Featured post

Phishing Attack How to Perform Phishing Attack...

Alert :- This Blog is For Study Purpose Don't Miss use It   What is Phishing Attack ?   “ Phishing ” refers to an attempt to steal sensitive information, typically in the form of usernames, passwords, credit card numbers, bank account information or other important data in order to utilize or sell the stolen information. By masquerading as a reputable source with an enticing request, an attacker lures in the victim in order to trick them, similarly to how a fisherman uses bait to catch a fish.  Phishing is a malicious technique based on deception , used to steal sensitive information (credit card data, usernames, and passwords, etc.) from users. The attackers pretend to be a trustworthy entity (usually by copying the look and feel of a big brand) to trick the victims into revealing their confidential data. If a phishing attack is successful, it means that malicious third parties managed to gather private data. The stolen information is then used to commit financial the

HACKERS & ITS CATAEGORY

  ETHICAL HACKERS:-

An Ethical Hacker is person who spends most of the time with his computer and internet extracting the thing which he already know but want to know more about it . A person who is Hacker knows much more thing about the computer and it is related.

A hacker is:

1. An enthausiastic and skillful computer programmer or user.

2. A person who use computers to gain unauthorized accesss to data.

3. Aware of every weak and part of security related to computer or network.

4. To hack a system in illegal way to know its loop hole.

5. A Hacker doing wrong activities is termed as Cracker or Black Hat Hacker.


TYPES OF HACKERS:-

White Hat Hacker:- White Hat Hacker is a very skilled person, he can break into computer system and do damage. However, they use their skills to help organizations. For example a white hat might work for an organization to test for security weaknesses and vulnerabilities in the network.

Black Hat Hacker:- Black Hat Hacker is also known as a cracker uses his skills to break into computer systems for unethical reasons. For example, steal user data like username and password, credit numbers, bank information.

Grey Hat Hacker:- Grey Hat Hacker can be thought of as a white hat attacker, who sometimes acts unethically. They could be employed as legit network security administrator. But, during this person's duties, he may find an opportunity for gaining access to company data and stealing that data.

Phreaker Hacker:- A phreaker hacker is simply a hacker of telecommunications. An example of this tricking the phone system into letting you make free long distance calls.

Script Kiddy Hacker:- A Script Kiddy downloads hacking programs or utilities at times call scripts to perform an attack. He does not have skills of a typical hacker.

Hacktivist Hacker:- Hacking takes place even in political arena, such as someone defacing a website and leaving messages on the hacked site for the world to see.

Computer Security Hacker:- This is someone who knows the technical aspects of computer networking and security. This person could attack a network protected by a fairewall or IPS by fragmenting packets.

Academic Hacker:- Academic Hacker is typically an employee or student at an institution of higher education. They would use the institutions computing resources to write malicious programs.

Hobby Hacker:-There are people who hack for fun as well. Such as, modifying existing hardware or software, use software without a license, unlock Apple iPhone.



Comments