Q1132716

Grey Hat List

Grey Hat  List

A grey hat (greyhat or gray hat) is a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but usually does not have the malicious intent typical of a black hat hacker.

The term came into use in the late 1990s, and was derived from the concepts of "white hat" and "black hat" hackers. When a white hat hacker discovers a vulnerability, they will exploit it only with permission and not divulge its existence until it has been fixed, whereas the black hat will illegally exploit it and/or tell others how to do so. The grey hat will neither illegally exploit it, nor tell others how to do so.

A further difference among these types of hacker lies in their methods of discovering vulnerabilities. The white hat breaks into systems and networks at the request of their employer or with explicit permission for the purpose of determining how secure it is against hackers, whereas the black hat will break into any system or network in order to uncover sensitive information for personal gain. The grey hat generally has the skills and intent of the white hat but may break into any system or network without permission.

According to one definition of a grey hat hacker, when they discover a vulnerability, instead of telling the vendor how the exploit works, they may offer to repair it for a small fee. When one gains illegal access to a system or network, they may suggest to the system administrator that one of their friends be hired to fix the problem; however, this practice has been declining due to the increasing willingness of businesses to prosecute. Another definition of grey hat maintains that grey hat hackers only arguably violate the law in an effort to research and improve security: legality being set according to the particular ramifications of any hacks they participate in.

In the search engine optimization (SEO) community, grey hat hackers are those who manipulate websites' search engine rankings using improper or unethical means but that are not considered search engine spam.

A 2021 research study looked into the psychological characteristics of individuals that participate in hacking in the workforce. The findings indicate that grey hat hackers typically go against authority, black hat hackers have a strong tendency toward thrill-seeking, and white hat hackers often exhibit narcissistic traits.

Read more...
 
 
 
  1. 1
    Marcus Holloway
    28519
    8314
 
 

Voting Rules

  • You can vote up or down. Please always consider the context when voting, e.g. a song should be voted up or down with respect to the other songs contained on the album, an actor's performance in comparison with other actors in the same movie, a book with respect to other books by the same author or within the same genre.
  • A vote can be cancelled by simply clicking the opposite vote within 24 hours. You can then vote again on the same item.
  • Each user has one vote per item within a specific list every 24 hours. After 24 hours you can vote again on the same item within the same list.
  • You can vote on as many items as you like within a list or on the same item if it's part of another list. For example, you can vote David Bowie up or down on the list of pop music artists as well as on the list of indie rock artists and on the list of rock music artists. etc.
  • Happy Voting!