Some common technical terms explained by hackers

Some common technical terms explained by hackers

Hacker: It is not malicious, but has superb technology.

Hacker: Malicious intrusion, malicious cracking of commercial software, may not have very high technology, usually some simple attack methods to achieve the goal.

Hongke: Product with Chinese characteristics, counterattack foreign attacks, justice.

White hat: People who specialize in or study the network security industry are usually employed by major security companies and are the main force to improve the level of network and system security.

Black hat: Specializing in the study of Trojan horses and operating systems, looking for vulnerabilities, and attacking websites or computers based on personal will.

Grey hat: Specialize in researching Trojan horses and operating systems, looking for loopholes, and attacking websites or computers based on personal will. Between the white hat and the gray hat.

Professional terms:
script (asp, php, jsp)
Html (css, js, html)
HTTP protocol
CMS (B/S)
MD5: used to encrypt passwords.

Broiler: A computer or server that has been hacked and stationed for a long time.

Catch chickens: Take advantage of the loopholes in the use of a large number of programs and use automated methods to obtain the behavior of broilers.

Webshell: A script tool used for web intrusion to control website services to a certain extent.

Vulnerabilities; exploitable security flaws in hardware, software, protocols, etc., which may be attacked or exploited to tamper with and control data.

One sentence [Trojan Horse]: A Trojan horse that cooperates with the local client to realize the webshell function by submitting a short code to the server.

Elevation of authority: A method used by an account with low authority of the operating system to promote itself to an administrator authority.

Backdoor: In order to control the host for a long time, a hacker planted a program on the host or left an "entrance".

Springboard: Use broiler IP to attack other targets in order to better hide your identity information.

Side-site intrusion: the intrusion of the website under the same server. After the intrusion, the permission of the target website can be obtained by means of escalation and cross-directory. Common side-site query tools include webroot, Yujian, Mingxiaozi, and web online query.

C segment intrusion: that is, server intrusion under the same C segment. For example, the target ip is 192.168.1.253 to invade any machine of 192.168.1.*, and then use some hacker tools to sniff and obtain various information transmitted on the network. Commonly used tools are: Cain under windows, Sniffit, Snoop, Tcpdump, Dsniff, etc. under UNIX environment.

Penetration testing
Black box testing: Under unauthorized circumstances, simulate hackers' attack methods and ways of thinking to assess the possible security risks of computer network systems. What is tested is comprehensive ability, and the accumulation of ideas and experience often determines success or failure.
White box testing: Compared with black box testing, it is basically initiated from the inside.

APT attack: Advanced sustainable attack is an attack form in which organizations (especially governments) or small groups use advanced attack methods to carry out long-term continuous cyber attacks on specific targets.

  1. Strong concealment
  2. Long incubation period
  3. Targeted

Penetration testing process:
clear goals: determine scope, determine rules, and determine requirements.
Information collection: basic, system, application, version, service, personnel, protection.
Vulnerability detection: system vulnerability webserver vulnerability, web application vulnerability, other port service vulnerability, communication security.
Vulnerability verification: automation, manual, experiment, login and disassembly.
Obtain what you need: carry out an attack, obtain internal information, further infiltrate, continue to exist, and clean up traces.
Information analysis: precise strikes, bypass defense mechanisms, custom attack paths, bypass detection mechanisms, and attack codes.
Information sorting: sorting penetration tools, sorting and collecting information, sorting out vulnerability information.
Form report: organize as needed, supplementary introduction, and repair suggestions.

Guess you like

Origin blog.csdn.net/qq_45823731/article/details/112982816