You are viewing a free preview of this lesson.
Subscribe to unlock all 10 lessons in this course and every other course on LearningBro.
What is Ethical Hacking
What is Ethical Hacking
Ethical hacking is the practice of legally and deliberately probing computer systems, networks, and applications to find security vulnerabilities before malicious attackers do. Also known as penetration testing or white-hat hacking, it is a critical discipline within cybersecurity that helps organisations identify and fix weaknesses in their defences.
The Hacker Spectrum
Hackers are commonly classified by their intent and legality:
| Type | Also Known As | Intent | Legality |
|---|---|---|---|
| White Hat | Ethical hacker | Find and fix vulnerabilities with authorisation | Legal |
| Grey Hat | — | Find vulnerabilities without explicit permission, then disclose | Legally ambiguous |
| Black Hat | Cracker / malicious hacker | Exploit vulnerabilities for personal gain or damage | Illegal |
| Script Kiddie | — | Use pre-built tools without understanding them | Often illegal |
| Hacktivist | — | Hack to promote a political or social cause | Illegal |
| State-Sponsored | APT (Advanced Persistent Threat) | Government-backed espionage or cyber warfare | Varies by jurisdiction |
Ethical hackers operate exclusively within the white-hat category, with written authorisation from the system owner.
Why Ethical Hacking Matters
1. Proactive Defence
Rather than waiting for a breach, ethical hacking identifies vulnerabilities before attackers exploit them:
- Discovers misconfigurations in servers, firewalls, and applications
- Validates that security controls are working as intended
- Tests incident response procedures under realistic conditions
2. Regulatory Compliance
Many industries require regular security assessments:
- PCI DSS — payment card industry mandates penetration testing
- HIPAA — healthcare organisations must assess security risks
- GDPR — data protection requirements include security testing
- SOC 2 — service organisations demonstrate security controls
- ISO 27001 — information security management standard
3. Financial Protection
The average cost of a data breach exceeds $4 million. Ethical hacking is a fraction of that cost.
Legal Frameworks
Ethical hacking is governed by laws that vary by country:
| Country | Key Legislation |
|---|---|
| United States | Computer Fraud and Abuse Act (CFAA) |
| United Kingdom | Computer Misuse Act 1990 |
| European Union | NIS2 Directive, GDPR |
| India | Information Technology Act 2000 |
| Australia | Criminal Code Act 1995 (Part 10.7) |
Rules of Engagement
Before any engagement, ethical hackers must have:
- Written authorisation — a signed scope document or contract
- Defined scope — which systems, networks, and applications are in scope
- Rules of engagement — testing hours, off-limits systems, escalation procedures
- Non-disclosure agreement — protect sensitive findings
- Emergency contacts — who to call if something breaks
Tip: Never test a system you do not have explicit, written permission to test. Even well-intentioned testing without authorisation can result in criminal charges.
Penetration Testing Methodology
Ethical hackers follow a structured methodology:
1. Planning & Scope Definition
│
▼
2. Reconnaissance (Information Gathering)
│
▼
3. Scanning & Enumeration
│
▼
4. Vulnerability Analysis
│
▼
5. Exploitation
│
▼
6. Post-Exploitation
│
▼
7. Reporting & Remediation
Industry Frameworks
| Framework | Description |
|---|---|
| OWASP Testing Guide | Web application security testing methodology |
| PTES | Penetration Testing Execution Standard |
| OSSTMM | Open Source Security Testing Methodology Manual |
| NIST SP 800-115 | Technical guide to information security testing |
| MITRE ATT&CK | Knowledge base of adversary tactics and techniques |
Certifications
Professional certifications validate ethical hacking skills:
| Certification | Provider | Focus |
|---|---|---|
| CEH (Certified Ethical Hacker) | EC-Council | Broad ethical hacking knowledge |
| OSCP (Offensive Security Certified Professional) | OffSec | Hands-on penetration testing |
| eJPT (Junior Penetration Tester) | INE Security | Entry-level pen testing |
| CompTIA PenTest+ | CompTIA | Penetration testing and vulnerability management |
| GPEN (GIAC Penetration Tester) | SANS/GIAC | Advanced penetration testing |
| CREST CRT | CREST | UK/international pen testing standard |
Tip: The OSCP is widely regarded as the gold standard for proving practical penetration testing ability, as it requires a 24-hour hands-on exam.
Ethical Hacking vs. Cybercrime
| Aspect | Ethical Hacking | Cybercrime |
|---|---|---|
| Authorisation | Explicit written permission | No permission |
| Intent | Improve security | Steal, damage, or disrupt |
| Disclosure | Report vulnerabilities to the owner | Exploit or sell vulnerabilities |
| Legal status | Lawful | Criminal |
| Outcome | Stronger defences | Financial loss, data breaches |
Summary
Ethical hacking is the authorised practice of testing systems for vulnerabilities to strengthen defences. White-hat hackers follow structured methodologies, operate within legal frameworks, and hold professional certifications. With written authorisation and a clear scope, ethical hackers provide organisations with invaluable insight into their security posture. In the following lessons, we will work through each phase of the penetration testing methodology.