Who is Hacker SL BRO Help
Who Is Hacker?
Well, then I thought it was a good idea for everyone today. We've all heard of hackers. Who are they really? What are you doing? Most people think that they are hacked by a facebook account. But there are two sides. This is where I read this post. Then read everything my first hacking post. What is Hacking?
This is very meaningful in the dictionary. But if you take the IT side, the hacking means the unauthorized access to computer data. But this is not a good thing. Horakamanē ... Who are the hackers?
The computer is hacked and data is stolen and people who control it are right. (Simplified) According to the way they act, they can be divided into three major components.
White Hat Hacker
Black Hat Hacker
Gray Hat Hacker
These guys are not thhop vendors.
White Hat Hackers
These are good people. Computers and network security can be defined as the leading. They use their knowledge to ensure the safety of computers and networks. Another system is unauthorized access to protect another system, not its own advantage.
Black Hat Hackers
In short, they say the other side of the White Hat Hackers. They're hacking on computers and networks to do illegal things. Hack into computer networks, earn money, and gain access to unauthorized data. Many of these people are in prison now.
Gray Hat Hacker
The combination of the above and the above two. It's a little hard to tell about them. To be honest, they're on the fence. That's what they're doing to help other people, also working for their own good. Usually there is not enough knowledge to give these guys a chance to play.
Methods used to hack
Social Engineering
This does not require knowledge about this. The ability to deceive others is necessary. It's just that somebody knows something like a password that gets him out of his mind. Here's the video.
Shoulder Surfing
Keeping a password secretly looking at the other's password. (Golfer)
Keylogging
This is an advanced level method. To do this, a keylogger program will be sent to the person's computer. It will send each type of person type to the hacker.
Phishing Attack
A hacked website created by a website is created by hackers. When a person opens it gets his data to the hacker. Facebook can hack this way. This is the other side I said at first, on the other side. Let's do this afterwards. There are a lot of complicated ways. This is a good thing for hacking professionals to do. Here are some of these.
SQL Injection
XSS Cross Site Scripting
Remote Administration Tools (RAT)
Exploits
Brute Force Attacks
Then there is a little idea for you to come and have a hacker. But do not think Black Hat. If it is left over, it will be counting iron poles.
Do not get caught I'm reading a little post post and some people say that I think I'm a big hacker. And then it's going to be hard to get things done for hacking things
Good to tell your friends about this blog