Saturday 19 March 2016

Introduction and Types

What Is Hacking?

Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose. The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a hacker.

Computer hacking is the most popular form of hacking nowadays, especially in the field of computer security, but hacking exists in many other forms, such as phone hacking, brain hacking, etc. and it's not limited to either of them.

Types Of Hackers :-

Basically,there are three types of Hackers:

1) Black Hat Hackers
2) White Hat Hackers
3) Grey Hat Hackers

Let's Go Through Detailed Understanding Of Each...

BLACK HAT HACKERS:-

Black Hat Hackers hold unethical intentions and break into computers or networks for their own taste. Black hat hackers are also known as crackers. These types of hackers continuously keep an eye on victim computer’s vulnerability, as soon as they find it, they break into it for malicious intentions. These types of hackers are engaged in almost all types of cyber crimes, such as ID theft, money stealing from Credit Cards, piracy of paid content and so on. They can use malicious websites and malicious soft-wares (worms) to start their journey in victim’s network.



WHITE HAT HACKERS:-

White hat hackers are people who hack into systems or networks for betterment of their computers. They don’t do it with unethical intentions, instead they do it so that they can know the way other hackers can do, and then they fix the security hole, if there is any. White hat hackers are mostly security experts. They are usually hired by companies to test the company’s computers security. Bounty Hunters and Penetration testers are other names of White Hat hackers.



GREY HAT HACKERS:-

Grey Hat hackers have both White hat and Black hat hacker’s habits. They surf the internet and look for a vulnerable computer system, network or phone system. Once they find one, they hack into it and inform the administrator what or how they have done it. They usually charge a small fee to fix the vulnerability. That’s why they are White Hat hackers too. But they do it all without any permission from owner of website, computer or network, this way they are black hat hackers.


No comments:

Post a Comment