Skip to main content

Types of Hackers You Should Know

Hackers are varied creatures and include these 7 types:
 Script Kiddie – Script Kiddies normally don’t care about hacking (if they did, they’d be Green Hats. See below.). They copy code and use it for a virus or an SQLi or something else. Script Kiddies will never hack for themselves; they’ll just download overused software (LOIC or Metasploit, for example) and watch a YouTube video on how to use it. A common Script Kiddie attack is DoSing or DDoSing (Denial of Service and Distributed Denial of Service), in which they flood an IP with so much information it collapses under the strain. This attack is frequently used by the “hacker” group Anonymous, which doesn’t help anyone’s reputation.
White Hat – Also known as ethical hackers, White Hat hackers are the good guys of the hacker world. They’ll help you remove a virus or PenTest a company. Most White Hat hackers hold a college degree in IT security or computer science and must be certified to pursue a career in hacking. The most popular certification is the CEH (Certified Ethical Hacker) from the EC-Council.
Black Hat – Also known as crackers, these are the men and women you hear about in the news. They find banks or other companies with weak security and steal money or credit card information. The surprising truth about their methods of attack is that they often use common hacking practices they learned early on.
Gray Hat – Nothing is ever just black or white; the same is true in the world of hacking. Gray Hat hackers don’t steal money or information (although, sometimes they deface a website or two), yet they don’t help people for good (but, they could if they wanted to). These hackers comprise most of the hacking world, even though Black Hat hackers garner most (if not all) of the media’s attention.
Green Hat – These are the hacker “n00bz,” but unlike Script Kiddies, they care about hacking and strive to become full-blown hackers. They’re often flamed by the hacker community for asking many basic questions. When their questions are answered, they’ll listen with the intent and curiosity of a child listening to family stories.
Red Hat – These are the vigilantes of the hacker world. They’re like White Hats in that they halt Black Hats, but these folks are downright SCARY to those who have ever tried so much as PenTest. Instead of reporting the malicious hacker, they shut him/her down by uploading viruses, DoSing and accessing his/her computer to destroy it from the inside out. They leverage multiple aggressive methods that might force a cracker to need a new computer.
Blue Hat – If a Script Kiddie took revenge, he/she might become a Blue Hat. Blue Hat hackers will seek vengeance on those who’ve them angry. Most Blue Hats are n00bz, but like the Script Kiddies, they have no desire to learn.
Thanks for reading VIA GrayHat4Life

Comments

Popular posts from this blog

There is no regret in Obedience

It’s a guarantee your life will never be the same again when you obey God. God is our CREATOR and our DIRECTOR meaning he knows the best way for our lives since he loves us, our role is to simply OBEY Him. Obedience is everything when we are relating to God. Obedience is the KEY ingredient in the kingdom of God. God is always ready to manifest himself in our lives when we obey Him and his word(John 14:23 Jesus Replied, “Anyone who loves me will obey my teaching. My Father will love them, and we will come to them and make our home with them.” Like 5:5 Simon Peter an experienced fisherman with a fishing business had toiled the whole night without any catch of fish and he was frustrated and tired and he was washing his nets UNTIL Jesus told him to Launch out into the deep again. Peter had a CHOICE to say YES or NO but he choose to OBEY and he said: “Nevertheless AT THY WORD I WILL LET DOWN THE NET”. The moment he chooses to obey instead of Questioning, Analyzing and trying ...

President Uhuru Kenyatta sets ablaze world's biggest Ivory Pile #WorthMoreAlive #IvoryBurn

Kenya has burned more than Sh31 billion worth of ivory in a bold sign of commitment to declaring a war on ivory trade and poaching. President Uhuru Kenyatta on Saturday lit fire on the 105 tonnes of ivory, stack up in 11 huge pyramid-shaped pyres, that is expected to burn for at least three days. Speaking at the burning ceremony, President Kenyatta said Kenya will not tolerate ivory trade even as the country has to grapple with “a new generation of poachers with sophisticated weapons who are threatening national heritage and safety of communities.” By destroying the ivory, we declare once and for all that our National Heritage is not for sale. For us ivory is worthless, unless it is on our elephants said the president Check the pictures below:>>>>>

CA sounds alert on fake software

The telecommunications sector watchdog has warned companies and individual Internet users from buying fake software, saying it now offers hackers the most common loophole for executing cyber-attacks. The Communications Authority of Kenya (CA), through the National Computer Incident Response Team Co-ordination Centre (National KE-CIRT/CC), warned on Thursday that cybercriminals have changed tack and are now using third-party software to deliver threats to unsuspecting users in an attempt to compromise and steal their personal data. “Though Kenya has not been adversely affected by such attacks as at now, the trend depicts a serious concern in cybercrime management and thus a precaution should be taken when dealing with outsourced products and personnel,” said acting CA director- general Christopher Kemei in a statement. Kenyan businesses lose billions of shillings and troves of sensitive information to hackers every year. SOURCE