Legal Disclaimer
Hacking-For-Beginners-a-beginners-guide-for-learning-ethical-hacking
Hacking-For-Beginners-a-beginners-guide-for-learning-ethical-hacking
- No tags were found...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Hacking For Beginners – Manthan Desai 2010<br />
constantly seek further knowledge, share what they have discovered, and they never have intentions about<br />
damaging or stealing data.<br />
Definition - A Cracker is a person who breaks into other people systems, with malicious intentions. Crackers gain<br />
unauthorized access, destroy important data, stop services provided by the server, or basically cause problems for<br />
their targets. Crackers can easily be identified because their actions are malicious.<br />
Whatever the case, most people give Hacker a negative outline. Many malicious Hackers are electronic thieves.<br />
Just like anyone can become a thief, or a robber, anyone can become a Hacker, regardless of age, gender, or<br />
religion. Technical skills of Hackers vary from one to another. Some Hackers barely know how to surf the Internet,<br />
whereas others write software that other Hackers depend upon.<br />
Types of Hacker<br />
Let’s see the categories of Hackers on the basis on their knowledge.<br />
Coders<br />
The Real Hackers are the Coders, the ones who revise the methods and create tools that are available in the<br />
market. Coders can find security holes and weaknesses in software to create their own exploits. These Hackers<br />
can use those exploits to develop fully patched and secure systems.<br />
Coders are the programmers who have the ability to find the unique vulnerability in existing software and to<br />
create working exploit codes. These are the individuals with a deep understanding of the OSI Layer Model and<br />
TCP/IP Stacks.<br />
Admins<br />
Admins are the computer guys who use the tools and exploits prepared by the coders. They do not develop their<br />
own techniques, however they uses the tricks which are already prepared by the coders. They are generally<br />
System Administration, or Computer Network Controller. Most of the Hackers and security person in this digital<br />
world come under this category.<br />
Admins have experience with several operating systems, and know how to exploit several existing vulnerabilities.<br />
A majority of Security Consultants fall in this group and work as a part of Security Team.<br />
Script Kiddies<br />
Next and the most dangerous class of Hackers is Script kiddies, They are the new generation of users of computer<br />
who take advantage of the Hacker tools and documentation available for free on the Internet but don’t have any<br />
knowledge of what’s going on behind the scenes. They know just enough to cause you headaches but typically are<br />
very sloppy in their actions, leaving all sorts of digital fingerprints behind. Even though these guys are the teenage<br />
Hackers that you hear about in the news media, they need minimum skills to carry out their attacks.<br />
Script Kiddies are the bunnies who use script and programs developed by others to attack computer systems and<br />
Networks. They get the least respect but are most annoying and dangerous and can cause big problems without<br />
actually knowing what they are doing.<br />
Types of Hackers on the basis of activities performed by them.<br />
w w w . h a c k i n g t e c h . c o . t v Page 13