A Hacker is a person who finds and exploits the weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security.
Types of Hackers
White hat hackers
Black hat hackers
Grey hat hackers
Script kiddies
Explain the types of hackers
White hat hackers
A white hat hacker -- or ethical hacker -- is an individual who uses hacking skills to identify security vulnerabilities in hardware, software or networks. However, unlike black hat hackers -- or malicious hackers -- white hat hackers respect the rule of law as it applies to hacking. Many white hat hackers are former black hat hackers. The terms come from old Western movies, where heroes often wore white hats and the bad guys wore black hats.
Black hat hackers
The global hacker community is incredibly diverse. Some hackers breach computer systems to identify vulnerabilities and enhance defensive capabilities, while others do it for criminal gain or as part of cyber attack operations. The different hat colors denote the different types of hackers. In this article, we’ll tell you about the black hat hacker.
Grey hat hackers
A gray hat hacker also spelled grey hat hacker is someone who may violate ethical standards or principles, but without the malicious intent ascribed to black hat hackers. Gray hat hackers may engage in practices that seem less than completely above board, but are often operating for the common good.
Gray hat hackers represent the middle ground between white hat hackers, who operate on behalf of those maintaining secure systems, and black hat hackers who act maliciously to exploit vulnerabilities in systems.
Script kiddies
Script kiddies rely on software or scripts written by others and dont possess the knowledge or know-how to modify or produce their own software.
Script kiddies find the most easy routes to hacking a system and do not invest much idea or energy into performing an attack.
Script kiddies may utilize hacking projects composed by different programmers since they frequently come up short on the aptitudes to compose their own
No thief wants to get caught. An intelligent hacker always clears all evidence so that in the later point of time, no one will find any traces leading to him. This involves modifying/corrupting/deleting the values of Logs, modifying registry values and uninstalling all applications he used and deleting all folders he created.
After entering into a system, he has to increase his privilege to administrator level so he can install an application he needs or modify data or hide data