More Related Content
Similar to Ce hv8 module 00
Similar to Ce hv8 module 00 (20)
Ce hv8 module 00
- 1. Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class
Exam 312-50 Certified Ethical Hacker
T A W c D 0 lU n
www.takedowncon.com
T A K £ D 0 lU n
is a hacking conference that was conceived by our members!
EC-Council has been flooded with requests to take our world-class courses on the road!
We have answered the call and created TakeDownCon!
This conference will be focused on the learner and will feature
several Certification & Certificate Training courses for Advanced Practitioners!
T
T A K O G U JH
0
will host EC-Council's sought after Hacking, Forensics and Pen Test courses,
Certified Wireless Security Professional, and several highly technical and advanced workshops
which will cover current and important security topics such as advanced penetration testing,
cryptography, network defense, application security and mobile forensics.
At T A K C D O llin
the learning doesn't stop when the training endsl
We have lined up a list of sought after industry practitioners and
subject matter experts that will present relevant and implementable topics!
For more information, about TAKEDOllin
please visitit w w w .takedow ncon.com
Hacker Halted
www.hackerhalted.com
.
1
i
* I i
* •־
Since 2004 EC-Council has hosted 20 Hacker Halted events across four continents and
in cities such as Myrtle Beach, Miami, Dubai, Singapore, Hong Kong, Mexico City,
Tokyo, Kuala Lumpur, Guangzhou, Taiper and Cairo.
Hacker Halted North America will be held in Miami for the 3rd year in a row and
based on past history is sure to boast an amazing turnout of Information Security Professionals!
Hacker Halted is more than just a conference event; practitioners travel from all over the world
to attend our world-class training, gain practical knowledge from our expert presenters and
get a preview of the latest technologies and Information Security tools
which will be showcased by our exhibitors and partners.
For more information, about Hacker Halted please visit
Ethical Hacking and Countermeasures Copyright © by EC-COUDCil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 2. Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class
Exam 312-50 Certified Ethical Hacker
VAMPIRE
www.vampiretech.com
Is your website vulnerably to an attack? Could hackers exploit a small weakness in your website and obtain access
to sensitive company information?
VampireScan allows users to test their own Cloud and Web applications against advanced attacks and receive
actionable results all within their own Web portal. Our easy to use online portal will simply ask you for the URL of
your web application, from there, our Services do the rest.
For a limited time, VampireTech is offering its Baseline Scan free of charge to qualified customers. This entitles you
to one Free Health Check for one domain utilizing our Baseline Scan. This Scan will test for Cross-site Scripting
Vulnerabilities, Non-SSL Passwords, and Password Autocomplete.
A
r
fc
V
Global CISO Executive Summit
Be on the forefront of a new global initiative where today's world-class leaders in information security will gather to
navigate through international waters. Join these leaders as they follow the wind of change that is sweeping through
the IS community motivating today's information guardians to develop a new way of thinking to ensure success in
protecting their respective organizations.
The goal of EC-Council's Global CISO Forum is to create an open platform for top information security executives to
discuss their successes, failures, obstacles, and challenges. The open conversation will lead to the creation of
actionable items that can be discussed and applied to the organization.
For More Information About CISO Executive Summit Please Visit: www.eccouncil.org/resources/ciso-executive-summit.aspx
Ethical Hacking and Countermeasures Copyright © by EC-COIMCil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 3. Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class
Exam 312-50 Certified Ethical Hacker
How to Dow nload M y CEHv8 E-Courseware and Additional
Lab M anuals?
Please follow the steps below to download your CEHv8 e-courseware and
additional lab manual.
Step 1:
Visit: https://academia.eccouncil.org. If you have an account already, skip to Step 4.
Step 2:
Click Register and fill out the registration form.
Step 3:
Using the email you provided in step 2, follow the instructions in the auto-generated
email to activate your Academia Portal account.
Step 4:
Login using your Username and Password.
Step 5:
Once successfully logged in, expand the A b o u t A c a d e m ia navigation menu and select
A c c e s s C ode.
Step 6:
Enter the access code provided to you to redeem access to the CEH V8 e-Courseware
and Lab Manuals.
