Handout 2.1 Ethical Hacking Pentesting and Anonymity
Handout 2.1 Ethical Hacking Pentesting and Anonymity
• Kernel Vulnerabilities: Flaws in the OS kernel, the core part of the OS, that attackers can
exploit to gain root access. May result in a full system compromise.
• Buffer Overflow: Occurs when a program writes more data to a buffer than it can hold, leading
to memory corruption. It can be exploited to execute arbitrary code or crash the system.
• Race Conditions: Timing vulnerabilities where two processes try to change the same resource
at the same time. Can lead to data corruption or unauthorized access.
• Weak Access Controls: Poorly configured permissions, allowing unauthorized users access to
sensitive system resources. Unauthorized access, data leakage, or system compromise.
• Directory Traversal: An attacker gains access to restricted directories and files outside a web
server's root directory by manipulating file paths. Access to sensitive files like password
databases.
• Command Injection: An attacker can execute arbitrary system commands by exploiting input
validation flaws in the OS. System compromise and data theft.
• Weak Session Management: Poorly managed user sessions that can be hijacked or improperly
terminated. Attackers may hijack user sessions and perform unauthorized actions.
2
Instructor(s): Muhammad Rauf Butt, Muhammad Arif Butt, PhD
3
Instructor(s): Muhammad Rauf Butt, Muhammad Arif Butt, PhD
4
Instructor(s): Muhammad Rauf Butt, Muhammad Arif Butt, PhD
Tools:
• MSF (https://www.metasploit.com/download)
• Exploit DB (https://www.exploit-db.com/)
• SQLmap (https://sqlmap.org/)
• Cobalt Strike (https://www.cobaltstrike.com/)
• Social Engineering Toolkit (https://github.com/trustedsec/social-engineer-toolkit)
• BeEF (Browser Exploitation Framework) (https://beefproject.com/)
• PowerSploit (https://github.com/PowerShellMafia/PowerSploit)
5
Instructor(s): Muhammad Rauf Butt, Muhammad Arif Butt, PhD
4. Privilege Escalation
After gaining initial access to the target machine, you may find that your session has only limited
user rights. This severely limits the actions that one can perform on the remote systems such as
dumping passwords, manipulating registry, and installing backdoors or keyloggers. So, Privilege
Escalation is a critical phase in penetration testing where the tester attempts to gain elevated
access rights beyond initial compromises. Attacker normally perform following activities in this
phase:
• Setuid/Setgid Exploits in Linux: Exploiting binaries with the setuid or setgid bit set, which
allows them to run with elevated privileges.
• Gaining Root Through Sudo Privileges: If the attacker finds that the compromised user has
sudo access, they can use it to escalate privileges.
• Password Hash Dumping: Once an attacker gains access, they can dump password hashes from
the system files like /etc/passwd or /etc/shadow on Linux systems. Later they can attempt
to crack them offline and may succeed in cracking passwords of higher-privileged accounts.
• Exploiting Misconfigured Services: Misconfigured services or processes running with elevated
privileges may allow attackers to execute code with higher privileges.
• Exploiting Kernel Vulnerabilities: Attackers can exploit vulnerabilities in the operating
system's kernel to gain system-level or root privileges.
Tools:
• MSF (msfconsole, msfvenom)
(https://www.metasploit.com/download)
• Privilege Escalation Scripts(e.g., powersploit, LinEnum)
(https://github.com/PowerShellMafia/PowerSploit)
• Password Cracking Tools (e.g., John the Ripper, Hashcat)
(https://github.com/openwall/john)
• LinPEAS (Linux Privilege Escalation Awesome Script)
(https://github.com/peass-ng/PEASS-ng)
6
Instructor(s): Muhammad Rauf Butt, Muhammad Arif Butt, PhD
6. Covering Tracks
Covering tracks is important in penetration testing as it demonstrates the methods attackers use
to evade detection and hide their activities. To do this the attacker delete or modifies log entries,
or do log spoofing (creating false trails). The attacker may also clear command history, perform
time stomping, and erase evidence of persistence mechanisms. Attacker normally perform
following activities in this phase:
• Log Clearing: Deleting or modifying system logs to remove traces of the attack.
• File Removal: Removing any files or tools that were uploaded during the test.
• Hiding Evidence: Using tools and techniques to conceal the presence of malware or changes
made to the system.
