Hacking Terminologies

in #hacking7 years ago

Hey people!!!

Before you start with hacking we need to know different keywords related to hacking.

I will be giving you brief explanation on all those keywords.

Hacker:
A person, who delights in having an understanding of the internal workings of a system, computers and computer networks in particular. It is used to refer to someone skilled in the use of computer systems, especially if that skill was obtained in an exploratory way. The term is often misused in a pejorative context, where "cracker" would be the correct term, and due to that the term evolved to be applied to individuals, with or without skill, who break into security systems. Several subgroups are underground with different attitudes and aims.They use different terms to demarcate themselves from each other, or try to exclude some specific group with which they do not agree. In hackers culture there are many different categories, such as white hat (“ethical hacking”), grey hat, black hat and script kiddies. Usually the term cracker refers to black hat hackers, or more generally hackers with unlawful intentions.

             In short,A person or people that presents a security threat and attacks a system-for good or bad is a Hacker.

Types of Hacker:

  1. White Hat
    A White Hat is the hero or good guy, especially in computing slang, where it refers to an ethical hacker or Penetration tester who focuses on securing and protecting IT systems.

White Hat Hackers, also known as Ethical Hackers, are Computer Security Experts, who are specialized in penetration testing, and other testing methodologies, to ensure that a company's information systems are secure. Such people are employed by companies where these professionals are sometimes called sneakers, tiger teams or red teams.

  1. Black Hat
    A Black Hat is the villain or bad guy. It refers to a hacker that breaks into networks or computers, or creates computer viruses. Black Hat Hackers (also called "Crackers") who are specialized in unauthorized penetration of information systems. They may use computers to attack systems for profit, for fun, or for political motivations or as a part of a social cause. Such penetration often involves modification and/or destruction of data, and is done without authorization and hence they should not be confused with Ethical Hackers.
  1. Grey Hat
    A Grey Hat, in the hacking community, refers to a skilled hacker who sometimes acts legally, sometimes in good will, and sometimes not. They are a hybrid between white and black hat hackers. They usually do not hack for personal gain or have malicious intentions, but may or may not occasionally commit crimes during the course of their technological exploits.
  1. Phreaker
    Phreaking is a slang term coined to describe the activity of a subculture of people who study, experiment with, or explore telecommunication systems, like equipment and systems connected to public telephone networks. As telephone networks have become computerized, Phreaking has become closely linked with Computer Hacking. This is sometimes called the H/P culture (with H standing for Hacking and P standing for Phreaking). The term "Phreak" is a mixture of the words "Phone" and "Freak", and may also refer to the use of various audio frequencies to manipulate a phone system. "Phreak", "Phreaker", or "Phone Phreak" are names used for and by individuals who participate in Phreaking.
  1. Script Kiddies
    In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or programs developed by others to attack computer systems and networks.

It is generally assumed that script kiddies are like amateur kids who lack the ability to write sophisticated hacking programs or exploits on their own, and that their objective is to try to impress their friends or gain credit in underground hacker communities.

  1. Hacktivists
    Some people describing themselves as Hacktivists have taken to defacing websites for political reasons, such as attacking and defacing government websites as well as web sites of groups who oppose their ideology. Hacktivist is a mixture of the words Hacker and Activist. Their activities include many political ideals and issues. Hacktivism is a controversial term. Some argue it was coined to describe how electronic direct action might work toward social change by combining programming skills with critical thinking. Others use it as practically synonymous with malicious, destructive acts that undermine the security of the Internet as a technical, economic, and political platform.

Basically Hackers Use A Pattern To Attack Different System
There are always systematic method to do anything and so,Every Hacker do follow some predefined rules or steps to hack into the system including but not limited to:

Reconnaissance:- The basic information gathering about the target system.
Scanning:- Scanning the target system for open ports and services running on the open ports etc.
Gaining Access:- Gaining the actual access of the particular target system by exploiting the system.
Maintaining Access:- Keeping the access of the system even after leaving the system so as not to perform all the steps from the scratch.
Clearing Tracks:- To remove the footprints if any so as to remain undetected from the victim.

Thats all for today..

We will discuss different types of Hacks later one..Stay Tuned.

Coin Marketplace

STEEM 0.28
TRX 0.21
JST 0.039
BTC 96063.98
ETH 3668.51
SBD 3.84