Hacking??

HACKING ??

ACCORDING TO WIKIPEDIA:-

A hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a network or system Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge, recreation, or to evaluate system weaknesses to assist in formulating defenses against potential hackers. The subculture that has evolved around hackers is often referred to as the “computer underground”

In computer security, a hacker is someone who focuses on security mechanisms of computer and network systems. While including those who endeavour to strengthen such mechanisms, it is more often used by the mass media and popular culture to refer to those who seek access despite these security measures. That is, the media portrays the ‘hacker’ as a villain. Nevertheless, parts of the subculture see their aim in correcting security problems and use the word in a positive sense. White hat is the name given to ethical computer hackers, who utilize hacking in a helpful way. White hats are becoming a necessary part of the information security field. They operate under a code, which acknowledges that breaking into other people’s computers is bad, but that discovering and exploiting security mechanisms and breaking into computers is still an interesting activity that can be done ethically and legally. Accordingly, the term bears strong connotations that are favorable or pejorative, depending on the context.

TYPES OF HACKERS

1. Black Hat Black hat hackers are normally responsible for creating malware, which is frequently used to infiltrate computerized networks and systems. They’re usually motivated by personal or financial gain, but can also participate in espionage, protests, or merely enjoy the thrill. Black hat hackers can be anyone from amateurs to highly experienced and knowledgeable individuals looking to spread malware, steal private data, like login credentials, along with financial and personal information. Upon accessing their targets and depending on their motives, black hat hackers can either steal, manipulate, or destroy system data.

2. White Hat Also known as “ethical hackers,” they’re often employed or contracted by companies and governmental entities, working as security specialists looking for vulnerabilities. While they employ the same methods as black hat hackers, they always have permission from the system’s owner, making their actions completely legal. White hat hackers implement strategies like penetration tests, monitor in-place security systems, along with vulnerability assessments. Ethical hacking, the term used to describe the nature of a white hat hackers’ actions, can even be learned through independent sources, training, conferences, and certifications.

3. Grey Hat As the name suggests, these individuals utilize aspects from black and white hat hackers, but will usually seek out vulnerabilities in a system without an owner’s permission or knowledge. While they’ll report any issues they encounter to the owner, they’ll also request some sort of compensation or incentive. Should the owner not respond or reject their proposition, a grey hat hacker might exploit the newfound flaws. Grey hat hackers aren’t malicious by nature, but do seek to have their efforts rewarded. Since grey hat hackers don’t have permission to access the system by its owner, their actions are ultimately considered illegal, despite any alarming findings they might reveal.

So u now know who is a hacker and what are the types of hackers there exist in the community.

It’s upon you which one you have to become.

Don’t forget me connect me via my social media handles…. and for the absolute beginners check out my book How to start hacking on amazon.

--

--

--

Entrepreneur.. Cs student..Hacker ..Speedcuber… Chessmaster… developer…..author of How to start hacking

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

{UPDATE} Bonfire Stories Hack Free Resources Generator

2 simple tips to avoid being robbed by phishing

Popping Shells and Jumping Fences

Investigating Network traffic activity using Brim and Zeek

Things you need to check before exchanging your money

Qlocker Ransomware Tradeoff: Increase Your NAS Security or Lose Business?

Nft Metaverse

{UPDATE} sudoku 100 pro! - puzzle Intellectual exercise Hack Free Resources Generator

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
adihacks Aditya Rawat

adihacks Aditya Rawat

Entrepreneur.. Cs student..Hacker ..Speedcuber… Chessmaster… developer…..author of How to start hacking

More from Medium

Different Fun Commands In Linux

A beginner’s guide to the Singapore PDPA — Privacy Ninja

Forget password? Read this to reset…!!(Ubuntu)

Hackthebox — Timing Walkthrough