Skip to main content

Hackers, Who are they and why do they do it?

Watching the typical popular media portrayal of a hacker you are likely to see a socially awkward goofy individual either working in some dark basement or high tech office with six 42" LCD screens linked together into one large screen with Matrix like code flowing across the screen as they furiously type away as they get ready to launch some world ending computer virus. Reading or watching the news is likely to be a similar fair with news of a new banking Trojan or hacker group that have stolen millions of bank account records, social security numbers, and the like. On the surface level, hackers are all really bad people that should be locked up, so why learn how to hack?

 

The truth is there are many different types of hackers, some of which are very important to the health and integrity of private and corporate networks.

 

According to the EC-Council's Certified Ethical Hacking 9 certification hackers can be classified into 8 categories:

 

Black Hats: Individuals with extraordinary computing skills, resorting to malicious or destructive activities. These people are also known as crackers.

 

White Hats: Individuals who profess hacking skills and use them for defensive purposes. They are also known as security analysts.

 

Grey Hats: Individuals who work both offensively and defensively at various times.

 

Suicide Hackers: Individuals whose goal(s) are to bring down a critical infrastructure for a "cause". These individuals are not worried about jail time or other forms of punishment.

 

Script Kiddies: These are unskilled hackers who compromise systems by running scripting tools and software that are created by real hackers.

 

Cyber Terrorists: Individuals with a wide range of skills. These individuals are motivated by religious or political beliefs to create fear by large scale disruption of computer networks.

 

State Sponsored Hackers: individuals who are employed by the government to perpetrate and gain top- secret information and to damage information systems of other governments.

 

Hacktivist: Individuals who promote a particular political agenda by hacking. Especially by defacing or disabling websites.

 

 

As you can see, hackers are not so easily defined as a individual thing, nor are they inherently "evil" in nature. In this book we will be focusing on ethical hacking (you can learn about unethical hacking in just about any number of news stories on a daily basis now). The type of hackers that help protect people's networks, ensure network security, finds and fixes flaws to help keep people safe. Hackers are normally curious individuals, who like to see how things work, how to put various systems and security to the test, to think outside of the box and see things in a new way. As with all information and skills it can be used for good or bad.

Comments

Popular posts from this blog

How to hack wifi in Windows 7/8/8.1/10 without any software | using with cmd

How to Hack Wifi password using cmd Hello Friends, In this article we will share some tricks that can help you to hack wifi password using cmd. Youcan experiment these trick with your neighbors or friends. It’s not necessarily that this trick will work with every wifi because of upgraded hardware. But you can still try this crack with wifi having old modems or routers. 1: WEP: Wired Equivalent Privacy (WEP) is one of the widely used security key in wifi devices. It is also the oldest and most popular key and was added in 1999. WEP uses 128 bit and 256-bit encryption. With the help of this tutorial, you can easily get into 128-bit encryption and Hack WiFi password using CMD. 2: WAP and WAP2: Wi-Fi Protected Access is an another version of WiFi encryption and was first used in 2003. It uses the 256-bit encryption model and is tough to hack. WAP2 is an updated version of WAP and was introduced in 2006. Since then it has replaced WAP and is now been used mostly in offices and colleges w

സുമതിയെ കൊന്ന വളവ് | The real Story of Sumathi valavu

സുമതി വളവ്.. മൈലമൂട് സുമതിയെ കൊന്ന വളവ് എന്ന് കേട്ടാല്‍ കേള്‍ക്കുന്നവരുടെ മനസ്സ് അറിയാതൊന്ന് കിടുങ്ങുന്നകാലമുണ്ടായിരുന്നു .അത്ര കണ്ട് ഭയമാണ് ഈ സ്ഥലത്തെക്കുറിച്ച് നാട്ടുകാരുടെ മനസ്സില്‍ഒരു കാലത്ത് ഉണ്ടായിരുന്നത്. അറുപത് വര്‍ഷം മുമ്പ് കൊല ചെയ്ത സുമതിയെന്ന ഗര്‍ഭിണിയായ യുവതിയുടെ ആത്മാവ് ഗതി കിട്ടാതെ ഇവിടെ അലഞ്ഞ് തിരിഞ്ഞ് നടക്കുന്നുവെന്ന വിശ്വാസമാണ് ഭയത്തിന് കാരണം. തിരുവനന്തപുരം ജില്ലയില്‍ കല്ലറ പാലോട് റോഡില്‍ മൈലമൂട്ടില്‍ നിന്നും അര കിലോമീറ്റര്‍ ദൂരെ വനത്തിനുള്ളിലെ കൊടും വളവാണ് സുമതിയെ കൊന്ന വളവ് എന്ന സ്ഥലം. ഇവിടെ വച്ചാണ് സുമതി കൊല്ലപ്പെട്ടത്. വനപ്രദേശമായതിനാല്‍ സന്ധ്യ മയങ്ങുമ്പോള്‍ തന്നെ ഇരുട്ടിലാകുന്ന സ്ഥലമാണിത്. ഇടതിങ്ങി വളര്‍ന്ന് നില്‍ക്കുന്ന മരങ്ങളുള്ള റോഡില്‍ ഒരുവശം വലിയ ഗര്‍ത്തമാണ്.ഒപ്പം കാടിന്റെ വന്യമായ വിജനതയും. ഇതിനൊപ്പം പൊടിപ്പും തൊങ്ങലും വച്ച് പ്രചരിയ്കുന്ന കഥകള്‍ കൂടിയാകുമ്പോള്‍ എത്ര ധൈര്യശാലിയായാലും ഈ സ്ഥലത്തെത്തുമ്പോള്‍ സുമതിയുടെ പ്രേതത്തെക്കുറിച്ച് അറിയാതെയെങ്കിലും ഓര്‍ത്ത് പോകും.പ്രത്യേകിച്ചും രാത്രി കാലങ്ങളില്‍. സുമതി മരിച്ചിട്ട് ഇപ്പോള്‍ അറുപത് വര്‍ഷം കഴിഞ്ഞു. എന്നിട്ടു

A Beginner’s Guide to Getting Started with Bitcoin

A man looks for Bitcoin Oasis If you have heard about blockchain or cryptocurrency, then the term that initially comes to mind is Bitcoin . Launched 12 years ago, it was the late 2017 bull run that created a media frenzy that propelled Bitcoin into the mainstream and our modern day lexicon. Often labeled as the “original” cryptocurrency, Bitcoin has been the catalyst (directly and/or indirectly) behind many new innovations in the blockchain and digital asset space, most notably Ethereum and Monero . Shortly after the late 2017 bull run lost its steam, interest in these new technologies started to fade ― but here we are in 2021 with Bitcoin having risen like a phoenix from the ashes. As you would assume, an appetite for the blockchain and digital asset space has returned and now it is more important than ever that we understand what exactly is behind this unique asset, Bitcoin. This article is meant to be a guide for individuals who are new to cryptocurren