Vulnerability scanner: checks computers on networks for known weaknesses
Password cracking: the process of recovering passwords from data stored or transmitted by computer systems Packet sniffer: applications that capture data packets in order to view data and passwords in transit over networks Spoofing attack: involves websites which falsify data by mimicking legitimate sites, and they are therefore treated as trusted sites by users or other programs Root kit: represents a set of programs which work to subvert control of an operating system from legitimate operators Trojan horse: serves as a back door in a computer system to allow an intruder to gain access to the system later Viruses: self-replicating programs that spread by inserting copies of themselves into other executable code files or documents Key loggers: tools designed to record every keystroke on the affected machine for later retrieval TYPES OF HACKERS Ethical Hacker (White hat): A hacker who gains access to systems with a view to fix the identified weaknesses. They may also perform penetration testing and vulnerability assessments. Cracker (Black hat): A hacker who gains unauthorized access to computer systems for personal gain. The intent is usually to steal corporate data, violate privacy rights, transfer funds from bank accounts etc TYPES OF HACKERS CONT..... Grey hat: A hacker who is in between ethical and black hat hackers. He/she breaks into computer systems without authority with a view to identify weaknesses and reveal them to the system owner. Script kiddies: A non-skilled person who gains access to computer systems using already made tools. Phreaker: A hacker who identifies and exploits weaknesses in telephones instead of computers Hacktivist: A hacker who use hacking to send social, religious, and political, etc. messages. This is usually done by hijacking websites and leaving the message on the hijacked website. Certain corporations employ hackers as part of their support staff. These legitimate hackers use their skills to find flaws in the company security system, thus preventing identity theft and other computer-related crimes.