Ethical Hacker

5200 Words21 Pages
Page  Ethical Hacking and Countermeasures EC-Council Certified C EH Ethical Hacker EC-Council TM Page Hackers are here. Where are you? Computers around the world are systematically being victimized by rampant hacking. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything of value and completely erase their tracks within 20 minutes. The goal of the ethical hacker is to help the organization take preemptive measures against malicious attacks by attacking the system himself; all the while staying within legal limits. This philosophy stems from the proven practice of trying to catch a…show more content…
How Do They Go About It? Approaches to Ethical Hacking Ethical Hacking Testing Ethical Hacking Deliverables Computer Crimes and Implications Legal Perspective (U.S. Federal Law) Section 1029 and Penalties Section 1030 and Penalties Japan Cyber Laws United Kingdom Cyber Laws Australia Cyber Laws Germany’s Cyber Laws Singapore’s Cyber Laws Summary Page  Module: Footprinting Scenario Module Objectives Revisiting Reconnaissance Defining Footprinting Information Gathering Methodology Unearthing Initial Information Finding Company’s URL Internal URL Extracting Archive of a Website Google Search for Company’s Info People Search Footprinting through Job Sites Passive Information Gathering Competitive Intelligence Gathering Public and Private Websites EC-Council DNS Enumerator SpiderFoot ( Sensepost Footprint Tools ( Wikito Footprinting Tool Web Data Extractor Tool Additional Footprinting Tools Whois Nslookup Extract DNS Information Types of DNS Records Necrosoft Advanced DIG Locate the Network Range ARIN Traceroute Traceroute Analysis 3D Traceroute ( Tool: NeoTrace (Now McAfee Visual Trace) GEOSpider ( Geowhere Footprinting Tool ( Google Earth Tool: VisualRoute
Get Access