Hackers: Who are
they?
What is an Hacking?
Hacking is identifying weakness in computers system or networks to exploit its
weakness to gain access.
Example of Hacking: Using password cracking algorithm to gain access to a system.
Hackers are usually skilled computer programmers with knowledge of Hackers are
usually skilled computer programmers with knowledge of computer security.
Hackers are classified according to the intent of their actions. The following list
classifies hackers according to their intent.
Hacking
Advantages
• To recover lost information,
especially in case you lost your
password.
• To perform penetration testing to
strengthen computer and network
security.
• To put adequate preventative
measures in place to prevent security
breaches.
• To have a computer system that
prevents malicious hackers from
gaining access.
Disadvantages
• Massive security breach.
• Unauthorized system access on private
information.
• Privacy violation.
• Hampering system operation.
• Denial of service attacks.
• Malicious attack on the system
Purpose
• Just for fun
• Show-off
• Steal important information
• Damaging the system
• Hampering privacy
• Money extortion
• System security testing
• To break policy compliance
01
02
03
06
04
05
Websites Hacking
Hacking a website means taking
unauthorized control over a web server and
its associated software such as database
and other interference
Network Hacking
Hacking a Network means gathering
information about Network by using tools
like Telnet, NS Lookup, Ping, Tracert,
Netstat, etc with the intent to harm the
network system and hamper its operation.
E- mail Hacking
It includes getting unauthorized access on an
Email account and using it without taking the
consent of its owner..
Computer Hacking
This is the process of stealing computer ID and
password by applying hacking methods and
getting unauthorized access to a computer system.
Password Hacking
This is the process of recovering secret
passwords from data that has been stored
in or transmitted by a computer system.
Ethical Hacking
Ethical hacking involves finding weaknesses
in a computer or network system for testing
purpose and finally getting them fixed.
Types of Hacking
01
White Hat
02
Grey Hat
03
Black Hat
• They never intent to harm
a system, rather they try to
find out weaknesses in a
computer or a network
system as a part of
penetration testing and
vulnerability assessments.
• Ethical hacking is not
illegal .
• Grey hat hackers are a
blend of both black hat and
white hat hackers.
• They act without malicious
intent but for their fun, they
exploit a security weakness
in a computer system or
network without the owner’s
permission or knowledge.
• those who hack in order
to gain unauthorized
access to a system and
harm its operations or
steal sensitive
information.
• Black Hat hacking is
always illegal .
Types of Hackers
Red Hat hackers
Blue Hat hacker
Elite Hackers
Script Kiddie
Miscellaneous Hackers
Types of
Hackers
Neophyte Hacktivist
Miscellaneous Hackers
Basic Skills
2
An ethical hacker must be a computer systems expert and needs to have very strong
programming and computer networking skills.
An ethical hacker needs to have a lot of patience, persistence, and perseverance to try
again and again and wait for the required result.
Who Are the White Hat Hackers?
Often referred to as “ethical hackers”, white-hat hackers make the choice the use their knowledge and
abilities for good, instead of evil.
In some cases, white-hat hackers are paid employees or contractors that are hired to work for companies
as security experts. This type of white-hat hackers is usually referred to as a penetration tester, whose
job it is to find vulnerabilities in the computer infrastructure by hacking into it.
Typically, white-hat hackers use the exact same hacking techniques that a black-hat hacker would;
however, the main difference between the two is that white-hats hack into computer systems with
explicit permission from the system’s owner, making the process legal.
Essentially, white-hat hackers test security systems that are already in place to see where they can be
improved.
Who are the Black Hat Hackers?
 Malicious
 Most common hackers related to recent cybercrime news.
 Look for vulnerabilities.
• Individual PC
• Organization
• Bank System
 Use loopholes and hack into network to get access to personal, business and financial
information.
 Agenda: Mostly monetary, but not always.
 Illegal actions with bad intention.
