19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

28<br />

Part I: Building the Foundation for Ethical Hacking<br />

the world has many shades of gray and many types of hackers. Hackers are<br />

unique individuals, so an exact profile is hard to outline. The best broad<br />

description of hackers is that all hackers aren’t equal. Each hacker has his<br />

or her own unique motives, methods, and skills. Hacker skill levels fall into<br />

three general categories:<br />

✓ Script kiddies: These are computer novices who take advantage of the<br />

hacker tools, vulnerability scanners, and documentation available free<br />

on the Internet but who don’t have any real knowledge of what’s really<br />

going on behind the scenes. They know just enough to cause you headaches<br />

but typically are very sloppy in their actions, leaving all sorts of<br />

digital fingerprints behind. Even though these guys are the stereotypical<br />

hackers that you hear about in the news media, they often need only<br />

minimal skills to carry out their attacks.<br />

✓ Criminal hackers: These are skilled criminal experts and nation states<br />

who write some of the hacking tools, including the scripts and other programs<br />

that the script kiddies and ethical hackers use. These folks also<br />

write such malware as viruses and worms. They can break into systems<br />

and cover their tracks. They can even make it look like someone else<br />

hacked their victims’ systems.<br />

Advanced hackers are often members of collectives that prefer to<br />

remain nameless. These hackers are very secretive and share information<br />

with their subordinates (lower-ranked hackers in the collectives)<br />

only when they are deemed worthy. Typically, for lower-ranked hackers<br />

to be considered worthy, they must possess some unique information or<br />

prove themselves through a high-profile hack. These hackers are arguably<br />

some of your worst enemies in information security. (Okay, maybe<br />

they’re not as bad as untrained and careless users, but close.)<br />

✓ Security researchers: These uber-hackers are highly technical and publicly<br />

known IT professionals who not only monitor and track computer,<br />

network, and application vulnerabilities but also write the tools and<br />

other code to exploit them. If these guys didn’t exist, ethical hackers<br />

wouldn’t have much in the way of open source and even certain commercial<br />

security-testing tools. I follow many of these security researchers<br />

on a weekly basis via their blogs, Twitter, and articles, and you<br />

should, too. Following the progress of these security researchers helps<br />

you stay up-to-date on both vulnerabilities and the latest and greatest<br />

security tools. I list the tools and related resources from various security<br />

researchers in Appendix A and throughout the book.<br />

There are good-guy (white hat) and bad-guy (black hat) hackers. Gray hat<br />

hackers are a little bit of both. There are also blue-hat hackers who are invited<br />

by software vendors to find security flaws in their systems.<br />

A recent study at the Black Hat security conference found that everyday IT<br />

professionals even engage in malicious and criminal activity against others.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!