All the ones who uses several tools or techniques to access some computer network and data are called Hackers. Hacker are divided into three categories based on their intent and rule of law.
Black Hat Hacker:
A Black Hat Hacker is generally a person who access computer systems or data without the permission of the owner. Black Hat Hackers are also responsible for creating malware that destroys or corrupts data. They do it for some financial or personal gain. They may steal the data, modify or delete the data of the attacked computer system.
White Hat Hacker:
A White Hat hacker is a person who access computer systems or data just like a Black Hat Hacker but with the permission of the owner. This makes the process legal. White Hat Hackers are generally employees of organizations or private security consultants hired by the owner to check for any vulnerabilities in their system for cyber attacks. They opt the same tools and techniques of Black Hat Hackers but do it for a good cause.
Grey Hat Hacker:
Grey Hat Hackers are often a freelance security professional who access computer systems without the permission of the owner and find the vulnerabilities and acquire data. Then they contact the owner with the details of the vulnerabilities and ask for a fee. If they didn’t get a good response and didn’t get the money they intended they will share the data with others online.