Hacking


 * Hacking Page [[image:hacks.JPG width="359" height="364" align="right"]]**

Rootkits- replace system software with trojan versions.

Password cracking - type of attack that targets user passwords by guessing, brute-force or third party vendor software.

Sniffing - passive form of attack requires that the attacker gain some type of access to the network.

DNS spoofing - attack attempts to poison the DNS process.

Pharming attack- hijacks the DNS and force it to redirect the browswer to another site.

War driving- practice driving around an area looking to find wireless access points that are not secured.

Logic bomb - .exe file given a condition to excute.

Time bomb - .exe file trigger by a given time/date. DoS- attacks used to disable or disrupt computer services or resources.

DDoS- attack is just more aggressive DDoS attack.

Whailing - a form of hacking the upper level of security officials.

Phishing- getting secure data by asking the user for it. Example: email

Botnet - an attack on a computer from thousand of zombie computers.

Zombie - remote accessing a victim PC, other known as hijacking.

Keylogger - software that saves user key strokes.

Man-in-the-middle attack - attack is carried out when attackers place themselves in the communication path between two users.

Darknet - bad internet surfing.

Lopht ( hacker org.) – change letters to numbers.

Password Cracking - the abilitiy to gather a password by either guessing or using a software.

Brute Force Attact - attack that uses all form of alphanumeric and special characters going through each set in order to break a password.

Dictionary Attack - program create to crack a password using all the words in a dictonary.

Guessin Attack - guessing words a user might have used to create his/her password.

Rainbow Table Attack - prehased set of passwords used to find access to an encrypted system.

Zero Day Exploit - New attack discovered without a fix to it.

Zero Day Attack - attacking a vulnerability that no one knows about.