Cyber Security
Hacker's Mindset
Hacker's Mindset
A hacker is someone who uses their technical knowledge and skills to solve problems, often by exploring and manipulating computer systems, networks, or software. The term can have both positive and negative meanings depending on the context.
Attacker attacks the victim through vulnerabilities to cause threats.
Strong curiosity: Deeply understanding how systems and applications work, which make them stronger than white hackers mostly
Reverse thinking: What if?
Problem-solving and challenge seeking: Finding vulnerabilities or unconventional ways to achieve goals
Creativity and innovation: Using non-traditional methods to hack or protect systems
Analysis and deconstruction: Breaking down software or networks to find weaknesses
Persistence: Trying repeatedly until success
Challenge: Never forgive, and repeat trials
Self-starter: No one should onboard or help him
Networking & Protocols – TCP/IP, DNS, HTTP(S), VPN, NAT
Operating Systems – Deep understanding of Linux, Windows internals
Programming – Python, Bash, JavaScript, C/C++
Web Technologies – HTML, JS, cookies, sessions, REST APIs
Exploitation Techniques – XSS, SQLi, buffer overflow, privilege escalation
Tools Mastery – Nmap, Wireshark, Metasploit, Burp Suite, Aircrack-ng
Cryptography Basics – Hashing, symmetric/asymmetric encryption
Reverse Engineering – Decompiling, debugging, malware analysis
Cloud & Container Security – AWS, Azure, Docker, Kubernetes
Security Frameworks – OWASP, MITRE ATT&CK, NIST, ISO 27001
Business understanding: Can understand business and lifecycle
Destruction (Data/Infrastructure)
Disturb service availability
Data exploits
Money stealing
Wars
Revenge
Hacker, we call him also MITM: Man-in-the-Middle attack — intercepting communications, you should have End-to-end encryption, HTTPS, and VPN.
We have different types of hackers as follows:
White Hat
Ethical hackers who test security
Help improve security
Penetration testers, security researchers
Black Hat
Malicious hackers who exploit systems
Financial gain, disruption
Cybercriminals, ransomware attackers
Red Hat:
Anti Black-Hat Hackers
Gray Hat
Between white and black — may hack without permission, but not for harm
Often curiosity or “hacktivism”
Hackers who disclose vulnerabilities publicly
Green Hat:
New to hacking
Willing to learn
Blue Hat:
Looking for revenge
Script Kiddies
Inexperienced hackers using tools made by others
Thrill, notoriety
Novice attackers using public exploits
Hacktivists
Hackers driven by political/social causes
Protest, activism
Anonymous group
State-Sponsored
Hackers working for governments
Espionage, sabotage
APT groups (e.g., Fancy Bear)
Insiders
Employees or contractors abusing access
Revenge, financial gain
Disgruntled employees
Cyber Terrorists
Use hacking to cause terror or fear
Political or ideological
Attacks on critical infrastructure
Red team
Ethical hackers who test security
Help improve security
Penetration testers, security researchers
Blue team
Malicious hackers who exploit systems
Financial gain, disruption
Cybercriminals, ransomware attackers
Purple team
Anti Black-Hat Hackers
Thrill, notoriety
Novice attackers using public exploits
Hacktivists
Hackers driven by political/social causes
Protest, activism
Anonymous group
State-Sponsored
Hackers working for governments
Espionage, sabotage
APT groups (e.g., Fancy Bear)
Insiders
Employees or contractors abusing access
Revenge, financial gain
Disgruntled employees
Cyber Terrorists
Use hacking to cause terror or fear
Political or ideological
Attacks on critical infrastructure
Virus
Created by Developed by Scripts kiddies(هاكرز هواة) or black hat hackers or governments
Attaches to files and activates when the user runs the file
Auto-Spread
Does not steal data (sometimes)
Cause Damage
Downloading/executing infected files or macros
Worm
Created by Professional hackers, Black Hat Hackers
Self-replicating, spreads via networks
Auto-Spread
Steal data
Cause Damage
Exploiting network/system vulnerabilities
Storm
Famous worm that created a botnet (Storm Worm, 2007)
Auto-Spread
Steal data
Cause Damage
Email attachments (“Storm alert” subject lines)
Trojan
Created by Black Hat Hackers, Cybercriminal groups
Masquerades as legitimate software
Not Auto Spread
Steal data
Cause Damage
User installs fake or malicious app
Ransomware
Created by Organized cybercrime groups, Black Hat Hackers
Encrypts data and demands ransom
Auto-spread(often via Trojan)
Steal data
Cause Damage (critical)
Phishing emails, malicious links, file downloads
Spyware
Created by Black Hat Hackers, Government-backed teams
Secretly monitors and collects user data
Not auto-spread
Steal data
Does not Cause Damage
Bundled with software, phishing, and browser exploits
Rootkit:
Created by Advanced hackers, Nation-state actors
Definition: A rootkit is a malicious software or a set of tools designed to hide itself or other malware on a system, allowing an attacker to maintain control without being detected by the user or standard security software.
Name comes from “root” (highest privilege in UNIX/Linux) + “kit” (collection of tools).
