Learning Library

← Back to Library

Know Your Enemy: Hacker Taxonomy

Key Points

  • The speaker frames cybersecurity threats through Sun Tzu’s principle “know your enemy,” emphasizing that understanding attackers is essential for effective defense.
  • For the purpose of the discussion, “hacker” is defined (following Google) as a person who uses computers to gain unauthorized access to data, distinguishing them from non‑malicious tech enthusiasts.
  • Hackers are first categorized by the “hat” they wear: black‑hat (no permission, malicious intent), white‑hat (authorized, defensive testing), and gray‑hat (unauthorized but claiming a benevolent motive).
  • A second classification looks at skill level, ranging from low‑skill “script kiddies” who run pre‑written tools to highly skilled adversaries capable of crafting custom exploits.
  • The speaker stresses that attackers are diverse and cannot be painted with a single broad brush, urging a nuanced, multi‑dimensional taxonomy when assessing cyber threats.

Full Transcript

# Know Your Enemy: Hacker Taxonomy **Source:** [https://www.youtube.com/watch?v=TK8_qFp79nM](https://www.youtube.com/watch?v=TK8_qFp79nM) **Duration:** 00:10:38 ## Summary - The speaker frames cybersecurity threats through Sun Tzu’s principle “know your enemy,” emphasizing that understanding attackers is essential for effective defense. - For the purpose of the discussion, “hacker” is defined (following Google) as a person who uses computers to gain unauthorized access to data, distinguishing them from non‑malicious tech enthusiasts. - Hackers are first categorized by the “hat” they wear: black‑hat (no permission, malicious intent), white‑hat (authorized, defensive testing), and gray‑hat (unauthorized but claiming a benevolent motive). - A second classification looks at skill level, ranging from low‑skill “script kiddies” who run pre‑written tools to highly skilled adversaries capable of crafting custom exploits. - The speaker stresses that attackers are diverse and cannot be painted with a single broad brush, urging a nuanced, multi‑dimensional taxonomy when assessing cyber threats. ## Sections - [00:00:00](https://www.youtube.com/watch?v=TK8_qFp79nM&t=0s) **Defining the Hacker as Enemy** - The speaker clarifies that, for the purpose of his cyber‑security discussions, a “hacker” refers specifically to a malicious individual who gains unauthorized access to data, invoking Sun Tzu’s principle of knowing one’s enemy. ## Full Transcript
0:00if you've seen my videos on this channel 0:02you know I talk about cyber security and 0:04make a lot of references to the bad guys 0:07who are these folks what do they do why 0:10do they do it let's peel back the layers 0:12and get a better understanding 0:14this guy Sun Tzu wrote a book about 2500 0:17years ago called The Art of War and in 0:19that he said if you know the enemy and 0:22know yourself you need not fear the 0:24result of a hundred battles to shorten 0:26that it's basically know your enemy well 0:29so who is the enemy well we use a lot of 0:31different kinds of terms to describe 0:33these folks and to be honest with you 0:36there's some debate as to what the 0:37definition should be so I'm going to 0:39tell you what I'm going to Define it as 0:41in this context when I use the term 0:43hacker I'm referring to not for instance 0:47a geek who's really great at a hackathon 0:49and can win that contest really has a 0:52lot of technical skills I'm also not 0:54referring to a really bad golfer because 0:56that's another definition of the term 0:58hacker I'm referring to a bad guy now 1:01again there is some disagreement as to 1:04whether that's how the term should be 1:06used because there are a lot of people 1:07who are on the good side of computer 1:10security that also use that term to 1:12apply to themselves so apologies to 1:14those who want a different definition 1:16I'm going to go with what Google says 1:18since that's one of the most common 1:20things that I think people would 1:21understand and that is a person who uses 1:24computers to gain unauthorized access to 1:26data so what about these folks if Sun 1:30Tzu said we need to know our enemy what 1:32do we need to know about these guys well 1:34it turns out they're not all the same we 1:37can't paint them with a single broad 1:38brush and really have a good 1:40understanding of what they do so let's 1:42talk about the different types of 1:44hackers that we might have 1:46the