What is Hacking ?

Exploitbytes
2 min readOct 29, 2019

--

Hacking refers to exploiting system vulnerabilities and compromising security controls to gain unauthorized or inappropriate access to the system resources

It involves modifying system or application features to achieve a goal outside of the creator’s original purpose.

Hacking can be used to steal, pilfer, and redistribute intellectual property leading to business loss

Who is a Hacker ?

Intelligent individuals with excellent computer skills, with the ability to create and explore into the computer’s software and hardware.

For some hackers, hacking is a hobby to see how many computers of networks they can compromise.

Their intention can either be to gain knowledge or to poke around to do illegal things

Some do hacking with malicious intent behind thier escapades, like stealing business data, credit card information, social security numbers, email passwords, etc.

You Must Read This Ethical Hacking

Hacker Classess / Phases

Black Hats Hacker

Individuals with extraordinary computing skills, resorting to malicious or destructive activities and are also known as Crackers.

White Hats Hacker

Individuals professing hacker skills and using them for defensive purposes and are also known as Security Analysis.

Gray Hats Hacker

Individuals who work both offensively and defensively at various times

Suicide Hackers

Individuals who aim to bring down critical infrastructure for a “cause” and are not worried about facing jail terms or any other kind of punishment.

Script Kiddles Hacker

An unskilled hacker who compromises system by running scripts, tools, and software developed by real hackers.

Cyber Terrorists Hacker

Individuals with wide range of skills, motivated by religious or political beliefs to create fear by large-scale disruption of computer networks.

State Sponsored Hackers

Individuals employed by the government to penetrate and gain top-secret information and to damage information systems of other governments.

Hacktivist

Individuals who promote a political agenda by hacking, especially by defacing or disabling wensites.

Hacker Phases / Classes

Originally published at https://exploitbyte.com on October 29, 2019.

--

--

Exploitbytes
Exploitbytes

Written by Exploitbytes

I am Ethical Hacker & Bug Hunter.

No responses yet