APT
Created by Nation-state or government
Long-term stealthy attack by an organized group
Not auto-spread
Steal data(targeted)
Cause Damage (strategic)
Spear-phishing, zero-day exploits, social engineering
Potential Harmful apps
Mobile Apps, Games, Battery repair, Space utilization, fake whatsapp,...
Persona Development:
Values
Steal sensitive data:
Target: Personally Identifiable Information (PII), financial records, intellectual property.
Motivation: Sell on dark web, leverage for blackmail, or use for competitive advantage.
Steal assets
Target: Digital transactions, proprietary code, operational technology.
Motivation: Direct monetary gain or disruption of competitor operations.
Impact reputation
Target: Public trust, brand credibility, shareholder confidence.
Motivation: Cause market damage, incite public backlash, or force compliance with demands.
Characteristics
Tech expert: Deep knowledge in exploit development, reverse engineering, and security bypass techniques.
Patient: Willing to remain undetected for weeks or months to maximize exploitation opportunities.
Multi-Vector capabilities:
OS: Privilege escalation, kernel exploits, persistence mechanisms.
Infra: Network pivoting, VPN compromise, lateral movement
DB: SQL injection, privilege abuse, backup theft
Dev: Supply chain attacks, code repository poisoning, build process compromise.
How to use this persona:
Translate each value into mandatory security requirements.
Example: “Steal Sensitive Data” → encryption-at-rest, data classification, access reviews.
Integrate security acceptance criteria for every functional requirement.
Design layered defenses mapped to each characteristic.
OS: Harden builds, enable least privilege, enforce patch management.
Infra: Network segmentation, zero-trust authentication.
DB: Dedicated DB firewalls, query whitelisting.
Dev: Signed commits, secure CI/CD pipelines, dependency scanning.
Simulate persona’s multi-vector methods in red team exercises.
OS layer: Privilege escalation tests.
Infra layer: Lateral movement detection.
DB layer: Injection testing.
Dev layer: Supply chain penetration testing.
Persona Development:
Who?
Definition: Harmful activity by someone with legitimate or formerly legitimate access (employee, contractor, partner). Includes malicious, negligent, and compromised insiders.
Values
Financial Gain:
Selling customer data or intellectual property.
Direct theft of money or facilitating fraud.
Espionage:
Stealing trade secrets or government information.
Providing intelligence to competitors or foreign entities.
Sabotage:
Disrupting critical systems (infrastructure, production).
Destroying or altering data to harm the organization.
Data Theft:
Accessing sensitive data: PII, financial data, research, source code.
Using stolen data for blackmail or resale.
Revenge:
Damaging the organization due to personal grievances or job terminatio
Tarnishing the company’s reputation.
Facilitating External Attacks:
Creating backdoors for external attackers.
Sharing credentials or network secrets with hacker groups.
Ideological / Hacktivism: Promoting a political or social agenda.
Leaking information to embarrass or pressure the organization.
Characteristics
Environment expert
Business knowledge expert
Solution expert
TTPs means Tactics, Techniques, and Procedures used by attackers, especially in cybersecurity frameworks like MITRE ATT&CK
Tactic: Gain higher access rights than intended.
Techniques:
Password spraying, brute force, keylogging.
Exploiting weak permissions or misconfigurations.
Pass-the-Hash / Pass-the-Ticket attacks.
Impact: Lateral movement, access to sensitive data, data staging.
Tactic: Move across the network after initial access.
Techniques:
Remote Desktop Protocol (RDP), SMB exploitation, WMI, PsExec.
Using stolen credentials or session tokens.
Impact: Expands attack surface, reaches high-value targets.
Tactic: Prepare and transfer sensitive data out of the network.
Techniques:
Compressing/encrypting files for transfer.
Using cloud storage, email, removable media, or FTP.
Tunneling via DNS or HTTP.
Impact: Data theft, intellectual property loss, regulatory exposure.
Tactic: Exploit unsanctioned services or personal SaaS accounts.
Techniques:
Upload sensitive files to personal cloud storage.
Using unauthorized apps or services to bypass security controls.
Impact: Data leaks, policy violations, compliance issues.
Tactic: Manipulate humans to reveal credentials or sensitive info.
Techniques:
Spear phishing, baiting, pretexting.
Business Email Compromise (BEC).
Impact: Initial access, spreading malware, insider recruitment.
Tactic: Install software to maintain persistent access.
Techniques:
Keyloggers, ransomware, spyware, custom Trojans.
Backdoors in legitimate software.
Impact: Persistent control, spying, data theft, encryption attacks.
Tactic: Leverage system flaws or misconfigurations.
Techniques:
Open ports, default credentials, unpatched software.
Weak firewall rules, excessive privileges.
Impact: Easy compromise, escalation, persistence.
Tactic: Avoid detection and forensic analysis.
Techniques:
Log tampering, timestamp modification.
Using encryption, packing, or obfuscation.
Impact: Prolonged undetected presence, stealthy exfiltration.
Dr. Ghoniem Lawaty
Tech Evangelist @TechHuB Egypt