Ce hv8 module 00

806 views

Published on

Published in: Technology, News & Politics
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
806
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
158
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Ce hv8 module 00

  1. 1. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker T A W c D 0 lU n www.takedowncon.com T A K £ D 0 lU n is a hacking conference that was conceived by our members! EC-Council has been flooded with requests to take our world-class courses on the road! We have answered the call and created TakeDownCon! This conference will be focused on the learner and will feature several Certification & Certificate Training courses for Advanced Practitioners! T T A K O G U JH 0 will host EC-Council's sought after Hacking, Forensics and Pen Test courses, Certified Wireless Security Professional, and several highly technical and advanced workshops which will cover current and important security topics such as advanced penetration testing, cryptography, network defense, application security and mobile forensics. At T A K C D O llin the learning doesn't stop when the training endsl We have lined up a list of sought after industry practitioners and subject matter experts that will present relevant and implementable topics! For more information, about TAKEDOllin please visitit w w w .takedow ncon.com Hacker Halted www.hackerhalted.com . 1 i * I i * ‫•־‬ Since 2004 EC-Council has hosted 20 Hacker Halted events across four continents and in cities such as Myrtle Beach, Miami, Dubai, Singapore, Hong Kong, Mexico City, Tokyo, Kuala Lumpur, Guangzhou, Taiper and Cairo. Hacker Halted North America will be held in Miami for the 3rd year in a row and based on past history is sure to boast an amazing turnout of Information Security Professionals! Hacker Halted is more than just a conference event; practitioners travel from all over the world to attend our world-class training, gain practical knowledge from our expert presenters and get a preview of the latest technologies and Information Security tools which will be showcased by our exhibitors and partners. For more information, about Hacker Halted please visit Ethical Hacking and Countermeasures Copyright © by EC-COUDCil All Rights Reserved. Reproduction is Strictly Prohibited.
  2. 2. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker VAMPIRE www.vampiretech.com Is your website vulnerably to an attack? Could hackers exploit a small weakness in your website and obtain access to sensitive company information? VampireScan allows users to test their own Cloud and Web applications against advanced attacks and receive actionable results all within their own Web portal. Our easy to use online portal will simply ask you for the URL of your web application, from there, our Services do the rest. For a limited time, VampireTech is offering its Baseline Scan free of charge to qualified customers. This entitles you to one Free Health Check for one domain utilizing our Baseline Scan. This Scan will test for Cross-site Scripting Vulnerabilities, Non-SSL Passwords, and Password Autocomplete. A r fc V Global CISO Executive Summit Be on the forefront of a new global initiative where today's world-class leaders in information security will gather to navigate through international waters. Join these leaders as they follow the wind of change that is sweeping through the IS community motivating today's information guardians to develop a new way of thinking to ensure success in protecting their respective organizations. The goal of EC-Council's Global CISO Forum is to create an open platform for top information security executives to discuss their successes, failures, obstacles, and challenges. The open conversation will lead to the creation of actionable items that can be discussed and applied to the organization. For More Information About CISO Executive Summit Please Visit: www.eccouncil.org/resources/ciso-executive-summit.aspx Ethical Hacking and Countermeasures Copyright © by EC-COIMCil All Rights Reserved. Reproduction is Strictly Prohibited.
  3. 3. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker How to Dow nload M y CEHv8 E-Courseware and Additional Lab M anuals? Please follow the steps below to download your CEHv8 e-courseware and additional lab manual. Step 1: Visit: https://academia.eccouncil.org. If you have an account already, skip to Step 4. Step 2: Click Register and fill out the registration form. Step 3: Using the email you provided in step 2, follow the instructions in the auto-generated email to activate your Academia Portal account. Step 4: Login using your Username and Password. Step 5: Once successfully logged in, expand the A b o u t A c a d e m ia navigation menu and select A c c e s s C ode. Step 6: Enter the access code provided to you to redeem access to the CEH V8 e-Courseware and Lab Manuals. Access Code: XXXXXXXXXXXXXXXX Step 8: Once redeemed, expand the C o u rs e s menu and select iL e a rn - P D F C o u rs e w a re - The resulting page will list your CEH v8 e-Courseware and Lab Manuals. Support: E-mail support is available from academia(5>eccouncil.org. System Requirements: Visit https://academia.eccouncil.ore/AboutAcademia/WhatisiLearn.aspx to view the system requirements. Ethical Hacking and Countermeasures Copyright © by EC-C0lMCil All Rights Reserved. Reproduction is Strictly Prohibited.