Access Code: XXXXXXXXXXXXXXXX
Step 8:
Once redeemed, expand the C o u rs e s menu and select iL e a rn - P D F C o u rs e w a re - The
resulting page will list your CEH v8 e-Courseware and Lab Manuals.
Support:
E-mail support is available from academia(5>eccouncil.org.
System Requirements:
Visit https://academia.eccouncil.ore/AboutAcademia/WhatisiLearn.aspx to view the
system requirements.
Ethical Hacking and Countermeasures Copyright © by EC-C0lMCil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 4. Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class
Exam 312-50 Certified Ethical Hacker
Download Class Certificate of Attendance
I C - C o u n c il
THIS IS TO ACKNOWLEDGE THAT
HAS SUCCESSFULLY COMPLETED A COUKSE ON
AT AN EC-COUNCIL ACCREDITED TRAINING CENTER
In stru cto r
Date
T R A IN IN G C E N T E R :
E־C ncil
C 011
http://www.eccouncil.org
Please follow the below stated steps to download digital copy (PDF format) of your class
certificate of attendance.
Step 1: W ait until the class is over (the last of the class).
Step 2: Visit http://www.eccouncil.org/eval.
Step 3: Complete the course evaluation form (please complete all the fields in the form correct e-mail address is required).
Step 4: Evaluation code is required to submit the form. See the attached code.
Step 5: Submit the form.
Step 6: A web link will be sent to you to download your PDF copy of the certificate.
Course Evaluation Code: **״CEH” ” ”* ”־
Ethical Hacking and Countermeasures Copyright © by EC-COIMCil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 6. Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class
Exam 312-50 Certified Ethical Hacker
EC-Council
Copyright © 2013 by EC-Cou 11cil. All rights reserved. Except as permitted under the Copyright Act
o f 1976, no part o f tins publication may be reproduced or distributed 111 any form or by any means,
or stored 111 a database or retrieval system, without the prior written permission o f the publisher,
with the exception that the program listings may be entered, stored, and executed 111 a computer
system, but they may not be reproduced for publication.
Inform ation has been obtained by EC-Council from sources believed to be reliable. EC-Council
uses reasonable endeavors to ensure that the content is current and accurate, however, because of
the possibility ־ol human or mechanical error we do not guarantee the accuracy, adequacy, or
completeness ol any information and are not responsible for any errors or omissions or the accuracy
o f the results obtained from use o f such information.
The courseware is a result o f extensive research and contributions from subject matter experts from
the field from all over the world. Due credits for all such contributions and references are given in
the courseware in the research endnotes. We are committed towards protecting intellectual
property. It you are a copyright owner (an exclusive licensee or their agent), and if you believe
that any part o f the courseware constitutes an infringement o f copyright, or a breach o f an agreed
licence or contract, you may notify us at le g a l@ e c c o u n c il.o rg . 111 the event o f a justified complaint,
EC-Council will remove the material 111 question and make necessary rectifications.
The courseware may contain references to other information resources and security solutions, but
such references should not be considered as an endorsement o f or recommendation by EC-Council.
Readers are encouraged
at le g a l@ e c c o u n c il.o rg .
to
report
errors,
omissions
and
inaccuracies
to
EC-Council
If you have any issues, please contact s u p p o rt@ e c c o u n c il.o rg .
Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 7. Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class
Exam 312-50 Certified Ethical Hacker
Foreword
Since you are reading this CEHv8 courseware, you most likely realize the importance of
information systems security. However, we would like to put forth our motive behind compiling
a resource such as this one and what you can gain from this course.
You might find yourself asking what sets this course apart from the others out there. The truth
is that no single courseware can address all the issues of information security in a detailed
manner. Moreover, the rate at which exploits, tools, and methods are being discovered by the
security community makes it difficult for one program to cover all the necessary facets of
information security. This doesn't mean that this course is inadequate in any way as we have
worked to cover all major domains in such a manner that the reader will be able to appreciate
the way security has evolved over time as well as gain insight in to the fundamental workings
relevant to each domain. It is a blend of academic and practical wisdom supplemented with
tools that the reader can readily access in order to obtain a hands-on experience.
