SlideShare a Scribd company logo
1 of 26
Download to read offline
Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

T A W c D 0 lU n
www.takedowncon.com
T A K £ D 0 lU n
is a hacking conference that was conceived by our members!
EC-Council has been flooded with requests to take our world-class courses on the road!
We have answered the call and created TakeDownCon!
This conference will be focused on the learner and will feature
several Certification & Certificate Training courses for Advanced Practitioners!
T
T A K O G U JH
0
will host EC-Council's sought after Hacking, Forensics and Pen Test courses,
Certified Wireless Security Professional, and several highly technical and advanced workshops
which will cover current and important security topics such as advanced penetration testing,
cryptography, network defense, application security and mobile forensics.
At T A K C D O llin
the learning doesn't stop when the training endsl
We have lined up a list of sought after industry practitioners and
subject matter experts that will present relevant and implementable topics!

For more information, about TAKEDOllin

please visitit w w w .takedow ncon.com

Hacker Halted
www.hackerhalted.com

.
1
i
* I i
* ‫•־‬
Since 2004 EC-Council has hosted 20 Hacker Halted events across four continents and
in cities such as Myrtle Beach, Miami, Dubai, Singapore, Hong Kong, Mexico City,
Tokyo, Kuala Lumpur, Guangzhou, Taiper and Cairo.

Hacker Halted North America will be held in Miami for the 3rd year in a row and
based on past history is sure to boast an amazing turnout of Information Security Professionals!
Hacker Halted is more than just a conference event; practitioners travel from all over the world
to attend our world-class training, gain practical knowledge from our expert presenters and
get a preview of the latest technologies and Information Security tools
which will be showcased by our exhibitors and partners.
For more information, about Hacker Halted please visit

Ethical Hacking and Countermeasures Copyright © by EC-COUDCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

VAMPIRE
www.vampiretech.com

Is your website vulnerably to an attack? Could hackers exploit a small weakness in your website and obtain access
to sensitive company information?
VampireScan allows users to test their own Cloud and Web applications against advanced attacks and receive
actionable results all within their own Web portal. Our easy to use online portal will simply ask you for the URL of
your web application, from there, our Services do the rest.
For a limited time, VampireTech is offering its Baseline Scan free of charge to qualified customers. This entitles you
to one Free Health Check for one domain utilizing our Baseline Scan. This Scan will test for Cross-site Scripting
Vulnerabilities, Non-SSL Passwords, and Password Autocomplete.

A
r

fc

V

Global CISO Executive Summit

Be on the forefront of a new global initiative where today's world-class leaders in information security will gather to
navigate through international waters. Join these leaders as they follow the wind of change that is sweeping through
the IS community motivating today's information guardians to develop a new way of thinking to ensure success in
protecting their respective organizations.
The goal of EC-Council's Global CISO Forum is to create an open platform for top information security executives to
discuss their successes, failures, obstacles, and challenges. The open conversation will lead to the creation of
actionable items that can be discussed and applied to the organization.
For More Information About CISO Executive Summit Please Visit: www.eccouncil.org/resources/ciso-executive-summit.aspx

Ethical Hacking and Countermeasures Copyright © by EC-COIMCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

How to Dow nload M y CEHv8 E-Courseware and Additional
Lab M anuals?
Please follow the steps below to download your CEHv8 e-courseware and
additional lab manual.

Step 1:
Visit: https://academia.eccouncil.org. If you have an account already, skip to Step 4.

Step 2:
Click Register and fill out the registration form.

Step 3:
Using the email you provided in step 2, follow the instructions in the auto-generated
email to activate your Academia Portal account.

Step 4:
Login using your Username and Password.

Step 5:
Once successfully logged in, expand the A b o u t A c a d e m ia navigation menu and select
A c c e s s C ode.

Step 6:
Enter the access code provided to you to redeem access to the CEH V8 e-Courseware
and Lab Manuals.

Access Code: XXXXXXXXXXXXXXXX

Step 8:
Once redeemed, expand the C o u rs e s menu and select iL e a rn - P D F C o u rs e w a re - The
resulting page will list your CEH v8 e-Courseware and Lab Manuals.

Support:
E-mail support is available from academia(5>eccouncil.org.

System Requirements:
Visit https://academia.eccouncil.ore/AboutAcademia/WhatisiLearn.aspx to view the
system requirements.

Ethical Hacking and Countermeasures Copyright © by EC-C0lMCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

Download Class Certificate of Attendance
I C - C o u n c il
THIS IS TO ACKNOWLEDGE THAT

HAS SUCCESSFULLY COMPLETED A COUKSE ON

AT AN EC-COUNCIL ACCREDITED TRAINING CENTER

In stru cto r

Date

T R A IN IN G C E N T E R :

E‫־‬C ncil
C 011

http://www.eccouncil.org

Please follow the below stated steps to download digital copy (PDF format) of your class
certificate of attendance.
Step 1: W ait until the class is over (the last of the class).
Step 2: Visit http://www.eccouncil.org/eval.
Step 3: Complete the course evaluation form (please complete all the fields in the form correct e-mail address is required).
Step 4: Evaluation code is required to submit the form. See the attached code.
Step 5: Submit the form.
Step 6: A web link will be sent to you to download your PDF copy of the certificate.

Course Evaluation Code: *‫*״‬CEH‫” ” ”* ”־‬
Ethical Hacking and Countermeasures Copyright © by EC-COIMCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and
Counterm easures
Version 8
Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

EC-Council
Copyright © 2013 by EC-Cou 11cil. All rights reserved. Except as permitted under the Copyright Act
o f 1976, no part o f tins publication may be reproduced or distributed 111 any form or by any means,
or stored 111 a database or retrieval system, without the prior written permission o f the publisher,
with the exception that the program listings may be entered, stored, and executed 111 a computer
system, but they may not be reproduced for publication.
Inform ation has been obtained by EC-Council from sources believed to be reliable. EC-Council
uses reasonable endeavors to ensure that the content is current and accurate, however, because of
the possibility‫ ־‬ol human or mechanical error we do not guarantee the accuracy, adequacy, or
completeness ol any information and are not responsible for any errors or omissions or the accuracy
o f the results obtained from use o f such information.
The courseware is a result o f extensive research and contributions from subject matter experts from
the field from all over the world. Due credits for all such contributions and references are given in
the courseware in the research endnotes. We are committed towards protecting intellectual
property. It you are a copyright owner (an exclusive licensee or their agent), and if you believe
that any part o f the courseware constitutes an infringement o f copyright, or a breach o f an agreed
licence or contract, you may notify us at le g a l@ e c c o u n c il.o rg . 111 the event o f a justified complaint,
EC-Council will remove the material 111 question and make necessary rectifications.
The courseware may contain references to other information resources and security solutions, but
such references should not be considered as an endorsement o f or recommendation by EC-Council.
Readers are encouraged
at le g a l@ e c c o u n c il.o rg .

to

report

errors,

omissions

and

inaccuracies

to

EC-Council

If you have any issues, please contact s u p p o rt@ e c c o u n c il.o rg .

Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

Foreword
Since you are reading this CEHv8 courseware, you most likely realize the importance of
information systems security. However, we would like to put forth our motive behind compiling
a resource such as this one and what you can gain from this course.
You might find yourself asking what sets this course apart from the others out there. The truth
is that no single courseware can address all the issues of information security in a detailed
manner. Moreover, the rate at which exploits, tools, and methods are being discovered by the
security community makes it difficult for one program to cover all the necessary facets of
information security. This doesn't mean that this course is inadequate in any way as we have
worked to cover all major domains in such a manner that the reader will be able to appreciate
the way security has evolved over time as well as gain insight in to the fundamental workings
relevant to each domain. It is a blend of academic and practical wisdom supplemented with
tools that the reader can readily access in order to obtain a hands-on experience.
The emphasis throughout the courseware is on gaining practical know-how, which explains the
stress on free and accessible tools. You will read about some of the most widespread attacks
seen, the popular tools used by attackers, and how attacks have been carried out using
ordinary resources.
You may also want to know what to expect once you have completed the course. This
courseware is a resource material. Any penetration tester can tell you that there is no one
straight methodology or sequence of steps that you can follow while auditing a client site.
There is no one template that will meet all your needs. Your testing strategy will vary with the
client, the basic information about the system or situation, and the resources at your disposal.
However, for each stage you choose - be it enumeration, firewall, penetration of other
domains - you will find something in this courseware that you can definitely use.
Finally this is not the end! This courseware is to be considered a constant work-in-progress
because we will be adding value to this courseware over time. You may find some aspects
extremely detailed, while others may have less detail. W e are constantly asking ourselves if the
content helps explain the core point of the lesson, and we constant calibrate our material with
that in mind. W e would love to hear your viewpoints and suggestions so please send us your
feedback to help in our quest to constantly improve our courseware.