White Hat
• Quality Content
• Guest blogging
• Link Baiting
• Improving Content
• Redesigning Websites
• Researching and
Analyzing
• Rewriting
• Internal Linking
Black Hat
• Hidden Text
• Keyword Stuffing
• Duplicate Content
• Link Farming
• Doorway Page
• Cloaking
• Parasites Hosting
• Scraping
Difference between White Hat and Black Hat SEO
Password guessing and cracking Session Hijacking
Techniques of Hacking
Network traffic
Sniffing
Denial of Services
Attacks
SQL Injection
Exploit buffer overflow
Vulnerabilities
Techniques
Session Spoofing
Reconnaissance
Ethical Hacking- Process
Reporting
Scanning
Maintaining Access
Gaining Access
Clearing Tracks
Raspberry Pi 3
Tools used for Ethical Hacking
Rubber Ducky
LAN Turtle
Wifi- Pineapple
Life threats for Black Hat Hackers
• There’s no way around it: black hat hackers are criminals, and with damages mounting and
these crimes gaining increased attention, it won’t be long before cyber criminals are fully
lumped in with your run-of-the-mill criminals ranging from pickpockets and burglars to white
collar fraudsters in the eyes of the public.
• Breaking the law, after all, is breaking the law, no matter how comfortable and convenient the
internet has made some of those illegal activities.But just because someone once dabbled (or
more than dabbled) in black hat hacking doesn’t mean he or she has to be considered a criminal
for life.
• People with hacking skills – even those with black hat hacking pasts, like infamous Anonymous
hacker Hector Monsegur – are being fervently sought by businesses and organizations who
want to put those skills to use in securing their own networks and systems.
• Hackers using their powers for good to try and break into target systems in order to better
secure those systems are considered white hat hackers or ethical hackers, and with an ethical
hacker
Conclusion
You need to stay as a White Hat Hacker which means you need to work within given
boundaries. Never intrude or attack any computer or network without a required
permission from the authorities.
As a final note, it is highly recommended that you refrain from engaging yourself in
black hat hacking which may spoil your entire career.
Vivek
Ramachandran
Ankit Fadia
Sunny Vaghela
Trishneet
Arora
List of Top 4 Ethical Hackers in India
Ethical Hackers
George Hotz
DVD- Jon
ray
McKin
John Wu
Mudge
Barnaby Jack
Top 6 greatest Hacker in the World
Most Wanted Black Hat Hackers in FBI
Fuji e W an g
H o s s e i n P a r v a r
I g o r O l e g o v i n c h
T u r a s h e v
Maksim Viktorovich
Yakubets
1 Anuj Kumar
2 Akshaan Raj
3 Milennium Adhayage
4 Sunipa Bera
Thank You
-Geeksforgeek -hackersearth
-codechef
Biblography

Hackers: Who Are They? | Types of Hackers & Ethical Hacking Explained

  • 1.
  • 2.
    What is anHacking? Hacking is identifying weakness in computers system or networks to exploit its weakness to gain access. Example of Hacking: Using password cracking algorithm to gain access to a system. Hackers are usually skilled computer programmers with knowledge of Hackers are usually skilled computer programmers with knowledge of computer security. Hackers are classified according to the intent of their actions. The following list classifies hackers according to their intent.
  • 3.
    Hacking Advantages • To recoverlost information, especially in case you lost your password. • To perform penetration testing to strengthen computer and network security. • To put adequate preventative measures in place to prevent security breaches. • To have a computer system that prevents malicious hackers from gaining access. Disadvantages • Massive security breach. • Unauthorized system access on private information. • Privacy violation. • Hampering system operation. • Denial of service attacks. • Malicious attack on the system Purpose • Just for fun • Show-off • Steal important information • Damaging the system • Hampering privacy • Money extortion • System security testing • To break policy compliance
  • 4.
    01 02 03 06 04 05 Websites Hacking Hacking awebsite means taking unauthorized control over a web server and its associated software such as database and other interference Network Hacking Hacking a Network means gathering information about Network by using tools like Telnet, NS Lookup, Ping, Tracert, Netstat, etc with the intent to harm the network system and hamper its operation. E- mail Hacking It includes getting unauthorized access on an Email account and using it without taking the consent of its owner.. Computer Hacking This is the process of stealing computer ID and password by applying hacking methods and getting unauthorized access to a computer system. Password Hacking This is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. Ethical Hacking Ethical hacking involves finding weaknesses in a computer or network system for testing purpose and finally getting them fixed. Types of Hacking
  • 5.
