Now… Let’s talk about the other kind of hackers…

--Originally published at Mr. Robot's Imaginary Friend

 

Anyone can become a hacker, you may just be someone who spends too much time with computers and suddenly you find yourself submerged in the world of cyber-security. There are three types of hackers that I will be talking about, the first one is the black hat that.

bh-wh

Black hat hackers have become the most known image of all hackers around the world. The world hacker for most of the computer users has become a synonym for social misfits and criminals. This is just an injustice created by our own interpretation of the mass media, so it is important for us to learn what a hacker is and what a black hat does.

Black hat is a term used to describe a hacker who breaks into a computer system or network with malicious intentions and uses his skills with criminal intent, for example cracking bank accounts, stealing information to be sold in the black market or attacking computer networks of an organization for money.

Some famous cases of black hat hacking include Kevin Mitnick who used his skills to enter the computer of organizations such as Nokia, Fujitsu, Motorola and Sun Microsystems, Kevin Poulsen, who took control of all the phone lines in Los Angeles in order to win a radio contest for a Porsche.

There are professionals that have knowledge about security and vulnerabilities in many platforms and applications, and their goal is to identify and fix their potential threats on their system, those are the ethical hackers or white hat hackers. An ethical hacker attempts to bypass system security and search for weak points that could be exploited by black hat hackers, then this information is used by the organization to improve their system security trying to minimize or eliminate any potential attacks.

For hacking to be

ethical, the hacker must obey the following rules:

  • Expressed permission to probe the network and attempt to identify potential security risks.
  • Respect the individual’s or company’s privacy
  • Don’t leave anything open for you or someone else to exploit at a later time
  • Notify the software developer or hardware manufacturer about vulnerabilities you locate in their system.

The term “ethical hacking” is criticized by people who say that there is no such thing as an ethical hacker. Hacking is hacking no matter how you look at it and those who do the hacking are commonly referred to as cyber criminals. However, this helps organizations to improve their system security and it is shown to be very effective and successful.

A grey hat hacker is someone who is between these two concepts. He may use his skills for legal or illegal acts, but not for personal gain, they use their skill in order to prove themselves that they can accomplish a determined feat, but never do it in order to make money out of it. The moment that they cross that boundary, they become black hat hackers.

Ethical hacking course

Collaboration post with Gabriel Avilés Robles