Free Essay

Compare and Contrast Hackers, Crackers & Ceh

In:

Submitted By avongal
Words 880
Pages 4
As long as there has been computer technology, individuals have sought to test the limits. The first computer virus, The Morris Worm, was little more than a young adult testing the boundaries of communication. In later interviews with (Morris name), he has often commented of his surprise at the results from his worm. Morris and others testing the boundaries is given the moniker “hacker," their mens rea is not malicious they simply seek to test, identify and communicate weaknesses in technology systems. The hacker label contrasts with "cracker" who seeks to discover weaknesses for personal or financial gain and is certainly malicious. Newer to the world of hackers and crackers is the certified ethical hacker. The EC-Council, responsible for the certified ethical hacker certification, distances itself from both labels and the negative connotations associated. This document will offer a comparison of crackers, hackers and the certified ethical hacker.
The term hacker is said to have evolved out of MIT’s computer culture when the Tech Model Railroad Club hacked model trains to make them run faster. As Universities across the country embraced the hacker concept they remained isolated until the first year of ARPAnet in 1969, “the first transcontinental, high-speed computer network” ("Early Hackers," n.d., para. 3). For better or for worse, hacker has had quite a public history; it is the preferred label describing all activities from security research through credit card theft. For this reason, true hackers consider themselves “interested in the arcane and recondite workings of any computer operating system…Hackers constantly seek further knowledge, freely share what they have discovered, and never intentionally damage data.” ("Difference between hackers and crackers," n.d., para. 5) This definition is the overriding sentiment in the information security community; hackers often translate into security researchers testing the boundaries of items looking for the weaknesses always with an eye on responsible disclosure of any security vulnerability or issue identified. Hackers also promote responsible disclosure of security issues and while some may skim the edge of legality; many try to uphold ethical standards. To further clarify, cracker came out of the hacker community to distinguish those who hack programs to make them better as opposed to crackers who do it for personal gain.
The distinction between the hackers and crackers may seem trivial but to those security researchers seeking to improve the efficacy of hardware and software the chasm is wide. Crackers will use any tool in their arsenal to further their profit including software reverse engineering, social engineering and vulnerability research. Kevin Mitnick was a preeminent social engineering cracker the FBI chased for years. While many are familiar with the story of Frank Abagnale Jr. from the movie Catch Me If You Can, Kevin Mitnick is equally as interesting. He has co-authored multiple books on his arrests, background and information security advice. Mitnick hacked NORAD in 1982 which inspired the 1983 movie Wargames. (Christensen, 1999) While many believe hackers and crackers are similar, and both operate outside the law, certainly crackers are black hats but hackers run the gamut from white to gray to black hat.
A newer entry to hacking is the EC-Council Certified Ethical Hacker. The EC-Council began after the September 11, 2001 attacks on the United States of America. This organization created a certification for individuals to work as certified ethical hackers, CEH; meaning these individuals work for companies to provide hacking against their environment, at their request, proactively discovering vulnerabilities or security gaps. The information provided by CEH individuals allows the company to address issues prior to their discovery in the wild. The certified ethical hacker is very different from a cracker as they are contracted to perform the hacking work and will require signed permission slips from their clients. While the hacker and cracker operate in shades of gray and black, a CEH is a white hat hacker believing “To beat a hacker, you need to think like one!” ("Certified Ethical Hacker," n.d., para. 1)
From the illegal black hat cracker to the borderline legal actions of hackers and the white hat security assessments of a CEH, the methods used may be similar, but the goals, motivation and results vary wildly. A self-proclaimed hacker, Adrian Lamo, found security vulnerabilities in several systems including MCI WorldCom issues with the core Internet. He disclosed the issues to MCI and with his help they were able to fix the systems. Lamo also hacked into the New York Times, however when he disclosed to them; they had him arrested. While he did attempt to provide some value to his targets, he also crossed the line and accessed email addresses of famous contributors to the paper. Understanding the roles covering the good, the bad and the ugly of hackers, crackers and certified ethical hackers can help a business deal with security consultants.

