TYPES OF HACKERS
In the present day scenario, hackers could be classified into the following given types.
However, the classification has been done on the basis of mindset and the kind of activities they perform
Also known as a just Hacker, a White Hat is the one who perfoms hacking ethically and with all the required permissions. This is the type of hacking, tis book is intended for. These guys are often called as the Jedi of the internet. The White Hat guys often work with top-notch companies and help secure their products and websites.
A tiger team, or a pentesting team is often hired by many companies on a contract basis, and allowing them to break into their security. Upon successful security breach, those security holes are analysed and then closed.
A White Hat hacker is also called a Penetration Tester or Ethical Hacker.
A Black Hat Hacker, or also known as cracker is a person who "violates computer security for reasons ranging from curiousity to satisfaction to personal gain".
Black Hat Hackers break into secure networks resulting in the stealing of secret information or in some cases, even deleting the important information stored in the website.
The black hats are often motivated with a reason, maybe personal, commercial or political. Those type of hackers are also known as hacktivists.
A grey hat hacker is a a person who can’t be categorized into either of the above two categories. Grey hats usually follow both the ways, blackhat as well as whitehat.
In the hacking community, a grey hat refers to a proficient and tech-savvy hacker who is ambivalent enough to sometimes use his program manipulating skills to act illegally in either good or ill will. A Grey Hat Hacker may surf the internet and hack into a computer system for the sole purpose of notifying the vendor that their product has been hacked. Then they may offer to repair their system for a small fee.
Script kiddie is a person, who thinks himself as a hacker, but breaks into other systems or hacks, with the use of only tools. A script kiddie doesn’t have an understanding of the working of the tools inside out, as well as not knowing how to perform the attack manually without tools.
In the coming chapters, you will get an idea about various security threats existing online, how to write secure code and most importantly, how to conduct Vulnerability Assessments and Penetration Tests on organizations .