Originally, a hacker was someone who made furniture with an axe. In computing slang it is a person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. Also, one who programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming.
- Categories of hackering Tools used by Slayer
- Trojan horse
â€” These are programs designed so that they seem to do or be one thing, such as a legitimate software, but actually are or do another. They are not necessarily malicious programs. A trojan horse can be used to set up a back door in a computer system so that the intruder can return later and gain access.
â€” A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents (for a complete definition: see this article about computer viruses). Thus, a computer virus behaves in a way similar to a biological virus, which spreads by inserting itself into living cells.
- Worm â€” Like a virus, a worm is also a self-replicating program. The difference between a virus and a worm is that a worm does not create multiple copies of itself on one system and that it propogates itself through computer networks.
- Vulnerability scanner â€” A tool used to quickly check computers on a network for known weaknesses. Hackers also use port scanners. These check to see which ports on a specified computer are “open” or available to access the computer.
- Sniffer â€” An application that captures password and other data while it is in transit either within the computer or over the network.
- Exploit â€” A prepared application that takes advantage of a known weakness.
- Social engineering â€” Using manipulation skills in order to obtain some form of information. An example would be asking someone for their password or account possibly over a beer or by posing as someone else.
- Root kit â€” A toolkit for hiding the fact that a computer’s security has been compromised. Root kits may include replacements for system binaries so that it becomes impossible for the legitimate user to detect the presence of the intruder on the system by looking at process tables.