• Discovering the operating system and network weaknesses in an organization's technology infrastructure.
  • Demonstrating how easy it is to launch cyberattacks on their company using penetration-testing methods.
  • Executing security assessment simulations to show how easily they could be hacked by someone else.
  • Reporting any security breaches and vulnerabilities discovered within the system or network directly to the owner or manager of that system.
  • Keeping the discoveries confidential between them and the client or company.
  • Wiping traces of the hack to ensure that malicious hackers cannot enter the system through the identified loopholes.