How to understand us, the Pentesters

(Photo by Arthur Chauvineau on Unsplash)

Companies and organizations are lacking a lot of understanding of how a pentester or ethical hacker is working to provide the best results possible. So in this article, we are going to focus on the parts that are still misunderstood by a lot of people when we are talking about pentesters as humans.

We are artists

--

--

--

Cyber Security Enthusiast, Freelancer, Researcher, Bug Bounty Hunter and InfoSec Writer.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Australia Bans Encryption!

WordPress Plugins | Hidden Backdoors

A Remotely-Proctored Exam

{UPDATE} King of Party! Hack Free Resources Generator

Transform your $15 router to $200 security router for FREE

Story of a weird CSRF bug

Digital Identity as we know it…

How to win an Unauthorized Transaction Chargeback with ease

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Cristian Cornea

Cristian Cornea

Cyber Security Enthusiast, Freelancer, Researcher, Bug Bounty Hunter and InfoSec Writer.

More from Medium

Getting Started with Covenant C2 for Red Teaming

Forwarding Burp Suite Traffic Through SOCKS Proxy

Windows Persistence Using WSL2

Attacktive Directory Walkthrough -THM