Difference Between Hacker and Cracker



Two top security threats when it comes to the use of computers and the internet is Hackers and Crackers. But are they different from each other? Is there really a difference? Do you know the difference? Well, maybe you do but if you don’t, worry not because this tutorial has been structured for you.


I am going to best describe the difference between hackers and crackers and their activities on the internet as far as gaining access to your systems are concerned. We are first going to understand who a hacker or cracker really is then we argue out the difference between hackers and crackers.


Hacker

A Hacker is an expert programmer. Hackers usually obtain advanced knowledge of operating systems especially UNIX and Linux and a number of programming languages like C, C++, PHP, Python, and Java among others. Hackers also violate confidentiality by observing computer monitor screens and impersonating authorized users in order to gain access to the users’ system without evil intent.

They always research into discovering bugs or holes within systems and the reasons for such loopholes. A hacker may be good (White Hat) or bad (Black Hat). A good hacker or mostly referred to as Ethical Hacker consistently seeks further and better knowledge about systems; freely share their discovery with the hacking community, and never intentionally damage data. But the Black Hat hacker is synonymous with the Type 1 cracker as discussed below.


Watch Out: How To Protect Yourself Against Cyber Attacks

Cracker

A cracker is an experienced computer user who gains unauthorized access to a computer system or network without approval and with the intention of causing damage. A cracker is also a person who reverse engineers software and modify it to suit their preference.

A cracker may destroy files, steal personal information like credit card numbers, usernames and passwords etc., infect the system with a virus or undertake many other things that cause harm to the system. They are the ones often referred to as Black Hat hackers. The most common way crackers gain access to networks or systems is through social engineering, whereby the cracker deceives individuals to acquire sensitive and personal information or contacts employees at a company and tricks them into divulging passwords and other information that allows a cracker to gain access.

To boot, there are two major categories or types into which we can classify crackers. I call them Type 1 and Type 2. Type 1 is the expert crackers who discover new security holes and often develop programs that exploit them. The Type 2, Script kiddies, they only download programs (Tools of the Trade) from the internet and use it exploit unsuspecting users without necessarily writing them themselves. Script kiddies are legion but much easier to identify and deal with.

The term “Tools of the Trade” used may refer to the means by which a hacker or a cracker penetrates a network. The tools are made up of Programs and Techniques. Examples are reconnaissance, social engineering, Dumpster diving, and impersonation etc.

I hope you found this tutorial helpful. Let’s get interactive by dropping your questions and suggestions in the comments box below. Enjoy!!!


Level: Beginner

Comments