![]() ![]() In the news: Selectric Bug (Oldschool), PunkeyPOSĪ software that scans large networks of computers to find weaknesses that can be exploited or patched. Everything is intercepted and stored on a log file, credit card numbers, personal communication, phone numbers, passwords. Software designed to eavesdrop on the victim's computer, recording every keystroke the user does. In the news: Sony BMG copy protection rootkit scandal, Greek wiretapping case Originally, rootkits were developed to fix software problems remotely but have since then been weaponized by hackers. Special software that allows a hacker to gain remote access to a victim's computer. These are the amateurs eager to learn the tools of the trade and become a full-blown hacker. You will find the Green Hats on online hacking forums asking questions to the more seasoned professionals. They have little interest in learning and use ready-made scripts to do their dirty work. These are novice hackers who's main agenda is revenge on anyone who makes them angry. Their sole objective is to destroy the efforts of illegal hackers and take their infrastructure down. ![]() These are the hunters of the hacker world, and their prey are Black Hats. If that demand is not meet they might leak the information online or exploit it, becoming a Black Hat.įamous: Adrian Lamo, Gary McKinnon, Kevin Poulsen They look for vulnerabilities without permission but often report them to the owner, sometimes for free and sometimes with demand for compensation. Infamous: Kevin Mitnick, Jonathan James, Albert GonzalezĪs the name suggests the Grey Hat hacker is a mix of both White and Black hats. They break into systems, steal login credentials and private data which they use for extortion or put up for sale online. On the opposite side of the spectrum, the Black Hats operate outside any moral and legal framework, motivated by personal or financial gain. White hat hackers always operate within the confines of the law.įamous: Charlie Miller, Tsutomu Shimomura, Greg Hoglund Usually they are employed or contracted by companies and governmental entities to find vulnerabilities before other hackers will. First of all, we have the good guys these are the ethical hackers that use their power for good. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |