What is Hacking ?
Hacking refers to exploiting system vulnerabilities and compromising security controls to gain unauthorized or inappropriate access to the system resources
It involves modifying system or application features to achieve a goal outside of the creator’s original purpose.
Hacking can be used to steal, pilfer, and redistribute intellectual property leading to business loss
Who is a Hacker ?
Intelligent individuals with excellent computer skills, with the ability to create and explore into the computer’s software and hardware.
For some hackers, hacking is a hobby to see how many computers of networks they can compromise.
Their intention can either be to gain knowledge or to poke around to do illegal things
Some do hacking with malicious intent behind thier escapades, like stealing business data, credit card information, social security numbers, email passwords, etc.
You Must Read This Ethical Hacking
Hacker Classess / Phases
Black Hats Hacker
Individuals with extraordinary computing skills, resorting to malicious or destructive activities and are also known as Crackers.
White Hats Hacker
Individuals professing hacker skills and using them for defensive purposes and are also known as Security Analysis.
Gray Hats Hacker
Individuals who work both offensively and defensively at various times
Suicide Hackers
Individuals who aim to bring down critical infrastructure for a “cause” and are not worried about facing jail terms or any other kind of punishment.
Script Kiddles Hacker
An unskilled hacker who compromises system by running scripts, tools, and software developed by real hackers.
Cyber Terrorists Hacker
Individuals with wide range of skills, motivated by religious or political beliefs to create fear by large-scale disruption of computer networks.
State Sponsored Hackers
Individuals employed by the government to penetrate and gain top-secret information and to damage information systems of other governments.
Hacktivist
Individuals who promote a political agenda by hacking, especially by defacing or disabling wensites.
Hacker Phases / Classes
Originally published at https://exploitbyte.com on October 29, 2019.