Ethical Hacking Code of Conduct

Before proceeding with the simulation, every operative must understand the legal and moral boundaries of Cybersecurity.

1. Authorization

Never attempt to penetrate a system without explicit, written permission from the owner. In this lab, your "permission" is the lesson assignment.

2. Data Privacy

If you encounter sensitive personal data (PII) during a test, you must stop and report it immediately. Do not copy or distribute it.

3. Stay Within Scope

A "Scope" defines what you are allowed to touch. In this lab, your scope is internal_node_01. Attacking the website hosting this lab is out-of-scope.

Technical Facts for the Lab: