White hat hackers use their skills to protect computer systems and networks from cy­ber­at­tacks They use the same, wide-ranging methods as black hat hackers for iden­ti­fy­ing weak­ness­es in systems and networks.

What is a white hat hacker?

Most ordinary people think of hackers as people who sit behind a hidden computer screen and try to access systems and networks of in­di­vid­u­als, or­ga­ni­za­tions, au­thor­i­ties and companies with the intent to destroy them or steal private in­for­ma­tion. This isn’t com­plete­ly untrue as there are criminal hackers, of course. But it does a dis­ser­vice to the large amount of people who use their hacking skills for good. Hackers who hack into a system with the agreement of the owner and without any bad in­ten­tions, are called white hat hackers. They play an important role in the fight for more online security.

Note

Although the words “black” and “white” in this context aren’t normally con­sid­ered racist, they do imply a color binary that could be mis­un­der­stood as racist.

Their name comes from the old wild west films. In these westerns, the good guys were rec­og­niz­able from their white hats. This name was then passed to white hat hackers. The results of their work, which is also regularly called ethical hacking are then given to their “victims”. White hat hackers exploit security gaps to gain access to networks and systems. If they manage to do so, they will tell their employer so that these open doors can be closed. This helps avoid downtimes and data theft as well as reduces the chances of black hats causing any damage.

What type of white hat hackers are there?

The in­ten­tions and the processes used by white hats vary. While some dedicate their time for free to benefit online security and use their knowledge as well as their skills for good, others have made hacking their job. Companies and or­ga­ni­za­tions hire white hat hackers to thor­ough­ly test their own systems. If the hackers find any problems with the security, they can be properly and promptly addressed. If the hacker is unable to access con­fi­den­tial data, it is more than likely protected from criminals who use the same methods to access a secure system.

What methods do white hat hackers use?

The methods which white hat hackers use are varied and can depend on the client and the security ar­chi­tec­ture. The most well-known processes used by white hat hackers, with the un­der­stand­ing of their clients, are detailed below:

Pen­e­tra­tion tests

With pen­e­tra­tion testing, networks or in­di­vid­ual computers are checked for weak spots. White hat hackers will try to find an entry door into an entire system.

Social en­gi­neer­ing

Data center security isn’t just about the computers contained within the data center. Errors caused by humans can also cause sig­nif­i­cant gaps in security. With social en­gi­neer­ing, white hat hackers test employees by sending them malware or pushing them to send con­fi­den­tial data. The reaction of such employees can then be analyzed, and any problems noted can be fixed.

Software

By using a range of programs and tools, white hat hackers can attack systems and find weak points with the per­mis­sion of the operating system. Sometimes companies will also tender white hat hackers to attack their systems and offer a prize for anyone who, for example, can get around different cloud access security measures.

Honeypots

Honeypots, are nodes put down by white hat hackers to draw in criminal hackers. This allows them to be exposed or, at the very least, put off. This tactic is par­tic­u­lar­ly useful if you want to study and un­der­stand the methods used by other hackers trying to get into the system and then close any gaps with more security measures.

White hat hackers, black hats and gray hats

It’s very easy to say to that for every villain, there’s a hero. However, one look at the hacker col­lec­tive Anonymous and it quickly becomes clear that the reality is not always black and white. While most people look at the col­lec­tive as a group of activists, others see their methods as criminal. Alongside white hat hackers, there are two other groups of hackers: black hats and gray hats.

Black hats

Opposite to the white hat hackers, you have black hat hackers. Named after the an­tag­o­nists in old westerns who donned black hats, hackers in this group use gaps in security to access sensitive data or bring down a system. They do this for their own benefit and the hacking they do is illegal. Black hats blackmail companies, steal and sell data, or take down in­fra­struc­ture. They represent, therefore, the negative image that many people have about hackers. Some black hats, though, justify their actions for ide­o­log­i­cal reasons, nev­er­the­less the methods that they use are still illegal. White hats pre­dom­i­nant­ly work to protect systems from black hats.

Gray hats

The world isn’t black and white and the same applies to hacking. Gray hat hackers are a mix of white hat hackers and black hats. While they do use illegal methods to gain access to systems without being asked, they don’t steal anything. Instead, they inform the operator of the gaps. While some gray hats act for the common good, others use their skills simply to show off or gain notoriety. Targeted companies as well as white hats are mostly critical of gray hats since they operate illegally and without being asked.

Famous white hat hackers

There are many white hat hackers worldwide, in par­tic­u­lar, because they have turned legal attacks on a network into a lucrative job. Among the most famous white hat hackers are:

Sir Timothy Berners-Lee

Timothy Berners-Lee is the founder of the world wide web and today teaches at MIT and Oxford Uni­ver­si­ty. He is a champion of internet security and white hat hacking.

Dan Kaminsky

Dan Kaminsky was a well-known American security re­searcher who, among other things, dis­cov­ered an entry point to the DNS protocol. Kaminsky was one of the co­founders of Human Security (orig­i­nal­ly White Ops) and received a lot of contracts as a white hat hacker. He died in 2021 from diabetes.

Charlie Miller

Charlie Miller became famous after winning the hacking com­pe­ti­tion at the Pwn2Own con­fer­ence, later dis­cov­er­ing weak spots in Apple products. He worked for the NSA and in 2014 managed to crack the elec­tron­ic system of a Jeep Cherokee.

Go to Main Menu