Skip to content

Commit ee5bac7

Browse files
authored
[Content:Vocabulary] Different kinds of Infosec
1 parent ed8ce5b commit ee5bac7

File tree

1 file changed

+14
-1
lines changed

1 file changed

+14
-1
lines changed

README.md

Lines changed: 14 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,6 @@ This repository is a guide for amateurs pen testers and a summary of hacking too
3131
* [Exploitation Tools](#wrench-exploitation-tools)
3232
* [Sniffing & Spoofing](#busts_in_silhouette-sniffing--spoofing)
3333
* [Web Hacking](#rocket-web-hacking)
34-
* [Private Web Hacking](#zap-private-web-hacking)
3534
* [Post Exploitation](#tada-post-exploitation)
3635
* [Frameworks](#package-frameworks)
3736
* [Additional resources](#additional-resources)
@@ -55,12 +54,26 @@ This repository aim first to establish a reflection method on penetration testin
5554

5655
## Some vocabulary
5756

57+
**Infosec** : ...
58+
59+
**Opsec** : ...
60+
5861
**Black/grey/white hat hacker** : Someone who uses bugs or exploits to break into systems or applications. The goal and the method differs depending if he's a black, grey or white hat hacker. A black hat is just someone malicious that does not wait permission to break into a system or application. A white hat is *usually* a security researcher who practice ethical hacking. A grey hat is just in the middle of these two kind of hackers, he might want to be malicious if it can be benefit (data breach, money, whistleblowing ...).
5962

6063
**Penetration tester** : Most likely a white hacker who test applications and systems to secure them or find vulnerabilities.
6164

6265
**Security researcher** : Someone who practice pen testing and browse the web everyday to find phishing/fake websites, infected servers, bugs or vulnerabilities. He can work for a company so he's responsible for the security of systems.
6366

67+
**Red teamer** : ...
68+
69+
**Blue teamer** : ...
70+
71+
**Reverse engineer** : ...
72+
73+
**Social engineer** : ...
74+
75+
**Threat analyst** : ...
76+
6477
### Difference between hacking and ethical hacking
6578

6679
A black hat is practicing penetration testing, but unlike a white hat, this is not ethical hacking. Ethical hacking is about find vulnerabilities and improve the security of a system. An ethical hacker is the ultimate security professional. Ethical hackers know how to find and exploit vulnerabilities and weaknesses in various systems, just like a malicious hacker (a black hat hacker). In fact, they both use the same skills; however, an ethical hacker uses those skills in a legitimate, lawful manner to try to find vulnerabilities and fix them before the bad guys can get there and try to break in. An ethical hacker is basically a white hat hacker.

0 commit comments

Comments
 (0)