Jump to content

Talk:Certified ethical hacker

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by SineBot (talk | contribs) at 01:16, 1 September 2015 (Signing comment by 68.61.153.75 - "penetration testing at the request of a network's owner is authorized, not unauthorized"). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.
WikiProject iconComputer security: Computing Unassessed
WikiProject iconThis article is within the scope of WikiProject Computer security, a collaborative effort to improve the coverage of computer security on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
???This article has not yet received a rating on Wikipedia's content assessment scale.
???This article has not yet received a rating on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Computing.
Things you can help WikiProject Computer security with:
Article alerts are available, updated by AAlertBot. More information...
  • Review importance and quality of existing articles
  • Identify categories related to Computer Security
  • Tag related articles
  • Identify articles for creation (see also: Article requests)
  • Identify articles for improvement
  • Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
  • Find editors who have shown interest in this subject and ask them to take a look here.
WikiProject iconEducation Start‑class Low‑importance
WikiProject iconThis article is within the scope of WikiProject Education, a collaborative effort to improve the coverage of education and education-related topics on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
StartThis article has been rated as Start-class on Wikipedia's content assessment scale.
LowThis article has been rated as Low-importance on the project's importance scale.

You Mention That Hacking is a Felony

According to the Wikipedia article on "hacking", "A hacker is often someone who creates and modifies computer software or computer hardware, including computer programming, administration, and security-related items. A hacker is also someone who modifies electronics, for example, ham radio transceivers, printers or even home sprinkler systems to get extra functionality or performance." Since when is this a felony? Even when you're talking about hackers in the field of security, not every hacker is out to commit a "felony". Perhaps "illegal hacking" should be used in this context?

Just trying to avoid any misconceptions of the term or, for that matter, two Wikipedia articles going against each other.

I fixed that. Felony is pointlessly specific and inaccurate in this context. Jclemens (talk) 05:04, 7 June 2008 (UTC)[reply]
I would also add that different places have different laws - both in the sense that some forms of computer misuse may or may not be legal in other locations, and in the sense that many jurisdictions lack a separate category of crimes called "felony". Bobrayner (talk) 19:38, 6 January 2010 (UTC)[reply]

Intro

Hi all. I have started this page. It is actually my first page (and quite possibly my first edit as well). Enjoy! Jeremys779 01:27, 22 January 2006 (UTC)[reply]


Also, I don't know how to get it into a category, but I took that code from another certification page, so what else do I have to do? Jeremys779 01:36, 22 January 2006 (UTC)[reply]

Definition

Article was lacking with a proper definition of CEH so I have updated it.Digitalfunda 09:28, 12 October 2006 (UTC)[reply]

Investigation and MSS degree

The investigation information does not provide any sources. I am going to remove it.

The MSS information would be better suited for a page on the EC-Council, instead of a page dedicated to the CEH certification. Any thoughts? I am going to remove it as well if no one is going to object. Jeremys779 03:36, 25 October 2006 (UTC)[reply]

Version 7

Version 7 has landed - there's going to be a large 'launch' training even mid March at, I believe, 22 training locations around the world. This is sort of a sneak preview of the training before it's available on mass. Suggest this to be added to the article.

http://www.thehackernews.com/2011/01/certified-ethical-hacker-version-7.html —Preceding unsigned comment added by 124.149.118.188 (talk) 23:45, 3 February 2011 (UTC)[reply]

The entire text of this article seems to be directly copied from [1] —Preceding unsigned comment added by 207.10.157.5 (talk) 05:11, August 30, 2007 (UTC)

Good grief I hope that no one copyrighted the mess I just edited. Jclemens (talk) 05:04, 7 June 2008 (UTC)[reply]

Overhauled

Ok, I fixed a bunch of the errors, grammar, puffery, and outright tomfoolery in this article. Some of the facts and whatnot I can't help at the moment, but I may later. Feel free to update anything you know needs updating. Jclemens (talk) 05:04, 7 June 2008 (UTC)[reply]

Question

I believe ECouncil has a Certification that is equal to the CEH, and is the same exam but provides a different name for companies who don't want to employ a "Hacker". Anyone have any idea what it was? Sephiroth storm (talk) 18:34, 22 August 2008 (UTC)[reply]

Is penetration testing at the request of the owner illegal in Germany

The following sentence needs to be clarified and referenced:

Illegal hacking (i.e.; gaining unauthorized access to computer systems) is a crime in most countries, but penetration testing done by request of the owner of the targeted system(s) or network(s) is not, except in Germany.

Rsduhamel (talk) 20:40, 23 July 2009 (UTC)[reply]

I'll see what I can find out. Sephiroth storm (talk) 00:26, 24 July 2009 (UTC)[reply]
It is just nonsense. Companies as well as government bodies conduct pentests all the time in germany. About 4-3 companies do nothing besides security tests (i.e. they don't sell any products and do not install stuff for people). The person who buys the test needs to check if he is actually authorized to allow a third party to check everything he wants to be checked, and the testers need to proof that they didn't overlook any evidence to the contrary. For example, a simple error in IP-addresses should be noted if WHOIS points to someone who has nothing to do with the organisation. As long as everyone does their homework, pentests are legal in germany. 92.79.151.50 (talk) 10:20, 23 April 2010 (UTC)[reply]

I believe that the paragraph is referring to THIS http://dejure.org/gesetze/StGB/202c.html which is a very vague law. But which potentially does ban internal penetration tests, as the tools used would be illegal, even if used on one's own network. —Preceding unsigned comment added by 173.160.112.53 (talk) 18:33, 19 May 2010 (UTC)[reply]

You need to have a "malicious intent" to be subject to prosecution by 202c. 202c mentions that it is applied when someone takes steps to prepare a felony ("punishable offense"). This is not the case if a test/hack/pentest etc. is properly prepared. 85.180.73.120 (talk) 13:11, 28 December 2010 (UTC)[reply]
I am not a lawyer and I claim to have no knowledge whatsoever of German law. That having been said, if the owner of a system or a network hires me to test his network for vulnerabilities, clearly that means I'm authorized--I have the knowledge and consent of the owner of the property, who hired me to perform this task for him. Therefore laws against unauthorized access would not apply. Or am I misunderstanding something fundamental here? — Preceding unsigned comment added by 68.61.153.75 (talk) 01:14, 1 September 2015 (UTC)[reply]

White hat and black hat

I'm concerned that these tired old tropes are still being used in the lede; and, worse, the article's telling readers that the skills used by the good guys and bad guys are identical - but that only the good guys sit this exam. That's just silly. bobrayner (talk) 19:19, 27 May 2015 (UTC)[reply]