Skip to content

Zrokool/Intro-to-Ethical-Hacking

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Hikma Foundation - Ethical Hacking Training Materials

⚠️ LEGAL NOTICE & DISCLAIMER

Educational Purpose Only

These materials are provided by Hikma Foundation exclusively for educational purposes as part of our Ethical Hacking Series. All participants must have signed our "Do No Harm Agreement" before accessing or using these materials.


📋 Prerequisites

STOP! Before proceeding, you must:

  • ✅ Be enrolled in a Hikma Foundation Ethical Hacking Series
  • ✅ Have signed the Do No Harm Agreement
  • ✅ Understand that unauthorized use for tools is illegal and may result in criminal prosecution

If you have not signed the agreement, contact your instructor immediately.


⚖️ Legal Framework

Authorized Use Only

These tools and techniques may ONLY be used on:

  1. Your own personal systems (computers, VMs you own)
  2. Designated lab environments (OWASP Juice Shop, DVWA, etc. running locally)
  3. Hikma Foundation training infrastructure

Prohibited Activities

Using these materials for unauthorized access to any system violates:

  • Federal Law: Computer Fraud and Abuse Act (18 U.S.C. § 1030) - up to 20 years imprisonment
  • North Carolina Law: N.C. Gen. Stat. § 14-458 (Computer-related crimes)
  • Civil Liability: Damages, fines, and legal fees

"Educational purposes" does not authorize illegal activity.


🛡️ Liability Disclaimer

Complete Disclaimer

TO THE MAXIMUM EXTENT PERMITTED BY LAW:

Hikma Foundation, its directors, officers, employees, instructors, volunteers, and affiliates ("Foundation Parties") are NOT LIABLE for:

  • Any misuse of these materials by participants
  • Any illegal, unethical, or unauthorized actions by participants
  • Any damages, losses, harm, or legal consequences resulting from participant actions
  • Any criminal charges, civil liability, or professional consequences faced by participants

No Warranty

Materials are provided "AS IS" without warranty of any kind. Foundation Parties make no representations about the accuracy, reliability, or completeness of materials.

Independent Action

Participants acknowledge they act independently and not as agents of Hikma Foundation. The Foundation does not endorse, authorize, or condone any misuse of training materials.


🔐 Indemnification

By using these materials, you agree to indemnify, defend, and hold harmless all Foundation Parties from any claims, damages, losses, liabilities, costs, or expenses (including attorney's fees) arising from:

  • Your use or misuse of training materials
  • Your violation of any law, regulation, or the Do No Harm Agreement
  • Any unauthorized access to computer systems
  • Any negligent or intentional misconduct
  • Any third-party claims arising from your actions

📖 Authorized Training Environments

✅ Approved for Practice (No Additional Permission Needed)

  • Your personal computers and virtual machines
  • Locally-hosted intentionally vulnerable applications:
  • Authorized CTF platforms (HackTheBox, TryHackMe - follow their terms)
  • All of this IN ISOLATED NETWORKS

❌ NEVER Authorized Without Written Permission

  • Production websites or applications
  • Corporate networks or systems
  • Educational institution systems (unless you're the IT administrator)
  • Government systems
  • Any system you don't personally own
  • Third-party services or APIs

Get written authorization FIRST. Verbal permission is insufficient.


🚨 If You Discover a Vulnerability

Follow the Do No Harm Agreement:

  1. STOP immediately - do not continue testing
  2. Report responsibly to the affected organization's security team
  3. Do not exploit, publish, or share the vulnerability
  4. Allways Allow time for remediation before any disclosure

Responsible disclosure protects you legally and ethically.


🎓 Code of Ethics

As a Hikma Foundation participant, you commit to:

  1. Use knowledge to protect, not harm
  2. Test only authorized systems
  3. Respect privacy, property, and legal boundaries
  4. Report vulnerabilities responsibly
  5. Act with integrity in all conduct
  6. Comply with all laws and regulations

Your professional reputation starts now.


⚖️ Jurisdiction

This training is governed by the laws of North Carolina and the United States.

By accessing these materials, you acknowledge you are subject to North Carolina and federal law regardless of your location.


📚 Training Modules Available

Each module requires completion of the Do No Harm Agreement.


⚡ Quick Legal Reference

Question Answer
Can I test my school's network? NO - Unless you are authorized IT staff with written permission
Can I test websites for practice? NO - Only test designated lab environments or systems you own
What if I find a bug accidentally? STOP, do not explore further, report responsibly
Is "ethical hacking" a legal defense? NO - Unauthorized access is illegal regardless of intent
What if I'm just curious? Don't do it - Curiosity is not authorization

🎯 Three Simple Rules

  1. Only test what you own or have written permission to test
  2. When in doubt, DONT DO IT
  3. If it feels wrong, it probably is - DONT DO IT

✅ Acknowledgment Required

By proceeding, you certify that:

  • I have signed the Hikma Foundation Do No Harm Agreement
  • I will only use these materials for authorized, lawful purposes
  • I understand unauthorized access is a serious crime
  • I accept full personal responsibility for my actions
  • I agree to indemnify Hikma Foundation for any misuse
  • I understand violations result in immediate termination and legal action

If you cannot certify all of the above, you may not use these materials.


📄 Important Documents

  • Do No Harm Agreement (must be signed before participation)

🔒 Security Career Reminder

Remember: Cybersecurity professionals are trusted to protect systems, not attack them.

  • Employers conduct thorough background checks
  • Criminal records disqualify you from security positions
  • The security community values ethical behavior
  • Your actions today affect your future career

ALLWAYSSSS

Use your powers for good.


📜 Legal Summary

You are bound by:

  1. The Hikma Foundation Do No Harm Agreement (signed)
  2. This disclaimer and terms of use
  3. All applicable federal and North Carolina laws
  4. Terms of service for any platforms and tools used

Hikma Foundation is not liable for your actions. You act at your own risk and are solely responsible for compliance with all legal and ethical requirements.


🌟 Mission Statement

Hikma Foundation empowers learners with cybersecurity knowledge to build safer digital communities. We believe security education creates defenders, not attackers.

Thank you for learning responsibly.


© 2025 Hikma Foundation. All Rights Reserved.

Version: 1.0
Last Updated: November 2025


📖 Additional Resources - READ THIS


About

Class Content

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published