Interpreting the terminology of computer hacking

Source: Internet
Author: User
Tags execution mixed root access

1. Broiler: The so-called "broiler" is a very figurative metaphor, the analogy of those who can be arbitrarily controlled by our computer, the other can be a Windows system, can also be a unix/linux system, can be a common personal computer, can also be a large server, We can manipulate them like we do our own computer without being noticed by the other side.

2. Trojan: Is that the surface disguised as a normal program, but when these are run by the program, you will get the entire control of the system permissions. A lot of hackers are hot and use Trojans to control other people's computers, such as gray pigeons, black holes, pcshare and so on.

3. Web Trojan: On the surface disguised as a common Web page file or will just the code directly inserted into the normal Web page files, when someone visited, the Web Trojan will use the other system or browser vulnerabilities automatically configured Trojan server to download to the visitor's computer to automatically perform.

4. Hanging horse: Is in someone else's website file inside the webpage Trojan Horse or is the code into the other side of the normal page file, so that visitors to the horse.

5. Back door: This is an image metaphor, the intruder after using some methods to successfully control the target host, can be implanted in the other's system specific programs, or modify some settings. These changes are, on the surface, difficult to detect, but the intruder can use the appropriate procedures or methods to easily connect with the computer, to regain control of the computer, as if the intruder secretly with a master room if, can be in and out without being found by the owner.

Typically, most Trojan horse (Trojan horse) programs can be used by intruders to make backdoor (backdoor)

6.rootkit:rootkit is a tool used by attackers to hide their whereabouts and to retain root (root permissions, which can be understood as system or administrator privileges under Windows). Usually, the attacker obtains root access by means of a remote attack, or obtains the normal access to the system by using the method of password guessing first, then enters the system, and then obtains the system root authority through the security vulnerabilities in the other system. The attackers then install rootkit in each other's system to achieve their long-term control of the other, rootkit similar to the Trojans and backdoor we mentioned, but far more obscure than they are, the hacker guardians are typical rootkit, There are domestic ntroorkit and so are good rootkit tools.

7.ipc$: is a resource for sharing named Pipes, an empty named pipe that is opened to communicate between processes, and can be used to remotely manage computers and view the shared resources of a computer by verifying the user name and password for the appropriate permissions.

8. Weak password: Refers to those intensity is not enough, easy to guess solution, similar 123,abc such password (password)

9. Default sharing: The default share is the WINDOWS2000/XP/2003 system opens the shared service automatically open all the sharing of the hard disk, because added "contentldquo symbol, so do not see the shared hand chart, also become a hidden share."

10.shell: Refers to a command line environment, such as we press the keyboard "start key +r" when the "Run" dialog box, in which "CMD" will appear in a black window for the execution of commands, this is the Windows Shell execution environment. The environment that we use to execute system commands when we successfully overflow a remote computer with a remote overflow program is the other's shell.

11.webshell:webshell is an ASP, PHP, JSP or CGI, such as a Web page file form a command execution environment, it can also be called a web portal. Hackers in the invasion of a website, usually the ASP or PHP backdoor files with the Web Server Web directory of the normal Web page files mixed together, so that you can use the browser to access these ASP or PHP back door, get a command execution environment to control the purpose of the Web server. You can upload the download file, view the database, execute any program commands, and so on. The domestic commonly used Webshell has Haiyang ASP Trojan Horse, Phpspy,c99shell and so on

12. Overflow: Exactly speaking, should be "slow

1. Broiler: The so-called "broiler" is a very figurative metaphor, the analogy of those who can be arbitrarily controlled by our computer, the other can be a Windows system, can also be a unix/linux system, can be a common personal computer, can also be a large server, We can manipulate them like we do our own computer without being noticed by the other side.

2. Trojan: Is that the surface disguised as a normal program, but when these are run by the program, you will get the entire control of the system permissions. A lot of hackers are hot and use Trojans to control other people's computers, such as gray pigeons, black holes, pcshare and so on.

3. Web Trojan: On the surface disguised as a common Web page file or will just the code directly inserted into the normal Web page files, when someone visited, the Web Trojan will use the other system or browser vulnerabilities automatically configured Trojan server to download to the visitor's computer to automatically perform.

4. Hanging horse: Is in someone else's website file inside the webpage Trojan Horse or is the code into the other side of the normal page file, so that visitors to the horse.

5. Back door: This is an image metaphor, the intruder after using some methods to successfully control the target host, can be implanted in the other's system specific programs, or modify some settings. These changes are, on the surface, difficult to detect, but the intruder can use the appropriate procedures or methods to easily connect with the computer, to regain control of the computer, as if the intruder secretly with a master room if, can be in and out without being found by the owner.

Typically, most Trojan horse (Trojan horse) programs can be used by intruders to make backdoor (backdoor)

6.rootkit:rootkit is a tool used by attackers to hide their whereabouts and to retain root (root permissions, which can be understood as system or administrator privileges under Windows). Usually, the attacker obtains root access by means of a remote attack, or obtains the normal access to the system by using the method of password guessing first, then enters the system, and then obtains the system root authority through the security vulnerabilities in the other system. The attackers then install rootkit in each other's system to achieve their long-term control of the other, rootkit similar to the Trojans and backdoor we mentioned, but far more obscure than they are, the hacker guardians are typical rootkit, There are domestic ntroorkit and so are good rootkit tools.

7.ipc$: is a resource for sharing named Pipes, an empty named pipe that is opened to communicate between processes, and can be used to remotely manage computers and view the shared resources of a computer by verifying the user name and password for the appropriate permissions.

8. Weak password: Refers to those intensity is not enough, easy to guess solution, similar 123,abc such password (password)

9. Default sharing: The default share is the WINDOWS2000/XP/2003 system opens the shared service automatically open all the sharing of the hard disk, because added "contentldquo symbol, so do not see the shared hand chart, also become a hidden share."

10.shell: Refers to a command line environment, such as we press the keyboard "start key +r" when the "Run" dialog box, in which "CMD" will appear in a black window for the execution of commands, this is the Windows Shell execution environment. The environment that we use to execute system commands when we successfully overflow a remote computer with a remote overflow program is the other's shell.

11.webshell:webshell is an ASP, PHP, JSP or CGI, such as a Web page file form a command execution environment, it can also be called a web portal. Hackers in the invasion of a website, usually the ASP or PHP backdoor files with the Web Server Web directory of the normal Web page files mixed together, so that you can use the browser to access these ASP or PHP back door, get a command execution environment to control the purpose of the Web server. You can upload the download file, view the database, execute any program commands, and so on. The domestic commonly used Webshell has Haiyang ASP Trojan Horse, Phpspy,c99shell and so on

12. Overflow: Exactly speaking, should be "slow

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.