45 Ethical Hacking Terminologies
1. White hat
2. Black hat
3. Grey hat
4. Adware
5. Attack
6. Back door
7. Bot
8. Botnet
9. Brute force attack
10. Buffer overflow
11. Cloaking
12. Clone phishing
13. Cracker
14. DoS
15. DDoS
16. Encryption
17. Exploit
18. Exploit kit
19. Firewall
20. HTTPS/SSL/TLS
21. Keystroke logging
22. Local
23. Malware
24. Master program
25. Payload
26. Phishing
27. Phreaker
28. Ransomware
29. RAT
30. Remote
31. Rootkit
32. Shrink wrap
code
33. Social engineering
34. Spam
35. Spoofing
36. Spyware
37. SQL Injection
38. Target of evaluation
39. Threat
40. Trojan Horse
41. Virus
42. Vulnerability
43. Worm
44. XSS
45. Zero day threat