What Is A Hacker? How To Bcome A Hacker?
Cybercrime ( Cybercrime ) is indeed quite difficult to avoid, yes, the perpetrators are also difficult to identify.The many Cybercrime cases, hacking is one of the most often heard cases. Well, hacking itself is usually done by hackers using various methods.
Eits, but this time we will not discuss about hacking methods. But we will discuss the people behind the hacking case, namely the Hackers .
What is a Hacker and how do you become a Hacker? Are there good hackers? Relax guys, we will discuss it in full in this article. So, see carefully yes!
Important point
1. What Is a Hacker?
2. Types of Hackers in the World
a. White Hat Hacker
b. Black Hat Hacker
c. Gray Hat Hacker
d. Kiddie script
e. Hacktivist Hacker
3. Hacking methods often used by hackers
a. Social Engineering
b. Distributed Denial of Service
c. Phishing
d. Brute Force
e. Deface
4. How to Become a Hacker
a. Code Programming
b. Computer network
c. Software
d.Hardware
What Is a Hacker?
According to Wikipedia , Hackers (Hackers) are people who study, analyze, modify, break into computers and computer networks, either for profit or motivated by challenges.
You could say Hackers are people who have the ability in the field of computers and computer networks that look for gaps in a program.
Then if he finds a gap in a program, what will he do?
It all depends on the type of Hacker itself guys. Hackers are divided into several types, among others, are as follows!
Also Read: Tips To Protect Personal Data Form Hackers
Types of Hackers in the World
1. White Hat Hacker
White Hat Hacker is a type of protagonist hacker or a good hacker. They uphold the ethical standard " Access to computer systems is not intended to harm, but to test the resilience of the system ".
So you could say this type of hacker likes to study the system, and when they find a gap that can be broken through, they will immediately report it to the program developer.
Not only report a gap in a program, the White Hat Hackers also do not hesitate to help the program developer to close the gap found by White Hat Hacker earlier.
No wonder this White Hat Hackeroften hired as a security consultant. Isn't that cool guys?
2. Black Hat Hacker
In contrast to White Hat Hacker, Black Hat Hacker is an antagonist or arguably an evil hacker.
The Black Hat Hackers usually break into a computer system without the owner's permission, then do damage such as deleting files, stealing personal data, and various other harmful activities.
If you ask what is the difference between Hacker and Cracker ? Actually the same. It's just that Cracker here is more directed towards Black Hat Hacker than White Hat Hacker.
In other words, Black Hat Hacker can also be called Cracker because of its nature who likes to damage or harm others.
3. Gray Hat Hacker
Well, this type of Hacker is between White Hat Hacker and Black Hat Hacker. Because usually the Gray Hat Hackers sometimes follow ethical standards, but sometimes also break the law.
4. Kiddie SScript
If you've ever watched a Hacker-themed Action film called " Who Am I ", it's definitely familiar with the name " Script Kiddie ".
Kiddie script is a type of hacker who is not proficient with computer systems, but he was able to break through the computer system using software or tools made by others.
Also Read: How To Safe Your Computer From Crashing
5. Hacktivist Hackers
Hacktivist Hackers are types of hackers who use their ability to spread certain messages (Religion, Politics, Ideology, etc.). They did a deface website to display their message on the victim's website.
That is some type of hacker. So what are the methods used by hackers to do the action?
Hacking Methods Hackers Often Used
There are several methods that are usually used by hackersto break into the victim's computer system. These methods include:
1. Social Engineering
Social Engineering is one of the methods used by hackers to obtain information about their targets by requesting the information directly to the victim or other parties who have that information.
Social Engineering concentrates itself on the weakest chain of computer network systems, namely humans. So hackers will target their victims to get the information they need.
Like other hacking methods, Social Engineering also requires preparation, in fact most of the work involved the preparation itself.
2. Distributed Denial of Service
Well, this hacking technique is commonly known as DDoS . This technique causes the existing system on a network can not be accessed.
That's because Hackers will send an unlimited number of data packets to the server that is their destination.
Servers that receive an unlimited number of packets are usually no longer able to accommodate, so the server will experience a Down System and cannot be accessed.
3. Phishing
What is phishing . Well, phishing itself is a fraudulent method to steal important information such as passwords or personal data of the victim with a specific purpose.
Hackers will make fake forms on a fake website that is usually similar to the original website. When victims fill in their data in the fake form, the hacker will get information about him.
4. Brute Force
Brute Force is a method for hacking someone's password by trying all possible password combinations in the wordlist.
Although effective for getting the right password, this method is quite time consuming.
Brute Force itself is a combination of words from the English language which if interpreted is "Forcing Roughly".
Not only through the manual method, Brute Force can also use the help of a piece of software.
5. Deface
Deface is a technique to replace or insert files on the server, this technique is done when hackers can break into the system of a website.
Deface aims to change the appearance of the victim's website with the appearance of the Defacer guys.
Hackers usually leave their messages and nicknames so that their work is known by other hackers.
Those are some of the methods most often used by hackers. Actually not only that, there are many other methods such as Keylogger , Spyware , Trojan Horse , and so forth.
How to become a hacker?
To become a hacker, there are many things you must learn. You can get a variety of lessons through self-taught or from friends and relatives who already understand about this.
As for some of the things you must learn include:
1. Programming Code
You have to learn programming languages, whether it's PHP , Javascript , C ++ , or others. What's more, you also need to be familiar with HTML and CSS to be able to master and understand the basic structure in the website world.
You can learn a variety of self-taught programming languages through the internet. There are even many sites that you can access to learn programming languages such as W3Schools , Codepolitan , and others.
2. Computer Networks
For a hacker, studying computer networks is also highly recommended. Studying computer networks is useful to make it easier for you to configure a network so that you can smoothly change IP addresses, enter HTTPS, and many others.
3. Software
Software plays an important role when you are learning in the world of programming.
A hacker must know how to repair a system that is compromised and can provide solutions and be able to fix it.
In addition, by learning the contents of the software itself, you can make modifications to certain software.
Understand the commands used in Windows CMD or TerminalLinux Console is also a basic thing that must be understood by a hacker.
Also Read: Top 5 Settings In WhatsApp
4. Hardware
Hardware (Hardware) must also be learned by a Hacker. For some people, maybe being a Hacker does not require learning about Hardware, when in fact it is wrong guys.
By learning the hardware of the device you are using, it is hoped that at any time you experience problems, you can overcome them.
The final word
Well, that's a little explanation of what a hacker is. How to You already understand about Hackers. If you want to be a hacker, be White Hat Hacker.
Don't be a hacker who harms others, you don't want to be caught by the authorities because you are caught hacking something very important?
Use the knowledge you have to use in good terms, or it can even become your main job, which is to be a person who oversees, improves, and maintains a company system for a small fee.
No comments:
Post a Comment
Comments may be removed at the discretion of the blog owner. Spam and personal attacks are not allowed.