A hacker is an individual who uses computer, networking or other skills to overcome a technical problem but instead nowadays its been used instead of Security Hacker. A Security Hacker is an individual who uses technical skills to exploit a systems vulnerability and gain unauthorized access in a system. Hackers use their skills for a specific goal, such as stealing money, gaining fame by bringing down a computer system, or making a network unavailable — even sometimes destroying them.
Types of Hackers : Black Hats :
Black Hats is a stylish way to describe hackers who has extraordinary computing skills, but use them to break into a computer system or a network with a malicious intent. Black hats finds security vulnerabilities in a system or network and exploit them for personal financial gain, to steal or destroy private data, take down a website / web server. They are also known as Crackers. The Term “Black hat” is derived from old western movies where bad guys used to wear black cowboy hats and the good guys used to wear white hats. White Hats
A White Hat hacker or An Ethical Hacker is an antonym of Black hat Hacker. A Whit Hat hacker has deep understanding of networks and systems just like a Black hat but they use their power for good instead of evil. White hat hackers are oen hired by organizations to conduct penetration tests and vulnerability assessments on their systems to improve their security standards. They are also known as Security Analyst. Grey Hats :
Grey Hat Hackers are intermediate hackers who are explorers extending the boundaries for themselves. They will scan a system or network for a vulnerability but they don’t have malicious reasons for doing it. If any vulnerabilities they usually report to the owner of the system. The fact that they do all this without the permission of the owner makes it illegal.
Suicide Hackers :
Suicide Hackers are similar to Suicide Bombers. They are not afraid to go to jail or even die as punishment. They believe they are bringing down critical infrastructure for a “noble cause”. They can be good as well as bad. Script Kiddies :
They are unskilled Hacker who cannot code their tools for the attack. So they compromises systems by running scripts, tools and soware developed expert hackers. They are usually students who are learning their way in this field.
Spy Hacker are individuals who use their hacking knowledge to spy on other individuals, institutes or organizations. They are usually employed by the organization to penetrate and gain trade secrets of the competitor. Cyber Terrorists :
Cyber Terrorists are programmers who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism. They are individuals with wide range of skills, motivated by religious or political beliefs to create fear by large scale disruption of computer networks. State Sponsored Hackers :
These are the type of Ethical hackers who are employed by the governments to penetrate and gain top-secret information systems of other governments.