This article is part of a series on Computer hacking History * Phreaking * Cryptovirology * Hacking of consumer electronics * List of hackers Hacker culture & ethic * Hacker Manifesto * Black hat * Grey hat * White hat * Hackerspace * Hackathon * Hacktivism * Maker culture Conferences * Black Hat Briefings * Chaos Communication Congress * DEF CON * Hackers on Planet Earth Computer crime * Crimeware * List of computer criminals * Script kiddie Hacking tools * Forensics OS * Vulnerability * Exploit * Payload * Social engineering Practice sites * HackThisSite * Zone-H Malware * Rootkit * Backdoor * Trojan horse * Virus * Worm * Spyware * Ransomware * Logic bomb * Botnet * Keystroke logging * HIDS * Web shell Computer security * Application security * Network security Groups * Anonymous * Chaos Computer Club * Homebrew Computer Club (defunct) * Legion of Doom (defunct) * Masters of Deception (defunct) * Red and Blue Teams Publications * 2600: The Hacker Quarterly * Hacker News * Nuts and Volts * Phrack * v * t * e A black hat hacker (or black-hat hacker) is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain".[1] ## Origin The term's origin is often attributed to hacker culture theorist Richard Stallman (though he denies coining it)[2] to contrast the exploitative hacker with the white hat hacker who hacks protectively by drawing attention to vulnerabilities in computer systems that require repair.[3] The black hat/white hat terminology originates in the Western genre of popular American culture, in which black and white hats denote villainous and heroic cowboys respectively.[4] Black hat hackers are the stereotypical illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal".[5] Black hat hackers break into secure networks to destroy, modify, or steal data, or to make the networks unusable for authorized network users.[6] ## See also * Security hacker ## References 1. ↑ Moore, Robert (2005). Cybercrime: Investigating High Technology Computer Crime. Matthew Bender & Company. p. 258. ISBN 1-59345-303-5. 2. ↑ Laskow, Sarah (January 27, 2017). "The Counterintuitive History of Black Hats, White Hats, And Villains". https://www.atlasobscura.com/articles/the-counterintuitive-history-of-black-hats-white-hats-and-villains. "In early hacking circles, there was a whole separate term to refer to malicious hacking: those people were called crackers. Across the internet, Richard Stallman, who founded the GNU Project and Free Software Foundation, is often credited with coining the term 'black hat' hacker, but he says that’s not correct. 'I have never used terms 'X-hat hacker' because I reject the use of 'hacking' to refer to breaking security,' he says. Where did the term come from then? 'I don't know where,' he says." 3. ↑ O'Brien, Marakas, James, George (2011). Management Information Systems. New York, NY: McGraw-Hill/ Irwin. pp. 536–537. ISBN 978-0-07-752217-9. 4. ↑ Wilhelm, Thomas; Andress, Jason (2010). Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques. Elsevier. pp. 26–7. https://books.google.com/books?id=aVnA8pQmS54C&pg=PA26. 5. ↑ Moore, Robert (2006). Cybercrime: Investigating High-Technology Computer Crime (1st ed.). Cincinnati, Ohio: Anderson Publishing. ISBN 978-1-59345-303-9. 6. ↑ "Here Are The Top 5 Hackers Arrested in 2016". https://www.techworm.net/2017/02/top-5-hackers-arrested-authorities-2016.html. 0.00 (0 votes) | Retrieved from "https://handwiki.org/wiki/index.php?title=Black_hat&oldid=125345" *[v]: View this template *[t]: Discuss this template *[e]: Edit this template