Hacking is any attempt to compromise a network security.
What is Hacking (network)?
Hacking (network) is any attempt to compromise a network’s security. Hackers are generally curious programmers who enjoy getting into the nuts and bolts of how computer systems and networks (usually TCP/IP) work. Hackers usually guard their identity carefully and use purely technological means to try to break into a system.
Hackers generally find sufficient satisfaction with the mere act of defeating a network’s security system, and they pride themselves on not damaging or taking advantage of the data stored in the systems they hack. This unwritten “hacker’s code” distinguishes hacking from cracking, which is the attempt to steal revenue from software publishers by removing software protection functions such as expiration dates and installation codes, and from phreaking, a more destructive activity that usually involves both technological hacking and some form of deception through personal contact with the target organization with the aim to defraud.
Types of Networking Hacking
Networking Hacking is an offensive branch of computer security related to networks hacking and the penetration of a target via the networking services or equipment.
Examples of network hacking tools include:
- Kismet (Wireless Hacking)
- Sniffing & Monitoring
- Infernal Twin
Black, White, and Grey Hat Hacking
Not all hackers are intentionally bad. When used in mainstream media, the word, “hacker,” is usually used in relation to cybercriminals, but a hacker can actually be anyone, regardless of their intentions, who utilize their knowledge of computer software and hardware to break down and bypass security measures on a computer, device or network. Hacking itself is not an illegal activity unless the hacker is compromising a system without the owner’s permission. Many companies and government agencies actually employ hackers to help them test and secure their systems.
Hackers are generally categorized by type of metaphorical “hat” they don: “white hat”, “grey hat”, and “black hat”. The terms come from old spaghetti westerns, where the bad guy wears a black cowboy hat, and the good guy wears a white hat. There are two main factors that determine the type of hacker you’re dealing with: their motivations, and whether or not they are breaking the law.
Black Hat Hacking
Black Hat hackers are responsible for writing malware, which is a method used to gain access to these systems. Their primary motivation is usually for personal or financial gain, but they can also be involved in cyber espionage, protest or perhaps are just addicted to the thrill of cybercrime.
White Hat Hacking
White hat hackers choose to use their powers for good rather than evil. Also known as “ethical hackers,” white hat hackers can sometimes be paid employees or contractors working for companies as security specialists that attempt to find security holes via hacking. White hat hackers perform penetration testing, test in-place security systems and perform vulnerability assessments for companies.
Grey Hat Hacking
As in life, there are grey areas that are neither black nor white. Grey hat hackers are a blend of both black hat and white hat activities. Often, grey hat hackers will look for vulnerabilities in a system without the owner’s permission or knowledge. If issues are found, they will report them to the owner, sometimes requesting a small fee to fix the issue. If the owner does not respond or comply, then sometimes the hackers will post the newly found exploit online for the world to see.
The term “hack” is also used to refer to any temporary or inelegant solution to a networking problem, as in, «I hooked in the old hub as a repeater just as a temporary solution – I know it’s a hack, but it should do fine until we can buy something better».
Microsoft Security home page