The emphasis throughout the courseware is on gaining practical know-how, which explains the
stress on free and accessible tools. You will read about some of the most widespread attacks
seen, the popular tools used by attackers, and how attacks have been carried out using
ordinary resources.
You may also want to know what to expect once you have completed the course. This
courseware is a resource material. Any penetration tester can tell you that there is no one
straight methodology or sequence of steps that you can follow while auditing a client site.
There is no one template that will meet all your needs. Your testing strategy will vary with the
client, the basic information about the system or situation, and the resources at your disposal.
However, for each stage you choose - be it enumeration, firewall, penetration of other
domains - you will find something in this courseware that you can definitely use.
Finally this is not the end! This courseware is to be considered a constant work-in-progress
because we will be adding value to this courseware over time. You may find some aspects
extremely detailed, while others may have less detail. W e are constantly asking ourselves if the
content helps explain the core point of the lesson, and we constant calibrate our material with
that in mind. W e would love to hear your viewpoints and suggestions so please send us your
feedback to help in our quest to constantly improve our courseware.
Ethical Hacking and Countermeasures Copyright © by EC-COIMCil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 9. Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class
Exam 312-50 Certified Ethical Hacker
Table of Contents
M odule N u m b e r
M odule N a m e
P ag e N o.
00
S tu d en t In tro d u ctio n
I
01
In tro d u ctio n to E th ical H a c k in g
01
02
F o o tp rin tin g an d R eco n n aissan ce
91
03
S can n in g N etw o rk s
262
04
E n u m e ra tio n
434
05
System H a c k in g
517
06
T ro jan s an d B ackdoors
827
07
V iruses an d W orm s
1006
08
Sniffing
1112
09
Social E n g in e e rin g
1292
10
D en ial o f Service
1402
11
Session H ijack in g
1503
12
H a c k in g W ebservers
1600
13
H a c k in g W eb A pplications
1723
14
SQ L In jectio n
1986
15
H a c k in g W ireless N etw o rk s
2134
16
H a c k in g M obile P latform s
2392
17
E v ad in g ID S, Firew alls, an d H o n ey p o ts
2549
18
Buffer O verflow
2691
19
C ryptography
2782
P en etratio n T e stin g
2872
R eferences
2976
»
|
Ethical Hacking and Countermeasures Copyright © by EC-COIMCil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 11. Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class
Exam 312-50 Certified Ethical Hacker
W elcome to Certified Ethical
Hacker Class!
Student Introduction
Engineered by Hackers. Presented by Professionals.
CE
H
Q
Ethical H acking an d C o u n term easu res
Module 00: Welcome to Certified Ethical Hacker Class
Exam 312-50
Module 00 Page I
Ethical Hacking and Countermeasures Copyright © by EC-C0l1nCil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 12. Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class
Exam 312-50 Certified Ethical Hacker
Copyright © by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.
CE
H
Course M aterials
/
^
ויווווווו
׳־
i
־V CEH
ע־BOOK
עין
&
1
Identity
Card
Student
Courseware
Lab Manual/
Workbook
Compact
Disc
Course
Evaluation
ץ־
V
Reference
Materials
Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.
Module 00 Page II
Ethical Hacking and Countermeasures Copyright © by EC-C0lMCil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 13. Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class
Exam 312-50 Certified Ethical Hacker
CEH
CEHv8 Course Outline
Introduction to Ethical
Hacking
Trojans and Backdoors
[ 61
Footprinting and
Reconnaissance
Viruses and Worms
[ 7]
[ 3]
Scanning Networks
Sniffing
[ 8]
[ 4]
Enumeration
Social Engineering
System Hacking
Denial-of-Service
111
2
5י
9
10]
Copyright © by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
CEHv8 Course Outline
r
דr
11
1
Session Hijacking
ייr
L
.
13
ד
r
Evading IDS, Firewalls and
Honeypots
r
י־
r
A
L
.
Hacking W eb Applications
L
.
