Private story of a “Hacker” (Chapter 1)

SecureBug
3 min readJun 21, 2021

So, it is kinda interesting to live as an ethical hacker. It is like getting paid for each math problem that you solve. Here i want to talk to you about the experiences that i have earned, trough working all these years as a hacker.

Unlike black hat hackers, we negotiate with organizations that we want to hack them before attacking them. I know… that is weird, but that is our work routine.

The question that organizations most often ‌ask‌ ‌me‌ ‌is‌ ‌how‌ ‌can‌ ‌they‌ ‌detect‌ ‌and‌ ‌stop‌‌ ‌‌the‌‌ ‌‌attacks and ensure that their data can never be accessed by anyone online? I answer this question with the same answer almost every time; It’s never possible to guarantee that all your information in the online world is completely secure. In fact, the‌ ‌main‌ ‌question‌ ‌ you ‌ should‌ ‌ask‌ ‌is‌ ‌whether you can discover your weaknesses in an established network before they are discovered by other people?

Truth that You Should Face

Many organizations spend a lot of money and time on cybersecurity products and they assume it will not lead to breaches because in this case, there is nothing to fear. But in fact, you can never completely avoid breaches! There may be a risk of compromising and stealing information from almost anything connected to a network. Your best option is simply to make sure you have enough knowledge to beat cyber attacks and keep up to date with them ‌all‌ ‌the‌ ‌time.

My recommendation is that organizations should focus more on recruiting and training people to defend their networks instead of investing in products to make their networks more secure. No matter how many times an organization is attacked, a cybersecurity specialist will be able to detect lateral movement, malicious alterations to its registry or network, and so on.

Why You Should Hire Me?

A constant tool and product will not stop attackers who change up their tactics all the time. But a professional ethical hacker will protect your network from external threats and find vulnerabilities in your network. By doing so, you can be sure that all the information on your network is as safe‌ ‌as‌ ‌possible.

You may ask why hackers are more essential than having professional tools and products? The key to answering this question is to identify what makes hackers so special and unique. I ‌consider hackers to be the smartest and most up to date individuals in the online world. They always keep searching for new tricks and methods that will keep them in the game, and they stay open-minded about different approaches. They look for new solutions to current issues, because it is important to be aware of the rapid changes taking place in the industry, communicate them to people outside of the field in an understandable manner, and call attention to them. Most ‌ ‌ successful ‌ ‌ hackers that I know are always seeking for more knowledge and want to share what they ‌ learn.

I think these unique features set them apart from the rest of the online space. And these are enough to find out that there is no way you can ever conquer a hacker with expert knowledge, curiosity, and willingness to learn by tools and perfect devices alone.

Can We collaborate?

Why not?

check out the the link below.

Join Bug Bounty Program

--

--

SecureBug

Smooth Cybersecurity Nordic’s. novel threat & bug bounty platform. Learn, Earn, and Haunt with us… Here we share about our jounry