Ethical Hacking and Countermeasures Copyright © by EC-COIMCil
All Rights Reserved. Reproduction is Strictly Prohibited.
This page is intentionally left blank.
Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

Table of Contents
M odule N u m b e r

M odule N a m e

P ag e N o.

00

S tu d en t In tro d u ctio n

I

01

In tro d u ctio n to E th ical H a c k in g

01

02

F o o tp rin tin g an d R eco n n aissan ce

91

03

S can n in g N etw o rk s

262

04

E n u m e ra tio n

434

05

System H a c k in g

517

06

T ro jan s an d B ackdoors

827

07

V iruses an d W orm s

1006

08

Sniffing

1112

09

Social E n g in e e rin g

1292

10

D en ial o f Service

1402

11

Session H ijack in g

1503

12

H a c k in g W ebservers

1600

13

H a c k in g W eb A pplications

1723

14

SQ L In jectio n

1986

15

H a c k in g W ireless N etw o rk s

2134

16

H a c k in g M obile P latform s

2392

17

E v ad in g ID S, Firew alls, an d H o n ey p o ts

2549

18

Buffer O verflow

2691

19

C ryptography

2782

P en etratio n T e stin g

2872

R eferences

2976

»

|

Ethical Hacking and Countermeasures Copyright © by EC-COIMCil
All Rights Reserved. Reproduction is Strictly Prohibited.
This page is intentionally left blank.
Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

W elcome to Certified Ethical
Hacker Class!
Student Introduction

Engineered by Hackers. Presented by Professionals.

CE
H

Q

Ethical H acking an d C o u n term easu res
Module 00: Welcome to Certified Ethical Hacker Class
Exam 312-50

Module 00 Page I

Ethical Hacking and Countermeasures Copyright © by EC-C0l1nCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

Copyright © by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

CE
H

Course M aterials
/

^

‫ויווווווו‬

‫׳־‬
i
‫־‬V CEH
‫ ע־‬BOOK
‫עין‬

&

1

Identity
Card

Student
Courseware

Lab Manual/
Workbook

Compact
Disc

Course
Evaluation
‫ץ־‬

V

Reference
Materials

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

Module 00 Page II

Ethical Hacking and Countermeasures Copyright © by EC-C0lMCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

CEH

CEHv8 Course Outline
Introduction to Ethical
Hacking

Trojans and Backdoors

[ 61

Footprinting and
Reconnaissance

Viruses and Worms

[ 7]

[ 3]

Scanning Networks

Sniffing

[ 8]

[ 4]

Enumeration

Social Engineering

System Hacking

Denial-of-Service

111
2

5‫י‬

9
10]

Copyright © by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

CEH

CEHv8 Course Outline
r

‫ד‬r

11

1
Session Hijacking

‫ יי‬r

L
.

13

‫ד‬

r

Evading IDS, Firewalls and
Honeypots

r

‫י־‬

r

A

L
.

Hacking W eb Applications
L
.

‫ר‬r
Buffer Overflows

A

r

1V

SQL Injection

r

15

‫יי‬

18

r
Cryptography

j

‫די‬

17

_ J
_

'

L

r

Hacking Webservers
L_
_
‫יי‬

r

^

u

L

‫־‬
‫י‬

16

Hacking Mobile Platforms

L
_____________________________________________________ J

12

‫ יי‬r

r

A

L

‫י‬

19

J

‫די‬

Hacking Wireless Networks

Penetration Testing

20

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

Module 00 Page I

Ethical Hacking and Countermeasures Copyright © by EC-C0lMCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

EC‫־‬Council Certification Program I C E H
There are several levels of certification tracks under the EC-Council Accreditation body:

Certified Secure Computer
User(CSCU)

EC‫־‬Council Disaster Recovery
Professional (EDRP)

Certified e-Business
Professional

EC-Council Certified Security
Analyst (ECSA)

— L

EC-Council Certified
Security Specialist (ECSS)

EC-Council Certified Secure
Programmer (ECSP)

EC-Council Network Security
Administrator (ENSA)

Certified Secure Application
Developer (CSAD)

Certified Ethical
Hacker(CEH)

Licensed Penetration Tester
(LPT)

You are
here
'

Computer Hacking Forensic
Investigator (CHFI)

Master of Security Science
(MSS)

Copyright © by IG-GOUIICil. All Rights Reserved. Reproduction is Strictly Prohibited.

Certified Ethical Hacker Track

CEH

UrtifM Etb IU(h«
itji

CEH Certification Track
C o m p lete th e fo llo w in g steps:
Attend the Ethical Hacking and
Countermeasures Course

s,‫״־‬
V'
Attend
Training

Pass the CEH Exam
Exam Code: 312-50-ANSI (IBT),
312-50v8 (VUE), or 350CEHv8
(APTC)

Prepare for
312-50 Exam

v
Take
Exam

Fail

‫אי‬

Pass

Cortifiad

EH

Certification
Achieved

Ethiol H i.U .

Copyright O by tG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

Module 00 Page IV

Ethical Hacking and CountermeasuresCopyright © by EC-C0UIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

CEHv8 Exam Inform ation
‫״‬
X

^

CEH

Exam Title: Certified Ethical Hacker v8 (ANSI)

Exam Code: 312-50-ANSI (IBT), 312-50v8 (VUE), or 350CEHv8 (APTC)

Number of Questions: 125

Duration: 4 hours

7

Availability: Prometric Prime/ Prometric APTC/VUE

Passing Score: 70%
The instructor will tell you about the exam schedule/exam voucher
details for your training
This is a difficult exam and requires extensive knowledge of
CEH Core Modules

J
Copyright © by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

Student Facilities

CEH

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

Module 00 Page V

Ethical Hacking and Countermeasures Copyright © by EC-C0UIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

L ab Sessions
Lab Sessions are designed to
reinforce the classroom sessions
The sessions are intended to
give a hands on experience only
and does not guarantee
proficiency
There are tons of labs in the lab
manual. Please practice these
labs back at home.

Copyright © by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

W hat Does CEH Teach You?

Defense, Cisco Security, Firewalls,
IDS, Logs, Network, Antivirus,
Hardware, Troubleshooting,
Availability, Server/Client Security,
creating policies, network
Management etc....

CEH

Denial of Service, Trojans, Worms, Virus,
Social Engineering, Password cracking,
Session Hijacking, System failure, Spam,
Phishing, Identity theft, Wardriving,
warchalking, bluejacking Lock picking,
Buffer Overflow, System hacking,
Sniffing, SQL Injection....

Ethical Hacking
Bad Guy

This is W hat CEH Teaches You!
Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

Module 00 Page VI

Ethical Hacking and Countermeasures Copyright © by EC-C0lMCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

What CEH is NOT?
CEH class is NOT a

CEH class is NOT a

N e tw o rk S e c u rity training

S e c u rity A n alysis training

program

program

> Please attend EC-

> Please attend EC-

Council's EN SA class

Council's ECSA class

for that

*

CEH

for that

CEH class is NOT a
S e c u rity Testing training
program

> Please attend ECCouncil's LPT class

CEH class is 100%
N E T W O R K O FFEN SIV E
Training Program

for that

•Copyright © by IG-GouilCil. All RightsKeserved.:Reproduction is Strictly Prohibited.

