who is typically more skilled: white hat pros or black hat pros? – Digitalmunition




Home Forums who is typically more skilled: white hat pros or black hat pros?

This topic contains 1 reply, has 2 voices, and was last updated by  FreshlyScrapedSmegma 1 month ago.

  • Author
    Posts
  • #323428

    anonymous
    Participant

    So are people who hack illegally but who do it professionally more skilled on average than most white hats or is it the other way around?

    Obviously, it depends on the individual. But I wanted to ask on average.

  • #323429

    FreshlyScrapedSmegma

    I dunno man, I almost see them as different skill sets entirely.

    Any turd can go out on a forum and download some tools used to attack someone else. It’s not that hard.

    Defending means you have to be aware of attack vektors, manage network security, harden servers / os stuff, etc.

    And the crap thing is that it’s a never ending process. You don’t just get to set up a config and forget about it.

    You can be a hack at white hat stuff and still protect yourself to an extent. Same with black hat script kiddies. I think there are 3 classes. People that suck and think they are good, people that suck and know it and try to get better, and people that are good and can prove it,

    I would venture that WH stuff takes more skills. Once you get to truly skilled levels, everyone has skills and it’s cat and mouse.

  • #323430

    sam__0710

    Black hat pros because black hat hackers usually have extensive knowledge about breaking into computer networks and bypassing security protocols. They are also responsible for writing malware which is a method used to gain access to these systems .Their primary motivation is usually for personal or financial gain, but they can also be involved in cyber espionage, protest or perhaps are just addicted to the thrill of cybercrime. Black hat hackers can range from amateurs getting their feet wet by spreading malware, to experienced hackers that aim to steal data, specifically financial information, personal information and login credentials. Not only do black hat hackers seek to steal data, they also seek to modify or destroy data as well.

You must be logged in to reply to this topic.