The Difference Between the 6 Types of “HAT” Hackers and How They Work