Types of Hacking
Types of Hacking
1 Types of Hackers
Based on the activities of the hackers they can be grouped into three as follows:
o White hat hacker - This kind of hacker is often referred to as a security
professional or security researcher. Such hackers are employed by an organization
and are permitted to attack an organization to find vulnerabilities that an attacker
might be able to exploit. They are also known as an Ethical Hacker or a
Penetration Tester. They focus on Securing and Protecting IT Systems.
o Black hat hacker - Also known as a cracker, this kind of hacker is referred to as a
bad guy, who uses his or her knowledge for negative purposes. They are often
referred to by the media as hackers.
o Gray hat hacker - This kind of hacker is an intermediate between a white hat and
a black hat hacker. For instance, a gray hat hacker would work as a security
professional for an organization and responsibly disclose everything to them;
however, he or she might leave a backdoor to access it later and might also sell
the confidential information, obtained after the compromise of a company’s target
server, to competitors.
On the basis of knowledge, hackers can be categorized as:
o Coders - The real hackers are the coders, the ones who revise the methods and create
tools that are available in the market. Coders can find security holes and weaknesses in
software to create their own exploits. These hackers can use those exploits to develop
fully patched and secure systems. Coders are the programmers who have the ability to
find the unique vulnerability in existing software and to create working exploit codes.
These are the individuals with a deep understanding of the OSI Layer Model and TCP/IP
Stacks.
o Admins - Admins are the computer guys who use the tools and exploits prepared by the
coders.They do not develop their own techniques, however they uses the tricks which are
already prepared by the coders. They are generally system administration, or computer
network controller. Most of the hackers and security person in this digital world come
under this category. Admins have experience with several operating systems, and know
how to exploit several existing vulnerabilities. A majority of Security Consultants fall in
this group and work as a part of Security Team.
o Script Kiddies - Next and the most dangerous class of hackers is Script kiddies. They
are the new generation of users of computer who take advantage of the hacker tools and
documentation available for free on the Internet but don’t have any knowledge of what’s
going on behind the scenes. They know just enough to cause you headaches but typically
are very sloppy in their actions, leaving all sorts of digital fingerprints behind. Even
though these guys are the teenage hackers that you hear about in the news media, they
need minimum skills to carry out their attacks. Script kiddies are the bunnies who use
script and programs developed by others to attack computer systems and networks. They
get the least respect but are most annoying and dangerous and can cause big problems
without actually knowing what they are doing.