Computer security term; someone who hacks computer systems
Not to be confused with Hacker or Hacker culture.
Part of a series on
Computer hacking
History
Phreaking
Cryptovirology
Hacking of consumer electronics
List of hackers
Hacker culture and ethic
Hackathon
Hacker Manifesto
Hackerspace
Hacktivism
Maker culture
Types of hackers
Black hat
Grey hat
White hat
Conferences
Black Hat Briefings
Chaos Communication Congress
DEF CON
Hackers on Planet Earth
Security BSides
ShmooCon
Summercon
Computer crime
Crimeware
List of computer criminals
Script kiddie
Hacking tools
Exploit
forensics-focused operating systems
Payload
Social engineering
Vulnerability
Practice sites
HackThisSite
Zone-H
Malware
Rootkit
Backdoor
Trojan horse
Virus
Worm
Spyware
Ransomware
Logic bomb
Botnet
Keystroke logging
HIDS
Web shell
RCE
Computer security
Application security
Cloud computing security
Network security
Groups
Anonymous
Chaos Computer Club
Homebrew Computer Club (defunct)
Legion of Doom (defunct)
LulzSec (defunct)
Masters of Deception (defunct)
Red team / Blue team
Publications
2600: The Hacker Quarterly
Hacker News
Nuts and Volts
Phrack
v
t
e
A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network.[1] Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering,[2] challenge, recreation,[3] or evaluation of a system weaknesses to assist in formulating defenses against potential hackers.
Longstanding controversy surrounds the meaning of the term "hacker." In this controversy, computer programmers reclaim the term hacker, arguing that it refers simply to someone with an advanced understanding of computers and computer networks,[4] and that cracker is the more appropriate term for those who break into computers, whether computer criminals (black hats) or computer security experts (white hats).[5][6] A 2014 article noted that "the black-hat meaning still prevails among the general public".[7] The subculture that has evolved around hackers is often referred to as the "computer underground".
^Gao, Xing (2015). "Information security investment for competitive firms with hacker behavior and security requirements". Annals of Operations Research. 235: 277–300. doi:10.1007/s10479-015-1925-2. S2CID 207085416.
^Winkler, Ira. Spies Among Us: How to Stop the Spies, Terrorists, Hackers, and Criminals You Don't Even Know You Encounter Every Day. John Wiley & Sons. 2005. pg. 92. ISBN 9780764589904.
^Cite error: The named reference crackdown was invoked but never defined (see the help page).
^"The Hacker's Dictionary". Retrieved May 23, 2013.
^Political notes from 2012: September–December. stallman.org.
^Raymond, Eric S. "Jargon File: Cracker". Coined ca. 1985 by hackers in defense against journalistic misuse of hacker.
^Yagoda, Ben (March 6, 2014). "A Short History of 'Hack'". The New Yorker. Retrieved June 21, 2019. Although Lifehacker and other neutral or positive applications of the word [hack] are increasingly prominent, the black-hat meaning still prevails among the general public.
A securityhacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated...
Iskorpitx (Turkish Hacker) !". The Hacker News. Retrieved 2022-05-01. McMillan, Robert (September 24, 2010). "Man gets 10 years for VoIP hacking". Computerworld...
connotation, a hacker is a person skilled in information technology who achieves goals by non-standard means. Though the term hacker has become associated...
from the hacker ethics that originated at MIT and at the Homebrew Computer Club. The hacker ethics were chronicled by Steven Levy in Hackers: Heroes of...
places for system and network administrators, hackers, and computer security experts. Common activities at hacker conventions may include: Presentations from...
Conscience of a Hacker (also known as The Hacker Manifesto) is a short essay written on January 8, 1986 by Loyd Blankenship, a computer securityhacker who went...
tunnel spaces Hack (disambiguation) Hacker (disambiguation) Hacks (disambiguation) List of hacker groups All pages with titles containing Hacking This disambiguation...
tweet sorrow for hacker group". The Sydney Morning Herald. Retrieved 29 June 2011. Weisenthal, Joe (25 June 2011). "Notorious Hacker Group LulzSec Just...
Unfriendly Skies [Black Hat] – SecurityWeek.Com". 27 July 2012. Archived from the original on 8 February 2015. "Hacker Says He Can Break into Airplane...
6, 1963 – July 16, 2023) was an American computer security consultant, author, and convicted hacker. He is best known for his high-profile 1995 arrest...
Certified Ethical Hacker (CEH) is a qualification given by EC-Council and obtained by demonstrating knowledge of assessing the security of computer systems...
hacking and not securityhacking. Noname057(16) a Russian speaking hacker group, attacks aligned with Russia's invasion in Ukraine OurMine, a hacker group...
will continue to increase. Black hat hacker Computer security Exploit (computer security) Hacker (computer security) Hacktivism Lamer List of convicted...
Goatse Security (GoatSec) was a loose-knit, nine-person grey hat hacker group that specialized in uncovering security flaws. It was a division of the anti-blogging...
The Hackers on Planet Earth (HOPE) conference series is a hacker convention sponsored by the securityhacker magazine 2600: The Hacker Quarterly that until...
Hack Forums (often shortened to 'HF') is an Internet forum dedicated to discussions related to hacker culture and computer security. The website ranks...
A grey hat (greyhat or gray hat) is a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but usually...
functions. Phone hacking is a large branch of computer security that includes studying various situations exactly how attackers use security exploits to gain...
Security Certified Professional (OSCP, also known as OffSec Certified Professional) is an ethical hacking certification offered by Offensive Security...
Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security holes in the configuration...
allow a computer to pretend it has any MAC address that the hacker desires, and the hacker can easily get around that hurdle. MAC filtering is effective...