From the course: Deep Dive into Open-Source Intelligence

Unlock the full course today

Join today to access over 22,400 courses taught by industry experts or purchase this course individually.

Introduction to RIRs

Introduction to RIRs

From the course: Deep Dive into Open-Source Intelligence

Start my 1-month free trial

Introduction to RIRs

- [Narrator] While ethical hacking sounds exciting, the only thing that makes you different from cyber criminals is that you have authorization. It's a fine line between being an ethical hacker and breaking the law. A colleague of mine once hacked into a router within the scope and rules of engagement agreed upon by him and his client. After getting access to the router things weren't making sense, and my colleague called his client to go over his findings. When he read back the IP address for the compromised router, the client apologized, and said he made a typo on the IP address. It quickly dawned on my colleague that he had just hacked into someone else's router and, to make things worse, the compromised router belonged to the US government. Ever since hearing my colleague's story, and how his client's mistake could have sent him to jail for a long time, I've been diligent about double checking the scope of…

Contents