Expert: State-sponsored risk 'going up like crazy'

Hacker Tools and Techniques: Underground Sites and Hacking Groups

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Is your data safe from next-generation attackers?

    In this month's issue of Information Security magazine, get everything you need to know about building an endpoint security solution in our step-by-step guide. Get the inside scoop on next-generation attackers, as we expose (and help you foil) their ... 

  • What are botnets and how can you prepare for them?

    What exactly are botnets and why are they the fastest-growing menaces on the Internet? Get the details in this month's issue of Information Security magazine and learn what you need to do to man the battlements. In addition, read stories about databa... 

  • pre-installed malware

    Pre-installed malware is malicious software that is put on a machine before it is delivered to the user. New devices are usually assumed to be uncompromised but there are numerous reports of malware existing on new hardware. 

  • peer-to-peer botnet (P2P botnet)

    A peer-to-peer botnet is a decentralized group of malware-compromised machines working together for an attacker’s purpose without their owners’ knowledge.  Just as in the traditional botnet, which includes a command-and-control server, the bots are t... 

  • botnet topology

    A botnet topology is the network structure by which botnet interconnections are organized. Botnet topologies may be either centralized around a command and control server (C&C server) or decentralized using peer-to-peer (P2P) communication. 

  • command-and-control server (C&C server)

    A command and control server (C&C server) is the centralized computer that issues commands to a botnet (zombie army) and receives reports back from coopted computers. In the traditional botnet, which includes a C&C server, the bots (or zombies) are t... 

  • Rescator

    Rescator is the name of an underground online forum which allegedly sold credit card data stolen from customers who shopped at the United States discount retail chain, Target.  

  • domain fluxing

    Domain fluxing is a technique used by botnet operators for their command-and-control infrastructures to avoid detection by security technologies and researchers attempting to shut their botnets down. 

  • bug bounty program

    A bug bounty program, also called a hacker bounty program or vulnerability rewards program (VRP), is a crowdsourcing initiative that rewards individuals for finding a software bug and reporting it to the organization offering a monetary reward. 

  • cold boot attack

    A cold boot attack is a process for obtaining unauthorized access to encryption keys stored in the dynamic random access memory (DRAM) chips of a computer system. 

  • device attack

    A device attack is an exploit in which the attacker takes advantage of a vulnerable device to gain network access. 

  • attack vector

    An attack vector is a path or means by which a hacker (or cracker) can gain access to a computer or network server in order to deliver a payload or malicious outcome. 

  • See more Definitions on Hacker Tools and Techniques: Underground Sites and Hacking Groups
About Hacker Tools and Techniques: Underground Sites and Hacking Groups

Hackers are constantly working to update their attack tools, techniques and methods to find new ways to break into databases, networks and PCs. Track their progress and the work of cybercrime investigators with hacking groups, hacker sites and the hacker underground.