<div dir="ltr"><div class="gmail_default" style="font-family:tahoma,sans-serif">Hello Everyone,<br></div><div class="gmail_default" style="font-family:tahoma,sans-serif"><br></div><div class="gmail_default" style="font-family:tahoma,sans-serif">The red teams link this week is the following:</div><div class="gmail_default" style="font-family:tahoma,sans-serif"><a href="https://us.norton.com/internetsecurity-emerging-threats-what-is-the-difference-between-black-white-and-grey-hat-hackers.html">https://us.norton.com/internetsecurity-emerging-threats-what-is-the-difference-between-black-white-and-grey-hat-hackers.html</a> </div><div class="gmail_default" style="font-family:tahoma,sans-serif"><br></div><div class="gmail_default" style="font-family:tahoma,sans-serif">It describes some of the differences between the various &#39;hats&#39; that hackers wear, which primarily split hackers based on their motivations and operational patterns.</div><div class="gmail_default" style="font-family:tahoma,sans-serif"><br></div><div class="gmail_default" style="font-family:tahoma,sans-serif">* White hat hackers are generally employed specifically with the goal of penetration testing.</div><div class="gmail_default" style="font-family:tahoma,sans-serif">* Gray hat hackers seek to break into systems, although they operate outside the law in that they don&#39;t have any prior permission to do so. They might also post found exploits on the internet, but they do not exploit the systems for direct personal gain.</div><div class="gmail_default" style="font-family:tahoma,sans-serif">* Black Hat hackers are interested in personal gain, or they operate as part of a political or social goal. These are the people who make malware, and exploit systems. <br></div><div class="gmail_default" style="font-family:tahoma,sans-serif"><br></div><div class="gmail_default" style="font-family:tahoma,sans-serif">This is directly related to class because it explores the motivations of an attacker, and it allows you to understand the various roles that an attacker might play, and that attackers aren&#39;t always malicious.</div><div class="gmail_default" style="font-family:tahoma,sans-serif"><br></div><div class="gmail_default" style="font-family:tahoma,sans-serif">Thanks,</div><div class="gmail_default" style="font-family:tahoma,sans-serif">Thomas Pyle &amp; The Red Team</div></div>