Hacking Glossary V2018

Total Page:16

File Type:pdf, Size:1020Kb

Hacking Glossary V2018 2018 NATIONAL SEMINAR US SENTENCING COMMISSION National Seminar Denial of Service Attack (DoS) - DoS Metaphorically it extends to social knowledge of your IP address to your is used against a website or computer engineering in its manipulation of computer via one of its ports, the Hacking & Phishing Glossary: network to make it temporarily social code to effect change. Many points that regulate information traffic 2018 Annual National Seminar unresponsive. This is often achieved by prefer to use the term cracking to f low. sending so many content requests to describe hacking into a machine or the site that the server overloads. program without permission. Hackers IRC - Internet relay chat is a protocol Adware - Adware can mean the government intelligence to build frequently based in the former Soviet Content requests are the instructions are sometimes divided into white hat, used by groups and for one-on-one software that automatically generates backdoors into their products. Union. sent, for instance, from your browser to black hat, and gray hat hackers. conversations, often utilized by advertisements in a program that is Malware is often designed to exploit a website that enables you to see the hackers to communicate or share files. otherwise free, such as an online video back doors. Brute Force Attack - Also known as website in question. Some have Hacktivist - A hacker whose goals are Because they are usually unencrypted, game. But in this context it more an exhaustive key search, a brute force described such attacks as the Internet social or political. Examples range hackers sometimes use packet sniffers commonly means a kind of spyware Black hat - Black hat hackers are those attack is an automated search for every equivalent of street protests and some from reporting online anonymously to steal personal information from that tracks your browsing habits who engage in hacking for illegal possible password to a system. It is an groups, such as Anonymous frequently from a country that attacks free speech them. covertly to generate those ads. purposes, often for financial gain, inefficient method of hacking use it as a protest tool. to launching a DDoS campaign though also for notoriety. Their hacks compared to others like phishing. It’s against a company whose CEO has Keystroke Logging / Keylogger - Anonymous - A non-hierarchical (and cracks) result in inconvenience used usually when there is no Distributed Denial of Service Attack issued objectionable statements. Not to Keystroke logging is the tracking of hacktivist collective, Anonymous uses and loss for both the owners of the alternative. The process can be made (DDoS) - A DoS using a number of be confused with slacktivism, which which keys are pressed on a computer hacking (and arguably cracking) system they hack and the users. shorter by focusing the attack on separate machines. This can be refers to push-button activism in which (and which touchscreen points are techniques to register political protest password elements likely to be used by accomplished by seeding machines a supporter of a social or political used). It is, simply, the map of a in campaigns known as “#ops.” Best Bot - A program that automates a a specific system. with a Trojan and creating a botnet or, campaign’s goals does nothing but computer/human interface. It is used known for their distributed denial of usually simple action so that it can be as is the case with a number of register their support online, for by gray and black hat hackers to record services (DDoS) attacks, past activities done repeatedly at a much higher rate Clone Phishing - Clone phishing is the Anonymous attacks, by using the instance by “liking” a Facebook page. login IDs and passwords. Keyloggers have included attacks against the for a more sustained period than a modification of an existing, legitimate machines of volunteers. are usually secreted onto a device Church of Scientology; Visa, Paypal, human operator could do it. Like most email with a false link to trick the Hash - A hash is a number generated using a Trojan delivered by a phishing and others who withdrew their things in the world of hacking, bots recipient into providing personal Doxing - Discovering and publishing by an algorithm from a string of email. services from WikiLeaks’ Julian are, in themselves, benign and used for information. the identity of an otherwise characters in a message or other string. Assange after that group began a host of legitimate purposes, like anonymous Internet user by tracing In a communications system using Logic Bomb - A virus secreted into a releasing war documents; #OpTunisia online content delivery. However, they Code - Code is the machine-readable, their online publically available hashes, the sender of a message or file system that triggers a malicious action and