Learning Library

← Back to Library

What Ethical Hackers Actually Do

Key Points

  • The video delves into the day‑to‑day responsibilities of an ethical hacker, expanding on the role introduced in the series’ first episode.
  • Ethical hacking is framed as a layered process: automated vulnerability scanning at the base, manual penetration testing in the middle, and full‑scale red‑team simulations at the top.
  • While hackers “break things” for fun, their primary value to clients is delivering detailed reports and recommendations that improve security, emphasizing strict ethical standards and extensive documentation.
  • A core engagement type is adversarial simulation, which requires careful pre‑engagement planning and definition of scope, objectives, and rules of engagement before any testing begins.

Full Transcript

# What Ethical Hackers Actually Do **Source:** [https://www.youtube.com/watch?v=bSVGrA1_gYw](https://www.youtube.com/watch?v=bSVGrA1_gYw) **Duration:** 00:17:27 ## Summary - The video delves into the day‑to‑day responsibilities of an ethical hacker, expanding on the role introduced in the series’ first episode. - Ethical hacking is framed as a layered process: automated vulnerability scanning at the base, manual penetration testing in the middle, and full‑scale red‑team simulations at the top. - While hackers “break things” for fun, their primary value to clients is delivering detailed reports and recommendations that improve security, emphasizing strict ethical standards and extensive documentation. - A core engagement type is adversarial simulation, which requires careful pre‑engagement planning and definition of scope, objectives, and rules of engagement before any testing begins. ## Sections - [00:00:00](https://www.youtube.com/watch?v=bSVGrA1_gYw&t=0s) **Ethical Hacking Job Deep Dive** - The segment introduces the second video of the series, featuring a live ethical hacker who explains the core responsibilities—vulnerability scanning, penetration testing, and red teaming—while recapping the ethical hacking pyramid. - [00:03:11](https://www.youtube.com/watch?v=bSVGrA1_gYw&t=191s) **Scenario‑Based Security Testing Planning** - The speaker explains how to craft realistic threat‑actor scenarios and define goals, rules of engagement, and budget constraints to shape effective client security testing. - [00:07:57](https://www.youtube.com/watch?v=bSVGrA1_gYw&t=477s) **Architect vs Ethical Hacker** - A security architect contrasts his internal, design‑focused approach—using business and system context diagrams—to that of an ethical hacker, explaining how each role contributes to strengthening a client’s cyber environment. - [00:11:15](https://www.youtube.com/watch?v=bSVGrA1_gYw&t=675s) **From Recon to Exploitation: Using MITRE ATT&CK** - The speaker outlines the hacker mindset of finding entry points, establishing a foothold, and then employing TTPs—referencing the MITRE ATT&CK framework—as a guide for ethical hacking engagements. - [00:15:42](https://www.youtube.com/watch?v=bSVGrA1_gYw&t=942s) **Beyond Exploits: Reporting Tools** - The segment explains how a foothold leads to system damage, underscores command‑and‑control as essential in red teaming, and highlights the unexpected but critical role of tools like PowerPoint and Word for documenting and communicating findings to clients and oversight teams. ## Full Transcript
0:00Welcome back to the second video in our series  on ethical hacking. In the first video, we 0:05took a look at the role of the ethical hacker in  general. In this video, we're going to do a little 0:11bit deeper dive into what the job involves, the  actual tasks and considerations that an ethical 0:16hacker has to do. And in the final video, we'll  take a look at how you can potentially go about 0:21getting a job in this space. So, in order to talk  about this, I thought I'd bring along a real live 0:27ethical hacker. We took him out of his native  environment and brought him here into the studio. 0:32Patrick, it's good to have you with us. Thanks  so much, Jeff. Yeah. So, in our first video, 0:36we took a look at this. Maybe just review that  real quickly. The this pyramid of ethical hacking, 0:42the activities that are involved. Sure. Yeah.  This is just a couple of the primary components 0:46you might put into the bucket of ethical hacking.  The bottom we have vulnerability scanning. This 0:50is our more automated type of of of testing  where we're looking at the big picture and 0:54understanding what are all the vulnerabilities.  Then we got our penetration testing where we're 0:58bringing in a a talented tester to sit behind the  tools and do actual exploits and understand the 1:04impact of those. And on top of that, we have our  red teaming where we're trying to replicate the 1:09perspective of a real world threat actor. Okay.  So basically what I heard you say is you get 1:14paid to joy ride on the internet all day long.  Just type stuff really fast, break everything, 1:20and then you get paid, right? That that's what you  do, right? Not exactly. Uh, as fun as that sounds, 1:25what we actually like to say around the industry  is we hack for fun. We get paid to deliver a 1:31report. And you know, that's because we want to  make sure that the people who are doing this work 1:34are people who can think like a hacker, have the  mind of a hacker, but in the end, we want to be 1:39able to work with our clients to help them become  more secure by understanding, you know, what 1:43should we do when we find these vulnerabilities.  Sure. And a big part of that is the ethical part 1:48of this hacking. A lot of people I think just want  to lean into the what they think is the video game 1:52fun part of this and that's breaking a whole bunch  of stuff. So here's a reality check. It involves 1:58ethics and it involves also having to do a lot of  documentation, other work like that. That's right. 2:04Yeah. So tell me, let's break this down into  a little more. If you were going to do and and 2:08what you do is appear in this space, right? You  do adversarial simulation. That's right. And so 2:15if you were going to be involved in an engagement  like for instance an engagement that that involves 2:20adversarial simulation, what goes into it? What  what kind of things do you have to define when you 2:26start with this? So there's two primary buckets  you could probably put these things into. The 2:30first one would be our goals and the other one  would probably be our our rules of engagement. 2:36Gotcha. And under the roles uh under the goals,  what kind of things fit there? So there's there's 2:42two ways you could break this down. From a a you  know a macro standpoint, from the big picture, 2:47we really want to always uh for every engagement  help a client understand um what's their ability 2:53to detect and prevent a bad guy from breaking in.  Yeah. Yeah. Exactly. So you've got to go through 2:59these scenarios to make sure you know what what  in general is involved. What what would someone do 3:05at the big level? Now, if you've got a macro, I'm  sure you're going to also tell me there's a micro. 3:11Sure. So, we're thinking about goals and we're  speaking with a client, we always want to say, 3:15how do we design the scenario so that we give you  the the most effective type of test? We think of 3:20a scenario. It might be something like, imagine  you're a bank. Uh we want to be the the threat 3:25actor, the bad guy who breaks in. What are the  types of things that they're going to do? Well, 3:28they're going to, you know, maybe try to steal  money, get to an account, move move dollars from 3:32one account to another. And that scenario helps  us define how we actually do the testing. So this 3:36is now down more at the use case and up here you  started kind of in general I'm assuming talking 3:42about here are the kinds of things that a bad guy  would want. You know these are the goals that they 3:47might have. So therefore what are our goals  needing to be in order to guard against that? 3:52That's right. Okay. So rules of engagement. Uh you  mean you have to follow rules. You don't just get 3:58to do whatever you want. Uh, as much fun as that  might be, uh, we do have to have rules and maybe 4:03starting with something like a statement of work.  Yeah, exactly. I think this is really important. 4:08Uh, I' I've heard ethical hackers say that if  given enough time, they could probably break 4:14into any system, but nobody has unlimited time.  Nobody's going to pay you an unlimited budget 4:20in order to do that work. So, how much time if we  consider these kinds of engagements, how much time 4:25are they generally allotted that a client will pay  for somebody to do this kind of work? Well, we'd 4:30love it if they gave us unlimited time uh because  hacking is a lot of fun. However, you're right. We 4:35do always want to to make sure that we're spending  our time wisely. And so, we think about, you know, 4:40these these three categories up here. If we look  at vulnerability scanning, that could be maybe 20 4:44to 40 hours of work. Um, a penetration test could  be maybe 40 to 80. and an adversary simulation or 4:51a red team could be something like two to four  months or maybe even longer depending on you 4:55know what type of testing we're doing. Yeah. So  you start with just maybe a single week all the 4:59way up to multiple months depending on the level  of engagement that the client wants to do here. 5:04That's right. And then I think you also have to  consider it's not just the hacking part that we're 5:09doing. If they give you a week or they give you  two months, you've also got to they're going to 5:14expect some deliverables at the end of all of  this. They want you to document your findings 5:19and your recommendations and things like that.  So, it's not 40 hours of joying the internet. As 5:25I said before, uh you got to split some of that up  and figure out how you're going to explain back to 5:30them what you just did and what your learnings  were. Quite a bit of that time actually. It's 5:34reporting is the most important part of the the  whole process. Yeah. Yeah. Exactly. Okay. So, 5:39but uh how about in terms of uh anything else  we need to consider here? Definitely. So, uh, 5:45in any test, there's always going to be some sort  of limitations. That could be anything from, you 5:49know, specific people or geographies or particular  types of systems that that we're going to want to 5:55understand, you know, do we want to test against  those or not and how that might affect the the 5:58overall engagement process. Yeah, I can imagine,  for instance, an e-commerce company, if it's right 6:03around the holiday buying season, really doesn't  want you taking their systems down right when all 6:08their customers are supposed to be there, even  though you might be able to. So they might put 6:12some limits and say, "Okay, you can do this,  but you can't do that." And by the way, that's 6:17a big difference between an ethical hacker and an  unethical hacker. You've got to work within these 6:22constraints, these constraints of time and money  and resources and and some rules and and things 6:28like that. So your job actually is significantly  harder, I would say. Yeah. And it's really 6:33important that we think about this entire picture  when we're designing the engagement to make sure 6:37that you, as you said, a real bad guy doesn't have  these rules. So, how do we do the testing where we 6:42get the same effectiveness without putting things  at risk? Sure. And then within the organization, 6:47so you're basically doing the red teaming for  them. They would have a blue team that's on the 6:53defense side. And what is the blue team doing in  this case? Well, depending on exactly what type 6:58of testing you're doing, you know, they may be  involved and be very aware and they would be on, 7:02you know, things like status calls and updates.  Uh but in a lots of the red teaming, we'd actually 7:07want them to be unaware because we want to we want  to test them as part of this engagement. Yeah. So 7:12they may be completely in the dark about this and  that adds a different element of realism to the 7:19ethical hacking exercise that you're doing. You  would be testing not only if the systems stand up, 7:25but do they have the processes to detect and to  prevent and to respond. That's right. We call 7:31that the people processes and technology. Yeah.  Yeah. This is really important. People, process, 7:36and technology. All of those going together are  what allow you to actually implement security. And 7:42then how do you decide if you were successful or  not? Sure. So, one other key element, particularly 7:48in a a red team type test, uh, is our referee  team. And there's lots of names you might use 7:53here, but essentially these are the people who are  aware of the fact that the testing is happening. 7:57They're in charge of of socializing, disseminating  information, controlling the flow between, 8:02you know, the red team and the blue team as  needed, making sure that things happen in a safe 8:07and effective way. So, there's a lot of moving  parts in this whole thing. I would say it's very 8:12complex. So, I'm a cyber security architect  and here Patrick is an ethical hacker. So, 8:18I thought it might be interesting to sort of  compare and contrast how we both go about trying 8:23to make a client's environment more secure. So  from my perspective uh the security architect is 8:30often kind of looking at this more from an inside  out perspective. So I'm trying to look at what the 8:35system is, what the desired state is and probe it  and figure out where might the weak points be. A 8:42lot of this is work from a whiteboard rather than  a keyboard. And some of the inputs that I need are 8:49things like a business context diagram. That's  going to tell me what are the major components 8:54of the business of the organization that need to  interact with each other. And understanding those 8:59interactions is key. I also need to see something  like a system context diagram where now it's not 9:05only the elements of the business, but it's the  elements of the system, the major system uh pieces 9:11that are out there and how they might interact.  