메뉴 건너뛰기

XEDITION

등업게시판

Ethical hacking is where a person hacks to find weaknesses in a system and then usually patches them.

For example, a bank may pay a hacker to hack their systems to see if it is hackable. If he gets in, then they know there is potential for other people to hack in, and usually they will work with this ethical hacker to patch these holes. If he doesn't get in, then they pray that nobody is better at hacking than him.

Let me add this. Hacking is simply exploring a computer's designed features, and learning how to exploit or take advantage of those features. As an example. a computer is designed to load instructions into memory using clearly defined rules, outlined in an RFC that spells out how to load something into memory.
A hacker (white, grey, or black) looks at it this way. The RFC says to load an instruction into memory, use 8 bits of data, and two bits of instruction, then 8 more bits of data, and two more bits of instruction. A hacker looks at this and wonders, what if I pass 9 bits of data, what if I pass ten bits.

etc. Sooner or later the computer will not be able to deal with the amount of data being passed in a manner it understands. Maybe it can accept 9 bits, 10 bits, and just ignore the discrepencies from the RFC, but sooner or later, the computer will not know how to interpret the instructions.
When a computer does not know what to do next, it gives up and passes control to the SYSTEM, which is all powerful. This is a very basic description of a bufffer overflow. The hacker wants to force the computer to give up, and pass control to the SYSTEM. Once this happens, the hacker has administrative control and can now start passing commands to the computer that it will follow without question. There are three levels of hackers.

White Hats spend all their time trying to break the system, to prove it can ge broke, so they can get the manufacurer to address the problem and fix it. Grey hats do the same thing, but perhaps will try to gain from their new way of breaking the system. They may expect payment for finding a way to break the system, and they may even try to get financial gain from their knowledge or silence.
Black hats want to take the knowledge of how to break a system and use it for fuck financial gain. They may use it to hack systems or write code that allows others to hack systems, and sell that code. All three are doing the same thing, trying to break the systems.

The difference is what they intend to DO with the information once they discover it. script Kiddies take the information that hackers discover, and try to use it for their own gain. They discover nothing, they just use what others have discovered, and try to copy it for their own gain.

번호 제목 글쓴이 날짜 조회 수
공지 esky에 오신걸 환영합니다. 관리자 2024.12.09 33
5190 Slot Machines: From Mechanical Reels To Digital Marvels KateWilton655912 2025.07.14 0
5189 Free Recommendation On Worthwhile T Slots ShayKeating82743 2025.07.14 0
5188 DEPO123: Platform Permainan Slot Gacor Update Terkini Yang Dicari Di Indonesia! MeaganHowse45482 2025.07.14 0
5187 The Ultimate Cheat Sheet On Kitchen Remodel Tips... DannyElwell2728159 2025.07.14 0
5186 Best Online Casino Sites And Sign-Up Offers In Malaysia HazelWeatherly6 2025.07.14 0
5185 Auto Fm Transmitters - Why Wireless Is Superior Option MaricruzToutcher9 2025.07.14 2
5184 Why Slot Online Terbaik Succeeds LauraNeill48865408 2025.07.14 0
5183 Coco Austin Shows Off Her Figure In String Bikini By 'popular Request' CollinFaucett35903 2025.07.14 0
5182 From Vegas To Macau: A Tour Of Global Gambling Hubs ZoraPesina304612 2025.07.14 0
5181 What Letter Is Looking For Causes? Wayne94G509428624 2025.07.14 0
5180 Rolletto Casino & Sportsbook UK EfrenClevenger5897 2025.07.14 0
5179 What Is Video Game Devolopment? MoseBarlee286227628 2025.07.14 0
5178 Move-By-Phase Ideas To Help You Obtain Web Marketing Success CecileSison1797746 2025.07.14 5
5177 How To Master Cabinetry Installation In 6 Simple Steps... ArielleH8654903757 2025.07.14 0
5176 Complete C1F File Solution – FileMagic IrmaE07408310723 2025.07.14 1
5175 How To View D_ File Contents Without Converting TamTowle158313611 2025.07.14 1
5174 Casino VIP And Loyalty Programs Explained LionelHeinz85651712 2025.07.14 0
5173 Answers About Politics And Government MckinleyTyrrell3 2025.07.14 0
5172 Contractor Charged With Leaking Classified Document About U.S.... Ryan63H0047854289271 2025.07.14 0
5171 Is It Illegal For One Child To Photograph Another In Sexually-explicit Ways? Alexis20S119580 2025.07.14 0
위로