What is Hacking? & Types of Hackers



Hacking in the field of computer security refers to exploiting system vulnerabilities and compromising security controls to gain unauthorized or inappropriate access to system resources. It involves modifying system or application features to achieve a goal outside its creator's original purpose. Hacking can be done to steal, pilfer, and redistribute intellectual property, thus leading to business loss.
Hacking on computer networks is generally done by means of scripts or other network programming. Network hacking techniques include creating viruses and worms, performing denial-of-service (DoS) attacks, establishing unauthorized remote access connections to a device using Trojans/backdoor, creating botnets, packet sniffing, phishing, and password cracking. The motive behind hacking could be to steal critical information and/or services, for thrill, intellectual challenge, curiosity, experiment, knowledge, financial gain, prestige, power, peer recognition, vengeance and vindictiveness, and so on.
A hacker is a personal WHO uses pc, networking or different skills to beat a technical downside. The term hacker may visit anyone with technical skills; however it usually refers to someone WHO uses his or her skills to realize unauthorized access to systems or networks so as to commit crimes. A hacker may, for instance, steal data to hurt people via fraud, injury or bring down systems and, often, hold those systems captive to gather ransom.

Types of hackers
To detail on the above-broached objectives of hacking, it's necessary to understand what kinds of hackers are there within the cyber section therefore on differentiate between the roles and objectives.
The security community has informally used references to hat colour as some way differing kinds of hacker AR identified, sometimes divided into 3 types: white hat, black hat and grey hat.
• White hat hackers, additionally called ethical hackers, try to work within the public's best interest, instead of to make turmoil. Many white hat hackers work doing penetration testing, hired to try to interrupt into the company's networks to search out and report on security vulnerabilities. The protection companies then help their customers mitigate security problems before criminal hackers will exploit them.
Black hat hackers intentionally gain unauthorized access to networks and systems with malicious intent, whether or not to steal information, unfold malware or benefit from ransom ware, vandalise or otherwise injury systems or for the other reason -- as well as gaining infamy. Black hat hackers are criminals by definition because they violate laws against accessing systems while not authorization, however they'll additionally interact in different criminal activity, together with fraud and distributed denial-of-service attacks.
Gary hat hacker’s fall somewhere between white hat hackers and black hat hackers. Whereas their motives is also almost like those of white hat hackers, grey hats are a lot of possible than white hat hackers to access systems while not authorization; at identical time, they're a lot of possible than black hat hackers to avoid doing unneeded injury to the systems they hack. Though they are not generally -- or solely -- actuated by cash, grey hat hackers could provide to fix vulnerabilities they need discovered through their own, unauthorized, activities instead of exploitation their information to use vulnerabilities for illegal profit.
Hackers of all kinds participate in forums to exchange hacking data and trade craft. There is variety of hacker forums wherever white hat hackers will discuss or raise questions about hacking. Different white hat forums provide technical guides with step wise directions on hacking.

Types of hacking
one of the most frequent threats of hacking is those faced by the websites. It’s very common to see a specific web site or on-line account being hacked open intentionally exploitation unauthorized access and its contents being modified or created public. The net sites of political or social organizations are the frequent targets by teams or people opposition them. It’s additionally not uncommon to check governmental or national data web site being hacked. A number of the well-known strategies in web site hacking are:
• Phishing
This implies replicating the initial web site so the unsuspecting user enters the data like account password, MasterCard details, that the hacker seizes and misuses. The banking websites are the frequent target for this.
• Virus
these are discharged by the hacker into the files of the web site once they enter into it. The aim is to corrupt the data or resources on the web site.
• UI redress
in this technique the hacker creates a fake user interface and once the user clicks with the intent of planning to a definite web site, they're directed to a different website altogether.
• Cookie theft
Hackers accesses the website exploitation malicious codes and steal cookies that contain lead, login passwords etc.
• DNS spoofing
This primarily uses the cache information of a web site or domain that the user might need forgotten regarding. It then directs the info to a different malicious web site

Who is a Hacker? Types of Hackers
A hacker is a person, who breaks into a system or network without any authorization to destroy, steal sensitive data, or performs malicious attacks. Hacker is an intelligent individual with excellent computer skills, along with the ability to create and explore into the computer's software and hardware. Usually a hacker would be a skilled engineer or programmer with enough knowledge to discover vulnerabilities in a target system. She/he is generally a subject expert and enjoys learning the details of various programming languages and computer systems.
For some hackers, hacking is a hobby to see how many computers or networks they can compromise. Their intention can be either to gain knowledge or to poke around to do illegal things. Some do hacking with malicious intent behind their escapades, like stealing business data, credit card information, social security numbers, email passwords, etc.
A Hacker is a one who finds and exploits the weakness in pc systems and/or networks to realize access. Hackers are sometimes skilled pc programmers with data of pc security.
Hackers are classified in step with the intent of their actions. The subsequent list classifies hackers consistent with their intent.
Ethical Hacker (White hat): A hacker WHO gains access to systems with a read to fix the identified weaknesses. They will additionally perform penetration Testing and vulnerability assessments.
Cracker (Black hat): A hacker who gains unauthorized access to pc systems for private gain. The intent is sometimes to steal company information, violate privacy rights, transfer funds from bank accounts etc.
Grey hat: A hacker who is in between moral and black hat hackers. He/she breaks into pc systems while not authority with a read to spot weaknesses and reveals them to the system owner.
Hacktivist: A hacker who use hacking to send social, religious, and political, etc. messages. This can be sometimes done by hijacking web sites and exploit the message on the hijacked website.
Phreaker: A hacker who identifies and exploits weaknesses in telephones rather than computers.
Script kiddies: A non-skilled one that gains access to pc systems using already created tools.

Comments

Post a Comment

Popular posts from this blog

ISO 27001 Annex : A.5 Information Security Policies

Top 5 Key Elements of an Information Security

Types of Vulnerability Assessment