# Hacking and its types

**Hacking:**\
A commonly used hacking definition is the act of compromising digital devices and networks through unauthorized access to an account or computer system. Hacking is not always a malicious act, but it is most commonly associated with illegal activity and data theft by cyber criminals.\
\
Computers and the Internet have changed the work environment of the world beyond imagination. Computers on taking over a major part of our lives, all our data has got transferred from records and ledgers to computers. Though this kind of shift in working has reduced the physical burden on workers it has also increased the chances of data theft. People involved in stealing data or harming the systems are knowledgeable people with wrong intentions known as Hackers. There are different types of hackers. Let’s take a look at how many types of hackers are there and the types of hacker attacks and techniques.

1. [**White Hat Hackers**](https://www.jigsawacademy.com/blogs/cyber-security/different-types-of-hackers/#White-Hat-Hackers)
2. [**Black Hat Hackers**](https://www.jigsawacademy.com/blogs/cyber-security/different-types-of-hackers/#Black-Hat-Hackers)
3. [**Gray Hat Hackers**](https://www.jigsawacademy.com/blogs/cyber-security/different-types-of-hackers/#Gray-Hat-Hackers)
4. [**Script Kiddies**](https://www.jigsawacademy.com/blogs/cyber-security/different-types-of-hackers/#Script-Kiddies)
5. [**Green Hat Hackers**](https://www.jigsawacademy.com/blogs/cyber-security/different-types-of-hackers/#Green-Hat-Hackers)
6. [**Blue Hat Hackers**](https://www.jigsawacademy.com/blogs/cyber-security/different-types-of-hackers/#Blue-Hat-Hackers)
7. [**Red Hat Hackers**](https://www.jigsawacademy.com/blogs/cyber-security/different-types-of-hackers/#Red-Hat-Hackers)
8. [**State/Nation Sponsored Hackers**](https://www.jigsawacademy.com/blogs/cyber-security/different-types-of-hackers/#State/Nation-Sponsored-Hackers)
9. [**Hacktivist**](https://www.jigsawacademy.com/blogs/cyber-security/different-types-of-hackers/#Hacktivist)
10. [**Malicious insider or Whistleblower**](https://www.jigsawacademy.com/blogs/cyber-security/different-types-of-hackers/#Malicious-insider-or-Whistleblower)

**Reference:**\
<https://www.jigsawacademy.com/blogs/cyber-security/different-types-of-hackers/>\
<https://www.fortinet.com/resources/cyberglossary/what-is-hacking>


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://syed-muhammad-abdul-karim.gitbook.io/learn-to-hack/where-to-start/hacking-and-its-types.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
