One of our clients wanted to archive a huge amount of data from a legacy application before they shut it down, but they had no built-in tools, admin rights, or physical access to the server, so they asked me to hack in to their own system.
In an enterprise vulnerability assessment and penetration testing an ethical hacker identifies the critical deficiencies in the client's systems.
Of course no client would be happy when I find some vulnerabilities in their application, but in this case it was for their good. The solution which I developed after my tests, proved to be useful, so that all the data they wanted out could be archived in time.
Increasing knowledge and expanding opportunities entail growing responsibilities.
For the sake of my clients by getting familiar with how to harmlessly attack different information technology systems I became more capable guarding my own applications against the malicious attempts by preventing common mistakes during development.