weddige,
@weddige@gruene.social avatar

What do you consider "ethical hacking" and what not?

I'm trying to get different perspectives on how to define it.

#infosec #ethicalhacking

nopatience,
@nopatience@swecyb.com avatar

deleted_by_author

  • Loading...
  • weddige,
    @weddige@gruene.social avatar

    @nopatience That's a good point to start with, and it works well for pentesting (as in I hire someone to hack me) and bug bounty programmes (as a blanket permission to hack certain systems).

    But where do you put whistleblowers who are either reporting something they stumbled upon, or who are actively looking for vulnerabilities outside of any testing permission?

    Does it make a difference if third parties, such as customers, were affected by the vulnerability?

  • All
  • Subscribed
  • Moderated
  • Favorites
  • infosec
  • ngwrru68w68
  • rosin
  • GTA5RPClips
  • osvaldo12
  • love
  • Youngstown
  • slotface
  • khanakhh
  • everett
  • kavyap
  • mdbf
  • DreamBathrooms
  • thenastyranch
  • magazineikmin
  • megavids
  • InstantRegret
  • normalnudes
  • tacticalgear
  • cubers
  • ethstaker
  • modclub
  • cisconetworking
  • Durango
  • anitta
  • Leos
  • tester
  • provamag3
  • JUstTest
  • All magazines