11 September 2009

DISCLAIMER




DO NOT CONTINUE PAST THIS POINT


WITHOUT READING THIS SECTION.




This section contains information necessary for your own protection and the protection of the author. This book covers a subject which involves significant legal consequences if the information herein is used maliciously or irresponsibly. The author does not condone illegal practices and does not wish to see any reader fall on the wrong side of the law accidentally.



The methods described in the following pages are publicly available to both the Information Technology community and the criminal community free-of-charge. The author’s research has relied almost exclusively on materials downloaded from free/public internet sources. Nothing presented in here is intended to aid or encourage the criminal community as they already have this information . Instead, this is intended to level the playing field in favor of small business by providing business owners and the IT professionals who services them a better insight into the vulnerabilities they must protect against.



This book was written and the procedures described were tested using a wireless network setup for, owned and, operated by the author before being field tested by the author on third-party networks, whose owners had given the author prior informed consent. Any scripts, procedures or devices developed in the course of or to facilitate the testing described in these pages which was not obtained online in a ready-to-use state was immediately destroyed after all testing thereof was completed in order to ensure that the same could not be used by malicious parties. This includes any operating system images customized with automation scripts, so-called ‘relay kits’ or other solutions conceived by the author.



It is recommended that any person learning from this procedure or demonstrating this procedure for the first time do so in a controlled environment with a NON-PRODUCTION network and devices, which the person owns or has prior written authorization to use for these purposes. The author does not intend and strongly advises any reader against using this procedure for malicious purposes or for any purpose on any network for which the person does not have prior written and informed consent from a duly authorized party. Persons who disregard this warning do so at their own risk, accepting the consequences of their own actions and agree to hold the author harmless for any liabilities arising from the same.



The author makes no warranty as to the quality or accuracy of the procedures or as to the information in this book and accepts no responsibility for the experiences or consequences realized by the reader or other parties. As stated earlier, the ideas, information, processes, procedures and other concepts proposed in here should be attempted only at the reader’s own risk using NON-PRODUCTION equipment for which the end-user determines damage or complete loss is acceptable.



The reader is hereby informed that the use of this procedure could potentially cause a service interruption on the target network, including but not limited to data loss, lost end-user productivity, damage to one or more devices on the target network or other unforeseeable negative consequences, which may or may not require intervention by the target network’s IT support personnel, and which may or may not cause permanent damage to equipment requiring replacement or repair. Persons reading this statement who intend to act in an advisory or consulting capacity are therefore expected to inform the parties they advise or consult of the aforementioned risks.
Readers are strongly encouraged to review any terms of service, licensing agreements and other contractual obligations which may be impacted directly or indirectly be any actions contemplated herein and to first seek the advice of competent legal council before attempting any activity derived from reading the following pages.
The author is not a lawyer, attorney or other professional licensed or qualified to provide legal advice. Any recommendation or suggestion made herein is simply based on personal opinion and professional judgment as an Information Technology consultant and should not be construed to replace or the advise competent legal counsel. Persons who chose to act based on any ideas, procedures, concepts or other information presented herein without first seeking the advice of legal counsel do so against the recommendations of the author and are responsible for their own actions and the consequences thereof.



Many jurisdictions require persons engaged in security-related work to be licensed or certified by one or more government entities. The author strongly recommends that any person interested in applying any knowledge learned in these pages first seek the advice of legal counsel to determine if he/she is required to first obtain any appropriate licenses, permits or certifications before proceeding. The author cannot stress enough how important it is to make an informed decision in light of the risks and liabilities which may arise from use of this material in any network or using any device, including but not limited to devices the reader may even own.





NOTE: The author is not a lawyer, attorney or other professional licensed or qualified to provide legal advice. Any recommendation or suggestion made herein is simply based on personal opinion and professional judgment as an Information Technology consultant and should not be construed to replace or the advise competent legal counsel. Persons who chose to act based on any ideas, procedures, concepts or other information presented herein without first seeking the advice of legal counsel do so against the recommendations of the author and are responsible for their own actions and the consequences thereof.

No comments:

Post a Comment

Be civil, Do not violate the law and do not abuse the rights of others. As I once learned from reading Mark Twain, we all have the right to freedom of speech and the good sense not to use it unless we are willing to take responsibility for our words.