{"id":287,"date":"2022-09-01T17:17:20","date_gmt":"2022-09-01T17:17:20","guid":{"rendered":"https:\/\/codecrypt76.com\/?p=287"},"modified":"2022-11-25T16:52:56","modified_gmt":"2022-11-25T16:52:56","slug":"three-type-of-hackers","status":"publish","type":"post","link":"https:\/\/codecrypt76.com\/index.php\/2022\/09\/01\/three-type-of-hackers\/","title":{"rendered":"Three Type of Hackers"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"1024\" height=\"538\" src=\"https:\/\/codecrypt76.com\/wp-content\/uploads\/2022\/08\/white-hat-grey-hat-black-hat-1024x538.png\" alt=\"Hackers\" class=\"wp-image-321\" srcset=\"https:\/\/codecrypt76.com\/wp-content\/uploads\/2022\/08\/white-hat-grey-hat-black-hat-1024x538.png 1024w, https:\/\/codecrypt76.com\/wp-content\/uploads\/2022\/08\/white-hat-grey-hat-black-hat-300x158.png 300w, https:\/\/codecrypt76.com\/wp-content\/uploads\/2022\/08\/white-hat-grey-hat-black-hat-768x403.png 768w, https:\/\/codecrypt76.com\/wp-content\/uploads\/2022\/08\/white-hat-grey-hat-black-hat-1536x806.png 1536w, https:\/\/codecrypt76.com\/wp-content\/uploads\/2022\/08\/white-hat-grey-hat-black-hat.png 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption>3 Different types of Hackers: White Hats, Gray Hats and Black Hats<\/figcaption><\/figure>\n\n\n\n<h2>Introduction<\/h2>\n\n\n\n<p>The purpose of the article is to discuss the 3 different type of hackers. The word \u201cHacker\u201d is usually used in a negative connotation to describe a person who engages in cyber criminal activities. Hackers are often stereotyped as a dark hooded tech-savant swiftly typing on a custom keyboard wrecking havoc on a network. However, the act of hacking is not an illegal activity unless it is done without the owner\u2019s permission.<\/p>\n\n\n\n<h2>What is Hacking?<\/h2>\n\n\n\n<p>Computer hacking refers to the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of the creator\u2019s original objective&nbsp;(<a href=\"https:\/\/cyber.laws.com\/hacking\" target=\"_blank\" rel=\"noreferrer noopener\">Cyber Laws, 2019<\/a>). Those individuals who engage in computer hacking activities are typically referred to as \u201chackers.\u201d Hackers are generally categorized into three groups; Black hat, Grey hat and White hat hackers. The terms come from old spaghetti westerns, where the bad guy wears a black cowboy hat, and the good guy wears a white hat (<a href=\"https:\/\/us.norton.com\/internetsecurity-emerging-threats-what-is-the-difference-between-black-white-and-grey-hat-hackers.html\" target=\"_blank\" rel=\"noreferrer noopener\">Norton, 2021<\/a>). The two key factor that differentiate these groups are their motivations, and whether or not the hacker had authorization to complete certain tasks.<\/p>\n\n\n\n<h2>White Hat Hackers<\/h2>\n\n\n\n<p>White Hat hackers, sometimes called \u201cethical hackers,\u201d are those with&nbsp;<em>good<\/em>&nbsp;intentions. Typically, White Hat hacker are hired by organizations to do exactly what Black Hat hackers do \u2014 look for vulnerabilities in a system. &nbsp;The primary difference is&nbsp;<em>they have permission to break into a system.<\/em>&nbsp;White Hat hackers perform penetration testing, test in-place security systems and perform vulnerability assessments for companies. There are even courses, training, conferences and certifications for ethical hacking. White Hat hackers search for holes and vulnerabilities in a given system and enable organizations to harden their systems before the bad guys get in. (Hardening is the process of making a system more secure and reducing the risk of future attacks). Once vulnerabilities are detected, the White Hat hacker will either advise the owner on how to handle the issues or take the initiative and resolve the issues themselves. This is to ensure that the security holes are not discovered by another unscrupulous third party in the future.<\/p>\n\n\n\n<h2>Black Hat Hackers<\/h2>\n\n\n\n<p>Conversely, Black hat hackers are cyber criminals and usually possess an extensive knowledge of breaking into computer networks systems and bypassing security protocols. They are also responsible for writing malware, viruses and ransomware. The Black Hat\u2019s primary motivations is usually for personal or financial gain, but they can also be involved in cyber espionage, protest or perhaps are just addicted to the thrill of cyber crime. Black hat hackers not only seek to steal data, they also seek to modify or destroy data as well.<\/p>\n\n\n\n<h2>Grey Hat Hackers<\/h2>\n\n\n\n<p>Grey Hat hackers land somewhere in the middle between \u201cgood\u201d and \u201cbad.\u201d They typically search for vulnerabilities in a system&nbsp;<em>without permission.&nbsp;<\/em>If a Grey Hat hacker discovers a vulnerability, they may inform an organization that they discovered an exploit and subsequently ask for a fee to fix it. However, if the organization does not respond in a timely manner or if they do not comply at all then the Grey Hat hacker may become a Black Hat hacker. In this case, the Gray Hat my choose to post the methods of the exploitation on the internet for all the world to see or even exploiting the vulnerability themselves. Technically, the work of a Grey Hat hacker is illegal no matter their intentions since they did not have permission to try and break into a system.<\/p>\n\n\n\n<h2>Conclusion<\/h2>\n\n\n\n<p>Hackers are a vital part of the cybersecurity world. Although the word hacker tends to evoke negative connotations when referred to, it is important to remember that all hackers are not created equal. If we didn\u2019t have white hat hackers diligently seeking out threats and vulnerabilities before the black hats can find them, then there would probably be a lot more activity involving cyber criminals exploiting vulnerabilities and collecting sensitive data than there is now.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn the difference between White , Gray, and Black Hats hackers.<\/p>\n","protected":false},"author":1,"featured_media":321,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[17,57],"tags":[38,56],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/codecrypt76.com\/index.php\/wp-json\/wp\/v2\/posts\/287"}],"collection":[{"href":"https:\/\/codecrypt76.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/codecrypt76.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/codecrypt76.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/codecrypt76.com\/index.php\/wp-json\/wp\/v2\/comments?post=287"}],"version-history":[{"count":5,"href":"https:\/\/codecrypt76.com\/index.php\/wp-json\/wp\/v2\/posts\/287\/revisions"}],"predecessor-version":[{"id":425,"href":"https:\/\/codecrypt76.com\/index.php\/wp-json\/wp\/v2\/posts\/287\/revisions\/425"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/codecrypt76.com\/index.php\/wp-json\/wp\/v2\/media\/321"}],"wp:attachment":[{"href":"https:\/\/codecrypt76.com\/index.php\/wp-json\/wp\/v2\/media?parent=287"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/codecrypt76.com\/index.php\/wp-json\/wp\/v2\/categories?post=287"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/codecrypt76.com\/index.php\/wp-json\/wp\/v2\/tags?post=287"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}