Thursday 7 February 2013

Who are hackers?



Hackers are those who want to be explore the Computer System, They find the ways to work more effectively  Computer Work, They are usually the master minds, or do things they weren’t intended to do. There are two types of hackers(basically there is also one another type: they are known as Gray Hat Hackers but this type is not ponder over so much nowdays):



White Hat – They are also named as Ethical Hackers. These are considered the good guys. White hat hackers don’t use their skills for illegal purposes. They usually become Computer Security experts and help protect people from the Black Hats.

Black Hat – These are considered the bad guys. Black hat hackers usually use their skills maliciously for personal gain. They are the people that hack banks, steal credit cards, and deface websites.

These two terms came from the old western movies where the good guys wore white hats and the bad guys wore black hats.
May be mostly peoples right here more familiar with the name of them but not so many are familiar with Hackers Hierarchy


Hacker Hierarchy:

Script kiddies – These are the wannabe hackers. They are looked down upon in the hacker community because they are the people that make hackers look bad. Oftenly the are very inspired by an English movies which starts from hacking and end with hero retardnes. Script kiddies usually have no hacking skills and use the tools developed by other hackers like metasploit without any knowledge of what’s happening behind the scenes.

Intermediate hackers – These people usually know about computers, networks, and have enough programming knowledge to understand relatively what a script might do, but like the script kiddies they use pre-developed well-known exploits (- a piece of code that takes advantage of a bug or vulnerability in a piece of software that allows you to take control of a computer system) to carry out attacks

Elite Hackers – These are the skilled hackers. They are the ones that write the many hacker tools and exploits out there. They can break into systems and hide their tracks or make it look like someone else did it. You should strive to eventually reach this level.

No comments:

Post a Comment