It seems that CEH, CISSP, and CISM are one of the most cost-benefit combinations for security professionals to invest. (Please be reminded that the table lists only part of the DoD 8570 Approved Baseline Certifications.)
I enrolled in the official ECSA v10 course from EC-Council on 4th Aug, attended the class delivered by Melvin Sandro from Sep 26 to Sep 30, and passed the ECSA exam today. The course ware, iLabs modules, and iWeek class are awesome. I am willing to recommend the official course before you sit for this exam.
The scope of ECSA is highly overlapped with the one of CEH. However, ECSA emphasizes the project management of penetration testing, the EC-Council LPT methodology, and specific penetration testing scenarios.
If you are a CEH already, I don’t think ECSA adds much value while OSCP, CEH (Practical), or ECSA (Practical) certification would be a better choice. ECSA, EC-Council Certified Security Analyst, as it literally denotes gives people positive image or impression compared with the CEH, Certified Ethical Hacker. Most people feel better or safer when they come across a Security Analyst than a Hacker. Of course, this is just my guess why EC-Council promotes the ECSA certification.
A modus operandi (often shortened to M.O.) is someone’s habits of working, particularly in the context of business or criminal investigations, but also more generally. It is a Latin phrase, approximately translated as mode of operating.
Rules of Behavior
Penetration testing “Rules of Behavior” is a penetration testing agreement that outlines the framework for external and internal penetration testing.
Prior to testing, this agreement is signed by representatives from both the target organization and the penetration testing organization to ensure a common understanding of the limitations, constraints, liabilities and indemnification concerns.
Release and Authorization Form
In addition to the “Rules of Behavior”, a “Release and Authorization Form” may be required that states the penetration testing will be held harmless and not criminally liable for unintentional interruptions and loss or damage to equipment.
Get-Out-of-Jail-Free Card
an element that helps people to emerge from an undesirable situation.
The agreement outlines the types of activities to be performed and indemnifies the tester against any loss or damage that may result from the testing.
entails a legal agreement signed by an authorized representative of the organization.
a part of the penetration testing contract and should include an incident response plan and appropriate customer contact that can be alerted should an issue arise.
Negligence is a tort and actionable in the civil courts. Essentially, negligence is typically the failure to act with due care causing harm to someone else. Harm can include personal injury, damage to property, and economic loss.
To succeed in a claim for negligence, the claimant must satisfy the following requirements on the balance of probabilities:1. The defendant owed a duty of care to the claimant;
2. The defendant breached that duty of care;
3. The defendant’s breach of the duty of care caused damage or harm to the claimant;
4. The harm caused was not too remote.If a claimant can satisfy these requirements, they will have a valid claim. If proceedings are formally issued, the defense will either admit liability, or defend the claim.
Waivers/Exemptions
A waiver is the voluntary relinquishment or surrender of some known right or privilege. Sometimes, the elements of “voluntary” and “known” are established by a legal fiction. Other names for wavers are exculpatory clauses, releases, or hold harmless clauses.
An example of a written waiver is a disclaimer, which becomes a waiver when accepted.
One example of a legal fiction occurs in adoption. The new birth certificate of the adopted child is a legal fiction.
One example of a legal fiction occurs in adoption. Once an order or judgment of adoption (or similar decree from a court) is entered, one or both biological (or natural) parents becomes a legal stranger to the child, legally no longer related to the child and with no rights related to him or her. Conversely, the adoptive parents are legally considered to be the parents of the adopted child; a new birth certificate reflecting this is issued. The new birth certificate is a legal fiction.
the saying of the same thing twice over in different words, generally considered to be a fault of style (e.g. they arrived one after the other in succession).
Stealth Port: A “Stealth” port is one that completely ignores and simply “drops” any incoming packets without telling the sender whether the port is “Open” or “Closed” for business.
The classic ARP request replay attack is the most effective way to generate new initialization vectors (IVs), and works very reliably.
This attack, when successful, can decrypt a WEP data packet without knowing the key.
This attack, when successful, can obtain 1500 bytes of PRGA (pseudo random generation algorithm). This attack does not recover the WEP key itself, but merely obtains the PRGA.
The Hirte attack is a client attack which can use any IP or ARP packet. It extends the Cafe Latte attack by allowing any packet to be used and not be limited to client ARP packets.
I enrolled in the EC-Council iClass Self-Paced CEH v10 Course on 25th June, 2018 and passed the CEH (Certified Ethical Hacker) exam today. I would recommend the official courses from EC-Council as the CEH v10 course ware (2294 pages) is informative and well-organized. The iLabs lab modules are fantastic; it saves you huge time to set up your own labs. (I also attended the official iWeek online live class for ECSA v10. It’s helpful and effective as well.)
The CEH v10 exam itself is straightforward, but it does take a lot of time for me to get insights to or review the technical details, say, the TCP 3-way handshaking and flags. There are a lot of commands, tools and related arguments to memorize and exercise.
Besides the official course ware, I used the following as supplements:
Concerning ethics and laws, the author’s practical suggestion is to follow your team guidance that should have a process to handle the legal issues, such as pirated software, porn, and illegal activity.
It seems that EC-Council prefers an answer that you follow the law even if you would be trapped in a law case. This seems to be against the author’s practical point of view if I don’t get it wrong.