Course Content
Ethical Hacking – Starts Here
0/70
Ethical Hacking from Entry to Expertise
About Lesson

Ethical Hacking Terminologies

  1. Ethical Hacking: The authorized and legal practice of probing systems for security vulnerabilities to identify and fix potential weaknesses.

  2. Penetration Testing: The process of simulating real-world attacks on a system, network, or application to discover vulnerabilities and weaknesses.

  3. Vulnerability Assessment: A systematic review of a system’s security to identify and classify vulnerabilities.

  4. Exploit: A piece of software or code that takes advantage of a vulnerability to compromise a system.

  5. Payload: The part of the exploit that delivers malicious code or performs a specific action on the target system.

  6. Zero-Day Vulnerability: A security flaw in software or hardware that is unknown to the vendor or the public, making it a potential risk for exploitation.

  7. Social Engineering: Manipulating individuals to divulge confidential information or perform actions that may compromise security.

  8. Phishing: A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communication.

  9. Man-in-the-Middle (MitM) Attack: A type of attack where an attacker intercepts and potentially alters communication between two parties without their knowledge.

  10. Firewall: A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

  11. Intrusion Detection System (IDS): A security mechanism that monitors and analyzes network or system activities for signs of malicious behavior.

  12. Intrusion Prevention System (IPS): A security tool that can detect and actively respond to potential threats by blocking or preventing malicious activities.

  13. Sniffing: Intercepting and analyzing network traffic to capture sensitive information such as passwords or other confidential data.

  14. Packet Filtering: Examining packets of data and allowing or blocking them based on predetermined criteria, often used in firewalls.

  15. Denial of Service (DoS) Attack: Flooding a system, network, or service with excessive traffic to make it unavailable for legitimate users.

  16. Distributed Denial of Service (DDoS) Attack: Similar to a DoS attack, but orchestrated from multiple sources to overwhelm the target.

  17. Session Hijacking: Gaining unauthorized access to a user’s session, often through the theft of session tokens or cookies.

  18. Cross-Site Scripting (XSS): Injecting malicious scripts into web pages viewed by other users.

  19. Cross-Site Request Forgery (CSRF): Forcing a user to perform unwanted actions on a web application where they are authenticated.

  20. Honeypot: A security mechanism designed to deceive attackers, luring them away from critical systems while monitoring their activities.

  21. Cryptography: The practice of secure communication in the presence of third parties, often involving encryption and decryption.

  22. SSL/TLS: Protocols for securing communication over a computer network, commonly used for web browsing.

  23. Two-Factor Authentication (2FA): Adding an extra layer of security by requiring users to provide two different authentication factors.

  24. Brute Force Attack: An attempt to crack a password or encryption key by systematically trying all possible combinations.

  25. White Hat Hacker: Ethical hackers who use their skills to help organizations find and fix security vulnerabilities.

  26. Black Hat Hacker: Malicious hackers who exploit vulnerabilities for personal gain or to cause harm.

  27. Gray Hat Hacker: Individuals who may engage in hacking activities without malicious intent but without explicit authorization.

  28. Patch: A software update designed to fix vulnerabilities or improve security in a computer program.

  29. Proxy Server: An intermediary server that acts as a gateway between a user and the internet, enhancing security and privacy.

  30. Incident Response: The process of managing and mitigating the impact of a security incident, often involving detection, analysis, and recovery.

Exercise Files
EH Terminologies-eh.pdf
Size: 595.69 KB
0% Complete
Select your currency
USD United States (US) dollar