CEH

U J Etk jl IU W
rtifW
w c*

The CEH Program T eaches you 100%
Network O ffensive Training and not
D efen sive

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

Module 00 Page VII

Ethical Hacking and Countermeasures Copyright © by EC-C0lMCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

CEH Class Speed

CE
H

™

C*rt‫׳‬fW<

Itkitjl lUckM

The CEH class is extremely fast paced

The class "speed" can be compared to the climax scene from the movie
Mission Impossible (Bullet train sequence)

There are tons of hacking tools and hacking technologies covered in the
curriculum

The instructor WILL NOT be able to demonstrate ALL the tools in this class

He will showcase only selected tools

The students are required to practice with the tools not demonstrated in the
class on their own

Copyright © by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

CEH

Live Hacking Website
J

Please target your exercises for "Live Hacking" to www.certifiedhacker.com

J

This website is meant for the students to try the tools on live target

J

Please refrain from using the exploits on any other domains on the Internet

n

Certified Hacker

CEH Classroom
Attack Lab
Website

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

Module 00 Page VIII

Ethical Hacking and Countermeasures Copyright © by EC-C0lMCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

NDA Document

Please read the
contents of the
provided ECCouncil's CEH
NDA document

CEH

Sign this
document and
hand it over to
the instructor

W e will NOT start
the class unless
you sign this
document

Please approach
the instructor if
you are not
presented with
this document

Copyright © by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

Advanced Lab Environm ent

Windows 8

Windows Server
2008 (64 Bit)

Windows 7

CEH

Back Track S

Virtual Platform

u
Instructor M achine

Student M achines

Instructor and Student M achine Operating System : W in d o w s Server 2012 (Fully Patched)

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

Module 00 Page IX

Ethical Hacking and Countermeasures Copyright © by EC-C0lMCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

Student C om puter C hecklist

C EH

W indows 8 a sV M

Ml

W indows 7 as VM

BackTrack 5 R3 as VM

Copyright © by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

Student C om puter C hecklist

C EH
Certified

Etkxjl b i t o

Write down IP addresses of the
host and all the Virtual
Machines

Check if you can launch
command shell by right clicking
on a folder

Check if you can ping between
the VM and the hosts

Check if you can access Internet
and browse the web using IE,
Chrome, Safari and Firefox

Make sure you can access
RealHome and Powergym
websites at
http://localhost/realhome and
http://localhost/powergym

Check for snapshots of Virtual
Machines

Check if you can access
http://www.certifiedhacker.com

Make sure that you can access
D:CEH-T00 ls directory in W indow s
Server 2012 and Z:CEH-T00ls from
all the VM's; Z: is mapped Network

1

For Wireless Hacking module
you will need AirPcap adapter

Drive containing CEH tools

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

Module 00 Page X

Ethical Hacking and Countermeasures Copyright © by EC-C0lMCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

Ping B etw een Virtual M achines
and Host

CEH

(•*MM

tlfcxjl M M*
m

Administrator: C:W1xlowssystefr132yc1
1
nd.exe

w ith 32 b y te e o f d a ta :
: bytoo-32 cimo<ln& TTL=128
4: bytes-32 cine <
11*3 TTL-128
: byte332‫ ־‬tim eClns TTL-128
: bytes-32 tine<11u TTL-128

=151 * I

■

C:SU3cr3snd1»ini5tr«tor>ping 1
w ith 32 bytes of data:
: b y t e 5 -3 2 t . M - l m
: b y te s — t in e < ln s
32
: b y t« fv 3 2 ‫ ־‬t if w < in s
: b y t e s -3 2 t ifw C in s

£1;‫ד‬r1n 1
Reply f o t

3

Reply frow i
Reply fruw 1

<
■

ITL-128
ITL-128
ITL-12*
ITL-128

Plus u t a t i s t i c v f u r 1
Pac)<otc: S o n t 4 ‫ . ־‬R«<
Approxim ate round c r i p t i l
Min inum ‫ ־‬One. M imui
ax

C U
iV aoraR nln trA _
d iA tor>

C:Windowssystem32cmd.exe

I'-"• —

■
1AH1 in>ping 1
1

leuly f r a r t
leply fra*> I
tvply fmm 1

I

: but 32•1‫ י‬t ine-1fi* TTL-12B
: b ytu -3 2 I i1 < 11n TTL-12B
r
: byt««-32 t >.«e<1..x TTL-12N
: b yte v-32 t i1w<111v 11L-12H

,1 1 c t a t iv tic w f o r 1
1H
F ack a to : Son t - A . R ocoivod 4 ‫ .־‬Loot 0> 0 ‫ ־‬X 1 0 0 0 ).
ip p roxln ato round t r i p t in o a in n i l l i - o o c o n d o :
tlin in u n 9 ‫־‬r»e. tfaxinun - i n o . flvoraqo ■ Ono
:1NJta«r«VM1»in >
‫״‬

Copyright © by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

CEH-Tools Directory in Windows
Server 2012 (D:CEH-Tools)
V_J I

* 1
|

($ ) (
1

Home
)'

Ethical >
U(hM

N<‫״‬w Volum e (t>)

DrMTOMI
Share

CEH

(•rt'fwd

V

View
V C 1 1 s*1rch N*wVolum*(D:)

* Comput«r ► NawVolum*(0:)

P

O
| |

)V Fivcrittc
■ D«*ktap
4 . Download)
,‫ [ ע‬Recent ploce«
SRECYCIE.BIN

CEH-Todv

Sy*te»r Volume
Information

3 Documents
J ' Music
m! Pictures
9 Videos

Computer
i i . Local Disk (G)
1 rf New Volume (D:)
£*

II

*
*■I Network

?items

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

Module 00 Page XI

Ethical Hacking and Countermeasures Copyright © by EC-C0lMCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

Copyright © by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

M apped Network D rive (Z:) in
W indows Server 2008 VM

oo
F!c

£d1
t

CEH
-Jnl*J

* vn |s d
e l(J

* * Computer
View

orgarize ▼

Jo®1
®
j j j views

Favonte bn<s

to

d*P
‫־׳י‬

y f Properties

‫אם׳»»)זסוי©מ׳,<! ט‬

Mamt

urrstai or :range a prog'a*

11 *
* ‫״י!־‬

* j t ‫»־‬
*

tap nerA-ork drive

| .| T 0 U I5 H «

I . I f t m Sm m

Hard Disk Drives (1 )

Docu‫׳‬rentt

P t rs
icue
: muo

& .o c a l Disk (Cl)
Device* wltli Removable Storage (2)

ecendy Changed^ 1 1
5
fl

Searches

ulc
b^

h jj ‫״‬loppy D Orr‫׳״‬e (*:)
is<

Ftcppy Dak Drive

^

CD Drive

DVD Drive (D!)

Network Location (1 )

J

±J

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

Module 00 Page XII

Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

M apped Network D rive (Z:) in
W indows 7 VM

CEH

M M*
m

G Z IC lL lI^
,

v | :® . ► Computet ►

Organize▼

Properties

‫ ׳ ־‬Favorites
A
E

System properties
-

Uninstall or charge ‫ ג‬program

|

p 1

SeorcA Ccrr.outer

Map network drive

»

[|£ ▼

(Jjj

O

H a r d D is k D rive s (1 )

Desktop

Local Disk (C:]

m Downloads
^

▼1

fti/ *

Recent Places
'

6.37 G3*'reeo*'158 G3

D e v ic e s w iT h R e m o v a b le S to ra g e (2 )

Libraries
1

Floppy Disk Drive (A:)

Documents

^

DVD Drive (DO

Music

B

'

Pictures

Q

N e t w o r k L o c a tio n (1 )

Videos

CEH-Tools <

* jf

: ■ Computer

(Z:)

j B tree of 269 OB

*'p Network

r£H-Tnnlc (107.1fift1Ml 11J ) (7•)

I

Tntalc■*••

Space free: 365 6B

Network Drive

Fie s/stem: NTFS

Copyright © by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

Launching C om m and Shell

CEH

(•rtifwd

New Volume [D.)
.

Ethical >U(hM

‫■ °: ־‬

.

* I

]
'M
'3
9

lnrlud*<nMx*ry
*Jdlsmlw•.
AddM'CEHTootuar'
C»m
pn*»•nj «mtJ_
CompmstoCERToofc-ur‫* ־‬

Administrator: C:Wind 0wssystem32crnd.exe
C'tttt

0<
t«
«

Copyright © by EG-Gouncil. All Rights )ieServ6d:: Reproduction is Strictly Probfbited.

Module 00 Page XIII

Ethical Hacking and Countermeasures Copyright © by EC-COlMCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

CEH

Snapshots o f Virtual M a ch in es

M M*
m

Hyper-V
File

Action

View

I

Manager

I —

Help

* * I 81! 0 1
j j Hyper-V Manager
^3 WIN-ROPCM8VKVOQ

V irtu a l M a c h in e s

WIN-ROPCM8VKVOQ
CPU Usage

Assigned Memory

Up*

New

= B32k Track 6
j

Import Virtual Machine...
§ Windows 3
j V/indows 2008 Ser/or

1024 MB

Hyper-V Settings...

024 ‫ ז‬M3

.

settings

5 5 Virtual SAitch Manager...

Turn Off..

^

Shut Down..

Snapshots

Edit Disk...

Save

₪ g j, Wr*fow3 7 -(4/16/
H Now

Virtual SAN Manager...

