Are YOU One of Us? (Levels of Hacker)

imac67_e0Hello! I’m here again. Yeah going to type another blog post. It took me another week just to post something here since I’m thinking of my next topic to discuss. So after you have read my first post about some historical facts of hacking, I’m going to share to you the levels of hacker and what do they really do in their own skills.

I visited the site about Hacker Test. A simulation test with 20 levels that will need different skills to get to another step of the game and this meaning is written based on their website. (There are a lot of games about hacking you can also try if you want: 10 fun (and safe) ways to pretend to be a hacker). I tried the Hacker Test for myself but I have not reached the next 14 levels of the game. Well, I don’t know but maybe my web browser does not cooperate with me when I’m typing those password on some of each level the website ask. If you are asking about my system environment:

MS Windows 8 Pro 32-bit

AMD Sempron Processor 140 Processor, 2.0GB RAM, NVIDIA GeForce 6150SE nForce 430

Browser: Mozilla Firefox 18.0.1

I am not that good into those kind of games and I don’t even consider myself as a hacker even though I do some of their skills when it comes to tweaking and coding from system application to networking. Lot of young professionals or even young students that even they are not into programming and IT related courses, they know so much about hacking. And with this kind of skills and talents they have where can we level them? As a reader, where do you consider yourself to be?


I found some good articles to read online and it also gave me an idea what are the other ranks or levels of the hackers based on their skills aside from the usual White, Black and Grey Hat. Eric Chabrow from his web page wrote an article about 7 Levels of Hackers Applying an Ancient Chinese Lesson: Know Your Enemies. It’s from Stuart Coulson (a director of the British hosting provider, in an article on the U.K. website who identifies seven levels of hackers and the higher the number, the greater the danger they pose.

Three Hats

1. Script Kiddies: Essentially bored teens with some programming skills who hack for fun and recognition. They’re thrill seekers.

(I just want to add from this area is another web article from Tedifa – The Skill Levels of Hacker):

a)      Elite: Also known as 3l33t, 31,337, or a combination of that, is the spearhead of the network security industry. They get out in the operating system, able to configure and connect a global network. They are like stealth can enter the system undetected.

b)      Semi Elite: These hackers are usually younger than the Elite. They also have the ability and extensive knowledge of computer. They understand all the operating systems (including holes). Usually equipped with a small amount enough to change the program exploits the program.

c)       Developed Kiddie: The term is primarily because this age group are young (ABG) and still in school. They tried various platforms to ultimately succeed and proclaimed victory to another. Generally they are still using the graphic user interface (GUI) and just learn the basic of UNIX, without being able to find a new weakness hole in the operating system.

d)      Lamer: They are people without experience and knowledge who want to become hackers. Use of their computers mainly to play games, IRC, exchange of personal software, steal credit card. Usually done by using software hacking Trojans, and DoS nuke. Usually boast etc. via IRC channels.

2. The Hacking Group: A loose collection of script kiddies who wield more power as a collective than as people, and can cause serious disruption to business.


3. Hacktivists: Collectives that often act with a political or social motivation. Anonymous is the best known hacktivist group that has been credited – or blamed – with attacks against child-porn sites, Koch Industries, Bank of America, NATO and various government websites.

4. Black Hat Professionals: Using their expert coding skills and determination, these hackers generally neither destroy nor seek publicity but figure out new ways to infiltrate impenetrable targets, developing avenues of attacks that could prove costly for governments and businesses.

5. Organized Criminal Gangs: Led by professional criminals, these serious hackers function within a new structure, guided by strict rules to ensure their crimes go undetected by law enforcement.

6. Nation States: With massive computing power at their disposal, they target critical infrastructure, military, utilities or financial sectors.

7. The Automated Tool: Fundamentally, it’s a piece of software that acts like a worm virus and tries to affect as much as possible to give itself the largest possible framework. “A well-crafted tool could be used by any one of the other six criminal types,” Coulson says.


I believed that this levels of hackers or “not all that fall into the hacker group are cybercriminals. Not all are hun”, on which Mr. Coulson also shared. Some of them just want to explore something, learn new skills and because they are curious. He also said that not all (referring to hackers) are human. For me, it is because usually hacker can be an application and tools on which once you clicked it will lead to some cause of action like PC and email viruses. This may also cause failure of other business system and


You cannot figure who the lead of this hacking on one system are.  Even knowing your enemies and getting to know them won’t be easy because as what Mr. Chabrow shared on his post, “we don’t know much about the other levels that pose the greatest threats to information security.”


So on what level do you consider yourself to be? Are you one of those Elite forces? Anonymous group? Or just one of those Kiddies who want to explore what does computer and internet can do besides from searching, browsing and streaming online?



2 Replies to “Are YOU One of Us? (Levels of Hacker)”

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s