The debate on two categories of hacking is an on-going process. In both the types of hacking, the hacker gains access to resources and information. Generally, the term hacking is attached to the notion of illegal activity. Commonly raised question is that do these two categories really differ if the same function is performed in both? The difference is more moral in nature rather than technical. It is more of a question of morally right or wrong while the technical difference between the two is zero.

At its simplest, hacking is gaining access to a digital device, computer system, or network in an unauthorized or unintended way.
Hacking has a wide variety of applications—both good and bad—but it’s easy to see how hacking could be used for malicious purposes. Thus, we can tell the difference between ethical and unethical lies behind the ‘intentions of the hacker’.
What is Ethical Hacking?
An ethical hacker, also known as a white hat hacker, is a cybersecurity expert who tries to find security vulnerabilities to gain access to a digital device, computer system, or network.
The goal of ethical hacking is to evaluate the existing security system and find ways to strengthen and improve protection. When an ethical hacker finds vulnerabilities in a company’s software, the company can then resolve the issues before a malicious hacker can exploit them.
A true ethical hacker only starts hacking after receiving explicit permission from the owner.
Example 1: White Hat Hackers

What is Unethical Hacking?
Black hat hackers are those who hack illegally for self-gain or malicious purposes. This includes anyone who steals, leaks, accesses data, or disrupts computer devices and systems for malicious intent, financial gain, or any other motive.
The term “black hat” actually stems from old western movies where the criminal would be identified by his black attire and the hero would be recognized by his white hat.
Example 2: Black Hat Hackers

Is Ethical Hacking Legal?
In most of the world, existing laws on ethical hacking are ambiguous and don’t clearly cover all possible scenarios.
Both hackers and companies must take steps to protect themselves and make sure no laws are being broken.
In general, the best way for both parties to make sure they are legally in the clear is to sign a written agreement that defines the job that the ethical hacker is being hired to do.
One of the main differences between legal and illegal hacking is whether the hacking was authorized or unauthorized.

Becoming an Ethical Hacker
The real-world examples in the previous section show how a hacking code of ethics can make the difference between a hacker’s actions earning a $10,000 reward or a prison sentence.
Following ethical hacking guidelines is the only way to safely and legally get started as a hacker. It is also much easier to make money as an ethical hacker than as a black hat or grey hat.
With the current booming demand for skilled ethical hackers creating jobs and driving up salaries, the outlook for aspiring white hat hackers has never been brighter.
Real Life Example
One of the most famous cases is Kevin Mitnick, an incredibly talented American black hat hacker who is believed to have gained unauthorized access to hundreds of devices and networks over several decades.
Mitnick evaded authorities for many years, but he was finally caught, arrested, and sentenced to five years in prison after a high-profile FBI pursuit in 1995.
Today, Mitnick is an extremely successful security consultant who has provided ethical hacking services to some of the largest companies in the world. The former black hat hacker’s story is both fascinating and inspirational to anyone who is considering a career in hacking.
Thanks to a growing awareness about the benefits of ethical hacking, there are a ton of resources and opportunitiesout there for ethical hackers to take advantage of.
Conclusion
Thus, it is safe to say that hackers break into systems entirely to check for gaps in it and rectify them to update the systems whereas crackers break into the systems with the intention of exploiting them and for personal gains. This is not only unethical but is also an illegal and criminal activity. White Hats are employed by organizations to carry out hacking after being subjected to a legal contract. On the other hand, Black Hats do not succumb to any approval or agreement as they intend to violate the security of any system that they desire. While a cracker encroaches on personal data and information and uses is to his own advantage, the hacker commits the same action to help a company or an individual to ward off attacks from these crackers.
By: Aman Mishra , MSc CyberSec.
Very useful information about ethical hacking…
LikeLike