Types of Hackers


When you think of a hacker… do you imagine something like this?

That’s certainly the image that Hollywood’s given us of what a “hacker” looks like. Yet, there’s so much more to the art – and community – of hacking than Hollywood or the media portrays.

Hackers can be broken down into 7 general types, depending on their skills and hacking goals.

Type 1: Script Kiddie

I definitely chuckled to myself when I read this term in my last semester textbook. I’d heard about lots of the other types of hackers, but Script Kiddies?

That was just too funny.

Script Kiddies don’t really care about learning the skills required for hacking (if they did, they’d be Green Hats). Instead, they use code snippets they find online and use that to create a virus, SQL injection, or whatever they actually know how to do.

Script Kiddies usually just download overused software, such as Metasploit, and watch a YouTube video on how to use it. A common Script Kiddie attack will be a DoS or DDoS (Denial of Service and Distributed Denial of Service), in which they flood an IP with so much information it collapses due to the traffic and limited resources.

Type 2: Blue Hat

Blue Hat hackers are those that seek vengeance on individuals (or groups) who have made them angry. Most Blue Hats are beginners, but they have no desire to learn. Therefore, a Script Kiddie may become a Blue Hat if they are wronged and choose to take revenge.

Type 3: Black Hat

These are the men and women you hear about in the news. They find banks, companies, or other organizations with weak security and steal identities, trade secrets, money or credit card information.

Surprisingly, their methods of attack are often common hacking practices they learned early on.

Type 4: Red Hat

These are the vigilantes of the hacker world.

They’re like White Hats in that they halt Black Hats, but these folks are downright SCARY when it comes to skills and how far they’re willing to go.

Instead of reporting the malicious hacker, they will shut him/her down by uploading viruses, DoSing and accessing his/her computer to destroy the Black Hat from the inside out.

They leverage multiple aggressive methods that might even force the attacker to need a new computer.


One common Red Hat group you’ve probably heard of is Anonymous, a decentralized hacker group who have been active through the recent years.

Three of the group’s characteristics are:

  • an unrelenting moral stance on issues and rights, regardless of direct provocation
  • a physical presence that accompanies online hacking activity
  • a distinctive brand.

Anonymous have participated in events like #OpOK, a mutual Aid effort responding to the 2013 flash floods in the United States, and Operation Safe Winter, an effort to raise awareness about homelessness through the collection, collation, and redistribution of resources.

More notably, however, they have targeted those they deem amoral including groups such as ISIS, the KKK, and Thailand prisons after reports of prisoner mistreatment.

For more on Anonymous >>

Type 5: Gray Hat

Nothing is ever just black or white, and the same is true in the hacking community. Gray Hat hackers don’t steal money or information (though, they have been known to deface a website or two), yet they don’t help people for good (although they could if they wanted to).

These hackers comprise most of the hacking world, even though Red and Black Hat hackers garner most (if not all) of the media’s attention.

If you’d like to see some defaced websites >>

Type 6: Green Hat

These are the hacker beginners (or “n00bz”) but unlike Script Kiddies, they care about hacking and strive to become skilled hackers.

They’re often mocked by the hacker community for asking simple questions.

Side note: so should my site URL be greenhatHCKR? What do you think?

Type 7: White Hat

White Hat hackers are the good guys of the hacker world. Also known as ethical hackers, they’ll help you remove a virus or PenTest a company.

Most White Hat hackers have earned a college degree in IT security or computer science and must also be certified to pursue a career in hacking.

Although there are many certifications you can pursure as a White Hat, one of the most popular is the CEH (Certified Ethical Hacker) from the EC-Council.

If you’re curious about becoming an ethical hacker>>


So now that you know about all 7 types of hackers… what kind of hacker are you?

Let me know below!

Get informed. Stay safe.


Tags: ,

4 thoughts on “Types of Hackers”

  1. Diana says:

    Thank you so much …. knowing this info is very very important!

    1. Hi Diana,

      I’m glad you found this blog post helpful, keep an eye out for more helpful material in the near future.


Leave a Reply

Your email address will not be published. Required fields are marked *