Pause

Inspect Disk,..
(•) Stop Service

Reset

^

| Snapshot

Remove Server

Q Rfreh
e s

Revert..

View
Q

H«p

Rename..

Windows 7

Enable Replication ..
Help

□

C
h^trrrtt 1‫י‬
0

hd e t: D fS / k
e rtbd K b tu

Connect...
fr l

Sfttingc..

(•) Turn Off...

Sjrrrra‫׳‬i

0

Marory

Namxkng [ Rcpkdton

Shut Down...

Q

Save

||

Paute
Reset

Copyright © by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

AirPcap

CEH

(•rt.fwa

Ethical >U(hM

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

Module 00 Page XIV

Ethical Hacking and Countermeasures Copyright © by EC-COlMCil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

P o w erg y m a n d R ea lH o m e
w
v
• ?
W eb sites
t‫־‬

c

[

....
C E H

toMlfOS ;• ./rq>nV

-> n 1 • kMMltnc kMh

1

Real Home!

* !‫ ״‬tin

* K ‫־‬r !‫;ר‬

■I TING

stlJ

LING

KI.N 1IM .

Supp*rt 1 FAQ*

IMSINO

t

:•Irip

CUJTIACl US

LOGIN

Powergym: http://localhost/powergym

RealHome: http://localhost/realhome
Copyright © by EG-Gauncil. All Rights Reserved. Reproduction is Strictly Prohibited.

Live Hack W ebsite
h ttp :/ / w w w . certifiedhacker. c o m
CEH Labs

CEH Labs

CEH Labs

C EH

CEH Labs

JuGGY

B0V

‫״‬unite
J

Nl fc t i
Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

Module 00 Page XV

Ethical Hacking and Countermeasures Copyright © by EC-C0UIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

CE
H

L et’s Start H a ck in g

Copyright © by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

Module 00 Page XVI

Ethical Hacking and Countermeasures Copyright © by EC-COlMCil
All Rights Reserved. Reproduction is Strictly Prohibited.

More Related Content

Viewers also liked

Ceh v8 labs module 06 trojans and backdoors
Ceh v8 labs module 06 trojans and backdoorsCeh v8 labs module 06 trojans and backdoors
Ceh v8 labs module 06 trojans and backdoorsMehrdad Jingoism
 
Ceh v8 labs module 14 sql injection
Ceh v8 labs module 14 sql injectionCeh v8 labs module 14 sql injection
Ceh v8 labs module 14 sql injectionMehrdad Jingoism
 
Ceh v8 labs module 02 footprinting and reconnaissance
Ceh v8 labs module 02 footprinting and reconnaissanceCeh v8 labs module 02 footprinting and reconnaissance
Ceh v8 labs module 02 footprinting and reconnaissanceMehrdad Jingoism
 
High Speed Parameter Estimation for a Homogenized Energy Model- Doctoral Defe...
High Speed Parameter Estimation for a Homogenized Energy Model- Doctoral Defe...High Speed Parameter Estimation for a Homogenized Energy Model- Doctoral Defe...
High Speed Parameter Estimation for a Homogenized Energy Model- Doctoral Defe...Jon Ernstberger
 
Tarea vi de medios y recursos didacticos
Tarea vi de medios y recursos didacticosTarea vi de medios y recursos didacticos
Tarea vi de medios y recursos didacticos19943812
 
Ceh v8 labs module 18 buffer overflow
Ceh v8 labs module 18 buffer overflowCeh v8 labs module 18 buffer overflow
Ceh v8 labs module 18 buffer overflowMehrdad Jingoism
 
Ceh v8 labs module 04 enumeration
Ceh v8 labs module 04 enumerationCeh v8 labs module 04 enumeration
Ceh v8 labs module 04 enumerationMehrdad Jingoism
 
Ceh v8 labs module 05 system hacking
Ceh v8 labs module 05 system hackingCeh v8 labs module 05 system hacking
Ceh v8 labs module 05 system hackingMehrdad Jingoism
 
Who the hell is going to use this thing?
Who the hell is going to use this thing?Who the hell is going to use this thing?
Who the hell is going to use this thing?Faran Jessani
 
Ceh v8 labs module 19 cryptography
Ceh v8 labs module 19 cryptographyCeh v8 labs module 19 cryptography
Ceh v8 labs module 19 cryptographyMehrdad Jingoism
 
Ceh v8 labs module 08 sniffers
Ceh v8 labs module 08 sniffersCeh v8 labs module 08 sniffers
Ceh v8 labs module 08 sniffersMehrdad Jingoism
 
Ceh v8 labs module 07 viruses and worms
Ceh v8 labs module 07 viruses and wormsCeh v8 labs module 07 viruses and worms
Ceh v8 labs module 07 viruses and wormsMehrdad Jingoism
 
Ceh v8 labs module 17 evading ids, firewalls and honeypots
Ceh v8 labs module 17 evading ids, firewalls and honeypotsCeh v8 labs module 17 evading ids, firewalls and honeypots
Ceh v8 labs module 17 evading ids, firewalls and honeypotsMehrdad Jingoism
 
Ce hv8 module 14 sql injection
Ce hv8 module 14 sql injectionCe hv8 module 14 sql injection
Ce hv8 module 14 sql injectionMehrdad Jingoism
 
Ceh v8 labs module 12 hacking webservers
Ceh v8 labs module 12 hacking webserversCeh v8 labs module 12 hacking webservers
Ceh v8 labs module 12 hacking webserversMehrdad Jingoism
 
Ceh v8 labs module 13 hacking web applications
Ceh v8 labs module 13 hacking web applicationsCeh v8 labs module 13 hacking web applications
Ceh v8 labs module 13 hacking web applicationsMehrdad Jingoism
 

Viewers also liked (20)

Ceh v8 labs module 06 trojans and backdoors
Ceh v8 labs module 06 trojans and backdoorsCeh v8 labs module 06 trojans and backdoors
Ceh v8 labs module 06 trojans and backdoors
 
Proyecto manhattan
Proyecto manhattanProyecto manhattan
Proyecto manhattan
 
Ceh v8 labs module 14 sql injection
Ceh v8 labs module 14 sql injectionCeh v8 labs module 14 sql injection
Ceh v8 labs module 14 sql injection
 
Ceh v8 labs module 02 footprinting and reconnaissance
Ceh v8 labs module 02 footprinting and reconnaissanceCeh v8 labs module 02 footprinting and reconnaissance
Ceh v8 labs module 02 footprinting and reconnaissance
 
High Speed Parameter Estimation for a Homogenized Energy Model- Doctoral Defe...
High Speed Parameter Estimation for a Homogenized Energy Model- Doctoral Defe...High Speed Parameter Estimation for a Homogenized Energy Model- Doctoral Defe...
High Speed Parameter Estimation for a Homogenized Energy Model- Doctoral Defe...
 
Tarea vi de medios y recursos didacticos
Tarea vi de medios y recursos didacticosTarea vi de medios y recursos didacticos
Tarea vi de medios y recursos didacticos
 
Legacy Project
Legacy ProjectLegacy Project
Legacy Project
 
Ceh v8 labs module 18 buffer overflow
Ceh v8 labs module 18 buffer overflowCeh v8 labs module 18 buffer overflow
Ceh v8 labs module 18 buffer overflow
 
Ceh v8 labs module 04 enumeration
Ceh v8 labs module 04 enumerationCeh v8 labs module 04 enumeration
Ceh v8 labs module 04 enumeration
 
Ceh v8 labs module 05 system hacking
Ceh v8 labs module 05 system hackingCeh v8 labs module 05 system hacking
Ceh v8 labs module 05 system hacking
 
VAN HALEN IIenfatizzato
VAN HALEN IIenfatizzatoVAN HALEN IIenfatizzato
VAN HALEN IIenfatizzato
 
case brief
case briefcase brief
case brief
 
Who the hell is going to use this thing?
Who the hell is going to use this thing?Who the hell is going to use this thing?
Who the hell is going to use this thing?
 
