You are on page 1of 3

Hacking

Hacking…! Well, what you know about hackers? Actually who are they? Hackers are
nothing but they are thief, who hacks your private data. But there are good hackers also. They
are named as Ethical Hackers. These Ethical Hackers works for any company or organization, as
they are computer experts who fights against malicious attacks.

Hacking is an art and knowledge. In terms of computer security, hacker is someone who
focuses on network security and security mechanism about computer system.

Hackers are divided into different groups on the basis of activities done by them legally,
illegally or more on. Explained as below:

 White Hat :
The white hat hackers called as Ethical Hackers. Who hacks or breaks security to
test their own system. They are professionals appointed by company itself.
 Black Hat :
The black hat hackers as name suggest they are opposite to Ethical Hackers.
The black hat hacker hacks or violates the computer security system with criminal
intention. They do this activities illegally.
 Grey Hat :
These grey hat hackers lies between white hat hackers and black hat hackers.
They hacks a system and notify it to the administrator to repair and provide more
security to their system.
 Blue Hat :
Blue hat hackers are those who is from outside of the security system. These
hackers used to test a system, looking for exploits so they can close.
 Elite Hacker :
Elite this word is used to say the most skilled. These hackers are masters of
hacking.
 Neophyte :
These hackers are purely new to hacking. And have at most zero knowledge also
zero experience in this field.
 Script Kiddies :
Script Kiddies are those hackers who are unskilled. They have little-bit
knowledge about hacking. These hackers use the automated tools for hacking.
 Organizations or Gangs :
These are groups of hackers who hacks a system with criminal intention. These
are also may be illegal hackers. They hacks for profit, publicity etc.

Hacking is nothing but Attack on System. The typical approach in on the Inter-
connected system is:
 Vulnerability Analysis :
Analyzing the potential ways of attacks comes under Vulnerability Analysis.
 Network Enumeration :
We can discover information about our target system.
 Exploitation :
In exploitation, we attempt to compromise the system by employing different
ways of attacks.
The techniques used for exploitation are:
 Social Engineering
 Password Cracking
 Keystroke Logging
 Finding Vulnerability
 Spoofing
 Root kit
 Computer Virus
 Computer Worms

You can also get knowledge in deep and develop this art in you. But remember
that as this field has broad scope for making career but also it has some limitations.
Never use it just for time pass otherwise it is considered as a cyber crime if you hack any
system illegally and there is possibility of file case on you. So, Be Careful...

You might also like