Sunday, October 14, 2018

Hacking




Computer hacking is the most popular form of hacking nowadays,especially in the field of computer security, but hacking exists in many other forms, such as phone hacking,brain hacking, etc. and it's not limited to either of them.Due to the mass attention given to black hat hackers from the media, the whole hacking term is often mistaken for any security related cyber crime.This damages the reputation of all hackers, and is very cruel and unfair to the law abiding ones of them,from who the term itself originated. The goal of this website is to introduce people the true philosophy and ethics of hackers,hopefully clearing their name and giving them the social status they deserve.Certified Ethical Hacker (CEH) is a qualification obtained in assessing the security of computer systems, using penetration testing techniques.

   Penetration tests are usually employed by an organization who trusts them to attempt to penetrate networks and/or computer systems for the purpose of finding and fixing computer security vulnerabilities. Unauthorized hacking (gaining access to computer systems without prior authorization from the owner) is a crime in most countries, but penetration testing done by request of the owner of the victim system(s) or network(s) is not.[citation needed]


       Hacking is the practice of modifying the features of a system,in order to accomplish a goal outside of the creator's original purpose. The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a hacker.





White hat Hackers

             A white hat hacker breaks security for non-malicious reasons,perhaps to test their own security system or whileworking for a security company which makes security software.The term "white hat" in Internet slang refers to an ethical hacker. This classification also includes individuals who perform penetration tests and vulnerability assessments within a contractual agreement. The EC-Council, also known as the International Council of Electronic Commerce Consultants, is one of those organizations that have developed certifications, course ware, classes, and online training covering the diverse arena of ethical hacking. 



Black hat Hackers


       Black hat hackers break into secure networks to destroy, modify, or steal data; or to make the network unusable for those who are authorized to use the network.Black hat hackers are also referred to as the "crackers" within the security industry and by modern programmers. Once they have gained control over a system, they may apply patches or fixes to the system only to keep their reigning control. Richard Stallman invented the definition to express the maliciousness of a criminal hacker versus a white hat hacker who performs hacking duties to identify places to repair.




Grey hat Hackers


      A grey hat hacker lies between a black hat and a white hat hacker.A grey hat hacker may surf the Internet and hack into a computer system for the sole purpose of notifying the administrator that their system has a security defect,for example.They may then offer to correct the defect for a fee. Grey hat hackers sometimes find the defect of a system and publish the facts to the world instead of a group of people. Even though grey hat hackers may not necessarily perform hacking for their personal gain, unauthorized access to a system can be considered illegal and unethical.





Elite hacker 

   A social status among hackers,elite is used to describe the most skilled. Newly discovered exploits circulate among these hackers. Elite groups such as Masters of Deception conferred a kind of credibility on their members.



Script kiddie 


      A script kiddie (also known as a skid or skiddie) is an unskilled hacker who breaks into computer systems by using automated tools written by others (usually by other black hat hackers), hence the term script ( a prearranged plan or set of activities) kiddie (kid, child—an individual lacking knowledge and experience, immature), usually with little understanding of the underlying concept.





Neophyte      

        A neophyte ("newbie", or "noob") is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology and hacking.



Blue hat 
Hackers

     A blue hat hacker is someone outside computer security consulting firms who is used to bug-test a system prior to its launch,looking for exploits so they can be closed.Microsoft also uses the term Blue Hat to represent a series of security briefing events.




Hacktivist

            A hacktivist is a hacker who utilizes technology to publicize a social, ideological, religious or political message.



0 comments:

Post a Comment