SlideShare a Scribd company logo
classification of hackers as per their work
We can divide hackers in mainly e parts that is .....

1. White Hat Hackers
2. Grey Hat Hackers
3. Black Hat hackers

Apart from these three an special name is also their i.e.
* Blue Hat hackers

white hate hackers are those hackers who has total authorization to hack in a system/network/server
they helps in finding the loop holes in the security of a system/network/server.They are generally
called ethical hackers or penetration testers.They are good guys.They have good ethics.

Black hat hackers are those hackers who doesn't have any authorization to hack but they do it.They are
also called crackers.they make changes in the look and also in the databases of web sites as well as
some time they delete it for fun only.They are called bad guys.They don't have any ethics.

Gery hat hackers comes in between white and black they also not have authorization to by pass the
security mechanism of a system/server/network but they do it.Good thing is that they also doesn't
make any kind of changes in the database even though they help to secure the system.They are
independent testers.

Blue hack is nothing different.Microsoft given a name to their own hackers who helps to secure the
network of Microsoft.They are also smiler to Grey hat hackers.
Posted by hakindia007 at 2:12 PM




Hacking means finding out weaknesses in an established system and exploiting them. A computer
hacker is a person who finds out weaknesses in the computer and exploits it. Hackers may be motivated
                                                                 [1]
by a multitude of reasons, such as profit, protest, or challenge. The subculture that has evolved around
                                                                                             [2]
hackers is often referred to as the computer underground but it is now an open community. While other
uses of the word hacker exist that are not related to computer security, they are rarely used in
mainstream context. They are subject to the long standing hacker definition controversy about the true
meaning of the term hacker. In this controversy, the term hacker is reclaimed by computer
                                                                                            [3]
programmers who argue that someone breaking into computers is better called a cracker, not making a
difference between computer criminals (black hats) and computer security experts (white hats). Some
white hat hackers claim that they also deserve the title hacker, and that only black hats should be called
crackers.
Several subgroups of the computer underground with different attitudes and aims use different terms to
demarcate themselves from each other, or try to exclude some specific group with which they do not
agree. Eric S. Raymond (author of The New Hacker's Dictionary) advocates that members of the
computer underground should be called crackers. Yet, those people see themselves as hackers and even
try to include the views of Raymond in what they see as one wider hacker culture, a view harshly rejected
by Raymond himself. Instead of a hacker/cracker dichotomy, they give more emphasis to a spectrum of
different categories, such as white hat, grey hat, black hat and script kiddie. In contrast to Raymond, they
usually reserve the term cracker. According to (Clifford R.D. 2006) a cracker or cracking is to "gain
unauthorized access to a computer in order to commit another crime such as destroying information
                            [4]                                                                           [5]
contained in that system". These subgroups may also be defined by the legal status of their activities.

White hat
        A white hat hacker breaks security for non-malicious reasons, for instance testing their own
        security system.The term "white hat" in Internet slang refers to an ethical hacker. This
        classification also includes individuals who perform penetration tests and vulnerability
        assessments within a contractual agreement. Often, this type of 'white hat' hacker is called an
        ethical hacker. The International Council of Electronic Commerce Consultants, also known as
        the EC-Council has developed certifications, courseware, classes, and online training covering
                                                   [5]
        the diverse arena of Ethical Hacking.
    Black hat
        A Black Hat Hacker is a hacker who "violates computer security for little reason beyond
                                                                      [6]
        maliciousness or for personal gain"(Moore,2005).                    Black Hat Hackers are "the epitome of all that
                                                         [7]
        the public fears in a computer criminal".              Black Hat Hackers break into secure networks to
        destroy data or make the network unusable for those who are authorized to use the network. The
        way Black Hat Hackers choose the networks that they are going to break into is by a process that
        can be broken down into two parts. This is called the pre-hacking stage.
        Part 1 Targeting
        Targeting is when the hacker determines what network to break into. The target may be of
        particular interest to the hacker, or the hacker may "Port Scan" a network to determine if it is
        vulnerable to attacks. A port is defined as "an opening through which the computer receives data
                            [6]
        via the network".         Open ports will allow a hacker to access the system.
        Part 2 Research and Information Gathering
        It is in this stage that the hacker will visit or contact the target in some way in hopes of finding out
        vital information that will help them access the system. The main way that hackers get desired
        results from this stage is from Social Engineering, which will be explained below. Aside from
        Social Engineering hackers can also use a technique called Dumpster Diving. Dumpster Diving is
        when a hacker will literally dive into a dumpster in hopes to find documents that users have
thrown away, which may contain information a hacker can use directly or indirectly, to help them
gain access to a network.
Grey hat
A grey hat hacker is a combination of a Black Hat and a White Hat Hacker. A Grey Hat Hacker
may surf the internet and hack into a computer system for the sole purpose of notifying the
administrator that their system has been hacked, for example. Then they may offer to repair their
                          [7]
system for a small fee.
Elite hacker
A social status among hackers, elite is used to describe the most skilled. Newly
discovered exploits will circulate among these hackers. Elite groups such as Masters of
                                                              [8]
Deception conferred a kind of credibility on their members.
Script kiddie
A script kiddie (or skiddie) is a non-expert who breaks into computer systems by using pre-
packaged automated tools written by others, usually with little understanding of the underlying
concept—hence the term script (i.e. a prearranged plan or set of activities) kiddie (i.e. kid, child—
                                                                [9]
an individual lacking knowledge and experience, immature).
Neophyte
A neophyte, "n00b", or "newbie" is someone who is new to hacking or phreaking and has almost
                                                                                   [7]
no knowledge or experience of the workings of technology, and hacking.
Blue hat
A blue hat hacker is someone outside computer security consulting firms who is used to bug test
a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the
                                                                    [10][11][12]
term BlueHat to represent a series of security briefing events.
Hacktivist
A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or
political message. In general, mosthacktivism involves website defacement or denial-of-service
attacks.

