SlideShare a Scribd company logo
1 of 15

White
Hat
Hackers
Black
Hat
Hackers
Grey
Hat
Hackers
Types of hacker

 White Hat hackers are also known as Ethical
Hackers. They never intent to harm a system, rather
they try to find out weaknesses in a computer or a
network system as a part of penetration testing and
vulnerability assessments.
 Ethical hacking is not illegal and it is one of the
demanding jobs available in the IT industry. There
are numerous companies that hire ethical hackers for
penetration testing and vulnerability assessments.
White Hat Hackers

 Black Hat hackers, also known as crackers, are those
who hack in order to gain unauthorized access to a
system and harm its operations or steal sensitive
information.
 Black Hat hacking is always illegal because of its bad
intent which includes stealing corporate data,
violating privacy, damaging the system, blocking
network communication, etc.
Black Hat Hackers

 Grey hat hackers are a blend of both black hat and
white hat hackers. They act without malicious intent
but for their fun, they exploit a security weakness in
a computer system or network without the owner’s
permission or knowledge.
 Their intent is to bring the weakness to the attention
of the owners and getting appreciation or a little
bounty from the owners.
Grey Hat Hackers
Red Hat Hackers
Blue Hat Hackers
Elite Hackers
Script Kiddie
Neophyte
Hacktivist
Phreaker
Miscellaneous Hackers

Red hat hackers are again a blend of
both black hat and white hat hackers.
They are usually on the level of hacking
government agencies, top-secret
information hubs, and generally
anything that falls under the category
of sensitive information.
Red Hat Hackers

A blue hat hacker is someone outside
computer security consulting firms who is
used to bug-test a system prior to its launch.
They look for loopholes that can be exploited
and try to close these gaps. Microsoft also
uses the term BlueHat to represent a series of
security briefing events.
Blue Hat Hackers

This is a social status among hackers, which
is used to describe the most skilled. Newly
discovered exploits will circulate among
these hackers.
Elite Hackers

A script kiddie is a non-expert who breaks
into computer systems by using pre-
packaged automated tools written by others,
usually with little understanding of the
underlying concept, hence the term Kiddie.
Script Kiddie

A neophyte, "n00b", or "newbie" or "Green
Hat Hacker" is someone who is new to
hacking or phreaking and has almost no
knowledge or experience of the workings of
technology and hacking.
Neophyte

A hacktivist is a hacker who utilizes
technology to announce a social, ideological,
religious, or political message. In general,
most hacktivism involves website
defacement or denialof-service attacks
Hacktivist

A hacker who identifies and exploits
weaknesses in telephones instead of
computers.
Phreaker
 Types of Hacker

More Related Content

What's hot

Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas
 

What's hot (20)

Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Computer security
Computer securityComputer security
Computer security
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Software security
Software securitySoftware security
Software security
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint Presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to Types of Hacker

module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
Gautam708801
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
teriwoja
 

Similar to Types of Hacker (20)

Intro
IntroIntro
Intro
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
 
Hacking
HackingHacking
Hacking
 
Final ethical hacking
Final ethical hackingFinal ethical hacking
Final ethical hacking
 
About hackers
About hackersAbout hackers
About hackers
 
hacking
hackinghacking
hacking
 
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2
 
Hacking
Hacking Hacking
Hacking
 
Ethical-Hacking.pdf
Ethical-Hacking.pdfEthical-Hacking.pdf
Ethical-Hacking.pdf
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
 
Why Ethical Hacking Course in 2022.pdf
Why Ethical Hacking Course in 2022.pdfWhy Ethical Hacking Course in 2022.pdf
Why Ethical Hacking Course in 2022.pdf
 
Introduction TO Ethical Hacking
Introduction TO Ethical HackingIntroduction TO Ethical Hacking
Introduction TO Ethical Hacking
 
Hackers
HackersHackers
Hackers
 
Kinds of hackers
Kinds of hackersKinds of hackers
Kinds of hackers
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
About hacker
About hackerAbout hacker
About hacker
 
All About Hacking..!!
All About Hacking..!!All About Hacking..!!
All About Hacking..!!
 
All About Hacking.!!
All About Hacking.!! All About Hacking.!!
All About Hacking.!!
 
5
55
5
 

Recently uploaded

DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 

Recently uploaded (20)

Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 

Types of Hacker

  • 1.
  • 2.
  • 4.   White Hat hackers are also known as Ethical Hackers. They never intent to harm a system, rather they try to find out weaknesses in a computer or a network system as a part of penetration testing and vulnerability assessments.  Ethical hacking is not illegal and it is one of the demanding jobs available in the IT industry. There are numerous companies that hire ethical hackers for penetration testing and vulnerability assessments. White Hat Hackers
  • 5.   Black Hat hackers, also known as crackers, are those who hack in order to gain unauthorized access to a system and harm its operations or steal sensitive information.  Black Hat hacking is always illegal because of its bad intent which includes stealing corporate data, violating privacy, damaging the system, blocking network communication, etc. Black Hat Hackers
  • 6.   Grey hat hackers are a blend of both black hat and white hat hackers. They act without malicious intent but for their fun, they exploit a security weakness in a computer system or network without the owner’s permission or knowledge.  Their intent is to bring the weakness to the attention of the owners and getting appreciation or a little bounty from the owners. Grey Hat Hackers
  • 7. Red Hat Hackers Blue Hat Hackers Elite Hackers Script Kiddie Neophyte Hacktivist Phreaker Miscellaneous Hackers
  • 8.  Red hat hackers are again a blend of both black hat and white hat hackers. They are usually on the level of hacking government agencies, top-secret information hubs, and generally anything that falls under the category of sensitive information. Red Hat Hackers
  • 9.  A blue hat hacker is someone outside computer security consulting firms who is used to bug-test a system prior to its launch. They look for loopholes that can be exploited and try to close these gaps. Microsoft also uses the term BlueHat to represent a series of security briefing events. Blue Hat Hackers
  • 10.  This is a social status among hackers, which is used to describe the most skilled. Newly discovered exploits will circulate among these hackers. Elite Hackers
  • 11.  A script kiddie is a non-expert who breaks into computer systems by using pre- packaged automated tools written by others, usually with little understanding of the underlying concept, hence the term Kiddie. Script Kiddie
  • 12.  A neophyte, "n00b", or "newbie" or "Green Hat Hacker" is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology and hacking. Neophyte
  • 13.  A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denialof-service attacks Hacktivist
  • 14.  A hacker who identifies and exploits weaknesses in telephones instead of computers. Phreaker