Type of hackers and common tools they use
Hacking is process of unauthorised intrusion to the computer system or a network, the process may involve one or more hackers trying to penetrate the system.
Hacking is process of unauthorised intrusion to the computer system or a network,the process may involve one or more hackers trying to penetrate the system. Hacker can be anybody including you and me, You can work as solo man or be employed by a company that may have bad intention to penetrate to unauthorised data.
Although hacking may be of good intention in which certain company may hire staffs part time jobs so to hack their system to detect flaws so as to improve system security. These is done so to detect and prevent malicious hackers from penetrating the system.
READ ALSO: Type of hackers and common tools they use
Types of hackers around the world
1.0 Black hat hackers, black hat hackers are individuals who try to gain unauthorised access to the the system for malicious damage.Black hat hackers has no permission to access the system. They perform malicious activities like shutting down system, altering with network and websites and compromising security of the system.
2.0 White hat hacker, white hat hacker are reffered as good guys who hack so to strength the weakness of the system so as to avoid malicious attackers. White hackers are reffered as ethical hackers. White hat hackers are legally permitted by organisation to explore the vulneriability of the system so that it can be fixed.
3.0 Grey hat hacker, Grey hat hackers exploit computer system and networks just as the way black hat hackers does but grey hat hackers has no bad intention as opposited to black hat hackers.
Common hacking tools The following are common hacking techniques used by hackers.
1.0 Rootkits is a software or a program that allows user gain remote access to computer system or network. Rootkits is installed through phishing and social engineering.
2.0 Keyloggers it is a program that is used to record every key pressed on a system.The recorded file is saved which include username,screenshots and passwords.
3.0 vulnerability scanner, It classifies and detects weakness of the network or computer system,this is most way ethical hacker use to detect loopholes of a system.
READ ALSO: Security mechanisms in a computer system
The notorious FIN8 #cybercrime group has a new target when it comes to skimming payment-card details from consumers: Point-of-sale systems used at fuel pumps at gas stations: https://t.co/Xhwfv32D4h#Cybersecurity #Hackers #IoT #PoS #PaymentFraudDisruption #MikeEchols #IT— Michael Echols (@MaxCybersec) December 16, 2019
Just because it's #holiday time, it doesn't mean that #hackers take a vacation. In fact, you can expect a surge in hacker activity over the holidays. #uzado #cybersecurity #phishing #spam #ransomware https://t.co/j50z1Gd1Cm— Uzado (@Uzado_) December 16, 2019
#Hackers found a new way to amplify #DDoS techniques by abusing an improperly implemented tool found in almost 1 million network-connected #IOT devices. Here is why researchers are concerned. @arstechnica @NETSCOUT https://t.co/pnSM4nRydX pic.twitter.com/bwdmfzONqd— Hanumantha Rao (@hmarepalli) December 17, 2019
I love #Hackers. I didn't understand when I first saw, but boy do I love the story. The techno jargon wrong, the writers didn't know what they were writing. It doesn't stop it from being a good film with a nice sound track. pic.twitter.com/TJOOLMgBiL— AbyssDreaming (@Abyss__Dreaming) December 16, 2019