Skip to main content

Hackers and their Types


Hackers and their Types
Hacker:  
A Person who illegally breaks into another user computer system is known as Hacker. They are expert in programming and can create tools for hacking. They are dangerous and are sharp minded.
Types:
i)                  Black Hat Hackers
ii)               White hat hackers
iii)            Grey hat hackers
iv)            Script Kiddies
v)               Neophyte
Ø Black Hat Hackers:
Black hat hackers are bad guys. They are bad hackers because they hack to steal money from bank, Credit Card number etc. They have malicious intents. They create viruses and tools for hacking.
Ø White Hat Hackers(Ethical Hackers):
White hat hackers are good guys. They are certified hackers and have C|EH certification. They find weaknesses in systems and fix them means cover the loop holes through which black hat hacker can enter into the system. They protect system from getting hacked.

Ø Grey Hat Hackers:
Grey hat hackers are the combination of black hat and white hat hackers. Sometime they hack with malicious intent and sometime they protect system from getting hacked.
Ø Script Kiddie:
Script kiddie is person who have no knowledge of programming language and cannot create its own tools. They use the tools for hacking made by others. Script kiddies are expert in using hacking tools.
Ø Neophyte:
Neophyte is a person who is new to hacking and cybersecurity. They have little bit knowledge of hacking.

Comments

Popular posts from this blog

Hacking an Facebook ID

Hacking an Facebook ID  There are two methods that are used for hacking Facebook account:        Phishing attack        Token access 1: Phishing attack In phishing attack the attacker downloads the Facebook Login page and then create a database and makes little bit changes in Facebook login page so that victim should login.   The Facebook Phishing page may look like this: Then attacker uploads it to online server or offline server such as Xampp and then creates a tunnel between localhost and Internet to make it available everywhere. The tunnel can be created using ngrok.                Working: The attacker sends it to his victim and when victims login to fake page it redirects it to real Facebook page and the information which user has entered into fake page will be stored in txt file and now hackers can access his/her...

SpyMax malware that targeted Libyan Individuals

Spy Max (Spyware) || Newly found malwares in 2020 || Explained SpyMax: It belongs to surveillance ware family, SpyMax was found targeting Libyan Individuals. It masqueraded as “Corona Live 1.1” to steal photos, media, files, Device location, as well as permission to take pictures and record videos of individuals from infected phone.

Who is Anonymous || Anonymous (The Hacktivists) || Anonymous is in Action

Who is Anonymous || Anonymous (The Hacktivists) || Explained   Anonymous is a decentralized group of Hackers without an identity. They did a first attack in 2003. It has no headquarters so there is no option to join anonymous. They use wrong way to hack but their purpose is to give peoples freedom of speech, Equality and Justice on Internet. Anonymous is basically an idea. They have done many operations and against governments of different countries. The following are some famous operations of Anonymous: ·       OP Dark net (Removed Child Pornography from Dark web) ·       OP Israel (Shutdown approximately 10000 Israeli websites) ·       OP Iran ·       OP Payback Etc. Anonymous uses guy fox masks and there is no way to join the group. Anonymous also had official YouTube Channel. This channel was given by google to Anonymous. Anonymous uploads and tells world the in...