10 Types of Hackers You Should Know
- White Hat Hackers. Meet the right guys on the dark web. …
- Black Hat Hackers. Taking credit for the negative persona around “hacking,” these guys are your culprits. …
- Gray Hat Hackers. …
- Script Kiddies. …
- Green Hat Hackers. …
- Blue Hat Hackers. …
- Red Hat Hackers. …
- State/Nation Sponsored Hackers.
white hat hacker:- A white hat hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security. White hat hackers use their skills to improve security by exposing vulnerabilities before malicious hackers(known as black hat hackers) can detect and exploit them.

Black hat hacker:- A black hat hacker is a person who attempts to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons. This differs from white hat hackers, which are security specialists employed to use hacking methods to find security flaws that black hat hackers may exploit.
Gray hat hackers:- The term “grey hat“, alternatively spelled as “greyhat” or “gray hat“, refers to a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a blackhat hacker.
Script kiddies:- Script kiddie. In programming and hacking culture, a script kiddie, skiddie, or skid is an unskilled individual who uses scripts or programs developed by others to attack computer systems and networks and deface websites.
green hat hackers:-
These hackers are the Amateurs in the online world of Hacking. Consider them script kiddies but with a difference. These Newbies have a desire to become full-blown hackers and are very curious to learn. You may find them engrossed in the Hacking communities questioning their fellow hackers with questions.
Unlike a script kiddie,the Green Hat Hacker is a Newbie to the hacking game but is workingpassionately to excel at it. Also referred to as a Neophyte or Noob, this is ahacker who is fresh in the hacking world and often gets flak for it, havinglittle to no knowledge of the inner workings of the web. Although it may seemunlikely that this newbie may cause any serious issues, because they’re blindto their own actions, Green Hat Hackers can cause significant damage to asystem without knowing what they’ve done and worse – how to reverse it.
Example:-We have not any example. it can be anyonomous
Blue hat hackers:-
Blue hat hackers are the security professionals who can check the loop holes, vulnerabilities and errors in the softwares before the company launched it. Blue hat hackers are the security professionals who are outside the organizations. Most of the companies invite them to check the vulnerabilities in their softwares before the launching event. Blue hat hackers work are same like white hat hackers. Blue hat hackers word are famous due to Microsoft. Microsoft team think this wonderful idea of invite the hackers outside the organization to check their softwares before launching event. Therefore, blue hat hackers are also called Blue Hat Microsoft Hackers.
Blue Hat Microsoft Hacker Conference:
Blue Hat Microsoft Hacker Conference is a event started by Window Snyder. In this event the Microsoft Engineers and Hackers meet together. They can communicate on different security problems and also for better understanding. That is why this event also play an important role in the world of cybersecurity.
My Opinion:
My opinion on this topic is Microsoft take a very interesting and wonderful decision in the past. Which is very useful now a days for many organizations. This types of decision can make the world more secure place.
I hope after reading this article you can know about who are blue hat hackers. This is my opinion about this topic. If I can take any mistake please comment me and I am waiting for your response.
Red hat hackers:-
These are the vigilantes of the hacker world. They’re like White Hats in that they halt Black Hats, but these folks are downright SCARY to those who have ever tried so much as PenTest. Instead of reporting the malicious hacker, they shut someone down by uploading viruses, DoS and accessing someone’s computer to destroy it from the inside out. They leverage multiple aggressive methods that might force a cracker to need a new computer.
State/Nation sponsored hackers:-
Hacker groups are the fastest-growing threat to nations today—not so much the “hacktivists” that we hear about but extremely professional groups working for governments that we don’t hear about. State-sponsored hacker groups have the ability to worm into the […]By YoungDiplomats TeamApr 05, 2017No Comments

Top 10 State Sponsored Hackers Organizations
by LANCE DAVID LECLAIRE JANUARY 8, 2015 re-post from Listverse
Hacker groups are the fastest-growing threat to nations today—not so much the “hacktivists” that we hear about but extremely professional groups working for governments that we don’t hear about. State-sponsored hacker groups have the ability to worm into the networks of the media, major corporations, defense departments, and—yes—governments and wreak havoc. Even security firms designed to stop them may be infiltrated.
The situation is so bad, it’s being described as another “cold war,” and this one is truly global and largely invisible. Even corporate brands are targeted by states seeking an economic edge over competing nations. Since computer defenses are laughably easy for hackers to compromise, offensive capabilities become more tempting, until eventually everyone is attacking each other. It’s only a matter of time before cyber attacks are considered an act of actual war (a stance that the US is already veering toward). Hacker groups like the ill-named “Guardians of Peace” have already threatened violent terror attacks and curtailed freedom of speech in Hollywood.
Here are 10 of the key players in this new cat-and-mouse game of espionage, sabotage, and warfare.
10The Syrian Electronic Army (SEA)
Syria
The Syrian Electronic Army (SEA) enjoyed fame and a sort of love–hate relationship with the media in 2011–2013. The group is mostly composed of university students in Syria or its allies who often deliver propaganda for Syrian President Bashar al-Assad. Their high-profile hacks of major media outlets included the New York Times, various Twitter accounts, and even the Onion (whose retort was rather memorable), which gained them a reluctant respect among security companies.
The SEA also orchestrated successful attacks on CNN, The Washington Post, and Time in 2013. Finally, the group once convinced the public that an explosion had gone off in the White House, injuring president Obama. This briefly upset the stock market, bringing the Dow Jones index down by a full percent.
The SEA hackers have also been known to engage in darker endeavors, such as targeting and intimidating individuals they don’t agree with or who do not support Assad. While they claim to be simple patriots, they also admit to relaying relevant information to the state, illustrating the murky line between hacktivists and state-sponsored hackers. The SEA works mainly through the use of “spear-phishing,” a partly socially engineered method where a user is tricked into giving out passwords or other sensitive information, often by being directed to a fake website set up for that purpose.
In November 2014, the SEA returned and “hacked” a number of sites using a content delivery network, displaying a pop-up that read: “You have been hacked by the Syrian Electronic Army.”
9Tarh Andishan
Iran

In 2009, Iran was left with a badly compromised and diminished computer infrastructure after the widely publicized Stuxnet worm attack. Iran responded by elevating its hacking capabilities from simple website defacement to full-blown cyber warfare. Thus, a state-sponsored hacker group dubbed “Tarh Andishan” (“Thinkers” or “Innovators” in Farsi) was born.
The group gained prominence with “Operation Cleaver,” a campaign that has been active since around 2012 and has targeted at least 50 organizations throughout the world in the military, commercial, educational, environmental, energy, and aerospace fields. Chillingly, they have also targeted major airlines and in some cases even gained “complete access” to airline gates and control systems, “potentially allowing them to spoof gate credentials.” Cyber security firm Cylance, who has yet to reach a conclusion as to the group’s long-term goals, released an early report on Tarh Andishan (which represents only a fraction of the group’s activities) because of fears that Operation Cleaver already poses a “grave risk to the physical safety of the world.”
The report presents evidence such as known hacker handles, Iranian domain names, infrastructure hosting, and other indicators. Cylance believes the infrastructure available to Tarh Andishan is too large to be the work of an individual or a small group. Tarh Andishan uses advanced techniques ranging from SQL injection, advanced exploits and automated worm-like propagation systems, backdoors, and more. They are thought to have about 20 members, mostly from Tehran with auxiliary members in Canada, the UK, and the Netherlands. Its victims include the US and Central America, parts of Europe, South Korea, Pakistan, Israel, and several other Middle Eastern regions.