Technology 7 min read

How to Hack for the Greater Good: Inside Ethical Hacking

MatiasDelCarmine |

MatiasDelCarmine |

You may be familiar with the terms “white hat”, “black hat”, and “grey hat”, but what do they really mean?

As we move further towards an IoT future, interconnectivity is both a gift and a curse. If everything is connected, everything is vulnerable. But this also means that those vulnerabilities can be exploited for good causes.

Is there such a thing as “ethical hacking”?

Ethical #Hacking: How to Hack for GoodClick To Tweet

First, Let’s Define How White, Black, and Grey Refer to Hacking

The first thing to know about potential “ethical hacking” is that it doesn’t necessarily require ethical means by which you hack. If you are hacking a private security database, but not leaking the data to show how easily people’s privacy can be violated, you might be a grey hat hacker.

But let’s break that down: you can use any hacking means for any hacking goals. Think of it like a bingo board with white, black, and grey squares. Applying the terms “white”, “black”, and “grey” works similarly to how you might expect it to based on storytelling conventions.

  • White relates to a security specialist or hacker assessing network security; traditionally “above board” hackers who have permission from an organization or company
  • Grey relates to hackers or security specialists who may employ tactics from both white and black camps but could also relate to individuals whose goals don’t fall into “white” or “black” depending on perspective
  • Black relates to hackers treated as malicious; security breachers who exploit vulnerabilities in security for personal gain 

Tangible examples of these archetypes in action include Elliot from the tv series Mr. Robot. He serves in any of the three categories depending on which part of the show it is.

Another classic example is the teenagers in the 1990s film Hackers. A private sector hacker tries to frame them for black hat hacking, so they incorporate grey hat strategies to save themselves and out the actual bad guy.

But what are some real-world examples of each type of hacker and is there such a thing as ethical hacking?

The Epic Rise and Degradation of WikiLeaks as a Vigilante Hacking Group

One of the first mainstream hacking groups that started leaking information on a large scale was WikiLeaks. It started out as a source of information, specifically aimed at the United States in many ways. The mission was to avoid authoritarian, information-limited societies and to expose “secrets” for the common good.

You could loosely argue that WikiLeaks originated as a white hat hacking group before “white hat” came to solely mean security professionals. The group pursued its mission, usually releasing information that did not harm individuals.

As the group adapted over the years, however, its objective became muddled with allegations against its editor-in-chief Julian Assange. Coupled with the standing Russia conspiracy surrounding the most recent 2016 presidential election in the U.S., WikiLeaks has changed from a white hat organization into a grey hat organization.

More realistically, the organization shifted from a lighter grey to a darker color over the last few years. In trying to disperse information in more effective or provocative manners, some question if people’s information is threatened by this group that initially wanted to help the common people.

The reason for this: a shift in perspective and strategies along with allies. One other main hacking group makes headlines often. But many initially thought they were far more dangerous than WikiLeaks.

Where do Groups Like Anonymous Fall?

There are definite ethical lines when it comes to delineating grey hat hackers from black hat hackers. Ethical hacking requires adhering to a similar set of ethics or morals that the majority of society do. Blackmailing major companies for financial gain falls into the black hat category.

But many hacking groups don’t fear notoriety nor do they feel the need to live in obscurity. Vice chatted with some hackers from Basehack who were very open about making “hundreds of thousands of dollars a year”. But, they never hacked charities; mostly, they exploited “stupid” businesses (businesses with obvious security vulnerabilities).

Anonymous, loosely formed on a 4chan image board in 2003, went to bat for WikiLeaks once upon a time. Their hacking records ranges from Sony to Mastercard to the country Iran and more.

Anonymous has openly “declared war” on individuals it feels pose threats such as Donald Trump, Hillary Clinton, and Aaron Barr, someone who tried to finger Anonymous leadership. The group is very secular, claiming it has no official leadership.

