Hackers are classified according to the intent of their actions. The
following list classifies hackers according to their intent
- Script Kiddie - Script Kiddies normally don’t care about hacking (if they did, they’d be Green Hats. See below.). They copy code and use it for a virus or an SQLi or something else. Script Kiddies will never hack for themselves; they’ll just download overused software (LOIC or Metasploit, for example) and watch a YouTube video on how to use it. A common Script Kiddie attack is DoSing or DDoSing (Denial of Service and Distributed Denial of Service), in which they flood an IP with so much information it collapses under the strain. This attack is frequently used by the “hacker” group Anonymous, which doesn’t help anyone’s reputation.
- White Hat (Ethical Hacker) - White Hat hackers are the good guys of the hacker world. They’ll help you remove a virus or PenTest a company. Most White Hat hackers hold a college degree in IT security or computer science and must be certified to pursue a career in hacking. The most popular certification is the CEH (Certified Ethical Hacker) from the EC-Council
- Black Hat (Crackers) - Black Hat Hackers are the bad guys of the hacker world. These are the men and women you hear about in the news. They find banks or other companies with weak security and steal money or credit card information. The surprising truth about their methods of attack is that they often use common hacking practices they learned early on.
- Gray Hat - Nothing is ever just black or white; the same is true in the world of hacking. Gray Hat hackers don’t steal money or information (although, sometimes they deface a website or two), yet they don’t help people for good (but, they could if they wanted to). These hackers comprise most of the hacking world, even though Black Hat hackers gain most (if not all) of the media’s attention. These are the guys who do all the illegal things legally.
- Green Hat - These are the hacker “n00bz”, but unlike Script Kiddies, they care about hacking and strive to become full-blown hackers. They’re often flamed by the hacker community for asking many basic questions. When their questions are answered, they’ll listen with the intent and curiosity of a child listening to family stories. In short, they are the one who don't have complete knowledge but their only aim is to become a complete hacker one day.
- Red Hat - These are the vigilantes of the hacker world. They’re like White Hats in that they halt Black Hats, but these folks are downright SCARY to those who have ever tried so much as PenTest. Instead of reporting the malicious hacker, they shut him/her down by uploading viruses, DoSing and accessing his/her computer to destroy it from the inside out. They leverage multiple aggressive methods that might force a cracker to need a new computer. In short, they protect the world from Black Hats though illegally. Its like stopping criminals by killing them.
- Blue Hat - If a Script Kiddie took revenge, he/she might become a Blue Hat. Blue Hat hackers will seek vengeance on those who’ve them angry. Most Blue Hats are n00bz, but like the Script Kiddies, they have no desire to learn.
- Hacktivist - A hacker who use hacking to send social, religious, and political etc. messages. This is usually done by hijacking websites and leaving the message on the hijacked website.
- Phreaker - A hacker who identifies and exploits weaknesses in telephones instead of computers.
The most of media attention is captured by Black Hats. They don't need respect from public, instead they want fame. While White Hats get the most respect from public, but they don't get fame. The Red Hats are the ones who should be given both - respect and fame, but they remain hidden instead. And at last, something interesting and surprising about the Hackers' World - The Script Kiddies get the least respect but are most annoying and dangerous and can cause big problems without actually knowing what they are doing. Script Kiddies have minimum skills but are the most dangerous.
In the above article, you may have read many words which will make you curious to know more about it. Like SQLi, DoS, DDoS, PenTest, CEH, etc..
ReplyDeleteIf I wrote about all these here, the article would become very lengthy. Also it would be like jumping from basics to pro and that why I prefer to wait.
All those terms and methods will be explained in my upcoming articles.
Thanks..
nice articles
ReplyDeleteCONTACT: onlineghosthacker247 @gmail. com
ReplyDelete-Find Out If Your Husband/Wife or Boyfriend/Girlfriend Is Cheating On You
-Let them Help You Hack Any Website Or Database
-Hack Into Any University Portal; To Change Your Grades Or Upgrade Any Personal Information/Examination Questions
-Hack Email; Mobile Phones; Whatsapp; Text Messages; Call Logs; Facebook And Other Social Media Accounts
-And All Related Services
- let them help you in recovery any lost fund scam from you
onlineghosthacker Will Get The Job Done For You
onlineghosthacker247 @gmail. com
TESTED AND TRUSTED!