Redhats are neither whitehat
, but a mix of both. Adapted from early RPG games where white mages used healing, protective "good" spells, black mages used elemental, destructive "bad" spells, and red mages had a selection of spells from both.
Examples of redhats:
- People who are hired to find security holes in a network, do so, but create new exploits in order to take advantage of later.
- Someone who breaks into a secure area and then informs the owner that they can fix the security holes if they hire them.
- Someone who works in network security and uses their job experience to take advantage of exploits either within their own company or elsewhere.
This redhat is offering to fix our security holes for $5,000.