Types of Hackers

Posted on Wednesday, November 16, 2011 by Tenderfoot

Types of hackers

Hackers are divided into three categories :

1)    white hat hackers   2)    black hat hackers  3)    gray hat hackers

White hat hackers :


They are generally security professionals white hat hackers in computer slang’s refers to an ethical hacker, a penetration or vulnerabilities tester or a security expert

White hat hackers are computer security experts who specialize in penetration testing and other testing methodologies, to ensure security. This white hat hacker uses the computer security tools, hacker tools and tactics to find or identify the exploits or vulnerabilities and works for security

Now basically saying white hat hackers uses hacking techniques and skills in an ethical manner i.e. in defense purposes


Black hat hackers :


Comparing to white hat hackers black hat hackers are villains or bad guy’s , especially as the name suggests white hat hackers uses the hacking techniques for their profit , it can be from stealing information or money  by gaining unauthorized access or by destroy vital data Or anything it means they intent to cause problems for their subjects or targets .

They break the Law, exploit Vulnerabilities, in other words they violate the system integrity with malicious intent.
 



Gray Hat hackers :

These hackers generally hack to learn. These types of hackers are the combination of both i.e. white hat hackers and Black hat hackers. Gray hat hackers may work for offensive purposes or defensive, depends on the situation and the choice.

There are self proclaimed ethical hackers, who are interested in gaining knowledge mostly for curious purposes. Most of the people fall in this category



Ethical hackers are up against several individuals in the battle to secure the network. The following list presents some of the more commonly used terms for these attackers:

Phreakers —
The original hackers. These individuals hacked telecommunication and PBX systems to explore the capabilities and make free phone calls. Their activities include physical theft, stolen calling cards, access to telecommunication services, reprogramming of telecommunications equipment, and compromising userids and passwords to gain unauthorized use of facilities, such as phone systems and voice mail.
Script/Click Kiddies —
A term used to describe often younger attackers who use widely available freeware vulnerability assessment tools and hacking tools that are designed for attacking purposes only. These attackers typically do not have any programming or hacking skills and, given the techniques used by most of these tools, can be defended against with the proper security controls and risk mitigation strategies.
Disgruntled Employee —
Employees who have lost respect and integrity for the employer. These individuals might or might not have more skills than the script kiddie. Many times, their rage and anger blind them. They rank as a potentially high risk because they have insider status, especially if access rights and privileges were provided or managed by the individual.
Whackers —
Whackers are typically newbies who focus their limited skills and abilities on attacking wireless LANs and WANs.
Software Cracker/Hacker —
Individualswho have skills in reverse engineering software programs and, in particular, licensing registration keys used by software vendors when installing software onto workstations or servers. Although many individuals are eager to partake of their services, anyone who downloads programs with cracked registration keys are breaking the law and can be a greater potential risk and subject to malicious code and malicious software threats that might have been injected into the code.
Cyber-Terrorists/Cyber-Criminals
An increasing category of threat that can be used to describe individuals or groups of individuals who are typically funded to conduct clandestine or espionage activities on governments, corporations, and individuals in an unlawful manner. These individuals are typically engaged in sponsored acts of defacement; DoS/DDoS attacks identify theft, financial theft, or worse, compromising critical infrastructures in countries, such as nuclear power plants, electric plants, water plants, and so on.
System Cracker/Hacker —
Elite hackers who have specific expertise in attacking vulnerabilities of systems and networks by targeting operating systems. These individuals get the most attention and media coverage because of the globally affected viruses, worms, and Trojans that are created by System Crackers/Hackers. System Crackers/Hackers perform interactive probing activities to exploit security defects and security flaws in network operating systems and protocols.
Now that you have an idea who the legitimate security professionals are up against, let’s briefly discuss some of the better known crackers and hackers.


Source

Credit

No Response to "Types of Hackers"

Leave A Reply