These hackers also put members in two separate camps: white and black. Some, such as “Gary in the White Hat” who spoke with Huffington Post, operate in mostly legal, moral ways. Most of the members maintain a “black” or “white” status.

The group eschews the term “grey hat” in that it implies co-mingling. Again, Anonymous maintains a stance of loose associations, so it follows that the white vs. black hat hackers wouldn’t necessarily be in contact. Despite this, Anonymous could also be viewed as a “grey hat” group.

Ethical hacking is not outside their realm of actions…but it also isn’t their only focus either.

image of Rami Malek from tv show Mr. Robot for article How to Hack for the Greater Good: Inside Ethical Hacking
Mr. Robot | NBCUniversal via Heimdal Security

How Corporations and the Government Use Hackers to Better Their Security

White hat hackers are totally above board. In the very first episode of Mr. Robot, Elliot is recruited by the company he works for (Allsafe) to stop a DDoS attack on a client.

Due to his skillset, he becomes entrenched in helping find the perpetrator when he backtraces how the system was hacked. Of course, without spoiling how the show goes, it becomes much more complex than that.

But you see how having someone with knowledge of hacking strategies such as phishing, malware, DDoS, keystroke, or brute force hacking can be beneficial for a major company. It’s a turn toward the future many companies such as Equifax ought to consider moving forward. If you know how the enemy is going to fight you, you can better prepare your defenses.

In that same vein, online and real-world universities like Udemy and Berkeley now offer ethical hacking courses. You can become a Certified Ethical Hacker in no time at all. While black hat hacking can be profitable, white hat hacking can be, too.

The most practical, benevolent use of a hacker’s skills are employing them for bug bounties. These employ “hackers” to infiltrate a given company’s or government agency’s network or software suite to find bugs. This way, the developer is aware of flaws before bad actors find them out in the “wild”.

Ultimately, what the companies do with the result of their white hat hackers is what determines whether or not it is “ethical hacking”. That’s the troubling aspect of white hat work. You are a contractor selling your skills, but you have no real sway over how your work gets used when it is done.

Does ethical hacking mean hacking done under the supervision of your employing body? Or does it mean hacking for the betterment of all mankind, no matter the target or tactics used? Let us know your thoughts in the comments section below. 

First AI Web Content Optimization Platform Just for Writers

Found this article interesting?

Let Juliet Childers know how much you appreciate this article by clicking the heart icon and by sharing this article on social media.

Profile Image

Juliet Childers

Content Specialist and EDGY OG with a (mostly) healthy obsession with video games. She covers Industry buzz including VR/AR, content marketing, cybersecurity, AI, and many more.

Comments (15)
Most Recent most recent
  1. Profile Image
    Laura Craig January 31 at 12:17 pm GMT

    Contact Leonardo today for any infidelity Issues.
    He helped me to get into my husband’s phone remotely and he helped me to gain justice to my husband’s infidelity activities. He is professional and nice hacker to work with …Contact him on his email for hire or to know more about his services

    Leonardomitnickhacking@gmail. com
    Or whatsapp him via +1 305 440 5462

    • Profile Image
      David Jack April 13 at 1:37 pm GMT

      Are you looking to get the best hacker to hire with perfect assurance that your job will be done perfect without any traces. as the properties of a perfect hacker is anonymous ftp, which they guarantee you can contact kelvinethicalhacker @, for any hacking services, if you need a reliable hacker who will never delay your work and give you result within 6 hours you all should text him whatsApp + 1 (341)465-4599, he can help you hack any devices phone without the person knowing is phone has been hacked.,,,,..,,

    • Profile Image
      Christy O April 19 at 9:48 am GMT

      I have used the expertise of StealthyHacks@Gmail. Com and he was absolutely tremendous at what he does.

