hacker's jargons

Post on 24-Jan-2017

145 Views

Category:

Technology

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Hacker’s Jargons

pavanw3b

$ whoami• Pavan aka pavanw3b• Security Engineer @ ServiceNow• n|u core team• Other boring details at

pavanw3b.com

What?

• A small dictionary for hackers• InfoSec, admin, developers• .. ORDER BY `title` ASC

Why?• Don’t get lost• Express better• Know what you do• Know what somebody did

Method• Quiz?• Rewards• 9 Humla & bachav wild card entry• First hand raise I see

Cipher, Ciphertext

Cypher

Encryption Algorithm

Encrypted text

Disinformation

Providing wrong information intentionally

Drive-by Download

Visit – Download malware

Dropper

Settle first - call friendsSingle Stage, Double Stage

Avoid detection

Dumpster diving

Make use of the dumped stuffsLegal in the US

False Positive

!True Security issuesScanners

Fuzzing

Fuzz TestingBombard with junk to make a sense

System Errors, Bugs

ITW

In The WildMalware Spread Worldwide

Logic Bomb

Explode at certain LogicHidden Malicious Code

Monkey Patching

Patch else’s code to protect yourselfThird party Library

Nonce

Number used ONCEIdentify genuine stuffs

Crypto: authentication, Hashing, CSRFwp nonce

Pharming

Phishing without a lureRedirection by Malware

Piggybacking

Gain unauthorized accessBy exploiting authorized legitimate

Ransomware

Lock down – Ask RansomRemote Private KeyCatch me if you can

RAT

Remote Access TrojanRemote Administration

Games, email attachments

Retroactive BugActivate a Retro Bug

While patching another bugThanks to @Danish

Rogue Program

False Positive - Infect

Shoulder Surfing

Look over Shoulder

SMShing

Phishing by SMS

Spear Phishing

Phishing from the Names you know

STR

Steps To ReproducePOC

Time Bomb

Logic Time Bomb

Typosquatting

Typo Friendly URLs

Vishing

Voice PhishingVoIP

Wardriving

Keep driving, Keep Scanning WiFi

Watering Hole

Infect websites – target browseThanks to @Sujay

Whaling

Emails with malicious linksExecutives & Top Management

Contact details are publicTo Steal Corporate Secrets

Zero Day

Exploit Security Vulnerability widelyBefore owner comes to know

Before developer hurries to patch

Zombie

Compromised deviceTo Perform any malicious taks

Controlled remotely

Zoo

Collection of malwares

Thanks for bearing

Pavanfb/pavanw3b | @twitter | pavanw3b.com

thedarkw3b.com/hackers-dictionary-jargons/

How was this new thing that we tried?

top related