Types of Hackers: Which Hat Fits You?

Hey guys, we are back again with another informative post. Which hat do you think fits you or that friend you know knows hacking?

To start is to define a hacker: A hacker is a person with specific skill sets, they use to access computers/laptops/servers/data/information without anyone knowing or gaining authorization/a password.

Now there are 2 general types of hackers:- Malevolent Hackers(BAD) and Benevolent Hackers(GOOD). To break this down:-

White Hat Hackers

Meet the right guys on the dark web. White hat hackers, also known as ethical hackers are the cybersecurity experts who help the Govt and organizations by performing penetration testing and identifying loopholes in their cybersecurity. They even do other methodologies and ensure protection from black hat hackers and other malicious cyber crimes. Simply stated, these are the right people who are on your side. They will hack into your system with the good intention of finding vulnerabilities and help you remove virus and malware from your system.

Black Hat Hackers

Taking credit for the negative persona around “hacking,” these guys are your culprits. A black hat hacker is the type of hacker you should be worried. Heard a news about a new cybercrime today? One of the black hat hackers may be behind it. While their agenda may be monetary most of the time, it’s not always just that. These hackers look for vulnerabilities in individual PCs, organizations and bank systems. Using any loopholes they may find, they can hack into your network and get access to your personal, business and financial information.

Grey Hat Hackers

Gray hat hackers fall somewhere in between white hat and black hat hackers. While they may not use their skills for personal gain, they can, however, have both good and bad intentions. For instance, a hacker who hacks into an organization and finds some vulnerability may leak it over the Internet or inform the organization about it. It all depends upon the hacker. Nevertheless, as soon as hackers use their hacking skills for personal gain they become black hat hackers. There is a fine line between these two. So, let me make it simple for you. Because a gray hat hacker doesn’t use his skills for personal gain, he is not a black hat hacker. Also, because he is not legally authorized to hack the organization’s cybersecurity, he can’t be considered a white hat either.

Script Kiddies

A derogatory term often used by amateur hackers who don’t care much about the coding skills. These hackers usually download tools or use available hacking codes written by other developers and hackers. Their primary purpose is often to impress their friends or gain attention. However, they don’t care about learning. By using off-the-shelf codes and tools, these hackers may launch some attacks without bothering for the quality of the attack. Most common cyber attacks by script kiddies might include DoS and DDoS attacks.

Green Hat Hackers

These hackers are the amateurs in the online world of hacking. Consider them script kiddies but with a difference. These newbies have a desire to become full-blown hackers and are very curious to learn. You may find them engrossed in the hacking communities bombarding their fellow hackers with questions. You can identify them by their spark to grow and learn more about the hacking trade. Once you answer a single question, the hackers will listen with undivided attention and ask another question until you answer all their queries.

Blue Hat Hackers

These are another form of novice hackers much like script kiddies whose main agenda is to take revenge on anyone who makes them angry. They have no desire for learning and may use simple cyber attacks like flooding your IP with overloaded packets which will result in DoS attacks. A script kiddie with a vengeful agenda can be considered a blue hat hacker.

Red Hat Hackers

Red Hat Hackers have an agenda similar to white hat hackers which in simple words is halting the acts of Black hat hackers. However, there is a major difference in the way they operate. They are ruthless when it comes to dealing with black hat hackers. Instead of reporting a malicious attack, they believe in taking down the black hat hacker completely. Red hat hacker will launch a series of aggressive cyber attacks and malware on the hacker that the hacker may as well have to replace the whole system. There are also Red Hats who have no association with hacking, so do note that.

State/Nation Sponsored Hackers

State or Nation sponsored hackers(NSA) are those who have been employed by their state or nation’s government to snoop in and penetrate through full security to gain confidential information from other governments to stay at the top online or it’s own people/Other country citizens. They have an endless budget and extremely advanced tools(e.g PRISM) at their disposal to target individuals, companies or rival nations.


If you’ve ever come across social activists propagandizing a social, political or religious agenda, then you might as well meet hacktivist, the online version of an activist. Hacktivist is a hacker or a group of anonymous hackers who think they can bring about social changes and often hack government and organizations to gain attention or share their displeasure over opposing their line of thought.

Malicious Insider or Whistleblower

A malicious insider or a whistleblower may be an employee with a grudge or a strategic employee compromised or hired by rivals to garner trade secrets of their opponents to stay on top of their game. These hackers may take privilege from their easy access to information and their role within the company to hack the system.


Phreaker is a telecom network hacker who hacks a telephone system illegally to make calls without paying for them.

I hope this helped someone. To learn how to protect yourself from hackers, read my two posts, one on how to develop great passwords and the other on privacy, security and anonymity mini guide / privacy, security and anonymity part 1. More are coming.

It is essential to stay aware and vigilant to protect yourself from the cyber threats and different types of hackers who may use even the smallest vulnerability in your system against you. I hope you’ll stay safe and aware. Have a secure web experience and remain protected.

Hi there! My Name is Stephen Ajulu. I am the author and founder of Ajulu’s Thoughts. Welcome To My World! Like, share, subscribe and leave a comment or two. Inquiries → alunje73@pm.me Read More: https://ajulusthoughts.wordpress.com/about/ View all posts by Mr. Stephen Ąjulu

Originally published at http://ajulusthoughts.wordpress.com on January 5, 2019.