Hacking

Exploiting vulnerabilities to gain unauthorized access

Ethical Hacking

Using different tools to validate, audit and report system/software vulnerabilities.

Hacker Types

Black Hat: Malicious, usually anonymous, destructive hacker

Grey Hat: Skills that focus on offense and defense

White Hat: Skills that focus only on defense

Script Kiddies: They use tools without understanding

Cyber Terrorist: Skilled hacker that want to further an ideology

State sponsored: Government-employed hackers focusing on both offensive and defensive activities

Hacktivism

A hacker whose activity is aimed at promoting a social or political cause.

Legal Aspects on Penetration Testing

You need Pen Testing Contracts.

Statement of Work (SoW) - Can be standalone or part of Master Service Agreement (MSA)