02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

What Is an <strong>Ethical</strong> <strong>Hacker</strong>? 9<br />

Contracts are an important detail to get right; if you get them wrong it<br />

could easily mean legal problems later. The problem with contracts is that<br />

most people find the amount of legalese and preparation nearly impossible<br />

to understand and intimidating to say the least. I strongly recommend<br />

that you consider getting a lawyer experienced in the field to help you with<br />

contracts.<br />

A contract is important for another extremely important reason as well:<br />

proof. Without a contract you have no real proof that you have permission<br />

from the system owner to perform any tests.<br />

Once ethical hackers have the necessary permissions and contracts in place, they<br />

can engage in penetration testing, also known as pen testing. This is the structured and<br />

methodical means of investigating, uncovering, attacking, and reporting on the strengths<br />

and vulnerabilities of a target system. Under the right circumstances, pen testing can provide<br />

a wealth of information that the owner of a system can use to adjust defenses.<br />

Bad Guys and Good Guys, or <strong>Hacker</strong>s and <strong>Ethical</strong> <strong>Hacker</strong>s<br />

The difference between an ethical hacker and a hacker is something that can easily get<br />

you into an argument. Just saying the word hacker in the wrong place can get you into an<br />

hours-long conversation of the history of hacking and how hackers are all good guys who<br />

mean nothing but the best for the world. Others will tell you that hackers are all evil and<br />

have nothing but bad intentions. In one case I was even told that hackers were originally<br />

model-train enthusiasts who happened to like computers.<br />

You must understand that for us, hackers are separated by intentions. In our worldview<br />

hackers who intend to cause harm or who do not have permission for their activities are<br />

considered black hats, whereas those who do have permission and whose activities are<br />

benign are white hats. Calling one side good and the other bad may be controversial, but<br />

in this book we will adhere to these terms:<br />

Black Hats They do not have permission or authorization for their activities; typically<br />

their actions fall outside the law.<br />

White Hats They have permission to perform their tasks. White hats never share information<br />

about a client with anyone other than that client.<br />

Gray Hats These hackers cross into both offensive and defensive actions at different times.<br />

Suicide <strong>Hacker</strong>s This relatively new class of hacker performs their actions without<br />

regard to being stealthy or otherwise covering up their assaults. These individuals are<br />

more concerned with carrying out their attack successfully than the prison time that may<br />

ensue if they are caught.<br />

Another type of hacker is the hacktivist. Hacktivism is any action that an attacker uses<br />

to push or promote a political agenda. Targets of hacktivists have included government<br />

agencies and large corporations.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!