Friday, November 9, 2007

Types Of Hacker !!


Hacker


A hacker is a person who creates and modifies computer software and computer hardware, including computer programming, administration, and security-related items.
In computer programming, a hacker is a programmer who hacks or reaches a goal by employing a series of modifications to exploit or extend existing code or resources.
In computer security, a hacker is a person able to exploit a system or gain unauthorized access through skill and tactics. This usually refers to a black hat hacker. There are also white hats (ethical hackers), and grey hats.
In other technical fields, hacker is extended to mean a person who makes things work beyond perceived limits through their own technical skill, such as a hardware hacker, or reality hacker.
For some Hacker has a negative connotation and refers to a person who "hacks" or uses kludges to accomplish programming tasks that are ugly, inelegant, and inefficient. The negative form of the noun "hack" is even used among users of the positive sense of "hacker".



White Hat Hacker



A white hat hacker, also rendered as ethical hacker, is, in the realm of information technology, a person who is ethically opposed to the abuse of computer systems. The term is derived from American western movies, where the good cowboy typically wore a white cowboy hat and the bad cowboy wore a black one. Realizing that the Internet now represents human voices from all around the world makes the defense of its integrity an important pastime for many. A white hat generally focuses on securing IT systems, whereas a black hat (the opposite) would like to break into them — but this is a simplification. A black hat will wish to secure his own machine, and a white hat might need to break into a black hat's machine in the course of an investigation. What exactly differentiates white hats and black hats is open to interpretation, but white hats tend to cite altruistic motivations.
The term white hat hacker is also often used to describe those who attempt to break into systems or networks in order to help the owners of the system by making them aware of security flaws, or to perform some other altruistic activity. Many such people are employed by computer security companies; these professionals are sometimes called sneakers. Groups of these people are often called tiger teams.
The primary difference between white and black hat hackers is that a white hat hacker claims to observe the hacker ethic. Like black hats, white hats are often intimately familiar with the internal details of security systems, and can delve into obscure machine code when needed to find a solution to a tricky problem.


Red Hat Hacker

This simply means how the Red Hat Hacker thinks :
hat (Fire)
Intuition
opinion
emotion (subjective)


Yellow Hat Hacker

This simply means how the Yellow Hat Hacker thinks:
hat (Sun)
Praise
positive aspects (objective)


Black Hat Hacker

A black hat (also called a cracker or Darkside hacker) is a malicious or criminal hacker. This term is seldom used outside of the security industry and by some modern programmers. The general public use the term hacker to refer to the same thing. In computer jargon the meaning of "hacker" can be much more broad. The name comes from the opposite of White Hat hackers.
Usually a Black hat is a person who maintains knowledge of the vulnerabilities and exploits they find as secret for private advantage, not revealing them either to the general public or the manufacturer for correction. Many Black Hats promote individual freedom and accessibility over privacy and security. Black Hats may seek to expand holes in systems; any attempts made to patch software are generally to prevent others from also compromising a system they have already obtained secure control over. A Black Hat hacker may have access to 0-day exploits (private software that exploits security vulnerabilities; 0-day exploits have not been distributed to the public). In the most extreme cases, Black Hats may work to cause damage maliciously, and/or make threats to do so for blackmail purposes.
Black-hat hacking is the act of compromising the security of a system without permission from an authorized party, usually with the intent of accessing computers connected to the network (the somewhat similar activity of defeating copy prevention devices in software - which may or may not be illegal depending on the laws of the given country - is actually software cracking).
The term cracker was coined by Richard Stallman to provide an alternative to abusing the existing word hacker for this meaning. This term's use is limited (as well as "black hat") mostly to some areas of the computer and security field and even there is considered controversial. One group that refers to themselves as hackers consists of skilled computer enthusiasts. The other, and more common usage, refers to people who attempt to gain unauthorized access to computer systems. Many members of the first group attempt to convince people that intruders should be called crackers rather than hackers, but the common usage remains ingrained.


Green Hat Hacker

This simply means how the Green Hat Hacker thinks:
hat (Plant)
Alternatives
new approaches
everything goes (speculative)


Blue Hat Hacker

This simply means how the Blue Hat Hacker thinks:
hat (Sky)
Big Picture
Conductor hat
Thinking about thinking
Overall process (overview)
Refers to outside computer security consulting firms that are used to bug test a system prior to its launch, looking for exploits so they can be closed.


Gray Hat Hacker

Grey hat in the computer security community, is a skilled hacker who sometimes acts legally and in good will and sometimes not. They are a hybrid between white and black hat hackers. They hack for no personal gain and do not have malicious intentions, but may or may not occasionally commit crimes during the course of their technological exploits.
For example, attacking corporate businesses with unethical practices could be regarded as highly unethical and would normally be considered black hat activity. However, to a grey hat, it may not appear bad even though it is against that local law. So instead of tagging it black hat, it is a grey hat hack. A person who breaks into a computer system and simply "plants his flag" while doing no damage, is usually classified as a grey hat.

What is an Ethical Hacker ??

1. An ethical hacker is where a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. To test a security system, ethical hacking uses the same methods as their less principled counterparts, but report problems instead of taking advantage of them. Ethical hacking is also known as penetration testing, intrusion testing, and red teaming. Individuals involved in ethical hacking is sometimes called a white hat, a term that comes from old Western movies, where the "good guy" wore a white hat and the "bad guy" wore a black hat.


2. One of the first examples of ethical hacking at work was in the 1970s, when the United States government used groups of experts called red teams to hack its own computer systems. According to Ed Skoudis, Vice President of Security Strategy for Predictive Systems' Global Integrity consulting practice, ethical hacking has continued to grow in an otherwise lackluster IT industry, and is becoming increasingly common outside the government and technology sectors where it began. Many large companies, such as IBM, maintain employee teams of ethical hackers.

What is an Unethical Hacker ?

1. An unethical hacker is a malicious or criminal hacker. This term is seldom used outside of the security industry and by some modern programmers. The general public use the term hacker to refer to the same thing. In computer jargon the meaning of "hacker" can be much more broad. The name comes from the opposite of White Hat hackers.

Black-hat hacking is the act of compromising the security of a system without permission from an authorized party, usually with the intent of accessing computers connected to the network (the somewhat similar activity of defeating copy prevention devices in software - which may or may not be illegal depending on the laws of the given country - is actually software cracking).

2. Examples of Techniques used for breaking into systems can vary from using advanced programming skills and social engineering to using semi-automatic software developed by others without understanding how it works (script kiddies). Crackers who rely on the latter technique are often referred to as script kiddies (unskilled crackers are far more common than highly skilled ones). Common software weaknesses exploited include buffer overflows, integer overflow, memory corruption, format string attacks, race condition, cross-site scripting, cross-site request forgery, code injection and SQL injection bugs..


Love happen's once and the rest is just life!!!!

1 comment:

Anonymous said...

Nice information, you helped me with my research project on types of hackers. Don't worry, you got credit.

>