Red Hat Hackers: They can be also referred to as the eagle-eyed hackers. Like white hat hackers, purple hat hackers also aims to halt the black hat hackers. There is a big variance in the way they operate.Ethical hackers use only legal techniques to assess information security. They do not associate with black hats or take part in destructive hacks