On October 23rd, 2014, we updated our
By continuing to use LinkedIn’s SlideShare service, you agree to the revised terms, so please take a few minutes to review them.
Agenda• Demo: Hacking Windows Server 2008 Remote Desktop• Certified Ethical Hacker v7 course overview• EC-Council security course family• Demo: Installing Trojan using malcrafted MS Excel sheet
What is Remote Desktop?The most popular remote access technology“Most of our enterprise clients run line of business applications on Remote Desktopservers. The outsource support of business critical systems is also carried out usingthis technology. Even common people work using RDP on their home computers.”Dmitry Kiselov, IT Outsource Company CEO
Is Remote Desktop safe? Let’s seeConfigured with default settings,Remote Desktop is open to theMan-In-The-Middle attack.It is possible to break into theRDP Session and capturesensitive data.Engineered by Hackers. Presented by Professionals.
Man-In-The-Middle Attack Demo: Hacking Remote Desktop User CredentialsEngineered by Hackers. Presented by Professionals.
Introducing IT Security Course Ethical Hacking and Countermeasures v7 New Horizons Latvia offers Ethical Hacking and Countermeasures course which prepares students to the EC-Council Certified Ethical Hacker v7 exam. The demonstrated MITM attack is a part of the actual course.Engineered by Hackers. Presented by Professionals.
Introducing IT Security Course Ethical Hacking and Countermeasures v7 Comprehensive Module Flow This class will immerse the students into an interactive environment where they will be shown how to scan, test, and hack into their own computers. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about: • Hacking Webservers • Intrusion Detection • Social Engineering • Buffer Overflows • Policy Creation • DDoS Attacks • Virus Creation • SQL Injection • CryptographyEngineered by Hackers. Presented by Professionals.
Introducing IT Security Course Ethical Hacking and Countermeasures v7 Updated Hacking Technologies Courseware is regularly updated to reflect the latest achievements in this field and meet the standards of highly skilled security professionals.Engineered by Hackers. Presented by Professionals.
Introducing IT Security Course Ethical Hacking and Countermeasures v7 Exclusive Security Software Repository CEHv7 Courseware presents about 2000 pages of well-illustrated content. It comes with a package of 20 GB of tools and exploits uncovered from the underground community and features more than 1000 minutes of videos demonstrating hacking techniques.Engineered by Hackers. Presented by Professionals.
Introducing IT Security Course Ethical Hacking and Countermeasures v7 Attack Countermeasures CEHv7 has an exclusive section, which provides detailed explanation of countermeasures to be adopted against different types of attacks. The certification will fortify the application knowledge of security officers, auditors, site administrators, and anyone who is concerned about the integrity of the network infrastructure.Engineered by Hackers. Presented by Professionals.
Introducing IT Security Course Ethical Hacking and Countermeasures v7 Hands-on Experience During classes, students will receive in-depth knowledge as well as practical experience. They will employ the methodologies and tools learned in the course in order to break into laboratory’s computers, wireless network and specialized software.Engineered by Hackers. Presented by Professionals.
Upcoming CEH v8 certification Ethical Hacking and Countermeasures v8 CEH v8 exam will be available for public soon. However, courseware will be only available tentatively in 2013.Engineered by Hackers. Presented by Professionals.
EC-Council course familyCertified Secure Computer UserThis course is specifically designed for todays computer users who use the internetextensively to work, study and play. Students will acquire fundamental understandingof various computer and network security threats such as identity theft, credit cardfraud, online banking phishing scams, virus and backdoors, emails hoaxes, loss ofconfidential information, hacking attacks and social engineering.
EC-Council course familyEC-Council Network Security AdministratorThe ENSA program is designed to provide fundamental skills needed to analyze theinternal and external security threats, to develop security policies, to configurefirewalls, intrusion detection systems and AV systems that will protect anorganization’s information.
Still not impressed? Let’s play some more... Demo: Installing Trojan from the Excel spreadsheetEngineered by Hackers. Presented by Professionals.
Thanks for attending! See you at New Horizons! Phone: +371 67847600 Address: Elizabetes 65-10, Riga, Latvia LV-1050 E-mail: firstname.lastname@example.org