Ceh v8 labs module 19 cryptography
Ceh v8 labs module 19 cryptographyCeh v8 labs module 19 cryptography
Ceh v8 labs module 19 cryptography
 
Ceh v8 labs module 08 sniffers
Ceh v8 labs module 08 sniffersCeh v8 labs module 08 sniffers
Ceh v8 labs module 08 sniffers
 
Ceh v8 labs module 07 viruses and worms
Ceh v8 labs module 07 viruses and wormsCeh v8 labs module 07 viruses and worms
Ceh v8 labs module 07 viruses and worms
 
Ceh v8 labs module 17 evading ids, firewalls and honeypots
Ceh v8 labs module 17 evading ids, firewalls and honeypotsCeh v8 labs module 17 evading ids, firewalls and honeypots
Ceh v8 labs module 17 evading ids, firewalls and honeypots
 
Ce hv8 module 14 sql injection
Ce hv8 module 14 sql injectionCe hv8 module 14 sql injection
Ce hv8 module 14 sql injection
 
Ceh v8 labs module 12 hacking webservers
Ceh v8 labs module 12 hacking webserversCeh v8 labs module 12 hacking webservers
Ceh v8 labs module 12 hacking webservers
 
Ceh v8 labs module 13 hacking web applications
Ceh v8 labs module 13 hacking web applicationsCeh v8 labs module 13 hacking web applications
Ceh v8 labs module 13 hacking web applications
 

Similar to Ce hv8 module 00

Cehv10 Complete Details - brochure
Cehv10 Complete Details - brochureCehv10 Complete Details - brochure
Cehv10 Complete Details - brochureHBServices7
 
CEH Training in Gurgaon :SSDN Technologies
CEH Training in Gurgaon :SSDN TechnologiesCEH Training in Gurgaon :SSDN Technologies
CEH Training in Gurgaon :SSDN TechnologiesInformation Technology
 
How to ethical hacking? The complete ethical hacking certification course beg...
How to ethical hacking? The complete ethical hacking certification course beg...How to ethical hacking? The complete ethical hacking certification course beg...
How to ethical hacking? The complete ethical hacking certification course beg...Firojali Laskar
 
Penetration and hacking training brief
Penetration and hacking training briefPenetration and hacking training brief
Penetration and hacking training briefBill Nelson
 
The Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification HandbookThe Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification HandbookCalvin Sam
 
Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Providing Courses in Cyber forensic,Network Forensics.Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Providing Courses in Cyber forensic,Network Forensics.cnetworks
 
Codec Networks Offering Courses in Cyber forensic in Delhi,India.
Codec Networks Offering Courses in Cyber forensic in Delhi,India.Codec Networks Offering Courses in Cyber forensic in Delhi,India.
Codec Networks Offering Courses in Cyber forensic in Delhi,India.cnetworks
 
How to become a Certified Ethical Hacker.pdf
How to become a Certified Ethical Hacker.pdfHow to become a Certified Ethical Hacker.pdf
How to become a Certified Ethical Hacker.pdftsaaroacademy
 
Ethical hacking Course
Ethical hacking CourseEthical hacking Course
Ethical hacking CourseHimanshuPise2
 
Ethical Hacking Training CETPA Infotech.pdf
Ethical Hacking Training CETPA Infotech.pdfEthical Hacking Training CETPA Infotech.pdf
Ethical Hacking Training CETPA Infotech.pdfisha bajpai
 
Cyber handbook-enterprise-v1.6
Cyber handbook-enterprise-v1.6Cyber handbook-enterprise-v1.6
Cyber handbook-enterprise-v1.6César Celis
 
Ethical hacking certification training course (1)
Ethical hacking certification training course (1)Ethical hacking certification training course (1)
Ethical hacking certification training course (1)HadiyaSarwath
 
MN502Overview of Network SecurityPage 6 of 6Assessment D.docx
MN502Overview of Network SecurityPage 6 of 6Assessment D.docxMN502Overview of Network SecurityPage 6 of 6Assessment D.docx
MN502Overview of Network SecurityPage 6 of 6Assessment D.docxraju957290
 
Certified Ethical Hacker (CEH) - St. Pauls College
Certified Ethical Hacker (CEH) - St. Pauls CollegeCertified Ethical Hacker (CEH) - St. Pauls College
Certified Ethical Hacker (CEH) - St. Pauls CollegeSt. Pauls College
 
350-701 Certification Exam Dumps Pdf Your Path to Success.pdf
350-701 Certification Exam Dumps Pdf Your Path to Success.pdf350-701 Certification Exam Dumps Pdf Your Path to Success.pdf
350-701 Certification Exam Dumps Pdf Your Path to Success.pdfAliza Oscar
 
Certified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-CouncilCertified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-CouncilCRAW CYBER SECURITY PVT LTD
 

Similar to Ce hv8 module 00 (20)

Cehv10 Complete Details - brochure
Cehv10 Complete Details - brochureCehv10 Complete Details - brochure
Cehv10 Complete Details - brochure
 
Ce hv10 brochure
Ce hv10 brochureCe hv10 brochure
Ce hv10 brochure
 
CEH Training in Gurgaon :SSDN Technologies
CEH Training in Gurgaon :SSDN TechnologiesCEH Training in Gurgaon :SSDN Technologies
CEH Training in Gurgaon :SSDN Technologies
 
How to ethical hacking? The complete ethical hacking certification course beg...
How to ethical hacking? The complete ethical hacking certification course beg...How to ethical hacking? The complete ethical hacking certification course beg...
How to ethical hacking? The complete ethical hacking certification course beg...
 
Penetration and hacking training brief
Penetration and hacking training briefPenetration and hacking training brief
Penetration and hacking training brief
 
The Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification HandbookThe Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification Handbook
 
Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Providing Courses in Cyber forensic,Network Forensics.Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Providing Courses in Cyber forensic,Network Forensics.
 
Codec Networks Offering Courses in Cyber forensic in Delhi,India.
Codec Networks Offering Courses in Cyber forensic in Delhi,India.Codec Networks Offering Courses in Cyber forensic in Delhi,India.
Codec Networks Offering Courses in Cyber forensic in Delhi,India.
 
How to become a Certified Ethical Hacker.pdf
How to become a Certified Ethical Hacker.pdfHow to become a Certified Ethical Hacker.pdf
How to become a Certified Ethical Hacker.pdf
 
Ethical hacking Course
Ethical hacking CourseEthical hacking Course
Ethical hacking Course
 
Ethical Hacking Training CETPA Infotech.pdf
Ethical Hacking Training CETPA Infotech.pdfEthical Hacking Training CETPA Infotech.pdf
Ethical Hacking Training CETPA Infotech.pdf
 
Cyber handbook-enterprise-v1.6
Cyber handbook-enterprise-v1.6Cyber handbook-enterprise-v1.6
Cyber handbook-enterprise-v1.6
 
CEH-brochure.pdf
CEH-brochure.pdfCEH-brochure.pdf
CEH-brochure.pdf
 
Ethical hacking certification training course (1)
Ethical hacking certification training course (1)Ethical hacking certification training course (1)
Ethical hacking certification training course (1)
 
MN502Overview of Network SecurityPage 6 of 6Assessment D.docx
MN502Overview of Network SecurityPage 6 of 6Assessment D.docxMN502Overview of Network SecurityPage 6 of 6Assessment D.docx
MN502Overview of Network SecurityPage 6 of 6Assessment D.docx
 
Checkpoint ccsa r76
Checkpoint ccsa r76Checkpoint ccsa r76
Checkpoint ccsa r76
 
Certified Ethical Hacker (CEH) - St. Pauls College
Certified Ethical Hacker (CEH) - St. Pauls CollegeCertified Ethical Hacker (CEH) - St. Pauls College
Certified Ethical Hacker (CEH) - St. Pauls College
 
350-701 Certification Exam Dumps Pdf Your Path to Success.pdf
350-701 Certification Exam Dumps Pdf Your Path to Success.pdf350-701 Certification Exam Dumps Pdf Your Path to Success.pdf
350-701 Certification Exam Dumps Pdf Your Path to Success.pdf
 
Brochure of ICSS
Brochure of ICSS Brochure of ICSS
Brochure of ICSS
 
Certified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-CouncilCertified Ethical Hacking (CEH V9) Course Details | EC-Council
Certified Ethical Hacking (CEH V9) Course Details | EC-Council
 

Recently uploaded

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Recently uploaded (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

Ce hv8 module 00

  • 1. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker T A W c D 0 lU n www.takedowncon.com T A K £ D 0 lU n is a hacking conference that was conceived by our members! EC-Council has been flooded with requests to take our world-class courses on the road! We have answered the call and created TakeDownCon! This conference will be focused on the learner and will feature several Certification & Certificate Training courses for Advanced Practitioners! T T A K O G U JH 0 will host EC-Council's sought after Hacking, Forensics and Pen Test courses, Certified Wireless Security Professional, and several highly technical and advanced workshops which will cover current and important security topics such as advanced penetration testing, cryptography, network defense, application security and mobile forensics. At T A K C D O llin the learning doesn't stop when the training endsl We have lined up a list of sought after industry practitioners and subject matter experts that will present relevant and implementable topics! For more information, about TAKEDOllin please visitit w w w .takedow ncon.com Hacker Halted www.hackerhalted.com . 1 i * I i * ‫•־‬ Since 2004 EC-Council has hosted 20 Hacker Halted events across four continents and in cities such as Myrtle Beach, Miami, Dubai, Singapore, Hong Kong, Mexico City, Tokyo, Kuala Lumpur, Guangzhou, Taiper and Cairo. Hacker Halted North America will be held in Miami for the 3rd year in a row and based on past history is sure to boast an amazing turnout of Information Security Professionals! Hacker Halted is more than just a conference event; practitioners travel from all over the world to attend our world-class training, gain practical knowledge from our expert presenters and get a preview of the latest technologies and Information Security tools which will be showcased by our exhibitors and partners. For more information, about Hacker Halted please visit Ethical Hacking and Countermeasures Copyright © by EC-COUDCil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 2. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker VAMPIRE www.vampiretech.com Is your website vulnerably to an attack? Could hackers exploit a small weakness in your website and obtain access to sensitive company information? VampireScan allows users to test their own Cloud and Web applications against advanced attacks and receive actionable results all within their own Web portal. Our easy to use online portal will simply ask you for the URL of your web application, from there, our Services do the rest. For a limited time, VampireTech is offering its Baseline Scan free of charge to qualified customers. This entitles you to one Free Health Check for one domain utilizing our Baseline Scan. This Scan will test for Cross-site Scripting Vulnerabilities, Non-SSL Passwords, and Password Autocomplete. A r fc V Global CISO Executive Summit Be on the forefront of a new global initiative where today's world-class leaders in information security will gather to navigate through international waters. Join these leaders as they follow the wind of change that is sweeping through the IS community motivating today's information guardians to develop a new way of thinking to ensure success in protecting their respective organizations. The goal of EC-Council's Global CISO Forum is to create an open platform for top information security executives to discuss their successes, failures, obstacles, and challenges. The open conversation will lead to the creation of actionable items that can be discussed and applied to the organization. For More Information About CISO Executive Summit Please Visit: www.eccouncil.org/resources/ciso-executive-summit.aspx Ethical Hacking and Countermeasures Copyright © by EC-COIMCil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 3. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker How to Dow nload M y CEHv8 E-Courseware and Additional Lab M anuals? Please follow the steps below to download your CEHv8 e-courseware and additional lab manual. Step 1: Visit: https://academia.eccouncil.org. If you have an account already, skip to Step 4. Step 2: Click Register and fill out the registration form. Step 3: Using the email you provided in step 2, follow the instructions in the auto-generated email to activate your Academia Portal account. Step 4: Login using your Username and Password. Step 5: Once successfully logged in, expand the A b o u t A c a d e m ia navigation menu and select A c c e s s C ode. Step 6: Enter the access code provided to you to redeem access to the CEH V8 e-Courseware and Lab Manuals. Access Code: XXXXXXXXXXXXXXXX Step 8: Once redeemed, expand the C o u rs e s menu and select iL e a rn - P D F C o u rs e w a re - The resulting page will list your CEH v8 e-Courseware and Lab Manuals. Support: E-mail support is available from academia(5>eccouncil.org. System Requirements: Visit https://academia.eccouncil.ore/AboutAcademia/WhatisiLearn.aspx to view the system requirements. Ethical Hacking and Countermeasures Copyright © by EC-C0lMCil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 4. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker Download Class Certificate of Attendance I C - C o u n c il THIS IS TO ACKNOWLEDGE THAT HAS SUCCESSFULLY COMPLETED A COUKSE ON AT AN EC-COUNCIL ACCREDITED TRAINING CENTER In stru cto r Date T R A IN IN G C E N T E R : E‫־‬C ncil C 011 http://www.eccouncil.org Please follow the below stated steps to download digital copy (PDF format) of your class certificate of attendance. Step 1: W ait until the class is over (the last of the class). Step 2: Visit http://www.eccouncil.org/eval. Step 3: Complete the course evaluation form (please complete all the fields in the form correct e-mail address is required). Step 4: Evaluation code is required to submit the form. See the attached code. Step 5: Submit the form. Step 6: A web link will be sent to you to download your PDF copy of the certificate. Course Evaluation Code: *‫*״‬CEH‫” ” ”* ”־‬ Ethical Hacking and Countermeasures Copyright © by EC-COIMCil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 5. Ethical Hacking and Counterm easures Version 8
  • 6. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker EC-Council Copyright © 2013 by EC-Cou 11cil. All rights reserved. Except as permitted under the Copyright Act o f 1976, no part o f tins publication may be reproduced or distributed 111 any form or by any means, or stored 111 a database or retrieval system, without the prior written permission o f the publisher, with the exception that the program listings may be entered, stored, and executed 111 a computer system, but they may not be reproduced for publication. Inform ation has been obtained by EC-Council from sources believed to be reliable. EC-Council uses reasonable endeavors to ensure that the content is current and accurate, however, because of the possibility‫ ־‬ol human or mechanical error we do not guarantee the accuracy, adequacy, or completeness ol any information and are not responsible for any errors or omissions or the accuracy o f the results obtained from use o f such information. The courseware is a result o f extensive research and contributions from subject matter experts from the field from all over the world. Due credits for all such contributions and references are given in the courseware in the research endnotes. We are committed towards protecting intellectual property. It you are a copyright owner (an exclusive licensee or their agent), and if you believe that any part o f the courseware constitutes an infringement o f copyright, or a breach o f an agreed licence or contract, you may notify us at le g a l@ e c c o u n c il.o rg . 111 the event o f a justified complaint, EC-Council will remove the material 111 question and make necessary rectifications. The courseware may contain references to other information resources and security solutions, but such references should not be considered as an endorsement o f or recommendation by EC-Council. Readers are encouraged at le g a l@ e c c o u n c il.o rg . to report errors, omissions and inaccuracies to EC-Council If you have any issues, please contact s u p p o rt@ e c c o u n c il.o rg . Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 7. