Friday 17 July 2015

Types of Hacker Motivations

Types of Hacker Motivations

There are good and bad hackers. Here is a window into what they do and why


1) White Hat Hackers: 
These are the good guys, computer security experts who specialize in penetration testing and other methodologies to ensure that a company’s information systems are secure. These IT security professionals rely on a constantly evolving arsenal of technology to battle hackers.

2) Black Hat Hackers: 
These are the bad guys, who are typically referred to as just plain hackers. The term is often used specifically for hackers who break into networks or computers, or create computer viruses. Black hat hackers continue to technologically outpace white hats. They often manage to find the path of least resistance, whether due to human error or laziness, or with a new type of attack. Hacking purists often use the term “crackers” to refer to black hat hackers. Black hats’ motivation is generally to get paid.

3) Script Kiddies: 
This is a derogatory term for black hat hackers who use borrowed programs to attack networks and deface websites in an attempt to make names for themselves.

4) Hacktivists: 
Some hacker activists are motivated by politics or religion, while others may wish to expose wrongdoing, or exact revenge, or simply harass their target for their own entertainment.

5) State Sponsored Hackers: 
Governments around the globe realize that it serves their military objectives to be well positioned online. The saying used to be, “He who controls the seas controls the world,” and then it was, “He who controls the air controls the world.” Now it’s all about controlling cyberspace. State sponsored hackers have limitless time and funding to target civilians, corporations, and governments.

6) Spy Hackers: 
Corporations hire hackers to infiltrate the competition and steal trade secrets. They may hack in from the outside or gain employment in order to act as a mole. Spy hackers may use similar tactics as hacktivists, but their only agenda is to serve their client’s goals and get paid.

7) Cyber Terrorists: 
These hackers, generally motivated by religious or political beliefs, attempt to create fear and chaos by disrupting critical infrastructures. Cyber terrorists are by far the most dangerous, with a wide range of skills and goals. Cyber Terrorists ultimate motivation is to spread fear, terror and commit murder.

Top 10 Hackers Operating Systems

Operating Systems

So today I come up with the operating systems that hackers used for hacking. The top on this list is the Kali Linux which has almost all type of hacking tools that are totally free for everyone. All operating systems are based on Linux kernel, we know the reason behind this fact, that Linux is free and open source.


1. KALI LINUX

Kali Linux comes from the creators of BackTrack Yes you guessed it they are Offensive Security team. Kali Linux is the most versatile and advanced penetration testing distro. Kali Linux updates its tools, and it is available for many different platforms like VMware, ARM, and many more

2. BACKBOX

BackBox is a Linux distribution based on Ubuntu. It has been developed to perform penetration tests and security assessments. BackBox is lightweight OS and requires less hardware specification. Designed to be fast, easy to use and provide a minimal yet complete desktop environment, thanks to its own software repositories, always being updated to the latest stable version of the most used and best known ethical hacking tools

3. DEFT

DEFT Association is an non-profit association. They provide a reliable and powerful Penetration testing distribution of Linux. You can download DEFT ISO or VMware virtual machine image from their official website.

4. LIVE HACKING OS

Live Hacking OS is also based on Linux, you know why. It is also a big pack of hacking tools used for Penetration testing. It includes the graphical user interface GNOME inbuilt. There is a second variation available which is command line only. And requires very less hardware requirement.

5. SAMURAI WEB SECURITY FRAMEWORK

The Samurai Web Testing Framework is a live linux distro which is pre-configured with Web penetration testing tools. Yes this is the best for Web Penetration Testing and this is a live linux which is beneficial to clear all hacking tracks. You can download VMware image as well as ISO image from Sourceforge.

6. NETWORK SECURITY TOOLKIT

Network security toolkit is based on Fedora and runs on 32 as well as 64 bit platforms. Network security toolkit provides tools to test, monitor and fix the network issues. The main purpose of developing this Toolkit is to provide the security professional and network administrator with a comprehensive set of Open Source Network Security Tools.

7. PARROT SECURITY FORENSIC OS

Parrot Security OS is a cloud friendly operating system designed for Pentesting, Computer Forensic, Reverse engineering, Hacking, Cloud pentesting, privacy/anonimity and cryptography. Parrot security os is based on Debian and developed by Frozenbox network. Parrot-sec is available in 32 bit for Intel processors and 64 bit for AMD


8. BUGTRAQ

Bugtraq Team is experienced freaks and developers. Bugtraq is available in Debian, Ubuntu, OpenSuSe in 32 and 64 bit architectures.Bugtraq system offers the most comprehensive distribution, optimal, and stable with automated services manager in real time. This distribution based on the 3.2 and 3.4 kernel.

9. NODEZERO

Nodezero is very handy Penetration testing tools collection distro. They believe that Livecd is not for those who does Penetration testing on regular basis, but they provide livecd of their distro. Nodezero is reliable and stable. It is based on the Ubuntu distribution of Linux. Download your free and open copy of NodeZero Linux today, because real hackers count from zero.


10. PENTOO

Pentoo is a security-focused Linux distro based on Gentoo. It is basically a Gentoo install with lots of customized tools, customized kernel, and more. Here is a list of the features currently included :
a) Hardened Kernel with aufs patches
b) Backported Wifi stack from latest stable kernel release
c) Module loading support ala slax
d) Changes saving on usb stick
e) XFCE4 wm
f) Cuda/OPENCL cracking support with development tools
g) System updates if you got it finally installed

H.A.C.K

H.A.C.K

Hacking And Computer Krashing

  • Hack (computer security), to break into computers and computer networks
  • Hack (programming language), a programming language developed by Facebook
  • Hack (computer science), an inelegant but effective solution to a computing problem
  • Hack (programmer subculture), participation in a computer programmer subculture

H.A.C.K.E.R

Hide IP - Aim Victim - Crack Encrypt - Kill Firewall - Enter into Database - Return Anonymous