a guest Nov 16th, 2019 111 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
- Acronym list
- TLA- Three Letter Agency (FBI, CIA, NSA, Etc)
- RTFR - Read the fucking rules
- LG - Learning Grounds
- IT - Information Technology
- IS - Information Security (InfoSec)
- Hat colors and what they are
- White - Ethical hackers, employed by individuals or businesses to test security systems or as a systems administrator to keep the systems online. Most commonly found hired with authorization for compromise security and computer systems and/or networks.
- Black - Unethical hackers, violating computer security for personal gain or pure maliciousness for the simple sake of enjoyment. Nine times out of ten the people who wear this hat are violating laws and regulations.
- Grey - An inbetween, rarely hacking for malacious intent, most commonly found penetrating and compromising systems and networks without authorization, but goes to the individual and/or business after-the-fact to inform them of the weaknesses in said applications.
- Red - Vigilantes or dormant , never really an inbetween. Most commonly found hunting black hats, however the dormant style would be considered highly skilled and can be found breaking (DDoS, virus upload, etc) an attempting unauthorized entry in return for trying to gain access to their(the red hats) systems.
- Green - The noobs of the playground, unlike skidz, they actually have an inclination for learning and strive to become a fully educated hacker. Often found being bullied or flamed for asking too many questions, but when answered will listen intently.
- Blue - Solo individual who typically bug tests, pen tests, and exploit tests a system or network before it launches, so it can be fixed appropriately. Also known as the security professionals Microsoft invites to find vulnerabilities in Windows distributions. Less commonly seen but still existing for some reason under blue hats are "Skidz who take revenge".
- Skidz (Skript Kiddie)- an individual with no desire to learn how to properly hack, instead copying other individual(s) code and putting it to use for themselves as a virus, SQLi, or other various means. Most commonly seen overusing LOIC or Metasploit, and watching youtube videos on how to use said programs.
RAW Paste Data