Table of contents
Open Table of contents
Black Hat Hackers !!!
Writing about hacking on the educational site EduportalBd.com can be said to be unfair. However, I wrote because after reading Our Activities of EduportalBD.com, I understood that they do not believe in the traditional education system. Welcome to such an initiative of EduportalBD.com.
Anyway, let’s get back to the basics. In the title, I used the term ‘Black Hat Hackers’.
Who is a hacker?
The general statement is that those who hack are hackers. So what is hacking? Hacking is a process where someone enters a computer or computer network without any valid permission. Those who do it are hackers.
Types of hackers:
Hackers are identified with hats. Hackers are divided into 3 groups.
- White Hat Hacker
- Black Hat hacker
- Gray Hat Hacker
White Hat Hacker:
Everyone thinks that hacking is a very bad thing. But White Hat hacker is not bad. A White Hat hacker finds out the flaws of a security system and quickly informs the owner of that security system. Now the security system can be a computer, a web site of a computer network, a software, etc.
Gray Hat Hacker:
These are two-faced snakes. When they find out the flaws of a security system, it will act like its mind. He will do whatever his mind wants at that time. If he wants to, he can report the error to the owner of the security system or he can destroy the information. Again, he can use it for his own benefit.
Black Hat Hacker:
The most feared hacker is the Black hat hacker. Black hat hacker quickly exploits the flaws of a security system to its advantage. ষ্ট Destroys the system. Spreads various viruses. He keeps the way so that he can enter again in the future. After all, they try to get into all the subsystems that are under that system. By hackers, basically everyone means them.
There are also a few more types of hackers, such as: Ethical hacker, Script Kiddie, Elite Hacker, etc.
General introduction of hackers, let’s get acquainted with the top 10 black hat hackers in the world.
01. Gary McKinnon:
One of the best hackers whose name first comes to mind is known as Solo. This Scottish conspiracy theorist set a world record by illegally entering large networks such as the US Air Force, Army, Department of Defense, NASA, and Navy. In order to solve the global energy crisis, he stole and destroyed all the evidence of the alien spacecraft from these, which is equivalent to the loss of about ৭ 6,000,000, according to the US court. In 2002, the US Army server screen read “Your security system is crap,” it read. “I am Solo. I will continue to disrupt at the highest levels. ” This message appeared which he did. He launched an attack on a U.S. Army server, launching large-scale hackings. “I believe they hid some information that everyone needs to know,” he said, referring to the attack.
Mitnick is one of the most well-known and terrifying hackers in the world who has been named as the most wanted computer criminals in the United States and the most dangerous hacker in the world. Mitnick took access to the computer network using cell phones with touch tones and voice control. Large computer networks like Motorola were hacked by this genius which brought him to the center of discussion in those days.
03. Jonathan James:
This time, you will also want to be a hacker after hearing the story of the person I am talking about. The 16-year-old American took the hacking as a challenge which took him to jail more than 16 times. The U.S. Department of Defense website fell into this challenge. He stole nearly 3,000 top-secret messages and many users’ passwords from US defense servers. He stole ন 1.8 million worth of NASA software and forced NASA’s servers and systems to shut down. You can think NASA system shutdown! His unusual use of cyberspace forced James to refrain from touching computers for 10 years. 3
04. Adrian Lamo:
Lamo was the first to set a world record by breaking down the computer networks of Microsoft, Yahoo, Citigroup, Bank of America, Cingular and The New York Times. Known as the Homeless Hacker, the hacker was fined 75,000 in 2002 by a New York court. He was the one to publish the video of Bradley Manning’s 2010 Baghdad airstrikes via WikiLeaks. He is currently working with a non-profit organization.
He was introduced in 2011 by jailbreaking Sony Ericsson’s PlayStation. However, during his trial, his associates exposed his methods to the public, which resulted in the Enimus hacker group attacking Sony’s servers and stealing the data of about 7 million customers. However, he denied his involvement in the matter. He asserted that his confession had been obtained through torture, and that his confession had been obtained through torture.
06. David Smith:
Smith became acquainted with his MelisBy creating an e-mail virus called sa. According to him, this virus does no harm to the victim, but it sends the virus to almost all the e-mails in the list of a victim. He is being held in the US Federal Prison and is the only person sent to prison for discovering the email virus.
The hacker came to the forefront of the discussion in 2000 by attacking the networks of Yahoo, Amazon, Dell, eBay, and CNN. Yahoo was the top search engine at the time. But due to the attack, Yahoo’s server was shut down for 1 hour. Like other hackers, he and his hacker group were able to take full control of Yahoo’s servers. In 2001, he was sentenced to eight months in prison by a Montreal Youth Court.
08. Robert Tappan Morris:
Robert Morris created a worm in 1986 and attacked one-tenth of the computers on the Internet and controlled more than 6,000 computers. He attacked hundreds of computers by writing only 99 lines of code. After his capture, Morris defended himself, saying he had done nothing wrong.
The main purpose of releasing the code was to find out how many computers are connected to the Internet. However, the police did not have much trouble identifying him because he had hinted about the virus while chatting about a month before the virus was released. It was his fault. According to him, there will be no harm to the computer infected by his virus. Morris is currently working in the Department of Electrical Engineering and Computer Science at the Massachusetts Institute of Technology (IT).
The first contact was made by stealing ATM and credit card information. He holds the record for the most credit card theft to date. Between 2005 and 2006, he and his associates sold about 160 million credit cards. . Gonzalez used SQL methods to create malware backdoors, access various corporate services, and steal information by entering computer networks through packet-sniffing (especially ARP Spoofing). ফতার 1.6 million was confiscated from him at the time of his arrest, of which ১ 1.1 million was recovered from a polythene bag in his backyard. In 2010, he was sentenced to 10 years in prison.
Kevin Poulsen, also known as Dark Dante (Code Name), was the American hacker who hacked the FBI database and station phone lines. This terrifying hacker gained recognition by hacking LA radio stations. He later went into hiding when charges were framed against him. However, he was caught by the FBI in 1991. Among the charges against him were computer scams, money laundering, and theft of information. As a result, he was jailed for 51 months. This is the largest (longest) punishment for hacking in the world up to that time. He is currently working as a journalist and senior editor at Wired News.
You can be one of the top 10 hackers. All you need is desire and perseverance. But whether you are a Black Hat or a White Hat is up to you.