SlideShare a Scribd company logo
Hacker’s Jargons
pavanw3b
$ whoami
• Pavan aka pavanw3b
• Security Engineer @ ServiceNow
• n|u core team
• Other boring details at
pavanw3b.com
What?
• A small dictionary for hackers
• InfoSec, admin, developers
• .. ORDER BY `title` ASC
Why?
• Don’t get lost
• Express better
• Know what you do
• Know what somebody did
Method
• Quiz?
• Rewards
• 9 Humla & bachav wild card entry
• First hand raise I see
Cipher, Ciphertext
Cypher
Encryption Algorithm
Encrypted text
Disinformation
Providing wrong information intentionally
Drive-by Download
Visit – Download malware
Dropper
Settle first - call friends
Single Stage, Double Stage
Avoid detection
Dumpster diving
Make use of the dumped stuffs
Legal in the US
False Positive
!True Security issues
Scanners
Fuzzing
Fuzz Testing
Bombard with junk to make a sense
System Errors, Bugs
ITW
In The Wild
Malware Spread Worldwide
Logic Bomb
Explode at certain Logic
Hidden Malicious Code
Monkey Patching
Patch else’s code to protect yourself
Third party Library
Nonce
Number used ONCE
Identify genuine stuffs
Crypto: authentication, Hashing, CSRF
wp nonce
Pharming
Phishing without a lure
Redirection by Malware
Piggybacking
Gain unauthorized access
By exploiting authorized legitimate
Ransomware
Lock down – Ask Ransom
Remote Private Key
Catch me if you can
RAT
Remote Access Trojan
Remote Administration
Games, email attachments
Retroactive Bug
Activate a Retro Bug
While patching another bug
Thanks to @Danish
Rogue Program
False Positive - Infect
Shoulder Surfing
Look over Shoulder
SMShing
Phishing by SMS
Spear Phishing
Phishing from the Names you know
STR
Steps To Reproduce
POC
Time Bomb
Logic Time Bomb
Typosquatting
Typo Friendly URLs
Vishing
Voice Phishing
VoIP
Wardriving
Keep driving, Keep Scanning WiFi
Watering Hole
Infect websites – target browse
Thanks to @Sujay
Whaling
Emails with malicious links
Executives & Top Management
Contact details are public
To Steal Corporate Secrets
Zero Day
Exploit Security Vulnerability widely
Before owner comes to know
Before developer hurries to patch
Zombie
Compromised device
To Perform any malicious taks
Controlled remotely
Zoo
Collection of malwares
Thanks for bearing
Pavan
fb/pavanw3b | @twitter | pavanw3b.com
thedarkw3b.com/hackers-dictionary-jargons/
How was this new thing that we tried?

More Related Content

PPTX
PPT
Log Forensics from CEIC 2007
PPT
CONFidence 2007 Log Forensics TEASER Preso
PPTX
Ethical Hacking
DOCX
Tom's resume rev.July 2015
PPTX
Tips To Start-Up Small Business Entrepreneur
PPTX
Pros of mobile app marketing, mobile app development
PPTX
MOOC, The chronicles
Log Forensics from CEIC 2007
CONFidence 2007 Log Forensics TEASER Preso
Ethical Hacking
Tom's resume rev.July 2015
Tips To Start-Up Small Business Entrepreneur
Pros of mobile app marketing, mobile app development
MOOC, The chronicles

Viewers also liked (6)

PDF
Nifast Product Offerings
PDF
Cubic Interior Solution
PDF
CV_Krishnendu Roy_January 2017
PDF
Five Reasons to Become a DJ
PDF
Flippedclassrooms 150712022812-lva1-app6892
PDF
Dongluchoccongtrinh(baihoc)
Nifast Product Offerings
Cubic Interior Solution
CV_Krishnendu Roy_January 2017
Five Reasons to Become a DJ
Flippedclassrooms 150712022812-lva1-app6892
Dongluchoccongtrinh(baihoc)

Similar to Hacker's jargons (20)

PDF
Malware analysis _ Threat Intelligence Morocco
PPTX
Fun with Application Security
PPTX
Malware analysis
PPT
Overview of information security
PPTX
Blitzing with your defense bea con
PPTX
Cyber Security Workshop GDSC-BITW
PPTX
Security is not a feature
PDF
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
PDF
Keith J. Jones, Ph.D. - Crash Course malware analysis
PPTX
Defcon Crypto Village - OPSEC Concerns in Using Crypto
PPT
Cf.Objective.2009
PPTX
An Adversarial View of SaaS Malware Sandboxes
PPTX
OWASP A1 - Injection | The art of manipulation
PPTX
Corp Web Risks and Concerns
PPTX
Vaccination - The Anti-Honeypot Approach @ Bsides TLV
PPTX
CheckPlease - Payload-Agnostic Implant Security
PPTX
Ethical_Hacking_Presentation_KaifRahaman.pptx
PDF
Hacking sites for fun and profit
PPTX
How to hack or what is ethical hacking
Malware analysis _ Threat Intelligence Morocco
Fun with Application Security
Malware analysis
Overview of information security
Blitzing with your defense bea con
Cyber Security Workshop GDSC-BITW
Security is not a feature
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
Keith J. Jones, Ph.D. - Crash Course malware analysis
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Cf.Objective.2009
An Adversarial View of SaaS Malware Sandboxes
OWASP A1 - Injection | The art of manipulation
Corp Web Risks and Concerns
Vaccination - The Anti-Honeypot Approach @ Bsides TLV
CheckPlease - Payload-Agnostic Implant Security
Ethical_Hacking_Presentation_KaifRahaman.pptx
Hacking sites for fun and profit
How to hack or what is ethical hacking

Recently uploaded (20)

PDF
cuic standard and advanced reporting.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Encapsulation theory and applications.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Electronic commerce courselecture one. Pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Empathic Computing: Creating Shared Understanding
cuic standard and advanced reporting.pdf
Encapsulation_ Review paper, used for researhc scholars
Diabetes mellitus diagnosis method based random forest with bat algorithm
Encapsulation theory and applications.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Electronic commerce courselecture one. Pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Big Data Technologies - Introduction.pptx
Understanding_Digital_Forensics_Presentation.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Network Security Unit 5.pdf for BCA BBA.
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
“AI and Expert System Decision Support & Business Intelligence Systems”
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Empathic Computing: Creating Shared Understanding

Hacker's jargons