• Hierarchy 3: Hacktivists
  • Hierarchy 4: Black hat hackers
  • Hierarchy 2: A group of Novice hackers




    Download 6,34 Mb.
    Pdf ko'rish
    bet187/203
    Sana10.01.2024
    Hajmi6,34 Mb.
    #134102
    1   ...   183   184   185   186   187   188   189   190   ...   203
    Bog'liq
    Linux This Book Includes 4 Manuscripts The Underground Bible

    Hierarchy 2: A group of Novice hackers
    Novice here synonyms to quite good. A lot of hackers spend their time in
    hacking or cracking forums trying to exchange their knowledge and
    exploiting things together. This hierarchy of hackers due to it for fun. They
    often try to crack websites like Netflix and try to sell it to them for cheap
    prices. These novice hackers use cracking tools with brute force ability to
    constantly login with a bunch of usernames and passwords they have
    collected using a SQL injection vulnerability. 
    As we talked about the process you might have understood that this group
    of hackers purely depends on luck. They cannot exploit usernames or
    passwords that they don't find. For this reason, people should use secure
    strong passwords that cannot be exploited by this hierarchy of hackers. 
    Hierarchy 3: Hacktivists
    Hacktivists are advanced hackers who use their knowledge and hacking
    skills to give sensitive or shocking information to the world that is
    otherwise is not possible to know. Anonymous a famous hacking group
    falls under this category. They try to give information about the government
    or shocking emails that will make the population understand the problems
    the world is facing. Wiki leaks are also one of them and have shaken the
    world with their leaked emails of various country presidents. However, this
    hierarchy of hackers are very rare and are always with a motive that cannot
    be judged due to its sensitivity.
    Hierarchy 4: Black hat hackers
    Black hat hackers are the evilest group of the hierarchies and use their skills
    to exploit normal users. They use a lot of social engineering techniques to


    lurk the user to give their sensitive information like passwords and credit
    card numbers to them. They often rely on a lot of malware tools like
    Trojans, keyloggers to enter into the user system and acquire the
    information. They use a lot of techniques and strategies to exploit systems.
    Black hat hackers are highly professional and advanced hackers who are
    very difficult to get caught because they use their sock proxies that can go
    undetected. As far as they make a mistake it is highly impossible to know
    their identity. And the worst thing is there are more than 5% of hackers who
    solely sell the stolen credit cards in the dark web. Security analysts and web
    programmers should be aware of the technologies and tools these hierarchy
    users use and should develop intrusion detection systems in a way that they
    will be stopped or even caught.

    Download 6,34 Mb.
    1   ...   183   184   185   186   187   188   189   190   ...   203




    Download 6,34 Mb.
    Pdf ko'rish