In the hacking world, it is not only pentesting but to protect yourself in the Cyber World. This is because there are are lot more hackers around you are trying to hack everything around them. Especially you when you dare them. Let take for example this video of someone who dare hackers to hack in at DEFCON convention:
You see in the video he dare hackers at DEFCON to hack him to see what they got and his whole data and life information was spilled out. If you're are hacker and this happen to you, this could be a large threat to you. So let's start:
First of all we will know types of hackers. All these are fundamental because you need to know why and methods of pentesting.
Types of hackers
Although hackers are often associated with exploiting vulnerabilities to gain unauthorized access to computers, systems, or networks, not all hacking is malicious or illegal.
- White Hat/Ethical Hackers: These are hackers that hack for good. They hack companies and system with their permission and find vulnerability of the system. This hacking is legal and allowed to be done publicly.
- Black Hat Hackers: These are hackers that hack to steal information, hack web servers, and so many people. They are mainly anonymous and uses the dark web to expose the information.
- Gray Hat Hackers:: These are similar to white and black hat hackers but they hack to fix vulnerability and for FREE without permission and information the management.
- Red Hat Hackers: They actively search for black hat hackers and shut them down in their act. Whenever they find one, they don’t report the hacker to the authorities, but take matters into their own hands. A red hat hacker will hack the would-be attackers’ computer and halt their malicious activities.
For instance, a red hat hacker can overload a black hacker’s network to block his attempts. Furthermore, some red hat hacker may also employ aggressive methods that may completely wipe-out a black hat hacker’s computer. In addition to acting individually, groups of red hat hackers may also team up to attack multiple black hat hackers.
- Script Kiddies: These are not really hackers. They use script generated by others to attack. They don't know the implications of the code.
We've learnt the essentials but let's get started. One thing 8n defending yourself in the cyber world in strong password. There are different Online Password Generator.
But for you to create a strong password for MUST follow these rules:
- The minimum length must be at least 8.
-
- It must contain an uppercase and lowercase, dights and special characters($£@€(){}).
- It should not be used in more than one platform. For instance if that's your Gmail
password, don' use it also as your LinkedIn password. This is what the owner of Facebook, Mark Zuckerberg encountered
A strong password makes you look you a pro.
Being Anonymous
Defending yourself also means being anonymous. Anonymity is a important role in cyber security. If a hacker is trying to be untractable he has to be anonymous. Anonymity is the act of being unknown.
Unlike spoofing which is changing your id like IP address to another, anonymity is changing identify.Hidding your data and encrypting it through different algorithms.
There are some ways to be anonymous:
- Unless it is absolutely essential, do not reveal any personal information on the internet. In other circumstances, only fill in incomplete information, such as your last initial, when it is requested, such as your last name.
- Avoid being a victim of e-mail and web-based phishing schemes. Learn how to spot phishing scams and never submit sensitive information through email.
- Learn about malware and make sure you have at least one anti-spyware tool installed on your device to protect it if you are using Microsoft Windows.
The main way of keeping yourself safe and protected is to avoid any form of fake email, phishing website and the rest. See you next time!