Beginners Guide To Ethical Hacking andCountermeasures
Types Of Hackers:
Black Hat:These Black Hatters are also called as crackers, they destroy the private information,sensitive information,deface websites, almost do all the illegal activities.To become a Black Hat it would be difficult if you’re not willing to devote your much time in learning as it need more time.By the way the Black Hatters won’t get any decent job because of the illegal activity.May be not all of them do illegal things, but such people exits for sure.
In case if you are caught by Law Enforcement then your
screwed for sure.Have to spend your rest of life in jail.
Grey Hat:
These Hatters lie between Black and White hat.
These Hatters most commit pranks that just for fun and they are harmless to others. but they can be illegal also.
It’s unlikely or some users to take it as a joke because all are of not same mentality, Some might take it seriously if you go too far.
You can also be prisoned if you’re thinking about becoming a Grey Hat.
White Hat:
White Hatters use there knowledge to fight with malware and flaws. More than half of them are friendly & can be trusted.
But we cant trust anyone because there are some White hats, but it’s more than unlikely for them to do harm to your computer.
White Hatters may have good future with better paying job like computer programming,security consultant.
Most of them will get settled well with job unless they do not do illegal activity.
Script Kiddies:
This is a derogatory term for black hat hackers who use borrowed programs to attack networks and deface websites in an attempt to make names for themselves.

Hacktivists:
Some hacker activists are motivated by politics or religion, while others may wish to expose wrongdoing, or exact revenge, or simply harass their target for their own entertainment.
State Sponsored Hackers: Governments around the globe realize that it serves their military objectives to be well positioned online. The saying used to be, “He who controls the seas controls the world,” and then it was, “He who controls the air controls the world.” Now it’s all about controlling cyberspace. State sponsored hackers have limitless time and funding to target civilians, corporations, and governments.
Spy Hackers:
Corporations hire hackers to infiltrate the competition and steal trade secrets. They may hack in from the outside or gain employment in order to act as a mole. Spy hackers may use similar tactics as hacktivists, but their only agenda is to serve their client’s goals and get paid.
Cyber Terrorists:

These hackers, generally motivated by religious or political beliefs, attempt to create fear and chaos by disrupting critical infrastructures. Cyber terrorists are by far the most dangerous, with a wide range of skills and goals. Cyber Terrorists ultimate motivation is to spread fear, terror and commit murder.
Now as we are cleared to go to the next step,you might wanna get to know about different types of hacking.

PHISHING:
Phishers send an email claiming to be from a reputable site, perhaps saying you’ve won an iPad, but then direct you to a fake site, which looks genuine. However it exists only to steal your personal details and often the only difference is the URL. To stay safe, check the site by doing a Google search, check the URL or make a phone call.

The phone equivalent of “phishing” with scammers sending dodgy text messages. Emails are still at risk on a mobile device too, as it is almost impossible to distinguish real sites from fakes on such a small screen. Take the same steps as above.
MALWARE:
Malware (viruses, worms, trojan horses, backdoors, adware and spyware) is unwanted software put on a user’s device without consent. It has the ability to severely damage a computer as well as allowing external users unauthorised access, including access to a victim’s bank account. Luckily the easiest way to protect yourself is a good virus scanner which is updated regularly.
DDOS ATTACK:
A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack)won’t necessarily ruin your computer, however it means you could be taking part in activities of a far larger nature. A big attack – such as the assault on the FBI’s website by hacking group Anonymous – can involve thousands of “enslaved” computers being used in a concentrated attack to overload a site or ISP. About one in five home computers and one in 10 work computers have been taken over by such malware and are being used by “bot herders” to conduct these sorts of activities. Update your virus protection and programs to stay safe.
Now This Is All For The Beginners.If You Think You Are Up For Some Serious Hacking,We Have Just The Thing.We'll Be Back With More .