Hacker can be classified into different categories such as white hat, black hat and Grey hat, based on their intent of hacking a system. These different terms come from old Spaghetti Westerns, where the bad guy wears a black cowboy hat and the good guy wears a white hat.
White Hat Hackers
White Hat Hackers are also known as Ethical Hackers, They never intent to harm a System, Rather they are try to find out weaknesses in a computer or a network system as a part of penetration testing and vulnerability assessments.
Ethical Hacking is not illegal and it is one of the demanding jobs available in the IT industry. There are numerous companies that hire ethical hackers for penetration testing and vulnerability assessments.
Black Hat Hackers
Black hat hacking is always illegal because of its bad intent which includes stealing corporate data, violation privacy, damaging the system, blocking network communication, etc.
Grey Hat Hackers
Grey hat hackers are a blend of both black hat and white hat hackers, They act without malicious intent but for their fun, they exploit security weakness in a computer system or network without the owner’s permission.
Their intent is to bring the weakness to the attention of the owners and getting appreciation or a little bounty form the owners.
Apart from the above well-known classes of hackers, we have the following categories of hackers based on what they hack and how they do it:—–
Red Hat Hackers
Red hat hackers are again a blend of both black hat and white hat hackers, They are usually on the level of hacking government agencies, top-secret information hubs, and generally anything that falls under the category of sensitive information,
Blue Hat Hackers
A blue hat hacker is someone outside computer security consulting firms who is used to bug-test a system prior to its launch. They look for loopholes that can be exploited and try to close these gaps. Microsoft also uses the term BlueHat to represent a series of security briefing events.
This is a social status among hackers, which is used to describe the most skilled. Newly discovered exploits will circulate among these hackers.
These all are the different type of hackers. And tell us which type of hacking you like ? Give your answer in comment Box.