Hacked: Hacking Finance

Hacked: Hacking Finance


Navigation
CategoryKnowledge Base
Featured

Knowledge Base

Freeware

Posted on September 13th, 2016.

Freeware refers to software that is free to use, without advertisement or payment. Although most open source software is also freeware, the term is generally reserved for software that is not open source but is still free — as in free beer, not freedom.

Featured

Knowledge Base

Malware

Posted on September 13th, 2016.

Malware is a broad category which encompasses any software which may act contrary to the user’s demands. For this reason, various subcategories, including scamware and ransomware have been created over the years to more precisely define malware. Some viruses can be considered malware, if they were downloaded with some other stated...

Featured

Knowledge Base

Malvertising

Posted on September 13th, 2016.

“Malvertising” is short for malicious advertising and refers to online advertisements which seek to download malware onto the computer of the viewer. Malvertising campaigns are run similar to normal advertising campaigns, although they are typically more likely to thrive in areas of the Internet where other advertisers...

Featured

Knowledge Base

Adware

Posted on September 13th, 2016.

Adware refers to software that is free to acquire and use, but also includes ads, sometimes ads which use network and dynamically change, and therefore can occasionally be vulnerable to malvertising and malware. While considered freeware, the fact that they require the user to view advertisements in order to use them makes them...

Featured

Knowledge Base

Wiki: Darknet Market

Posted on January 13th, 2016.

A darknet market, also referred to as a “DNM” is, in its most basic meaning, a marketplace on the dark web. However, most darknet marketplaces exist because of the types of goods that are trafficked, including illicit drugs, pornography, guns, and/or stolen goods.

Featured

Knowledge Base

Wiki: Bicycle Attack

Posted on January 11th, 2016.

An HTTPS Bicycle Attack or TLS Bicycle Attack refers to a method of discovering password length on encrypted packets transmitted via SSL, or HTTPS. The name is in reference to the fact that contents of the package may not be known, but certainly the dimensions of the package can be known, in the same way that a gift-wrapped bicycle at...

Featured

Knowledge Base

Wiki: Guide to Preventing SYN Floods

Posted on January 8th, 2016.

As you are probably aware by navigating here, a SYN Flood’ or SYN Attack is a DoS and/or DDoS method of attack which takes advantage of the three-way handshake in TCP/IP networking. In this guide, we aim to help system administrators mitigate the effects of and even fully prevent against SYN flooding. This guide is especially...

Featured

Knowledge Base

Wiki: DDoS

Posted on January 6th, 2016.

A distributed denial-of-service attack or DDoS for short refers to the use of more than one system to attack a target system, usually a web server, in order to prevent regular access to that system. It is presently one of the most common cyber attacks.

Featured

Knowledge Base

Wiki: Guide to Accessing the Dark Web

Posted on January 5th, 2016.

The dark web is a vast and lawless section of the Internet. It is not to be confused with the deep web. The very purpose of the hidden Internet is to avoid censorship, so the first thing to get rid of is your notion that things are under control. Browsing the dark web may result in seeing things that offend or shock you.

Featured

Knowledge Base

Wiki: Root Kit

Posted on December 30th, 2015.

A root kit or rootkit is a software suite, most often malicious in nature, which is designed to allow an unauthorized user to have root privileges on a system. As early as 1983, rootkits were foreseen by a creator Unix, Ken Thompson, who described an attacker subverting the C compiler and using a code injection technique to allow...

Featured

Knowledge Base

Wiki: Bash Injection

Posted on December 29th, 2015.

A bash injection, also called shell injection or command injection is any method of code injection which involves escalating privileges from none to root and thus having full control of the system. While this definition may be more detailed than a fairer description, it is important to note that a bash injection which does not result in...

Featured

Knowledge Base

Wiki: Keylogger

Posted on December 28th, 2015.

Also known as a keystroke logger or keyboard capture, a keylogger is a piece of software that allows an attacker to record every stroke of a keyboard. The data can be made human readable through some formatting, but ultimately the primary purpose is the capturing of passwords and other sensitive data, as attempting to make sense of...

Featured

Knowledge Base

New at Hacked’s Wiki: l0pht

Posted on December 26th, 2015.

L0pht was originally founded by Boston-area hackers in 1992 as a collective space for the members to store computer equipment and conspire on various computer-related projects. As computing became increasingly consumer-facing, the members quit their day jobs and formed a for-profit venture known as L0pht Heavy Industries which they...

Featured

Knowledge Base

New at Hacked’s Wiki: Dark Web

Posted on December 25th, 2015.

Dark web is a term used to refer to thousands of web sites and communities which utilize the public Internet but are not accessible without specific software configurations, such as Tor and i2p. Tor and i2p are respectively their own darknets. Dark web is often confused with deep web, which is a term used to reference the millions of web...

Featured

Knowledge Base

New at Hacked’s Wiki: Phishing

Posted on December 24th, 2015.

Phishing is a method of social engineering which relies on deception to fool unsuspecting users into giving account information, financial information, and other information which is useful to the attacker. Historically it has been mostly conducted by written correspondence, but more recently attacks have been conducted over the phone...

Featured

Knowledge Base

New at Our Wiki: List of Notable Breaches

Posted on December 23rd, 2015.

What follows is a comprehensive, reverse-chronological list of network security breaches which were notable and newsworthy. Each breach contains a brief description and includes a link to Hacked’s reporting on the subject (if available), as well as a link to the Hacked Wiki article regarding the breach.

Featured

Knowledge Base

Wiki: Cryptography

Posted on December 21st, 2015.

Cryptography is also called cryptology and is defined by the Merriam-Webster dictionary as “the enciphering and deciphering of messages in secret code or cipher; also: the computerized encoding and decoding of information.”

Featured

Knowledge Base

New at Hacked’s Wiki: List of Pentest Tools

Posted on December 20th, 2015.

Those looking to get into hacking or simply interested in verifying their own security status may be interested to know what tools are presently available to them. What follows is an incomplete list of penetration testing tools. Please feel free to make any additions or corrections by creating an account and editing this page.

Featured

Knowledge Base

Wiki: Penetration Testing

Posted on December 18th, 2015.

Penetration testing, also called pentesting, is an attack method which scans for broad vulnerabilities in networked computers. It is primarily used in professional settings in order to ascertain the status of security in a machine.