Why Python Is Favorite Programming Language Of Hackers?

Programming knowledge is a must for anyone wanting to be a hacker – this is a no brainer. However, what is so special about Python that is has become the programming language of choice for so many hackers ?

Reasons

Hacking, in the terms we use it means searching for and exploiting system vulnerabilities. System hacking requires a deep technical knowledge, knowledge of methodical testingand a creative application of said knowledge. These work significantly in Python’s favor. Python being a high level language, ignores matters that lower level languages will deal with, allowing one to streamline his attention.Python has a very simple structure and is a strong scripting language.A simple example of this can be seenwhen you write themost basic of all programs – a helloworld program. Below is a comparison between that program written in Java and Python.

This is how it looks in Java:

public class HelloWorld  

public static void main(String[] args{

System.out.println(“Hello, World”);}}

This is how it look in Python: 

print “Hello World!”

World’s five most difficult programming languages to learn


  • Brainfuck

This language is a difficult as the name suggests. Brainfuck was invented by Urban Müller in 1993, in an attempt to make a language for which he could write the smallest possible compiler for the Amiga OS, version 2.0.Brainfuck operateson an array of memory cells, alsoreferred to as the tape, each initially set to zero. There are only 8 commands in the language

The 8 Commands are ><+-.,[]


  • Cow

Cow as in Cow with four legs. The COW programming language was designed with the bovine in mind. Given that cows have somewhat limited vocabulary skills, it seemed natural to incorporate only the words they know into the language. As a result, all instructions are some variation on “moo” which just so happens to be the only word they really understand.Any other word or symbol that isn’t an instruction is ignored entirely. So, spaces can be used or not. Newlines can be used or not. You get the idea. It makes commenting COW programs rather easy as long as you don’t use any words that have aninstruction embedded in it.


  • INTERCAL

The Compiler Language With No Pronounceable Acronym, abbreviated INTERCAL. Expressions that look like line noise.Control constructsthat will make you gasp, make you laugh, and possiblymake you hurl.INTERCAL has many other features designed to make it even more aesthetically unpleasing to the programmer: it uses statements such as “READ OUT”, “IGNORE”, “FORGET”, and modifiers such as “PLEASE”. This last keyword provides two reasons for the program’s rejection by the compiler: if “PLEASE” does notappear often enough, the program is considered insufficiently polite, and the error message says this; if too often, the programcould be rejected as excessively polite.


  • White space

It was released on 1 April 2003, most people thought it was an April Fool’sjoke, but it wasn’t. As you can guess, in the Whitespace language, only spaces, tabs and linefeeds have meaning. The Whitespace interpreter ignores any non-whitespace characters. An interesting consequence of this property is that a Whitespace program can easilybe contained within the whitespace characters of a program written in another language.


  • Chef

Chef is a stack-based language where programs look like cooking recipes.According to the Chef Home Page, the design principles for Chef are:*.Program recipes should not only generate valid output, but be easy to prepare and delicious.*.Recipes may appeal to cooks with different budgets.*.Recipes will be metric, but may use traditional cooking measures such as cups and tablespoons.Hello world looks like this!

Types  of hackers

​1. Script Kiddie – 

Script Kiddies normally don’t care about hacking (if they did, they’d be Green Hats. See below.). They copy code and use it for a virus or an SQLi or something else. Script Kiddies will never hack for themselves; they’ll just download overused software (LOIC or Metasploit, for example) and watch aYouTube video on how to use it. A common Script Kiddie attack is DoSing or DDoSing (Denial of Serviceand Distributed Denial of Service), in which they flood an IP with so much information it collapses under the strain. This attack is frequently used by the “hacker” groupAnonymous, which doesn’t help anyone’s reputation.

2. White Hat –

 

Also known as ethical hackers, White Hat hackers are the good guys of the hacker world. They’ll help you remove a virus or PenTest a company. Most White Hat hackers hold a college degree in IT security or computer science and must be certified to pursue a career in hacking. The most popular certification is the CEH (Certified Ethical Hacker) from the EC-Council.

3. Black Hat – 

Also known as crackers, these are the men and women you hear about in the news. They find banks or other companies with weaksecurity and steal money or credit card information. The surprising truth about their methods of attack is that they often use common hacking practices they learned early on.

4. Gray Hat – 

Nothing is ever just black or white; the same is true in the world of hacking. Gray Hat hackers don’t steal money or information (although, sometimes they deface a website or two), yet they don’t help people for good (but, they could if they wanted to). These hackers comprise most of the hacking world, even though Black Hat hackers garner most (if not all) of the media’sattention.

5. Green Hat – 

These are the hacker “n00bz,” but unlike Script Kiddies, they care about hacking and strive tobecome full-blown hackers. They’re often flamed by the hacker community for asking many basic questions. When their questions are answered, they’ll listen with the intent and curiosity of a child listening to family stories.

6. Red Hat – 

These are the vigilantes ofthe hacker world. They’re like White Hats in that they halt Black Hats, but these folks are downright SCARY to those who have ever tried so much as PenTest. Instead of reporting the malicious hacker, they shut him/her down by uploading viruses, DoSing and accessing his/her computer to destroy it from the inside out. They leverage multiple aggressive methods that might force a cracker to need a new computer.

7. Blue Hat – 

If a Script Kiddie took revenge, he/she might become a Blue Hat. Blue Hat hackers will seek vengeance on those who’ve them angry. Most Blue Hats are n00bz, butlike the Script Kiddies, they have no desire to learn.

Top 5 Deadliest Hackers of All Time

  • ​Jonathan JamesBorn: December 12, 1983 – Died: May 18, 2008

Jonathan James was an American ‘black hats hacker’ who was imprisoned at the age of 16 for committing cybercrime in theUnited States. He was notorious for targeting high-profile organizations. Jameshacked into the computers of the United States’ Department of Defense named ‘Defense Threat Reduction Agency, which is responsible for investigating possible threats to the United States of America. Healso installed an unauthorized backdoor in a computer server in Dulles, Virginia and with the help of it he installed a sniffer to interrupt the messages of DTRA employees, and accessed the usernames as well as passwords of DTRA employees.Furthermore, James accessed the software that obtained source code of the International Space Station which was responsible for maintaining the most sensible as well as critical life-sustaining essentials; as a result, NASA had to shut down its computers for almost three weeks and bore huge loss to seriously secure its systems. NASA stated that “the software supported the International Space Station’s physical environment, including control of the temperature and humidity within the living space.”In 2008, on May 18, James was found dead of a self-inflicted gunshot wound.


  • Kevin Poulsen: ‘Dark Dante’Born in 1965 in Pasadena, California, U.S

Kevin Poulsen a former American black-hathacker was once best-known known as “Dark Dante” for hacking phone systems, especially at radio stations in order to win prizes; later became America’s best-knowncyber-criminal. In 1990, He received the prize the Porsche 944 S2 from Los Angeles KIIS FM. Currently, he is a senior editor at Wired News.Poulsen also tasted the brief celebrity charm in the tech world when he released his book ‘Watchman: The Twisted Life and Crimes of Serial Hacker’ whilst still serving in the federal prison. Upon release, Poulsen joined SecurityFocus, a California-based security research firm , where he would write security and hacking news in the early 2000. Soon, he became a well-known face in tech world and often the mainstream press would pick up his original research report. In 2005, he left thecompany in order to pursue his own careeras freelancer and independent writer but inthe same year in 2005 June he was appointed as a senior editor at Wired News. In 2006, he searched and exposed the report for approximately 744 registered sex offenders who would fantasize sex from children through MySpace.

