Tip & How-To about Computers & Internet

Hacking Terminology-Guide for Complete Noobs

Bot - A bot is a program that is ran secretly in the background of a customer’s computer. The bot connects to an IRC channel usually where a Bot Herder(its creator) can use a number of commands to control these computers that are now it’s under control. A zombie computer(a pc under control of a bot herder) can be manipulated in a number of ways. Some functions of a bot include stealing customers passwords, Password Recovery Tool, ddosing a server to cause it to crash, turning on the webcam and being able to watch the zombie computer’s users, visiting a website(to gain money + traffic for a bot herder), clicking ads, making ads appear randomly, destroying itself(the pc), and sending spam to email contacts.

serverNET – A bunch of bot’s connected to a server (usually IRC or web) that can be controlled and manipulated by its owner.

RAT (Remote Administration Tool) – Sort of like a serverNET in regards that you can gain acess to the customers computer and do stuff like look at their files, webcam, etc. Only this malware connects back to you, apposed to aserver.

Crypter – A crypter is used to make well known hacker’s viruses (such as keyloggers and botnets) undetectable by anti-virus software by changing the virus program signatures that anti virus programs have in their databases to make them easier to spread.

Binder – A binder is used to bind a virus(such as a Password Recovery Tool,etc) to another program making it undetechtable and able to fool users into thinking its something else. (IE a customer will click an installPhotoshop.exe and it will install photoshop as well as your virus secretly.)
FUD – Term for fully undetectable virus. (made by either coding your own virus or by crypting and binding an existing virus) Use http://novirusthanks.com (uncheck distribute sample) to check if your virus is undetectable.
Database – Used by most websites to store things such as User names, Passwords, Email, etc of an entire website or community.

SQL Injection
– A way of manipulating a website’s forms as a way of retrieving it’s databases. This can be used to find users and passwords as well as obtaining admin on a website in order to deface it.
XSS (Cross Site Scripting) – a type of computer security vulnerability typically found in web applications which allow code injection by malicious web users into the web pages viewed by other users. An exploited cross-site scripting vulnerability can be used by attackers to bypass access controls such as the same origin policy. Vulnerabilities of this kind have been exploited to craft powerful phishing attacks and browser exploits.

Password Recovery Tool – A Password Recovery Tool is a program, usualy ran secretly in the background that records what users type, then the typed output is usually sent via email or uploaded by thePassword Recovery Tool somewhere to the web in secret. These can be attached to other executables so you never even know you ran them in the first place, once you click it once it often is started at startup from their on.

Cookie Stealing/Spoofing – Used to fool a customer into clicking a link that will steal their cookies to websites which you can then use to have their privileges to various parts of a website or forum.
BruteForcer – Program used to crack passwords by trying every password/password list on various forms.

Hashes - How passwords are usually stored, this is a way of crypting a password so it is not plain text, harder passwords are very hard to crack but simple ones have often been cracked and can be found on online databases. Some common password hashes include MD5 and SHA.

Social Engineering – Tricking a customer into doing something you want them to do by disguising or enticing them into doing what you want.

Phishing - Creating a fake login page to a well known website (IE Facebook) and then fooling a customer into entering their information on the fake login page through social engineering.

Posted by on

Computers & Internet Logo

Related Topics:

Related Questions:

2 Answers

sceen freezes


Possibly a bad video driver or video card error. Bring it to a local shop for more in depth information

Nov 16, 2013 | Panasonic Toughbook CF52 Notebook

1 Answer

Where is the starter located in a 93 laberon le


bot um middle look up from bot um be hind bumper bot um of engine.at engine trans connection .

Feb 15, 2012 | 1993 Chrysler Lebaron

1 Answer

need bissell spot bot oners manual


BISSELL User's Guides can be downloaded at www.bissell.com
On the front page under Customer Service click on User's Guides and enter the model number of your unit.
User Guide will be displayed as a PDF file.

Oct 04, 2010 | Bissell 12005 Spot Bot Handheld Vacuum

1 Answer

I get kicked out occaisoanlly


too many reasons for that issue

either someone else is using your yahoo address and that would show a message saying you are logged in another computer.

or someone is trying to BOT you by using a Bot program to kick you out of yahoo.

or maybe the internet connection is low and that might be the reason.

for the first reason you can change the password
for the second reason you can install a tunnel program to protect you from Bots.
the third reason you will need to check the internet connection and make sure its running without any problems.

cheers

Sep 23, 2008 | Yahoo Messenger

1 Answer

"denial of service": email, firefox, etc. cannot find server..


What told this was a "denial of service"?

Some hackers use DoS (above) it's considered the worst thing you can download, they can go from keylogging your PC, from taking over your pc anytime they like, and using your bandwidth which is called DDOS.

This is a very compllicated thing to get ride of,

One way you can test to see if your a victum of this is to check the port, here is how:

To open the MS Dos screen go to:
Start>Run>type "cmd" and press enter (without quotes)


All of the IRC Zombie/Bots open and maintain static connections to remote IRC chat servers whenever the host PC is connected to the Internet. Although it is possible for an IRC chat server to be configured to run on a port other than "6667", every instance I have seen has used the IRC default port of "6667".

Consequently, an active connection to an IRC server can be detected with the following command:

netstat -an | find ":6667"

Open an MS-DOS Prompt window and type the command line above, then press the "Enter" key. If a line resembling the one shown below is NOT displayed, your computer does not have an open connection to an IRC server running on the standard IRC port. If, however, you see something like this:

TCP 192.168.1.101:1026 70.13.215.89:6667 ESTABLISHED

. . . then the only question remaining is how quickly you can disconnect your PC from the Internet!

A second and equally useful test can also be performed. Since IRC servers generally require the presence of an "Ident" server on the client machine, IRC clients almost always include a local "Ident server" to keep the remote IRC server happy. Every one of the Zombie/Bots I have examined does this. Therefore, the detection of an Ident server running in your machine would be another good cause for alarm. To quickly check for an Ident server, type the following command at an MS-DOS Prompt:

netstat -an | find ":113 "

As before, a blank line indicates that there is no Ident server running on the default Ident port of "113". (Note the "space" after the 113 and before the closing double-quote.) If, however, you see something like this:

TCP 0.0.0.0:113 0.0.0.0:0 LISTENING

. . . then it's probably time to pull the plug on your cable-modem!

Note that a Windows IRC client program running in the PC will generate false-positive reports since these are tests for IRC client programs. So be sure to completely exit from any known IRC client programs BEFORE performing the tests above.

---------------------------------------------------------------------------------------------------------------------------------------------------

Oct 18, 2007 | Dell Inspiron 2200 Notebook

Not finding what you are looking for?

125 people viewed this tip

Ask a Question

Usually answered in minutes!

Top Computers & Internet Experts

Doctor PC
Doctor PC

Level 3 Expert

7733 Answers

kakima

Level 3 Expert

102366 Answers

David Payne
David Payne

Level 3 Expert

14161 Answers

Are you a Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Loading...