Hackers can be classified into different categories such as white hat hacker,black hat hackers and grey hat hackers,based on their intent of hacking a system.These different terms old Spaghetti Westerns,where the bad guy wears a black hat,cowboy hat and the good guy wears a white hat.
White Hat Hackers
White hat hackers are also known as Ethical Hackers. They never intend harm a system,rather they try to find out weakness in a computer or a network system as a part of penetration testing and vulnerability assessment.
Ethical hacking is not illegal and it is one of the demanding jobs available in the IT industry.There are numerous companies that hire ethical hackers for penetration testing and vulnerability assessment.
Black Hat Hackers
Black Hat Hackers,also known as Crackers,are those who hack in order to gain unauthorized access to a system and harm its operation or steal sensitive information.
Black Hat Hackers is always illegal because of its bad intent which includes stealing corporate data,violating privacy,damaging the system,blocking network communication,etc.
Grey Hat Hackers
Grey Hat Hacker are blend of both black hat and white hat hackers.They act without malicious intent but for their fun,they exploit a security weakness in a computer system or a network without the owner’s permission of knowledge.
Their intent is to bring the weakness to the attention of the owners and getting appreciation or a little bounty from the owner
Apart from the above well-known classes of the hackers,we have the following categories of hackers based on what they hack and how they do it-
Red Hat Hackers
Red Hat hackers are again the blend of both black and white hat hackers.They are usually on the level of hacking government agencies,top-secret information hubs,and generally anything that falls under the category of sensitive information.
Blue Hat Hackers
A blue hat hackers is someone outside computer security consulting firms who is used to bug-test a system prior to its launch.They look for loopholes that can be exploit and try to uses the term Bluehat to represent a series of security briefing events.
This is a social status among hackers,which is used to describe the most skilled.Newly discovered exploits will circulates among these hackers