others purporting to support the are often used in conjunction with usually text-based instructions that accounts, metadata, and documents can generate a hash, encrypt the hash, when certain conditions are met. The Arab Spring; and a campaign that cracking, and that’s where their public govern a device or program. Changing like email accounts, as well as by and send it with the message. On most common version is the time brought down the website of the notoriety comes from. Bots can be the code can change the behavior of the hacking, stalking, and harassing. decryption, the recipient generates bomb. Westboro Baptist Church. #Ops are used, for instance, to make the content device or program. another hash. If the included and the usually marked with the release of a calls that make up denial of service Firewall - A system using hardware, generated hash are the same, the LulzSec - LulzSec is an Anonymous video of a reader in a Guy Fawkes attacks. Bot is also a term used to refer Compiler - A compiler is a program software, or both to prevent message or file has almost certainly offshoot. It’s best-known actions were mask using a computer generated to the individual hijacked computers that translates high-level language unauthorized access to a system or not been tampered with. hacking user information from the voice. Offshoot groups include AntiSec that make up a botnet. (source code in a programming machine. website of Sony Pictures and for and LulzSec. language) into executable machine IP - Internet protocol address. It’s the allegedly shutting down the CIA Botnet - A botnet is a group of language. Compilers are sometimes Gray Hat - Just like the rest of life, distinctive numeral fingerprint that website with a DDoS attack. LulzSec’s AntiSec - An Anonymous splinter computers controlled without their rewritten to create a back door without hacking is often less black or white each device carries that’s connected to best known, however, for Hector group, AntiSec was best known for the owners’ knowledge and used to send changing a program’s source code. than it is gray. The term gray hat a network using Internet Protocol. If Xavier Monsegur, a.k.a. “Sabu,” a hack of security firm Stratfor, spam or make denial of service attacks. hacker reflects that reality. A gray hat you have a device’s IP you can often hacker turned FBI informant, whose publishing credit card numbers and Malware is used to hijack the Cookie - Cookies are text files sent hacker will break the law in the pursuit identify the person using it, track its intel led to the arrest of four other email addresses taken from the individual computers, also known as from your Web browser to a server, of a hack, but does not do so activity, and discover its location. LulzSec members. He faces the company’s site. Jeremy Hammond was “zombies,” and send directions usually to customize information from maliciously or for personal gain. Many These addresses are apportioned by the possibility of a long prison term despite arrested for alleged Anti-Sec activities through them. They are best known in a website. would argue Anonymous are gray regional Internet registries of the his cooperation. under the alias sup_g. terms of large spam networks, hats. IANA (the Internet Assigned Numbers Cracking - To break into a secure Authority). Crackers can use Malware - A software program Back Door - A back door, or trap door, computer system, frequently to do Hacking - Hacking is the creative designed to hijack, damage, or steal is a hidden entry to a computing device damage or gain financially, though manipulation of code, distinguished, information from a device or system. or software that bypasses security sometimes in political protest. albeit amorphously, from Examples include spyware, adware, measures, such as logins and password programming by focusing on the rootkits, viruses, keyloggers, and many protections. Some have alleged that manipulation of already written code more. The software can be delivered in manufacturers have worked with in the devices or software for which a number of ways, from decoy websites that code was already written. and spam to USB drives. Master - The computer in a botnet that Rootkit - A rootkit is a set of software Spoofing - Email spoofing is altering Whaling - Spear-phishing that targets controls, but is not controlled by, all programs used to gain the header of an email so that it the upper management of for-profit the other devices in the network. It’s administrator-level access to a system appears to come from elsewhere. A companies, presumably in the hope also the computer to which all other and set up malware, while black hat hacker, for instance, might that their higher net worth will result devices report, sending information, simultaneously camouflaging the alter his email header so it appears to in either more profit, if the cracker is such as credit card numbers, to be takeover.
