🧠 Day 2: Hackers vs. Civilians – Inside the Mind of a Hacker
Cyber Defense & Security Practices“To defeat the enemy, you must understand them.”
— Sun Tzu, but make it cyber
🔮 Missed the Last Part:
🕵️♂️ Day 1: Welcome to the Matrix – Why You’re a Target
🎬 Scene: The Hacker’s Lair
Neon lights flicker. Coffee-stained keyboards clatter.
A hoodie-covered figure stares at a wall of code — your password hash just decrypted.
Welcome to the other side of the wire.
But here’s the twist:
Not all hackers are villains. Not all cyberattacks are cinematic explosions.
Some are silent. Cold. Calculated. Efficient.
And most of them don’t start with a computer — they start with psychology.
🧠 Who Are the Hackers?
Let’s lift the veil and look into the different personas in the hacking world:
🕵️♂️ Black Hats
The true adversaries.
Criminal hackers who break into systems for money, chaos, or control.
- Ransomware gangs
- Identity thieves
- Phishing scammers
- Dark web data dealers
They want your information, your identity, or to use your access to get to someone else.
👨💻 White Hats
The good guys.
Ethical hackers who help companies find vulnerabilities before bad guys exploit them.
These are:
- Bug bounty hunters
- Penetration testers
- Cybersecurity engineers
They think like black hats — but fight on the side of defense.
🧢 Gray Hats
Hackers who walk the line.
Sometimes they break the rules, but not to cause harm. More like vigilantes or rogue nerds.
- They might hack a system to expose corruption
- Or scan the internet to warn users of security flaws
Still illegal? Technically, yes.
Malicious? Not always.
💣 Why Do Hackers Hack?
Here’s what drives them:
💰 1. Profit
Ransomware = $$$
Stolen credit cards = $$$
Selling your Netflix login = yep, also $$$
😈 2. Power & Ego
Some hackers just want to prove they can break the system.
It’s not about stealing — it’s about winning.
🤖 3. Ideology
Hacktivists like Anonymous target governments, corporations, or causes they oppose.
🧠 Hacker Tactics 101
Here’s how hackers get in — and why it works:
Attack Type | Tactic Example | Why It Works |
---|---|---|
Social Engineering | “Your account is locked. Click here.” | Trust + urgency |
Phishing Emails | Fake bank or job emails | You don’t double-check |
Malware | Trojan disguised as free software | You clicked download |
Credential Stuffing | Using leaked passwords from old sites | You reused your password |
🧠 Hacker Vocab of the Day: “Reconnaissance”
Recon is the first phase of hacking — finding out everything about the target before launching an attack.
In real life, this means:
- Looking up your LinkedIn
- Finding your email on a breached database
- Checking your IG for clues about password resets
Knowledge is power. And hackers weaponize it.
🎯 Action Step
Start thinking like the enemy:
- 🔍 Google yourself. What could a hacker learn about you from public info?
- 📧 Find an old email address and check https://haveibeenpwned.com
- ❌ Stop reusing passwords. Download a password manager like Bitwarden or 1Password.
🔮 Coming Tomorrow:
🕵️♂️ Day 3: Your Digital Footprint is Bleeding
The internet remembers everything you’ve ever done — even if you forgot.
💻 Stay unpredictable. Stay vigilant. Stay encrypted.
— Saney Alam