Instructions

Read the following descriptions and decide whether they are examples of white hat, gray hat or black hat behavior.

Close

Hacker Hats

A hacker used social engineering techniques to access internal systems belonging to communications companies and used information he gained from them to hide his location and communications.