Explaining the Most Popular Cybersecurity and Hacking Terms

Know Hacking Terminologies

Checking

Said you download an account list using software (checker) that tries to log into the account with your ip or proxy and if it's correct it shows as a hit.

Open bullet

The open bullet is one of the most popular programs used for Checking accounts nowadays, very stable and up to date.

It included many features with a GUI interface, easy to use.

Combo

A list of Username: Password or Email: Password, mostly saved on a text file.

Proxy

For checking, it's a list of IP: Port / IP:Port:User: Pass, mostly saved on a text file. There are three different main types of proxies: HTTP / SOCKS4 / SOCKS5

Proxies are important because without them you will be limited on how many attempts you can make while checking passwords.

Config

Simply explained, what you use to crack a specific site, for example, if I want Netflix accounts I use a Netflix config.

Explain some words used for config:

- Proxyless: without proxy - Capture: capture information about the account like the type of the sub/date of expiration/amount of points - Captchaless: a config that bypasses the captcha using a private API.

RDP

(Remote Desktop Protocol) RDP is a network communications protocol developed by Microsoft, which allows users to remotely connect to another computer.

It is very important to use RDP when checking for speed.