HackGh Community Forum

Log in

I forgot my password



Who Is Online?
Guests : 0
Hidden : 0
Registered : 0
Users Online :
Refresh View the whole list

Latest topics
» Getting a PayPal Account in Ghana
Sat Nov 11, 2017 1:34 pm by saudseidu

» How To Unlock All Alcatel Modems and Phones For Free
Thu Oct 26, 2017 11:34 pm by paah11

» Build your bitcoin wealth with Btccashin matrix revolution 100% legit
Sun Oct 22, 2017 7:46 am by rootboy24

» What does the "secret code" *#9900# really do to your Android device?
Tue Oct 10, 2017 1:28 pm by chinesta10

» MTN 300GB DATA CHEAT
Tue Sep 26, 2017 1:01 pm by kbasante

» Airtel Sika kokoo promo
Wed Sep 20, 2017 4:07 pm by Dagobert

» Glo Proxy Cheat 2016 Fbt/Cheats By HackGhTeaM
Sat Sep 02, 2017 6:31 am by chinesta10

» AIRTEL FREE BROWSING
Tue Aug 15, 2017 1:20 pm by akokono

» Instagram Account hacked
Sun Aug 06, 2017 7:17 pm by saudseidu

» AIRTEL DATA TRANSFER
Sat Aug 05, 2017 7:22 pm by kbasante

Top posting users this month
swiftblack
 
saudseidu
 
kbasante
 



Free counters!
Staff Online
Staff Online
Members2046
Most Online179
Newest Member
BBC alternative

You are not connected. Please login or register

 » Computer Tricks And Technology Tips » Technology News And Tips » 

What Hacker are You?

View previous topic View next topic Go down  Message [Page 1 of 1]

1 What Hacker are You? on Wed Apr 20, 2016 10:55 am

WhIPL4$h

avatar
Manager
Manager


First, a short myth:

A 15-year-old boy sits behind a glowing black monitor, typing furiously. The green text streams across his screen like a waterfall. His nervousness escalates dramatically as he sends rapid-fire commands to the strained computer. Suddenly, he lets out a triumphant laugh and proceeds to steal money.

Such is the stereotypical view of a hacker. Yet, there’s so much more to this fine art than Hollywood or the media describes. Hackers are varied creatures and include these 7 types:

1. Script Kiddie – Script Kiddies normally don’t care about hacking (if they did, they’d be Green Hats. See below.).

They copy code and use it for a virus or an SQLi or something else. Script Kiddies will never hack for themselves; they’ll just download overused software (LOIC or Metasploit, for example) and watch a YouTube video on how to use it. A common Script Kiddie attack is 'DoSing' or 'DDoSing' (Denial of Service and Distributed Denial of Service), in which they flood an IP with so much information it collapses under the strain. This attack is frequently used by the “hacker” group Anonymous, which doesn’t help anyone’s reputation.

2. White Hat – Also known as ethical hackers, White Hat hackers are the good guys of the hacker world. They’ll help you remove a virus or PenTest a company. Most White Hat hackers hold a college degree in IT security or computer science and must be certified to pursue a career in hacking. The most popular certification is the CEH (Certified Ethical Hacker) from the EC-Council.

3. Black Hat – Also known as crackers, these are the men and women you hear about in the news. They find banks or other companies with weak security and steal money or credit card information. The surprising truth about their methods of attack is that they often use common hacking practices they learned early on.

4. Gray Hat – Nothing is ever just black or white; the same is true in the world of hacking. Gray Hat hackers don’t steal money or information (although, sometimes they deface a website or two), yet they don’t help people for good (but, they could if they wanted to). These hackers comprise most of the hacking world, even though Black Hat hackers garner most (if not all) of the media’s attention.

5. Green Hat – These are the hacker “n00bz,” but unlike Script Kiddies, they care about hacking and strive to become full-blown hackers. They’re often flamed by the hacker community for asking many basic questions. When their questions are answered, they’ll listen with the intent and curiosity of a child listening to family stories.

6. Red Hat – These are the vigilantes of the hacker world. They’re like White Hats in that they halt Black Hats, but these folks are downright SCARY to those who have ever tried so much as PenTest. Instead of reporting the malicious hacker, they shut him/her down by uploading viruses, 'DoSing' and accessing his/her computer to destroy it from the inside out. They leverage multiple aggressive methods that might force a cracker to need a new computer.

7. Blue Hat – If a Script Kiddie took revenge, he/she might become a Blue Hat. Blue Hat hackers will seek vengeance on those who’ve them angry. Most Blue Hats are n00bz, but like the Script Kiddies, they have no desire to learn.

There you have it. Thanks for reading.


------------------------------------------------


View user profile

View previous topic View next topic Back to top  Message [Page 1 of 1]

Permissions in this forum:
You cannot reply to topics in this forum