Hacker Types


Overview


Hackers can be classified into different categories such as white hat hacker,black hat hackers   and grey hat hackers,based on their intent of hacking a system.These different terms old Spaghetti Westerns,where the bad guy wears  a black hat,cowboy hat and the good guy wears  a white hat.

 



White Hat Hackers



White hat hackers are also known as Ethical Hackers. They never intend harm a system,rather they try to find out weakness in a computer or a network system as a part of penetration testing and vulnerability assessment.

Ethical hacking is not illegal and it is one of the demanding jobs available in the IT industry.There are numerous companies that hire ethical hackers for penetration testing and vulnerability assessment.



Black Hat Hackers



 Black Hat Hackers,also known as Crackers,are those who hack in order to gain unauthorized access to a system and harm its operation or steal sensitive information.

Black Hat Hackers is always illegal because of its bad intent which includes stealing corporate data,violating privacy,damaging the system,blocking network communication,etc.



Grey Hat Hackers



Grey Hat Hacker are blend of both black hat and white hat  hackers.They act without malicious intent but for their fun,they exploit a security weakness in a computer system or a network without the owner’s  permission of knowledge.

Their intent is to bring the weakness to the attention of the owners and getting appreciation or a little bounty from the owner



Miscellaneous Hackers



Apart from the above well-known classes of the hackers,we have the following categories of hackers based on what they hack and how they do it-



Red Hat Hackers



Red Hat hackers are again the blend of both black and white hat hackers.They are usually on the level of hacking government agencies,top-secret information hubs,and generally anything that falls under the category of sensitive information.



Blue Hat Hackers



A  blue hat hackers is someone outside computer security consulting firms who is used to bug-test a system prior to its launch.They look for loopholes that can be exploit and try to uses the term Bluehat to represent a series of security briefing events.


Elite Hackers


This is a social status among hackers,which is used  to describe the most skilled.Newly discovered exploits will circulates among these hackers

About Vikas Royal 22 Articles
Hi this is Vikas Royal, im an engineering student,I write blogs on Technical news,hacking news ,gadgets.For more detail mail me on admin@googlebharat.com For more visit my Facebook profile htpps://www.facebook.com/vikasroyal007

Be the first to comment

Leave a Reply

Your email address will not be published.


*