Submit Search
Upload
Hacker's jargons
•
Download as PPTX, PDF
•
2 likes
•
800 views
n|u - The Open Security Community
Follow
Hacker's jargons
Read less
Read more
Internet
Report
Share
Report
Share
1 of 36
Download now
Recommended
Hacker's jargons
Hacker's jargons
Pavan M
Log Forensics from CEIC 2007
Log Forensics from CEIC 2007
Anton Chuvakin
CONFidence 2007 Log Forensics TEASER Preso
CONFidence 2007 Log Forensics TEASER Preso
Anton Chuvakin
Ethical Hacking
Ethical Hacking
Muzaffar Ahmad
DNS hijacking - null Singapore
DNS hijacking - null Singapore
n|u - The Open Security Community
Humla workshop on Android Security Testing - null Singapore
Humla workshop on Android Security Testing - null Singapore
n|u - The Open Security Community
Three things that rowhammer taught me by Halvar Flake
Three things that rowhammer taught me by Halvar Flake
n|u - The Open Security Community
Attacking VPN's
Attacking VPN's
n|u - The Open Security Community
Recommended
Hacker's jargons
Hacker's jargons
Pavan M
Log Forensics from CEIC 2007
Log Forensics from CEIC 2007
Anton Chuvakin
CONFidence 2007 Log Forensics TEASER Preso
CONFidence 2007 Log Forensics TEASER Preso
Anton Chuvakin
Ethical Hacking
Ethical Hacking
Muzaffar Ahmad
DNS hijacking - null Singapore
DNS hijacking - null Singapore
n|u - The Open Security Community
Humla workshop on Android Security Testing - null Singapore
Humla workshop on Android Security Testing - null Singapore
n|u - The Open Security Community
Three things that rowhammer taught me by Halvar Flake
Three things that rowhammer taught me by Halvar Flake
n|u - The Open Security Community
Attacking VPN's
Attacking VPN's
n|u - The Open Security Community
iOS Application Pentesting
iOS Application Pentesting
n|u - The Open Security Community
Null Singapore - Can We secure the IoT - Chadi Hantouche
Null Singapore - Can We secure the IoT - Chadi Hantouche
n|u - The Open Security Community
Identifying XSS Vulnerabilities
Identifying XSS Vulnerabilities
n|u - The Open Security Community
News Bytes - December 2015
News Bytes - December 2015
n|u - The Open Security Community
Newbytes NullHyd
Newbytes NullHyd
n|u - The Open Security Community
OAuth Tokens
OAuth Tokens
n|u - The Open Security Community
Firewalking
Firewalking
n|u - The Open Security Community
Stegano Secrets - Python
Stegano Secrets - Python
n|u - The Open Security Community
INTELLIGENT FACE RECOGNITION TECHNIQUES
INTELLIGENT FACE RECOGNITION TECHNIQUES
Chirag Jain
Managing third party libraries
Managing third party libraries
n|u - The Open Security Community
Firewall Penetration Testing
Firewall Penetration Testing
Chirag Jain
Pentesting RESTful WebServices v1.0
Pentesting RESTful WebServices v1.0
n|u - The Open Security Community
Pentesting ReST API
Pentesting ReST API
Nutan Kumar Panda
Getting Started with API Security Testing
Getting Started with API Security Testing
SmartBear
Malware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence Morocco
Touhami Kasbaoui
NPTs
NPTs
Brandon Levene
Fun with Application Security
Fun with Application Security
Bruce Abernethy
Blitzing with your defense bea con
Blitzing with your defense bea con
Innismir
Malware analysis
Malware analysis
Prakashchand Suthar
Cyber Security Workshop GDSC-BITW
Cyber Security Workshop GDSC-BITW
ChanchalHiwanj1
Overview of information security
Overview of information security
Askao Ahmed Saad
Vaccination - The Anti-Honeypot Approach @ Bsides TLV
Vaccination - The Anti-Honeypot Approach @ Bsides TLV
Gal Bitensky
More Related Content
Viewers also liked
iOS Application Pentesting
iOS Application Pentesting
n|u - The Open Security Community
Null Singapore - Can We secure the IoT - Chadi Hantouche
Null Singapore - Can We secure the IoT - Chadi Hantouche
n|u - The Open Security Community
Identifying XSS Vulnerabilities
Identifying XSS Vulnerabilities
n|u - The Open Security Community
News Bytes - December 2015
News Bytes - December 2015
n|u - The Open Security Community
Newbytes NullHyd
Newbytes NullHyd
n|u - The Open Security Community
OAuth Tokens
OAuth Tokens
n|u - The Open Security Community
Firewalking
Firewalking
n|u - The Open Security Community
Stegano Secrets - Python
Stegano Secrets - Python
n|u - The Open Security Community
INTELLIGENT FACE RECOGNITION TECHNIQUES
INTELLIGENT FACE RECOGNITION TECHNIQUES
Chirag Jain