Tools:
• Metasploit’s Meterpreter clearev command
• Log-cleaning scripts
• Secure file deletion tools (e.g., shred, sdelete)
• Rootkits that hide files and processes
• Timestomping, i.e., modifying timestamps of files to avoid detection
7
Instructor(s): Muhammad Rauf Butt, Muhammad Arif Butt, PhD
• Financial Loss: Costs associated with recovery, fines, and loss of business.
• Reputation Damage: Loss of customer trust and confidence.
• Data Breach: Loss of sensitive information, including personal and financial data.
• Operational Disruption: Interruption of services and business operations.
8
Instructor(s): Muhammad Rauf Butt, Muhammad Arif Butt, PhD
1. Virus
A computer virus is a type of malicious software (malware) that infects a computer system and
spreads by replicating itself within files or by attaching itself to executable programs. Viruses
replicate by inserting their code into other programs or documents. When these infected programs
or documents are executed, the virus activates and may further spread to other files on the system.
Virus can have following impact on the victims:
• Data Corruption: Viruses can modify or delete files, leading to data loss and potential damage
to critical information.
• System Instability: Some viruses consume system resources, slowing down or crashing the
victim's computer.
• Privacy Breach: Certain viruses can capture sensitive information such as passwords or credit
card details, exposing victims to identity theft.
Examples:
• ILOVEYOU Virus:
o Release: May 2000
o Propagation: Spread via email as a love letter with an attachment named "LOVE-
LETTER-FOR-YOU.TXT.vbs."
o Impact: Infected millions of computers worldwide, causing extensive damage by
overwriting files and stealing passwords. It forced organizations to shut down their email
systems temporarily.
o Link: ILOVEYOU virus
• Melissa Virus:
o Release: March 1999
o Propagation: Disseminated via infected Microsoft Word documents attached to emails
with enticing subject lines.
o Impact: Rapidly spread through email, causing email servers to crash due to the high
volume of emails sent. It disrupted email communication globally, incurred high costs.
o Link: Melisssa virus
2. Worms
A computer worm is a type of malicious software (malware) that, unlike viruses, can self-replicate
and spread independently without needing to attach itself to other programs or files. Worms typically
exploit vulnerabilities in network protocols or operating systems to propagate quickly across
interconnected computers or devices. Key characteristics and behaviors of computer worms are:
• Self-Replication: Worms can create copies of themselves and spread autonomously to other
computers or devices on a network.
• Network Propagation: They exploit security vulnerabilities in network services or operating
systems to spread rapidly across interconnected systems.
• No Host Attachment: Unlike viruses, worms do not need to attach themselves to executable files
or documents to spread.
9
Instructor(s): Muhammad Rauf Butt, Muhammad Arif Butt, PhD
Examples:
• SQL Slammer:
o Release: January 2003
o Propagation: Exploited a vulnerability in Microsoft SQL Server and Desktop Engine
(MSDE), spreading rapidly across the Internet.
o Impact: Infected hundreds of thousands of systems worldwide within minutes, causing
massive network congestion and disruptions to Internet services.
o Link: SQL Slammer
• MyDoom:
o Release: January 2004
o Propagation: Spread via email attachments and peer-to-peer (P2P) file sharing networks.
o Impact: Became one of the fastest-spreading email worms at the time, launching
Distributed Denial of Service (DDoS) attacks against targets and causing significant
disruption to Internet services. It also installed back doors on infected systems.
o Link: Mydoom
3. Trojan Horse
A Trojan horse, often referred to simply as a Trojan is a type of malicious software (malware) that
disguises itself as legitimate software or files to deceive users into executing or installing it on their
systems. Unlike viruses or worms, Trojans do not self-replicate. Instead, they rely on social
engineering tactics to trick users into unwittingly installing them. Here are key characteristics and
behaviors of Trojan horses:
Examples:
• Zbot:
o Type: Banking Trojan
o Impact: Zeus targeted financial institutions, capturing login credentials and financial
information from infected systems.
o Link: Zbot
• Remote Access Trojan (RAT):
o Type: Remote Access Trojan
o Function: RATs provide remote control and administrative access to the attacker over
the infected system.
o Impact: Attackers can perform various malicious activities, such as spying on users
through webcams or microphones, stealing files, or launching further attacks from the
compromised system.
o Link: RAT
10
Instructor(s): Muhammad Rauf Butt, Muhammad Arif Butt, PhD
4. Ransomware
Ransomware is a type of malicious software (malware) designed to encrypt files on a victim's
computer or entire network, rendering them inaccessible until a ransom is paid. It is a form of
extortion where attackers demand payment in exchange for decrypting the files and restoring
access to the affected system. Here are key characteristics of ransomwares:
• Encryption: Ransomware encrypts files using strong encryption algorithms, making them
unreadable without the decryption key held by the attacker.
