{"id":1886,"date":"2020-12-10T08:51:00","date_gmt":"2020-12-10T08:51:00","guid":{"rendered":"https:\/\/sectigostore.com\/blog\/?p=1886"},"modified":"2021-06-11T04:57:16","modified_gmt":"2021-06-11T04:57:16","slug":"different-types-of-hackers-hats-explained","status":"publish","type":"post","link":"https:\/\/sectigostore.com\/blog\/different-types-of-hackers-hats-explained\/","title":{"rendered":"Different Types of Hackers: The 6 Hats Explained"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Black hat, white hat, grey hat, red hat, blue hat, and green hat. No, these aren\u2019t items in an apparel store\u2019s catalog \u2014 they\u2019re the different types of hackers you\u2019ll find in the cybersecurity industry<\/h2>\n\n\n\n<p>The term \u201chacker\u201d is often portrayed negatively by the media and as being synonymous with cybercriminals. When people hear the word \u201chacker,\u201d they instantly imagine a shady guy wearing a dark hoodie who works on a computer in a dark basement. Although that description is true for some types of hackers, it\u2019s not applicable to all of them. That\u2019s because there are six different types of hackers in the cybersecurity industry \u2014 all of whom have different motives and objectives.<\/p>\n\n\n\n<p>In this article, we\u2019ll explore the six different types of hackers, why they do what they do, and how their activities differ.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Are the Six Different Types of Hackers?<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"294\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/12\/six-different-types-of-hackers-1024x294.png\" alt=\"A graphic of the six different types of hackers lined up \" class=\"wp-image-1889 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/12\/six-different-types-of-hackers-1024x294.png 1024w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/12\/six-different-types-of-hackers-300x86.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/12\/six-different-types-of-hackers-560x161.png 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/12\/six-different-types-of-hackers-940x270.png 940w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/12\/six-different-types-of-hackers.png 1281w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>When it comes to cybersecurity, things aren\u2019t all that black and white (excuse the pun). Hackers\u2019 hats come in a variety of colors:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>White hat<\/li><li>Grey hat<\/li><li>Black hat<\/li><li>Blue hat<\/li><li>Green hat<\/li><li>Red hat<\/li><\/ul>\n\n\n\n<p>So, what are the differences between these different types of hackers? Let\u2019s check it out.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">1) Black Hat Hacker<\/h2>\n\n\n\n<p>Black hat hackers are the evil guys who want to use their technical skills to defraud and blackmail others. They usually have the expertise and knowledge to break into computer networks without the owners\u2019 permission, exploit <a href=\"https:\/\/sectigostore.com\/blog\/what-is-owasp-what-are-the-owasp-top-10-vulnerabilities\/\">security vulnerabilities<\/a>, and bypass security protocols. To make money, they are ready to do all illegal activities such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Sending <a href=\"https:\/\/sectigostore.com\/blog\/what-is-a-phishing-email-5-examples-of-phishing-emails-and-how-to-avoid-them\/\">phishing emails<\/a> and <a href=\"https:\/\/sectigostore.com\/blog\/what-is-sms-spoofing-how-can-you-prevent-it\/\">SMS messages<\/a>.<\/li><li>Writing, distributing, and selling <a href=\"https:\/\/sectigostore.com\/blog\/different-types-of-malware\/\">malware<\/a> like viruses, worms, <a href=\"https:\/\/sectigostore.com\/blog\/what-is-a-trojan-horse-in-computer-terms\/\">trojan horses<\/a>, etc.<\/li><li>Deploying <a href=\"https:\/\/sectigostore.com\/blog\/10-different-types-of-cyber-attacks-how-they-work\/\">cyber attacks<\/a> like <a href=\"https:\/\/sectigostore.com\/blog\/ddos-attack-statistics-a-look-at-the-most-recent-and-largest-ddos-attacks\/\">distributed denial of service<\/a> (DDoS) to slow down or crash the websites.<\/li><li>Earning money for doing political and corporate espionage.<\/li><li>Finding and exploiting leaky databases and software vulnerabilities.<\/li><li>Selling financial and personally identifiable information on the Dark Web.<\/li><li>Executing financial fraud and identity theft-related crimes.