Skip to main content

Ethical Hacking Tutorial - Types of Hacker

Ethical Hacking Tutorial - Types of Hacker


Welcome to the 2nd day of my Ethical Hacking Tutorial, In previous tutorial, I have discussed about the meaning of hacking, types of hacking and it's advantages and disadvantages. In one word have talked about Overall Reviews.

IF YOU HAVE MISSED THE PREVIOUS TUTORIAL ON Ethical Hacking Tutorial Check Here

 
In today's tutorial, i'll discuss about the types of hackers. Hackers can be classified into different categories such as white hat, black hat, grey hat and miscellaneous. Check out How to Kill Friend's WiFi Connection on your Devices With WifiKill Android Apk. 
Based on their intent of hacking a system. These different terms come from old Spaghetti Westerns, where the bad guy wears a black cowboy hat and the good guy wears a white hat and lot to talk about but no time. Check out 14 Android Hacking Apps To Turn Your Android Into A Hacking Device. 


Types of Hackers


  • White Hat Hackers:

White Hat hackers are also known as Ethical Hackers. They never intent to harm a system or network rather they try to find out weaknesses in a computer or a network system as a part of penetration testing and vulnerability assessments. Ethical hacking is not illegal and it is one of the demanding jobs available in the IT industry. There are numerous companies that hire ethical hackers for penetration testing and vulnerability assessments. White Hat Hackers are called the Good guy. You can only identify them with their White cowboy hat.  


  • Black Hat Hackers:

Black Hat hackers, it's also known as crackers, they are those who hack in order to gain unauthorized access to a system and harm its operations or steal sensitive information. Black Hat hacking is always illegal because of its bad intent which includes stealing money from someone else account, government account, organizations account, stealing corporate data, violating privacy, damaging the system, blocking network communication, etc... And they are called the bad guy.. 

  • Grey Hat Hackers:

Grey hat hackers are a blend of both black hat and white hat hackers. I call it 2 in 1 hacker. They act without malicious intent but for their fun, they exploit a security weakness in a computer system or network without the owner’s permission or knowledge.
Their intent is to bring the weakness to the attention of the owners and getting appreciation or a little bounty from the owners.

  • Miscellaneous Hackers:

Apart from the 3 above well-known classes of hackers, we have the following categories of hackers based on what they hack and how they do it :−

    •  Red Hat Hackers

      • Red hat hackers are again a blend of the first 3 above listed. They are usually on the level of hacking organizations, government agencies, top-secret information hubs, and generally anything that falls under the category of sensitive information.

    • Blue Hat Hackers

      • A blue hat hacker is someone outside computer security consulting firms who is used to bug-test a system prior to its launch. They look for loopholes that can be exploited and try to close these gaps. Microsoft also uses the term BlueHat to represent a series of security briefing events.

    •  Elite Hackers

      • This is a social status among hackers, which is used to describe the most skilled. Newly discovered exploits will circulate among these hacker.

    • Script Kiddie

      • A script kiddie is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, usually with little understanding of the underlying concept, hence the term Kiddie.

    • Neophyte

      • A neophyte, "n00b", or "newbie" or "Green Hat Hacker" is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology and hacking.

    • Hacktivist

      • A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denialof-service attacks.

Comments

Popular posts from this blog

Top 3 Simple Method on How to Hack Whatsapp 2017

Top 3 Simple Method on How to Hack Whatsapp 2017   Nowadays, Whatsapp is one of the most commonly used and popular Social media service network. That's why today I have done lots of of research on Whatsapp tips and tricks including whatsapp hacking tips.. Now today I'm posting this article about how to Hack WhatsApp free. In every article of my hacking tricks, I have already told you that the hacking tutorials here are only for Educational proposes and not for newbies.

How to setup FREE DSTV Channels with Tricks and Codes 

How to setup FREE DSTV Channels with Tricks and Codes  Good day dude.... Welcome to FREE DSTV CHANNELS LIVE. This is an article which will help you to watch DSTV channels for free at home and office. Lots of people still believe that you need pay before enjoying your favorite movies and Channels on DSTV but NO. And you don't need to do some sort of hacks before you can be allowed to access your favorite DSTV Channels.      But before I proceed, here are the following channels you will pick after entering the settings am about to give you below:- Lotus FM, Mindset Health, Botswana TV, Vivid Mosiac, RADIO Radio2000, Hope Channel Africa, ITV, Astro, God TV Africa, SAFM, Ikwekwezi FM, 5FM, RSG, Lesedi FM, Trans World Radio, Metro FM, Good Hope FM, Channel Africa, Classic FM, DW Radio, Radio Pulpit/Kansel, Impact Radio, Radio Pretoria, ASTV, YFM.  Lucky for you, there is a way y...

12 Helpful Android Applications That Aren't Accessible On Google Play Store 2017

Top Best 2017 Android Apps & Games That Aren't Accessible On Google Play Store  We as a whole realize that applications like Facebook, WhatsApp, Instagram, Snapchat and a great deal more are the top downloaded applications in the Google Play Store, yet this doesn't imply that they are the best applications accessible. There are a huge amount of Android applications that are not accessible in the Google Play store.