• Why Do Hackers Fit Into Hierarchies
  • Hierarchy 1: Script kiddies
  • Chapter 7: Web Hierarchies and Cybersecurity Ethics




    Download 6,34 Mb.
    Pdf ko'rish
    bet186/203
    Sana10.01.2024
    Hajmi6,34 Mb.
    #134102
    1   ...   182   183   184   185   186   187   188   189   ...   203
    Bog'liq
    Linux This Book Includes 4 Manuscripts The Underground Bible

    Chapter 7:
    Web Hierarchies and Cybersecurity Ethics


    In today’s world, it has become very difficult for people who are more
    concerned about their privacy and security. Hackers tend to work in
    different ways to exploit systems by using known vulnerabilities. A lot of
    information is available for some of the most famous vulnerabilities like
    XSS, SQL injections and CSRF vulnerabilities to understand and exploit
    them using one's code.
    Often hackers use automatic vulnerability scanners to find loops in the web
    application or a network system. However, there are a lot of hierarchies that
    are divided based on the motives of the attacker and their goals. In this
    chapter, we will help you understand all the hierarchies that are present.
    Follow along to know about hacking hierarchies in detail. This is a bit of
    theoretical subject so try to think about them in your own words for an easy
    understanding.
    Why Do Hackers Fit Into Hierarchies? 
    Often people and security researchers face a lot of people who are trying to
    attack corporate and personal systems. Many times, white hat hackers who
    in common terms try to protect the systems decide the danger of an attack
    with the attacker steps and logfiles that they left while trying to exploit the
    system. With the help of this information, they tend to decide the
    motivation behind the attack. For better forensic analysis security
    researchers from a long time are using hierarchies to organize the level of
    attack. Hierarchies are important for a better understanding and analysis of
    the attack that took place. 
    There are seven types of hierarchies as explained below. We will describe
    each of them in detail in the next section. Follow along for a detailed
    explanation of each of the.
    Hierarchy 1: Script kiddies
    Script kiddies are usually the high number of users who call themselves
    hackers but have very little technical and scripting knowledge. This
    hierarchy of hackers are often not so talented and can never break into a
    system without a step by step procedure or explanation that is often found


    in hacking websites and forums or social networking groups like YouTube
    and Facebook. 
    But they should not be taken of less importance because there is a high
    chance of script kiddies exploiting system if it consists of outdated
    technology that is viable to a lot of vulnerabilities. 

    Download 6,34 Mb.
    1   ...   182   183   184   185   186   187   188   189   ...   203




    Download 6,34 Mb.
    Pdf ko'rish

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Chapter 7: Web Hierarchies and Cybersecurity Ethics

    Download 6,34 Mb.
    Pdf ko'rish