SOME FUNDAMENTAL TERMS
1. ENCRYPTION
Encryption is essentially a code used to hide the contents of a message or data. It’s an ancient technique, but the old methods are far simpler than what we use today. The earliest encryption methods tended to involve either changing the order of the letters, or substituting letters with other characters.
2. CLONE PHISHING

In this attack, criminals make a copy—or clone—of previously delivered but legitimate emails that contain either a link or an attachment. Then, the phisher replaces the links or attached files with malicious substitutions disguised as the real thing. Unsuspecting users either click the link or open the attachment, which often allows their systems to be commandeered. Then the phisher can counterfeit the victim's identity in order to masquerade as a trusted sender to other victims in the same organization.
“Phishing is the simplest kind of cyber attack and, at the same time, the most dangerous and effective.”
3. CRYPTO JACKING

Crypto jacking (also called malicious crypto mining) is an emerging online threat that hides on a computer or mobile device and uses the machine’s resources to “mine” forms of online money known as cryptocurrencies. It’s a burgeoning menace that can take over web browsers, as well as compromise all kinds of devices, from desktops and laptops, to smart phones and even network servers.
Like most other malicious attacks on the computing public, the motive is profit, but unlike many threats, it’s designed to stay completely hidden from the user. To understand the mechanics of the threat and how to protect yourself against it, let’s begin with a bit of background.
4. SPYWARE
Spyware is a form of malware that hides on your device, monitors your activity, and steals sensitive information like bank details and passwords.
Spyware can infect your system in the same ways that any other malware does, by means of a Trojan, a virus, worm, exploit, and other types of malware.
5. COLDBOOT ATTACK

Cold boot attacks demonstrate that disk encryption programs, which are used to protect data on desktops, laptops and various other computing devices, have no reliably secure location in which to store their keys. The attack is carried out by performing a cold boot of the system and dumping the contents of the DRAM to a CD or USB token. The memory image is then scoured for data structures that store the decryption key. With this data, an attacker can obtain encryption keys either by copying the entire encrypted partitions or rebooting the machine and using the computer's encryption software to decrypt it.
A cold boot attack is a process for obtaining unauthorized access to a computer's encryption keys when the computer is left physically unattended.
6. SWIFT Code

SWIFT Code (Society for Worldwide Interbank Financial Telecommunication) or BIC (Bank Identifier Code) is a unique identification code for a particular bank. These codes are used when transferring money between banks, particularly for international wire transfers. The Swift code consists of 8 or 11 characters.
SWIFT Code Format : AAAA-BB-00-YYY
First 4 characters - bank code (only letters)
Next 2 characters -country code (only letters)
Next 2 characters - location code (letters and digits)
Last 3 characters - branch code
7. DATA MINING
Data mining is a concept first realized when businesses began storing important information on computer databases and extracting useful information from large sets of data. It is a fairly new method that can only be described as discovering hidden values from within a large amount of unknown data. Data mining is a reliable way for different companies to predict future trends and behaviors from within their business, allowing them to make better decisions going forward.
8. DATA ACQUISITION
Alternatively referred to as a data capture, data acquisition is the process of collecting and organizing information. The method of data acquisition varies, from reading a book to performing an experiment and observing the results. In computing, data acquisition is used to gather information electronically and allow it to be stored, searched, or organized more efficiently.

9. DATA MANIPULATION

Data manipulation is the process of changing data to make it easier to read or be more organized. For example, a log of data could be organized in alphabetical order, making individual entries easier to locate. Data manipulation is often used on web server logs to allow a website owner to view their most popular pages as well as their traffic sources.
10. GROWTH HACKING
Growth hacking is an umbrella term for strategies focused solely on growth. It is usually used in relation to early-stage startups who need massive growth in a short time on small budgets.
The goal of growth hacking strategies is generally to acquire as many users or customers as possible while spending as little as possible. The term “growth hacking” was coined by Sean Ellis, founder and CEO of Growth Hackers, in 2010.
NOTE: OUR EACH AND EVERY PICTURE OF THIS BLOG IS DIRECTLY TAKEN BY GOOGLE.COM AND SOME CONTENT IS ALSO COPIED FROM GOOGLE FOR BETTER ANALYTICS AND PROPER REPORT.
THANK YOU VERY MUCH
PLEASE SHOW YOUR LOVE BY LIKE , COMMENTS AND SUBSCRIBE US FOR MORE TECH RELATED CONTENT
PLEASE SHOW YOUR LOVE BY LIKE , COMMENTS AND SUBSCRIBE US
FOR MORE TECH RELATED CONTENT
our telegram link
https://t.me/w36c0d3r
Our youtube teaser video
https://youtu.be/D5XwOuB4ZMg
http://www.scriptkiddies.cf/
our website link
https://www.scriptkiddieshackers.com/2020/06/hacking-hacking-refers-to.html
our blog link
https://instagram.com/script_kiddies_developers?igshid=17prws6olul0r
Our Instagram page link
https://instagram.com/team_script_kiddies?igshid=ei7vr4q1vpls
FOR MORE INFORMATION ABOUT THIS YOU CAN CONTACT ME AS MY DETAILS ARE GIVEN
FOR MORE INFORMATION ABOUT THIS YOU CAN CONTACT ME AS MY DETAILS ARE GIVEN
7 Comments
Awesome content for ethical hacking learners they knew its value
ReplyDeleteThank you very much
DeleteHope you like my work
Keep supporting us
And also check some other posts too
😊😊
This comment has been removed by the author.
ReplyDeleteThis is straight forward nice compilation
ReplyDeleteThank you keep supporting
DeleteThis is such a great resource that you are providing and you give it away for free. I love seeing blog that understand the value of providing a quality resource for free. Cracking
ReplyDeleteBitcoin is on the ascent as an advanced cash utilized around the world. It is a sort of cash controlled and put away altogether by PCs spread over the Internet. More individuals and more organizations are beginning to use it. bitcoin mixer
ReplyDelete