

On this part, Grey hat hacker are considered also as one of
the ethical hackers in the hackers’ community. They are the one who mostly
formed group of hacktivist on which from forums, to organizations, this group
also lead into Hacktivist world on which they have their own set of rules and
hack into some systems as a form of protest. One of those famous known group on
which can also be considered part of this are the Anonymous.
We can see lot of them do protest on the government websites. They also have
this kind of quotations, The Mentor
quotes: “We explore and you call us criminals. We seek after knowledge and you call us
criminals...Yes, I am a criminal. My
crime is that of curiosity...My crime is that of outsmarting you, something
that you will never forgive me for (Mentor, para. 9).” This is an informal
attempt to record some kind of record of motivation can be found in the short
essay titled "The Conscience of a Hacker" written on January 8th,
1986 and published in the online hacker magazine Phrack, more famously known as
"The Hacker Manifesto". The essay became a cornerstone of hacker
culture and is probably still the most well-known essay on hacking in
existence.
Hacktivism
which is still under this grey hat hacker is the development and use of
technology to foster human rights and the open exchange of information, or more
simply 'hacking for political purposes'. Brought into the mainstream by the
hacker group Cult of the Dead Cow (cDc) in the mid-1990s and widely defined as
a form of grey-hat hacking due to its sometimes quasi-legal nature, the term
'hacktivism' is often abused misused similar to its cousin 'hacking'; this
leads to a dirtying of the public perception of the word. However, the genesis
of 'hacktivism' was a benign one. We can see lot of anonymous now a days on the
internet since technology runs fast. Communicating and expressing one’s self or
as a group which is against the political state of the country can be done now
through online. And by using the hacking tools and skills they have, they show
it in public. Mostly of the domains they used were from the government websites
since their request will be heard directly from all those government sectors. Around
the globe, there are lot of Anonymous groups and they do this things not just
for their own privileges but also for other people in worldwide web community.
![]() |
Sony sites offline after Anonymous attack threats |
Moreover with this Anonymous,
“Beginning in 2008, Anonymous started
promoting collaborative global hacktivism by performing combined protests to
promote freedom of Internet speech. Anonymous group activities are managed by
unidentified yet self-attributed Anonymous members. Internet forums and image
boards are key sources for Anonymous recruitment, as well as wikis and other
Internet Relay Chat (IRC) networks. Anonymous uses such mediums to communicate
and organize protests.” We cannot really dictate anonymous as a black hat
hacker or even white hat hacker because he or she may use his or her skills for
legal or illegal acts, but not for personal gains. Grey hackers use their
skills in order to prove themselves that they can accomplish a determined feat,
but never do it in order to make money out of it. While I’m searching for some
reading about this grey hat hackers, I found a website on which they are into
grey hat but for security purposes and group of grey hat hacker community. It
is the Greyhat Security. The site
show their legal purpose and uses of their website and the two main purposes of
it were Education and Teach advanced techniques to legal Penetration Testers.
You can view and read it here: Legal
for further research about that website.
Lastly, Grey
or Gray Hat Hacking also have a book about ethical hacking. Based on
reviews about this book (Gray
Hat Hacking: The Ethical Hacker’s Handbook), “It is an ethical hacker’s handbook which combines a highly
pedagogical approach with advanced knowledge of security vulnerability,
discovery, and exploitation. The process of discovering and exploiting security
vulnerabilities is a multiphase one: first, a series of laws must be considered
and addressed, to avoid legal prosecution. Next, a network must be scanned, and
potentially vulnerable machines detected. The final phase is exploitation,
where vulnerable applications are injected with user-controlled data, and the
underlying machine is “owned.” These phases are common to both black hats and professional
penetration testers, hired for assessment and testing purposes. The authors
describe all of these phases in great detail.” Being ethical in what we do
is really important because it is where other people and society measures on
how you respect yourself as an individual.
3 comments:
I read your articles very excellent and the i agree our all points because all is very good information provided this through in the post. It is very helpful for me. Keep blogging like this. Thanks.
SAP training in Chennai
SAP FICO training in Chennai
SAP ABAP training in Chennai
SAP MM training in Chennai
SAP SD training in Chennai
SAP HR training in Chennai
Superb i really enjoyed very much with this article here. Really its a amazing article i had ever read. I hope it will help a lot for all. Thank you so much for this amazing posts and please keep update like this excellent article.thank you for sharing such a great blog with us. expecting for your updation.
seo company in chennai
Digital Marketing Company in Chennai
Thank you for sharing such a nice and interesting blog with us. I have seen that all will say the same thing repeatedly. But in your blog, I had a chance to get some useful and unique information. I would like to suggest your blog in my dude circle. please keep on updates. hope it might be much useful for us. keep on updating...
seo company in chennai
Digital Marketing company in chennai
Web Design company in chennai
Post a Comment