CEHv6 Resource Guide.indd - Algebra
CEHv6 Resource Guide.indd - Algebra
CEHv6 Resource Guide.indd - Algebra
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Page 178<br />
1. Introduction to Ethical Hacking<br />
Module Brief:<br />
http://www.eccouncil.org<br />
Module Briefi ng<br />
This module offers to professionals an understanding of the subject “Ethical Hacking”. It is important to bear in<br />
mind that hackers break into a system for various reasons and purposes. Therefore, it is important to comprehend<br />
how malicious hackers exploit systems and the probable reasons behind the attacks.<br />
As Sun Tzu put it in the ‘Art of War’, “If you know yourself but not the enemy, for every victory gained, you<br />
will also suffer a defeat.” It is the duty of system administrators and network security professionals to guard<br />
their infrastructure against exploits by knowing the enemy (the malicious hacker(s), who seek to use that very<br />
infrastructure for illegal activities).<br />
2. Hacking Laws<br />
Module Brief:<br />
This module discusses various Cyber Laws that are enforced in countries around the globe. SPY ACT, U.S. Federal<br />
Laws, United Kingdom’s Cyber Laws, European Laws, Japan’s Cyber Laws, Australia Cybercrime Act 2001, and<br />
Indian Law: The Information Technology Act, Germany’s Cyber Laws, Singapore’s Cyber Laws, Belgium Law,<br />
Brazilian Law, Canadian Laws, France Laws and Italian Laws are discussed.<br />
3. Footprinting<br />
Module Brief:<br />
Note that there is no ‘one way’ for hackers to approach a system. The intent behind their activities cannot be<br />
foreknown and all activity must be treated as a threat. Note that the focus of this course is not to teach the fi ner<br />
aspects of hacking, rather to emphasize on the vulnerability – threat – attack methods – tools – countermeasures<br />
threads of discussion.<br />
Therefore, the focus is not on the diverse details of ‘how to’ hack, rather the discussion is focused on where one<br />
must look for vulnerabilities, what threat the vulnerability poses, what are the ways in which a cracker can exploit<br />
the vulnerability, and what countermeasures should be advocated in the light of the threat. The objective of using<br />
tools is to save on time and resources, and defend resources in a proactive and effi cient manner. It is assumed that<br />
readers possess good programming skills and are familiar with various technical environments. There are several<br />
tools available to the hacker and may range from simple code compilation software to source code text fi les available<br />
on the Internet.<br />
EC-Council