different types of adversaries if 1:49you choose that term and prefer that 1:50instead well we can think of them along 1:53a number of different dimensions 1:56think of this as a taxonomy or 1:57classification system and this first one 2:00I'm just going to refer to as the hat 2:02that they wear 2:04you could have black hat hackers and 2:07white hat hackers and then even someone 2:10in between the gray hats so the the 2:13difference between a white hat hacker 2:15and a black hat is really simple it's 2:17consent a black hat does not have 2:20permission to break into your system a 2:22white hat does a white hat hacker would 2:25be someone who is under contract you've 2:28hired them to do a penetration test and 2:29see if they can get into your system and 2:31they are following certain rules the 2:33black hat is doing it for different 2:35reasons and then a gray hat is someone 2:37who may not have permission but they 2:39think they're doing something good so 2:41they're in that gray area so that's one 2:43way of classifying the the people that 2:45are trying to break into systems another 2:48is their skill type 2:50I think many times we assume that all 2:53hackers are super skilled and in fact 2:56they're not in fact we have script 2:57kitties that are on one end of the 3:00spectrum who are just downloading code 3:01and running it and then we have the 3:03elite hackers and everything again in 3:06between so that's another way of looking 3:08at what is an adversary and it's based 3:11upon their skill abilities another thing 3:15is ttps 3:18this is 3:20tactics techniques and procedures so in 3:23other words what are they doing when 3:25they do it what kinds of tools do they 3:27use and what are their ultimate 3:28objectives so there could be crackers 3:30those are people that are trying to 3:32break into cryptography there could be 3:34malware Riders there could be denial of 3:37service attackers there are pin testers 3:40penetration testers so they're using 3:42different kinds of tools to do that 3:44doing vulnerability scans and things 3:46like that social Engineers are another 3:48one that are not really hacking the 3:50systems they're kind of hacking the 3:51people they're basically doing a con 3:53game on the individuals in order to get 3:55into a system 3:57another way to look at at these 4:00attackers would be motive 4:04what's the reason that they're doing 4:05what they're doing well there could be a 4:08number of motives for instance piracy I 4:10want to get a movie and make copies of 4:13it so all my friends can can watch the 4:15movie and not pay for it uh there could 4:17be uh profit that is I'm wanting to make 4:21money from my activities or there could 4:23be politics so any one of those three 4:26three p's piracy profit and politics 4:31could be the reason that we're doing 4:33this 4:34another motivation or another actually 4:37classification that we could look at 4:38would be targets 4:40so what is this person going after 4:44the target might be a bank it might be a 4:46nation state it might be individuals so 4:50it could be any of those as well and 4:52again the way we look at at the way they 4:54attack would be different depending on 4:55which one of those things they're going 4:57after and then a much more controversial 4:59one would be the psychology of the 5:02attacker so we've got a range here as 5:05well this could be someone who is a 5:07sociopath it could be a misfit it could 5:10be a criminal so there's a lot of 5:12different elements here also to consider 5:15so this is showing you I hope that 5:18there's a much more complex definition 5:21as to what an attacker would would look 5:23like the things that are motivating them 5:25the things they're doing and why they're 5:27doing it so here is a different way 5:30that's a fairly complex view that we 5:33would have to do a multi-dimensional 5:35matrix in order to map all of that out 5:36I'm going to try to give you a more 5:38simple taxonomy that I think captures 5:41most of these aspects it's not perfect 5:44nothing's going to capture all of these 5:46but this is one that we can at least 5:48consider as a as a more simple version 5:51so we've got different types of hackers 5:54and I'm going to say Roger Grimes 5:57writing an article for infoworld.com 5:59came up with this and then I'm going to 6:01add a few to it the work that he did I 6:04think is really solid so that's why I'm 6:05citing it so we've got criminals 