Ethics, Law & Pentest Methodology
50 min
Ethical Hacking vs. Malicious Hacking
An ethical hacker (also called a penetration tester or white-hat hacker) uses the same tools, techniques, and mindset as malicious hackers — but with explicit written permission from the organization being tested, and with the goal of improving security rather than causing harm.
HACKER CATEGORIES
───────────────────────────────────────────────
⬜ White Hat → Authorized, ethical, reports vulnerabilities
⬛ Black Hat → Unauthorized, malicious intent, illegal
🔘 Grey Hat → Sometimes authorized, may disclose without permission
🟦 Blue Hat → Invited to test before product release
🔴 Red Team → Authorized adversary simulation team
🔵 Blue Team → Defenders; incident response & monitoring
Legal Framework
⚠️ CRITICAL — Always Get Written Authorization
Conducting any penetration testing, vulnerability scanning, or security testing WITHOUT explicit written permission is illegal in virtually every jurisdiction and can result in criminal prosecution, regardless of intent.
- India: IT Act 2000, Section 66 — unauthorized computer access is criminal offense
- USA: Computer Fraud and Abuse Act (CFAA)
- EU: Directive on Attacks Against Information Systems
- UK: Computer Misuse Act 1990
Penetration Testing Methodology
PENTEST PHASES
══════════════════════════════════════════════
Phase 1: PLANNING & SCOPING
─ Define scope (IPs, domains, applications)
─ Rules of Engagement (RoE)
─ Sign NDA and authorization documents
─ Define goals (black/grey/white box test)
Phase 2: RECONNAISSANCE
─ Passive: OSINT, Google dorks, Shodan
─ Active: Port scanning, service enum
Phase 3: SCANNING & VULNERABILITY ANALYSIS
─ Nmap, Nessus, OpenVAS
─ Identify exploitable vulnerabilities
Phase 4: EXPLOITATION
─ Verify vulnerabilities are real
─ Gain initial access within scope
Phase 5: POST-EXPLOITATION
─ Privilege escalation
─ Lateral movement
─ Data exfiltration simulation
Phase 6: REPORTING
─ Executive summary (business impact)
─ Technical findings + proof
─ Remediation recommendations
══════════════════════════════════════════════