רr
Buffer Overflows
A
r
1V
SQL Injection
r
15
יי
18
r
Cryptography
j
די
17
_ J
_
'
L
r
Hacking Webservers
L_
_
יי
r
^
u
L
־
י
16
Hacking Mobile Platforms
L
_____________________________________________________ J
12
ייr
r
A
L
י
19
J
די
Hacking Wireless Networks
Penetration Testing
20
Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.
Module 00 Page I
Ethical Hacking and Countermeasures Copyright © by EC-C0lMCil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 14. Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class
Exam 312-50 Certified Ethical Hacker
EC־Council Certification Program I C E H
There are several levels of certification tracks under the EC-Council Accreditation body:
Certified Secure Computer
User(CSCU)
EC־Council Disaster Recovery
Professional (EDRP)
Certified e-Business
Professional
EC-Council Certified Security
Analyst (ECSA)
— L
EC-Council Certified
Security Specialist (ECSS)
EC-Council Certified Secure
Programmer (ECSP)
EC-Council Network Security
Administrator (ENSA)
Certified Secure Application
Developer (CSAD)
Certified Ethical
Hacker(CEH)
Licensed Penetration Tester
(LPT)
You are
here
'
Computer Hacking Forensic
Investigator (CHFI)
Master of Security Science
(MSS)
Copyright © by IG-GOUIICil. All Rights Reserved. Reproduction is Strictly Prohibited.
Certified Ethical Hacker Track
CEH
UrtifM Etb IU(h«
itji
CEH Certification Track
C o m p lete th e fo llo w in g steps:
Attend the Ethical Hacking and
Countermeasures Course
s,״־
V'
Attend
Training
Pass the CEH Exam
Exam Code: 312-50-ANSI (IBT),
312-50v8 (VUE), or 350CEHv8
(APTC)
Prepare for
312-50 Exam
v
Take
Exam
Fail
אי
Pass
Cortifiad
EH
Certification
Achieved
Ethiol H i.U .
Copyright O by tG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.
Module 00 Page IV
Ethical Hacking and CountermeasuresCopyright © by EC-C0UIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 15. Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class
Exam 312-50 Certified Ethical Hacker
CEHv8 Exam Inform ation
״
X
^
CEH
Exam Title: Certified Ethical Hacker v8 (ANSI)
Exam Code: 312-50-ANSI (IBT), 312-50v8 (VUE), or 350CEHv8 (APTC)
Number of Questions: 125
Duration: 4 hours
7
Availability: Prometric Prime/ Prometric APTC/VUE
Passing Score: 70%
The instructor will tell you about the exam schedule/exam voucher
details for your training
This is a difficult exam and requires extensive knowledge of
CEH Core Modules
J
Copyright © by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.
Student Facilities
CEH
Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.
Module 00 Page V
Ethical Hacking and Countermeasures Copyright © by EC-C0UIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 16. Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class
Exam 312-50 Certified Ethical Hacker
L ab Sessions
Lab Sessions are designed to
reinforce the classroom sessions
The sessions are intended to
give a hands on experience only
and does not guarantee
proficiency
There are tons of labs in the lab
manual. Please practice these
labs back at home.
Copyright © by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.
W hat Does CEH Teach You?
Defense, Cisco Security, Firewalls,
IDS, Logs, Network, Antivirus,
Hardware, Troubleshooting,
Availability, Server/Client Security,
creating policies, network
Management etc....
CEH
Denial of Service, Trojans, Worms, Virus,
Social Engineering, Password cracking,
Session Hijacking, System failure, Spam,
Phishing, Identity theft, Wardriving,
warchalking, bluejacking Lock picking,
Buffer Overflow, System hacking,
Sniffing, SQL Injection....
Ethical Hacking
Bad Guy
This is W hat CEH Teaches You!
Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.
Module 00 Page VI
Ethical Hacking and Countermeasures Copyright © by EC-C0lMCil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 17. Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class
Exam 312-50 Certified Ethical Hacker
What CEH is NOT?
