Hello friends, here this is Ujjwal Sahay and now I am going to start the first topic of my book HACK-X-CRVPT with the very basic introduction to hackers and their communities. Here basically we are going to discuss about some basic facts like who the hackers are, what are their intentions, types of hackers and their communities etc.
Communities of Hackers:-
• HACKERS
• CRACKERS
• PHREAKS
• SCRIPT KIDDIES
HACKERS are the Intelligent Computer Experts.
INTENSION OF HACKERS:
Types of Hackers:
·White Hat Hackers –͞White hats is the name used for security experts. While they often use the same tools and techniques as the black hats, they do so in order to foil the bad guys. That is, they use those tools for ethical hacking and computer forensics. Ethical hacking is the process of using security tools to test and improve security (rather than to break it!). Computer forensics is the process of collecting evidence needed to identify and convict computer criminals.
·Black Hat Hackers –They use their knowledge and skill set for illegal activities and destructive intents. Obviously, the ͞black hats are the bad guys. These are the people who create and send viruses and worms, break into computer systems, steal data, shut down networks, and basically commit electronic crimes. We talk about black hats at several points in this book. Black hat hackers and malware writers are not considered as the same thing in the security community even though they are both breaking the law.
·Grey Hat Hackers -They use their knowledge and skill set for the legal and illegal purpose. They are white hats in public but internally they do some black hat work. Gray hats sit in the middle of the fence because sometimes they cross that ethical line (or more often, define it differently). For example, gray hats will break into a company’s computer system just to wander around and see what’s there. They think that simply because they don’t damage any data, they’re not committing a crime. Then they go and apply for jobs as security consultants for large corporations. They justify their earlier break-in’s as some sort of computer security training. Many really believe that they’re providing a public service by letting companies know that their computers are at risk.
CRACKERS are those who break into the applications with some malicious intentions either for their personal gain or their greedy achievements.
Intension of crackers:-
PHREAKS are those people who use computer devices and software programs and their tricky and sharp mind to break into the phone networks.
Intention of phreaks:-
SCRIPT KIDDIES:- These are computer novices who take advantage of the hacker tools, vulnerability scanners, and documentation available free on the Internet but who don’t have any real knowledge of what’s really going on behind the scenes. They know just enough to cause you headaches but typically are very sloppy in their actions, leaving all sorts of digital fingerprints behind. Even though these guys are the stereotypical hackers that you hear about in the news media, they often need only minimal skills to carry out their attacks.
Intention of script kiddies:-
Black Hat Hackers Strategy:-
Conclusion: - Security is important because prevention is better than
Cure.