<\/li><li>Deploying dangerous cyber threats like <a href=\"https:\/\/aboutssl.org\/what-is-brute-force-attack-how-to-prevent-it\/\">brute-force attacks<\/a>, scareware, <a href=\"https:\/\/sectigostore.com\/blog\/botnet-attacks-what-is-a-botnet-how-does-it-work\/\">botnets<\/a>, <a href=\"https:\/\/www.thesslstore.com\/blog\/protecting-against-man-in-the-middle-attacks\/\">man-in-the-middle attacks<\/a>, <a href=\"https:\/\/sectigostore.com\/blog\/what-is-malvertising-examples-and-protection-tips\/\">malvertizing<\/a> campaigns, etc.<\/li><li>Blackmailing the victims using <a href=\"https:\/\/sectigostore.com\/blog\/5-best-ransomware-protection-tips-to-protect-your-organization\/\">ransomware<\/a> and spyware to encrypt, lock, steal, modify, and delete your data. Black hat hackers typically demand extortion money to give back access to the files, system, databases, or the entire device. They also blackmail victims, threatening to reveal their confidential data, business documents, personal photos, videos, etc., to the public if they don&#8217;t pay.\u00a0<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">2) White Hat Hacker<\/h2>\n\n\n\n<p>When it comes to understanding the different types of hackers, there can\u2019t be a bigger difference than the gulf that exists between white and black hat hackers. <a href=\"https:\/\/sectigostore.com\/blog\/white-hat-hacker-ethical-hacker\/\">White hat hackers<\/a> (also known as ethical hackers) are the polar opposite of their black hat counterparts. They use their technical skills to protect the world from bad hackers.<\/p>\n\n\n\n<p>Companies and government agencies hire white hats as information security analysts, cybersecurity researchers, security specialists, penetration testers, etc. They work as independent consultants or freelancers as well. White hat hackers employ the same hacking techniques as black hat hackers, but they do it with the system owner&#8217;s permission and their intentions are noble.<\/p>\n\n\n\n<p>But what are their motivations? White hat hackers hack to:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Find and fix vulnerabilities in the system before black hat hackers exploit them.<\/li><li>Develop tools that can detect cyberattacks and mitigate or block them.<\/li><li>Strengthen the overall security posture of the software and hardware components.<\/li><li>Build security software like antivirus, anti-malware, anti-spyware, honeypots, firewalls, etc.<\/li><\/ul>\n\n\n\n<p>White hat hackers are often academics and researchers who want to better understand various cyber threats and educate others about them. Companies and governments hire them as consultants and practitioners to prepare contingency plans to get ready for cyber attacks and other worst-case scenarios. White hat hackers also help companies adhere to the security guidelines outlined in security and privacy-focused regulations like HIPAA, <a href=\"https:\/\/sectigostore.com\/blog\/what-is-pci-dss-a-quick-guide-to-the-12-pci-dss-requirements\/\">PCI DSS<\/a>, <a href=\"https:\/\/sectigostore.com\/blog\/what-constitutes-a-gdpr-data-breach-definition-meaning\/\">GDPR<\/a>, etc.<\/p>\n\n\n\n<p>Unlike other types of hackers, white hat hackers ensure their activities fall within the legal framework. And this point makes them different from red hat hackers, which we\u2019ll talk about later in the article.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3) Grey Hat Hacker<\/h2>\n\n\n\n<p>Next on our list of the different types of hackers is grey hats. These hackers fall somewhere between white hat and black hat hackers. Grey hat hackers\u2019 intentions are often good, but they don\u2019t always take the ethical route with their hacking technics. For example, they may penetrate your website, application, or IT systems to look for vulnerabilities without your consent. But they typically don\u2019t try to cause any harm.<\/p>\n\n\n\n<p>Grey hat hackers draw the owner\u2019s attention to the existing vulnerabilities. They often launch the same type of cyber-attacks as white hats on a company\/government servers and websites. These attacks expose the security loopholes but don\u2019t cause any damage. However, again, they do this without the owner&#8217;s knowledge or permission. Grey hat hackers sometimes charge a fee to:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Fix bugs or vulnerabilities,<\/li><li>Strengthen the organization\u2019s security defenses, or<\/li><li>Provide recommendations, solutions, or tools to patch vulnerabilities.<\/li><\/ul>\n\n\n\n<p>Some grey hat hackers release information about vulnerabilities in the public once they are patched. But in many cases, they reach out to the affected companies first to let them know about the vulnerabilities. If a company doesn\u2019t respond or act quickly enough, the hacker may choose to disclose the info publicly even if the bug hasn\u2019t been fixed.