Recommended publications
  • Country of Origin Information Report Syria June 2021
    Country of origin information report Syria June 2021 Page 1 of 102 Country of origin information report Syria | June 2021 Publication details City The Hague Assembled by Country of Origin Information Reports Section (DAF/AB) Disclaimer: The Dutch version of this report is leading. The Ministry of Foreign Affairs of the Netherlands cannot be held accountable for misinterpretations based on the English version of the report. Page 2 of 102 Country of origin information report Syria | June 2021 Table of contents Publication details ............................................................................................2 Table of contents ..........................................................................................3 Introduction ....................................................................................................5 1 Political and security situation .................................................................... 6 1.1 Political and administrative developments ...........................................................6 1.1.1 Government-held areas ....................................................................................6 1.1.2 Areas not under government control. ............................................................... 11 1.1.3 COVID-19 ..................................................................................................... 13 1.2 Armed groups ............................................................................................... 13 1.2.1 Government forces .......................................................................................
    [Show full text]
  • Officials Say Flynn Discussed Sanctions
    Officials say Flynn discussed sanctions The Washington Post February 10, 2017 Friday, Met 2 Edition Copyright 2017 The Washington Post All Rights Reserved Distribution: Every Zone Section: A-SECTION; Pg. A08 Length: 1971 words Byline: Greg Miller;Adam Entous;Ellen Nakashima Body Talks with Russia envoy said to have occurred before Trump took office National security adviser Michael Flynn privately discussed U.S. sanctions against Russia with that country's ambassador to the United States during the month before President Trump took office, contrary to public assertions by Trump officials, current and former U.S. officials said. Flynn's communications with Russian Ambassador Sergey Kislyak were interpreted by some senior U.S. officials as an inappropriate and potentially illegal signal to the Kremlin that it could expect a reprieve from sanctions that were being imposed by the Obama administration in late December to punish Russia for its alleged interference in the 2016 election. Flynn on Wednesday denied that he had discussed sanctions with Kislyak. Asked in an interview whether he had ever done so, he twice said, "No." On Thursday, Flynn, through his spokesman, backed away from the denial. The spokesman said Flynn "indicated that while he had no recollection of discussing sanctions, he couldn't be certain that the topic never came up." Officials said this week that the FBI is continuing to examine Flynn's communications with Kislyak. Several officials emphasized that while sanctions were discussed, they did not see evidence that Flynn had an intent to convey an explicit promise to take action after the inauguration. Flynn's contacts with the ambassador attracted attention within the Obama administration because of the timing.
    [Show full text]
  • Xbt.Doc.248.2.Pdf
    MAY 25, 2018 United States District Court Southern District of Florida Miami Division CASE NO. 1:17-CV-60426-UU ALEKSEJ GUBAREV, XBT HOLDING S.A., AND WEBZILLA, INC., PLAINTIFFS, VS BUZZFEED, INC. AND BEN SMITH, DEFENDANTS Expert report of Anthony J. Ferrante FTI Consulting, Inc. 4827-3935-4214v.1 0100812-000009 Table of Contents Table of Contents .............................................................................................................................................. 1 Qualifications ..................................................................................................................................................... 2 Scope of Assignment ......................................................................................................................................... 3 Glossary of Important Terms ............................................................................................................................. 4 Executive Summary ........................................................................................................................................... 7 Methodology ..................................................................................................................................................... 8 Technical Investigation ................................................................................................................................ 8 Investigative Findings .......................................................................................................................................
    [Show full text]
  • Security , Hacking, Threats & Tools for Security
    SECURITY , HACKING, THREATS & TOOLS FOR SECURITY N.Anupama Asst Professor ANUCET ANU CONTENT Introduction to security Features of security Hacking Security threats Tools to provide security Conclusion SECURITY Security is the protection of assets. The three main aspects are: Prevention Detection re-action Information can be stolen – how to prevent it. Confidential information may be copied and sold - but the theft might not be detected The criminals try to attack and the system should react to stop it. TYPES OF SECURITY Computer Security deals with the prevention and detection of unauthorised actions by users of a computer system. Network security prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network- accessible resources. Web security deals specifically with security of websites, web applications and web service. Features of security Confidentiality Integrity Availability Non-repudiation Authentication Access Controls Accountability FEATURES OF SECURITY Confidentiality Confidentiality is keeping information secret or private. The prevention of unauthorized disclosure of information. Confidentiality might be important for military, business or personal reasons. Integrity Integrity means that there is consistency in the system - everything is as it is expected to be. Integrity is the authorised writing or modification of information. Data integrity means that the data stored on a computer is the same as the source documents. FEATURES OF SECURITY Availability Information should be accessible and useable upon appropriate demand by an authorized user. Availability is the prevention of unauthorized withholding of information. Non-repudiation Non repudiation is a method of guaranteeing message transmission between parties via digital signature and/or encryption. Non repudiation is often used for digital contracts, signatures and email messages.
