Learn Simpli

Free Online Tutorial For Programmers, Contains a Solution For Question in Programming. Quizzes and Practice / Company / Test interview Questions.

Ethical hacking terminology

In this chapter, you will learn about ethical hacking terminology. There is terminology associated with ethical hacking. Hackers may use any one of the following terminologies to gain access or steal the information.

Footprinting:
Footprinting is the very first step that any hackers can start, in the footprinting, the hackers collect the information about the target machine as much as possible. “Its just information gathering about the target machine”.

Now we will look into the certain types of attacks

DoS:
Denial of service attack (DoS), in the computer world, the denial of service attack is a cyber-attack where the hacking tries to make the targeted machine unavailable temporarily. As we know all servers have limited capacity to serve the request, the hackers try to send the more and more request to the targeted machine until it becomes unavailable.

DDoS:
Distributed denial of service attack (DoS), is the same as denial of service attack (DoS) the only difference is that here the hackers may have multiple computers and to make the multiple connections to the server and multiple requests. Here all the requests will be sent simultaneously. It’s a bit difficult to handle now on the server-side.

Fishing attack:
In fishing attack, the hackers apply some sort of bait and some people may bite it then the hacker pull on it and gains access. For example, some hackers share the email and they paste the malicious link in it and unfortunately, the customers may click on the button.

SQL Injection:
SQL injection allows the hackers to execute some queries and they might pass the queries in the parameters, for example, queries can be written in the string and can be attached to the attribute name which accepts the input from the user. Here, the attacker can delete or modify the data or even steal the other sensitive data.

One thought on “Ethical hacking terminology

Comments are closed.