More Related Content

What's hot

White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
Intellipaat
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
arohan6
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
Madhusudhan G
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.
Coder Tech
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
DEEPIKA WALIA
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
Farwa Ansari
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
Lokender Yadav
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Rajan Chhangani
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
Georgekutty Francis
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Rajan Chhangani
 
Certified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book SummaryCertified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book Summary
udemy course
 
Discovery of Compromised Machines
Discovery of Compromised MachinesDiscovery of Compromised Machines
Discovery of Compromised Machines
Anton Chuvakin
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
VipinYadav257
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
Sweta Kumari Barnwal
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
Sweta Kumari Barnwal
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
Bharat Thakkar
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Chetanmalviya8
 

What's hot (20)

White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
hacking
hackinghacking
hacking
 
Hacking
HackingHacking
Hacking
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Certified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book SummaryCertified Ethical Hacking - Book Summary
Certified Ethical Hacking - Book Summary
 
Discovery of Compromised Machines
Discovery of Compromised MachinesDiscovery of Compromised Machines
Discovery of Compromised Machines
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Viewers also liked

Dev.appzil.vn
Dev.appzil.vnDev.appzil.vn
Dev.appzil.vn
tunglinh46
 
Indian Rupee symbol
Indian Rupee symbolIndian Rupee symbol
Indian Rupee symbol
Akash Desai Singham
 
Autosteering for RTG Cranes
Autosteering for RTG CranesAutosteering for RTG Cranes
Autosteering for RTG Cranes
Konecranes USA
 
Typography Basics | Logo Design Pros
Typography Basics | Logo Design ProsTypography Basics | Logo Design Pros
Typography Basics | Logo Design Pros
Logo Design Pros
 
E-banking
E-banking E-banking
I o ports.ppt
I o ports.pptI o ports.ppt
I o ports.ppt
Pradeep V Dev
 
Top 5 Reasons to Revamp your Website - Logo Design Pros Review
Top 5 Reasons to Revamp your Website - Logo Design Pros ReviewTop 5 Reasons to Revamp your Website - Logo Design Pros Review
Top 5 Reasons to Revamp your Website - Logo Design Pros Review
Logo Design Pros
 
Product g1-100920223445-phpapp01
Product g1-100920223445-phpapp01Product g1-100920223445-phpapp01
Product g1-100920223445-phpapp01Tram Tran Ngoc
 
Advanced diagnostics and performance services
Advanced diagnostics and performance servicesAdvanced diagnostics and performance services
Advanced diagnostics and performance services
Konecranes USA
 
スマートコンバートセミナー資料 - 201209
スマートコンバートセミナー資料 - 201209スマートコンバートセミナー資料 - 201209
スマートコンバートセミナー資料 - 201209
Yoichiro Shiba
 
Konecranes "The Happy Customer"
Konecranes "The Happy Customer"Konecranes "The Happy Customer"
Konecranes "The Happy Customer"
Konecranes USA
 
Cranes! A Coloring and Activity Book!
Cranes! A Coloring and Activity Book!Cranes! A Coloring and Activity Book!
Cranes! A Coloring and Activity Book!
Konecranes USA
 
