Disqus for Cyber Fort

Wednesday 7 August 2013

Pin It

Widgets

About Hacker ! Types of Hacker & World's 5 Most Famous Hackers

hi...guys today i am here with u best article about hacker also types of hacker and world's most famous hackers.


About Hacker:                                                                                                                             hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge. The subculture that has evolved around hackers is often referred to as the computer underground and is now a known community. While other uses of the word hacker exist that are not related to computer security, such as referring to someone with an advanced understanding of computers and computer networks, they are rarely used in mainstream context. They are subject to the long standing hacker definition controversy about the true meaning of the term hacker. In this controversy, the term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker, not making a difference between computer criminals (black hats) and computer security experts (white hats).Some white hat hackers claim that they also deserve the title hacker, and that only black hats should be called crackers.

Final words:

    “Being a hacker isn't about taking down noobs. It's a passion and a commitment to always learning. It's sharing that passion with others”
  Now you all know about hackers, now let’s discuss the types of hackers. I’m sharing this information because who so ever want to be a computer security expert, he should clear his mind what kind of hacker or security expert he want to be. So without wasting any more time let’s begin with,

Types of Hacker:

There are three main types of Hacker.

• White Hat Hacker:

white hat hacker breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software. The term "white hat" in Internet slang refers to an ethical hacker. This classification also includes individuals who perform penetration tests and vulnerability assessments within a contractual agreement. The EC-Council, also known as the International Council of Electronic Commerce Consultants, is one of those organizations that have developed certifications, course-ware, classes, and online training covering the diverse arena of Ethical Hacking.

Final words:

  - A good hacker who helps in secure systems and works for ethical.

• Black Hat Hacker:


A "black hat" hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain" (Moore, 2005) Black hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal". Black hat hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network. They are the people that hack banks, steal credit cards, username and password, and deface websites.  They will maintain knowledge of the vulnerabilities and exploits they find for a private advantage, not revealing them to the public or the manufacturer for correction.

Final words:

 - A hacker with criminal intent mostly idulge in crimes work for crime.

• Grey Hat Hacker: 

A grey hat hacker is a combination of a black hat and a white hat hacker. A grey hat hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has a security defect, for example. Then they may offer to correct the defect for a fee.They usually do not hack for personal gain but may or may not occasionally commit crimes during the course of their technological exploits.


Final words:

- A hacker with no particular agenda works for both good or bad.

                                     I have already told you the three main types of hackers, but I feel this is not enough so I’ll now further divide these types into sub categories. Means I would like to define more these three types. This will help you to differentiate among the types of hackers.

Phreaker:

A phreaker is simply a hacker of telecommunications. An example of this is tricking the phone system into letting you make free long distance calls.

Script Kiddy:

script kiddie (also known as a skid or skiddie) is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, usually with little understanding of the underlying concept—hence the term script (i.e. a prearranged plan or set of activities) kiddie (i.e. kid, child—an individual lacking knowledge and experience, immature).

Hacktivist:

A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denial-of-service attacks.This is a person with political motivations, such as someone defacing a website and leaving messages on the hacked site for the world to see.

Academic Hacker:

This type is typically an employee or student at an institution of higher education. They would use the institutions computing resources to write malicious programs.

World's 5 Most Famous Hackers:

• Jonathan James 

                                                                                                                      
Jonathan Joseph James (December 12, 1983 – May 18, 2008), was an American hacker who was the first juvenile incarcerated for cybercrime in the United States. The South Florida native was 15 years old at the time of the first offense and 16 years old on the date of his sentencing. He died on May 18, 2008, of a self-inflicted gunshot wound He was known as “c0mrade” on the Internet. His main targets were blue chip corporate organizations. Using the backdoor, he was able to read sensitive e-mail messages and capture usernames and passwords of the agency employees stored in the database. He hacked into NASA’s network and downloaded enough source code to learn how the International Space Station worked. On realizing this, NASA was compelled to switch off its computer systems costing them approximately $41,000 in the process.

For more information about Jonathan Jamesclick here.

• Kevin Mitnick

 Kevin David Mitnick (born on August 6, 1963) is an American computer security consultant, author, convicted criminal, and hacker. In the late 20th century, he was convicted of various computer and communications-related crimes. At the time of his arrest, he was the most-wanted computer criminal in the United States. Kevin Mitnick’s journey as a computer hacker has been so interesting and compelling that the U.S. Department of Justice called him the “most wanted computer criminal in U.S. history. He was a self-proclaimed hacker with the nickname “hacker poster boy”. Media managed to make him as one of the most feared hackers.

For more information about Kevin Mitnickclick here.

• Kevin Poulsen

Kevin Lee Poulsen (born November 30, 1965) is an American former black hat hacker who is a News Editor at Wired.comKevin Poulsen is also referred to as Dark Dante. He rose to fame for hacking into LA radio’s KIIS-FM telephone lines and fixed himself as the winning caller, earning him a brand new Porsche. According to media, he was called the “Hannibal Lecter of computer crime.”  He got into trouble with the law when he decided to hack into the FBI database and stole wiretap information. Unlike other hackers, his hacking activities mainly revolved around hacking into telephone networks. Surprisingly, when his picture was eventually released on television show, the telephone lines crashed. He was later captured in a supermarket and sentenced to 51 months in prison, as well paying $56,000 in restitution. He changed his ways after being released from prison. He began working as a journalist and is now a senior editor for Wired News. At one point, he even helped law enforcement to identify 744 sex offenders on MySpace.

For more information about Kevin Poulsenclick here.

• Adrian Lamo

Adrian Lamo (born February 20, 1981) is an American threat analyst and "gray hathacker. He first gained media attention for breaking into several high-profile computer networks, including those of The New York TimesYahoo!, and Microsoft, culminating in his 2003 arrest.n 2010, Lamo reported U.S. serviceman Bradley Manning to federal authorities, claiming that Manning had leaked hundreds of thousands of sensitive U.S. government documents to WikiLeaks. Manning was arrested and incarcerated in the U.S. military justice system. What made Lamo’s activities illegal is that he was not hired by any of the companies to find and rectify flaws in their systems. He is also known for identifying security flaws in computer networks of Fortune 500 companies and then notifying them of any flaws he found. After breaking into New York Times local area network, he was able to include himself as part of the network administrators thus giving him access to personal data, i.e. social security numbers.

For more information about Adrian Lamoclick here.

• Robert Tappan Morris

Robert Tappan Morris (born November 8, 1965) is an American computer scientist, best known for creating the Morris Worm in 1988, considered the first computer worm on the Internet—and subsequently becoming the first person convicted under the Computer Fraud and Abuse Act.
He went on to co-found the online store Viaweb, one of the first web-based applications, and later the funding firm Y Combinator—both with Paul Graham. He is a tenured professor in the department of Electrical Engineering and Computer Science at the Massachusetts Institute of Technology.
His father was the late Robert Morris, a coauthor of UNIX and the former chief scientist at the National Computer Security Center, a division of the National Security Agency (NSA).
For more information about Robert Tappan Morrisclick here.


hope u like this article pls leave us  comment you have any ideas about this...


0 comments :