This is Great Module in Which We Learn Which Techniques were used by Terriost Hackers...
So We should learn these Techniques Against them......

Download Link:
http://www.4shared.com/document/gbJ39ygb/CEHv6_Module_43_Cyber_Warfare-.html
Download Link:
http://www.4shared.com/document/gbJ39ygb/CEHv6_Module_43_Cyber_Warfare-.html
this tutorial has taken from Computersecurity007