Which of the following is not a proper use of RE for ethical hackers?
(a) Check for poorly designed protocols
(b) Check for error conditions
(c) Cracking for making paid apps free for use
(d) Testing for boundary conditions
I had been asked this question during an interview.
This is a very interesting question from Attack Vectors topic in chapter Understanding Attack Vectors of Cyber Security