    01 White Hat 02 Grey Hat 03 BlackHat • They never intent to harm a system, rather they try to find out weaknesses in a computer or a network system as a part of penetration testing and vulnerability assessments. • Ethical hacking is not illegal . • Grey hat hackers are a blend of both black hat and white hat hackers. • They act without malicious intent but for their fun, they exploit a security weakness in a computer system or network without the owner’s permission or knowledge. • those who hack in order to gain unauthorized access to a system and harm its operations or steal sensitive information. • Black Hat hacking is always illegal . Types of Hackers
  • 6.
    Red Hat hackers BlueHat hacker Elite Hackers Script Kiddie Miscellaneous Hackers
  • 7.
  • 8.
    Basic Skills 2 An ethicalhacker must be a computer systems expert and needs to have very strong programming and computer networking skills. An ethical hacker needs to have a lot of patience, persistence, and perseverance to try again and again and wait for the required result.
  • 9.
    Who Are theWhite Hat Hackers? Often referred to as “ethical hackers”, white-hat hackers make the choice the use their knowledge and abilities for good, instead of evil. In some cases, white-hat hackers are paid employees or contractors that are hired to work for companies as security experts. This type of white-hat hackers is usually referred to as a penetration tester, whose job it is to find vulnerabilities in the computer infrastructure by hacking into it. Typically, white-hat hackers use the exact same hacking techniques that a black-hat hacker would; however, the main difference between the two is that white-hats hack into computer systems with explicit permission from the system’s owner, making the process legal. Essentially, white-hat hackers test security systems that are already in place to see where they can be improved.
  • 10.
    Who are theBlack Hat Hackers?  Malicious  Most common hackers related to recent cybercrime news.  Look for vulnerabilities. • Individual PC • Organization • Bank System  Use loopholes and hack into network to get access to personal, business and financial information.  Agenda: Mostly monetary, but not always.  Illegal actions with bad intention.
  • 11.
    White Hat • QualityContent • Guest blogging • Link Baiting • Improving Content • Redesigning Websites • Researching and Analyzing • Rewriting • Internal Linking Black Hat • Hidden Text • Keyword Stuffing • Duplicate Content • Link Farming • Doorway Page • Cloaking • Parasites Hosting • Scraping Difference between White Hat and Black Hat SEO
  • 12.
    Password guessing andcracking Session Hijacking Techniques of Hacking
  • 13.
    Network traffic Sniffing Denial ofServices Attacks SQL Injection Exploit buffer overflow Vulnerabilities Techniques Session Spoofing
  • 14.
  • 15.
    Raspberry Pi 3 Toolsused for Ethical Hacking Rubber Ducky LAN Turtle Wifi- Pineapple
  • 16.
    Life threats forBlack Hat Hackers • There’s no way around it: black hat hackers are criminals, and with damages mounting and these crimes gaining increased attention, it won’t be long before cyber criminals are fully lumped in with your run-of-the-mill criminals ranging from pickpockets and burglars to white collar fraudsters in the eyes of the public. • Breaking the law, after all, is breaking the law, no matter how comfortable and convenient the internet has made some of those illegal activities.But just because someone once dabbled (or more than dabbled) in black hat hacking doesn’t mean he or she has to be considered a criminal for life. • People with hacking skills – even those with black hat hacking pasts, like infamous Anonymous hacker Hector Monsegur – are being fervently sought by businesses and organizations who want to put those skills to use in securing their own networks and systems. • Hackers using their powers for good to try and break into target systems in order to better secure those systems are considered white hat hackers or ethical hackers, and with an ethical hacker
  • 17.
    Conclusion You need tostay as a White Hat Hacker which means you need to work within given boundaries. Never intrude or attack any computer or network without a required permission from the authorities. As a final note, it is highly recommended that you refrain from engaging yourself in black hat hacking which may spoil your entire career.
  • 18.
    Vivek Ramachandran Ankit Fadia Sunny Vaghela Trishneet Arora Listof Top 4 Ethical Hackers in India Ethical Hackers
  • 19.
    George Hotz DVD- Jon ray McKin JohnWu Mudge Barnaby Jack Top 6 greatest Hacker in the World
  • 20.
    Most Wanted BlackHat Hackers in FBI Fuji e W an g H o s s e i n P a r v a r I g o r O l e g o v i n c h T u r a s h e v Maksim Viktorovich Yakubets
  • 21.
    1 Anuj Kumar 2Akshaan Raj 3 Milennium Adhayage 4 Sunipa Bera
  • 22.
  • 23.

Editor's Notes