Hacking-The Art of Profiteering


Hacking


One of the most common words amongst the youngsters, The literal meaning of hacking shown in google is "Hacking is an attempt to exploit a computer system or a private network inside a computer.". This is not what they mentioned over there because everyone thinks hackers are bad guys which they are not because we categorize them into many types.



Types of Hackers


  1. Black Hat Hackers
  2. White Hat Hackers
  3. Grey Hat Hackers
  4. Red Hat Hackers
  5. Blue Hat Hackers
  6. Green Hat Hackers

Black Hat Hackers




These are the type of hackers mentioned everywhere on the internet and media. We sometimes know them as crackers because of their pernicious behavior and exploitive nature. They break into computer systems and networks unethically and without the owner's acquiescence. They are the reason for most of the cyber threats all over the world. Black hat hackers are the stereotypical illegal hacking groups often portrayed in popular culture and are "the epitome of all that the public fears in a computer criminal ".



Famous Cyber Crime Events

  1. Teen hacks NASA and US Defense Department(1999)
  2. Robert Tappan Morris and the Morris Worm (1988)
  3. MafiaBoy causes $1 billion in damages (2000)
  4. Google China hit by a cyberattack (2009)
  5. Phone lines blocked to win Porsche (1995)
  6. Hacker targets Scientology (2008)
  7. Solar Sunrise (1998)
  8. The Melissa virus(1999)
  9. Hacker steals tens of millions of credit card details (2009)
  10. SolarWinds Attack(2020)

White Hat Hacker



We commonly know white Hat Hackers as ethical/security hackers. White Hat Hackers can sometimes be paid employees or contractors working for companies as security specialists that attempt to find security holes via hacking. White Hat Hackers employ the same methods of hacking as black hats, with one exception- they do it with permission from the owner of the system first, which makes the process completely legal. 


Penetration Testing/Bug Bounty Hunting 

A penetration test is an authorized simulated attack performed on a computer system to evaluate its security by an Ethical Hacker. Penetration testers/Ethical Hackers use the same tools, techniques, and processes as attackers to find and demonstrate the business impacts of weaknesses in your systems.


A bug bounty or bug bounty program is a reward or bounty program given for finding and reporting a bug in a particular software product. Many IT companies offer bug bounties to drive product improvement and get more interaction from end-users or clients. Companies that operate bug bounty programs may get hundreds of bug reports, including security bugs and security vulnerabilities, and many who report those bugs stand to receive awards. 


I will discuss more these topics in upcoming blog posts.



Grey Hat Hacker 


 Grey Hat Hackers are also known as Hactavist, exploit the internet systems only to make public certain vast datasets of information that would be of benefit to everyone. They don’t possess the bad intentions of black hats.  All the major hacking groups come under this category like Anonymus. 




Blue Hat Hacker


Blue Hat Hackers are also of 2 types:-

  1. Revenge Seekers
  2. Security Professionals

Revenge Seekers

These hackers don’t necessarily care about money or fame. They hack to take personal revenge for a real or perceived sleight from a person, employer, institution, or government. Blue hat hackers use malware and deploy various cyberattacks on their enemies’ servers/networks to cause harm to their data, websites, or devices.


Security Professionals 

Blue hat hackers are security professionals that work outside of the organization. Companies often invite them to test the new software and find security vulnerabilities before releasing it. Sometimes, companies organize periodic conferences for blue hat hackers to find the bugs in their crucial online systems.


Red Hat Hacker




 Red Hat Hacker sometimes refers to a person who targets Linux-based systems. However, in the hacking world, a Red Hat hacker plays a similar role to a White Hat hacker in protecting IT systems from cyberattacks but from a different perspective. This group is considered the vigilantes of the hacker world. They work by targeting Black Hat hackers to cease their criminal activities or disclose their real identity to the public. Instead of reporting the malicious hacker to authorities, they may target criminal devices using aggressive attack techniques, such as launching DoS attacks or planting viruses to destroy the attacker's device, making it inoperable.


Green Hat Hacker


These are newbies to the hacking game, but unlike Script Kiddies, they care about hacking and strive to master the necessary skills (e.g., programming, operating systems function, and IT security) to become a full-blown hackers. Their hacker community often flames them for asking many basic questions. When their questions are answered, they'll listen with intent and curiosity listening to family stories. 


Hope I could help you with this knowledge...


Article by:-HacWar



Comment on your doubts👇