Diese Webseite nutzt nur technisch notwendige Cookies.

What is Hacking? Definition, Explanation with All 6 Hacker Types

What is hacking? Who are hackers?

This article will give you a quick overview of the topic without a lot of technical jargon.

Let’s get started!

Hacking Definition

Chaos Computer Club

The word hacking has two meanings in Germany:

Definition from everyday language:

Hacking is the illegal intrusion into computers and the associated deletion, suppression and retrieval of data.

Steffen Lippke

Original definition:

Hacking is an activity in which the hacker attempts to use technology to create something creative and original in an experimental way (on a voluntary basis).

Steffen Lippke

Myth-Definition of Hacking

In everyday language, hacking refers to the activity carried out to gain access to encrypted computer systems (illegally).

With hacking you want to …

04 Windows neues Terminal - perfekt zu Hacking - Was ist Hacking Definition Steffen Lippke - Hacking Series
Windows new terminal

Firstly: Yes, all of the above scenarios are possible with hacking. Some hackers have successfully performed such hacks. If you want to learn how to become a hacker, read my learn hacking tutorial.

Steffen Lippke

Original Definition of Hacking

The Chaos Computer Club unites hackers and computer enthusiasts in Germany who are committed to net neutrality and security on the Internet.

It brings together hackers who work creatively and experimentally with technology (not only on computers). The founder of the CCC, Wau Holland, defines hackers as follows: “A hacker is someone who tries to find a way to make toast with a coffee machine”.

Hacking originally meant …

  • … building an alarm system from an alarm clock and a single-board computer
  • … building a display wall with Mate bottles and lights
  • … think up sci-fi utopias
  • … programme an app for an environmental purpose
  • … tinker with small robots made from electronic waste
  • … make cool figures out of wood with a CNC milling machine

Hacking is not limited to code and keyboard typing.

Some hackers build with real hardware, others with software and still others build a coffee cup warmer from a hotplate. The possibilities are endless.

Is Hacking illegal?

According to the everyday language definition, hackers can work for or against the will of other people.

Hacking tools are comparable to a sharp kitchen knife:

Either a gourmet chef cooks an exquisite dish with the use of the knife.

… or ….

The chef lies in wait for his guests, uses the sharp knife as a weapon and stabs them.

Steffen Lippke

The sharp knife is the hacking tool for a hacker. It can help companies to develop secure and stable software (positive effect, goodwill).

or ...

The hacker uses the hacking tool against a company and carries out a “digital murder”, a real criminal offence:

01 Hacking Guide
My Guide

He publishes stolen customer data, puts patents online, destroys hardware, software and data of the company so that the company has to go bankrupt (negative effect, bad will).

Common 4 Types of Hackers

Black-hat Hacker – The Stereotype from the Movice

In Hollywood films, black-hat hackers appear as computer science students sitting in a darkened room with 5 monitors, 3 keyboards and dozens of pizza boxes on the floor.

In reality, you will find such stereotypes, but they are the minority. The successful black hats have captured a lot of digital money: with their Bitcoin millions and a yacht, they sail around the Caribbean and live under the radar.

The black hats blackmail companies such as Amazon, PayPal and Google, steal money and cause damage to software and hardware. Black-hat hackers operate illegally and risk a prison sentence.

05 Kali Linux als Subsystem - Was ist Definition Steffen Lippke - Series
05 Kali Linux as a subsystem

White-hat Hackers – Top Performers with Top Salaries

White-hat hackers take pleasure in hacking websites, apps and programmes. They help companies and individuals to find all possible software errors in their software.

The IT professionals receive a good salary for this service, so much so that bug bounty programmes have LEGALLY made hackers millionaires. White-hat hackers work for IT security consultancies, in cybersecurity emergency response teams in large companies or as freelancers who are paid several hundred euros per hour.

Grey Hat Hackers – So-so

Grey hat hackers (un)intentionally publicise the vulnerabilities they find in well-known operating systems and popular software on social media.

A malicious black-hat hacker can exploit the vulnerabilities and use this tip to cause a lot of damage. The affected company must close the vulnerability quickly to reduce the risk of a black hat hack.

Script Kiddies – Children out of Control

02 Wirehark
Wirehark

Script kiddies are underage children who find a hacking tool on the Internet at home. The children (un)consciously attack companies or private individuals. They deliberately provoke their victims (relatives, friends, parents) to white heat and commit REAL criminal offences, for which the parents have to serve a prison sentence.

The children only use the tools with half-knowledge, so that the police and cyber professionals can trace the script kiddies.

The Most Common Types of Hacking

Attack Vectors for Computer Hacking

03 Memory
Memory hacking
  • Hardware / microcontrollers: When hackers paralyse microcontrollers, malware can cause physical damage with the risk of fire in addition to data loss. For this form of hacking, the hacker needs physical access to the computer.
  • Basic Input-Out System (BIOS): The BIOS manages the boot process of the operating system (or several) on a hard drive. Malware here could B. Cause your computer to overheat. As with hardware hacking, access to the BIOS is not so easy.
  • RAM / virtual memory: Main memory (RAM) attacks are more common. Hackers read the main memory to obtain cached passwords. Very dangerous!
  • Boot section: Malware can destroy the part of the hard drive where the computer normally starts reading at startup. If the computer only finds nonsense bits, you will not be able to boot your computer. Hackers manage to penetrate this area time and again.
  • The operating system is roughly divided into three layers:
    • Kernel: Hackers can spy or delete data.
    • Middleware and user interface: A non-kernel hacker enables criminals to read, influence or manipulate all programmes
  • Software: Criminals distribute user software via websites, emails, post and USB sticks, which can cause damage to computers and files. This form of hacking is the most popular
Let us know what you think! Was this tutorial/post helpful, or do you still have burning questions? Write a comment and become part of our growing community. Share your successes, challenges and tips - together we can achieve great things in security and coding!

Leave a Reply

Your email address will not be published. Required fields are marked *

get rss abo

Jetzt
Abbonnieren
academy

Erhalte Free
Security Kurs

Jeden Monat teile ich mit Mitgliedern
4 neue praxisnahe Tutorials (je 1000+ Wörter).


Trage Deine Mail, damit Du
Deine Coding + Hacking Skills erweitern kannst!