• Ransom Demand: Attackers typically display a ransom note demanding payment (usually in
cryptocurrency) in exchange for the decryption key.
• Propagation: Ransomware can spread through malicious email attachments, compromised
websites, or vulnerabilities in software and operating systems.
Examples:
• Ryuk:
o Release: August 2018
o Target: Primarily aimed at businesses and large organizations.
o Impact: Ryuk encrypts files and demands high ransom payments, often customized
based on the victim's perceived ability to pay. It has been linked to financially motivated
cybercrime groups and has caused significant financial losses.
o Link: Ryuk
• WannaCry:
o Release: May 2017
o Propagation: Exploited a vulnerability in Microsoft Windows known as EternalBlue,
which allowed it to spread rapidly across networks.
o Impact: WannaCry infected hundreds of thousands of computers worldwide within days,
affecting hospitals, government agencies, and businesses. It encrypted files and
demanded ransom payments in Bitcoin.
o Link: Wannacry
5. Spyware
Spyware is a type of malicious software (malware) designed to secretly gather information about a
user's activities on their computer or device without their knowledge or consent. The purpose of
spyware ranges from tracking browsing habits for advertising purposes to stealing sensitive
information such as passwords, credit card numbers, and personal data. Here are key
characteristics and behaviors of spyware:
• Information Gathering: Spyware monitors and collects various types of information, including
keystrokes, personal information, browsing history.
• Remote Access: Some advanced spyware variants allow attackers to remotely access and
control the infected device, enabling them to perform malicious activities discreetly.
• Data Transmission: Spyware transmits the collected information to remote servers controlled
by the attackers or third parties for exploitation or resale.
Examples:
• Pegasus:
o Type: Advanced spyware developed by NSO Group, an Israeli Cyber-arm company.
o Target: Pegasus is known for targeting mobile devices (iOS and Android) and has been
used to monitor journalists, activists, and political targets globally.
11
Instructor(s): Muhammad Rauf Butt, Muhammad Arif Butt, PhD
6. Adware
Adware is a type of software designed to display advertisements on a user's device, often in a
disruptive or intrusive manner. While not always malicious, adware can become a significant
nuisance, affecting user experience and system performance. Adware is often bundled with free
software and gets installed without the user's full awareness or consent. Some characteristics of
adware are listed below:
Examples:
• Super fish:
o Description: Superfish was an adware program that came pre-installed on some Lenovo
laptops. It injected advertisements into web pages viewed by the user.
o Impact: Superfish raised significant security concerns because it used a self-signed root
certificate to intercept HTTPS traffic, potentially exposing users to man-in-the-middle
attacks.
o Link: Super fish
• Crossrider:
o Description: Crossrider is a development platform for creating browser extensions and
toolbars. Some of the extensions developed using Crossrider were classified as adware
because they displayed intrusive ads and collected user data.
o Impact: Crossrider-based adware often altered browser settings, injected
advertisements, and tracked user browsing activities without proper consent.
o Link: Crossrider
12
Instructor(s): Muhammad Rauf Butt, Muhammad Arif Butt, PhD
7. Rootkits
A rootkit is a type of malicious software designed to gain unauthorized access to and maintain
control over a computer system while hiding its presence from the user and security software.
Rootkits achieve this by altering the operating system or other software to mask their activities.
They are often used by attackers to maintain long-term control over infected systems, allowing
them to execute further malicious activities undetected. Rootkits characteristics are listed below:
• Stealth and Evasion: Rootkits are highly effective at hiding their presence from users and
security tools by concealing their files, processes, and network connections.
• Persistence: They are designed to survive reboots and persist on the system, providing attackers
with continued access.
• Privilege Escalation: Rootkits often gain root or administrative privileges, allowing them to
make significant changes to the system and bypass security mechanisms.