Managing third party libraries
Managing third party libraries
n|u - The Open Security Community
Firewall Penetration Testing
Firewall Penetration Testing
Chirag Jain
Pentesting RESTful WebServices v1.0
Pentesting RESTful WebServices v1.0
n|u - The Open Security Community
Pentesting ReST API
Pentesting ReST API
Nutan Kumar Panda
Getting Started with API Security Testing
Getting Started with API Security Testing
SmartBear
Viewers also liked
(14)
iOS Application Pentesting
iOS Application Pentesting
Null Singapore - Can We secure the IoT - Chadi Hantouche
Null Singapore - Can We secure the IoT - Chadi Hantouche
Identifying XSS Vulnerabilities
Identifying XSS Vulnerabilities
News Bytes - December 2015
News Bytes - December 2015
Newbytes NullHyd
Newbytes NullHyd
OAuth Tokens
OAuth Tokens
Firewalking
Firewalking
Stegano Secrets - Python
Stegano Secrets - Python
INTELLIGENT FACE RECOGNITION TECHNIQUES
INTELLIGENT FACE RECOGNITION TECHNIQUES
Managing third party libraries
Managing third party libraries
Firewall Penetration Testing
Firewall Penetration Testing
Pentesting RESTful WebServices v1.0
Pentesting RESTful WebServices v1.0
Pentesting ReST API
Pentesting ReST API
Getting Started with API Security Testing
Getting Started with API Security Testing
Similar to Hacker's jargons
Malware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence Morocco
Touhami Kasbaoui
NPTs
NPTs
Brandon Levene
Fun with Application Security
Fun with Application Security
Bruce Abernethy
Blitzing with your defense bea con
Blitzing with your defense bea con
Innismir
Malware analysis
Malware analysis
Prakashchand Suthar
Cyber Security Workshop GDSC-BITW
Cyber Security Workshop GDSC-BITW
ChanchalHiwanj1
Overview of information security
Overview of information security
Askao Ahmed Saad
Vaccination - The Anti-Honeypot Approach @ Bsides TLV
Vaccination - The Anti-Honeypot Approach @ Bsides TLV
Gal Bitensky
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
Andrew Morris
Security is not a feature
Security is not a feature
Elizabeth Smith
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using Crypto
John Bambenek
Hacking
Hacking
Raghu engineering college
Corp Web Risks and Concerns
Corp Web Risks and Concerns
PINT Inc
How to hack or what is ethical hacking
How to hack or what is ethical hacking
baabtra.com - No. 1 supplier of quality freshers
Keith J. Jones, Ph.D. - Crash Course malware analysis
Keith J. Jones, Ph.D. - Crash Course malware analysis
Keith Jones, PhD
An Adversarial View of SaaS Malware Sandboxes
An Adversarial View of SaaS Malware Sandboxes
Jason Trost
CheckPlease - Payload-Agnostic Implant Security
CheckPlease - Payload-Agnostic Implant Security
Brandon Arvanaghi
Surfing with Sharks KS ED TECH 2012
Surfing with Sharks KS ED TECH 2012
inf8nity
ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on ...
ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on ...
Andrew Morris
Hacking sites for fun and profit
Hacking sites for fun and profit
David Stockton
Similar to Hacker's jargons
(20)
Malware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence Morocco
NPTs
NPTs
Fun with Application Security
Fun with Application Security
Blitzing with your defense bea con
Blitzing with your defense bea con
Malware analysis
Malware analysis
Cyber Security Workshop GDSC-BITW
Cyber Security Workshop GDSC-BITW
Overview of information security
Overview of information security
Vaccination - The Anti-Honeypot Approach @ Bsides TLV
Vaccination - The Anti-Honeypot Approach @ Bsides TLV
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
Security is not a feature
Security is not a feature
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Hacking
Hacking
Corp Web Risks and Concerns
Corp Web Risks and Concerns
How to hack or what is ethical hacking
How to hack or what is ethical hacking
Keith J. Jones, Ph.D. - Crash Course malware analysis
Keith J. Jones, Ph.D. - Crash Course malware analysis
An Adversarial View of SaaS Malware Sandboxes
An Adversarial View of SaaS Malware Sandboxes
CheckPlease - Payload-Agnostic Implant Security
CheckPlease - Payload-Agnostic Implant Security
Surfing with Sharks KS ED TECH 2012
Surfing with Sharks KS ED TECH 2012
ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on ...
ShmooCon 2015: No Budget Threat Intelligence - Tracking Malware Campaigns on ...
