paint-brush
The Black Hat, the Ethical, and the WHOIS Hackerby@WhoisXMLAPI
2,780 reads
2,780 reads

The Black Hat, the Ethical, and the WHOIS Hacker

by WhoisXML API3mMay 22nd, 2019
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

When the term “hack” is used in mainstream media, it is often in the context of cybercrime and black hat activities. However, ethical hackers are quite the opposite of their malevolent counterpart, having no intent to harm and being on a payroll. Companies contract them to “attack” corporate networks with fierce hacking techniques to test out defenses and spot vulnerabilities. White hat hackers can use WHOIS records to make their simulated scams look even closer to the real ones, identifying questionable registrations and following the same patterns.

Company Mentioned

Mention Thumbnail
featured image - The Black Hat, the Ethical, and the WHOIS Hacker
WhoisXML API HackerNoon profile picture
WhoisXML API

WhoisXML API

@WhoisXMLAPI

Top Whois, DNS, IP and threat intelligence data provider. We provide APIs, databases, and tools.

L O A D I N G
. . . comments & more!

About Author

WhoisXML API HackerNoon profile picture
WhoisXML API@WhoisXMLAPI
Top Whois, DNS, IP and threat intelligence data provider. We provide APIs, databases, and tools.

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite