Professional Documents
Culture Documents
Ethics Reviewer
Ethics Reviewer
It’s potential to inform and improve and hackers are probably seeking any
defend corporate networks. information that can help them perpetrate
attack
Basically, at this stage, four types of scans are CHAPTER 5: Hackers and Its Types
used:
HACKER
Pre-attack - Hacker scans the network A hacker is an individual who uses
for specific information based on the computer, networking or other skills to
information gathered during
overcome a technical problem.
reconnaissance.
Port Scanning/Sniffing - This method TYPES OF HACKERS
includes the use of dialers, port scanners,
and other data-gathering equipment. Black Hat: Criminals Hackers
Vulnerability Scanning - Scanning the
target for weaknesses/vulnerabilities. A black hat hacker is a cybercriminal
Information Extraction – Hacker who breaks into computer systems with
collects information about ports, live malicious or criminal intent.
machines and OS details, topology of Motives: To profit from data breaches
network, routers, firewalls, and servers.
Who’s most at risk: Black hat hackers
pose the most risk to organizations.
3RD Phase: GAINING ACESS
White Hat: Authorized Hackers
First he designs the network map and
then he has to decide how to carry out the
White hat hackers are authorized to hack
attack
these systems for the purpose of spotting
the hacker has the information he needs. security vulnerabilities before a criminal
hacker can
4TH Phase: MAINTAINING ACESS Motives: Help businesses prevent
cybersecurity attacks
Once a hacker has gained access, they Who’s most at risk: Criminal hackers
want to keep that access for future
exploitation and attacks. Grey Hat: “Just for Fun” Hackers
The hacker secures access to the
organization’s Rootkits and Trojans
A cybersecurity expert who finds ways to
hack into computer networks and
5th Phase: CLEARING TRACKS systems, but without the malicious intent
of a black hat hacker.
An intelligent hacker always clears all Motives: Personal enjoyment
evidence so that in the later point of time, Who’s most at risk: Anyone who
no one will find any traces leading to doesn’t want unauthorized access to their
him/her. He/she does this by: systems and networks
o Clearing the cache and cookies
o Modifying registry values
Script Kiddies: Ametuer Hackers
o Modifying/corrupting/deleting
the values of Logs
Amateur hackers that don’t possess the
o Clearing out Sent emails same level of skill or expertise as more
o Closing all the open ports advanced hackers in the field.
o Uninstalling all applications that Motives: To cause disruption
he/she be used Who’s most at risk: Organizations with
unsecured networks and systems
Green Hat: Hackers-in-Training Hacktivists: Politically Motivated Hackers
Someone who is new to the hacking Someone who hacks into government
world but is intently focused on networks and systems to draw attention
increasing their cyberattack skills to a political or social cause
Motives: To learn how to become an Motives: To shed light on an alarming
experienced hacker social or political cause (or to make a
Who’s most at risk: No one (yet) political or ideological statement)
Who’s most at risk: Government
Blue Hat: Authorized Software Hackers agencies
Hired by organizations to bug-test a new Elite Hackers: The Most Advanced Hackers
software or system network before it’s
released. Elite hackers are the cream of the crop in
Motives: To identify vulnerabilities in the world of cybercriminals, and are
new organizational software before it’s considered to be the highest skilled
released. hackers in their field
Who’s most at risk: Criminal hackers Motives: To perform advanced
cyberattacks on organizations and
Red Hat: Government-Hired Hackers individuals
Who’s most at risk: High-revenue
corporations
Hired by government agencies to spot
vulnerabilities in security systems, with a
specific focus on finding and disarming Cryptojackers: Cryptocurrency Mining
black hat hackers Hackers
Motives: To find and destroy black hat
hackers Known to exploit network vulnerabilities
Who’s most at risk: Black hat hackers and steal computer resources as a way to
mine for cryptocurrencies
Motives: Cryptocurrency mining
State/Nation Sponsored Hackers: International
Threat Prevention Who’s most at risk: Any individual or
organization with unsecured networks
State/nation sponsored hackers are
appointed by a country’s government to Gaming Hackers
gain access to another nation’s computer
systems. Someone who focuses their hacking
Motives: To monitor and prevent efforts on competitors in the gaming
international threats world.
Who’s most at risk: International hackers Motives: To compromise gaming
and criminals competitors
Who’s most at risk: High-profile
Malicious Insider: Whistleblower Hackers gamers
Malicious insider hackers are individuals
who employ a cyberattack from within Botnets: Large-Scale Hackers
the organization they work for.
Motives: To expose or exploit an Botnet hackers are malware coders who
organization’s confidential information create bots to perform high-volume
Who’s most at risk? Internal executives attacks across as many devices as
and business leaders possible
Motives: To compromise a high volume Keylogger Injection
of network systems
Who’s most at risk: Individuals with A keylogging program is injected into the
unsecured routers and WiFi-connected user's system as malware to monitor and
devices record each of the user's keystrokes.