HackGh Community Forum

Log in

I forgot my password



Who Is Online?
Guests : 0
Hidden : 0
Registered : 0
Users Online :
Refresh View the whole list

Latest topics
» how to unlock busy mifi model M028T?
Sun Mar 26, 2017 4:58 pm by kobbyyt

» Buy HackGh Proxy Cheat For Free Browsing (Ghana Only)
Sun Mar 26, 2017 1:50 pm by PhAnt0m

» HOW TO ROTATE NOKIA S40 PHONE SCREEN FROM POTRAIT TO LANSCAPE
Sun Mar 26, 2017 9:57 am by user001

» VODAFONE X -CHEAT...UNLIMITED BROWSING
Sun Mar 19, 2017 8:12 pm by swiftblack

» IS AIRTEL SIKA KOKO BACK?
Sun Mar 19, 2017 6:39 am by chinesta10

» Buy HackGh Access Here To Unlock Cheats/Hacks
Sat Mar 18, 2017 9:32 am by PhAnt0m

» Need help unlocking new MTN 4g wingle modem
Fri Mar 17, 2017 9:27 pm by suraju

» MTN unlimited, psiphon / tweakware handler UBT
Thu Mar 16, 2017 9:08 am by PhAnt0m

» Helping Hands ~ APLHA 63 team
Mon Mar 06, 2017 9:43 pm by flava1

» Activated PayPal Ghana Account
Mon Mar 06, 2017 9:38 pm by flava1



Free counters!
Staff Online
Staff Online
Members1632
Most Online179
Newest Member

You are not connected. Please login or register

 » Computer Tricks And Technology Tips » Technology News And Tips » 

What Hacker are You?

View previous topic View next topic Go down  Message [Page 1 of 1]

1 What Hacker are You? on Wed Apr 20, 2016 10:55 am

WhIPL4$h

avatar
Manager
Manager


First, a short myth:

A 15-year-old boy sits behind a glowing black monitor, typing furiously. The green text streams across his screen like a waterfall. His nervousness escalates dramatically as he sends rapid-fire commands to the strained computer. Suddenly, he lets out a triumphant laugh and proceeds to steal money.

Such is the stereotypical view of a hacker. Yet, there’s so much more to this fine art than Hollywood or the media describes. Hackers are varied creatures and include these 7 types:

1. Script Kiddie – Script Kiddies normally don’t care about hacking (if they did, they’d be Green Hats. See below.).

They copy code and use it for a virus or an SQLi or something else. Script Kiddies will never hack for themselves; they’ll just download overused software (LOIC or Metasploit, for example) and watch a YouTube video on how to use it. A common Script Kiddie attack is 'DoSing' or 'DDoSing' (Denial of Service and Distributed Denial of Service), in which they flood an IP with so much information it collapses under the strain. This attack is frequently used by the “hacker” group Anonymous, which doesn’t help anyone’s reputation.

2. White Hat – Also known as ethical hackers, White Hat hackers are the good guys of the hacker world. They’ll help you remove a virus or PenTest a company. Most White Hat hackers hold a college degree in IT security or computer science and must be certified to pursue a career in hacking. The most popular certification is the CEH (Certified Ethical Hacker) from the EC-Council.

3. Black Hat – Also known as crackers, these are the men and women you hear about in the news. They find banks or other companies with weak security and steal money or credit card information. The surprising truth about their methods of attack is that they often use common hacking practices they learned early on.

4. Gray Hat – Nothing is ever just black or white; the same is true in the world of hacking. Gray Hat hackers don’t steal money or information (although, sometimes they deface a website or two), yet they don’t help people for good (but, they could if they wanted to). These hackers comprise most of the hacking world, even though Black Hat hackers garner most (if not all) of the media’s attention.

5. Green Hat – These are the hacker “n00bz,” but unlike Script Kiddies, they care about hacking and strive to become full-blown hackers. They’re often flamed by the hacker community for asking many basic questions. When their questions are answered, they’ll listen with the intent and curiosity of a child listening to family stories.

6. Red Hat – These are the vigilantes of the hacker world. They’re like White Hats in that they halt Black Hats, but these folks are downright SCARY to those who have ever tried so much as PenTest. Instead of reporting the malicious hacker, they shut him/her down by uploading viruses, 'DoSing' and accessing his/her computer to destroy it from the inside out. They leverage multiple aggressive methods that might force a cracker to need a new computer.

7. Blue Hat – If a Script Kiddie took revenge, he/she might become a Blue Hat. Blue Hat hackers will seek vengeance on those who’ve them angry. Most Blue Hats are n00bz, but like the Script Kiddies, they have no desire to learn.

There you have it. Thanks for reading.


------------------------------------------------


View user profile

View previous topic View next topic Back to top  Message [Page 1 of 1]

Permissions in this forum:
You cannot reply to topics in this forum