✔️Find and report vulnerabilities in the system before threat factors exploit them.
✔️Develop tools that can detect vulnerabilities and defend them.
✔️Strengthen the overall security posture of the system (both software and hardware components)
Learn more: https://www.strongboxit.com/different-type-of-hackers/