Instructions

Read the following descriptions and decide whether they are examples of white hat, gray hat or black hat behavior.

Close

Hacker Hats

A hacker remotely shut down vulnerable devices that were previously hacked and were being used to launch a DDOS attack on websites.