Hacking Related Terms

Posted: November 12, 2012 in Hacking

Exploit — A noun that refers to a program that demonstrates or takes advantage of a software security hole. Writing an exploit is the best way to technically describe a security hole while simultaneously demonstrating it. That’s why “White Hat” hackers (hackers who use their skills to help companies discover security problems) often write exploits.

Root — As a noun, refers to cyberomnipotence,
the highest level of access on a computer. Can also be used as a verb. “To root a box” means to obtain root through unconventional means, at which point the system has been “rooted.”

Haxored — A cool underground term for hacking. “I haxored that box.”

Trojan — Shorthand for “Trojan horse,” a method of cracking a system by sliscumng it a seemingly harmless and beneficial program that secretly contains programming that gives an attacker unauthorized access. Common off-the-shelf Trojans include Back Orifice 2000, and Sub-7, recently spotted masquerading as a free Internet adult film — beware of Greeks bearing porn.

Eleet — Means “elite,” but generally used with sarcastic or self-deprecating humor and spelled out with numerals, not roman letters: 31337. “I hax0red this box with 31337 skillz,” might mean, “This was too easy.”

Rootkit — A generic term for a suite of programs that gives a hacker fun things to do after rooting a box. Might include programs for covering your tracks, or for “sniffing” a company’s network for interesting traffic.

Zero day — A security hole that’s been discovered by the underground, but not yet by the computer security community.

Docs — A person’s identifying information, like name, email address, social security number, etc. “I rooted his box and downloaded his docs.”

Script kiddie — Someone who uses exploits to penetrate unsecured boxes, deface websites, and generally make trouble, without having the skills to write such a program themselves. Usually a juvenile.

Packet monkey — A script kiddie who floods computers and websites with data packets, to maliciously take them offline. The distributed denial of service attacks that sometimes afflict popular e-commerce websites are performed by packet monkeys

 

Advertisements

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s