Examples:
• Sony BMG:
o Description: In 2005, Sony BMG (Bertelsmann Music Group) included a rootkit as part
of its digital rights management (DRM) software on music CDs to prevent unauthorized
copying.
o Impact: The rootkit was installed without user consent and hid itself deeply within the
operating system. It caused significant controversy when it was discovered, as it
introduced security vulnerabilities and exposed users to additional malware.
o Link: Sony BMG
8. Botnets
A botnet is a network of compromised computers, known as "bots" or "zombies," that are controlled
remotely by an attacker, often called a "botmaster" or "bot herder." Botnets are typically used to
conduct large-scale cyber-attacks and other malicious activities.
• Remote Control: Botnets allow attackers to control multiple compromised systems from a
central point, coordinating their activities for various malicious purposes.
• Large Scale: Botnets can range in size from a few hundred to millions of infected devices,
providing significant computing power and bandwidth to the attacker.
Examples:
• GameOver Zeus:
o Description: GameOver Zeus (GOZ) is a sophisticated botnet primarily used for banking
fraud and the distribution of ransomware. It is a variant of the Zeus malware.
13
Instructor(s): Muhammad Rauf Butt, Muhammad Arif Butt, PhD
9. Fileless Malware
Fileless malware is a type of malicious software that does not rely on traditional files to infect a
computer. Instead, it exploits existing, legitimate tools and features within the operating system to
carry out malicious activities. This makes fileless malware particularly difficult to detect and
remove, as it leaves few traces. Some characteristics of fileless malwares are listed below:
• Leveraging Legitimate Tools: It exploits built-in system tools and utilities, such as PowerShell,
Windows Management Instrumentation (WMI), and other scripting frameworks, to execute
malicious activities.
• Persistence: Fileless malware can achieve persistence by modifying registry settings, scheduling
tasks, or exploiting legitimate system processes to restart upon reboot.
Examples:
• PowerGhost:
o Description: PowerGhost is a type of fileless malware that primarily targets enterprise
networks. It spreads through networks using exploits and weak credentials.
o Impact: PowerGhost is used to mine cryptocurrency on infected systems, consuming
significant CPU and memory resources, leading to degraded system performance.
o Link: PowerGhost
• Living of the Land:
o Description: Living off the land refers to a technique used by attackers where they utilize
legitimate tools and processes already present in the operating system to conduct
malicious activities.
o Impact: By using trusted system tools like PowerShell, WMI, and PsExec, attackers can
perform a variety of malicious activities, such as data exfiltration, lateral movement, and
command and control operations.
o Link: LOTL
14
Instructor(s): Muhammad Rauf Butt, Muhammad Arif Butt, PhD
Achieving Anonymity
Anonymity refers to the state of being unidentified or untraceable within a digital environment. This
concept is often associated with privacy and security measures designed to protect an individual's
identity and activities from being discovered or tracked by others, including service providers, other
users, and malicious entities.
Connecting to the Internet can be done in various ways, each offering different levels of privacy,
security, and complexity. Here’s a detailed explanation of each approach:
Description: Connecting directly to the Internet through a Local Area Network (LAN) typically
involves using an Ethernet cable or a Wi-Fi connection provided by a router. This is the most common
method for home and office environments.
Pros:
Cons:
• Lack of Privacy: Using a browser like Google chrome provides almost no privacy or anonymity
at all. These browsers and many other applications using which you access the Internet collect
your private data in order to show you personalized ads. Similarly, when doing penetration
testing, e.g., doing a nmap scan of a network, your IP address and other information is exposed
to the target machine running websites and online services and therefore making it easy to
track you and log your activities.
• Security Risks: Without additional security measures, such as a firewall or antivirus
software, the system may be vulnerable to attacks.
Check your IP: Open your browser and type “what is my ip” to check the IP, the location, and the
name of the service provider J. Or visit https://www.dnsleaktest.com/
$ curl ifconfig.me
$ curl ipinfo.io/ip
$ curl icanhazip.com
15
Instructor(s): Muhammad Rauf Butt, Muhammad Arif Butt, PhD
• https://hideme.com/lander
• https://www.proxfree.com/
Pros:
• Anonymity: Hides the user’s IP address, making it harder to track online activities.
• Access Control: Can be used to bypass geo-restrictions and access blocked content.
• Content Filtering: Often used in organizations to monitor and control employee Internet
usage.
Cons:
Pros:
• Increased Anonymity: Enhanced privacy compared to a single proxy by adding more layers
of obfuscation.
• Bypassing Censorship: Makes it harder for authorities or attackers to block or track Internet
access.
Cons:
16
Instructor(s): Muhammad Rauf Butt, Muhammad Arif Butt, PhD
Pros:
Cons:
• Performance: Can significantly slow down the Internet connection due to multiple hops.
• Configuration Complexity: Requires careful configuration to ensure all proxies are
functioning correctly.
• Potential Logging: Each proxy in the chain can log traffic, potentially compromising privacy.
Just go through the above configuration file. At the very top you can find the types of proxies like http,
socks4, socks5, and so on (Do read about these). In above configuration file remove the hash symbol
before dynamic_chain and comment the strict_chain and at the very bottom of the file just add a new
line that will add socks5 support socks5 127.0.0.1 9050
$ curl icanhazip.com
139.135.32.190
$ proxychains curl icanhazip.com
185.220.101.37
If proxychains do not work, you may need to start the tor service using systemctl command.
Finally, to test give the following command to run firefox browser using proxychains
$ proxychains firefox
Now visit https://www.dnsleaktest.com/ inside Firefox running under proxychains, and you will see
most probably, you will get a new IP every five minutes J.
17
Instructor(s): Muhammad Rauf Butt, Muhammad Arif Butt, PhD
Description: A VPN server encrypts the user’s Internet traffic and routes it through a remote server,
masking the user’s IP address and providing a secure connection. Moreover, it works at OS level and
changes the IP address of all NW applications. There exist free as well as paid services like OpenVPN
and ProtonVPN respectively. VPNs are widely used for enhancing privacy, security, and bypassing
geo-restrictions. Links for some free proxy services that you can use are given below:
https://protonvpn.com/
https://www.tunnelbear.com/
Pros:
Cons:
• Trust in Provider: Users must trust the VPN provider not to log or misuse their data.
• Cost: High-quality VPN services typically require a subscription fee.
• Speed Reduction: Encryption and routing through remote servers can reduce connection
speeds.
You can create a login on the Proton VPN by visiting https://protonvpn.com/ and then use it from your
Kali terminal as shown below:
18
Instructor(s): Muhammad Rauf Butt, Muhammad Arif Butt, PhD
Description: The Onion Router (TOR) is privacy focused web browser that routes your Internet
traffic through multiple volunteer-operated servers (nodes) across the globe to anonymize your online
activity. The data is sent through at least three nodes. The Entry node, which knows your IP but not
your destination. The Middle node passes encrypted data. The Exit node decrypts the final layer and
sends the request to destination website, which sees the Exit node’s IP address and not yours. The
TOR browser is used to access all the .onion websites and the deep web.
Pros:
• Strong Anonymity: Traffic is encrypted and routed through multiple nodes, thus making your
traffic anonymous on the Internet and difficult to trace.
• Access to .onion Sites: Enables access to hidden services and websites on the dark web.
• Censorship Resistance: Helps bypass Internet censorship and restrictions.
Cons:
• Performance: Can be slow due to multiple layers of encryption and routing.
• Blocked Sites: Some websites block traffic from Tor nodes.
• Reputation: Associated with illegal activities on the dark web, although it also supports
legitimate uses.
• The last command will launch your Tor browser, and for the first time it may take a while. Once
you see the GUI of Tor browser, the next step is to verify that the tor service is running on your
OS. For this just type the following address inside the address bar of the Tor browser
https://torbrowser.project.org
• Once the index page is displayed, it will display the public IP through which your browser is
connected to the Internet, which will be different from the public IP of your Linux machine and
you can confirm this by checking your public IP in another browser tab by typing what is my
ip OR by visiting https://www.dnsleaktest.com/
• Please make time and open the settings of Tor browser, especially Privacy & Security settings,
and over there specially the Security Level that can be set to Standard/Safer/Safest. J
19
Instructor(s): Muhammad Rauf Butt, Muhammad Arif Butt, PhD
Visit Onion Websites: Many popular websites and services offer onion services (also known as
TOT hidden services) to provide secure, private access through the TOR network. These onion services
are typically used for enhanced privacy and anonymity, and they can only be accessed via TOR browser
or any browser that routes traffic through the TOR network. The URLs of onion websites often change,
so you can always search for “hidden wiki URLs” on your TOR browser to search from a large list of
links of .onion domains. (https://thehidden-wiki.org/wiki/index.php/Main_Page )
• DuckDuckGo: DuckDuckGo is a privacy-focused search engine that doesn’t track users. Its
onion service allows you to search anonymously via TOR. Open the TOR browser, and enter
the onion URL into the address bar.