  2. Profile Image
    Peterson James November 05 at 12:46 am GMT

    Everyday I wake, I am very glad I hired this great hacker Viktor. This man helped me hack an iPhone within 6 hours. I could read all messages on the phone, emails, access to photos/ videos and an option to listen to phone calls. I was never the kind of guy to believe in hackers but I guess I was wrong all along. IF YOU NEED A HACKER, CONTACT VIKTOR VIA EMAIL: viktorhackworld @ gmail. com
    He offers so many other services, it’s a long list.

  3. Profile Image
    CINDY GATTO January 29 at 1:42 am GMT

    I’ ve got unlimited access to my husbands iPhone and PC and also have his activities in check thanks to this dude who is a Russian Hacker by his name Yuri I got introduced to from the UK who helped my friend boost her credit score. His assistance really meant a lot to me. I got access to my
    husband’s cell phone, WhatsApp calls, without his knowledge with just his cell phone number this badass did everything remotely, I don’t know.if it’s right to post his contact but I promised him referrals, alot of fake ass out here, also someone might need his help so welp. I’m grateful to Yuri.
    Email is spyhackpro9 @gmail com
    Good work always speak for itself, you should contact him!

  4. Profile Image
    Andrea Louis February 19 at 3:08 am GMT

    Life can be ridiculous at times, and it gets even worse when you have a cheating spouse. Thanks to a friend who introduced me to a sophisticated hacker who assisted me in obtaining all secret files that my husband had been hiding for several years of our marriage. He assisted in hacking and gaining access to my cheating husband’s icloud, social media networks, call log and spy call recording, monitoring SMS text messages remotely, cell phone GPS location tracking, spying on WhatsApp Messages, gmail, and kik, and I discovered he had done me dirty. The hacker is discrete and proactive in his work; you can reach him at hackrontech @gmail com. You won’t be sorry if you give him a shot today

  5. Profile Image
    Willie Jean March 21 at 12:17 am GMT

    I was one of many men who never thought a day would come when my wife would cheat on me. I found out when my friend and I jokingly got a hacker to spy on our wives’ phones. There were no signs at all of her infidelity so I was 100% sure that I wouldn’t get anything suspicious in her phone. On the other hand, my friend had doubts based on his wife’s recent behaviour. We got a cyber company called GearHead Engineers to do the job and they immediately sent us instructions which later gave us access to the women’s phones. The shock I felt when I checked her WhatsApp and messages is hard to describe. My wife is the sweetest and most caring woman on earth and there was no way I would ever imagine her hurting me in any way. But surprisingly, she had been sleeping with our son’s coach for what seemed like months. I ambushed her and her defence was that she got lonely because I no longer give her attention and affection but the truth is that I have been occupied with work since I am the breadwinner. I somehow understand her but at the same time I feel no emotion. I love my family and I don’t want us to go through the agony of divorce. What should I do?

  6. Profile Image
    CINDY GATTO April 04 at 4:05 pm GMT


    When it comes to retrieving stolen bitcoin, CRYPTO RECOVERY WIZARD is unique due to its skill, dedication, and experience. Knowing the ins and outs of the cryptocurrency world, they work closely with law enforcement and utilize cutting edge methods to locate and track down stolen bitcoin. Their exceptional reputation in the bitcoin recovery services industry stems from their individualized approach and unwavering dedication to client satisfaction. My bitcoin was stolen, and although I reached out to several hackers who said they could help me get it back, all they did was take additional money from me in the process. Upon reaching out to CRYPTO RECOVERY WIZARD for support, all hope was reestablished. I was first skeptical, but CRYPTO RECOVERY WIZARD eventually managed to retrieve my bitcoin. Thank you very much. contact CRYPTO RECOVERY WIZARD for help to get your ust/stolen funds back and be happy.
    Email: hackrontech@

