The well known EIGHT 8 hacking tacticsDo you know . phishing . technology
listed Here below are the WELL known EIGHT (8) HACKING TACTICS:
- WI-FI SPOOFING (AKA FAKE WAP)
- MAN IN THE MIDDLE (MITM)
- COOKIE THEFT
- BRUTE FORCE PASSWORD ATTACKS
WHO IS A HACKER
A Computer hacker is someone who discovers strategies for penetrating computer security defences and take advantage of the security weaknesses in a computer system or its network.
THE TWO (2) COMMON HACKERS TERMS
The first term is made for the HACKER while the second is made for YOU the Victim.
The FIRST term of the most common hacker’s term is HOST which refers to the Hacker itself.
The SECOND term of the most common hacker’s term is ZOMBIE which refers to you the victim.
THE THREE (3) MOST KNOWN HACKER TYPES
White Hat – Hacker
This white hat hackers works against the later (black hat “Hacker”) and they are also called sneakers when they work in group. Their function is for Good and not the bad, their intention is to use their hacking tactics exploit system weakness and loopholes and let it know by that system company for security purpose with permission.
Black Hat – Hacker
This black hat hackers works against the former (white hat “Hacker”) and they are also called ethical hackers. Their function is for Bad (malicious) and not the Good, their intension is to exploit system weakness and loopholes then renders their actual malicious purpose of hacking the system without permission.
Grey Hat – Hacker
This Grey Hat Hackers works similar to black hat – hackers because they do without permission and at same time works similar to white Hat – hackers because they do reveal any vulnerability (system weakness) found to security agencies