Monday, April 27, 2009

Hacking: Hackers and Victims

Hacker categorized into several different categories depending on the type of their activities. Most hackers are the "script-kiddies" who exploit or use the usual program available on the Internet to reinforce their action. If their goal is to commercial interests or the interests of the military, so the betting be higher and usually they will choose their victims carefully.

Reason behind hacking own manifold. Script kiddies usually do "scanning" some IP blocks to search for possible host of "Vulnerable" (can be attacked) and try to exploit some of the daemons that are found. One hacker group usually try the program or script that they develop to see if the results of their work success. But somehow, someone can become a "black-hat" or "white-hat" depends on the philosophy, values and ethical motivations of their own.

"White-hat" means that if a "hacker" was successful in business and as a successful example into a system that is not her responsibility, then he will notify to the system administrator about the security there is a chink in the system and how to close the rift and how security is to strengthen the host (host hardening). Basically, the goal is to research. "White-hat" is usually the "security professional" and hired to do the "system penetration" or provide network security consultancy.

"Black-hat" is a person who is called "white-hat" as a "cracker" (breaker). Purpose
the "cracker" is not always good, they usually enter into a system to steal information or prepare the system to conduct attacks against another system, "DDoS" as an example. "Black-hat" usually leaves a backdoor on the system successfully infiltrated.

There is also a type of "gray-hat" or the person who does not destroy but often infiltrate into the another system without the system administrator to notify the system when there is a chink security, they are not too harmful but also the type who does not want too.

0 comments: