I Don’t Want My Devs to Become Hackers!

Published: 13 Feb 2025

When talking with security folks about the benefits of running an internal Capture the Flag (CTF) event or signing developers up for PentesterLab, I sometimes hear: “I don’t want my developers to become hackers.” This is when I explain the advantages of letting developers dip their feet into web hacking.

Embracing the Hacker Mindset

First, a few hours or weeks of exposure to web hacking will not instantly turn developers into malicious pentesters or hackers. But it will give them a critical new perspective—the hacker mindset. This mindset encourages them to pause and reflect: “What would the bad guys do?”

Application Security Engineers frequently mention the challenge of scaling security. Imagine if you had a “script kiddie” developer writing or reviewing code, rather than someone who has never considered the attacker’s viewpoint. By teaching developers what is possible, you reduce the number of “I didn’t know you could do that” moments.

Practical Benefits of Hands-On Training

Let’s say one of your developers spends a few hours in a training session or a CTF. Maybe they learn just enough to spot one overlooked bug each month or to make your application that tiny bit more resilient. Over time, these small gains add up to a significant improvement in security.

Now, imagine if every time developers write a new feature or perform a peer code review, they briefly switch to a “black hat” mindset: “If I wanted to attack this, where would I start?” They might identify weaknesses before any bad actor does—or before the code even merges. And if they’re unsure, they can reach out to security teams earlier. This proactive approach helps kill bugs when they’re cheaper and easier to fix.

What If They Get Addicted to Web Hacking?

You might wonder what happens if your developers find hacking so engaging that they dive in deeper. In fact, this is the best possible outcome. You could transition these enthusiastic individuals into your application security team, where their inside knowledge of your codebase and deployment environment becomes invaluable.

This path also fosters professional growth. Instead of recruiting external security experts, you’re developing talent in-house—often a faster, more cost-effective strategy.

Real-World Implementation Strategies

Some of PentesterLab’s clients already do this. They purchase one license for every three or four developers, then rotate these licenses quarterly. They typically start with a short, three-hour introduction session to showcase how PentesterLab works and help participants solve a few labs.

Many also use PentesterLab’s “Organisation Badge” feature to create badges aligned with the technologies used internally. This custom approach increases both the focus of the training and overall team engagement.

Conclusion

Encouraging developers to learn about web hacking isn’t about turning them into pentesters or rogue attackers—it’s about empowering them to build stronger, more resilient applications from the start. By routinely asking “What would the bad guys do?” during development and code review, they can uncover issues earlier, reduce security risks, and even grow into passionate security champions within your organization.

If you’re considering ways to embed secure coding practices, CTF-style challenges, or PentesterLab training into your workflow, remember: a small investment in hacker-focused training can pay off substantially with fewer bugs, a stronger security culture, and more confident, informed developers. It’s a win for your team, your organization, and for the security of everyone who relies on your applications.

Photo of Louis Nyffenegger
Written by Louis Nyffenegger
Founder and CEO @PentesterLab