What is a pentester?
Penetration testing (pentesting) or ethical hacking is where you assess the security of networks, websites, endpoints, mobile devices, wireless devices, operational technology/industrial control system (OT/ICS) infrastructure, and the security of physical facilities. This assessment might include performing vulnerability scanning and analysis, reviewing source code, performing open source intelligence (OSINT), gaining access to a target by exploiting vulnerabilities, escalating privileges, maintaining persistence, and more.
A key thing here is that you have permission as a pentester to attack the target as defined in the statement of work (SOW) of the penetration test (pentest). If you don't have permission, then it's illegal. Before starting action on any pentest, you need to review the rules of engagement (ROEs) and determine the scope of the pentest and verify that the client owns everything listed. I've reviewed SOWs before where the client...