1 00:00:00,150 --> 00:00:06,360 In this video, we're going to go over the three types of hackers, I want you to get an understanding 2 00:00:06,360 --> 00:00:12,590 of what you guys are actually the good guys, which guys are the bad guys and which guys are, you know, 3 00:00:12,600 --> 00:00:16,170 in between which guys are essentially on the borderline. 4 00:00:16,180 --> 00:00:23,130 They aren't necessarily good, but they're not necessarily bad so that you can understand which side 5 00:00:23,130 --> 00:00:29,910 is what and what these different types of hackers actually spend their time doing and which one obviously 6 00:00:29,910 --> 00:00:35,070 is going to be the best for you as an ethical hacker, cybersecurity professional. 7 00:00:35,190 --> 00:00:36,860 So let's go right ahead and jump in here. 8 00:00:37,380 --> 00:00:41,780 So the first type of hacker that you want to understand is the white hat. 9 00:00:41,790 --> 00:00:45,750 Now, these are going to be all of the good guys, right? 10 00:00:45,780 --> 00:00:50,220 These are the guys that are actually using their professional experience. 11 00:00:50,520 --> 00:00:57,430 Right, to actually help companies, help organizations actually deter hackers from stealing information. 12 00:00:57,450 --> 00:01:02,490 And so what these guys are doing is they're using their skills for defensive purposes. 13 00:01:02,490 --> 00:01:02,790 Right. 14 00:01:02,790 --> 00:01:10,860 Helping businesses, helping organizations in these white hats are usually professional security individuals 15 00:01:11,100 --> 00:01:18,720 that have the knowledge, the experience, the expertise as a hacker and use their knowledge to locate 16 00:01:18,720 --> 00:01:21,690 weaknesses and implement countermeasures. 17 00:01:21,690 --> 00:01:21,930 Right. 18 00:01:21,930 --> 00:01:24,840 To prevent any type of vulnerable attacks. 19 00:01:25,050 --> 00:01:27,660 They're the ones that actually ask permission. 20 00:01:27,660 --> 00:01:27,960 Right. 21 00:01:27,960 --> 00:01:34,260 Get the permission from the actual owner of the data before they're going into and actually hacking 22 00:01:34,590 --> 00:01:37,050 the system looking for information. 23 00:01:37,380 --> 00:01:42,000 Because what they're really doing in a sense here is a white header and what you're going to be doing 24 00:01:42,000 --> 00:01:42,480 as well. 25 00:01:42,570 --> 00:01:48,450 You're going to be putting your mind into the mind of a hacker, of a bad guy, in a sense. 26 00:01:48,450 --> 00:01:54,210 Right, because you want to think from that criminal perspective so that you can get an idea as far 27 00:01:54,210 --> 00:02:01,890 as what type of strategies, actions, plans will the type of individuals that are looking to take over 28 00:02:01,890 --> 00:02:03,710 information in a malicious manner. 29 00:02:03,990 --> 00:02:05,160 How are they thinking? 30 00:02:05,160 --> 00:02:06,360 What are they perceiving? 31 00:02:06,480 --> 00:02:11,700 How are they viewing, you know, this type of system, the one that you're looking to protect, to 32 00:02:11,700 --> 00:02:13,050 defend whatever that may be? 33 00:02:13,050 --> 00:02:13,380 Right. 34 00:02:13,650 --> 00:02:15,260 And then we have the black hats. 35 00:02:15,270 --> 00:02:18,130 Now, these are the well known bad guys, right? 36 00:02:18,420 --> 00:02:25,170 These are the malicious attackers, the ones that actually attack organizations, companies, individuals 37 00:02:25,350 --> 00:02:31,410 that, you know, do the ransomware is where they're taking over our companies network companies information 38 00:02:31,410 --> 00:02:36,720 and they won't release it until they get some sort of reward, some sort of payment. 39 00:02:37,140 --> 00:02:39,990 They have essentially stepped on over to the dark side. 40 00:02:39,990 --> 00:02:40,270 Right. 41 00:02:40,290 --> 00:02:48,000 You want to think about like a Star Wars type of analogy where, you know, you have the good guys and 42 00:02:48,000 --> 00:02:48,690 bad guys. 43 00:02:48,690 --> 00:02:49,050 Right. 44 00:02:49,410 --> 00:02:55,290 And the black hats are unfortunately the individuals that have turned over to the dark side because 45 00:02:55,320 --> 00:02:58,980 there are individuals that, you know, are on the white hat. 46 00:02:58,980 --> 00:03:03,120 And for whatever reason, they choose to go to the dark side, so to speak. 47 00:03:03,120 --> 00:03:03,560 Right. 48 00:03:03,570 --> 00:03:07,230 And they turn into doing malicious attacks. 49 00:03:07,230 --> 00:03:07,440 Right. 50 00:03:07,450 --> 00:03:14,520 But as white hats, we're looking to defend, you know, the systems and networks from these black hats. 51 00:03:15,030 --> 00:03:21,060 These are the guys that are looking to take advantage of their skill to use it for illegal purposes. 52 00:03:21,720 --> 00:03:24,900 They break into systems without getting permission. 53 00:03:24,900 --> 00:03:25,250 Right. 54 00:03:25,470 --> 00:03:27,420 Without any kind of access. 55 00:03:27,930 --> 00:03:34,140 They're looking at how they can gather information, how they can gain access to data and use it to 56 00:03:34,140 --> 00:03:41,430 their benefit so that they can essentially get paid in a selfish manner for the release of that information 57 00:03:41,640 --> 00:03:44,990 or for whatever, you know, malicious intent that may be. 58 00:03:45,060 --> 00:03:50,040 Now, the gray hat, these are the guys that work, you know, on either side of the fence here. 59 00:03:50,070 --> 00:03:53,150 They are on the offensive and they're on the defensive. 60 00:03:53,160 --> 00:03:55,770 And it all depends on the situation. 61 00:03:55,770 --> 00:03:58,700 Some of these folks will often cross over. 62 00:03:59,010 --> 00:04:05,910 They are oftentimes self-taught and they're interested in hacking different technologies, different 63 00:04:05,910 --> 00:04:10,020 tools, just oftentimes for, you know, out of curiosity. 64 00:04:10,030 --> 00:04:16,500 And so a lot of these folks, they didn't really go to school or get any type of formal education initially. 65 00:04:16,710 --> 00:04:22,350 They have essentially, for the most part, and not in every case, have taught themselves the skills 66 00:04:22,350 --> 00:04:28,530 of how to hack systems, how to hack networks that have a very diverse set of tools as well as skill 67 00:04:28,530 --> 00:04:28,950 sets. 68 00:04:29,370 --> 00:04:35,580 But they're more on the curious side and they may from time to time across the line, over to the dark 69 00:04:35,580 --> 00:04:35,910 side. 70 00:04:35,910 --> 00:04:43,500 But they're more on the curious side versus the actual black hat, where their actual intent is more 71 00:04:43,500 --> 00:04:44,410 on the malicious side. 72 00:04:44,430 --> 00:04:47,940 So that's going to be here for the three types of hackers. 73 00:04:48,090 --> 00:04:49,560 And we'll see you on the next one.