Hackers are three types:- 1. White hat hacker 2. Gray hat - TopicsExpress



          

Hackers are three types:- 1. White hat hacker 2. Gray hat hacker 3. Black hat hacker White Hat and Grey Hat Hacker & What is the Real Difference? What is worse, the public is not able to understand terms like grey hat, white hat, Linux OS, or cracker. However, the truth is that the subculture of the hacker world is more complex than we think. Especially if we consider that, these are very intelligent people. So, what is ethical hacking white hat and how does it differentiate from grey hackers? The only way to find out is to submerge ourselves in the world of hackers and understand, at least, the most basic concepts. WHITE HAT: A white hat hacker is someone who has non-malicious intent whenever he breaks into security systems and whatnot. In fact, a large number of white hat hackers are security experts themselves who want to push the boundaries of their own IT security ciphers and shields or even penetration testers specifically hired to test out how vulnerable or impenetrable (at the time) a present protective setup currently is. A white hat that does vulnerability assessments and penetration tests is also known as an ethical hacker BLACK HAT: A black hat hacker, also known as a cracker, is the type of hacker that has malicious intent whenever he goes about breaking into computer security systems with the use of technology such as a network, phone system, or computer and without authorization. His malevolent purposes can range from all sorts cybercrimes such as piracy, identity theft, credit card fraud, vandalism, and so forth. He may or may not utilize questionable tactics such as deploying worms and malicious sites to meet his ends. GREY HAT: A grey hat hacker is someone who exhibits traits from both white hats and black hats. More to the point, this is the kind of hacker that isn\t a penetration tester but will go ahead and surf the Internet for vulnerable systems he could exploit. Like a white hat, he\ll inform the administrator of the website of the vulnerabilitieshe found after hacking through the site. Like a black hat and unlike a pen tester, he\ll hack any site freely and without any prompting or authorization from owners whatsoever. He\ll even offer to repair the vulnerable site he exposed in the first place for a small fee.
Posted on: Fri, 14 Mar 2014 13:31:04 +0000

Trending Topics



Recently Viewed Topics




© 2015