UTM VPN Firewall - Vulnerability Scanner - Wifi Password Pen Test
Sun Sun Sun
grey hat, grey hat hacker, security-improving, monitoring, penetration testing, webmaster, morality, security hole, vulnerability, data access, transfer, retrieval

Encyclopedia - Encyclopedia Part 4 -

What is a Grey Hat?

In the hacking community, a grey hat refers to a proficient and tech-savvy hacker who is ambivalent enough to sometimes use his program manipulating skills to act illegally in either good or ill will. Grey hats (also known as grey hat hackers) are considered as hybrids of the black hat and white hat hacker types.
Their intentions for hacking don't usually delve into any of the traditional well-intentioned or maliciously driven extremes; that is, they may or many not commit crimes from time to time during the course of their digital undertakings, so they're not exclusively indulging on any one type of activity like their security-improving or network-destroying counterparts would.

One of the reasons why a grey hat would categorize

Himself as "grey" is to distance himself from the two opposing hacker spectrums—white and black, constructive or malicious. For instance, even though a grey hat could gain unauthorized access to a network (an illegal crime in most jurisdictions), he could, at the same time, provide a patch for the exposed vulnerability that allowed him access in the first place without compromising the system he invaded. Also, grey hats may or may not disclose vulnerabilities to the administrators or the general public, or they could even sell them to either white hats or black hats if they so choose.
A grey hat is willing to go to the extremes black hats typically indulge in to prove a point that is usually promoted by white hats; his grey "morality" is the very thing that sets him apart from other pigeonholed hackers. In most situations, they may not disclose their activities due to legal consequences; it's not out of the question for grey hat hackers to hack for personal gain, although it's also not unheard of for them to compromise whole systems for the supposed "greater good" either.
Just like any black hat or white hat hacker, grey hats do hack for a reason, and even though they don't automatically hack for destructive or cruel intentions, they do prefer leaving their motives ambiguous, if not altogether unknown. They may or many not notify a webmaster of a particular vulnerability, or they may even demonstrate the potency of the security hole by action instead of words. Moreover, a grey hat will live or die by his anonymity, and he'll basically do whatever he wants to any computer system he fancies regardless if it's harmful or beneficial (or even both) to the aforesaid network.
At any rate, grey hat hacks are undetectable events that are more passive in nature when compared to black hat hacking (or more active in nature when compared to the detailed warnings and fix suggestions that white hat hackers provide) such as monitoring, penetration testing, or less damaging types of data access, transfer, and retrieval.



Related pages
RC Release Candidate Software Firmware
UTM Appliance Anti-Virus
UTM Appliance WiFi Security
WEP Crack
WEP WPA2 Crack
What is a Black Hat?
What is a Grey Hat?
What is a vulnerability scanning appliance?
What is a White Hat?
What is an open mail relay
What is Encryption?
What is FTP?
What is Greylisting?
What is High Availability?
What is IP Blacklisting?
What is P2P?
What is SFTP?
What is SOCKS5?
What is SOCKS?
What is SSL?
What is Telnet?
WiFi Audit
WiFi Client Cracking
WiFi Client Hacking
WiFi Crack
WiFi Cracking
WiFi Hack

UTM Firewall - Vulnerability Scanner Free Security Resources
Free Vulnerability Scan

Free Security Webinar

IT Security Compliance with
hipaa compliance, cve compliance
WiFi Password Finder Awards & Reviews
Best IT Security Company
Best IT Security Products

Encyclopedia | Link Policy | Privacy Statement | Resources | Sitemap | User Policy

SecPoint® © Copyright 1999-2015
US Toll Free: +1-855-489-3724 - EU Toll Free: +44-808-101-2272