What Is Hacking Introduction, History And Classification
What Is Hacking Introduction, History & Classification

What is Hacking
A hacker is a person who detects defenses and vulnerabilities in a computer system or network. Hacking is the act of invading privacy on a computer, stealing corporate data, and committing fraudulent acts such as personal information.
Cybercrime costs millions of dollars every year. Businesses need to protect themselves from such attacks.
History Of Hacking
In 1980, An article in the August issue of Psychology Today used the word "hacker" in its title:
"Hacker Papers". This was a topic other than the Stanford Bulletin Board's discussion of computer use addiction.
In the 1982 film Tron, Kevin Flynn (Jeff Bridge) described his intention to enter Encom's computer system and said that he was hacking a little bit. CLU is the software used for this.
In 1983, hacking in the sense of breaking computer security was already in use as a computer jargon. But there was no public awareness of such activities. However, the release of the movie War Games that year showed a computer hack into NORAD, raising public confidence that computer security hackers could pose a threat to national security.
Classifications Of Hackers
Hackers are differentiated according to the intent of their actions.
White Hat Hackers
White hat hackers have breached security for non-hate reasons, to test their own security systems,
Perform access tests, or an insecurity assessment for a client - or while working for a security company that makes security software.
Black Hat Hackers
A black hat hacker is a hacker who violates computer security by ignoring malicious things or for personal gain. The term was coined by Richard Stallman, as opposed to the hacker culture of instability and discovery, or the tendency of white hat hackers to carry out hacking duties as a legal way to identify places for criminal hacker malice or reparation. Employment
Grey Hat Hackers
Gray hat hacker is between black hat and white hat hacker. A gray hat hacker can surf the Internet and hack into a computer system with the sole purpose of notifying the administrator that there is a security flaw in their system,
Example:
They can then offer to correct the defect in the fee. Gray hat hackers sometimes find faults in the system and publish the facts to the world instead of groups of people. Even gray hat hackers cannot necessarily hack for their personal gain. Unauthorized access to the system cab is considered illegal and unethical.
Script Kiddie Hackers
A script worm (also known as a skid) is an unskilled hacker who breaks into automated tools written by others (usually by other black hat hackers) into a computer system, hence the term script.
Blue Hat Hackers
Blue Hat Hacker is one of the computer security consultancy companies used for bug-testing.
The system, before launch, is looking for actions so they can be shut down.
Nation-State
Intelligence agencies and cyberwarfare operative of nation-states.
Organized Criminal Gangs
Groups of the hackers that bring out arrange criminal activities for profit.
Hacking apps for rotate and non-rotate androids phones.
- Hacker Code
- PortDroid
- zANTI
- FaceNiff
- Shark for Root
- Droidsheep
- DroidBox
- Nmap
- SSHDroid
- Wi-Fi kill
- Kali Linux NetHunter
- Fing
Note; This is for only educations purposes. We don't support the use of any tool to indulge in nethical purpose
I really like your writing style, great information, thankyou for posting.External Network Penetration Testing
ReplyDelete