






Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Giving basic idea of hackers and crackers and explaining different types of each with some real life examples.
Typology: Study notes
1 / 10
This page cannot be seen from the preview
Don't miss anything!
The crackers usually breach the internet security and without
HACKERS CRACKERS ·0 A hacker is a person intensely interested in the arcane and recondite workings of any computer operating system. Hackers are most often programmers. As such, hackers obtain advanced knowledge of operating systems and programming languages. They might discover holes within systems and the reasons for such holes. Hackers constantly seek further ·1 A cracker is one who breaks into or otherwise violates the system integrity of remote machines with malicious intent. Having gained unauthorized access, crackers destroy vital data, deny legitimate users service, or cause problems for their targets. Crackers can easily be identified because their actions are malicious.
CRACKERS-
1. Script Kiddie Script Kiddies don’t really care about hacking into systems and stealing things. They simply copy code and use it for a virus, SQLi or something else. Script Kiddies will never hack for themselves, they will just download some overused software (such as LOIC or Metasploit) and watch a YouTube video on how to use it. A very common Script Kiddie attack would be a DOS (Denial of Service) or DDOS (Distributed Denial of Service), where they flood an IP with so much useless information that it collapses, preventing other people from using it. 2. Packet Monkey On the Internet, a packet monkey is someone who intentionally inundates a web site or network with data packets, resulting in a denial-of-service situation for users of the attacked site or network. Packet monkeys typically use tools created and made available on the Internet by hackers
3. Waret doodz
HACKERS vs CRACKERS
which he isn’t. He is the creator of the actual system that we all use to navigate the Internet in order to access particular files, folders, and websites. He got his start with electronics at a relatively young age. When he was a student at Oxford University, Berners-Lee managed to build a computer from scratch using a soldering iron, TTL gates, an M processor, and parts from an old television. Later, he worked with CERN and developed an in house system that allowed researchers to share and update information quickly. This would be the seedling idea that eventually grew into the hypertext protocol for the World Wide Web. Black Hat Hackers-
1. Kevin Mitnick The U.S. Department of Justice called him the “most wanted computer criminal in U.S. history” — that’s how notorious he was. Kevin Mitnick’s story is so wild that it was even the basis for a featured film: Track Down. What did he do? After serving a year in prison for hacking into the Digital Equipment Corporation’s network, he was let out for three years of supervised release. But near the end of that period, he fled and went on a 2.5-year hacking spree that involved breaching the national defence warning system and stealing corporate secrets. Where is he now? Mitnick was eventually caught and convicted with a five-year prison sentence. After fully serving those years, he became a consultant and public speaker for computer security. He now runs Mitnick Security Consulting, LLC. 2. Julian Assange Julian Assange began hacking at the age of 16 under the name “Mendax.” Over four years, he hacked into various government, corporate, and educational networks — including the Pentagon, NASA, Lockheed Martin, Citibank, and Stanford University.
What did he do? Assange went on to create WikiLeaks in 2006 as a platform for publishing news leaks and classified documents from anonymous sources. The United States launched an investigation against Assange in 2010 to charge him under the Espionage Act of 1917. Where is he now? Assange is currently holed up in the Ecuadorian embassy in London, fearing extradition to the United States
3. Anonymous Anonymous may be the most well-known “hacker” of all time, yet also the most nebulous. Anonymous is not a single person but rather a decentralized group of hackers with no true membership or hierarchy. Anybody can act in the name of Anonymous. What did they do? Since its debut in 2003, Anonymous has been credited for attacking several notable targets, including Amazon, PayPal, Sony, the Westboro Baptist Church, the Church of Scientology, parts of the dark web , and the governments of Australia, India, Syria, the United States, among dozens of others. Where are they now? Anonymous continues its hacktivism to this day. Since 2011, two related hacking groups have spawned from Anonymous: LulzSec and AntiSec Conclusion
References- https://www.educba.com/hackers-vs-crackers/ https://www.educba.com/hackers-vs-crackers/ http://www.informit.com/articles/article.aspx?p= https://eduladder.com/viewquestions/2471/What-are-the-3-types-of-hacking https://searchsecurity.techtarget.com/definition/packet-monkey http://www.catb.org/jargon/html/W/warez-d00dz.html https://www.bridewellconsulting.com/the-bridewell-of-knowledge/7-types-hackers- know/