Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 1234

White Hat Hacker

What is White Hat Hacker?

White Hat HackerA security professional who uses offensive skills only with explicit authorization, to find and report vulnerabilities so defenders can fix them.


A white hat hacker is an ethical security practitioner who operates strictly within the law and with permission from the owner of the system being tested. White hats work as penetration testers, application security engineers, red teamers, vulnerability researchers, and bug bounty hunters. They follow rules of engagement, coordinated disclosure timelines, and standards from organizations like OWASP, NIST, and CREST. Their goal is to improve security posture rather than cause harm, monetary loss, or unauthorized data access. Many also hold formal certifications such as OSCP, CRTO, CISSP, or CEH and operate under written contracts that scope targets and prohibit actions that would damage availability or violate privacy.

Examples

  1. 01

    A white hat hacker reporting a privilege-escalation bug via a vendor's bug bounty program within 24 hours of discovery.

  2. 02

    An external pentester delivering a signed report with remediations after a scoped engagement.

Frequently asked questions

What is White Hat Hacker?

A security professional who uses offensive skills only with explicit authorization, to find and report vulnerabilities so defenders can fix them. It belongs to the Defense & Operations category of cybersecurity.

What does White Hat Hacker mean?

A security professional who uses offensive skills only with explicit authorization, to find and report vulnerabilities so defenders can fix them.

How does White Hat Hacker work?

A white hat hacker is an ethical security practitioner who operates strictly within the law and with permission from the owner of the system being tested. White hats work as penetration testers, application security engineers, red teamers, vulnerability researchers, and bug bounty hunters. They follow rules of engagement, coordinated disclosure timelines, and standards from organizations like OWASP, NIST, and CREST. Their goal is to improve security posture rather than cause harm, monetary loss, or unauthorized data access. Many also hold formal certifications such as OSCP, CRTO, CISSP, or CEH and operate under written contracts that scope targets and prohibit actions that would damage availability or violate privacy.

How do you defend against White Hat Hacker?

Defences for White Hat Hacker typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for White Hat Hacker?

Common alternative names include: Ethical hacker, White-hat.

Related terms

See also