answersLogoWhite

0

Most hackers do not exclusively use software they wrote themselves; instead, they often leverage a combination of custom scripts and readily available tools. Many hacking tools are open-source and widely shared within the community, allowing hackers to adapt and modify them as needed. While some advanced hackers may develop their own software for specific tasks, the majority rely on existing resources to enhance efficiency and effectiveness.

User Avatar

AnswerBot

1mo ago

What else can I help you with?

Related Questions

Who advertised themselves as 'software for the most advanced microprocessor on this planet'?

AMD advertised themselves with the slogan "software for the most advanced microprocessor on this planet," referring to their microprocessors like the AMD Ryzen series.


What is a great way to remove keylogging?

A keylogger is a virus that records all keystrokes on the computer keyboard and sends them to hackers. Most antivirus software programs will remove keylogger viruses.


What do hackers claim as their defense?

One of the most popular hackers' arguments is that "electrons are free--they do not belong to anybody."


How was virus discover?

Computer viruses were not discovered. They are written by hackers and people who develop software and just get them out there to see if they work. They are usually always harmful and malicious. It is an absolute must to always have anti virus software running on a computer. Without it, in most cases, within 1 hour of surfing on the internet, your computer could be hopelessly infected. BUt without the people that write viruses, we would not have the people who write the software that blocks,eliminates,and destroy them. Most everything we have available to us on computers are all created by "hackers".


What is an exploitations?

A tool developed by hackers that is used to perform malicious attacks on computer systems. They are usually scripts that are designed to exploit weaknessness in software over a network, most commonly the internet. Zero-Day is a common type of exploit.


Is there a trucking software that is simple enough to use for the average trucker?

While most truckers won't need to use the software themselves, Trucker's Helper is a software package that is easy to use. It allows dispatchers to keep track of shipments and deliveries, and it has an option to allow the drivers themselves to track miles and deliveries as well.


Why did paramore write 'my heart'?

No one really knows but the most common and believable answer is that Josh and Hayley wrote it about themselves when they were still a couple.


Do hackers hack on terminals?

Most of the times yes. Since there are graphical user interface hacker tools built for hacking, hackers could be using those as well.


What are the two most common computer attacks?

Attack by viruses attack by hackers


Will prestige hackers in Call of Duty Modern Warfare 2 get banned?

Most likely.


Why do people think hackers are bad people even though most aren't?

Well, hackers usually try to get information that is not theirs to know. Sometimes they plant viruses. If they do it on accident or not, I'm not really sure.


Can you say that the hackers are the good people and crackers are the bad people?

For all intents and purposes, there are indeed good and bad hackers when considering all the modern definitions of hackers, but the answer one would get to this question depends on whom you ask. In general, there are four categories of hackers. Each category attempts to generally convey the moral compass of that group relative to themselves and everyone else, as well as provide a basic backdrop of information on that category.The first category of hackers are those for whom the term 'hacking' was originally defined. In this category, you have the hackers that perform the art in order to improve their knowledge of technology. They are curious about how systems work, and all of their attempts at penetration and exploits are merely expressions of this curiosity. Any damage caused is coincidental, or, if intentional, is based on revenge and not simple exploitation of innocent bystanders. Hackers were often classified by types, such as hardware hackers, computer hackers, phone hackers, etc.In general, this category of hackers will not acknowledge the remaining three types of hackers as such. They consider the second form of hackers to be 'crackers', the third form as 'security consultants', and the fourth form as 'criminals.' This category only recognizes the classic definition of hacking, and so all hacking is good. Most everyone else, except possibly whitehats, are likely to see this category as bad due to the negative media coverage of crackers.The second category of hackers were called crackers at large, until the media had a confusion over the various terms and simply lumped anyone that did something unusual with technology as hackers, mutating the term. Crackers are those that generally 'crack' things, such as breaking through firewalls, reverse engineering copyright protection so they can sell illegal copies, and the like; they have the same basic skills as hackers, but have a darker side to their motives.Classic hackers generally hated the media for smearing their reputation by lumping in these malicious individuals with themselves. At some point, crackers also started using the term 'hackers' for themselves, thus further cementing the definition of hacker as 'one who does bad things with computers.' These crackers see themselves as good, or at least morally gray, and do not generally see any difference between their activities as compared to classic hackers, but are classified as bad by almost everyone else.The third category of hackers are called whitehat hackers. Individuals in this category are a branch from the classic hackers on the 'good' side of morality. While classic hackers might say that this new group of hackers sold out on their heritage, whitehat hackers are out to make the world a better place, and line their pockets at the same time. Whitehats generally appeared after the appearance of blackhats; they seem to have appeared from the classic hacker community in response to a threat with the promise of monetary gain for their troubles.These hackers will penetrate systems, document the flaws, and then sell this information to the organizations they have penetrated. They won't generally do so until they've been contracted by the organization to perform this work, which makes their otherwise illegal activities legal. They are essentially employed hackers for the good of humanity. Classic hackers are likely to see them as bad, having discarded their disdain for corporate greed, and blackhats see them as enemies, while the rest of the world see them as good.The fourth category of hackers are called blackhat hackers, and represent the other side of the for-profit hacker community. They are generally crackers that have gone to the next level of the art of criminal activity. While crackers might break copyright protections for personal gain, blackhats are more interested in the big pot of gold at the end of the rainbow. Rather than sell a few lousy DVDs or cracked games, these hackers break into databases and steal millions of credit card numbers, or grab bank account numbers and transfer money out of them covertly, and other such activities.Blackhats and whitehats are directly opposed to each other, with the good trying to defend companies against the bad. Neither group are generally interested in hackers or crackers, except possibly as recruits for their respective trades. Everyone considers this group bad, except for themselves; since most of them have little sense of morality, they usually simply exist, although some might acknowledge they are bad or have a sense of doing good by claiming that their hacker mentality against corporate greed drove them to relieve those corporations of their money. Blackhats, however, will work together for greater gains from their activities.As one can tell, 'good' and 'bad' are relative to whom the question is asked, and even their very definitions differ even within the same group and from other groups.