0% found this document useful (0 votes)
216 views2 pages

Types of Hacking

There are three types of hackers based on their activities: white hat hackers who work as security professionals to find vulnerabilities for organizations, black hat hackers who hack for negative purposes, and gray hat hackers who work both as security professionals but also sell confidential information. Hackers can also be categorized based on their knowledge as coders who create hacking tools, admins who use existing tools and exploits, and script kiddies who have minimal skills and use tools without understanding what they do.

Uploaded by

Felix Odhiambo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
216 views2 pages

Types of Hacking

There are three types of hackers based on their activities: white hat hackers who work as security professionals to find vulnerabilities for organizations, black hat hackers who hack for negative purposes, and gray hat hackers who work both as security professionals but also sell confidential information. Hackers can also be categorized based on their knowledge as coders who create hacking tools, admins who use existing tools and exploits, and script kiddies who have minimal skills and use tools without understanding what they do.

Uploaded by

Felix Odhiambo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

1.

1 Types of Hackers
 Based on the activities of the hackers they can be grouped into three as follows:
o White hat hacker - This kind of hacker is often referred to as a security
professional or security researcher. Such hackers are employed by an organization
and are permitted to attack an organization to find vulnerabilities that an attacker
might be able to exploit. They are also known as an Ethical Hacker or a
Penetration Tester. They focus on Securing and Protecting IT Systems.
o Black hat hacker - Also known as a cracker, this kind of hacker is referred to as a
bad guy, who uses his or her knowledge for negative purposes. They are often
referred to by the media as hackers.
o Gray hat hacker - This kind of hacker is an intermediate between a white hat and
a black hat hacker. For instance, a gray hat hacker would work as a security
professional for an organization and responsibly disclose everything to them;
however, he or she might leave a backdoor to access it later and might also sell
the confidential information, obtained after the compromise of a company’s target
server, to competitors.
 On the basis of knowledge, hackers can be categorized as:
o Coders - The real hackers are the coders, the ones who revise the methods and create
tools that are available in the market. Coders can find security holes and weaknesses in
software to create their own exploits. These hackers can use those exploits to develop
fully patched and secure systems. Coders are the programmers who have the ability to
find the unique vulnerability in existing software and to create working exploit codes.
These are the individuals with a deep understanding of the OSI Layer Model and TCP/IP
Stacks.
o Admins - Admins are the computer guys who use the tools and exploits prepared by the
coders.They do not develop their own techniques, however they uses the tricks which are
already prepared by the coders. They are generally system administration, or computer
network controller. Most of the hackers and security person in this digital world come
under this category. Admins have experience with several operating systems, and know
how to exploit several existing vulnerabilities. A majority of Security Consultants fall in
this group and work as a part of Security Team.
o Script Kiddies - Next and the most dangerous class of hackers is Script kiddies. They
are the new generation of users of computer who take advantage of the hacker tools and
documentation available for free on the Internet but don’t have any knowledge of what’s
going on behind the scenes. They know just enough to cause you headaches but typically
are very sloppy in their actions, leaving all sorts of digital fingerprints behind. Even
though these guys are the teenage hackers that you hear about in the news media, they
need minimum skills to carry out their attacks. Script kiddies are the bunnies who use
script and programs developed by others to attack computer systems and networks. They
get the least respect but are most annoying and dangerous and can cause big problems
without actually knowing what they are doing.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy