THE WELL KNOWN EIGHT (8) HACKING TACTICS
THE WELL KNOWN EIGHT (8) HACKING TACTICS

listed Here below are the WELL known EIGHT (8) :

  •   WI-FI SPOOFING (AKA FAKE WAP)
  •   KEYLOGGING
  •   PHISHING
  •   TROJANS
  •   DDOS
  •   MAN IN THE MIDDLE (MITM)
  •   COOKIE THEFT
  •   BRUTE FORCE PASSWORD ATTACKS

WHO IS A HACKER

A Computer hacker is someone who discovers strategies for penetrating computer security defences and take advantage of the security weaknesses in a computer system or its network.

THE TWO (2) COMMON HACKERS TERMS

The first term is made for the HACKER while the second is made for YOU the Victim.

The FIRST hacker’s term is HOST which refers to the Hacker itself.

The SECOND term of the most common hacker’s term is ZOMBIE which refers to you the victim.

THE THREE (3) MOST KNOWN HACKER TYPES

– Hacker

This white against the later ( “Hacker”) and they are also called sneakers when they work in group. Their function is for Good and not the bad, their intension is to exploit system weakness and loopholes and let it know by that system company for security purpose with permission.

Black Hat – Hacker

This black hat hackers works against the former (white hat “Hacker”) and they are also called ethical hackers. Their function is for Bad (malicious) and not the Good, their intension is to exploit system weakness and loopholes then renders their actual malicious purpose of hacking the system without permission.

Grey Hat – Hacker

This Grey Hat Hackers works similar to black hat – hackers because they do without permission and at same time works similar to white Hat – hackers because they do reveal any vulnerability (system weakness) found to security agencies

LEAVE A REPLY

Please enter your comment!
Please enter your name here