Skip to main content

Hacking Terms you need to know

On the spy software training blog you will come across various 'hacker' terms. Here are some of the important terms you need to know if you are interested in Penetration Testing (Hacking Tools and Spy Software).

Hacker Some believe that hacker means a skilled and enthusiastic programmer and that a 'cracker' is someone that breaks into system. In the sense that we will use hacker, a hacker is a person who uses computers to gain unauthorized access to data.
Penetration Testing Penetration Testing is when a company ask you to try to hack into their system. They sometimes want to do this to see if their system is secure, and if it is not (if you succeed), they want a report on how you managed to get into their system.
White Hat A 'White Hat' is a good hacker doing only ethical hacking. Examples would be to someone working for the authorities or a person doing Penetration Testing for a company.
Black Hat A black hat is a 'bad' hacker. Using his skills for criminal activities with no regard to people's privacy or damage caused.
Grey Hat A Grey Hat is a hacker that is sometimes willing to cross the line and do a bit of illegal hacking if he can morally justify what he is doing (even if it is just to himself).
Hacktivist A person who gains unauthorized access to computer files or networks in order to further social or political ends.
Target The person you want to monitor or the computer with the data you are looking for.
Social Engineering Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. redpill Hacker has various Social Engineering Templates that can be used for different scenarios. 
Con A con is a confidence trick. You trick someone into winning their confidence so that you can get them to divulge information or perform a task like opening an attachment. A con is part of a social engineering attack.
Payload In computer security, payload refers to the part of malware which performs a malicious action. In redpill Hacker, the payload is attached to an email or a website and is delivered to the target PC. The payload will then secretly install the spy software.
Phishing The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers, online.
Spear Phishing Spear Phishing is a more targeted attack. The attacker first spend some time finding information about the target. When the phishing email is then sent to the target, it contains a lot of personal information about the target – giving the target a sense of familiarity and trust.


  1. Thanks for sharing, nice post!

    Dịch vụ mua hàng xách tay mỹ hay dịch vụ mua hàng trên aliexpressmua hàng trên taobao hay dịch vụ nhận đặt mua hàng trên trang web taobao com tiếng việt hay taobao tiếng việt uy tín, giá rẻ. Mẹ nên mua may dua vong tu dong cho bé loại nào tốt hay những những công việc làm thêm tại nhà lương cao hiệu quả, chương trình tuyển cộng tác viên bán quần áo trẻ emtuyển cộng tác viên bán hàng mỹ phẩm lương cao tại nhà.


Post a Comment

Popular posts from this blog

How to remotely install spy software

---------------------------------------------------------------------------------------------- Update (2015/07/07):  redpill now has a new and better product for installing spy software remotely: redpill Hacker
You can also have a look at newer articles with better tools at: -----------------------------------------------------------------------------------------------
In a previous article we discussed how to get usernames and passwords from other users on a computer you have access to. We will now look at how to install spy software on a computer you do not have access to … even if the computer is on the other side of the world.

Step 1: Get quality Spy Software

You will need quality spy software that can be remotely installed and is not easily detected and removed by anti-virus. There are a couple of key loggers that can be installed remotely, but very few that can secretly be remotely installed.

redpill Detective has been designed to be covertly installed…

Sending a spy program with gmail

To install a spy program remotely you need to email the target an install module. Spy software like redpill Agent and redpill Detective allows you to hide the install module within a 'cover application' . When emailing the target the install module, you will need either zip the file, embed it into wordpad or send it as a link as most email service providers doesn't allow you to add executables (exe's) as attachments.

To see how to send the spy program as a link see 'Installing spy software with a link'.
To see how to embed the spy program in wordpad, see  'How to remotely install spy software'.

Using a zipped file for the attachment can be a problem when either you or your target is using gmail as gmail will block attachments that contain executables even when they are zipped.

There is however a simple solution to the problem:

Add a password to your zip file

In winrar and winzip you can choose to add a password to your zip/rar file. When you add a passwo…

How to get a username and password

---------------------------------------------------------------------------------------------- Update (2015/07/07):  redpill now has a new and better product available: redpill Hacker

You can also see more up to date articles at:
This article will explain how to get a username and password for an email account like gmail or yahoo or a social network account like facebook.

In this article we will focus on getting a username and password of another user (the target) on a computer that you have access to. In a following article we will explain how to get a username and password from someone that works on a computer that you do not have access to that might be in another part of the world.

Step 1: Install a key logger

You will need to download and install a key logger that is not easily detected by anti-virus software and that is completely hidden and discreet