Ethical Hacker Career Guide: What's Inside
Ethical Hacker Career Guide: What's Inside
Ethical Hacker Career Guide: What's Inside
Career Guide
Marlese Lessing | SDxCentral
What’s Inside
• What is an Ethical Hacker?
• Top 10 Skills
• Related Definitions
E T H I CA L H AC K E R CA R E E R G U I D E
Growth Projection: 32% per year (via the Bureau of Labor Statistics)
Ethical hacking methods can involve everything from SQL injections, to DDoS attacks, to using
social engineering to gain access. The hacker will then write up a detailed report of the system’s
vulnerabilities and how the company can fix them. Ethical hackers are typically certified, meaning
they have to sit through an accredited course and pass an exam.
Ethical hackers need a creative mind, good client-facing skills, and the ability to stay on top of
the latest trends in malware and tech. They use a variety of techniques and tools to hack into an
enterprise’s systems, from finding vulnerabilities in the software, to using social engineering —
which is the psychological manipulation of people in order to gain their trust and get access to
restricted systems and areas.
In essence, they use the same tools and techniques that black hat (malicious) hackers depend on to
help enterprises fix the gaps in their security. Ethical hackers do this before black hat hackers can
exploit those gaps.
While not all ethical hackers are certified, a certification can make an applicant more desirable and
offer a higher salary range. The Certified Ethical Hacker exam is administered by the International
Council of Electronic Commerce Consultants (EC-Council), which offers a masterclass and
educational materials in preparation for the exam. The exam itself costs $1,199 to take (not counting
instructional expenses). There are several exam preparation courses available online, both for a
charge and for free.
Check out SDxCentral’s How to Get A Job in Tech Guide for resume and cover letter tips, top IT
skills, and other insights into the tech workforce.
1
E T H I CA L H AC K E R CA R E E R G U I D E
Top 10 Skills
Ethical hackers need to have a wide pool of knowledge, and avoid specializing
too much in one field at the expense of other skills.
2
E T H I CA L H AC K E R CA R E E R G U I D E
An important thing to remember when answering this question is that penetration testing does not
begin with scanning or technical tasks — instead, it starts with sitting down with the client to plan out
the timing and scale, and verifying the information they give to you. Ensure, for example, that the IP
addresses they give to you are correct, since it’s common for them to have typos.
When outlining how you would tackle the test, be detailed — outline which tools and methods you
would use, and why you would use them. As well, outline which factors would make you change your
approach.
2. Scanning, which is looking through the system for access points. This includes port scanning,
vulnerability scanning, and network mapping.
3. Gaining access, which involves the hacker using one of the ports or vulnerabilities to get into the
system.
4. Maintaining access, which is when the hacker manipulates the system for their own ends —
whether it’s gaining information, taking control of multiple email accounts or inserting malware. This
is all done without detection on the user or administrator’s end.
5. Covering tracks, which puts the system back as the hacker found it in order to avoid discovery.
This can include deleting or hiding files, clearing out email logs, and using a VPN to avoid IP tracking.
3
E T H I CA L H AC K E R CA R E E R G U I D E
On the other hand, hackers can perform a blind (or inferential) attack by sending data to the server
and seeing how it responds, gaining insight on the database’s response time and behavior. SQLi can
also be performed through a web application, which is known as an out-of-band attack.
Penetration tests give clients a solid idea of how secure their network and IT systems are, without
having to rely solely on promises from security firms and software companies. It also serves as
a learning opportunity for the enterprise on every level — from training lower level employees on
avoiding social engineering, to showing higher-level executives the devastating business impact a
poor investment in security can pose.
You should explain that security is more important than ever — as malware attacks continue to rise,
ransomware runs rampant, and as businesses lose millions of dollars and put their customers at risk
due to leaked information, it’s more critical than ever to have a robust security framework in place.
