Ethical hacking is a term to gain access to the system with a permission from the system’s owner. In the world of information security, most tend to use the term pentester, which is a short for penetration tester. Basically, pentesters do penetrate systems like a hacker, but for benign and good purposes. There are three forms of pentesting:
- White Box: This type of testing in which the information given to the tester is complete, which means that the pentester has been given all the information needed to penetrate the target.
- Gray Box: This type of testing in where the knowledge given to the pentester is limited. For example, a pentester acquires knowledge and information of IP Addresses, operating systems, the network environment, but that information is limited.
- Black Box: This type of testing in which the pentester has little or no knowledge of the target (This situation is similar to what the actual attacker would encounter, since they have a low level of knowledge of the target).