Counter hacking is just hacking, the only difference is how you pick your target. And you never know, maybe the owner of the originating system was just another victim. (Hacker breaks in computer A, then precedes to hack computer B leaving trace back to computer A, not the hacker)
It is also against the law in most of developed world.
Counter hacking is just hacking, the only difference is how you pick your target. And you never know, maybe the owner of the originating system was just another victim. (Hacker breaks in computer A, then precedes to hack computer B leaving trace back to computer A, not the hacker)
It is also against the law in most of developed world.