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker Foreword Since you are reading this CEHv8 courseware, you most likely realize the importance of information systems security. However, we would like to put forth our motive behind compiling a resource such as this one and what you can gain from this course. You might find yourself asking what sets this course apart from the others out there. The truth is that no single courseware can address all the issues of information security in a detailed manner. Moreover, the rate at which exploits, tools, and methods are being discovered by the security community makes it difficult for one program to cover all the necessary facets of information security. This doesn't mean that this course is inadequate in any way as we have worked to cover all major domains in such a manner that the reader will be able to appreciate the way security has evolved over time as well as gain insight in to the fundamental workings relevant to each domain. It is a blend of academic and practical wisdom supplemented with tools that the reader can readily access in order to obtain a hands-on experience. The emphasis throughout the courseware is on gaining practical know-how, which explains the stress on free and accessible tools. You will read about some of the most widespread attacks seen, the popular tools used by attackers, and how attacks have been carried out using ordinary resources. You may also want to know what to expect once you have completed the course. This courseware is a resource material. Any penetration tester can tell you that there is no one straight methodology or sequence of steps that you can follow while auditing a client site. There is no one template that will meet all your needs. Your testing strategy will vary with the client, the basic information about the system or situation, and the resources at your disposal. However, for each stage you choose - be it enumeration, firewall, penetration of other domains - you will find something in this courseware that you can definitely use. Finally this is not the end! This courseware is to be considered a constant work-in-progress because we will be adding value to this courseware over time. You may find some aspects extremely detailed, while others may have less detail. W e are constantly asking ourselves if the content helps explain the core point of the lesson, and we constant calibrate our material with that in mind. W e would love to hear your viewpoints and suggestions so please send us your feedback to help in our quest to constantly improve our courseware. Ethical Hacking and Countermeasures Copyright © by EC-COIMCil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 8. This page is intentionally left blank.
  • 9. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker Table of Contents M odule N u m b e r M odule N a m e P ag e N o. 00 S tu d en t In tro d u ctio n I 01 In tro d u ctio n to E th ical H a c k in g 01 02 F o o tp rin tin g an d R eco n n aissan ce 91 03 S can n in g N etw o rk s 262 04 E n u m e ra tio n 434 05 System H a c k in g 517 06 T ro jan s an d B ackdoors 827 07 V iruses an d W orm s 1006 08 Sniffing 1112 09 Social E n g in e e rin g 1292 10 D en ial o f Service 1402 11 Session H ijack in g 1503 12 H a c k in g W ebservers 1600 13 H a c k in g W eb A pplications 1723 14 SQ L In jectio n 1986 15 H a c k in g W ireless N etw o rk s 2134 16 H a c k in g M obile P latform s 2392 17 E v ad in g ID S, Firew alls, an d H o n ey p o ts 2549 18 Buffer O verflow 2691 19 C ryptography 2782 P en etratio n T e stin g 2872 R eferences 2976 » | Ethical Hacking and Countermeasures Copyright © by EC-COIMCil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 10. This page is intentionally left blank.
  • 11. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker W elcome to Certified Ethical Hacker Class! Student Introduction Engineered by Hackers. Presented by Professionals. CE H Q Ethical H acking an d C o u n term easu res Module 00: Welcome to Certified Ethical Hacker Class Exam 312-50 Module 00 Page I Ethical Hacking and Countermeasures Copyright © by EC-C0l1nCil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 12. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker Copyright © by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited. CE H Course M aterials / ^ ‫ויווווווו‬ ‫׳־‬ i ‫־‬V CEH ‫ ע־‬BOOK ‫עין‬ & 1 Identity Card Student Courseware Lab Manual/ Workbook Compact Disc Course Evaluation ‫ץ־‬ V Reference Materials Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited. Module 00 Page II Ethical Hacking and Countermeasures Copyright © by EC-C0lMCil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 13. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker CEH CEHv8 Course Outline Introduction to Ethical Hacking Trojans and Backdoors [ 61 Footprinting and Reconnaissance Viruses and Worms [ 7] [ 3] Scanning Networks Sniffing [ 8] [ 4] Enumeration Social Engineering System Hacking Denial-of-Service 111 2 5‫י‬ 9 10] Copyright © by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited. CEH CEHv8 Course Outline r ‫ד‬r 11 1 Session Hijacking ‫ יי‬r L . 13 ‫ד‬ r Evading IDS, Firewalls and Honeypots r ‫י־‬ r A L . Hacking W eb Applications L . ‫ר‬r Buffer Overflows A r 1V SQL Injection r 15 ‫יי‬ 18 r Cryptography j ‫די‬ 17 _ J _ ' L r Hacking Webservers L_ _ ‫יי‬ r ^ u L ‫־‬ ‫י‬ 16 Hacking Mobile Platforms L _____________________________________________________ J 12 ‫ יי‬r r A L ‫י‬ 19 J ‫די‬ Hacking Wireless Networks Penetration Testing 20 Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited. Module 00 Page I Ethical Hacking and Countermeasures Copyright © by EC-C0lMCil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 14. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker EC‫־‬Council Certification Program I C E H There are several levels of certification tracks under the EC-Council Accreditation body: Certified Secure Computer User(CSCU) EC‫־‬Council Disaster Recovery Professional (EDRP) Certified e-Business Professional EC-Council Certified Security Analyst (ECSA) — L EC-Council Certified Security Specialist (ECSS) EC-Council Certified Secure Programmer (ECSP) EC-Council Network Security Administrator (ENSA) Certified Secure Application Developer (CSAD) Certified Ethical Hacker(CEH) Licensed Penetration Tester (LPT) You are here ' Computer Hacking Forensic Investigator (CHFI) Master of Security Science (MSS) Copyright © by IG-GOUIICil. All Rights Reserved. Reproduction is Strictly Prohibited. Certified Ethical Hacker Track CEH UrtifM Etb IU(h« itji CEH Certification Track C o m p lete th e fo llo w in g steps: Attend the Ethical Hacking and Countermeasures Course s,‫״־‬ V' Attend Training Pass the CEH Exam Exam Code: 312-50-ANSI (IBT), 312-50v8 (VUE), or 350CEHv8 (APTC) Prepare for 312-50 Exam v Take Exam Fail ‫אי‬ Pass Cortifiad EH Certification Achieved Ethiol H i.U . Copyright O by tG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited. Module 00 Page IV Ethical Hacking and CountermeasuresCopyright © by EC-C0UIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 15. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker CEHv8 Exam Inform ation ‫״‬ X ^ CEH Exam Title: Certified Ethical Hacker v8 (ANSI) Exam Code: 312-50-ANSI (IBT), 312-50v8 (VUE), or 350CEHv8 (APTC) Number of Questions: 125 Duration: 4 hours 7 Availability: Prometric Prime/ Prometric APTC/VUE Passing Score: 70% The instructor will tell you about the exam schedule/exam voucher details for your training This is a difficult exam and requires extensive knowledge of CEH Core Modules J Copyright © by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited. Student Facilities CEH Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited. Module 00 Page V Ethical Hacking and Countermeasures Copyright © by EC-C0UIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 16. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker L ab Sessions Lab Sessions are designed to reinforce the classroom sessions The sessions are intended to give a hands on experience only and does not guarantee proficiency There are tons of labs in the lab manual. Please practice these labs back at home. Copyright © by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited. W hat Does CEH Teach You? Defense, Cisco Security, Firewalls, IDS, Logs, Network, Antivirus, Hardware, Troubleshooting, Availability, Server/Client Security, creating policies, network Management etc.... CEH Denial of Service, Trojans, Worms, Virus, Social Engineering, Password cracking, Session Hijacking, System failure, Spam, Phishing, Identity theft, Wardriving, warchalking, bluejacking Lock picking, Buffer Overflow, System hacking, Sniffing, SQL Injection.... Ethical Hacking Bad Guy This is W hat CEH Teaches You! Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited. Module 00 Page VI Ethical Hacking and Countermeasures Copyright © by EC-C0lMCil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 17. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker What CEH is NOT? CEH class is NOT a CEH class is NOT a N e tw o rk S e c u rity training S e c u rity A n alysis training program program > Please attend EC- > Please attend EC- Council's EN SA class Council's ECSA class for that * CEH for that CEH class is NOT a S e c u rity Testing training program > Please attend ECCouncil's LPT class CEH class is 100% N E T W O R K O FFEN SIV E Training Program for that •Copyright © by IG-GouilCil. All RightsKeserved.:Reproduction is Strictly Prohibited. CEH U J Etk jl IU W rtifW w c* The CEH Program T eaches you 100% Network O ffensive Training and not D efen sive Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited. Module 00 Page VII Ethical Hacking and Countermeasures Copyright © by EC-C0lMCil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 18. