3 Understanding Hackers
This chapter covers:
- Exploring the different types of hacker
- Approaching problem solving in a new way with the hacker mindset
- Applying the OODA loop to efficiently discover and exploit vulnerabilities
In this section of the book, we’re going to look at the different types of hacker, how they think, and some of their most common attacks. Hacking itself is neither good or bad: it’s a way of working out how something works, and then getting it to do something different. This mindset can be applied to everything – not just software and computers, but processes, machinery: even companies themselves.
Kicking this off, in this chapter we’ll put hackers into context by taking a look at the different types of hacker, and what separates the bad from the good.
Hackers are a varied bunch, with a wide range of skills, backing, and motivation. Having a high-level working knowledge of the different types of hacker is the first step to understanding the attackers you may face, and how sophisticated and tenacious their attacks will be.
3.1 Who are the Hackers?
There are three main categories of hacker that have emerged over the years. Although not exhaustive, this provides us with an easy way to understand their motivations and how they are likely to operate. When talking about hackers and hacking, you’ll often hear these terms used to describe someone’s actions or motivations. The three types of hacker are: