6
January 2016
Technically Speaking
black-market. Black hat hackers break into secure networks to
destroy, modify, or steal data; or to make the network unusable
for those who are authorized to use the network. Black hat
hackers are also referred to as the "crackers" within the
security industry and by modern programmers. Once they have
gained control over a system, they may apply patches or fixes
to the system to retain their control over the system.
White hat hackers: These are the good guys of hacking
authorized to perform testing. You can call your internal
security tester or third party you have authorized to perform
security testing on your infrastructure/application as white hat
hackers. White hat hacker takes all necessary permission and
discloses all the findings to the owner of the system. White hat
hacker does not reveal any information of the system to any
other party not authorized to have such information.
Grey hat hackers: As the name suggests, they lie in
between Black hat and White hat. Grey hat hacker is
somebody who has not been authorized by the organization to
perform attack/testing on its application/infrastructure. But still
grey hat hacker does so and responsibly reports to the
organization about any security finding. He may charge the
organization for fixing the issue. But remember, testing without
permission is still illegal.
Red Team: This is a comparatively new concept and it is
gaining popularity among security conscious people (even
among government and the military establishment). The Red
team is a team of security experts who try to break into the
organization's security systems by attacking it like a hacker.
They will use all possible attack vectors including social
engineering to break into unauthorized system. Usually they )