45 Ethical Hacking Terminologies

1. White hat

2. Black hat

3. Grey hat

4. Adware

5. Attack

6. Back door

7. Bot

8. Botnet

9. Brute force attack

10. Buffer overflow

11. Cloaking

12. Clone phishing

13. Cracker

14. DoS

15. DDoS

16. Encryption

17. Exploit

18. Exploit kit

19. Firewall

20. HTTPS/SSL/TLS

21. Keystroke logging

22. Local

23. Malware

24. Master program

25. Payload

26. Phishing

27. Phreaker

28. Ransomware

29. RAT

30. Remote

31. Rootkit

32. Shrink wrap  code

33. Social engineering

34. Spam

35. Spoofing

36. Spyware

37. SQL Injection

38. Target of evaluation

39. Threat

40. Trojan Horse

41. Virus

42. Vulnerability

43. Worm

44. XSS

45. Zero day threat