in ,

Famous White Hat Hackers

Today we are going to know about the most famous white hat hackers but before starting we should know what are the white hat hackers?

Learn python from scratch for free

What is the white hat hacker?

Famous White Hat Hackers
White Hat Hackers

A white-hat hacker — conjointly noted as a “good hacker” or AN “ethical hacker” — is somebody World Health Organization exploits pc systems or networks to spot security flaws and build improvement recommendations.

A set of moral hackers are penetration testers, or “pentesters,” World Health Organization focuses specifically on finding vulnerabilities and assessing risk inside systems.

You may also like these:

Unlike black hat hackers, World Health Organization access systems illicitly, with malicious intent and infrequently for private gain, white hat hackers work with firms to assist determine weaknesses in their systems and build corresponding updates.

In some ways, white hat hackers are the antithesis of black hat hackers.

Not solely do white hat hackers forced an entry system with the intention of rising vulnerabilities, they are doing, therefore, to confirm that black hat hackers aren’t ready to illicitly access the system’s information.

Now lets move to the most famous hackers list:


The chief security officer at RAPID7

The open-source penetration testing platform, the Metasploit Project, founded in 2003 by MOORE as chief architect, has become one of the most influential security inventions of the era with its penetration-testing and exploits used to uncover network weakness, by the bad and the ugly.


senior security consultant, ISEC partners

He digs into flaws in mobile and VoIP systems, some of his public talks and demos about compromising VoIP systems have been so detailed that chief information security officers at major corporations said they couldn’t advocate investing in VoIP until the issues raised were addressed by vendors.


research principal engineer, fly logic

 Tarnovsky makes use of specialized tools in his lab to bypass supposedly tamper-resistant hardware circuitry in semiconductors to gain root control to tap into data. According to the Black Hat session, he did this recently with the Infineon processor with the Trusted Platform Module used in PCs, smart cards, and even Microsoft’s Xbox. Others aren’t likely to duplicate his feats.

You may also like these:


principal analyst, Independent Security Evaluators

Miller has hacked Safari for the last three years at the Pwn2Own contest, found an iPhone exploit that consisted entirely of SMS text messages, and was the first to hack Apple’s iPhone in 2007 and the Android phone in 2008. He also is credited with writing the first “virtual world” exploit for Second Life.


director of threat analysis at SecureWorks

Stewart is the first to identify dangerous new code specimens and how they work, such as the elusive Clampi Trojan and how the SoBig worm was sending spam. It all gives him an unpleasantly close look at East European and Chinese cyber-gang activity.


CEO and Founder HBGary

 He exposes vulnerabilities associated with the online game World of Warcraft, detailed in a book he co-authored with security expert Gary McGraw, “Exploiting Online Games.”

What do you think?

Written by My Inquisitor


Leave a Reply

GIPHY App Key not set. Please check settings




Encapsulation in Python- Day 14

Inheritance in Python – Day 15