CARDERS, SPAMMERS AND HACKERS LABORATORY



Join the forum, it's quick and easy

CARDERS, SPAMMERS AND HACKERS LABORATORY

CARDERS, SPAMMERS AND HACKERS LABORATORY

Would you like to react to this message? Create an account in a few clicks or log in to continue.
CARDERS, SPAMMERS AND HACKERS LABORATORY

PHP Mailer- Leads - Cpanel - Rdp - Credit Cards - Carding Ebooks - Hacking Ebooks - Carding Services - Live Socks - CC Checker - Cash Out - WU Transfers - MG Transfer


    The COMPLETE beginners guide to hacking (Sec 6)

    Cyber.Dude
    Cyber.Dude
    Top ML Carder
    Top ML Carder


    Posts : 26
    Trust Score : 4134
    Reputation : 0
    Join date : 2014-12-01

    The COMPLETE beginners guide to hacking (Sec 6) Empty The COMPLETE beginners guide to hacking (Sec 6)

    Post by Cyber.Dude Tue 24 Mar 2015, 1:16 pm

    SECTION 6 - Basic terminology

    As I mentioned in the previous section, it is important to have a decent amount of knowledge about hacking before you can start. So I've taken the liberty of typing up a list of common terminologies you should know.
    Common terminologies:
    Ddos - Distributed denial of service attack. This is where a website is flooded with packets of data from multiple sources and the server basically overloads. Ddos attacks are often confused with Dos attacks.
    Dos - Denial of service attack. This is where a site is flooded with packets of data from a single source. A Dos isn't as effective as a ddos, but it is a lot easier, as you can Dos straight from cmd.
    404 Error - The error you are given when a site is down. If you have attacked a site and don't see this, your attack wasn't successful.
    cmd - Command prompt. This is basically MS-Dos, except it's now just a program with some commands rather than an OS. Cmd can be used to perform tasks using commands.
    .bat - Batch file extension. This is the file type which is opened in cmd. Most .bat's that you will see online will be malicious. Some are good though.
    RAT - Remote Administration Tool. RAT's are the most commonly used tools by beginner hackers. RAT's are favored because they are easy to use and they perform many functions. They also allow control over of the infected computer, which makes them very popular. Slave - A user which has been infected with your keylogger/RAT.
    Keylogger - A program which logs the keystrokes of a computer. These are usually the first things that beginner hackers learn to use. They have a lot of functions but they aren't as good as RAT's.
    Crypter - A program used to change the hash sum of a malicious program so that it is undetectable by anti-virus programs.
    FUD - Fully UnDetectable. A program which is FUD cannot be detected by ANY anti-virus program. UD - UnDetectable. A program which is UD is mostly undetectable but can be detected by some anti-virus programs.
    JDB - Java Driveby. A fake site which contains a java applet. This java applet is used to download and execute (run) a certain program. The victim as to click the 'allow plugin to run' button to start the applet.
    Silent Java Driveby - A java driveby that's downloads and executes a file without the user seeing any pop-ups. These are more effective than normal java driveby's as they are less suspicious.
    Direct link - The direct download link to a certain file. When you download a file from a site (e.g. Mediafire), you are given a download link which redirects you to a page with a download button. However a direct link is a link which leads directly to the file. There is no download button, the download starts straight away.
    FTP - File Transfer Protocol. An FTP server is a server used to store and send files.
    OS - Operating system
    vb - Microsoft Visual Basic. This is a coding language used to make a lot of programs.
    .NET - Microsoft .NET framework. This is another coding language made by Microsoft. It is used to create programs.
    C/C+/C++/C# - Commonly use coding languages. They are often used to code games.
    IP address - The address used to identify your network while on the Internet. Every computer has a different IP address, and therefore every IP address is unique.
    VPN - Virtual Private Network. This is a network you can connect to on a computer. It will give you anonymity while online. A VPN will hide your IP address by tricking sites and programs into thinking you are somewhere you are not.
    Proxy - A proxy redirects web traffic through a virtual tunnel to another IP address. A proxy is like a VPN but only tricks websites, not the whole computer. That may seem like a lot of things to remember, but it's not that much considering those are just the basics. Don't let that put you off learning though, once you start to learn one thing, another will follow and so on so forth.

      Current date/time is Fri 29 Mar 2024, 8:18 am