Black hats in an attitude of a hacker to violate the security of a network or a computer system to introduce maliciousness in the system/network for the personal gains. These are the criminal hackers with bad intentions of manipulating the data or information of a system for some personal motives. They intend to make the attack malicious enough to cause future disfunctionality. Most of these attacks have been reported to have been done by the disgruntled employees or the competitor organizations with confidential motives. This term comes from old western movies that used to represent the guys with the black hats to be evil.
The Black Hats' Purpose
The purpose of black hats hackers to hack is to enter into the secure networks and completely destroy the information for the rightful use by the authorized people. Their aim is to take advantage of the data and leave the data unusable or distorted.
Procedure of Black Hat hacking
This hacking is an extensive procedure. The black hats choose the target computer and then attack. This is a two parts process. The first part is targeting. The hacker determines which network to attack to. This target is of a special interest to the black hats. Sometimes they do the port scan and then gain entry into the network through a vulnerable system. The black hats then retrieve all of the information required through this remote computer.
The part two is the information gathering part. This is the part when the hacker visits the computer in such a way as to find the important information helpful to provide access. There are many ways of doing this e.g. through social engineering or dumpster diving. Social engineering is the process of a hacker’s contacting the administrator and finding out which computer is unable to be used and pretending to be one. Dumpster diving is to gain access to the dumpster and search in the documents that have been discarded by the users and trying to gain access to the network through them.