Skip to main content

Myth about Hackers ? You should Know ?

What is hacking? How many types of hackers are there? Is hacking illegal ?

In which hackers discover loopholes and vulnerabilities/bugs of systems, networks to gain unauthorized access to the system by using those Vulnerabilities. Now a days hacking is also legal and illegal.

Types of Hackers:

1. White Hat Hacker:

They are also known as Ethical Hacker or a Penetration Tester. These people use the same technique used by the black hat hat hackers. They also hack systems, but with permissions. They focus on security and protecting IT systems. White Hat is legal.

2. Black Hat Hacker:

They are also known as an Unethical Hacker or a Security Crackers. These people hack the system illegally to steal money or to achieve their own illegal goals. They find weak security companies like: Banks or other companies, and steal money or credit card information. Black Hat Hacking is illegal.

3. Gray Hat Hacker:

These kind of hackers are mixture of Black Hat Hackers and White Hat Hackers. They can hack system even if they don't have permission to test the security of the system but they will never steal money or damage the system. Grey Hat hacking is sometimes acted legally and sometimes not.


Other Miscellaneous Hackers

Apart from the above well-known classes of hackers, we have the following categories of hackers:

1. Elite Hackers:

This is a social status among hackers, which is used to describe the most skilled. Newly discovered exploits will circulate among these hackers.

2. Script Kiddie:

A script kiddie is a non-expert who breaks into computer systems by using Pre-Packaged automated tools written by others, usually with little understanding of the underlying concept, hence the term Kiddie.

3. Neophyte:

A neophyte, "n00b", or "newbie" or "Green Hat Hacker" is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology and hacking.

4. Hacktivist:

A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most Hacktivism involves website defacement or denial-of-service attacks.




Comments

  1. I guess I am the only one who came here to share my very own experience. Guess what!? I am using my laptop for almost the past 2 years, but I had no idea of solving some basic issues. I do not know how to Crack Softwares Free Download But thankfully, I recently visited a website named free4soft.com
    ProtonVPN

    ReplyDelete
  2. I like your all post. You have done really good work. Thank you for the information you provide, it helped me a lot. I hope to have many more entries or so from you.
    Very interesting blog.
    Kigo Amazon Prime Video Downloader Crack
    ProtonVPN Crack
    Freemake Video Downloader Crack
    ApowerPDF Crack
    Spotify Premium APK Crack

    ReplyDelete
  3. Wow, amazing block structure! How long
    Have you written a blog before? Working on a blog seems easy.
    The overview of your website is pretty good, not to mention what it does.
    In the content!
    eset-internet-security-crack
    ldplayer-crack
    protonvpn-crack
    poweriso-crack

    ReplyDelete

Post a Comment

Popular posts from this blog

Some Important terms in Ethical Hacking ? You Should Know ?

  Ethical Hacking - Terminologies Adware The Adware is a software that target's pre-chosen ads to display on your system. Backdoor  The backdoor is a hidden door to enter in the system by bypassing security measures, such as login protections. Cracker A cracker is one who modifies the software to access the features which are considered undesirable by the person cracking the software, especially copy protection features. Buffer Overflow  Buffer Overflow is a flaw that occurs when more data is written to a block of memory, or buffer, than the buffer is allocated to hold. Denial of service attack (DoS) A denial of service (DoS) attack is a malicious attempt to make a server or a network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the Internet. DDoS    Distributed denial of service attack.

What Configuration is required for hacking ? You Should Know ?

What kind of Hardware or Devices are required to learn Ethical Hacking ?   You can buy Computer or Laptop or Raspberry PI for Hacking, and the rest are depending on your work. If I am talking about my configurations then, I have nothing at that time when I was starting. But I describe my first laptop configuration right below you can check and take better idea, Which is best for you.  My First Laptop Config: 1. Brand: HP 2. Model: Pro Book 445 G1  3. Colors: Anodized Aluminum  4. Operating System: (Windows 7/ Windows 10/ Kali Linux) (**NOTE: I am able to dual boot easily with Windows 10 and Kali Linux, I used different operating system in HP Pro Book.) 5. Processor: AMD Dual Core A6-5350M 6. Graphic Processor: AMD Radeon HD 8450G 7. RAM: 8 GB DDR3 8. HDD Capacity: 320 GB   You can check REFERENCE about my first Laptop.   REFERENCES: https://www.91mobiles.com/hp-445-g1-amd-elite-8-gb-320-gb-ubuntu-laptop-price-in-india-62351