Skip to main content

What Actually Black Hat Hackers, White Hat Hackers & Gray Hat Hackers Are?







       We all are aware from the term hacking and one who perform this activity is called as hackers. Basically hackers is a skilled computer expert who uses their knowledge (technical) to break the security or just to overcome a security problem.
      
  There are three types of hackers in the world.
  1. Black Hat Hacker - criminals

  2. White Hat Hacker - ethical hackers who work to protect systems from black hat hackers

  3. Gray Hat Hacker - dabble in both black hat and white hat hackers




Black hat hackers:

       Hacking can be done for any intention that may be good or bad. The Black hat hackers performs hacking for bad intention. They do hacking unethically.
These types of hackers usually hack systems for following gains:


  1. Personal Gain- for example stealing personal data like credit card number, harvesting personal information for sale to identity thieves etc.
  2. Destroy Data – black hat hackers are very dangerous that if anyone or any company they don’t like or they have anger on anyone then they hack their systems or websites and Destroy(like DDOS attack etc.).
  3. Financial Gain – Stealing bank details and you know what will happen next……
Black hat hackers finds “Zero Day” vulnerability and sell it to various criminal organizations in the black market, the example of black market is Dark Web.
Simply the Black hat hackers are those who use their skills and ability for criminal purpose.



White hat hackers:

       White hat hackers are simply opposite to Black hat hackers. White hat hackers are also expert in compromising cyber security but they use their knowledge and ability for good and ethical purpose not for bad purpose.
White hat hackers are also known as Ethical hackers that they use their knowledge in ethical way.


       White hat hackers don’t hack any system or any user’s personal details until and unless they are not allowed to do so. Non of white hat hackers do illegal thing. White hat hackers are hired to perform some hacking attacks to check what’s the problem with the security and how to avoid the attacks. They get rewarded for it.
       You might be heard that most of big companies where high security is provided, those companies security is managed by the groups of white hat hackers.

Gray hat hackers:

      From the name gray hat you get to know that they are not white hat or black hat hackers. Actually it is the combinations of white and black hat hackers.


       You might be confused… but don’t worry I’m here man…
Actually Gray hat hackers can do both ethical and unethical things and it depends on the hackers that what they have to do according to situation. Like they can provide you security and can hack your system or personal data also without your permission.
       In most of cases they first hack your system and then tell you about the vulnerability in your system. But in this case many of gray hat hackers get arrested because they have done it unethically or illegally.
Gray-hat hacker didn’t use their access for bad purposes, they compromised a security system without permission, which is illegal.


So you might be cleared about the term white hat, black hat and gray hat hackers and also you got to know that which types of hacker comes in which category.

Comments

Popular posts from this blog

CREATE AN ANTIVIRUS USING COMMAND PROMPT

In this article we are going to create an antivirus using simply a notepad. It will delete all simple micro viruses in your system. Type the following code into Notepad: @ echo off echo off turn off the active virus taskkill / F / IM  virus1.exe / IM  virus2.exe echo Deleting all of viruses based on size for / RC: \%% a in (*. exe) do if%% ~ za 157,184 equ del / A: HSRA "%% a" echo deleting hidden virus echo for drive c and subfolders for / R C: \%% a in (*. doc.exe) do del "%% a" echo for drive d an d subfolders for / R D: \%% a in (*. doc.exe) do del "%% a" echo Unhide Documentcd / d c: \ echo for drive C and subfolders *. doc attribHSA / S cd / d d: \ echo for drive D an d subfolders *. doc attribHSA / S exit Here, text in green is alert message and text in red are the program that your system will search for those and delete these files. Now, Save the file with .bat extension , For example antivirus.bat. then go

5 Amazing Tech Facts You Definitely Haven't Heard About

Qwerty Keyboard Was Designed To Slow You  Down        This keyboard design is for latin-script alphabets. The name QWERTY (pronounced as kwirti) came from the first 6 letter in order of kays from top left letter row.        When the type writer was invented, its keys was arranged like piano keys and they were in better manner to type easily and fast for everyone. The typer used to type faster than we simply write by hands. so the typing speed was very high and because each type bar hits the same place on the device causes the type bar jams together. so in response to this Christopher Lantham Sholes invented the QWERTY Keyboard layout in early 1870s not to slow down the typer.... (yes you are right..).. He invented the this QWERTY layout to solve this jam problem of type bars by placing the most commonly used characters forever away from each other.        It was the first type writer which includes the Shift key to easily shifting all of the letter between upper and