References
Certified ethical hacker. (n.d.). Retrieved from http://cert.eccouncil.org/certified-ethical-hacker.html
Christensen, J. (1999). The trials of Kevin Mitnick. Retrieved from http://www.cnn.com/SPECIALS/1999/mitnick.background/
The Early Hackers. (n.d.). Retrieved from http://www.catb.org/esr/writings/homesteading/hacker-history/ar01s02.html
The difference between hackers and crackers. (n.d.). Retrieved from http://searchenterprisedesktop.techtarget.com/tip/The-difference-between-hackers-and-crackers

Similar Documents

Premium Essay

Security Analyst

...Contents 1. Introduction 2. Assessment Test 3. Chapter 1: Getting Started with Ethical Hacking 1. Hacking: A Short History 2. What Is an Ethical Hacker? 3. Summary 4. Exam Essentials 5. Review Questions 4. Chapter 2: System Fundamentals 1. Exploring Network Topologies 2. Working with the Open Systems Interconnection Model 3. Dissecting the TCP/IP Suite 4. IP Subnetting 5. Hexadecimal vs. Binary 6. Exploring TCP/IP Ports 7. Understanding Network Devices 8. Working with MAC Addresses 9. Intrusion Prevention and Intrusion Detection Systems 10. Network Security 11. Knowing Operating Systems 12. Backups and Archiving 13. Summary 14. Exam Essentials 15. Review Questions 5. Chapter 3: Cryptography 2 1. Cryptography: Early Applications and Examples 2. Cryptography in Action 3. Understanding Hashing 4. Issues with Cryptography 5. Applications of Cryptography 6. Summary 7. Exam Essentials 8. Review Questions 6. Chapter 4: Footprinting and Reconnaissance 1. Understanding the Steps of Ethical Hacking 2. What Is Footprinting? 3. Terminology in Footprinting 4. Threats Introduced by Footprinting 5. The Footprinting Process 6. Summary 7. Exam Essentials 8. Review Questions 7. Chapter 5: Scanning Networks 1. What Is Network Scanning? 2. Checking for Live Systems 3. Checking for Open Ports 4. Types of Scans 5. OS Fingerprinting 6. Banner Grabbing 7. Countermeasures 8. Vulnerability Scanning 9. Drawing Network Diagrams 10. Using Proxies 11. Summary 12. Exam Essentials 13. Review Questions...

Words: 71242 - Pages: 285

Free Essay

Ceh Test Questions

...Exam : 312-50 Title : Ethical Hacker Certified Ver : 02-23-2009 312-50 QUESTION 1: What is the essential difference between an 'Ethical Hacker' and a 'Cracker'? A. The ethical hacker does not use the same techniques or skills as a cracker. B. The ethical hacker does it strictly for financial motives unlike a cracker. C. The ethical hacker has authorization from the owner of the target. D. The ethical hacker is just a cracker who is getting paid. Answer: C Explanation: The ethical hacker uses the same techniques and skills as a cracker and the motive is to find the security breaches before a cracker does. There is nothing that says that a cracker does not get paid for the work he does, a ethical hacker has the owners authorization and will get paid even if he does not succeed to penetrate the target. QUESTION 2: What does the term "Ethical Hacking" mean? A. Someone who is hacking for ethical reasons. B. Someone who is using his/her skills for ethical reasons. C. Someone who is using his/her skills for defensive purposes. D. Someone who is using his/her skills for offensive purposes. Answer: C Explanation: Ethical hacking is only about defending your self or your employer against malicious persons by using the same techniques and skills. QUESTION 3: Who is an Ethical Hacker? A. A person whohacksfor ethical reasons B. A person whohacksfor an ethical cause C. A person whohacksfor defensive purposes D. A person whohacksfor offensive purposes Answer:...

Words: 34575 - Pages: 139