CEH class is NOT a
CEH class is NOT a
N e tw o rk S e c u rity training
S e c u rity A n alysis training
program
program
> Please attend EC-
> Please attend EC-
Council's EN SA class
Council's ECSA class
for that
*
CEH
for that
CEH class is NOT a
S e c u rity Testing training
program
> Please attend ECCouncil's LPT class
CEH class is 100%
N E T W O R K O FFEN SIV E
Training Program
for that
•Copyright © by IG-GouilCil. All RightsKeserved.:Reproduction is Strictly Prohibited.
CEH
U J Etk jl IU W
rtifW
w c*
The CEH Program T eaches you 100%
Network O ffensive Training and not
D efen sive
Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.
Module 00 Page VII
Ethical Hacking and Countermeasures Copyright © by EC-C0lMCil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 18. Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class
Exam 312-50 Certified Ethical Hacker
CEH Class Speed
CE
H
™
C*rt׳fW<
Itkitjl lUckM
The CEH class is extremely fast paced
The class "speed" can be compared to the climax scene from the movie
Mission Impossible (Bullet train sequence)
There are tons of hacking tools and hacking technologies covered in the
curriculum
The instructor WILL NOT be able to demonstrate ALL the tools in this class
He will showcase only selected tools
The students are required to practice with the tools not demonstrated in the
class on their own
Copyright © by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
Live Hacking Website
J
Please target your exercises for "Live Hacking" to www.certifiedhacker.com
J
This website is meant for the students to try the tools on live target
J
Please refrain from using the exploits on any other domains on the Internet
n
Certified Hacker
CEH Classroom
Attack Lab
Website
Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.
Module 00 Page VIII
Ethical Hacking and Countermeasures Copyright © by EC-C0lMCil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 19. Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class
Exam 312-50 Certified Ethical Hacker
NDA Document
Please read the
contents of the
provided ECCouncil's CEH
NDA document
CEH
Sign this
document and
hand it over to
the instructor
W e will NOT start
the class unless
you sign this
document
Please approach
the instructor if
you are not
presented with
this document
Copyright © by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.
Advanced Lab Environm ent
Windows 8
Windows Server
2008 (64 Bit)
Windows 7
CEH
Back Track S
Virtual Platform
u
Instructor M achine
Student M achines
Instructor and Student M achine Operating System : W in d o w s Server 2012 (Fully Patched)
Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.
Module 00 Page IX
Ethical Hacking and Countermeasures Copyright © by EC-C0lMCil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 20. Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class
Exam 312-50 Certified Ethical Hacker
Student C om puter C hecklist
C EH
W indows 8 a sV M
Ml
W indows 7 as VM
BackTrack 5 R3 as VM
Copyright © by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.
Student C om puter C hecklist
C EH
Certified
Etkxjl b i t o
Write down IP addresses of the
host and all the Virtual
Machines
Check if you can launch
command shell by right clicking
on a folder
Check if you can ping between
the VM and the hosts
Check if you can access Internet
and browse the web using IE,
Chrome, Safari and Firefox
Make sure you can access
RealHome and Powergym
websites at
http://localhost/realhome and
http://localhost/powergym
Check for snapshots of Virtual
Machines
Check if you can access
http://www.certifiedhacker.com
Make sure that you can access
D:CEH-T00 ls directory in W indow s
Server 2012 and Z:CEH-T00ls from
all the VM's; Z: is mapped Network
1
For Wireless Hacking module
you will need AirPcap adapter
Drive containing CEH tools
Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.
