Black hats is what people would often think about when they hear the term hacker. They can inflict massive amount of damage with the wide variety of techniques at their disposal. One form of an attack that a black hat could use is called DDos or distributed-denial-of-service attack. Which is basically where a hacker would take control of a computer by exploiting its weaknesses and making it the head command point. From there, the hacker would then begin to exploit many other computers which would then be referred to as a zombie. All the intruder has to do is send the command, and all of the compromised systems will send flood attacks to the targeted computer. The flood attacks would overwhelm the target with packets or little bits of information, denying the user of any access. This is just one of the many tricks a black hat has under their sleeves.
On the other hand, white hats or ethical hackers, have the intention to exploit but in order to improve flaws and weakness. A technique that a white hat can use is DNS poisoning. In this attack, the victim is redirected to a different site that looks exactly the same as the intended website. For example, Bob wants to access his bank account and decides to do it online. Little did Bob know, he was re-directed to the hacker's version of bob's bank account. And as he typed in his information, he was simply sending it to the hacker. In order to achieve this attack, the hacker would have had to have changed the IP address or the address that leads to bob's bank account.
One thing that should be kept in mind is that either of these techniques can be implemented for both good and bad intentions. One can only hope that it is an actual white hat and not a black hat in disguise.
Works Cited
"365 Computer Security Training." 365 Computer Security Training RSS. Computer-network-security-training,22 Aug. 2010. Web. 30 Jan. 2013.
Rouse, Margaret."White Hat". What Is ? SearchSecurity,June 2007. Web. 30 Jan 2013.
Rouse, Margaret."Black Hat". What Is ? SearchSecurity,June 2007. Web. 30 Jan 2013.
Rouse, Margaret."Distributed Denial-Of-Service Attack(DDos)". What Is ? SearchSecurity,Nov 2010. Web. 30 Jan 2013.
"What Is a Packet? HowStuffWorks.HowStuffWorks,nd. Web.30 Jan 2013