Hacking sites for fun and profit
Hacking sites for fun and profit
More from n|u - The Open Security Community
Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
n|u - The Open Security Community
Osint primer
Osint primer
n|u - The Open Security Community
SSRF exploit the trust relationship
SSRF exploit the trust relationship
n|u - The Open Security Community
Nmap basics
Nmap basics
n|u - The Open Security Community
Metasploit primary
Metasploit primary
n|u - The Open Security Community
Api security-testing
Api security-testing
n|u - The Open Security Community
Introduction to TLS 1.3
Introduction to TLS 1.3
n|u - The Open Security Community
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
n|u - The Open Security Community
Talking About SSRF,CRLF
Talking About SSRF,CRLF
n|u - The Open Security Community
Building active directory lab for red teaming
Building active directory lab for red teaming
n|u - The Open Security Community
Owning a company through their logs
Owning a company through their logs
n|u - The Open Security Community
Introduction to shodan
Introduction to shodan
n|u - The Open Security Community
Cloud security
Cloud security
n|u - The Open Security Community
Detecting persistence in windows
Detecting persistence in windows
n|u - The Open Security Community
Frida - Objection Tool Usage
Frida - Objection Tool Usage
n|u - The Open Security Community
OSQuery - Monitoring System Process
OSQuery - Monitoring System Process
n|u - The Open Security Community
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
n|u - The Open Security Community
Extensible markup language attacks
Extensible markup language attacks
n|u - The Open Security Community
Linux for hackers
Linux for hackers
n|u - The Open Security Community
Android Pentesting
Android Pentesting
n|u - The Open Security Community
More from n|u - The Open Security Community
(20)
Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
Osint primer
Osint primer
SSRF exploit the trust relationship
SSRF exploit the trust relationship
Nmap basics
Nmap basics
Metasploit primary
Metasploit primary
Api security-testing
Api security-testing
Introduction to TLS 1.3
Introduction to TLS 1.3
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Talking About SSRF,CRLF
Talking About SSRF,CRLF
Building active directory lab for red teaming
Building active directory lab for red teaming
Owning a company through their logs
Owning a company through their logs
Introduction to shodan
Introduction to shodan
Cloud security
Cloud security
Detecting persistence in windows
Detecting persistence in windows
Frida - Objection Tool Usage
Frida - Objection Tool Usage
OSQuery - Monitoring System Process
OSQuery - Monitoring System Process
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
Extensible markup language attacks
Extensible markup language attacks
Linux for hackers
Linux for hackers
Android Pentesting
Android Pentesting
Recently uploaded
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
ellan12
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
Diya Sharma
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
CarlotaBedoya1
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
aditipandeya
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
shivangimorya083
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
soniya singh
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Call Girls in Nagpur High Profile
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
soniya singh
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
soniya singh
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
kojalkojal131
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
APNIC
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
tanu pandey
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Sheetaleventcompany
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
ruhi
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
SofiyaSharma5
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
Escorts Call Girls
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Seo
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Delhi Call girls
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
Call Girls in Nagpur High Profile Call Girls
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Delhi Call girls
Recently uploaded
(20)
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hacker's jargons
1.
Hacker’s Jargons pavanw3b
2.
$ whoami • Pavan
aka pavanw3b • Security Engineer @ ServiceNow • n|u core team • Other boring details at pavanw3b.com
3.
What? • A small
dictionary for hackers • InfoSec, admin, developers • .. ORDER BY `title` AS
4.
Why? • Don’t get
lost • Express better • Know what you do • Know what somebody did
5.
Method • Quiz? • Rewards •
9 Humla & bachav wild card entry • First hand raise I see
6.
Cipher, Ciphertext Cypher Encryption Algorithm Encrypted
text
7.
Disinformation Providing wrong information
intentionally
8.
Drive-by Download Visit –
Download malware
9.
Dropper Settle first -
call friends Single Stage, Double Stage Avoid detection
10.
Dumpster diving Make use
of the dumped stuffs Legal in the US
11.
False Positive !True Security
issues Scanners
12.
Fuzzing Fuzz Testing Bombard with
junk to make a sense System Errors, Bugs
13.
ITW In The Wild Malware
Spread Worldwide
14.
Logic Bomb Explode at
certain Logic Hidden Malicious Code
15.
Monkey Patching Patch else’s
code to protect yourself Third party Library
16.
Nonce Number used ONCE Identify
genuine stuffs Crypto: authentication, Hashing, CSRF wp nonce
17.
Pharming Phishing without a
lure Redirection by Malware
18.
Piggybacking Gain unauthorized access By
exploiting authorized legitimate
19.
Ransomware Lock down –
Ask Ransom Remote Private Key Catch me if you can
20.
RAT Remote Access Trojan Remote
Administration Games, email attachments
21.
Retroactive Bug Activate a
Retro Bug While patching another bug Thanks to @Danish
22.
Rogue Program False Positive
- Infect
23.
Shoulder Surfing Look over
Shoulder
24.
SMShing Phishing by SMS
25.
Spear Phishing Phishing from
the Names you know
26.
STR Steps To Reproduce POC
27.
Time Bomb Logic Time
Bomb
28.
Typosquatting Typo Friendly URLs
29.
Vishing Voice Phishing VoIP
30.
Wardriving Keep driving, Keep
Scanning WiFi
31.
Watering Hole Infect websites
– target browse Thanks to @Sujay
32.
Whaling Emails with malicious
links Executives & Top Management Contact details are public To Steal Corporate Secrets
33.
Zero Day Exploit Security
Vulnerability widely Before owner comes to know Before developer hurries to patch
34.
Zombie Compromised device To Perform
any malicious taks Controlled remotely
35.
Zoo Collection of malwares
36.
Thanks for bearing Pavan fb/pavanw3b
| @twitter | pavanw3b.com thedarkw3b.com/hackers-dictionary-jargons/ How was this new thing that we tried?
Download now