Understanding Hacking Terminology

Hacking is a term that is often used in the media and in popular culture, but it can be difficult to understand what it means and the different types of hacking that exist. In order to better understand hacking and the terminology associated with it, it is important to break down some of the key terms and concepts.

One of the most basic types of hacking is called "script kiddie" hacking. This type of hacking is characterized by the use of pre-written scripts or programs to gain unauthorized access to a computer or network. Script kiddies are typically inexperienced hackers who use tools that are readily available online to gain access to systems without understanding the underlying technology.

Another type of hacking is called "phishing." Phishing is the practice of using social engineering techniques to trick people into giving away personal information, such as passwords or credit card numbers. This can be done through emails, text messages, or phone calls. Phishing is often used to steal personal information for identity theft or to gain access to sensitive information.

"Denial of Service" (DoS) attacks are another type of hacking. These attacks are designed to overload a computer or network, making it unavailable to legitimate users. This can be done by overwhelming a server with traffic or by exploiting a vulnerability in a network's infrastructure.

"Man-in-the-middle" (MitM) attacks are another type of hacking. These attacks involve intercepting communications between two parties, such as a user and a website. The hacker can then use this information to steal personal information or to gain access to sensitive data.

"Advanced persistent threat" (APT) is a type of hacking that is used to gain access to a network over an extended period of time. This type of hacking is typically used by nation-states or other organizations with the resources to maintain a long-term presence on a network.

"Zero-day" is a term used to describe a vulnerability that has not yet been discovered or disclosed. Zero-day vulnerabilities can be used by hackers to gain unauthorized access to a computer or network.

"Exploit" is a term used to describe a piece of code or a program that takes advantage of a vulnerability in a computer or network. Exploits can be used to gain access to a system or to execute malicious code.

In conclusion, hacking is a complex and ever-evolving field that involves a wide range of techniques and terminology. Understanding the different types of hacking and the terminology associated with it can help individuals and organizations better protect themselves from cyber attacks.

Indian Cyber Securiry



Research Papers


Case Study



Cyber Police


Newsletter