Learn Basic Hacking Term | UrTrick World

New post: Android, window 10 hacking. Coming soon

Learn Basic Hacking Term


Hi friends, every one asking for basic detail of hacking. I m not able to answer each question, so i just write some FAQ in this post. This post basically aimed for those guys who wants learn about hacking term but haven't enough to time to read books, or pdf. Many of you say that they know every thing about hacking, while they can't create difference b/t trojan and maleware. So before you start hacking you must know some basic term used in hacking. I just write short answer as possible of every question.So lets begin.


Q: What is hacking?



A: The terms "hack" are also used to refer to a modification of a program or device to give the user access to features that were otherwise unavailable, such as DIY circuit bending. It is from this usage that the term "hacking" is often incorrectly used to refer to more nefarious criminal uses such as identity theft, credit card fraud or other actions categorized as computer crime



Q: What is cracking?


A: Password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. The purpose of password cracking might be to help a user recover a forgotten password (though installing an entirely new password is less of a security risk, but involves system administration privileges), to gain unauthorized access to a system, or as a preventive measure by system administrators to check for easily crackable passwords. On a file-by file basis, password cracking is utilized to gain access to digital evidence for which a judge has allowed access but the particular file's access is restricted.



Q: What is a virus/trojan/malicious script?


A: A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer..



Q: What is a stealer?


A: A stealer is a software designed to create viruses. This virus is called as a server. You send the server to the victim and if they open it all their passes (according to how the stealer is built) will be sent to you via email, or ftp or a php webhost.



Q: What is a RAT?


A: A Rat is a software created that created similar servers (virus). If the victim opens it they will be your RAT. You can have a complete access to their system. There are hundreds of features.
RAT - Remote Administration Tool.



Q: What is a keylogger?


A: A keylogger is a software designed to create servers. You send the server to the victim and if they open it all their keystrokes would be sent you via email, ftp, php webhost etc.



Q: What is BOT?


A: A bot is a malicious program which has several purposes.
They are usually told what to do by a botnet admin although many of the features now are automated.See this image and try to understand




Q: What is a BOTNET?


A: A botnet is a network of infected computers that all connect to one area where they are commanded by the botnet admin.



Q: What is a crypter?


A: All your servers that you create of a keylogger, stealer, RATs etc. are detected by antivirus. So inorder to make it FUD (Fully UnDetectable) we use a crypter and crypt your infected server.



Q: How does a crypter work?


A: A crypter has a built in or external file called stub. This stub is based on common encryptions like rc4, xor, tweafish, blowfish etc. When you crypt your infected file the crypter embeds the stub onto your server and covers the server. Just like how you paint your rusted metals. And makes it undetectable from anti-virus.



Q: What is reverting?


A: Reverting is a technique used to obtain forgotten passwords. But a hacker uses this method to access the victims account.



Q: What is social engineering?


A: It is a psychological approach, where you manipulate people into performing actions or divulging confidential information, rather than by breaking in or using technical hacking techniques (essentially a fancier, more technical way of lying).



Q: What is DDos?


A: DOS - Denial Of Service.
This is using bots. If you have a large number of bots you make them send packets to the target site and make them break down.



Q: How is website hack possible?


A: There are lots of methods. The most basic one is you find exploits on a web server and use them to gain access and deface it.
Sql, XSS, LFI, RFI, DNS poisoning etc.



Q: Can everyone be hacker?


A: Yes everyone can be a hacker, never ever think hacker are some special creature , they computer worms and blah blah... They are those person who loves computer, they try to understand how it work? before they apply it.
So you can be hacker by learning and hard work. Never down your confidence.


Don't worry i will write individual Tutorial of all hacking method.