How can you spot a Hacker?
by Nicolas Mercier aka Basta - for Help Net Security
Bookmark and Share
What defines a Hacker? What motivates a Hacker? A majority of people seem to have a vague understanding of what being a Hacker is all about. Is there an underground Hacker community? Is there only one type of Hacker? As far as a definition, I think that there isn't "one" final definition of the word because it's essence is in constant motion and evolution.

The Public Image of The Hacker

How can you define a Hacker? What do you look for in a person,
to really be able to say : "this, this is a Hacker" And even if you're able to do so, what do you mean by the word Hacker? By being one, does it mean that I'm a criminal? A lot of people seem to think so. The public seem to think so. It's only natural for a public to want to believe what they see. And the image of the Hacker that is portreyed in the medias is the image of a "cyber-techno-criminal"; the use of odd words like that creates a false image of the Hacker. What do you imagine a "cyber-techno-criminal" would look like on the street? That's where a problem lies. Hackers, are not different from anybody else. Don't get me wrong, they are different in a lot of ways but not to the point of being able to spot one walking down the street.

A Few Types of Hackers

It's already hard to understand what the word "Hacker" means, but
it's not the only word used in the community. That's right, there are
different types of Hackers: for example there are the WhiteHats and
the BlackHats. Even among the community these two words can be ambiguously described. Some say that WhiteHats are the hackers that try to make the movement go forward by working as security experts, system administrators and by maintaining web sites with bug reports, new technologies, news events and much more. The BlackHats, are guided by the same passion and aptitudes than the WhiteHats but they differ in what they believe in, and by their way of doing. BlackHats seem to be more underground than the WhiteHats, exchanging ideas and tools on small web sites and discussions boards. There is still a sense of uncertainty on the differences between WhiteHats and BlackHats and it would be too much to get in this subject for this article. As another type, you have what are called Crackers. Penetrating networks, going where they shouldn't and using their skills to take advantage of something. Yet another type can be found - the Script Kiddie. He can be described as a hooligan, as someone that uses tools and techniques developed by WhiteHats, BlackHats and Crackers to destroy information, deface sites and other types of digital-vandalism. The Script Kiddie doesn't really posess the skills, only the tools. Anyhow, in my mind, these types are too restrictive. I don't like to categorize and name Hackers this way because it is a way of creating stereotypes to the public. I have described each type with a definition but it was only to give an idea of what differences lie between each types.

The Purposes of The Actions

The public image of the Hacker is based on newspaper titles or movies, not reality. This makes it harder to determine what are the real purposes of the Hackers actions. In the news it's all about destroying private property just for fun, or stealing credit card numbers or defacing a government web sites. These actions do not represent the Hacker. They are just good for tv ratings. While being considered potentially dangerous for a network, a hacker is only an observer. It is curiosity that drives them. Analysing for a long time, finding the flaw, getting in, looking around and getting out. I don't think that these actions are meant to harm, but to inform and help and also the challenge. If someone gets in a network and signals the flaw to the administrators in total discretion, it's probably better than leaving the flaw and exposing it to real danger. Many will argue on this and say that you shouldn't get in at all, but it's another debate in which I won't get in for the time being.

Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //