Welcome to HBH! If you had an account on hellboundhacker.org you will need to reset your password using the Lost Password system before you will be able to login.

Glossary-of-the-most-common-hacker-expressions


Glossary-of-the-most-common-hacker-expressions

By clone4 avatarclone4 | 13371 Reads |
0     0

Lately, when I have been reading the forum, I“ve seen quite a few misconceptions repeated especially by the newer members ;). Anyway consider this article as a brief glossary of the common hacking expressions…

Newbie: generally description of inexperienced person who is new to the hacking ( however isn“t bound just for hacking ). Even though this description assumes low skill of the person, it“s not considered as an insult, but more like description of new member of the community, who“s just began his path.

Noob: description of person who is inexperienced, stupid, or pretending to be something he“s not. It is a insult! Therefore it“s definitely nothing to be proud of, and declaring that you are in noob in your posts isn“t in any way mitigating factor for your stupidity/lack of research, it won“t save you from flame, you just admit your idiocy/ignorance among the community, therefore my advice is obviously don“t use it in that way.

Leet speak ( also 1337,31337 and many more ): originally leet speak was used by true hackers, to stay hidden from search engines and avoid filters on message boards. However as it lost its purpose, it was raped by mainstream and hacker wannabe-s, the common assumption is that whoever uses leet speak is either retard, noob or script kiddy (covered later;) ). But don“t confuse this with regular English slang ( u, wiv, teh, pwned, ur ), which is in small proportion accepted, but when used massively, usually leads to flame. Generally in hacker community plain and proper English is mostly appreciated and used, as majority of it consists of intelligent and educated people.

Hacker : “A “Hacker” in its real sense is not what the media portrays us as. A “Hacker” is someone who thirsts for knowledge and knows how to obtain it. The Medias portrayal of the word is what is commonly known as a “Criminal Hacker / Cracker” which is quoted as a Black Hat by many.”(AldarHawk) I also recommend to read this very useful article: http://www.catb.org/~esr/faqs/hacker-howto.html 3 main types of hacker –>

Whitehat hacker : as the name itself gives a clue, it“s hacker who doesn“t do anything malicious, or against the law. Those usually participate on pen-testings, or ,when vulnerability found, contact the admin to fix it. Generally whitehats will try to fix, what blackhat would“ve tried to exploit.

Greyhat hackers : again the name gives the main idea, greyhats are somewhere in the middle, generally not doing anything malicious, but might go and delete something there, deface something here etc., for example because of their believes, as a revenge, because of ethics/morals as so on…

Blackhat hackers : those obviously are hackers, which look for vulnerabilities with clear intention to exploit, damage and destroy. If vulnerability is found, blackhat will usually exploit it just because there is the chance, not because of ethics or any personal/other reasons ( again there are exceptions ). Those also cause, along with skids, the negative view on term hacker in general, as those usually get to the media, and people will are more likely to be informed about defacement of some website, than about somebody who“s fixed very serious security flaw. But don“t confuse blackhat with script kiddy, even though blackhat acts maliciously, and some may not agree with that behaviour, blackhat is still hacker, with a good knowledge and understanding of computers in general, properly making his own way through the exploit. Despite that, some of the whitehats doesn“t agree with idea of blackhats being “hackers” and call them solely crackers. This however depends on your point of view, and it is influenced by number of factors ( morals to name one )

script kiddies (skids etc. there are plenty of names for them ) : those are as i like to call them, hacker wannabe-s. The original name is basically for a person ( usually child-ish :)) who isn“t patient enough to obtain the desired knowledge to be able to exploit and “hack”, and uses tools and scripts of others, to exploit vulnerabilities ( usually but not always with malicious intent ), without the knowledge of the tool or exploit what-so-ever. Now this insult was widened generally to any person who is exploiting, without actually knowing what he“s doing. That includes using different “hack” tools, someone else“s scripts, or just copy/paste exploiting ( especially in web hacking ). Usually also people trying to h4x00r and 0wn their schools networks/websites etc are included :).

Pen-testing ( Penetration testing ) : action where one or more hackers/security experts try to identify security flaws and compromise security of a computer system or a network to prevent any malicious actions to be performed. The results are used as aforementioned to fix the vulnerabilities and improve security of the system

Rooting : part/type of hacking, where hacker is attempting to exploit computer system/network through opened services ( ports ), and rise their access rights within that system, so they can perform intended actions. The name origins in linux systems, where if you get “root” priviledges, you can do basically anything ( including favorite #rm -fr / :D )

Deface : replacing original page/s of a website with hackers own, where hacker somehow gained right to do so ( admin access, backdoor… )

Full disclosure ( IT related ) : this involves providing to the public all information about the vulnerabilities that were found e.g in CMS ( content management system ) including how it was found and/or exploited. It“s been always discussed, as it has several advantages ( admins can fix vulnerabilities before official patch is released etc ) but also few disadvatages ( the information is more used by hackers/crackers to exploit unpatched web site rather then by admins )

And by that I think that the main terms are described, however I“ll appreciate any suggestions to amend current descriptions, or add new ones.

