White Hat
One of our clients wanted to archive a huge amount of data from a legacy application before they shut it down, but they had no built-in tools, admin rights, or physical access to the server, so they asked me to hack in to their own system.
By enterprise vulnerability assessment and penetration testing an ethical hacker identifies the critical deficiencies of the client's systems.
Of course no client would be happy when some vulnerabilities were found in their application, but in this case it was for their good. They were able to regain the ownership over their data in no time.
Increasing knowledge and expanding opportunities entail growing responsibilities.
For the sake of my clients by getting familiar with how to harmlessly attack different information technology systems I became more capable guarding my own applications against the malicious attempts by preventing common mistakes during development.