    [Show full text]
  • PARK JIN HYOK, Also Known As ("Aka") "Jin Hyok Park," Aka "Pak Jin Hek," Case Fl·J 18 - 1 4 79
    AO 91 (Rev. 11/11) Criminal Complaint UNITED STATES DISTRICT COURT for the RLED Central District of California CLERK U.S. DIS RICT United States ofAmerica JUN - 8 ?018 [ --- .. ~- ·~".... ~-~,..,. v. CENT\:y'\ l i\:,: ffl1G1 OF__ CAUFORN! BY .·-. ....-~- - ____D=E--..... PARK JIN HYOK, also known as ("aka") "Jin Hyok Park," aka "Pak Jin Hek," Case fl·J 18 - 1 4 79 Defendant. CRIMINAL COMPLAINT I, the complainant in this case, state that the following is true to the best ofmy knowledge and belief. Beginning no later than September 2, 2014 and continuing through at least August 3, 2017, in the county ofLos Angeles in the Central District of California, the defendant violated: Code Section Offense Description 18 U.S.C. § 371 Conspiracy 18 u.s.c. § 1349 Conspiracy to Commit Wire Fraud This criminal complaint is based on these facts: Please see attached affidavit. IBJ Continued on the attached sheet. Isl Complainant's signature Nathan P. Shields, Special Agent, FBI Printed name and title Sworn to before ~e and signed in my presence. Date: ROZELLA A OLIVER Judge's signature City and state: Los Angeles, California Hon. Rozella A. Oliver, U.S. Magistrate Judge Printed name and title -:"'~~ ,4G'L--- A-SA AUSAs: Stephanie S. Christensen, x3756; Anthony J. Lewis, x1786; & Anil J. Antony, x6579 REC: Detention Contents I. INTRODUCTION .....................................................................................1 II. PURPOSE OF AFFIDAVIT ......................................................................1 III. SUMMARY................................................................................................3
    [Show full text]
  • Hacks, Cracks, and Crime: an Examination of the Subculture and Social Organization of Computer Hackers Thomas Jeffrey Holt University of Missouri-St
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by University of Missouri, St. Louis University of Missouri, St. Louis IRL @ UMSL Dissertations UMSL Graduate Works 11-22-2005 Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers Thomas Jeffrey Holt University of Missouri-St. Louis, [email protected] Follow this and additional works at: https://irl.umsl.edu/dissertation Part of the Criminology and Criminal Justice Commons Recommended Citation Holt, Thomas Jeffrey, "Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers" (2005). Dissertations. 616. https://irl.umsl.edu/dissertation/616 This Dissertation is brought to you for free and open access by the UMSL Graduate Works at IRL @ UMSL. It has been accepted for inclusion in Dissertations by an authorized administrator of IRL @ UMSL. For more information, please contact [email protected]. Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers by THOMAS J. HOLT M.A., Criminology and Criminal Justice, University of Missouri- St. Louis, 2003 B.A., Criminology and Criminal Justice, University of Missouri- St. Louis, 2000 A DISSERTATION Submitted to the Graduate School of the UNIVERSITY OF MISSOURI- ST. LOUIS In partial Fulfillment of the Requirements for the Degree DOCTOR OF PHILOSOPHY in Criminology and Criminal Justice August, 2005 Advisory Committee Jody Miller, Ph. D. Chairperson Scott H. Decker, Ph. D. G. David Curry, Ph. D. Vicki Sauter, Ph. D. Copyright 2005 by Thomas Jeffrey Holt All Rights Reserved Holt, Thomas, 2005, UMSL, p.