6:10these are the ones who are breaking in 6:12for a lot of the kinds of reasons that 6:13we've talked about that's one type of 6:15hacker we've got spammers 6:17so this is a different kind of attack 6:20the spammer is doing much more of just 6:24overloading the system or overloading 6:26the person's mind and trying to con them 6:28in this is a little more of social 6:30engineering if you think of it that way 6:32we've got things that are called apts 6:35advanced persistent threats this is 6:38usually the work of nation states and 6:41and Departments of defense and things 6:43like that where they are using really 6:45Advanced capabilities they're looking 6:46for zero days a zero day is something 6:49where there's a vulnerability in the 6:51software for which there is no patch so 6:53no one has a good protection against it 6:56right away so this is very elite kind of 6:59stuff then we have corporate spies 7:04these are people that are motivated by 7:07profit they're trying to steal corporate 7:09Secrets intellectual property from some 7:11organization in order to use it in their 7:13organization 7:14then we have pactivists 7:18what's a hacktivist well a hacktivist is 7:20someone who's hacking for a cause this 7:22is basically a political or social 7:24statement that they're trying to make 7:26they disagree with what a given 7:28organization is doing so they're going 7:30to attack that website in order to let 7:32their displeasure be known this could 7:34take the form of basically e graffiti 7:37where I'm marking up their website or it 7:41could be denial of service where I'm 7:42taking their website down and to try to 7:44make a point others could be cyber 7:47Warriors 7:50these are basically fighters who fight 7:53not on the battlefield but their 7:54Battlefield is in cyberspace and we see 7:58more and more the rise of the Cyber 8:00Warrior as militaries become more and 8:02more modern it's an asymmetric threat 8:04meaning any organization any country 8:07with a computer can have a cyber warfare 8:11capability so the barrier to entry is 8:15very low 8:16then we have Rogue hackers 8:20these are people who operate sort of 8:22outside of all of these other 8:24constraints 8:25they really defy definition in many 8:28cases and their motivations are not 8:30always clear at least not obvious to us 8:33in every case so this was the work that 8:35I mentioned earlier I'm going to add a 8:37couple more categories here 8:41and that is 8:43The Accidental 8:45hacker the one who maybe is in your 8:47organization who doesn't mean ill 8:49doesn't have any malicious and tit but 8:52they misconfigured a system so now it 8:55ends up taking the system down or they 8:58have malware installed on their system 9:00that they didn't realize and now they're 9:02basically the source of an attack on the 9:04organization so an accidental even 9:07though their intentions might not be bad 9:09their actions and the effects can be the 9:12same and then 9:14the last category I'm going to mention 9:16is one that is rising more and more 9:20and this is the Cyber stalker this is 9:23someone who puts some sort of malware 9:25some sort of spyware on maybe your phone 9:28your computer your tablet and then 9:31they're able to look at all your 9:33activities everywhere you go they follow 9:35and see the GPS location they can read 9:38your emails your text messages turn on 9:40the camera turn on the microphone on 9:42your device and listen to your 9:43conversations this is a substantial 9:47threat so hopefully you can see from all 9:49of these there are a lot of different 9:50reasons why adversaries try to break 9:53into systems so when I talk about the 9:55bad guys I want us to have a better 9:57understanding of what those bad guys are 10:00hopefully now that we you have a better 10:02understanding this is a much more 10:04complex much more nuanced subject than a 10:07lot of people would realize so take some 10:10of your stereotypes and throw them away 10:11and start thinking about more the 10:13complexity of what this space really 10:15looks like 10:16and just remember if you're satisfied 10:18with your security so are the bad guys 10:21that means we need to follow the advice 10:23of Sun Tzu we need to know our enemy so 10:26that we can fight the bad guys 10:29thanks for watching if you found this 10:31video interesting and would like to 10:32learn more about cyber security please 10:34remember to hit like And subscribe to 10:36this channel