1. Exploring Cyber Security Threats

1.2. The Hats Hackers Wear

Audio

 

 

Transcript

So let's talk about the hats hacks. Hackers where we talked about this.

A couple sections ago, White Hat, Black Hat, Gray hat so White Hat is authorized. So like a pen tester or someone in on your team who? That's their job is to.

Do these things internally, vulnerability management, things like that. That's white hat. They are allowed. They're authorized. Nothing they're doing is illegal.

Gray hat is they have listed as semi authorized, so go with that definition on the exam is semi authorized but not always. Sometimes they're not authorized at all, but they don't have intent to do harm. They are trying to find the vulnerability and point it out to you so you can make your system better.

I know of a guy who hacked a city in another country through their red light camera, so the this this city had red light cameras up and he hacked their government network through that and was able to make himself an administrator and then once.

He erased all of his footprints. He sent them. I believe he sent them a letter telling them what had happened and how he did it. And that type of stuff so they could then go back and harden their network and make it stronger. And then Black Hat, these are the bad guys. 

They're unauthorized. Their intent is bad, some worse than others. But you know, their intent is to do bad things to your system, to hack you for whatever reason, and whatever method. But they're the bad guys.