Type of hackers and common tools they use

Hacking is process of unauthorised intrusion to the computer system or a network, the process may involve one or more hackers trying to penetrate the system.

Type of hackers and common tools they use

Hacking 

Hacking is process of unauthorised intrusion to the computer system or a network,the process may involve one or more hackers trying to penetrate the system. Hacker can be anybody including you and me, You can work as solo man or be employed by a company that may have bad intention to penetrate to unauthorised data.

Although hacking may be of good intention in which certain  company may hire staffs part time jobs so to hack their system to detect flaws so as to improve system security. These is done so to detect and prevent malicious hackers from penetrating the system.

READ ALSO: Type of hackers and common tools they use

Types of hackers around the world

1.0 Black hat hackers, black hat hackers are individuals who try to gain unauthorised access to the the system for malicious damage.Black hat hackers has no permission to access the system. They perform malicious activities like shutting down system,  altering with network and websites and compromising security of the system. 

2.0  White hat hacker, white hat hacker are reffered as good guys who hack so to strength the weakness of the system so as to avoid malicious attackers. White hackers are reffered as ethical hackers. White hat hackers are legally permitted by organisation to explore the vulneriability of the system so that it can be fixed.

3.0 Grey hat hacker, Grey hat hackers exploit computer system and networks just as the way black hat hackers does but grey hat hackers has no bad intention as opposited to black hat hackers.

READ  ALSO: Hackers Steals Hundreds Of Millions Of iPhones Data Which Apple Can't Stop.

Common hacking tools  The following are common hacking techniques used by hackers.

 1.0 Rootkits is a software or a program that allows user gain remote access to computer system or network. Rootkits is installed through phishing and social engineering.

2.0 Keyloggers it is a program that is used to record every key pressed on a system.The recorded file is saved which include username,screenshots and passwords.

3.0 vulnerability scanner, It classifies and detects weakness of the network or computer system,this is most way ethical hacker use to detect loopholes of a system.

READ ALSO: Security mechanisms in a computer system