5 Principles of a Good Logo Design
5 Principles of a Good Logo Design5 Principles of a Good Logo Design
5 Principles of a Good Logo Design
Logo Design Pros
 

Viewers also liked (13)

Dev.appzil.vn
Dev.appzil.vnDev.appzil.vn
Dev.appzil.vn
 
Indian Rupee symbol
Indian Rupee symbolIndian Rupee symbol
Indian Rupee symbol
 
Autosteering for RTG Cranes
Autosteering for RTG CranesAutosteering for RTG Cranes
Autosteering for RTG Cranes
 
Typography Basics | Logo Design Pros
Typography Basics | Logo Design ProsTypography Basics | Logo Design Pros
Typography Basics | Logo Design Pros
 
E-banking
E-banking E-banking
E-banking
 
I o ports.ppt
I o ports.pptI o ports.ppt
I o ports.ppt
 
Top 5 Reasons to Revamp your Website - Logo Design Pros Review
Top 5 Reasons to Revamp your Website - Logo Design Pros ReviewTop 5 Reasons to Revamp your Website - Logo Design Pros Review
Top 5 Reasons to Revamp your Website - Logo Design Pros Review
 
Product g1-100920223445-phpapp01
Product g1-100920223445-phpapp01Product g1-100920223445-phpapp01
Product g1-100920223445-phpapp01
 
Advanced diagnostics and performance services
Advanced diagnostics and performance servicesAdvanced diagnostics and performance services
Advanced diagnostics and performance services
 
スマートコンバートセミナー資料 - 201209
スマートコンバートセミナー資料 - 201209スマートコンバートセミナー資料 - 201209
スマートコンバートセミナー資料 - 201209
 
Konecranes "The Happy Customer"
Konecranes "The Happy Customer"Konecranes "The Happy Customer"
Konecranes "The Happy Customer"
 
Cranes! A Coloring and Activity Book!
Cranes! A Coloring and Activity Book!Cranes! A Coloring and Activity Book!
Cranes! A Coloring and Activity Book!
 
5 Principles of a Good Logo Design
5 Principles of a Good Logo Design5 Principles of a Good Logo Design
5 Principles of a Good Logo Design
 

Similar to Hackers

Hacking
HackingHacking
Hacking
pranav patade
 
hacking basics
hacking basicshacking basics
hacking basics
dharmesh ram
 
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2
mubeenm50
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
Gautam708801
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
arohan6
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
arohan6
 
Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testing
CSITiaesprime
 
Rakan raed
Rakan raedRakan raed
Rakan raed
2el3amrakan
 
Hacking
HackingHacking
Hacking
mubeenm50
 
Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)
Solomon Oho
 
Hacking
HackingHacking
ethics final project
ethics final projectethics final project
ethics final project
Victoriya Poplavskaya
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
Waseem Rauf
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Ritwick Mukherjee
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Nitheesh Adithyan
 
Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical Hacking
Akashy Kale
 
hacker-180906055756.pptx
hacker-180906055756.pptxhacker-180906055756.pptx
hacker-180906055756.pptx
Alefya1
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
Mukund Kumar Bharti
 

Similar to Hackers (20)

Hacking
HackingHacking
Hacking
 
hacking basics
hacking basicshacking basics
hacking basics
 
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
 
Ethical hacking 2016
Ethical hacking  2016 Ethical hacking  2016
Ethical hacking 2016
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testing
 
Rakan raed
Rakan raedRakan raed
Rakan raed
 
Hacking
HackingHacking
Hacking
 
Hackers
HackersHackers
Hackers
 
Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)
 
Hacking
HackingHacking
Hacking
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
ethics final project
ethics final projectethics final project
ethics final project
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical Hacking
 
hacker-180906055756.pptx
hacker-180906055756.pptxhacker-180906055756.pptx
hacker-180906055756.pptx
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 

Recently uploaded

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 

Recently uploaded (20)

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 

Hackers

  • 1. classification of hackers as per their work We can divide hackers in mainly e parts that is ..... 1. White Hat Hackers 2. Grey Hat Hackers 3. Black Hat hackers Apart from these three an special name is also their i.e. * Blue Hat hackers white hate hackers are those hackers who has total authorization to hack in a system/network/server they helps in finding the loop holes in the security of a system/network/server.They are generally called ethical hackers or penetration testers.They are good guys.They have good ethics. Black hat hackers are those hackers who doesn't have any authorization to hack but they do it.They are also called crackers.they make changes in the look and also in the databases of web sites as well as some time they delete it for fun only.They are called bad guys.They don't have any ethics. Gery hat hackers comes in between white and black they also not have authorization to by pass the security mechanism of a system/server/network but they do it.Good thing is that they also doesn't make any kind of changes in the database even though they help to secure the system.They are independent testers. Blue hack is nothing different.Microsoft given a name to their own hackers who helps to secure the network of Microsoft.They are also smiler to Grey hat hackers. Posted by hakindia007 at 2:12 PM Hacking means finding out weaknesses in an established system and exploiting them. A computer hacker is a person who finds out weaknesses in the computer and exploits it. Hackers may be motivated [1] by a multitude of reasons, such as profit, protest, or challenge. The subculture that has evolved around [2] hackers is often referred to as the computer underground but it is now an open community. While other uses of the word hacker exist that are not related to computer security, they are rarely used in mainstream context. They are subject to the long standing hacker definition controversy about the true meaning of the term hacker. In this controversy, the term hacker is reclaimed by computer [3] programmers who argue that someone breaking into computers is better called a cracker, not making a difference between computer criminals (black hats) and computer security experts (white hats). Some white hat hackers claim that they also deserve the title hacker, and that only black hats should be called crackers.
  • 2. Several subgroups of the computer underground with different attitudes and aims use different terms to demarcate themselves from each other, or try to exclude some specific group with which they do not agree. Eric S. Raymond (author of The New Hacker's Dictionary) advocates that members of the computer underground should be called crackers. Yet, those people see themselves as hackers and even try to include the views of Raymond in what they see as one wider hacker culture, a view harshly rejected by Raymond himself. Instead of a hacker/cracker dichotomy, they give more emphasis to a spectrum of different categories, such as white hat, grey hat, black hat and script kiddie. In contrast to Raymond, they usually reserve the term cracker. According to (Clifford R.D. 2006) a cracker or cracking is to "gain unauthorized access to a computer in order to commit another crime such as destroying information [4] [5] contained in that system". These subgroups may also be defined by the legal status of their activities. White hat A white hat hacker breaks security for non-malicious reasons, for instance testing their own security system.The term "white hat" in Internet slang refers to an ethical hacker. This classification also includes individuals who perform penetration tests and vulnerability assessments within a contractual agreement. Often, this type of 'white hat' hacker is called an ethical hacker. The International Council of Electronic Commerce Consultants, also known as the EC-Council has developed certifications, courseware, classes, and online training covering [5] the diverse arena of Ethical Hacking. Black hat A Black Hat Hacker is a hacker who "violates computer security for little reason beyond [6] maliciousness or for personal gain"(Moore,2005). Black Hat Hackers are "the epitome of all that [7] the public fears in a computer criminal". Black Hat Hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network. The way Black Hat Hackers choose the networks that they are going to break into is by a process that can be broken down into two parts. This is called the pre-hacking stage. Part 1 Targeting Targeting is when the hacker determines what network to break into. The target may be of particular interest to the hacker, or the hacker may "Port Scan" a network to determine if it is vulnerable to attacks. A port is defined as "an opening through which the computer receives data [6] via the network". Open ports will allow a hacker to access the system. Part 2 Research and Information Gathering It is in this stage that the hacker will visit or contact the target in some way in hopes of finding out vital information that will help them access the system. The main way that hackers get desired results from this stage is from Social Engineering, which will be explained below. Aside from Social Engineering hackers can also use a technique called Dumpster Diving. Dumpster Diving is when a hacker will literally dive into a dumpster in hopes to find documents that users have
  • 3. thrown away, which may contain information a hacker can use directly or indirectly, to help them gain access to a network. Grey hat A grey hat hacker is a combination of a Black Hat and a White Hat Hacker. A Grey Hat Hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has been hacked, for example. Then they may offer to repair their [7] system for a small fee. Elite hacker A social status among hackers, elite is used to describe the most skilled. Newly discovered exploits will circulate among these hackers. Elite groups such as Masters of [8] Deception conferred a kind of credibility on their members. Script kiddie A script kiddie (or skiddie) is a non-expert who breaks into computer systems by using pre- packaged automated tools written by others, usually with little understanding of the underlying concept—hence the term script (i.e. a prearranged plan or set of activities) kiddie (i.e. kid, child— [9] an individual lacking knowledge and experience, immature). Neophyte A neophyte, "n00b", or "newbie" is someone who is new to hacking or phreaking and has almost [7] no knowledge or experience of the workings of technology, and hacking. Blue hat A blue hat hacker is someone outside computer security consulting firms who is used to bug test a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the [10][11][12] term BlueHat to represent a series of security briefing events. Hacktivist A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, mosthacktivism involves website defacement or denial-of-service attacks.