lurk the user to give their sensitive information like passwords and credit
card numbers to them. They often rely on
a lot of malware tools like
Trojans, keyloggers to enter into the user system and acquire the
information. They use a lot of techniques and strategies to exploit systems.
Black hat hackers are highly professional
and advanced hackers who are
very difficult to get caught because they use their sock proxies that can go
undetected. As far as they make a mistake it is highly impossible to know
their identity. And the worst thing is there are more than 5% of hackers who
solely sell the stolen credit cards in the dark web. Security analysts and web
programmers should be aware of the technologies and tools these hierarchy
users use and should develop intrusion detection systems in a way that they
will be stopped or even caught.