The Black Hat Hackers - A "black hat" hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain" (Moore, 2005). The term was coined by Richard Stallman, to contrast the maliciousness of a criminal hacker versus the spirit of playfulness and exploration in hacker culture, or the ethos of the white hat hacker who performs hacking duties to identify places to repair or as a means of legitimate employment.
The Grey Hat Hackers - A grey hat hacker lies between a black hat and a white hat hacker. A grey hat hacker may surf the Internet and hack into a computer system for the sole purpose of notifying the administrator that their system has a security defect, for example. They may then offer to correct the defect for a fee. Grey hat hackers sometimes find the defect of a system and publish the facts to the world instead of a group of people. Even though grey hat hackers may not necessarily perform hacking for their personal gain, unauthorized access to a system can be considered illegal and unethical.
The Elite Hackers - A social status among hackers, elite is used to describe the most skilled. Newly discovered exploits circulate among these hackers. Elite groups such as Masters of Deception conferred a kind of credibility on their members.
The Script Skiddies - A script kiddie (also known as a skid or skiddie) is an unskilled hacker who breaks into computer systems by using automated tools written by others (usually by other black hat hackers), hence the term script (i.e. a prearranged plan or set of activities) kiddie (i.e. kid, child-an individual lacking knowledge and experience, immature), usually with little understanding of the underlying concept.
The Neophyte - A neophyte ("newbie", or "noob") is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology and hacking.
The Blue Hat Hackers - A blue hat hacker is someone outside computer security consulting firms who is used to bug-test a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term BlueHat to represent a series of security briefing events.
The Hacktivists - A hacktivist is a hacker who utilizes technology to publicize a social, ideological, religious or political message.
Hacktivism can be divided into two main groups:
Cyberterrorism - Activities involving website defacement or denial-of-service attacks; and,
Freedom of information - Making information that is not public, or is public in non-machine-readable formats, accessible to the public.
...........................................................
Ano nga ba ang madalas na paraan ng pag atake ng mga security hackers? una na diyan ay ang Network Enumeration o ang pagdiskubre ng ilang mga impormasyon tungkol sa isang target. The second one is Vulnerability Analysis o yung pagidentify sa mga pwedeng paraan ng pag-atake, at ang huli ay ang exploitation o yung paattempt para makompromiso ang isang system sa pamamagitan ng pag eemploy ng mga vulnerabilities na nakita sa pamamagitan ng vulnerability analysis.
Pero alam nyo ba na mayroong ilang conventions ang ginaganap na ara lamang sa mga hackers at ito ay ang mga sumusunod:
1. SummerCon - usually held on summer.
2. DEF CON - the most known conventions that was held once in a year
3. HoHoCon - usually held on Christmas
4. ShmooCon - usually held on February
5. BlackHat - for the black hat hackers
6. Chaos Communication Congress
7. AthCon
8. Hacker Halted
9. HOPE
Notable security Hackers around the world:
*Andrew Auernheimer, sentenced to 3 years in prison, is a grey hat hacker whose security group Goatse Security exposed a flaw in AT&T's iPad security.
*Dan Kaminsky is a DNS expert who exposed multiple flaws in the protocol and investigated Sony's rootkit security issues in 2005. He has spoken in front of the United States Senate on technology issues.
*Ed Cummings (also known as Bernie S) is a longstanding writer for 2600: The Hacker Quarterly. In 1995, he was arrested and charged with possession of technology that could be used for fraudulent purposes, and set legal precedents after being denied both a bail hearing and a speedy trial.
*Eric Corley (also known as Emmanuel Goldstein) is the longstanding publisher of 2600: The Hacker Quarterly. He is also the founder of the Hackers on Planet Earth (HOPE) conferences. He has been part of the hacker community since the late 1970s.
*Susan Headley (also known as Susan Thunder), was an American hacker active during the late 1970s and early 1980s widely respected for her expertise in social engineering, pretexting, and psychological subversion. She became heavily involved in phreaking with Kevin Mitnick and Lewis de Payne in Los Angeles, but later framed them for erasing the system files at US Leasing after a falling out, leading to Mitnick's first conviction.
*Gary McKinnon is a Scottish hacker who was facing extradition to the United States to face criminal charges. Many people in the UK called on the authorities to be lenient with McKinnon, who suffers from Asperger syndrome. The extradition has now been dropped.
*Gordon Lyon, known by the handle Fyodor, authored the Nmap Security Scanner as well as many network security books and web sites. He is a founding member of the Honeynet Project and Vice President of Computer Professionals for Social Responsibility.
Guccifer 2.0, who claimed that he hacked into the *Democratic National Committee (DNC) computer network
*Jacob Appelbaum is an advocate, security researcher, and developer for the Tor project. He speaks internationally for usage of Tor by human rights groups and others concerned about Internet anonymity and censorship.
*Jude Milhon (known as St. Jude) was an American hacker and activist, founding member of the cypherpunk movement, and one of the creaters of Community Memory, the first public computerized bulletin board system.
*Kevin Mitnick is a computer security consultant and author, formerly the most wanted computer criminal in United States history.
*Len Sassaman was a Belgian computer programmer and technologist who was also a privacy advocate.
*Meredith L. Patterson is a well-known technologist and biohacker who has presented research with Dan Kaminsky and Len Sassaman at many international security and hacker conferences.
*Kimberley Vanvaeck (known as Gigabyte) is a Belgian hacker recognized for writing the first virus in C#.
*Michal Zalewski (lcamtuf) is a prominent security researcher.
*Rafael Nuñez, a.k.a. RaFa, was a notorious hacker who was sought by the Federal Bureau of Investigation in 2001. He has since become a respected computer security consultant and an advocate of children's online safety.
*Solar Designer is the pseudonym of the founder of the Openwall Project.
We know that Kevin Mitnick is very good at this and so do them? the others!
("Be the bad one before the Good one")
YOU ARE READING
Hacking Articles
RandomHacking Articles is an article/guides about basic hacking and any topics related to Hacking/Technology. This was written by Rovic Balingbing a.k.a. Baby Esue, it consists of 30 parts, this "Hacking Articles" consists of some articles, guides, tutor...
Hacking Articles Part 9
Start from the beginning
