Hi and welcome to Cyb3r G33ks,So, before start hacking, you should know the basic terms used in hacking. Now,
what is hacking?
Hacking is the act of finding the possible entry points that exist in a computer system or a computer network and finally entering into them. Hacking generally refers to unauthorized intrusion into a computer or a network. Sometimes it is done to harm the systems or to steal sensitive information available on the computer. A person involved in hacking activities is a hacker. Hacker finds the weaknesses in the system to gain access. Sometimes the purpose is to do pen-testing and finding vulnerabilities to make the system more secure but sometimes hackers gain access to damage the system.
A hacker is not a normal person. Hacker always thinks outside the box.Hacker is more than just a login/logout user. Hacker always thinks critically. How the system works, which ports are open etc. Hacking is not always illegal and all hackers are not criminals.As there are a lot of companies who pay millions of dollars to Ethical hackers to find vulnerabilities in their system and secure them.
Types of Hackers
Well known types of hackers are
1. White Hat Hackers.
2. Black Hat Hackers.
3. Grey Hat Hackers
Now will briefly explain who are they and what they do.Lets talk about White hat hackers.
A White-hat hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security. White hat hackers use their skills to improve security by exposing vulnerabilities before malicious hackers can detect and exploit them. Although the methods used by both are the same, but the difference is White-hat hacker has permission to employ them against organization.
Black hat hackers
A Black hat hackers do not use them officially.or with the permission of the owners black Hat Hackers The term black hat hacker is derived from old Western movies, in which the good guys wore white hats and the bad guys wore black hats. A black hat hacker is a person who attempts to find computer security weaknesses and vulnerabilities and exploit them for personal financial gain or other malicious reasons. This differs from white hat hackers. Black hat hackers can inflict major damage on individual computer users as well as large organizations by stealing personal financial information, compromising the security of major systems, or shutting down or altering the function of websites and networks.
Grey Hat Hackers
A Gray Hat Hackers act according to the situation as White or black hat hackers. The Gray hat hackers do not act with malicious intent but they do it for their fun, they exploit a security weakness in a computer system or network without the owner's permission. They intend to bring the weakness to the attention of the owners not using the weakness or the vulnerability of the system for their gain and then they get appreciation in terms of some reward from the owners.
Red hat hackers
A Red hat hackers are again a blend of both black hat and white hat hackers. They usually on the level of hacking government agencies, top-secret information hubs and generally anything that falls under the category of sensitive information.
Blue Hat Hackers
A blue hat hacker is someone who is used to bug test a system before its launch. They look for loopholes that can be exploited and try to close these gaps. Microsoft also uses the term Blue Hat Hackers to represent a series of security briefing events. Script kiddies script kiddie is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others. They have nothing do with the tools code, or how commands in the tools are working. They just download the tools and use them.
Neophyte
A neophyte is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology and hacking. Last but not the least Hacktivist.
A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denial-of-service attacks.
what is hacking?
Hacking is the act of finding the possible entry points that exist in a computer system or a computer network and finally entering into them. Hacking generally refers to unauthorized intrusion into a computer or a network. Sometimes it is done to harm the systems or to steal sensitive information available on the computer. A person involved in hacking activities is a hacker. Hacker finds the weaknesses in the system to gain access. Sometimes the purpose is to do pen-testing and finding vulnerabilities to make the system more secure but sometimes hackers gain access to damage the system.
A hacker is not a normal person. Hacker always thinks outside the box.Hacker is more than just a login/logout user. Hacker always thinks critically. How the system works, which ports are open etc. Hacking is not always illegal and all hackers are not criminals.As there are a lot of companies who pay millions of dollars to Ethical hackers to find vulnerabilities in their system and secure them.
Types of Hackers
Well known types of hackers are
1. White Hat Hackers.
2. Black Hat Hackers.
3. Grey Hat Hackers
Now will briefly explain who are they and what they do.Lets talk about White hat hackers.
A White-hat hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security. White hat hackers use their skills to improve security by exposing vulnerabilities before malicious hackers can detect and exploit them. Although the methods used by both are the same, but the difference is White-hat hacker has permission to employ them against organization.
Black hat hackers
A Black hat hackers do not use them officially.or with the permission of the owners black Hat Hackers The term black hat hacker is derived from old Western movies, in which the good guys wore white hats and the bad guys wore black hats. A black hat hacker is a person who attempts to find computer security weaknesses and vulnerabilities and exploit them for personal financial gain or other malicious reasons. This differs from white hat hackers. Black hat hackers can inflict major damage on individual computer users as well as large organizations by stealing personal financial information, compromising the security of major systems, or shutting down or altering the function of websites and networks.
Grey Hat Hackers
A Gray Hat Hackers act according to the situation as White or black hat hackers. The Gray hat hackers do not act with malicious intent but they do it for their fun, they exploit a security weakness in a computer system or network without the owner's permission. They intend to bring the weakness to the attention of the owners not using the weakness or the vulnerability of the system for their gain and then they get appreciation in terms of some reward from the owners.
Red hat hackers
A Red hat hackers are again a blend of both black hat and white hat hackers. They usually on the level of hacking government agencies, top-secret information hubs and generally anything that falls under the category of sensitive information.
Blue Hat Hackers
A blue hat hacker is someone who is used to bug test a system before its launch. They look for loopholes that can be exploited and try to close these gaps. Microsoft also uses the term Blue Hat Hackers to represent a series of security briefing events. Script kiddies script kiddie is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others. They have nothing do with the tools code, or how commands in the tools are working. They just download the tools and use them.
Neophyte
A neophyte is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology and hacking. Last but not the least Hacktivist.
A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denial-of-service attacks.
Thank you for sharing this awesome information. I'm going to bookmark it 👍👌
ReplyDelete