<\/p>\n\n\n\n<p>Grey hats do this to gain popularity and recognition in the cyber security community, which indirectly helps them to grow their careers as security professionals. However, this step damages the reputation of the companies whose security vulnerabilities or exploits they disclose publicly.<\/p>\n\n\n\n<p>For example, security researcher Anurag Sen and his team at Safety Detectives hunt for leaky databases and data breach incidents and draw the responsible officials&#8217; attention before releasing such information in the public domain. They are responsible for exposing leaky databases of <a href=\"https:\/\/www.safetydetectives.com\/blog\/bigfooty-leak-report\/\">bigfooty.com<\/a>, <a href=\"https:\/\/www.safetydetectives.com\/blog\/avon-leak-report\/\">Avon<\/a>, <a href=\"https:\/\/www.safetydetectives.com\/blog\/natura-leak-report\/\">Natura &amp; Co<\/a>, <a href=\"https:\/\/www.safetydetectives.com\/blog\/railyatri-leak-report\/\">RailYatri<\/a>, and many others.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">4) Red Hat Hacker<\/h2>\n\n\n\n<p>Much like white hat hackers, red hat hackers also want to save the world from evil hackers. But they choose extreme and sometimes illegal routes to achieve their goals. <\/p>\n\n\n\n<p>Red hat hackers are like the pseudo-Robin Hood of the cybersecurity field \u2014 they take the wrong path to do the right thing. When they find a black hat hacker, they deploy dangerous cyber attacks against them. <\/p>\n\n\n\n<p>Red hat hackers use all types of tactics to do this, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Infecting the bad hackers&#8217; systems with malware,<\/li><li>Launching DDoS attacks,<\/li><li>Using tools to gain remote access to the hacker&#8217;s computer to demolish it.<\/li><\/ul>\n\n\n\n<p>In short, red hats are the types of hackers who often choose to take aggressive steps to stop black hat hackers. They\u2019re known to launch full-scale attacks to bring down the bad guys\u2019 servers and destroy their resources.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">5) Blue Hat Hacker<\/h2>\n\n\n\n<p>Two different definitions are prevailing within the cybersecurity field, and they have little to nothing in common. We\u2019ll explore both of them now.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Blue Hat Hacker Definition 1: Revenge Seekers<\/h3>\n\n\n\n<p>These hackers don\u2019t necessarily care about money or fame. They hack to take personal revenge for a real \u2014 or perceived \u2014 sleight from a person, employer, institution, or government. Blue hat hackers use malware and deploy various cyber attacks on their enemies\u2019 servers\/networks to cause harm to their data, websites, or devices.<\/p>\n\n\n\n<p>Sometimes, blue hat hackers use various hacking technics to bypass authentication mechanisms to gain unauthorized access to their targets\u2019 email clients or social media profiles. This gives them the ability to send emails and post inappropriate messages from those profiles to take revenge.<\/p>\n\n\n\n<p>At times, they engage in <a href=\"https:\/\/sectigostore.com\/blog\/what-is-doxxing-5-examples-of-doxxing-and-how-to-prevent-it\/\">doxxing<\/a> and post personal and confidential data of their nemeses in public channels to ruin their reputations. Sometimes, ex-employees hack into companies&#8217; servers or steal their customers&#8217; confidential data and release it to the public just to damage their former employers\u2019 reputations.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Blue Hat Hacker Definition 2: Outside Security Professionals<\/h3>\n\n\n\n<p>Blue hat hackers are security professionals that work outside of the organization. Companies often invite them to test the new software and find security vulnerabilities before releasing it. Sometimes, companies organize periodic conferences for blue hat hackers to find the bugs in their crucial online systems.