Beruflich Dokumente
Kultur Dokumente
basic techniques or tools. Even then they may not understand any or all of what they are
doing.
White-Hat Hackers These hacker s think like the attacking par ty but wor k for the good
code of ethics that says essentially they will cause no harm. This group is also known as
Gray-Hat Hackers These hacker s str addle the line between good and bad and have
decided to reform and become the good side. Once they are reformed they still might not
be fully trusted.
Black-Hat Hackers These hacker s ar e the bad guys that oper ate on the opposite side of
the law. They may or may not have an agenda. In most cases, black-hat hacking and outright criminal activity are not too
Suicide Hackers These hacker s tr y to knock out a tar get to pr ove a point. They ar e not
stealthy, because they are not worried about getting caught or doing prison time.
The difference between an ethical hacker and a hacker is something that can easily get
you into an argument. Just saying the word hacker in the wrong place can get you into an
hours-long conversation of the history of hacking and how hackers are all good guys who
mean nothing but the best for the world. Others will tell you that hackers are all evil and
have nothing but bad intentions. In one case I was even told that hackers were originally
You must understand that for us, hackers are separated by intentions. In our worldview
hackers who intend to cause harm or who do not have permission for their activities are
Page 2
considered black hats, whereas those who do have permission and whose activities are
benign are white hats. Calling one side good and the other bad may be controversial, but
Black Hats They do not have permission or authorization for their activities; typically
White Hats They have permission to perform their tasks. White hats never share information about a client with anyone
Gray Hats These hackers cross into both offensive and defensive actions at different times.
Suicide Hackers This relatively new class of hacker performs their actions without
regard to being stealthy or otherwise covering up their assaults. These individuals are
more concerned with carrying out their attack successfully than the prison time that may
Another type of hacker is the hacktivist. Hacktivism is any action that an attacker uses
SIR WAR10CK