And then each one of these drills down a little 9:16more a reference architecture where the reference  architecture breaks down and shows me some of the 9:21components of these major systems. I can then look  at all of that kind of stuff and start to figure 9:26if I was a bad guy, where do I think this thing  might fail? That's my kind of premortem uh type 9:33of of thinking. So where might the weaknesses be?  Well, now for an ethical hacker, I think Patrick, 9:39you tend to take more of the opposite, more of an  outside in approach. That's right. And you know, 9:45one of the things you said was where might  the weaknesses be. When you think about it 9:49from the ethical hacking standpoint and um you  know, understanding where those weaknesses are. 9:53We're going to start from look at what all the  possibilities are. So, you know, we might work 9:58with a client and they say here's the scope.  Here's the the the left and right bounds of what 10:02we want to define as part of our test. And from  there, we're going to start our reconnaissance. 10:06So, we're going to see what's all the information  we can possibly gather, whether that's looking 10:10directly at the system or maybe a little bit  bigger picture, looking at um you know, employee 10:16social media accounts. What have they posted on  places like Glass Door so we can learn about any 10:21information we can get is good information. Um,  even as far as potentially looking at at the dark 10:26web, you'd be surprised how many passwords end  up on on the dark web that are very useful to, 10:32you know, uh, real bad guys and pretend bad guys  alike. No doubt. All of that information makes you 10:38smarter about what what an outsider would also  have access to. A lot of this kind of stuff as 10:44well. They might not have access to this, but this  you're starting as an outsider and you're going to 10:49do that kind of reconnaissance. If you're going  to break into a place, you want to figure out, 10:53you want to kind of case the joint first, and  that's what that's involving. I think that's 10:56exactly the the key is gaining the perspective  of what does it look like from the outside and 11:02and how might someone go about that process so we  understand better how to defend ourselves. Yeah, 11:06sure. What else is involved here? So, uh, once  you have all the information and the scope, 11:11you're going to maybe want to move to a more  active phase where we're actually doing probing. 11:15So looking for vulnerabilities, looking for  potential entry points and understanding what 11:20might my next steps be. Okay. And then once you  probe, you find a weak spot and you're able to 11:26establish what? A foothold. That's right. So we're  on the outside and we want to be on the inside. So 11:31we need to find a way to actually access, you  know, the network, the target environment. How 11:35are we going to get in? Yeah. And then from there,  you can go to all sorts of other thing and the fun 11:40really begins. Okay, Patrick, let's take a little  bit deeper dive into the ethical hacker part of 11:46all of this. So, what would your engagements look  like? Sure. Um, so one way you might want to think 11:52about it is from the the perspective of TTPs or  techniques, tactics, and procedures. And you know, 11:59in practice, what that means is how do we do what  we do from the hacker's perspective? Yeah. And 12:05there's a the this is basically the recipe  that describes how an attack occurs. Uh if 12:12somebody's going to attack you, they're going to  use certain ones of these different TTPs. And is 12:17there a place where all that stuff is collected?  Sure. There's there's quite a few places. Uh one 12:21really good one I recommend people look at if  they've never explored this topic before is 12:24the MITRE attack framework. And the MITRE attack  framework gives us a really good shared set of of 12:31uh language points and ideas to talk about, hey,  when we when a a hacker does a particular thing, 12:37how do they do it and how do we think about how  it was accomplished? Yeah. And the beauty of that 12:42is if I tell you I've experienced a particular  type of attack, I can reference it reference it 12:47from this attack framework and you have a copy  of it as well and you have a really good idea 12:52of what it is. So it is kind of a common language  for all of us then. That's exactly right. And it 12:56also gives us, you know, from off of the back of  that, you could think of how do we defend against 13:00it? You know, how do we talk about it in a way  make sure it doesn't happen again. Absolutely. 13:04And I would think as an ethical hacker, you  could essentially use this as a checklist. 