    [Show full text]
  • Address Munging: the Practice of Disguising, Or Munging, an E-Mail Address to Prevent It Being Automatically Collected and Used
    Address Munging: the practice of disguising, or munging, an e-mail address to prevent it being automatically collected and used as a target for people and organizations that send unsolicited bulk e-mail address. Adware: or advertising-supported software is any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used. Some types of adware are also spyware and can be classified as privacy-invasive software. Adware is software designed to force pre-chosen ads to display on your system. Some adware is designed to be malicious and will pop up ads with such speed and frequency that they seem to be taking over everything, slowing down your system and tying up all of your system resources. When adware is coupled with spyware, it can be a frustrating ride, to say the least. Backdoor: in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a modification to an existing program or hardware device. A back door is a point of entry that circumvents normal security and can be used by a cracker to access a network or computer system. Usually back doors are created by system developers as shortcuts to speed access through security during the development stage and then are overlooked and never properly removed during final implementation.
    [Show full text]
  • Web Security School Article #1
    Know your enemy: Why your Web site is at risk By Michael Cobb To the tag line for the Internet -- “Build it and they will come” -- I would add “...and try to crack it, deface it, abuse it, break it and steal it.” Hackers have more resources and time than even the largest organizations, and they don't suffer from the usual organizational constraints, such as office politics and budgets, that security practitioners face. In fact, hackers can show an almost enviable example of online collaboration, sharing information in order to achieve a result. This article will help you understand the tools, tactics and motives of the black hat community so that you have a better appreciation of the threats to your Web site and the system it runs on, and the importance of protecting them. Statistics to keep you awake at night In a test conducted over a two-week period in September 2004 by USA TODAY, there were 305,922 attempts to break into six computers connected to the Internet. The attacks literally began as soon as the computers went online, averaging more than 300 per hour against both a Windows XP Service Pack 1 machine with no firewall and an Apple Macintosh. There were more than 60 attacks per hour against a Windows Small Business Server. During the test, both of the Windows-based machines were compromised. These figures show how active the hacker community is. Any computer connected to the Internet is at risk, particularly a Web server. Although e-commerce Web sites receive more targeted attacks than any other type of Web site, it is no longer a question of if, but when your site will be probed.
    [Show full text]
  • Malware Xiaowei Yang Previous Lecture
    590.05 Lecture 5: Malware Xiaowei Yang Previous lecture • Accountability • OS security Today • Malware Malware: Malicious Software 10/21/13 Malware 4 Viruses, Worms, Trojans, Rootkits • Malware can be classified into several categories, depending on propagaon and concealment • Propagaon 10/21/13 • Virus: human-assisted propagaon (e.g., open email aachment) • Worm: automac propagaon without human assistance Malware • Concealment • Rootkit: modifies operang system to hide its existence • Trojan: provides desirable funcBonality but hides malicious operaon • Various types of payloads, ranging from annoyance to crime 5 Insider Attacks • An insider a)ack is a security breach that is caused or facilitated by someone who is a part of the very organizaon that controls or builds the asset that should be protected. • In the case of malware, an insider aack refers to a security 10/21/13 hole that is created in a soXware system by one of its programmers. Malware 6 Backdoors • A backdoor, which is also someBmes called a trapdoor, is a hidden feature or command in a program that allows a user to perform acBons he or she would not normally be allowed to do. • When used in a normal way, this program performs completely as 10/21/13 expected and adverBsed. • But if the hidden feature is acBvated, the program does something Malware unexpected, oXen in violaon of security policies, such as performing a privilege escalaon. • Benign example: Easter Eggs in DVDs and soXware An Easter egg is an intenBonal inside joke, hidden message, or feature in a work such as a computer program, movie, book, or 7 crossword.