https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/
• The New York Times: The New York Times provides an onion site to offer secure and
anonymous access to its journalism, especially for those in countries with media censorship
Open the Tor Browser, and enter the onion URL into the address bar.
https://www.nytimes3xbfgragh.onion/
• The BBC: The BBC provides an onion version of its website to make its news accessible in
regions where it might be censored.
https://www.bbcnewsv2vjtpsuy.onion/
• The Facebook: The Facebook offers an onion version of its website to allow users in restrictive
environments to access the social network securely. Note that Facebook still collects user data, even
though TOR.
https://www.facebookcorewwwi.onion/
20
Instructor(s): Muhammad Rauf Butt, Muhammad Arif Butt, PhD
Description: Combining TOR with a VPN provides an additional layer of security and privacy.
Users connect to a VPN before accessing the Tor network, adding an extra hop between their device
and the Tor entry node.
Pros:
• Enhanced Privacy: Encrypts traffic through both the VPN and Tor network, providing strong
anonymity.
• Hidden Tor Usage: VPN hides the use of Tor from the ISP, adding an extra layer of
obfuscation.
• Security: Provides defense-in-depth by combining the benefits of both technologies.
Cons:
• Significant Speed Reduction: Can be very slow due to double encryption and multiple hops.
• Complexity: More complex to set up and manage compared to using either technology alone.
• Cost: Requires a VPN subscription in addition to using Tor.
Note: You can use a layered approach by using TOR + VPN + ProxyChains
21
Instructor(s): Muhammad Rauf Butt, Muhammad Arif Butt, PhD
BONUS: The Surface Web vs The Deep Web vs The Dark Web
The Deep Web
Definition: The deep web refers to all parts of the Internet that are not indexed by traditional search
engines like Google, Bing, or Yahoo. This means that these pages cannot be found through standard
search queries.
Scope:
• Size: The deep web is estimated to be significantly larger than the surface web, possibly
hundreds of times greater in terms of data and content.
• Content: Includes private databases, academic and scientific research, medical records, legal
documents, financial records, and internal organizational sites. It also encompasses online
banking, subscription-only websites, and any other content that requires authentication or is
behind a paywall.
Accessibility:
• Access: Accessible to anyone with the correct URL and permissions. For example, accessing
your email, logging into your online banking account, or reading a private academic journal all
involve entering the deep web.
• Purpose: Provides a means for secure, private information exchange and storage. It is used by
individuals, businesses, and governments to protect sensitive information and ensure privacy.
Examples:
• Academic databases like JSTOR or IEEE Xplore.
• Government databases and resources not intended for public access.
• Corporate intranets and internal systems.
22
Instructor(s): Muhammad Rauf Butt, Muhammad Arif Butt, PhD
Key Differences
• Indexing:
o Deep Web: Not indexed by search engines but accessible with correct permissions.
o Dark Web: Not indexed and intentionally hidden; requires special software to access.
• Purpose and Content:
o Deep Web: Legitimate content including private and sensitive information.
o Dark Web: Mixed content with many illegal activities alongside legitimate uses.
• Access:
o Deep Web: Accessible through standard web browsers with proper credentials.
o Dark Web: Accessible only through special browsers like TOR, ensuring anonymity.
• Security and Privacy
o Deep Web: Generally secure and used for legitimate purposes. Standard security
measures apply, such as strong passwords and encryption.
o Dark Web: High-risk area; users must take extra precautions like using VPNs,
avoiding malicious links, and being aware of the potential for scams and law
enforcement activity.
Disclaimer
The series of handouts distributed with this course are only for educational purposes. Any actions and or activities
related to the material contained within this handout is solely your responsibility. The misuse of the information in
this handout can result in criminal charges brought against the persons in question. The authors will not be held
responsible in the event any criminal charges be brought against any individuals misusing the information in this
handout to break the law.
23