There’s a lot of opportunities to be had in the field of hacking and whats great is that if you are great, there will be more than I can possibly hope to offer you. But when we are talking about hacking, it’s a lot like talking about locksmiths in Dallas. It might seem like an obscure reference but bare with me.

When you are a locksmith, you have the ability to open any door, but you choose to help people with your abilities. But some people use that ability to open doors that shouldn’t be open, that is what we are going to talk about today.

 A man of different hats

Hackers wear different hats. There are white hats, black hats, and grey hats. The name comes from Western films, where heroic and antagonistic Cowboys might traditionally wear a white and a black hat respectively.

White Hat – The term “white hat” in Internet slang refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization’s information systems. Ethical hacking is a term coined by IBM meant to imply a broader category than just penetration testing.

Black Hat – The term was coined by Richard Stallman, to contrast the maliciousness of a criminal hacker versus the spirit of playfulness and exploration of hacker culture, or the ethos of the white-hat hacker, who performs hacker duties to identify places to repair

Grey Hat – The term began to be used in the late 1990s, derived from the concepts of “white hat” and “black hat” hackers. When a white hat hacker discovers a vulnerability, they will exploit it only with permission and not divulge its existence until it has been fixed, whereas the black hat will illegally exploit it and tell others how to do so. The gray hat will neither illegally exploit it, nor tell others how to do so.

Red Hat

Red Hat is a Linux distro team that are responsible for creating Linux distros, and they have cleverly named themselves red hat. Red Hat by it’s nature implies that instead of using hacking and exploiting different aspects of that, they are instead profiting off of hackers instead. Which is it’s own thing? It is similar to charging for keys in Dallas. Everyone already has the keys, but if they need additional keys, there’s only one person they can call.

The Hacker Landscape

Now while there are also several different aspects of hacking, there are also several different levels of the internet. But that is a story for another time.