White Hat Hacking Glossary

Important definitions and terminologies used in White Hat Hacking

ABCDEFGHIJKLMNOPQRSTUVWXYZ

A

Advanced Persistent Threat (APT) in Hacking

Adware in Hacking

Alias in Hacking

ARIN in Hacking

ARP Spoofing in Hacking

Asymmetric key Cryptography in Hacking

Attack (online) in Hacking

Attribution in Hacking

Authentication in Hacking

Go to Top

B

Backdoor in Hacking

Backup in Hacking

Bitcoin in Hacking

Blackhat in Hacking

Blackhat hacker in Hacking

Blacklisting in Hacking

Block Ciphers in Hacking

Bot in Hacking

Botnet in Hacking

Brute Force Attack in Hacking

Buffer Overflow in Hacking

Go to Top

C

Cipher in Hacking

Clickjacking in Hacking

Cloaking in Hacking

Code injection in Hacking

Computer worm in Hacking

Countermeasure in Hacking

Cross-site Scripting (XSS) in Hacking

Cryptanalysis in Hacking

Cryptography in Hacking

Cryptologist in Hacking

CSRF in Hacking

Go to Top

D

DDoS in Hacking

DDoS (Distributed Denial of Service) in Hacking

Decryption in Hacking

Denial-of-Service (DoS) Attack in Hacking

Dictionary Attack in Hacking

Digital Forensics in Hacking

Digital Signatures in Hacking

Distributed Denial of Service (DDoS) in Hacking

DNS in Hacking

DoS in Hacking

Doxing in Hacking

Go to Top

E

Eavesdropping Attack in Hacking

Email Spoofing in Hacking

Encryption in Hacking

Enumeration in Hacking

Ethical Hacking in Hacking

Ethics in Hacking

Exploit in Hacking

Go to Top

F

Fileless Malware in Hacking

Firewall in Hacking

Footprinting in Hacking

Fuzzing in Hacking

Go to Top

G

Google Hacking in Hacking

GPS Spoofing in Hacking

Gray Hat Hacker in Hacking

Grayhat in Hacking

Go to Top

H

Hacktivist in Hacking

Hash Functions in Hacking

Honeypot in Hacking

HTTP Request Smuggling in Hacking

HTTP Response Splitting in Hacking

HTTP tunneling in Hacking

HTTPS/SSL/TLS in Hacking

Go to Top

I

Identity Access Management in Hacking

IDS in Hacking

Information Gathering in Hacking

Injection Attack in Hacking

IP Address Scanning in Hacking

IP spoofing in Hacking

Go to Top

J

Java Applet Attack in Hacking

JavaScript Hijacking in Hacking

JavaScript Obfuscation in Hacking

Junk packets in Hacking

Go to Top

K

Kerberos Attack in Hacking

Kernel Exploit in Hacking

Key in Hacking

Keylogger in Hacking

Keystroke logging in Hacking

Go to Top

L

Linux Hacking in Hacking

Load Balancing in Hacking

Logic Bomb in Hacking

Logic Flaw in Hacking

Go to Top

M

Malware in Hacking

Man in the middle in Hacking

Man-in-the-Middle (MitM) Attack in Hacking

Message Authentication in Hacking

Metasploit Framework in Hacking

Mobile Security in Hacking

Go to Top

N

Network Enumeration in Hacking

Network Mapping in Hacking

Network Scanning in Hacking

Network Sniffing in Hacking

Nmap in Hacking

null sessions in Hacking

Go to Top

O

OAuth Phishing in Hacking

OllyDbg in Hacking

Onion Routing in Hacking

Operational Security (OpSec) in Hacking

Out-of-Band (OoB) Exploits in Hacking

Go to Top

P

Password Attacks in Hacking

Password Cracking in Hacking

Patch in Hacking

Payload in Hacking

Penetration Testing in Hacking

Penetration testing (Pentest) in Hacking

Phishing in Hacking

Physical Security in Hacking

Private Key Exchange in Hacking

Public Key Exchange in Hacking

Public Key Infrastructure in Hacking

Go to Top

Q

Quadrooter Vulnerability in Hacking

Query String Manipulation in Hacking

Quick Response (QR) Code Exploits in Hacking

Go to Top

R

Rainbow Tables in Hacking

Ransomware in Hacking

Remote Access Tool (RAT) in Hacking

Remote administration tools (RATs) in Hacking

Remote Code Execution (RCE) in Hacking

Rootkit in Hacking

Router Attacks in Hacking

Rules of Engagement in Hacking

Go to Top

S

Script kiddy in Hacking

Secret Key Cryptography in Hacking

Security Policies in Hacking

SEH in Hacking

Session Hijacking in Hacking

Shell in Hacking

SNMP enumeration in Hacking

Social Engineering in Hacking

SPAM in Hacking

Spoofing in Hacking

Spyware in Hacking

SQL INJECTION in Hacking

Steganography in Hacking

Stream Ciphers in Hacking

Switch Attacks in Hacking

Symmetric key Cryptography in Hacking

System Hacking in Hacking

Go to Top

T

TCP/IP Hijacking in Hacking

traceroute in Hacking

Trojan Horse in Hacking

Trojans in Hacking

Two-Factor Authentication (2FA) in Hacking

Go to Top

U

Unicode Exploits in Hacking

URL injection in Hacking

URL Spoofing in Hacking

User Enumeration in Hacking

Go to Top

V

Virtual Hardening with Firewall in Hacking

Virtual Machine (VM) Escape in Hacking

Virtual Private Network (VPN) in Hacking

Virus in Hacking

VoIP Attacks in Hacking

Vulnerabilities in Hacking

Vulnerability in Hacking

Go to Top

W

Warez in Hacking

Web Application Attacks in Hacking

Web Hacking in Hacking

Web Server Attacks in Hacking

web spider in Hacking

Website Defacement in Hacking

White hat in Hacking

Whitehat in Hacking

whois in Hacking

Windows Hacking in Hacking

Windows Security in Hacking

Wireless LAN in Hacking

Wireless Network Hacking in Hacking

Wireless Networks in Hacking

WLAN Attacks in Hacking

WLAN Security in Hacking

Worm in Hacking

Go to Top

X

XML Bomb in Hacking

XML External Entity (XXE) in Hacking

XML Injection in Hacking

XSS OR CROSS-SITE SCRIPTING in Hacking

Go to Top

Y

YAML Ain’t Markup Language (YAML) Injection in Hacking

Yara Rules in Hacking

YouTube Phishing in Hacking

Go to Top

Z

Zero Day in Hacking

Zero Day Attack in Hacking

Zero-Day Exploit in Hacking

Zeus Trojan in Hacking

ZIP Bomb in Hacking

E-commerce Glossary
Project Management Glossary

Get industry recognized certification – Contact us

keyboard_arrow_up