- Version
- Download 28
- File Size 4.03 MB
- File Count 1
- Create Date April 2, 2023
- Last Updated April 2, 2023
D I S C L A I M E R
This book has been published for education purpose only. It does not in deem to legitimize certain steps that may be illegal under applicable law and organization policies in different parts of the world. This book does not contain any legal permission on what may be deemed as legal. Readers are advised to examine the privacy policy, organization policies and the laws of respective countries before taking their own decisions. They cannot rely on the present publication as a defense in any proceeding. The publisher and author are not liable for any steps that a reader may take based on this publication and are not responsible for any steps that may have been taken after reading the publication. Microsoft Windows and any other marks used (Pictures, Screen Shots, etc.) have been used descriptively as the marks are owned by third parties.
What is hacking?
The most fundamental meaning of hacking is gaining unauthorized access to data in a system or computer. There are different types of hackers and these include:
1) White hat hacker
The term “White hat hacker” refers to an ethical hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization’s information systems. Ethical hacking is a term coined by IBM meant to imply a broader category than just penetration testing. White-hat hackers are also called penetration tester, sneakers, red teams, or tiger teams. Generally, White hat
hackers or ethical hackers are the good guy in the world of hackers.
2) Black hat hacker
A black hat hacker is an individual with extensive computer knowledge whose purpose is to breach or bypass internet security. Black hat hackers are also known as crackers or dark-side hackers. The general view is that, while hackers build things, crackers break things. They are computer security hackers that break into computers and networks or also create computer viruses. The term “black hat” comes from old westerns where the bad
guys usually wore black hats. Black hat hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network.
They choose their targets using a two-pronged process known as the “pre-hacking stage”.
Step 1: Targeting
Step 2: Research and Information Gathering
Step 3: Finishing the Attack
3) Grey hat hacker
A grey hat hacker is a combination of a black hat and a white hat hacker. It may relate to whether they sometimes arguably act illegally, though in good will, or to show how they disclose vulnerabilities. They usually do not hack for personal gain or have malicious intentions, but may be prepared to technically commit crimes during the course of their technological exploits in order to achieve better security.
4) Elite hacker
A social status among hackers, elite is used to describe the most skilled. Newly discovered activities will circulate among these hackers.
5) Script kiddie
A script kiddie (or skiddie) is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, usually with little understanding of the underlying concept hence the term script (i.e. a prearranged plan or set of activities) kiddie (i.e. kid, child an individual lacking knowledge and experience, immature).