    [Show full text]
  • Society's Genome.Indb
    Society’s Genome Genetic Diversity’s Role in Digital Preservation By Nathan Thompson with Bob Cone and John Kranz Copyright © 2016 by Spectra Logic Corporation All rights reserved. No part of this book may be reproduced in any form or by any electronic or mechanical means, including storage and retrieval systems—except in the case of brief quotations embodied in critical articles or reviews—without permission in writing from Spectra Logic Corporation. All product names, logos, and brands mentioned in this book are the property of their respective owners. Neither the authors nor publisher claim any right of ownership to such names, logos, and brands. Cover design by Kristen Coats Back cover image: Detail of “Ptolemy World Map,” from Ptolemy’s the Geography, redrawn by Francesco di Antonio del Chierco (15th century). Housed in the British Library, London. Image retrieved from https:// commons.wikimedia.org/wiki/File:PtolemyWorldMap.jpg. Published by Spectra Logic Corporation 6285 Lookout Road Boulder, Colorado 80301-3580 Tel.: 1.800.833.1132 Fax: 1.303.939.8844 www.spectralogic.com ISBN: 978-0-9975644-0-2 Second Printing Printed and bound in the United States of America 10 9 8 7 6 5 4 3 2 1 This book is printed on acid-free paper. “We are survival machines—robot vehicles blindly programmed to preserve the selfish molecules known as genes. This is a truth that still fills me with astonishment.” —Richard Dawkins, The Selfish Gene Chapter 6 Wolves at the Door Just a few years after the 9/11 attacks, the digital world began showing signs of sudden, profound change.
    [Show full text]
  • Reporting, and General Mentions Seem to Be in Decline
    CYBER THREAT ANALYSIS Return to Normalcy: False Flags and the Decline of International Hacktivism By Insikt Group® CTA-2019-0821 CYBER THREAT ANALYSIS Groups with the trappings of hacktivism have recently dumped Russian and Iranian state security organization records online, although neither have proclaimed themselves to be hacktivists. In addition, hacktivism has taken a back seat in news reporting, and general mentions seem to be in decline. Insikt Group utilized the Recorded FutureⓇ Platform and reports of historical hacktivism events to analyze the shifting targets and players in the hacktivism space. The target audience of this research includes security practitioners whose enterprises may be targets for hacktivism. Executive Summary Hacktivism often brings to mind a loose collective of individuals globally that band together to achieve a common goal. However, Insikt Group research demonstrates that this is a misleading assumption; the hacktivist landscape has consistently included actors reacting to regional events, and has also involved states operating under the guise of hacktivism to achieve geopolitical goals. In the last 10 years, the number of large-scale, international hacking operations most commonly associated with hacktivism has risen astronomically, only to fall off just as dramatically after 2015 and 2016. This constitutes a return to normalcy, in which hacktivist groups are usually small sets of regional actors targeting specific organizations to protest regional events, or nation-state groups operating under the guise of hacktivism. Attack vectors used by hacktivist groups have remained largely consistent from 2010 to 2019, and tooling has assisted actors to conduct larger-scale attacks. However, company defenses have also become significantly better in the last decade, which has likely contributed to the decline in successful hacktivist operations.
    [Show full text]
  • Malware Trends
    NCCIC National Cybersecurity and Communications Integration Center Malware Trends Industrial Control Systems Emergency Response Team (ICS-CERT) Advanced Analytical Laboratory (AAL) October 2016 This product is provided subject only to the Notification Section as indicated here:http://www.us-cert.gov/privacy/ SUMMARY This white paper will explore the changes in malware throughout the past several years, with a focus on what the security industry is most likely to see today, how asset owners can harden existing networks against these attacks, and the expected direction of developments and targets in the com- ing years. ii CONTENTS SUMMARY .................................................................................................................................................ii ACRONYMS .............................................................................................................................................. iv 1.INTRODUCTION .................................................................................................................................... 1 1.1 State of the Battlefield ..................................................................................................................... 1 2.ATTACKER TACTIC CHANGES ........................................................................................................... 2 2.1 Malware as a Service ...................................................................................................................... 2 2.2 Destructive Malware ......................................................................................................................
    [Show full text]