4
E T H I CA L H AC K E R CA R E E R G U I D E
Bug hunting in particular is a hot topic, since more businesses are That’s one way to do it. The other way is if I’m trying to get a hold of an
offering payouts for hackers who find and report vulnerabilities in their assistant, I’ll usually write, for example, “Hi, Tom I need to have this PDF
networks and sites. printed out immediately. Put it on this person’s desk, if you can do that
within the next hour or two, that’d be fantastic. This is an urgent matter.”
Messdaghi is the founder and CEO of women’s hacker advocacy group And usually the assistant downloads the PDF.
WeAreHackerz, leader of the San Francisco Bay Area chapter of Women
of Security, and an advocate for hacking as a more acceptable way to It’s fun sometimes, but also it lets you know that you have to be on your
protect enterprises from malware. Here are her thoughts on security, toes. I always tell people to not check your emails unless they’ve had their
representation, and hacking for the forces of good. caffeine intake. Attackers are aware that on the weekends and evenings
you’re probably under some sort of influence, or you’re not fully awake yet.
What’s your hacking background like? And so that is the perfect time to launch an attack.
I’ve been in the field for three years now; before I came in, I was a
management consultant for a cyber security company. I kind of learned What are your favorite aspects of ethical hacking?
it by accident. When I started working at a company called Bugcrowd, One of my favorite aspects of it is that a hacker has made a conscious
which is in the bug bounty space. I had a manager named Jason Haddix, decision to do it on the good side, which makes me really happy because
who is pretty well known in the bug bounty space, and he started teaching there are a lot of malicious actors out there. We need as many ethical
me the basics in Burp Suite. hackers as malicious actors to try to prevent these situations from
occurring.
I still promote bug bounty. I think it is one of those things that we don’t
really talk about how much it has impacted the infosec community,
The thing that I love about the hacker community, in general, is that
especially the hacker community, because it’s the first time that compa-
everyone supports each other and they hold each other accountable. If
nies or organizations are communicating with the hackers.
you were to go out of scope and you exploit something and you shared it
online, the bug bounty community will call you out on it.
That’s kind of a game-changing moment, because it’s slowly changing
the stereotypes of hackers and starting to bring more of a bilateral
Hackers are already on a fragile line as it is when it comes to recording
trust amongst organizations and hackers. Hackers are scared to report
things and the way that the public perceives us. When one person acts
vulnerabilities — 60% of them that find vulnerabilities don’t report it —
out in the way they’re not supposed to, it removes trust that has taken a
because of the fear of being prosecuted by an organization.
very, very long time for an organization to have when coming to work with
hackers.
Now one of the things I work on is social engineering. So I will test people
in companies, if they are on their toes when it comes to being phished or
hacked. What are some of the most valuable skill sets that
you’ve found that you need to rely on?
So when I do it for training purposes, usually where the person doesn’t
know they’re being tested, what I’ll do is I’ll send an email from maybe Curiosity. No matter if you’re technical or not technical, curiosity is
like a spoof personal email for the manager saying, for example, “Hey something you need to have, because infosec is such a big field of its
Jen, you’ve done such a fantastic job on the past few months, and I’ve own, and it’s very different from most other tech sectors. New things are
recognized it and I just wanted to give you this Amazon gift card,” with a happening all the time, new tools get out all the time, new vulnerabilities
[malicious link] in the email. to exploit happen all the time.
5
E T H I CA L H AC K E R CA R E E R G U I D E
If you have that constant curiosity, and you ask yourself how can I I had guys call me baby, or they turn around and tell you, “Oh, can you give
outsmart this and that, and how can I do whatever I can to serve and me a water?” “Hey, aren’t you supposed to be taking down notes?” I would
make sure that I’m protecting people, then you’re set. Many of us came in make a comment in the boardroom meeting, and no one would hear me.
here because of the curiosity, and many of us came in here because we It would just be like crickets. And then a guy would say the same thing I
want to prevent attacks from occurring. did, and everyone went to applaud him. And it just kept occurring.
