hacker's jargons

36
Hacker’s Jargons pavanw3b

Upload: nu-the-open-security-community

Post on 08-Jan-2017

453 views

Category:

Internet


0 download

TRANSCRIPT

Page 1: Hacker's jargons

Hacker’s Jargons

pavanw3b

Page 2: Hacker's jargons

$ whoami• Pavan aka pavanw3b• Security Engineer @ ServiceNow• n|u core team• Other boring details at

pavanw3b.com

Page 3: Hacker's jargons

What?

• A small dictionary for hackers• InfoSec, admin, developers• .. ORDER BY `title` AS

Page 4: Hacker's jargons

Why?• Don’t get lost• Express better• Know what you do• Know what somebody did

Page 5: Hacker's jargons

Method• Quiz?• Rewards• 9 Humla & bachav wild card entry• First hand raise I see

Page 6: Hacker's jargons

Cipher, Ciphertext

Cypher

Encryption Algorithm

Encrypted text

Page 7: Hacker's jargons

Disinformation

Providing wrong information intentionally

Page 8: Hacker's jargons

Drive-by Download

Visit – Download malware

Page 9: Hacker's jargons

Dropper

Settle first - call friendsSingle Stage, Double Stage

Avoid detection

Page 10: Hacker's jargons

Dumpster diving

Make use of the dumped stuffsLegal in the US

Page 11: Hacker's jargons

False Positive

!True Security issuesScanners

Page 12: Hacker's jargons

Fuzzing

Fuzz TestingBombard with junk to make a sense

System Errors, Bugs

Page 13: Hacker's jargons

ITW

In The WildMalware Spread Worldwide

Page 14: Hacker's jargons

Logic Bomb

Explode at certain LogicHidden Malicious Code

Page 15: Hacker's jargons

Monkey Patching

Patch else’s code to protect yourselfThird party Library

Page 16: Hacker's jargons

Nonce

Number used ONCEIdentify genuine stuffs

Crypto: authentication, Hashing, CSRFwp nonce

Page 17: Hacker's jargons

Pharming

Phishing without a lureRedirection by Malware

Page 18: Hacker's jargons

Piggybacking

Gain unauthorized accessBy exploiting authorized legitimate

Page 19: Hacker's jargons

Ransomware

Lock down – Ask RansomRemote Private KeyCatch me if you can

Page 20: Hacker's jargons

RAT

Remote Access TrojanRemote Administration

Games, email attachments

Page 21: Hacker's jargons

Retroactive BugActivate a Retro Bug

While patching another bugThanks to @Danish

Page 22: Hacker's jargons

Rogue Program

False Positive - Infect

Page 23: Hacker's jargons

Shoulder Surfing

Look over Shoulder

Page 24: Hacker's jargons

SMShing

Phishing by SMS

Page 25: Hacker's jargons

Spear Phishing

Phishing from the Names you know

Page 26: Hacker's jargons

STR

Steps To ReproducePOC

Page 27: Hacker's jargons

Time Bomb

Logic Time Bomb

Page 28: Hacker's jargons

Typosquatting

Typo Friendly URLs

Page 29: Hacker's jargons

Vishing

Voice PhishingVoIP

Page 30: Hacker's jargons

Wardriving

Keep driving, Keep Scanning WiFi

Page 31: Hacker's jargons

Watering Hole

Infect websites – target browseThanks to @Sujay

Page 32: Hacker's jargons

Whaling

Emails with malicious linksExecutives & Top Management

Contact details are publicTo Steal Corporate Secrets

Page 33: Hacker's jargons

Zero Day

Exploit Security Vulnerability widelyBefore owner comes to know

Before developer hurries to patch

Page 34: Hacker's jargons

Zombie

Compromised deviceTo Perform any malicious taks

Controlled remotely

Page 35: Hacker's jargons

Zoo

Collection of malwares

Page 36: Hacker's jargons

Thanks for bearing

Pavanfb/pavanw3b | @twitter | pavanw3b.com

thedarkw3b.com/hackers-dictionary-jargons/

How was this new thing that we tried?