5 Levels of Hackers Based on Their Abilities
ooredoo

Wednesday, March 6, 2024

Home » Hackers News , Technology , Technology Info » 5 Levels of Hackers Based on Their Abilities

5 Levels of Hackers Based on Their Abilities

Hackers News - The following are the levels in the world of hackers.

5. Lamer
They are people without experience & knowledge who want to become Hackers (wanna-be Hackers). They usually read or hear about Hackers & want to be like that. Their computer use is mainly for playing games, IRC, exchanging private software, stealing credit cards. Usually hacking uses trojan, nuke & DoS software. Usually brag via IRC channels etc. Because there are many drawbacks to reaching elite, in their development they will only reach the level of developed kiddie or script kiddie.

4. Script Kiddie
Like developed kiddie, Script Kiddie usually carries out the activities above. Like Lamers, they only have very minimal technical knowledge of networking. Usually it can't be separated from the GUI. Hacking is carried out using trojans to scare & make life difficult for some Internet users.

3. Developed Kiddie
This term is mainly because this group is still young (ABG) & still in school. They read about hacking methods & methods on various occasions. They tried various systems until they finally succeeded & proclaimed victory to others. Generally they still use Graphic User Interface (GUI) & have just learned the basics of UNIX, without being able to find new weaknesses in the operating system.

2. Semi Elite
Hackers are usually younger than Elite. They also have extensive skills & knowledge about computers. They understand the operating system (including its holes). It usually comes with a small number of programs enough to change the exploit program. Many of the published attacks were carried out by hackers of this caliber, unfortunately by the elite they are often categorized as lamer.

1. Elite
Also known as 3l33t, 3l337, 31337 or a combination thereof; is the spearhead of the network security industry. They understand operating systems inside and out, can configure & connect networks globally. Able to do programming every day. A very natural gift, they are usually efficient & skilled, using their knowledge appropriately. They can enter the system without being noticed, although they will not destroy the data. Because they always follow existing regulations.

Admin : Jasmine & Elyana
Web Blog : Blogger Sidrap

Related Posts :