTTP/HTTPS request, and the server replies to that request with the requested information. In a Denial of Service attack, we create a bot and make it send requests like humans. The server will handle and reply to those requests as it would reply to any request made by humans.

3. DDoS Attack

DDoS stands for a distributed denial-of-service attack. DDoS is the same thing as DoS but implemented a little differently to make it work. In DoS, the server will have no trouble replying to bots requests because servers can simultaneously handle many requests.

In DDoS, an attacker sends requests from a lot of compromised devices simultaneously. When the number of requests reaches a point that the server can’t handle any more requests, it begins to drop new requests; hence the server goes down for the legitimate users. For example, an Apache web server can handle 10,000 requests at a time. If 10,000 connections are open, the apache server will drop any new connection.

4. Brute Force

Brute Force attacks are one of the most common types of attacks on the web. We’ll also learn to brute-force and the possible protections we can implement to mitigate brute-forcing.

Brute Force attacks are performed to guess users’ credentials. When a hacker conducts a brute-force attack on a website, he sends random usernames and passwords to the webserver to log in. If your password is simple, the hacker might crack it in seconds. With permutation and combination, a hacker can also send thousands of combinations of letters, numbers, and symbols in a second.

Attackers can improve brute force attacks by doing a little bit of social engineering.

5. Vulnerability

We will use this term throughout our series, “Hacking with Kali Linux.” In cybersecurity, a vulnerability is a loophole in a system, whether a website or an entire network. It’s said that every software has vulnerabilities, and it’s a matter of time that a hacker finds out the vulnerability and exploits it. Hackers can exploit a vulnerability to upload and run malicious code on the server and even gain complete access. The amount of damage a vulnerability can do depends on its severity.

Software developers keep reviewing their code to find new vulnerabilities and release a patch to fix them as soon as possible. Once a patch is released, all users must install the patch/update to secure their system from the specific vulnerability.

6. Zero-Day Vulnerability

These days the term Zero-Day vulnerability is in the news. A Zero-Day vulnerability is a vulnerability that exists in a system, hackers know about it, and the developers have not released any patch yet to fix it.

7. Exploit

In cybersecurity, making use of a vulnerability is called exploiting a vulnerability. Exploiting a vulnerability can include multiple steps, from social engineering to delivering a payload to the server.

8. Payload

Payload is referred to the malicious program that the attacker will send to the server. The payload can perform various tests on the server and execute a wide range of actions to accomplish the purpose of its master.

9. RAT

RAT stands for Remote Access Trojan is malware that the attacker lures the victim to run on their computer. Once executed, RAT allows complete access of the device to the hacker.

Often RATs are used to make zombie computers conduct DDoS attacks. A RAT program runs in the background and mostly does not even show up in the process monitoring tools.

10. Phishing

Once very popular, phishing is another type of attack where a hacker creates a duplicate site of any popular site to gain users’ credentials. For example, an attacker can send you a link that opens a page that looks like a Gmail login page. Although it looks like a Gmail page, it will send your credentials to the hacker who hosted this page if you type your credentials on this page.

To make sure you are not on any phishing site, always confirm the padlock (HTTPS and SSL certificates) and the URL in the browser’s URL bar.

11. Spoofing

Spoofing is a known attack where a hacker sends data to the user or a computer that looks legit. There are two cases where spoofing is commonly used, email and IP spoofing.

A hacker may send you an email that looks like coming from your bank. Every link in this email will take the user to a phishing site that the hacker set up.

Another common use is IP spoofing. Let’s say a server or network allows access to its users coming from certain allowed IP addresses. A hacker can send a request and make it look like coming from one of the whitelisted IP addresses to gain access to the server.

12. Spamming

Spamming is very common on the internet. Actually, it’s so common that almost every one of us witnesses it almost every day. Spamming aims to launch malicious campaigns and make users fall into the trap set by the bad actors.

Hackers send emails to millions of people every day. Each email is written in a way that makes the receiver click on the link instantly. The link in the email may take the user to a phishing site or download malware or spyware on the users’ system.

