Hackers
Hackers can be classified into different categories such as white hat, black hat, and gray hat, based on their intent of hacking a system. These different terms come from old Spaghetti Westerns, where the bad guy wears a black cowboy hat and the good guy wears a white hat.
Hackers are those people who using computer, network, or other skills to overcome technical issues. The term can also refer to the use of their skills to obtain unauthorized access to people who submit a crime in Cyber Crime Portal. For Example_ Hacker’s can steal information to hurt personal through identity, and usually use it as a person who picks up rescue.
HOW MANY TYPES OF HACKER’S?
- White Hat Hackers.
- Black Hat Hackers.
- Gray Hat Hackers.
- Script Kiddies.
- Green Hat Hackers.
- Blue Hat Hackers.
- Red Hat Hackers
Theys are also referred to as moral hackers. They never intend to damage the system, try to find weaknesses on a computer or network system, as part of the penetration test and the evaluation of vulnerability. Hired companies for penetration assessments and vulnerability assessments. Moral hackers are not illegal.
2. Black Hat hacker
They are also known as cookies, are those cracks to access unauthorized system and damage their operations or steal sensitive information. Including the date of the violation of privacy, and destroying the system, avoiding network communications. The Black Hat hackers are due to their bad intentions.
3. Gray Hat Hacker
Gray Hat Hacker is a mix of black hat and white hat hacker. Use with of their fun, they use safety weaknesses on the computer or the network without a property or knowledge license. The appreciation or generosity of the owners. Miscellaneous hacker. In addition to the famous previous hackers, The following hacker categories, Intentions bring weaknesses to the owners and obtain.
4. Red Hat Hacker
Red Hat Hacker is once again a black hat and a fusion of white hackers. They are a Government hacker agency, the level of the main information centers, and generally in the confidential information categories.
Intentions bring weaknesses to the owners and obtain.
5. Blue Hat Hacker
Hacking tools: How do hackers hack?
This is typically technical in nature. Hackers can also use psychology trick to combining user Information by clicking on a malicious attachment or providing personal data which is created by Hacker. These Method is known as “social engineering.
6. Script kiddie
Usually almost no understanding of potential concepts, so it is Termkiddie.
Kiddie scripts are non-experts, breaking the computer system by using pre-package automation tools written by others
In fact, It is accurate to characterize hacking as an over – arching term for the activity behind most, if not malicious cyber attacks, Businesses, and government. Besides social engineering and advertising.
” Common Hacking techniques
- Worms
- _ Botnet
- _ Trojans
- _ Ransomwares
- _ Browser Hijacks
- _ Rootkits
- _ Denial of service (DDoS) attacks