<\/p>\n\n\n\n<p>Blue hat hackers perform <a href=\"https:\/\/sectigostore.com\/blog\/13-vulnerable-websites-web-apps-for-pen-testing-and-research\/\">penetration testing<\/a> and deploy various cyber attacks without causing damage. Microsoft often organizes such invite-only conferences to test its Windows programs. That\u2019s why <a href=\"https:\/\/medium.com\/@hackersleaguebooks\/who-are-blue-hat-hackers-aeb443b90c29\">some blue hats are known as blue hat Microsoft hackers<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">6) Green Hat Hacker<\/h2>\n\n\n\n<p>These are the \u201cnewbies\u201d in the world of hacking. Green hat hackers are not aware of the security mechanism and the inner workings of the web, but they are keen learners and determined (and even desperate) to elevate their position in the hacker community. Although their intention is not necessarily to cause harm, they may do so while &#8220;playing&#8221; with various malware and attack techniques. <\/p>\n\n\n\n<p>As a result, green hat hackers can also be harmful because they often are not aware of the consequences of their actions \u2014 or, worst, how to fix them.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Green Hat Hackers vs Script Kiddies<\/h3>\n\n\n\n<p>There\u2019s another type of hacker that\u2019s similar to a green hat hacker \u2014 they\u2019re known as \u201cscript kiddies.\u201d <a href=\"https:\/\/www.uscybersecurity.net\/script-kiddie\/\">Script kiddies<\/a> are also amateur hackers, but instead of learning new hacking techniques and programming, they\u2019re simply interested in downloading or buying the malware, tools, and scripts online and use them. The main difference between green hats and script kiddie is that the former is quite serious and hardworking, having a clear vision to improve their skills. The latter, on the other hand, is just interested in using pre-existing scripts and codes to hack.<\/p>\n\n\n\n<p>Green hat hackers often take the proper educational path, earning certificates, and taking skill development courses to learn hacking. But script kiddies simply find shortcuts, like watching YouTube videos or reading some online articles or forum discussions. Basically, they like to execute hacks and cyber attacks without having complete knowledge of the consequences.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The 6 Different Types of Hackers<\/h2>\n\n\n\n<p>Don\u2019t have a lot of time to read through each of the descriptions? No worries. We\u2019ve got you covered in this quick recap:<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"747\" height=\"750\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/12\/breakdown-different-types-of-hackers2.png\" alt=\"A vertical illustrative chart breaking down the different types of hackers by their hat colors with an accompanying description\" class=\"wp-image-1897 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/12\/breakdown-different-types-of-hackers2.png 747w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/12\/breakdown-different-types-of-hackers2-300x300.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/12\/breakdown-different-types-of-hackers2-150x150.png 150w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/12\/breakdown-different-types-of-hackers2-560x562.png 560w\" sizes=\"auto, (max-width: 747px) 100vw, 747px\" \/><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Wrapping Up on the Different Types of Hackers<\/h2>\n\n\n\n<p>By now you must have a clear idea that not all hackers are the same. Sure, some hackers are bad guys (and gals) who use their technical skills to exploit other people and businesses. There is an interesting and in-depth interview of a black hat hacker named Irbis that highlights the motives, hacking tools, technics, risks, and financial rewards black hat hackers are getting. Here&#8217;s the article link: <a href=\"https:\/\/cooltechzone.com\/malware-removal\/most-dangerous-malware-in-2021\">Black hat hacker interview<\/a>. But there are also other types of hackers who are working day and night to protect us from those evil hackers. Some hackers even employ an aggressive approach and go up to any extent to destroy the notorious black hat hackers.  <\/p>\n\n\n\n<p>So now, when you hear the word &#8220;hacker&#8221; again, pause for a moment and ask yourself \u201cwhich type of hacker?\u201d instead of instantly imagining a bad guy in a hoodie!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Black hat, white hat, grey hat, red hat, blue hat, and green hat. No, these aren\u2019t items in an apparel store\u2019s catalog \u2014 they\u2019re the different types of hackers you\u2019ll&#8230;<\/p>\n","protected":false},"author":6,"featured_media":1891,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[99],"class_list":["post-1886","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-types-of-hackers","post-with-tags"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Different Types of Hackers: The 6 Hats Explained - InfoSec Insights<\/title>\n<meta name=\"description\" content=\"This article explores the six different types of hackers \u2014 white, grey, black, blue, green, &amp; red hats \u2014 what