13:09Uh you're not going to be able to uh to look at  every single version of TTPs and combinations, 13:16but you could look at general categories and see,  you know, did we consider any of this type? Did 13:20we consider enough of those type? And that sort  of thing. It it really is. And it's not that it 13:25can always be comprehensive, but it does give a  very good uh overview of what are all the ways 13:30that these things can happen from the perspective  of a threat actor or a hacker. Yeah. Okay. Now, 13:35how about tools? Uh because you not going to  do all of this just in your head. Uh there are 13:40going to be tools and we we looked at earlier in  the video different types in the the pyramid of 13:46vulnerability testing and and pen testing and  then red teaming. What are the tools that each 13:51one of these groups would use? for instance. Yeah,  definitely. So, you can imagine that, you know, 13:57starting with something like vulnerability  scanning and and moving through the types of 14:00testing that they use very different types of  tools because they have different, you know, 14:03ways of going about what they do. Um, but starting  with something like vulnerability scanning, really 14:08popular ones might be uh things like Nessus or  or Qualas. Um those are, you know, industrywide. 14:14They're well known and they're established  as, you know, effective tools in their fields. 14:18Yeah, these are very popular uh and and automate a  lot of the process for you. They sure do. And and 14:24going back to what we said about things like MITRE  attack, they also give us sort of shared language 14:29to talk about if we see a vulnerability, what is  it? How do we classify it? Sure. And then then the 14:34next group then are the pen testers and what kind  of tools do they use? Sure. Um you know, and this 14:39is obviously could be a an infinite list. There's  there's lots, but two of the the first ones that 14:43come to my mind are tools like NMAP uh for things  like network scanning or something like Burp or 14:49you know Burp Suite. Excuse you. Thank you. Yeah,  NMAP has been around for ages. I remember that 14:55back when I was first starting decades ago. So  interesting to see that some of these tools still 15:01continue to live and show their value. Definitely.  And and interestingly enough, Inmap continues to 15:05be developed. They're still writing code for it.  That's amazing. And then over here on the red side 15:11then tell me what kind of tools are important for  you. So this is kind of an interesting one because 15:15red teaming is a little bit unique in the way  that it thinks about tools uh in that they're more 15:19conceptual than they are you know recommending  something like in map but one of the ones I would 15:23start with is command and control because this is  one of the key concepts to define how you would do 15:28a red team. And you know, if you're not familiar  with the concept, it's essentially saying if I'm 15:33inside of a network and I want to talk to a system  outside of the network as a bad guy, how do I 15:38accomplish that? I have a piece of software that's  going to run and communicate for me. Yeah. Yeah. 15:42Exactly. That's that foothold we were talking  about before. And that's when the real damage 15:47occurs. If somebody gets that foothold, then they  can just move, you know, however they like within 15:53the system and do all kinds of damage. That's a  good point. And so because of what you're saying, 15:58you can see why command and control is such a  key concept and tooling idea in the field of 16:03red teaming. Yeah. And uh I think another tool  that probably most people would never guess 16:09but I would think is really really important  to a red teamer is Yeah. Believe it or not, 16:15something like PowerPoint and Word, uh you've got  to document all that you found. Yeah. In fact, 16:22you know, one of the things we talked about uh  previously was the idea of a referee team. Well, 16:27as the red team, it's really critical that I be  able to tell them on a very regular basis what am 16:31I doing and and communicate the progress of of the  testing. PowerPoint is that's the key tool there. 16:36You have to be able to put that information  in a presentable way. Yeah. People wouldn't 16:39think about this as being something important in  the toolkit for an ethical hacker, but in fact, 16:45at the end of the day, you've got to pay the bills  and you got to be able to show the client what it 16:49is you did and what you learned. So, you're going  to need some way to document all of those kind of 16:54things. So, now we've taken a look at a high level  of what goes into the job for an ethical hacker. 17:00What are their concerns? What things do they need  to look at? In the first video in the series, 17:05we took a look at the role overview. Here we've  taken a look at the job. In the next video in 17:11this series, we're going to take a look at how  you could potentially go about getting a job in 17:16this space. So, make sure to like and subscribe so  that you're aware when the next video comes out.