Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Assignment -3

Batch:23CO3 Employee ID : ST#IS#5047

TASK-1
Alternatives :
 WayBack Machine :
- Memento Time Travel (HyperLink)
- iTools
 Geolocation :
- IPinfo
- PositionStack
 VirusTotal :
- Sucuri
- AnyRun
 FollowThatPage :
- Site 24/7
- UptimeRobot
 NsLookUp:
- IpVoid
- Ip-AdressOrg
 WhoisDomain :
- CheckDomain
- ICanLookUp
 Wappalyzer:
- WhatCms
- BulitWith

TASK-2
Types Of Hackers :
State-sponsored Hackers
Script Kiddies:
Hacktivists:
Grey Hat Hackers:
Black Hat Hackers:
White Hat Hackers
Red Teamers:
Phreakers:Cybercriminals:
Green Hat Hackers
Blue Hat Hackers
Nation-State Hackers
Cyberterrorists
Anarchist Hackers
Insider Hackers
Cyber Espionage Agents
Hacktivist Groups
Cyber Mercenaries
Ransomware Gangs
Hacktivist Collectives
State-Sponsored Threat Actors
Cyber Criminal Organizations
Hacktivist Individual
Hacktivist Insider
Cyber Warfare Units
Hacktivist Campaigners
Cyber Vigilantes
Cyber Extortionists
Cyber Saboteurs
Cyber Spies
Cyber Mercenary Groups
Cyber Underground Economy Participants
Cyber Activists
State-Linked Hacking Teams
Cybersecurity Researchers
Cyber Forensics Experts
Cybersecurity Consultants
Cybersecurity Analysts
Cybersecurity Engineers
Cybersecurity Incident
Responders industrial Espionage
Hackers Cyber-Physical System
Hackers Internet of Things (IoT)
Hackers Web Application Hackers
Database Hackers
Wireless Network Hackers
Social Engineering Hackers
Phishing Hackers
Advanced Persistent Threat (APT) Groups
Cyber Weapon Developers
Vulnerability Researchers
Malware Developers
Exploit Writers
Zero-day Exploit Traders
Cyber Insurance Hackers
Cybersecurity Journalist Hackers
Cybersecurity Awareness Trainers
Cybersecurity Policy Experts
Cybersecurity Legal Consultants
Cybersecurity Governance Specialists
Cybersecurity Conference Speakers
Cybersecurity Product Developers
Cybersecurity Start-up Founders
Cybersecurity Educators
Cybersecurity Students
Cybersecurity Researchers (Academic)
Cybersecurity Hacktivists (Focused on specific
causes)
Cybersecurity Scripters (Developing scripts and
automation tools)
Cybersecurity Architects (Designing secure
systems)
Cybersecurity Data Analysts
Cybersecurity Policy Advocates
Cybersecurity Awareness Campaigners
Cybersecurity Compliance Auditors
Cybersecurity Incident Handlers
Cybersecurity Operations Center (SOC) Analysts
Cybersecurity Threat Intelligence Analysts
Cybersecurity Risk Analysts
Cybersecurity Penetration Testers (Ethical Hackers)
Cybersecurity Bug Bounty Hunters
Cybersecurity AI/ML Researchers (Applying AI/ML
in cybersecurity)

You might also like