29.09.2015 Views

Legal Disclaimer

Hacking-For-Beginners-a-beginners-guide-for-learning-ethical-hacking

Hacking-For-Beginners-a-beginners-guide-for-learning-ethical-hacking

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Hacking For Beginners – Manthan Desai 2010<br />

constantly seek further knowledge, share what they have discovered, and they never have intentions about<br />

damaging or stealing data.<br />

Definition - A Cracker is a person who breaks into other people systems, with malicious intentions. Crackers gain<br />

unauthorized access, destroy important data, stop services provided by the server, or basically cause problems for<br />

their targets. Crackers can easily be identified because their actions are malicious.<br />

Whatever the case, most people give Hacker a negative outline. Many malicious Hackers are electronic thieves.<br />

Just like anyone can become a thief, or a robber, anyone can become a Hacker, regardless of age, gender, or<br />

religion. Technical skills of Hackers vary from one to another. Some Hackers barely know how to surf the Internet,<br />

whereas others write software that other Hackers depend upon.<br />

Types of Hacker<br />

Let’s see the categories of Hackers on the basis on their knowledge.<br />

Coders<br />

The Real Hackers are the Coders, the ones who revise the methods and create tools that are available in the<br />

market. Coders can find security holes and weaknesses in software to create their own exploits. These Hackers<br />

can use those exploits to develop fully patched and secure systems.<br />

Coders are the programmers who have the ability to find the unique vulnerability in existing software and to<br />

create working exploit codes. These are the individuals with a deep understanding of the OSI Layer Model and<br />

TCP/IP Stacks.<br />

Admins<br />

Admins are the computer guys who use the tools and exploits prepared by the coders. They do not develop their<br />

own techniques, however they uses the tricks which are already prepared by the coders. They are generally<br />

System Administration, or Computer Network Controller. Most of the Hackers and security person in this digital<br />

world come under this category.<br />

Admins have experience with several operating systems, and know how to exploit several existing vulnerabilities.<br />

A majority of Security Consultants fall in this group and work as a part of Security Team.<br />

Script Kiddies<br />

Next and the most dangerous class of Hackers is Script kiddies, They are the new generation of users of computer<br />

who take advantage of the Hacker tools and documentation available for free on the Internet but don’t have any<br />

knowledge of what’s going on behind the scenes. They know just enough to cause you headaches but typically are<br />

very sloppy in their actions, leaving all sorts of digital fingerprints behind. Even though these guys are the teenage<br />

Hackers that you hear about in the news media, they need minimum skills to carry out their attacks.<br />

Script Kiddies are the bunnies who use script and programs developed by others to attack computer systems and<br />

Networks. They get the least respect but are most annoying and dangerous and can cause big problems without<br />

actually knowing what they are doing.<br />

Types of Hackers on the basis of activities performed by them.<br />

w w w . h a c k i n g t e c h . c o . t v Page 13

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!