Chapter 2: Hacking and the Skills Hackers Need




Download 6,34 Mb.
Pdf ko'rish
bet74/203
Sana10.01.2024
Hajmi6,34 Mb.
#134102
1   ...   70   71   72   73   74   75   76   77   ...   203
Bog'liq
Linux This Book Includes 4 Manuscripts The Underground Bible

Chapter 2:
Hacking and the Skills Hackers Need


What is Hacking?
Before going ahead with some of the techniques that we can use with
hacking, first, you need to understand what hacking is in detail. When we
talk about hacking we are looking at a process that will actively search for
vulnerabilities in the system. Once you find these vulnerabilities, then you
use the weakness to help you gain access illegally. This is done by cracking
the operating system algorithm to be able to access without a password.
When computers interact with each other externally, they run the risk of
getting hacked. So, who is a hacker? This is the person behind the hacking.
He tries to access the computer and tries to get the weakness of a computer.
This means hackers are very skillful with computers for them to be able to
know how to alter with data manipulation – their classification is the
following categories.
❖ 
Phreaker – Tries to identify a weakness in a telephone.
❖ 
Script kiddies – this type of hacker is not skilled. He uses tools online to enable him to do
the hacking.
❖ 
Hacktivist – This kind, hacks websites and leaves messages on the hacked sites. The
message he leaves maybe about political, religious, social, global, government issues related.
Most often, they are negative messages.
❖ 
Black hat – His main aim is to access a computer to get data mainly for self-gain. He
intends to violate the copyrights or steal money.
❖ 
Ethical hacker – He is also known as a white hat. He hacks the system of the computer to
identify the weakness of a computer and fix it. They can test a system to see if it is
vulnerable to hackers.
❖ 
Grey hat – This person hacks a computer system without authority. His main aim is to
identify the problem and tell the system owner.
Therefore, ethical hacking is the most recommended since you get access to
the computer using by legally accessing. As an ethical hacker, make sure
you get permission to access the system owner. You have the mandate to
secure your clients’ data from being hacked by users instead inform the
necessary personnel. This person can protect data or if you are a guru, then
do the protection.

Download 6,34 Mb.
1   ...   70   71   72   73   74   75   76   77   ...   203




Download 6,34 Mb.
Pdf ko'rish

Bosh sahifa
Aloqalar

    Bosh sahifa



Chapter 2: Hacking and the Skills Hackers Need

Download 6,34 Mb.
Pdf ko'rish