14.11.2012 Views

CEHv6 Resource Guide.indd - Algebra

CEHv6 Resource Guide.indd - Algebra

CEHv6 Resource Guide.indd - Algebra

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Page 178<br />

1. Introduction to Ethical Hacking<br />

Module Brief:<br />

http://www.eccouncil.org<br />

Module Briefi ng<br />

This module offers to professionals an understanding of the subject “Ethical Hacking”. It is important to bear in<br />

mind that hackers break into a system for various reasons and purposes. Therefore, it is important to comprehend<br />

how malicious hackers exploit systems and the probable reasons behind the attacks.<br />

As Sun Tzu put it in the ‘Art of War’, “If you know yourself but not the enemy, for every victory gained, you<br />

will also suffer a defeat.” It is the duty of system administrators and network security professionals to guard<br />

their infrastructure against exploits by knowing the enemy (the malicious hacker(s), who seek to use that very<br />

infrastructure for illegal activities).<br />

2. Hacking Laws<br />

Module Brief:<br />

This module discusses various Cyber Laws that are enforced in countries around the globe. SPY ACT, U.S. Federal<br />

Laws, United Kingdom’s Cyber Laws, European Laws, Japan’s Cyber Laws, Australia Cybercrime Act 2001, and<br />

Indian Law: The Information Technology Act, Germany’s Cyber Laws, Singapore’s Cyber Laws, Belgium Law,<br />

Brazilian Law, Canadian Laws, France Laws and Italian Laws are discussed.<br />

3. Footprinting<br />

Module Brief:<br />

Note that there is no ‘one way’ for hackers to approach a system. The intent behind their activities cannot be<br />

foreknown and all activity must be treated as a threat. Note that the focus of this course is not to teach the fi ner<br />

aspects of hacking, rather to emphasize on the vulnerability – threat – attack methods – tools – countermeasures<br />

threads of discussion.<br />

Therefore, the focus is not on the diverse details of ‘how to’ hack, rather the discussion is focused on where one<br />

must look for vulnerabilities, what threat the vulnerability poses, what are the ways in which a cracker can exploit<br />

the vulnerability, and what countermeasures should be advocated in the light of the threat. The objective of using<br />

tools is to save on time and resources, and defend resources in a proactive and effi cient manner. It is assumed that<br />

readers possess good programming skills and are familiar with various technical environments. There are several<br />

tools available to the hacker and may range from simple code compilation software to source code text fi les available<br />

on the Internet.<br />

EC-Council

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!