What's new

Closed Black hat,white hat,grey hat facts

Status
Not open for further replies.

Jmrie_

in memoriam 1995-2021
Joined
Aug 21, 2017
Posts
104,956
Solutions
1
Reaction
53,216
Points
27,061
Age
28
Black hat refers to a häçker who breaks into a computer system or network with malicious intent. A black hat häçker may exploit security vulnerabilities for monetary gain; to s†éál or destroy private data; or to alter, disrupt or shut down websites and networks. The black hat häçker may also sell these exploits to other criminal organizations.




Categories of häçkers

The term black hat differentiates criminal häçkers from You do not have permission to view the full content of this post. Log in or register now. and grey hat häçkers. These categories come from a perceived trope in Western movies, where the heroes could be identified by the white hats they wore and the villains by their black hats.

A white hat häçker, or an ethical häçker, is the antithesis of a black hat häçker. White hat häçkers are often hired by organizations to conduct You do not have permission to view the full content of this post. Log in or register now. and You do not have permission to view the full content of this post. Log in or register now. on their systems to improve their security defenses. They conduct tests and attacks on websites and software in order to identify possible vulnerabilities, while also following established rules, such as You do not have permission to view the full content of this post. Log in or register now. policies. They will notify the affected vendor of any issues directly so that a ρá†ch can be released to fix the flaw.

A gray hat häçker operates with more ethical ambiguity -- while they do not häçk into systems with the malicious goal of s†éáling data, they may be willing to use îllégâl methods to find flaws, expose vulnerabilities to the public or sell You do not have permission to view the full content of this post. Log in or register now. to government and intelligence agencies.

A black hat häçker is typically one that engages in cybercrime operations and uses häçking for financial gain, cyberespionage purposes or other malicious motives.

Laws and penalties against black hat häçking
U.S. law can punish black hat häçkers under a number of computer crime statutes and state and federal laws, with penalties like being charged with different classes of misdemeanors and felonies that include fines, jail time or both. Some notable laws include the You do not have permission to view the full content of this post. Log in or register now. and the You do not have permission to view the full content of this post. Log in or register now..

PRO+
Content
These laws generally prohibit a person from conducting the following acts without authorization:

  • accessing a protected computer, system or network;
  • modifying or disclosing data held on a computer;
  • transmitting malicious code in order to damage the system or data held on it;
  • accessing a computer with intention to defraud; and
  • trafficking computer You do not have permission to view the full content of this post. Log in or register now..
The term protected computer is large in scope, referring to a computer used by, for instance, a financial institution or the U.S. government for commerce or interstate and foreign communication.

Certain laws have been passed to help law enforcement agencies investigate and locate criminals, such as black hat häçkers. The Cyber Security Enhancement Act and the You do not have permission to view the full content of this post. Log in or register now. grant law enforcement agencies the permission to access data stored by an internet service provider without a warrant in certain circumstances, as well as to access modified telecommunications devices and facilities that can help in authorized electronic surveillance.

Notable black hat häçkers
Kevin Mitnick
Mitnick had served time in prison for häçking into Digital Equipment Corporation's computer network to copy their software. His second high-profile arrest in 1995 was as a result of his häçk into Pacific Bell's voicemail computers and other major corporations. He was charged with crimes such as wire fraud, unauthorized access to a federal computer and causing damage to a computer. He served five years in prison.

  • You do not have permission to view the full content of this post. Log in or register now. asks:

    How does your organization protect itself against black hat häçkers?
    You do not have permission to view the full content of this post. Log in or register now.
Since his release in 2000, Mitnick has worked in the cybersecurity industry in different capacities. He runs his own infosec consulting business called Mitnick Security, and he also serves as the Chief häçking Officer at antiphishing vendor KnowBe4.

Albert Gonzalez
Gonzalez, also known as Segvec, was the leader of a major cybercrime scheme that resulted in some of the biggest data breaches in U.S. history. Over the course of several years, Gonzalez and other members of the Shadowcrew häçking group participated in the theft and sale of payment card account info from a variety of retailers, including the TJX Companies, BJ's Wholesale Club, OfficeMax, Barnes & Noble and Sports Authority.

Gonzalez was charged with conspiracy, computer fraud, wire fraud, access device fraud and aggravated identity theft related to the häçking and data breaches. He was sentenced to 20 years in prison.

Hector Xavier Monsegur
Monsegur, also known as Sabu, was a prominent member of Anonymous, an online häçktivist community, as well as a splinter group, LulzSec. He and his affiliated groups were responsible for participating in online attacks against companies like Visa, MasterCard and Sony, in addition to government-owned computers in several countries.

Monsegur was arrested in 2011, charged with several computer häçking charges, and faced up to 122 years in prison. He became an informant for the FBI, assisting in the arrest of other häçkers. He served seven months in prison.

Yahoo häçkers
The U.S. Department of Justice indicted two members of the Russian intelligence agency, the Federal Security Service, and two hired häçkers for häçking You do not have permission to view the full content of this post. Log in or register now. in 2014 and s†éáling information from over 500 million user accounts. The intention behind the häçk, according to authorities, was to gather intelligence and for financial gain.

The first häçker, Karim Baratov of Canada, was arrested. The second häçker, Russian citizen Alexsey Belan, was well-known to U.S. authorities. Belan, also known as Magg, was previously indicted by federal authorities in 2012 and 2013 over the data breaches of several unnamed e-commerce companies. He was charged with several counts of computer fraud and abuse, access device fraud and aggravated identity theft.

Belan is still at large, and he is currently on the FBI's Cyber Most Wanted list.
 
Monsegur Same To Sa Napanood kong Movie About H*cker, Anonymous. Ginamit Siya Pero Di Muna Siya Hinuli Upang Matagpuan Nila Yung DarkWeb Na Sikat Na H*cker.
 
Status
Not open for further replies.

Similar threads

Back
Top