Module 00 Page X
Ethical Hacking and Countermeasures Copyright © by EC-C0lMCil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 21. Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class
Exam 312-50 Certified Ethical Hacker
Ping B etw een Virtual M achines
and Host
CEH
(•*MM
tlfcxjl M M*
m
Administrator: C:W1xlowssystefr132yc1
1
nd.exe
w ith 32 b y te e o f d a ta :
: bytoo-32 cimo<ln& TTL=128
4: bytes-32 cine <
11*3 TTL-128
: byte332 ־tim eClns TTL-128
: bytes-32 tine<11u TTL-128
=151 * I
■
C:SU3cr3snd1»ini5tr«tor>ping 1
w ith 32 bytes of data:
: b y t e 5 -3 2 t . M - l m
: b y te s — t in e < ln s
32
: b y t« fv 3 2 ־t if w < in s
: b y t e s -3 2 t ifw C in s
£1;דr1n 1
Reply f o t
3
Reply frow i
Reply fruw 1
<
■
ITL-128
ITL-128
ITL-12*
ITL-128
Plus u t a t i s t i c v f u r 1
Pac)<otc: S o n t 4 . ־R«<
Approxim ate round c r i p t i l
Min inum ־One. M imui
ax
C U
iV aoraR nln trA _
d iA tor>
C:Windowssystem32cmd.exe
I'-"• —
■
1AH1 in>ping 1
1
leuly f r a r t
leply fra*> I
tvply fmm 1
I
: but 32•1 יt ine-1fi* TTL-12B
: b ytu -3 2 I i1 < 11n TTL-12B
r
: byt««-32 t >.«e<1..x TTL-12N
: b yte v-32 t i1w<111v 11L-12H
,1 1 c t a t iv tic w f o r 1
1H
F ack a to : Son t - A . R ocoivod 4 .־Loot 0> 0 ־X 1 0 0 0 ).
ip p roxln ato round t r i p t in o a in n i l l i - o o c o n d o :
tlin in u n 9 ־r»e. tfaxinun - i n o . flvoraqo ■ Ono
:1NJta«r«VM1»in >
״
Copyright © by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.
CEH-Tools Directory in Windows
Server 2012 (D:CEH-Tools)
V_J I
* 1
|
($ ) (
1
Home
)'
Ethical >
U(hM
N<״w Volum e (t>)
DrMTOMI
Share
CEH
(•rt'fwd
V
View
V C 1 1 s*1rch N*wVolum*(D:)
* Comput«r ► NawVolum*(0:)
P
O
| |
)V Fivcrittc
■ D«*ktap
4 . Download)
, [ עRecent ploce«
SRECYCIE.BIN
CEH-Todv
Sy*te»r Volume
Information
3 Documents
J ' Music
m! Pictures
9 Videos
Computer
i i . Local Disk (G)
1 rf New Volume (D:)
£*
II
*
*■I Network
?items
Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.
Module 00 Page XI
Ethical Hacking and Countermeasures Copyright © by EC-C0lMCil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 22. Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class
Exam 312-50 Certified Ethical Hacker
Copyright © by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.
M apped Network D rive (Z:) in
W indows Server 2008 VM
oo
F!c
£d1
t
CEH
-Jnl*J
* vn |s d
e l(J
* * Computer
View
orgarize ▼
Jo®1
®
j j j views
Favonte bn<s
to
d*P
־׳י
y f Properties
אם׳»»)זסוי©מ׳,<! ט
Mamt
urrstai or :range a prog'a*
11 *
* ״י!־
* j t »־
*
tap nerA-ork drive
| .| T 0 U I5 H «
I . I f t m Sm m
Hard Disk Drives (1 )
Docu׳rentt
P t rs
icue
: muo
& .o c a l Disk (Cl)
Device* wltli Removable Storage (2)
ecendy Changed^ 1 1
5
fl
Searches
ulc
b^
h jj ״loppy D Orr׳״e (*:)
is<
Ftcppy Dak Drive
^
CD Drive
DVD Drive (D!)
Network Location (1 )
J
±J
Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.
Module 00 Page XII
Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 23. Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class
Exam 312-50 Certified Ethical Hacker
M apped Network D rive (Z:) in
W indows 7 VM
CEH
M M*
m
G Z IC lL lI^
,
v | :® . ► Computet ►
Organize▼
Properties
׳ ־Favorites
A
E
System properties
-
Uninstall or charge גprogram
|
p 1
SeorcA Ccrr.outer
Map network drive
»
[|£ ▼
(Jjj
O
H a r d D is k D rive s (1 )
Desktop
Local Disk (C:]
m Downloads
^
▼1
fti/ *
Recent Places
'
6.37 G3*'reeo*'158 G3
D e v ic e s w iT h R e m o v a b le S to ra g e (2 )
Libraries
1
Floppy Disk Drive (A:)
Documents
^
DVD Drive (DO
Music
B
'
Pictures
Q
N e t w o r k L o c a tio n (1 )
Videos
CEH-Tools <
* jf
: ■ Computer
(Z:)
j B tree of 269 OB
*'p Network
r£H-Tnnlc (107.1fift1Ml 11J ) (7•)
I
Tntalc■*••
Space free: 365 6B
Network Drive
Fie s/stem: NTFS
Copyright © by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.
