Skip to content

You are viewing a free preview of this lesson.

Subscribe to unlock all 10 lessons in this course and every other course on LearningBro.

What is Ethical Hacking

What is Ethical Hacking

Ethical hacking is the practice of legally and deliberately probing computer systems, networks, and applications to find security vulnerabilities before malicious attackers do. Also known as penetration testing or white-hat hacking, it is a critical discipline within cybersecurity that helps organisations identify and fix weaknesses in their defences.


The Hacker Spectrum

Hackers are commonly classified by their intent and legality:

Type Also Known As Intent Legality
White Hat Ethical hacker Find and fix vulnerabilities with authorisation Legal
Grey Hat Find vulnerabilities without explicit permission, then disclose Legally ambiguous
Black Hat Cracker / malicious hacker Exploit vulnerabilities for personal gain or damage Illegal
Script Kiddie Use pre-built tools without understanding them Often illegal
Hacktivist Hack to promote a political or social cause Illegal
State-Sponsored APT (Advanced Persistent Threat) Government-backed espionage or cyber warfare Varies by jurisdiction

Ethical hackers operate exclusively within the white-hat category, with written authorisation from the system owner.


Why Ethical Hacking Matters

1. Proactive Defence

Rather than waiting for a breach, ethical hacking identifies vulnerabilities before attackers exploit them:

  • Discovers misconfigurations in servers, firewalls, and applications
  • Validates that security controls are working as intended
  • Tests incident response procedures under realistic conditions

2. Regulatory Compliance

Many industries require regular security assessments:

  • PCI DSS — payment card industry mandates penetration testing
  • HIPAA — healthcare organisations must assess security risks
  • GDPR — data protection requirements include security testing
  • SOC 2 — service organisations demonstrate security controls
  • ISO 27001 — information security management standard

3. Financial Protection

The average cost of a data breach exceeds $4 million. Ethical hacking is a fraction of that cost.


Legal Frameworks

Ethical hacking is governed by laws that vary by country:

Country Key Legislation
United States Computer Fraud and Abuse Act (CFAA)
United Kingdom Computer Misuse Act 1990
European Union NIS2 Directive, GDPR
India Information Technology Act 2000
Australia Criminal Code Act 1995 (Part 10.7)

Rules of Engagement

Before any engagement, ethical hackers must have:

  1. Written authorisation — a signed scope document or contract
  2. Defined scope — which systems, networks, and applications are in scope
  3. Rules of engagement — testing hours, off-limits systems, escalation procedures
  4. Non-disclosure agreement — protect sensitive findings
  5. Emergency contacts — who to call if something breaks

Tip: Never test a system you do not have explicit, written permission to test. Even well-intentioned testing without authorisation can result in criminal charges.


Penetration Testing Methodology

Ethical hackers follow a structured methodology:

1. Planning & Scope Definition
        │
        ▼
2. Reconnaissance (Information Gathering)
        │
        ▼
3. Scanning & Enumeration
        │
        ▼
4. Vulnerability Analysis
        │
        ▼
5. Exploitation
        │
        ▼
6. Post-Exploitation
        │
        ▼
7. Reporting & Remediation

Industry Frameworks

Framework Description
OWASP Testing Guide Web application security testing methodology
PTES Penetration Testing Execution Standard
OSSTMM Open Source Security Testing Methodology Manual
NIST SP 800-115 Technical guide to information security testing
MITRE ATT&CK Knowledge base of adversary tactics and techniques

Certifications

Professional certifications validate ethical hacking skills:

Certification Provider Focus
CEH (Certified Ethical Hacker) EC-Council Broad ethical hacking knowledge
OSCP (Offensive Security Certified Professional) OffSec Hands-on penetration testing
eJPT (Junior Penetration Tester) INE Security Entry-level pen testing
CompTIA PenTest+ CompTIA Penetration testing and vulnerability management
GPEN (GIAC Penetration Tester) SANS/GIAC Advanced penetration testing
CREST CRT CREST UK/international pen testing standard

Tip: The OSCP is widely regarded as the gold standard for proving practical penetration testing ability, as it requires a 24-hour hands-on exam.


Ethical Hacking vs. Cybercrime

Aspect Ethical Hacking Cybercrime
Authorisation Explicit written permission No permission
Intent Improve security Steal, damage, or disrupt
Disclosure Report vulnerabilities to the owner Exploit or sell vulnerabilities
Legal status Lawful Criminal
Outcome Stronger defences Financial loss, data breaches

Summary

Ethical hacking is the authorised practice of testing systems for vulnerabilities to strengthen defences. White-hat hackers follow structured methodologies, operate within legal frameworks, and hold professional certifications. With written authorisation and a clear scope, ethical hackers provide organisations with invaluable insight into their security posture. In the following lessons, we will work through each phase of the penetration testing methodology.