I would [also] say the ability to keep up with the news. Infosec Twitter is After all that, I basically was looking for jobs outside of infosec. I was like,
definitely one of those things you have to be part of to understand what’s that’s it, I’m out. But then I went to a conference called Data Security and
going on. Follow people, ask questions, reach out to people. The thing I walked in this room, there’s like 200 women in there. It was the first time
that I really love about this industry is that you can write to a complete ever I saw women in infosec, like a whole group of women in infosec and I
stranger, and most likely they’re gonna respond to you. didn’t feel isolated anymore. It made me realize: I need to fight for this. We
need to fight for this.
Why are you an advocate for ethical hacking? Why
Since I’ve been in infosec, I have been assaulted twice at conferences.
is ethical hacking so important? I’ve had men try to get into my hotel room a few times as well. As you can
For me, it’s hearing people’s stories of what it’s like when you want to imagine, it gets pretty scary. So now I don’t stay in conference hotels, I
report something that you found, and you just can’t because you’re usually have someone with me at all times when I’m in public, to try to
worried that you’re going to be prosecuted if you even give them just a protect myself when I go to conferences. And I still continue to do that to
small mention. keep myself safe.
It’s sad to see all these incredible people that are trying to do something
good, but the laws themselves are so out of date. I mean, we’re still
What advice do you have for both women and
dealing with anti-hacking laws from 1984. We have anti-circumvention young professionals breaking into the hacking
laws around from 1998. And when you think about it, that was a whole space?
different world than how we are today. That was before Y2K.
Have a support group. I also really recommend that also to never, ever,
It’s really sad to see that this is still an ongoing thing. And then when you ever be silent about anything that has happened to you. That is bad.
see the press reporting how hackers are these terrible people, they’re Because chances are there are other people out there that have gone
doing these terrible things, you have to remind them there’s a difference through something just like you have, and they need to hear your story so
between a hacker and a cyber criminal. they can come out too.
Even still today, when I tell people I work with that in the hacker com- When it comes to if you have been assaulted or sexually harassed at
munity, they take a step back, or their jaw drops, because they’re afraid. work, make a police record. Don’t go to HR. HR is not there to help you.
Sometimes hackers do report it, but companies don’t fix it in time, like They’re there to protect the company. And so by filing a police report, it
what we saw on Equifax. You need a lot more ethical hackers than cyber prevents that person from ever doing it again.
criminals in this world.
As well, I always recommend reading into the people who are known
in the field. There’s this great book series called Tribe of Hackers, with
What kind of challenges have you come across as
different editions for different career paths. That is so important, because
a woman in infosec? I think that when you’re starting to see if this is a field for you, you need to
There are many. In my first year of work in the infosec field, I actually read about it and research it. It’s one of my favorite books in this industry
almost left. It got to a point where it was just so bad — I could not believe because it really touches on all the different elements in hacking that play
that people are putting up with this BS. a role.
In the first two weeks of joining infosec, the first cybersecurity company
Any final thoughts?
I worked for, I looked around the offices, and thought, where are the
women? I remember researching and finding out that like, only 11% of In terms of gender representation in the industry: It’s not changing fast
people in infosec are women. enough. We need to fix what is happening internally before we recruit
more women because, if anything happens to these people, you feel that
That scared me, and it really sunk in when I went to RSA in 2018 and I was guilt with it. We need to fix it.
in a room for a talk, and I saw that there were only a couple other women
in this room that had hundreds of men. This interview has been edited for brevity and clarity.
6
E T H I CA L H AC K E R CA R E E R G U I D E
7
Notes
About SDxCentral
SDxCentral is the leading resource for IT infrastructure knowled ge. IT departments and personnel are under more demand and
more scrutiny than ever. Their very role in their organizations is shifting. Along with that are new skill requirements cropping
up nearly every day. SDxCentral career content gives IT professionals a leg up in a competitive market, educating them on not
just the necessary hard skills but the soft skills that separate the good from the great. These guides are independent content
designed to share knowled ge and help technology professionals stay ahead of the curve. Sponsors have no say in the content
and do not review it in advance.
www.sdxcentral.com