I would also like to state that, as I haven“t used almost any references at all, this article isn“t absolute, and is purely subjective. The descriptions may differ e.g. from wikipedia or urban dictionary, so I“m not forcing anybody to agree with me, however it should give somebody idea, so they can work out their own definitions

Special thanks to COM, who helped I“d say quite radically improve the quality of this article.

Also thanks for great definition of “hacker” and “cracker” by AldarHawk, which is one of the best I“ve ever heard.

Any suggestions for improvement appreciated Thanks for reading clone4

Comments
ghost's avatar
ghost 15 years ago

Good article.

spyware's avatar
spyware 15 years ago

This sucks. It's a very stereotypical view, observed and written about by a nobody. Perhaps you should live through the things you try to explain. Your limited view is nothing more than an observation made, not from atop the tower, but from the very ground you try to demolish with this text.

ghost's avatar
ghost 15 years ago

I found it good man. It explained vaguely but it can be useful for the inexperienced and/or unaware.

clone4's avatar
clone4 15 years ago

spyware: you're right I made these observations, without being at the 'top', therefore I didn't get the full view, but it's hell tough to get there :). But please note that I use adverbs generally and usually on purpose, this means that even though I present probably the most stereotypical views I leave space for exceptions ( and where possible I emphasis that ), but I would say that for most of the time I stated the correct assumptions. I guess that you mostly disagree with the hat hacker descriptions, also because that's the part where I can't apply my previous experience, but again I stated both that it might not be always true and that it's only my personal view…I don't disagree with you , I'm just trying to justify and explain the content of article;)….

ghost's avatar
ghost 15 years ago

For a glossary it seems a bit badly structured, looks more like an essay about the most common things you'll read on hacking sites. Also, it really is just the most common you've chosen, not many words and expressions you've gone through really.

clone4's avatar
clone4 15 years ago

@COM: mhm yeah it's not glossary in the true meaning, but I just couldn't think of better name :) I chose the very very common words, which are either misused, or you see newbies ask about it all the time, but if you have any specifics I can add some…

clone4's avatar
clone4 15 years ago

Ok so I started to work on improvements, but since I've got some travelling to do now, It must wait for few days

Uber0n's avatar
Uber0n 15 years ago

Good as a basic guide, but I think you should add the expression "full disclosure" as well ;)

ghost's avatar
ghost 15 years ago

i thought it was good, i dont agree with the "sterotypical view" spyware mention, everyone fits in some catagory, some peoples place are just more complex then others but yea :thumbs up: :happy:

clone4's avatar
clone4 15 years ago

little update, just to show I'm working on it :) I will further amend the format, hopefully make it more readable. I will also add some more stuff and little change the original

ynori7's avatar
ynori7 15 years ago

your definition of 'hacker' is pretty weak. there are multiple meanings behind the term. for example: originally, and often still, the term 'hacker' is used to refer to an extraordinarily skilled programmer, not a security expert.

this really seems like kind of a pointless article.

ghost's avatar
ghost 15 years ago

Agreed, "hacker" has a very wide definition and could definitely do with a bit more information.

richohealey's avatar
richohealey 15 years ago

It's not bad tbh. Could do with more, but not bad at all. Anyway, I think it needs to be stressed that Hacker is a term of great respect, not just in the security field, for the most part a programmer / sysadmin is wanting to be known eventually as a hacker.

clone4's avatar
clone4 15 years ago

Ok so I think that was the last update. I changed only 'hacker' bit; I used quote of AldarHawk, especially because it's very true, but it doesn't reveal everything and keeps you thinking. I know it isn't perfect, but I am happy with that, because I've tried and hopefully improved it a little, and so far, with my experience etc. it's the best I can create. So Lastly I hope you enjoy it…

bojazz's avatar
bojazz 15 years ago

not bad ..it gives newbie like me some of the idea in term of hacker :D really respect to hacker .. hackerz own the world B)

ghost's avatar
ghost 15 years ago

I don't like it… but, I can't say anything bad about it. You structured it well and did what you set out to do. Apply that approach to a more technical subject, and I'm sure you will write an impressive article.

ghost's avatar
ghost 15 years ago

Yeah I liked it dude. nice one. But as richohealey said, could do things like programmers, sysadmins, network engineers. I know they are not "neccessarily" 'hackers' but they do have a good influence on computing.

Good article though.

ghost's avatar
ghost 14 years ago

I would add "0day", and hacker culture allusions, the manifesto, etc.