they do and what motivates them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sectigostore.com\/blog\/different-types-of-hackers-hats-explained\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Different Types of Hackers: The 6 Hats Explained - InfoSec Insights\" \/>\n<meta property=\"og:description\" content=\"This article explores the six different types of hackers \u2014 white, grey, black, blue, green, &amp; red hats \u2014 what they do and what motivates them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sectigostore.com\/blog\/different-types-of-hackers-hats-explained\/\" \/>\n<meta property=\"og:site_name\" content=\"InfoSec Insights\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-10T08:51:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-11T04:57:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/12\/different-types-of-hackers-feature.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Medha Mehta\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Medha Mehta\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/different-types-of-hackers-hats-explained\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/different-types-of-hackers-hats-explained\\\/\"},\"author\":{\"name\":\"Medha Mehta\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/41d095943b7798ade1bc3683c8822f15\"},\"headline\":\"Different Types of Hackers: The 6 Hats Explained\",\"datePublished\":\"2020-12-10T08:51:00+00:00\",\"dateModified\":\"2021-06-11T04:57:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/different-types-of-hackers-hats-explained\\\/\"},\"wordCount\":1831,\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/different-types-of-hackers-hats-explained\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/different-types-of-hackers-feature.jpg\",\"keywords\":[\"types of hackers\"],\"articleSection\":[\"Cyber Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/different-types-of-hackers-hats-explained\\\/\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/different-types-of-hackers-hats-explained\\\/\",\"name\":\"Different Types of Hackers: The 6 Hats Explained - InfoSec Insights\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/different-types-of-hackers-hats-explained\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/different-types-of-hackers-hats-explained\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/different-types-of-hackers-feature.jpg\",\"datePublished\":\"2020-12-10T08:51:00+00:00\",\"dateModified\":\"2021-06-11T04:57:16+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/41d095943b7798ade1bc3683c8822f15\"},\"description\":\"This article explores the six different types of hackers \u2014 white, grey, black, blue, green, & red hats \u2014 what they do and what motivates them.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/different-types-of-hackers-hats-explained\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/different-types-of-hackers-hats-explained\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/different-types-of-hackers-hats-explained\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/different-types-of-hackers-feature.jpg\",\"contentUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/different-types-of-hackers-feature.jpg\",\"width\":1600,\"height\":1000},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/different-types-of-hackers-hats-explained\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Different Types of Hackers: The 6 Hats Explained\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\",\"name\":\"InfoSec Insights\",\"description\":\"SectigoStore.com Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/41d095943b7798ade1bc3683c8822f15\",\"name\":\"Medha Mehta\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g\",\"caption\":\"Medha Mehta\"},\"description\":\"Medha is a regular contributor to InfoSec Insights. She's a tech enthusiast and writes about technology, website security, cryptography, cyber security, and data protection.