  7. Profile Image
    Orson Rhodes April 10 at 11:12 pm GMT


    I have always wanted the best for my only son because I want him to experience the best the world can offer. This includes him ending up with a good woman. One thing about marriage, you know, is that the person you choose to spend the rest of your life with determines your happiness for the the rest of your life. I have been skeptical of every woman my son has brought around and I make sure I get to investigate before my son gets heartbroken. 2 years ago, a friend of mine shared on how she uses hackers to spy on her husband and so I got the idea to do a little bit of research on my potential daughters in-law. I casually asked for the hackers’ information and since then, I spy on every girl he introduces me to. The process is pretty simple, you send an email to gearhead @ engineer . com of the phone number of the person you want to spy on and after a few hours, they will send you the exact info you need. I have saved my son from 2 women who were eventually going to ruin his life and even though he will never find out what I have been doing, I am content that he has dodged deadly bullets.

  8. Profile Image
    David Jack April 13 at 1:36 pm GMT

    Are you looking to get the best hacker to hire with perfect assurance that your job will be done perfect without any traces. as the properties of a perfect hacker is anonymous ftp, which they guarantee you can contact kelvinethicalhacker @, for any hacking services, if you need a reliable hacker who will never delay your work and give you result within 6 hours you all should text him whatsApp + 1 (341)465-4599, he can help you hack any devices phone without the person knowing is phone has been hacked…

  9. Profile Image
    David Jack April 13 at 1:36 pm GMT

    Are you looking to get the best hacker to hire with perfect assurance that your job will be done perfect without any traces. as the properties of a perfect hacker is anonymous ftp, which they guarantee you can contact kelvinethicalhacker @, for any hacking services, if you need a reliable hacker who will never delay your work and give you result within 6 hours you all should text him whatsApp + 1 (341)465-4599, he can help you hack any devices phone without the person knowing is phone has been hacked,.,,.

  10. Profile Image
    CINDY GATTO April 14 at 5:03 pm GMT

    A vary big thanks to hackrontech @gmail com for the great the work you done for me, i got the email address on the net web when i needed to hack ny husband cell phone he helped me within few hourse with whatsApp hacking and GPS location tracking direct from my person phone i know how my husband walks, thanks for the helped you do for me for every greatfull for your helped, you can contact him through gmail via hackrontech @gmail com if you are in needed of hacking services, contact him for your own helped.

  11. Profile Image
    Valerie Kinterov April 15 at 6:53 am GMT

    I have spent so much time looking for a way to remove the negatives items impacting on my credit report. A friend of mine introduced me to this credit expert, I doubted the process at first because I was ripped off by some other person I met online So i had no hope than to take the risk, so i contact him to help me fix my credit score and clear off my criminal record. He increased my credit score from 480 to 800 . Contact him for your credit repair on his regular email GOLDCREDITFIX At Gmail Dot Com

  12. Profile Image
    Christy O April 19 at 9:42 am GMT

    Relationship are sometimes complicated. They are built on one key parameter which is trust but sometimes people tend to take advantage of the ones they were suppose to love and nothing else. There is no room for cheating in a relationship that’s being said YES. It’s quite subjective. Nevertheless, hurting your significant other feelings can be a heartbreaking thing for any person.
    Spying on someone without the knowledge is unethical unless you are sure the person is up to something which might hurt you physically or emotionally. In this modern age where everything is either smart or going to be, the means of communication is always very smart which means that you can keep a track of someone’s conversation.
    If you are in a relationship and you want to keep track of your Cheating spouse messages, there are lots of ways to do that with the help of the tech genius.
    Email; StealthyHacks@G mail. Com

  13. Profile Image
    Bola April 19 at 9:46 am GMT

    Beyond reasonable doubt, Kev ; DcipherBlaze at G mail dot Com, is the most reliable and diligent tech guy I’ve ever met online, he does this app that gives people access to another phone that is entirely out of their jurisdiction effortlessly. I am vouching for his expertise, send him a mail if you need such help.

share Scroll to top

Link Copied Successfully

Sign in

Sign in to access your personalized homepage, follow authors and topics you love, and clap for stories that matter to you.

Sign in with Google Sign in with Facebook

By using our site you agree to our privacy policy.