The email provider filters most spam emails to the user’s spam box. But as the hackers are advancing, I have seen some obvious spam emails landing in my inbox.

13. SQL injection

SQL injections are the SQL queries sent to the server hosting the PHP application. PHP developers have to sanitize the users’ input before passing it to the database. If a developer forgets to sanitize the users’ input, the attackers can send specific SQL queries to the server to download the entire database, modify a column value, or even delete the entire database.

14. FUD

FUD is a piece of code (virus or malware) that’s Fully UnDetectedable from anti-viruses.

15. RootKit

A rootkit is a program designed to provide remote access to the controller secretly. Rootkit runs secretly on the system and is very difficult to detect. Once a hacker installs a rootkit on the victim’s computer, they can run any command on the victim’s computer.

16. VPN

VPN, which stands for Virtual Private Network, is a method of increasing anonymity on the Internet. We can route all our internet traffic through a VPN, so when a request reaches its final destination, the server only knows that the VPN initiated the request instead of the user.

The traffic sent through VPN is highly encrypted. VPNs are often used to access blocked websites.

VPN allows encrypted transfer of information, but it is not completely anonymous. Governments can know what VPN provider you’re using through ISP (Internet Service Provider); hence contact the VPN provider to share your internet activity with them. If the VPN provider denies sharing activity logs with the Government, the Governments and other agencies can approach the court citing various security reasons, and the court may order the VPN provider to share the activity log.

There are also VPN providers who do not log users’ activities. Such VPN providers are the best.

17. Proxy

Similar to VPN, the proxy also allows its users to route internet traffic. We can route internet traffic through multiple proxies to make it more anonymous. Although using more proxies looks secure, but it’s not reliable. Proxies are often slow compared to VPN, and using more proxies means each proxy has to work for the request to reach its final destination.

Most free proxies available on the Internet either do not work or are extremely slow. We can also buy fast proxies but buying a proxy means leaving a trace for others to track.

18. Tor or Onion Network

Tor is free and open-source. It is the best way to access the internet anonymously. Tor is also called the onion network because of its way of functioning.

Tor network route users’ traffic through different (3, exact) nodes (devices) on the network. Each time the request is bounced from one node to another, it is encrypted. When it reaches the destination server, the server returns the result to the last node, and the process is followed backward until the first node provides the result to the user.

Tor network is highly anonymous and faster than proxies. It is almost impossible to trace tor users’ activities. Hence Tor is the most anonymous way of accessing the Internet.

19. VPS

VPS stands for Virtual Private Server. A VPS is a virtual computer within a physical computer. For example, you can create as many virtual computers as you want on a physical computer, and each VPS will have its own ports and software, etc.

20. Terminal or Console

A terminal or console is a command-line interface to interact with a machine. We will be using a Linux terminal throughout our series.

21. Footprinting

In cybersecurity, footprinting is referred to as information-gathering on the target device or the body that owns the device. Hackers use footprinting tools to collect their target’s information before performing the actual attack.

22. Reverse Shell

A reverse shell is a program when installed, opens a connection for the hacker to pass any command to the system. Hackers install a reverse shell on the system to control the target device without physically being around that device.

23. Encryption

Encryption is the process of converting plain-text information into a form that’s not readable. The information is encrypted with a secret key, and the person who has the secret key can convert the unreadable form of information into readable or plain text.

If you encrypt your files with a key and forget the secret key, the files can never be decrypted hence become useless.

24. Ransomware

Ransomware is modern-day malware. Instead of stealing users’ data, ransomware encrypts the victim’s data and sends the key to the hacker. The hacker provides the key to the victim only when the victim pays the demanded ransom.

25. Keylogger

A keylogger is a program that records the keys hit by the user. Hackers install a keylogger to gain their victims’ usernames and passwords. A keylogger can send all key logs to the hacker with more relevant information, such as where the user typed those keys (page URL).

Conclusion

So these are some of the hacking terminologies or hacking terms that are important to know for an ethical hacking learner. I will be using these hacking terms throughout future articles of this series. If I forgot to mention any term, let me know in the comment section below. Or join our Discord server and become part of our community.