As an ethical hacker you must agree to the some code of ethics

Keep private and confidential information gained in your professional work (in particular as it pertains to client lists and client personal information). Do not collect, give, sell, or transfer any personal information (such as name, e-mail address, social security number, or other unique identifier) to a third party without prior client consent. Protect the intellectual … Read more

Recognizing How Malicious Attackers Beget Ethical Hackers

You    need    protection    from    hacker    shenanigans;    you    have    to    become    as    savvy    as    the guys    trying    to attack    your    systems.    A    true    security    assessment    professional    possesses the    skills,    mindset,    and    tools    of    a hacker    but    is    also    trustworthy.    He    or    she    performs    the hacks    as    security    tests    against    systems    based  on how    hackers    might    work. … Read more

What Is Reverse Engineering?

Reverse engineering is the process of extracting the knowledge or design blue-prints from anything man-made. The concept has been around since long before computers or modern technology, and probably dates back to the days of the industrial revolution. It is very similar to scientific research, in which a researcher is attempting to work out the … Read more

Locations of the Penetration Test

Determining the locations in scope is critical to establishing the amount of travel and the level of effort involved for physical security testing, wireless war driving, and social engineering attacks. In some situations, it will not be practical to evaluate all sites, but you need to target the key locations. For example, where are the … Read more

Scope of a Penetration Test

Scope is probably the most important issue when planning a penetration test. The test may vary greatly depending on whether the client wants all of their systems covered or only a portion of them. It is important to get a feel for the types of systems within scope to properly price out the effort. The … Read more