Launching C om m and Shell
CEH
(•rtifwd
New Volume [D.)
.
Ethical >U(hM
■ °: ־
.
* I
]
'M
'3
9
lnrlud*<nMx*ry
*Jdlsmlw•.
AddM'CEHTootuar'
C»m
pn*»•nj «mtJ_
CompmstoCERToofc-ur* ־
Administrator: C:Wind 0wssystem32crnd.exe
C'tttt
0<
t«
«
Copyright © by EG-Gouncil. All Rights )ieServ6d:: Reproduction is Strictly Probfbited.
Module 00 Page XIII
Ethical Hacking and Countermeasures Copyright © by EC-COlMCil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 24. Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class
Exam 312-50 Certified Ethical Hacker
CEH
Snapshots o f Virtual M a ch in es
M M*
m
Hyper-V
File
Action
View
I
Manager
I —
Help
* * I 81! 0 1
j j Hyper-V Manager
^3 WIN-ROPCM8VKVOQ
V irtu a l M a c h in e s
WIN-ROPCM8VKVOQ
CPU Usage
Assigned Memory
Up*
New
= B32k Track 6
j
Import Virtual Machine...
§ Windows 3
j V/indows 2008 Ser/or
1024 MB
Hyper-V Settings...
024 זM3
.
settings
5 5 Virtual SAitch Manager...
Turn Off..
^
Shut Down..
Snapshots
Edit Disk...
Save
₪ g j, Wr*fow3 7 -(4/16/
H Now
Virtual SAN Manager...
Pause
Inspect Disk,..
(•) Stop Service
Reset
^
| Snapshot
Remove Server
Q Rfreh
e s
Revert..
View
Q
H«p
Rename..
Windows 7
Enable Replication ..
Help
□
C
h^trrrtt 1י
0
hd e t: D fS / k
e rtbd K b tu
Connect...
fr l
Sfttingc..
(•) Turn Off...
Sjrrrra׳i
0
Marory
Namxkng [ Rcpkdton
Shut Down...
Q
Save
||
Paute
Reset
Copyright © by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.
AirPcap
CEH
(•rt.fwa
Ethical >U(hM
Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.
Module 00 Page XIV
Ethical Hacking and Countermeasures Copyright © by EC-COlMCil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 25. Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class
Exam 312-50 Certified Ethical Hacker
P o w erg y m a n d R ea lH o m e
w
v
• ?
W eb sites
t־
c
[
....
C E H
toMlfOS ;• ./rq>nV
-> n 1 • kMMltnc kMh
1
Real Home!
* ! ״tin
* K ־r !;ר
■I TING
stlJ
LING
KI.N 1IM .
Supp*rt 1 FAQ*
IMSINO
t
:•Irip
CUJTIACl US
LOGIN
Powergym: http://localhost/powergym
RealHome: http://localhost/realhome
Copyright © by EG-Gauncil. All Rights Reserved. Reproduction is Strictly Prohibited.
Live Hack W ebsite
h ttp :/ / w w w . certifiedhacker. c o m
CEH Labs
CEH Labs
CEH Labs
C EH
CEH Labs
JuGGY
B0V
״unite
J
Nl fc t i
Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.
Module 00 Page XV
Ethical Hacking and Countermeasures Copyright © by EC-C0UIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
- 26. Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class
Exam 312-50 Certified Ethical Hacker
CE
H
L et’s Start H a ck in g
Copyright © by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.
Module 00 Page XVI
Ethical Hacking and Countermeasures Copyright © by EC-COlMCil
All Rights Reserved. Reproduction is Strictly Prohibited.