Chapter 7: Web Hierarchies and Cybersecurity Ethics
In today’s world, it has become very difficult for people who are more
concerned about their privacy and security. Hackers tend to work in
different ways to exploit systems by using known vulnerabilities. A lot of
information is available for some of the most famous vulnerabilities like
XSS, SQL injections and CSRF vulnerabilities to understand and exploit
them using one's code.
Often hackers use automatic vulnerability scanners to find loops in the web
application or a network system. However, there are a lot of hierarchies that
are divided based on the motives of the attacker and their goals. In this
chapter, we will help you understand all the hierarchies that are present.
Follow along to know about hacking hierarchies in detail. This is a bit of
theoretical subject so try to think about them in your own words for an easy
understanding.
Why Do Hackers Fit Into Hierarchies? Often people and security researchers face a lot of people who are trying to
attack corporate and personal systems. Many times, white hat hackers who
in common terms try to protect the systems decide the danger of an attack
with the attacker steps and logfiles that they left while trying to exploit the
system. With the help of this information, they tend to decide the
motivation behind the attack. For better forensic analysis security
researchers from a long time are using hierarchies to organize the level of
attack. Hierarchies are important for a better understanding and analysis of
the attack that took place.
There are seven types of hierarchies as explained below. We will describe
each of them in detail in the next section. Follow along for a detailed
explanation of each of the.
Hierarchy 1: Script kiddies Script kiddies are usually the high number of users who call themselves
hackers but have very little technical and scripting knowledge. This
hierarchy of hackers are often not so talented and can never break into a
system without a step by step procedure or explanation that is often found
in hacking websites and forums or social networking groups like YouTube
and Facebook.
But they should not be taken of less importance because there is a high
chance of script kiddies exploiting system if it consists of outdated
technology that is viable to a lot of vulnerabilities.