Nahshon Even-ChaimBorn May 1971

Nahshon Even-Chaim is one of the most powerful and well-known computer hackers of ‘The Realm’, an Australia based computer hacking group of 1980s. He would target the defense and nuclear weapons research networks.In 1980s Even-Chaim would break into systems by dialing in directly through X.25 networks. In April 1990, he was given rigorous imprisonment for 12 months on the basis of tapping into his phone conversations and transmission of the data made by his modem. He was given a total of 15 charges that included Commonwealth Scientific and Industrial Research Organisation in Melbourne, University of California, Berkeley, NASA in Virginia, Lawrence Livermore National Laboratory, in California, Purdue University,West Lafayette, Indiana and many more. Currently, he serves in the IT field.

Mark AbeneBorn 1972, in New York

Mark Abene is a computer security hacker from New York City and was a member of the hacker groups Masters of Deception, a new York based hacker group well-known for hacking telephone companies, and Legion of Doom, who were active in the 1980s and in the late 1990s. Abene is well-known by his pseudonym Phiber Optik. He has been featured in The New York Times, Harper’s, Esquire, in debates and on television and in the non-fiction book Masters of Deception — The Gang that Ruled Cyberspace 1995.At the tender age of 9, Abene’s curiosity about hacking and computer led him to successfully accessing dial-up computers as well as learning several computer languages. In 1990, he was arrested and jailed for 35 months. Today he serves as an independent consultant. Mark Abene has extreme professional experience in information and network security as well as expertise in system and network intrusion. He has been invited in several reputed magazines and journals to talk on the subject of security including the Washington Post, the Wall Street Journal, the New York Times, and Time Magazine. He has been chosen as a keynote speaker at both hacker and security industry conferences worldwide and frequently visits universities to speak to students on information security.

Kevin MitnickBorn on August 6, 1963

Kevin David Mitnick, an American computer security consultant and best-known as “Condor”, was one of the most-wanted computer criminals in the United States. In 1995, he was arrested for several accusation of computer fraud.From the early childhood, Mitnick was passionate about social engineering and once for the sake of “intellectual curiosity” he hacked the Digital Equipment Corporation systems, Motorola, Nokia, Fujitsu Siemens, and several others. In 2002, he published a book ‘The Art of Deception: Controlling the Human Element of Security’ where he exposed his own experiences with hacking.

Cryptography

cryptology, is the practice and study of hiding information. It is sometimes called code, but this is not really a correct name. It is the science used to try to keep information secret and safe. Modern cryptography is a mix of mathematics,computer science, and electrical engineering. Cryptography is used in ATM (bank) cards,computer passwords, and shopping on the internet.When a message is sent using cryptography, it is changed (or -encrypted) before it is sent. The method of changing text is called a “code” or, more precisely, a”cipher”. The changed text is called “cipher -text”. The change makes the message hard to read. Someone who wants to read it must change it back (or -decryptit). How to change it back is asecret. Both the person that sends the message and the one that gets it should know the secret way to change it, but otherpeople should not be able to. Studying the cyphertext to discover the secret is called “cryptanalysis” or “cracking” or sometimes”code breaking”.

World dangerous hacker commits suicide

​Jonathan James: 24 years-old hacker committed suicide in 2008 after being prosecuted.

five years ago Jonathan  James,  the hacker who invaded NASA, also committed suicide after being prosecuted by the same attorney Assistant U.S. Attorney Stephen Heymann, who works in the office of Carmen Ortiz. In his suicide note Jonathan says :

“I have no faith in the ‘justice’ system. Perhaps my actions today, and this letter, will send a stronger message to the public. Either way, I have lost control over this situation, and this is my only way to regain control. sitting in jail for 20, 10, or even 5 years for a crime I didn’t commit is not me winning. I die free.”

Ethical Hacking

Ethical Hacking is to evaluate the security of a system or network in order to find weakness or other malicious activities if possible in the system.

Ethical Hacking is a computer field that involves hacking a computer network or security system belonging to an organization, in order to find the vulnerabilities in the security system of an organization and improving the weak points that could be exploited by other hacker to hack the system. If you are interested in computer and networking and looking for a challenging job than this field can suit you the best.