The hacker terms and words

Just like most people of similar profession, we all love to talk to other hackers using hacker terms and hacker words, because it gives a sense of belonging.

you're probably reading this either because you find it tough to know most of the hacker terms, or you just wanna see if you'll add extra sauce to your knowledge bank. Whichever one it is, you've come to the right place.

Article on the various hacker terms and words

NOTE: To begin, you first need to know that the list I've compiled below isn't nearly all there is, but a fraction. 

Let's go!!

Acronyms on hacker terms and words

    Let's look at some of the most used acronyms;

    • R.A.T:-> Remote Administration Tool

    • DrDOS:-> Distributed Reflected Denial of Service Attack.

    • VPS:-> Virtual Private Server

    • SE:-> Social Engineering

    • HTTP:-> Hyper Text Transfer Protocol. The foundation of data communication for the World Wide Web.

    • SSH:-> Secure Shell, used to connect to Virtual Private Servers.

    • FTP:-> File Transfer Protocol. Used for transferring files over an FTP server.

    • XSS (CSS):-> Cross Site Scripting

    • CSS:-> Cascading style sheet

    • Malware:-> Malicious Software

    • Skid:-> Script Kid/Script Kiddie

    • DDOS:-> Distributed Denial of Service

    • IP:-> Internet protocol address. Sometimes called a Computer's fingerprint, the IP is used to track the location of a device.

    • VPN:-> Virtual Private Network

    • Nix:-> An operating system based on Unix. This is usually mentioned when referring to DOS'ing.

    • SQL:-> Structured Query Language.

    • FUD :-> Fully Undetectable

    The above terms are super important, however, knowing them without actually knowing stuff on the basics of hacking won't be of much help.

    Meaning of some Hacker terms and Words

    Frequently used words in the field of hacking and their meanings.

    Article on the various hacker terms and words

    • FUD :-> Fully undetectable. Can be used in many terms. Usually in combination with crypters, or when used to infect someone.

    • LOIC/HOIC:-> Tool(s) used by many anonymous members to conduct DDoS attacks. The only people that use these are kiddies that think it will be effective. LOIC and HOIC are largely scams riddled with malware. I won’t recommend anyone to use these under any circumstances.

    • DrDoS:-> Using a list of reflection servers or other methods such as DNS to spoof an attack to look like it's coming from multiple ips. Amplification of power in the attack could occur.

    • Spoofing:-> Tampering a genuine email so it appears like coming from a trusted source.

    • Botnet:-> A Computer infected by Trojans or worms, and taken over by a hacker or hackers to get into networks in order to send spam, create more viruses, or launch denial of service attacks.

    • Trojan:-> A Trojan is a type of malware that masquerades as a legitimate file or helpful program with the ultimate purpose of granting a hacker unauthorized access to a computer.

    • SQL:-> It usually goes along with a word after it, such as "SQL Injection." This is the language used to manipulate data from a relational database. You can programmatically interact and modify the data stored there. That is; adding new data, deletion, edit, and to retrieve data in a specified format.

    • SQL Injection:-> An SQL injection is a method often used to hack SQL databases via a website, and gain admin control of the site. This is an attempt to feed an SQL statement into a program in such a way that it’ll be executed by the database application, instead of stored as data.

    • Root:-> Highest permission level on a nix box, being able to modify anything on the system without restriction.

    • System:-> The highest permission on a Windows box.

    • Warez:-> Software piracy

    • White Hat:-> Also referred to as ‘ethical hacking’. This is a computer security professional, who specializes mainly in penetration testing to ensure there’s no vulnerability in an organization’s security system. (The good guy, per say). You can refer to our friend Wikipedia for more info.

    • Black Hat:-> A hacker whose hacking actions are illegal(Bad guy, per se).

    • Grey hat:-> A person who hacks, but not necessarily for personal or financial gain. An example would be a hack done by hackers as part of a protest to bring down an organisation whose policies contradict their belief.

    • Rootkit (ring3 ring0):-> This a list of malicious computer software designed to trigger access to a computer, or parts of its software that isn’t allowed. It often masks its existence.

    Ring3 - Can be removed easily without booting in safe mode.

    Ring0 - Hard to eradicate and very rare in the wild. It's so hard to remove certain ring0 rootkits without safe mode.

    • Script Kiddie:-> ‘Script kid’, or ‘Skid’ is a term used in describing guys who use scripts created by others to hack computer systems. Usually used as a form of insult, meaning; they know nothing about hacking.

    • IP Grabber:-> A link that grabs someone's IP when they visit it.

    • DDoS:-> Distributed denial of service. Flooding someone’s connection with packets. Web-hosted shells or servers can send packets to any connection on a website, usually from a booter.

    • VPS:-> A Virtual private server. The term is used to highlight that the virtual machine, is in many aspects, practically equivalent to a separate physical computer. This is dedicated to personal customer needs, as it has the privacy capability of a separate physical computer, and can be modified to run server software.

    • Malware:-> This is what I call “The breaker”. A software basically designed to do all kinds of black hat stuff, like running DDOS attacks, stealing identity information and soliciting money from the slave.

    • Phreak:-> Phone Freaks. Hackers who hack cell phones for free calling. Free Long distance calling. Etc.

    • Bot:-> A malware used to connect a computer to an attacker, usually using the HTTP or IRC protocal to wait for malicious instructions.

    • Shell:-> This is a hacked web server, often with DOS script uploaded in it to conduct DDOS attacks from a booter.

    • ANSI Bomb:-> ANSI.SYS key-remapping commands consisting of cryptic-looking text. It is a type of virus that tends to reprogram keys, triggering them to display unwanted graphics by using character sequencing.

    • DOX:-> Personal information about someone on the Internet usually contains the real name, address, phone number, SSN, credit card number, etc.

    • Worm:-> Software designed to spread malware without the need for a human interaction.

    • Phishing:-> This means duping people into giving you their personal information, such as; login details, credit card details etc.

    • Deface:-> A website deface is a type of attack on a website, that changes the overall look of the site or a certain page on the site.

    • Keylogger:-> A program that records all keystrokes on a computer's keyboard. Often used as a surveillance tool or as a spyware.

    • Spyware:-> Malware programmed to stay unnoticed in a system and collect data for the hacker.

    • Remote Administration Tool:-> A general hacking term for a hack that lets someone remotely control any of your computer with admin access.

    That's all for now, be sure to check back for more on the hacker terms/hacker words.
    Article on the various hacker terms and words

    Join me on facebook to stay updated on latest hacks


    Do well to contribute in the comment section if there's any you know I missed.

    You can equally ask any question on any that confuse you.

    Keep strong hacker!

    Subscribe to my mailing list

    * indicates required


    Post a Comment