Exploiting vulnerabilities to gain unauthorized access
Using different tools to validate, audit and report system/software vulnerabilities.
Black Hat: Malicious, usually anonymous, destructive hacker
Grey Hat: Skills that focus on offense and defense
White Hat: Skills that focus only on defense
Script Kiddies: They use tools without understanding
Cyber Terrorist: Skilled hacker that want to further an ideology
State sponsored: Government-employed hackers focusing on both offensive and defensive activities
A hacker whose activity is aimed at promoting a social or political cause.
You need Pen Testing Contracts.
Statement of Work (SoW) - Can be standalone or part of Master Service Agreement (MSA)