Expert: State-sponsored risk 'going up like crazy'
  • Expert: State-sponsored risk 'going up like crazy'

    Expert: State-sponsored risk 'going up like crazy'

    Former U.S. national security advisor Greg Rattray believes better cybersecurity intelligence is needed to combat a growing "Internet underground."

  • MORE HIGHLIGHTS

    Decoding the mysteries of steganography

    Expert Joe Granneman explains how steganography works, and the ways it can both protect and threaten enterprise data.

  • How to defend against an AET attack

    Expert Brad Casey explains advanced evasion techniques and details how to protect enterprise networks against the likelihood of an AET attack.

  • cold boot attack

    A cold boot attack is a process for obtaining unauthorized access to encryption keys stored in the dynamic random access memory (DRAM) chips of a c...

Hacker Tools and Techniques: Underground Sites and Hacking Groups

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Is your data safe from next-generation attackers?

    In this month's issue of Information Security magazine, get everything you need to know about building an endpoint security solution in our step-by-step guide. Get the inside scoop on next-generation attackers, as we expose (and help you foil) their ... 

  • What are botnets and how can you prepare for them?

    What exactly are botnets and why are they the fastest-growing menaces on the Internet? Get the details in this month's issue of Information Security magazine and learn what you need to do to man the battlements. In addition, read stories about databa... 

  • cold boot attack

    A cold boot attack is a process for obtaining unauthorized access to encryption keys stored in the dynamic random access memory (DRAM) chips of a computer system. 

  • device attack

    A device attack is an exploit in which the attacker takes advantage of a vulnerable device to gain network access. 

  • differential power analysis (DPA)

    A differential power analysis (DPA) attack is an exploit based on analysing the correlation between the electricity usage of a chip in a smart card and the encryption key it contains. 

  • voluntary botnet

    A voluntary botnet is a distributed network of computers whose processing power is harnessed to carry out a political or socially-motivated denial of service (DoS) attack. 

  • TDL-4 (TDSS or Alureon)

    TDL-4 is sophisticated malware that facilitates the creation and maintenance of a botnet.  The program is the fourth generation of the TDL malware, which was itself based on an earlier malicious program known as TDSS or Alureon. 

  • differential power analysis (DPA)2

    A differential power analysis (DPA) attack is an exploit based on analysing the correlation between the electricity usage of a chip in a smart card and the encryption key it contains. 

  • privilege escalation attack

    A privilege escalation attack is a type of network intrusion that takes advantage of programming errors or design flaws to grant the attacker elevated access to the network and its associated data and applications. 

  • Pwn2Own

    Pwn2Own is an annual hacking competition sponsored by security vendor TippingPoint and held at the CanSecWest security conference. 

  • alternate data stream (ADS)

    An alternate data stream (ADS) is a feature of Windows New Technology File System (NTFS) that contains metadata for locating a specific file by author or title. 

  • zero-day exploit

    A zero-day exploit is one that takes advantage of a security vulnerability on the same day that the vulnerability becomes generally known...(Continued) 

  • See more Definitions on Hacker Tools and Techniques: Underground Sites and Hacking Groups
About Hacker Tools and Techniques: Underground Sites and Hacking Groups

Hackers are constantly working to update their attack tools, techniques and methods to find new ways to break into databases, networks and PCs. Track their progress and the work of cybercrime investigators with hacking groups, hacker sites and the hacker underground.