View previous topicGo downView next topic
Posts : 8
Join date : 2017-09-24
Age : 16
Location : kebbi state
View user profile


on Sat Sep 30, 2017 7:34 am

In computer security, a hacker is someone who focuses on security mechanisms of computer and network systems. There are a community and shared culture of expert programmers and networking wizards that trace its history back through decades to the first time-sharing minicomputers and the earliest ARPAnet experiments. The members of this culture were the first "hackers." Breaking into computers and breaking phone systems have come to symbolize hacking in popular culture, but hacking culture is much more complex and moralistic than most people know. To become a hacker, learn basic hacking techniques, how to think like a hacker, and how to gain respect within the ethical hacking community

more on Hackers: A Hacker is a person who is extremely interested in exploring the things and recondite workings of any computer system or networking system. Most often, hackers are expert programmers. These are also called Ethical Hackers or white hat hackers. The technique they use is called ethical hacking.
Ethical Hacking means you think like Hackers. First you hack systems and find the loop holes, and then you try to correct those loop holes. These type of hackers protect the cyber world from every possible threat and fix potential future security loop holes. These peoples are also called the “Gurus” of Computer Security
. Very Happy  Very Happy  Very Happy  Very Happy  Very Happy
1.WHITE HAT HACKER (GOOD GUYS): White Hat – Also known as ethical hackers, White Hat hackers are the good guys of the hacker world. They’ll help you remove a virus or PenTest a company. Most White Hat hackers hold a college degree in IT security or computer science and must be certified to pursue a career in hacking. The most popular certification is the CEH (Certified Ethical Hacker) from the EC-Council.

2.BLACK HAT HACKER (BAD GUYS) :Black Hat – Also known as crackers, these are the men and women you hear about in the news. They find banks or other companies with weak security and steal money or credit card information. The surprising truth about their methods of attack is that they often use common hacking practices they learned early on.

3.GREY HACKER:Gray Hat – Nothing is ever just black or white; the same is true in the world of hacking. Gray Hat hackers don’t steal money or information (although, sometimes they deface a website or two), yet they don’t help people for good (but, they could if they wanted to). These hackers comprise most of the hacking world, even though Black Hat hackers garner most (if not all) of the media’s attention.

4.HACKTIVIST:they protest for any bad thing happen in the cyber
5.Green Hat:Green Hat – These are the hacker “n00bz,” but unlike Script Kiddies, they care about hacking and strive to become full-blown hackers. They’re often flamed by the hacker community for asking many basic questions. When their questions are answered, they’ll listen with the intent and curiosity of a child listening to family stories.

6.Red Hat :Red Hat – These are the vigilantes of the hacker world. They’re like White Hats in that they halt Black Hats, but these folks are downright SCARY to those who have ever tried so much as PenTest. Instead of reporting the malicious hacker, they shut him/her down by uploading viruses, DoSing and accessing his/her computer to destroy it from the inside out. They leverage multiple aggressive methods that might force a cracker to need a new computer.

7.Blue Hat:
Blue Hat – If a Script Kiddie took revenge, he/she might become a Blue Hat. Blue Hat hackers will seek vengeance on those who’ve them angry. Most Blue Hats are n00bz, but like the Script Kiddies, they have no desire to learn

8.SCRIPT KIDDIE (NOOBS) : Script Kiddies normally don’t care about hacking (if they did, they’d be Green Hats. See below.). They copy code and use it for a virus or an SQLi or something else. Script Kiddies will never hack for themselves; they’ll just download overused software (LOIC or Metasploit, for example) and watch a YouTube video on how to use it. A common Script Kiddie attack is Dosing or DDoSing (Denial of Service and Distributed Denial of Service), in which they flood an IP with so much information it collapses under the strain. This attack is frequently used by the “hacker” group Anonymous, which doesn’t help anyone’s reputation.
A cracker is someone who breaks into someone Else's computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security. A cracker can be doing this for profit, maliciously, for some altruistic purpose or cause, or because the challenge is there. Some breaking-and-entering has been done ostensibly to point out weaknesses in a site's security system. Laughing  Laughing  Laughing  Laughing  Laughing  Laughing  Laughing

Today I will explain the difference between hacker and cracker. There are lots of articles on internet about the difference between hackers and crackers. In those articles, authors or publishers often try to correct the public misconceptions. For many years, media has erroneously associated the hacker word with a cracker. The general public now believes hacker is someone who breaks into computer systems, hacking passwords and websites and misusing information. This conception is absolutely untrue and demoralizes some of our most talented hackers.

and also a cracker (also known as a black hat hacker) is an individual with extensive computer knowledge whose purpose is to breach or bypass internet security or gain access to software without paying royalties. The general view is that, while hackers build things, crackers break things. Cracker is the name given to hackers who break into computers for criminal gain; whereas, hackers can also be internet security experts hired to find vulnerabilities in systems. These hackers are also known as white hat hackers.  Crackers’ motivations can range from profit, a cause they believe in, general maliciousness or just because they like the challenge. They may steal credit card numbers, leave viruses, destroy files or collect personal information to sell.

Crackers can also refer to those who reverse engineer software and modify it for their own amusement.  The most common way crackers gain access to networks or systems is through social engineering, whereby the cracker contacts employees at a company and tricks them into divulging passwords and other information that allows a cracker to gain access.

The term hacker was first used in the 1960s to describe a programmer or an individual who, in an era of highly constrained computer capabilities, could increase the efficiency of computer code in a way that removed, or "hacked," excess machine-code instructions from a program. It has evolved over the years to refer to a person with an advanced understanding of computers, networking, programming or hardware.

   Cracker, or security hacker, a person who maliciously exploits weaknesses in a computer or network
   Cracker, a person who uses password cracking to recover passwords
   Cracker, a person who uses software cracking to modify a program
View previous topicBack to topView next topic
Permissions in this forum:
You cannot reply to topics in this forum