Home »
Cyber Security
Types of Hackers, Terms & Terminologies Related to Hacking
By Anshuman Das, on July 10, 2019
Who are the Hackers?
Hackers are those people who can access our private and personal data it may be legally or illegally.
Now the basis of these, there are three types of hacker are there. We'll discuss them one by one.
Types of Hackers
1. Black Hat Hackers
Those who access our private data illegally by mean of harming someone, are known as Black Hat Hackers. They are very dangerous to our society and they work for only money.
2. Grey Hat Hacker
Those who are aware of all knowledge of both the hacking legally or illegally. Sometimes they hack for some good reasons and sometimes they hack for fun(illegally), are known as Grey Hat Hacker.
3. White Hat Hacker
Those who hack for only good reason and to make our society crime free and legally (with authorized permission), are known as White Hat Hacker.
Other Types of Hackers
Hope you all understand types of hackers. Except these three there are some other types of people (who access unauthorizedly to other systems). Now we will discuss them.
1. Script Kiddie
Script Kiddie is one type of Hacker who have less knowledge of hacking. Rather he learns about the third-party hacking tools and uses them for hacking. Watches YouTube videos how to use them then hack it. This type of hackers usually performs DoSing (Denial of Services) and DDoSing (Distributed Denial of Services). They often copy others code to make the virus and then break into others system. Eventually, every Hacker is a Script Kiddie initial stage of hacking.
2. Red Hat
Red Hat is the real vigilant of the Hacker world. They're like White Hats in that they halt Black Hats, but these folks are downright SCARY to those who have ever tried so much as PenTest. Instead of reporting the malicious hacker, they shut him/her down by uploading viruses, DoSing and accessing his/her computer to destroy it from the inside out. They leverage multiple aggressive methods that might force a cracker to need a new computer
Hacking Terms and Terminologies
Now we will look into various terms and terminologies related to Hacking...
1. Virus
A computer virus is a malicious software program loaded onto a users computer without the user's knowledge and performs malicious actions. It can self-replicate, inserting itself onto other programs or files, infecting them in the process. Not all computer viruses are destructive though.
2. Malware
Now the second common term that's used in Hacking field is MALWARE (comes from "Malicious" + "Software"). It is a software that's intentionally designed to cause damage to any client, server, computer networks, etc.
There is other Malware like Trojan, Worm, Ransomware, Spyware, etc.
Now we'll try to differentiate those ones by one.
3. Trojan
A trojan is a type of malicious code or software that looks legitimate but can take control of your computer. A Trojan is designed to damage, disrupt, steal, or in general, inflict some other harmful action on your data or network.
4. Worm
A worm is another type of Malware which can replicate itself, spread without end-user action and cause the victim system devastating damage.
5. Ransomware
Ransomware is a form of malware in which rogue software code effectively holds a user's computer hostage until a "ransom" fee is paid. Ransomware often infiltrates a PC as a computer worm or Trojan horse that takes advantage of open security vulnerabilities.
6. Spyware
Spyware is unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information.
Example of a Spyware is KeyLogger.
These were all the basic of terminologies in Cyber Security and Hacking World part which you must to know.
We'll be back again with another tutorial of Ethical Hacking. If you are a beginner practice more the Command Line interface of Kalil Linux. For more help please visit the "Linux" section of our website and "Computer Networks" (Mainly Subnetting, Topologies, etc. )