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker CEH Class Speed CE H ™ C*rt‫׳‬fW< Itkitjl lUckM The CEH class is extremely fast paced The class "speed" can be compared to the climax scene from the movie Mission Impossible (Bullet train sequence) There are tons of hacking tools and hacking technologies covered in the curriculum The instructor WILL NOT be able to demonstrate ALL the tools in this class He will showcase only selected tools The students are required to practice with the tools not demonstrated in the class on their own Copyright © by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited. CEH Live Hacking Website J Please target your exercises for "Live Hacking" to www.certifiedhacker.com J This website is meant for the students to try the tools on live target J Please refrain from using the exploits on any other domains on the Internet n Certified Hacker CEH Classroom Attack Lab Website Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited. Module 00 Page VIII Ethical Hacking and Countermeasures Copyright © by EC-C0lMCil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 19. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker NDA Document Please read the contents of the provided ECCouncil's CEH NDA document CEH Sign this document and hand it over to the instructor W e will NOT start the class unless you sign this document Please approach the instructor if you are not presented with this document Copyright © by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited. Advanced Lab Environm ent Windows 8 Windows Server 2008 (64 Bit) Windows 7 CEH Back Track S Virtual Platform u Instructor M achine Student M achines Instructor and Student M achine Operating System : W in d o w s Server 2012 (Fully Patched) Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited. Module 00 Page IX Ethical Hacking and Countermeasures Copyright © by EC-C0lMCil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 20. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker Student C om puter C hecklist C EH W indows 8 a sV M Ml W indows 7 as VM BackTrack 5 R3 as VM Copyright © by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited. Student C om puter C hecklist C EH Certified Etkxjl b i t o Write down IP addresses of the host and all the Virtual Machines Check if you can launch command shell by right clicking on a folder Check if you can ping between the VM and the hosts Check if you can access Internet and browse the web using IE, Chrome, Safari and Firefox Make sure you can access RealHome and Powergym websites at http://localhost/realhome and http://localhost/powergym Check for snapshots of Virtual Machines Check if you can access http://www.certifiedhacker.com Make sure that you can access D:CEH-T00 ls directory in W indow s Server 2012 and Z:CEH-T00ls from all the VM's; Z: is mapped Network 1 For Wireless Hacking module you will need AirPcap adapter Drive containing CEH tools Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited. Module 00 Page X Ethical Hacking and Countermeasures Copyright © by EC-C0lMCil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 21. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker Ping B etw een Virtual M achines and Host CEH (•*MM tlfcxjl M M* m Administrator: C:W1xlowssystefr132yc1 1 nd.exe w ith 32 b y te e o f d a ta : : bytoo-32 cimo<ln& TTL=128 4: bytes-32 cine < 11*3 TTL-128 : byte332‫ ־‬tim eClns TTL-128 : bytes-32 tine<11u TTL-128 =151 * I ■ C:SU3cr3snd1»ini5tr«tor>ping 1 w ith 32 bytes of data: : b y t e 5 -3 2 t . M - l m : b y te s — t in e < ln s 32 : b y t« fv 3 2 ‫ ־‬t if w < in s : b y t e s -3 2 t ifw C in s £1;‫ד‬r1n 1 Reply f o t 3 Reply frow i Reply fruw 1 < ■ ITL-128 ITL-128 ITL-12* ITL-128 Plus u t a t i s t i c v f u r 1 Pac)<otc: S o n t 4 ‫ . ־‬R«< Approxim ate round c r i p t i l Min inum ‫ ־‬One. M imui ax C U iV aoraR nln trA _ d iA tor> C:Windowssystem32cmd.exe I'-"• — ■ 1AH1 in>ping 1 1 leuly f r a r t leply fra*> I tvply fmm 1 I : but 32•1‫ י‬t ine-1fi* TTL-12B : b ytu -3 2 I i1 < 11n TTL-12B r : byt««-32 t >.«e<1..x TTL-12N : b yte v-32 t i1w<111v 11L-12H ,1 1 c t a t iv tic w f o r 1 1H F ack a to : Son t - A . R ocoivod 4 ‫ .־‬Loot 0> 0 ‫ ־‬X 1 0 0 0 ). ip p roxln ato round t r i p t in o a in n i l l i - o o c o n d o : tlin in u n 9 ‫־‬r»e. tfaxinun - i n o . flvoraqo ■ Ono :1NJta«r«VM1»in > ‫״‬ Copyright © by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited. CEH-Tools Directory in Windows Server 2012 (D:CEH-Tools) V_J I * 1 | ($ ) ( 1 Home )' Ethical > U(hM N<‫״‬w Volum e (t>) DrMTOMI Share CEH (•rt'fwd V View V C 1 1 s*1rch N*wVolum*(D:) * Comput«r ► NawVolum*(0:) P O | | )V Fivcrittc ■ D«*ktap 4 . Download) ,‫ [ ע‬Recent ploce« SRECYCIE.BIN CEH-Todv Sy*te»r Volume Information 3 Documents J ' Music m! Pictures 9 Videos Computer i i . Local Disk (G) 1 rf New Volume (D:) £* II * *■I Network ?items Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited. Module 00 Page XI Ethical Hacking and Countermeasures Copyright © by EC-C0lMCil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 22. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker Copyright © by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited. M apped Network D rive (Z:) in W indows Server 2008 VM oo F!c £d1 t CEH -Jnl*J * vn |s d e l(J * * Computer View orgarize ▼ Jo®1 ® j j j views Favonte bn<s to d*P ‫־׳י‬ y f Properties ‫אם׳»»)זסוי©מ׳,<! ט‬ Mamt urrstai or :range a prog'a* 11 * * ‫״י!־‬ * j t ‫»־‬ * tap nerA-ork drive | .| T 0 U I5 H « I . I f t m Sm m Hard Disk Drives (1 ) Docu‫׳‬rentt P t rs icue : muo & .o c a l Disk (Cl) Device* wltli Removable Storage (2) ecendy Changed^ 1 1 5 fl Searches ulc b^ h jj ‫״‬loppy D Orr‫׳״‬e (*:) is< Ftcppy Dak Drive ^ CD Drive DVD Drive (D!) Network Location (1 ) J ±J Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited. Module 00 Page XII Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 23. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker M apped Network D rive (Z:) in W indows 7 VM CEH M M* m G Z IC lL lI^ , v | :® . ► Computet ► Organize▼ Properties ‫ ׳ ־‬Favorites A E System properties - Uninstall or charge ‫ ג‬program | p 1 SeorcA Ccrr.outer Map network drive » [|£ ▼ (Jjj O H a r d D is k D rive s (1 ) Desktop Local Disk (C:] m Downloads ^ ▼1 fti/ * Recent Places ' 6.37 G3*'reeo*'158 G3 D e v ic e s w iT h R e m o v a b le S to ra g e (2 ) Libraries 1 Floppy Disk Drive (A:) Documents ^ DVD Drive (DO Music B ' Pictures Q N e t w o r k L o c a tio n (1 ) Videos CEH-Tools < * jf : ■ Computer (Z:) j B tree of 269 OB *'p Network r£H-Tnnlc (107.1fift1Ml 11J ) (7•) I Tntalc■*•• Space free: 365 6B Network Drive Fie s/stem: NTFS Copyright © by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited. Launching C om m and Shell CEH (•rtifwd New Volume [D.) . Ethical >U(hM ‫■ °: ־‬ . * I ] 'M '3 9 lnrlud*<nMx*ry *Jdlsmlw•. AddM'CEHTootuar' C»m pn*»•nj «mtJ_ CompmstoCERToofc-ur‫* ־‬ Administrator: C:Wind 0wssystem32crnd.exe C'tttt 0< t« « Copyright © by EG-Gouncil. All Rights )ieServ6d:: Reproduction is Strictly Probfbited. Module 00 Page XIII Ethical Hacking and Countermeasures Copyright © by EC-COlMCil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 24. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker CEH Snapshots o f Virtual M a ch in es M M* m Hyper-V File Action View I Manager I — Help * * I 81! 0 1 j j Hyper-V Manager ^3 WIN-ROPCM8VKVOQ V irtu a l M a c h in e s WIN-ROPCM8VKVOQ CPU Usage Assigned Memory Up* New = B32k Track 6 j Import Virtual Machine... § Windows 3 j V/indows 2008 Ser/or 1024 MB Hyper-V Settings... 024 ‫ ז‬M3 . settings 5 5 Virtual SAitch Manager... Turn Off.. ^ Shut Down.. Snapshots Edit Disk... Save ₪ g j, Wr*fow3 7 -(4/16/ H Now Virtual SAN Manager... Pause Inspect Disk,.. (•) Stop Service Reset ^ | Snapshot Remove Server Q Rfreh e s Revert.. View Q H«p Rename.. Windows 7 Enable Replication .. Help □ C h^trrrtt 1‫י‬ 0 hd e t: D fS / k e rtbd K b tu Connect... fr l Sfttingc.. (•) Turn Off... Sjrrrra‫׳‬i 0 Marory Namxkng [ Rcpkdton Shut Down... Q Save || Paute Reset Copyright © by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited. AirPcap CEH (•rt.fwa Ethical >U(hM Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited. Module 00 Page XIV Ethical Hacking and Countermeasures Copyright © by EC-COlMCil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 25. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker P o w erg y m a n d R ea lH o m e w v • ? W eb sites t‫־‬ c [ .... C E H toMlfOS ;• ./rq>nV -> n 1 • kMMltnc kMh 1 Real Home! * !‫ ״‬tin * K ‫־‬r !‫;ר‬ ■I TING stlJ LING KI.N 1IM . Supp*rt 1 FAQ* IMSINO t :•Irip CUJTIACl US LOGIN Powergym: http://localhost/powergym RealHome: http://localhost/realhome Copyright © by EG-Gauncil. All Rights Reserved. Reproduction is Strictly Prohibited. Live Hack W ebsite h ttp :/ / w w w . certifiedhacker. c o m CEH Labs CEH Labs CEH Labs C EH CEH Labs JuGGY B0V ‫״‬unite J Nl fc t i Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited. Module 00 Page XV Ethical Hacking and Countermeasures Copyright © by EC-C0UIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 26. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker CE H L et’s Start H a ck in g Copyright © by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited. Module 00 Page XVI Ethical Hacking and Countermeasures Copyright © by EC-COlMCil All Rights Reserved. Reproduction is Strictly Prohibited.