메뉴 건너뛰기

XEDITION

등업게시판

Ethical hacking is where a person hacks to find weaknesses in a system and then usually patches them.

For example, a bank may pay a hacker to hack their systems to see if it is hackable. If he gets in, then they know there is potential for other people to hack in, and usually they will work with this ethical hacker to patch these holes. If he doesn't get in, then they pray that nobody is better at hacking than him.

Let me add this. Hacking is simply exploring a computer's designed features, and learning how to exploit or take advantage of those features. As an example. a computer is designed to load instructions into memory using clearly defined rules, outlined in an RFC that spells out how to load something into memory.
A hacker (white, grey, or black) looks at it this way. The RFC says to load an instruction into memory, use 8 bits of data, and two bits of instruction, then 8 more bits of data, and two more bits of instruction. A hacker looks at this and wonders, what if I pass 9 bits of data, what if I pass ten bits.

etc. Sooner or later the computer will not be able to deal with the amount of data being passed in a manner it understands. Maybe it can accept 9 bits, 10 bits, and just ignore the discrepencies from the RFC, but sooner or later, the computer will not know how to interpret the instructions.
When a computer does not know what to do next, it gives up and passes control to the SYSTEM, which is all powerful. This is a very basic description of a bufffer overflow. The hacker wants to force the computer to give up, and pass control to the SYSTEM. Once this happens, the hacker has administrative control and can now start passing commands to the computer that it will follow without question. There are three levels of hackers.

White Hats spend all their time trying to break the system, to prove it can ge broke, so they can get the manufacurer to address the problem and fix it. Grey hats do the same thing, but perhaps will try to gain from their new way of breaking the system. They may expect payment for finding a way to break the system, and they may even try to get financial gain from their knowledge or silence.
Black hats want to take the knowledge of how to break a system and use it for fuck financial gain. They may use it to hack systems or write code that allows others to hack systems, and sell that code. All three are doing the same thing, trying to break the systems.

The difference is what they intend to DO with the information once they discover it. script Kiddies take the information that hackers discover, and try to use it for their own gain. They discover nothing, they just use what others have discovered, and try to copy it for their own gain.

번호 제목 글쓴이 날짜 조회 수
공지 esky에 오신걸 환영합니다. 관리자 2024.12.09 33
5015 The Slot Online Qq Mystery JodieKindel194715 2025.07.14 0
5014 How To Gamble Responsibly At A Casino ValStiles702319061 2025.07.14 0
5013 How Much You Need To Expect You'll Pay For A Good Sotwe. Com Ines55V906041739 2025.07.14 0
5012 Step-By-Stage Ideas To Help You Obtain Online Marketing Achievement AngelNajera9757 2025.07.14 0
5011 The Most Common Mistakes People Make With Mighty Dog Roofing ... Kina1301205869024130 2025.07.14 0
5010 Exploring Different Roulette Betting Systems BrigitteMorrice68 2025.07.14 0
» What Are The Types Of Ethical Hacking? KennyBevington63145 2025.07.14 0
5008 14 Questions You Might Be Afraid To Ask About Buy Kitchen Cabinets... LouBunker58388302 2025.07.14 0
5007 Porn Actress Shoots Video With Very Controversial Aussie Sports Star VernaBirnie81439488 2025.07.14 0
5006 Phase-By-Stage Guidelines To Help You Achieve Online Marketing Success FredricMcConachy5674 2025.07.14 0
5005 The Psychology Of Casino Design LettieBrinson4037392 2025.07.14 0
5004 Mighty Dog Roofing Explained In Instagram Photos... Alyce67N8743558 2025.07.14 0
5003 An Introduction To Different Types Of Slot Games KandisTabarez39539 2025.07.14 0
5002 12 Do's And Don'ts For A Successful Design Blueprint... SanfordRingler383298 2025.07.14 0
5001 Answers About Q&A Beatris18B95031663 2025.07.14 0
5000 Identifying Your Safety Requirements Can Make Sure Optimum Security! Franchesca5848691879 2025.07.14 2
4999 10 Things Everyone Hates About Kitchen Remodel Tips... BerniceMacDevitt375 2025.07.14 0
4998 Open C1E Files Safely And Quickly KermitSchumacher9 2025.07.14 0
4997 Look Ma, You Can Actually Build A Bussiness With Slot Online Terbaik JudsonFeint5991 2025.07.14 0
4996 Is Wwwpartnerwithpaulcom A Scam? KimSigmon6000490042 2025.07.14 0
위로