\",\"sameAs\":[\"https:\\\/\\\/sectigostore.com\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Different Types of Hackers: The 6 Hats Explained - InfoSec Insights","description":"This article explores the six different types of hackers \u2014 white, grey, black, blue, green, & red hats \u2014 what they do and what motivates them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sectigostore.com\/blog\/different-types-of-hackers-hats-explained\/","og_locale":"en_US","og_type":"article","og_title":"Different Types of Hackers: The 6 Hats Explained - InfoSec Insights","og_description":"This article explores the six different types of hackers \u2014 white, grey, black, blue, green, & red hats \u2014 what they do and what motivates them.","og_url":"https:\/\/sectigostore.com\/blog\/different-types-of-hackers-hats-explained\/","og_site_name":"InfoSec Insights","article_published_time":"2020-12-10T08:51:00+00:00","article_modified_time":"2021-06-11T04:57:16+00:00","og_image":[{"width":1600,"height":1000,"url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/12\/different-types-of-hackers-feature.jpg","type":"image\/jpeg"}],"author":"Medha Mehta","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Medha Mehta","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sectigostore.com\/blog\/different-types-of-hackers-hats-explained\/#article","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/different-types-of-hackers-hats-explained\/"},"author":{"name":"Medha Mehta","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/41d095943b7798ade1bc3683c8822f15"},"headline":"Different Types of Hackers: The 6 Hats Explained","datePublished":"2020-12-10T08:51:00+00:00","dateModified":"2021-06-11T04:57:16+00:00","mainEntityOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/different-types-of-hackers-hats-explained\/"},"wordCount":1831,"image":{"@id":"https:\/\/sectigostore.com\/blog\/different-types-of-hackers-hats-explained\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/12\/different-types-of-hackers-feature.jpg","keywords":["types of hackers"],"articleSection":["Cyber Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sectigostore.com\/blog\/different-types-of-hackers-hats-explained\/","url":"https:\/\/sectigostore.com\/blog\/different-types-of-hackers-hats-explained\/","name":"Different Types of Hackers: The 6 Hats Explained - InfoSec Insights","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/different-types-of-hackers-hats-explained\/#primaryimage"},"image":{"@id":"https:\/\/sectigostore.com\/blog\/different-types-of-hackers-hats-explained\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/12\/different-types-of-hackers-feature.jpg","datePublished":"2020-12-10T08:51:00+00:00","dateModified":"2021-06-11T04:57:16+00:00","author":{"@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/41d095943b7798ade1bc3683c8822f15"},"description":"This article explores the six different types of hackers \u2014 white, grey, black, blue, green, & red hats \u2014 what they do and what motivates them.","breadcrumb":{"@id":"https:\/\/sectigostore.com\/blog\/different-types-of-hackers-hats-explained\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sectigostore.com\/blog\/different-types-of-hackers-hats-explained\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sectigostore.com\/blog\/different-types-of-hackers-hats-explained\/#primaryimage","url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/12\/different-types-of-hackers-feature.jpg","contentUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/12\/different-types-of-hackers-feature.jpg","width":1600,"height":1000},{"@type":"BreadcrumbList","@id":"https:\/\/sectigostore.com\/blog\/different-types-of-hackers-hats-explained\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sectigostore.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Different Types of Hackers: The 6 Hats Explained"}]},{"@type":"WebSite","@id":"https:\/\/sectigostore.com\/blog\/#website","url":"https:\/\/sectigostore.com\/blog\/","name":"InfoSec Insights","description":"SectigoStore.com Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sectigostore.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/41d095943b7798ade1bc3683c8822f15","name":"Medha Mehta","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g","caption":"Medha Mehta"},"description":"Medha is a regular contributor to InfoSec Insights. She's a tech enthusiast and writes about technology, website security, cryptography, cyber security, and data protection.","sameAs":["https:\/\/sectigostore.com\/"]}]}},"_links":{"self":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1886","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/comments?post=1886"}],"version-history":[{"count":7,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1886\/revisions"}],"predecessor-version":[{"id":2482,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1886\/revisions\/2482"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media\/1891"}],"wp:attachment":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media?parent=1886"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/categories?post=1886"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/tags?post=1886"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}