What is computer hacking?
In a cyber security world, the person who is able to discover weakness in a system and managed to exploit it to accomplish his goal referred as a Hacker , and the process is referred as Hacking.
Now a days, People started think that hackingis only hijacking Facebook accounts or defacing websites. Yes, it is also part ofhacking field but it doesn’t mean that it is the main part of hacking.
So what is exactly hacking, what should i do to become a hacker?! Don’t worry, you will learn it from Break The Security. The main thing you need to become a hacker is self-interest. You should always ready to learn something and learn to create something new.
Now , let me explain about different kind of hackers exist in the cyber security world.
Script Kiddies are the persons who use tools , scripts, methods and programs created by real hackers. In a simple word, the one who doesn’t know how a system works but still able to exploit it with previously available tools.
White Hat Hacker:
White Hat hackers are good guys who does the hacking for defensing. The main aim of a Whitehat hacker is to improve the security of a system by finding security flaws and fixing it. They work for an organization or individually to make the cyber space more secure.
Break The Security only concentrates on white-hat hacking and help you to learn the Ethical Hackingworld.
Black Hat Hacker:
BlackHat hackers are really bad guys , cyber criminals , who have malicious intent. The hackers who steal money, infect systems with malware, etc are referred as BlackHat hackers. They use theirhacking skills for illegal purposes.
The hackers who may work offensively or defensively, depending on the situation. Hackers who don’t have malicious intentions but still like to break into third-party system for fun or just for showing the existence of vulnerability.
The hackers who use their hacking skills for protesting against injustice and attack a target system and websites to bring the justice. One of the popular hacktivists is Anonymous and RedHack.