  4. 4. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker Download Class Certificate of Attendance I C - C o u n c il THIS IS TO ACKNOWLEDGE THAT HAS SUCCESSFULLY COMPLETED A COUKSE ON AT AN EC-COUNCIL ACCREDITED TRAINING CENTER In stru cto r Date T R A IN IN G C E N T E R : E‫־‬C ncil C 011 http://www.eccouncil.org Please follow the below stated steps to download digital copy (PDF format) of your class certificate of attendance. Step 1: W ait until the class is over (the last of the class). Step 2: Visit http://www.eccouncil.org/eval. Step 3: Complete the course evaluation form (please complete all the fields in the form correct e-mail address is required). Step 4: Evaluation code is required to submit the form. See the attached code. Step 5: Submit the form. Step 6: A web link will be sent to you to download your PDF copy of the certificate. Course Evaluation Code: *‫*״‬CEH‫” ” ”* ”־‬ Ethical Hacking and Countermeasures Copyright © by EC-COIMCil All Rights Reserved. Reproduction is Strictly Prohibited.
  5. 5. Ethical Hacking and Counterm easures Version 8
  6. 6. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker EC-Council Copyright © 2013 by EC-Cou 11cil. All rights reserved. Except as permitted under the Copyright Act o f 1976, no part o f tins publication may be reproduced or distributed 111 any form or by any means, or stored 111 a database or retrieval system, without the prior written permission o f the publisher, with the exception that the program listings may be entered, stored, and executed 111 a computer system, but they may not be reproduced for publication. Inform ation has been obtained by EC-Council from sources believed to be reliable. EC-Council uses reasonable endeavors to ensure that the content is current and accurate, however, because of the possibility‫ ־‬ol human or mechanical error we do not guarantee the accuracy, adequacy, or completeness ol any information and are not responsible for any errors or omissions or the accuracy o f the results obtained from use o f such information. The courseware is a result o f extensive research and contributions from subject matter experts from the field from all over the world. Due credits for all such contributions and references are given in the courseware in the research endnotes. We are committed towards protecting intellectual property. It you are a copyright owner (an exclusive licensee or their agent), and if you believe that any part o f the courseware constitutes an infringement o f copyright, or a breach o f an agreed licence or contract, you may notify us at le g a l@ e c c o u n c il.o rg . 111 the event o f a justified complaint, EC-Council will remove the material 111 question and make necessary rectifications. The courseware may contain references to other information resources and security solutions, but such references should not be considered as an endorsement o f or recommendation by EC-Council. Readers are encouraged at le g a l@ e c c o u n c il.o rg . to report errors, omissions and inaccuracies to EC-Council If you have any issues, please contact s u p p o rt@ e c c o u n c il.o rg . Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  7. 7. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker Foreword Since you are reading this CEHv8 courseware, you most likely realize the importance of information systems security. However, we would like to put forth our motive behind compiling a resource such as this one and what you can gain from this course. You might find yourself asking what sets this course apart from the others out there. The truth is that no single courseware can address all the issues of information security in a detailed manner. Moreover, the rate at which exploits, tools, and methods are being discovered by the security community makes it difficult for one program to cover all the necessary facets of information security. This doesn't mean that this course is inadequate in any way as we have worked to cover all major domains in such a manner that the reader will be able to appreciate the way security has evolved over time as well as gain insight in to the fundamental workings relevant to each domain. It is a blend of academic and practical wisdom supplemented with tools that the reader can readily access in order to obtain a hands-on experience. The emphasis throughout the courseware is on gaining practical know-how, which explains the stress on free and accessible tools. You will read about some of the most widespread attacks seen, the popular tools used by attackers, and how attacks have been carried out using ordinary resources. You may also want to know what to expect once you have completed the course. This courseware is a resource material. Any penetration tester can tell you that there is no one straight methodology or sequence of steps that you can follow while auditing a client site. There is no one template that will meet all your needs. Your testing strategy will vary with the client, the basic information about the system or situation, and the resources at your disposal. However, for each stage you choose - be it enumeration, firewall, penetration of other domains - you will find something in this courseware that you can definitely use. Finally this is not the end! This courseware is to be considered a constant work-in-progress because we will be adding value to this courseware over time. You may find some aspects extremely detailed, while others may have less detail. W e are constantly asking ourselves if the content helps explain the core point of the lesson, and we constant calibrate our material with that in mind. W e would love to hear your viewpoints and suggestions so please send us your feedback to help in our quest to constantly improve our courseware. Ethical Hacking and Countermeasures Copyright © by EC-COIMCil All Rights Reserved. Reproduction is Strictly Prohibited.
  8. 8. This page is intentionally left blank.
  9. 9. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker Table of Contents M odule N u m b e r M odule N a m e P ag e N o. 00 S tu d en t In tro d u ctio n I 01 In tro d u ctio n to E th ical H a c k in g 01 02 F o o tp rin tin g an d R eco n n aissan ce 91 03 S can n in g N etw o rk s 262 04 E n u m e ra tio n 434 05 System H a c k in g 517 06 T ro jan s an d B ackdoors 827 07 V iruses an d W orm s 1006 08 Sniffing 1112 09 Social E n g in e e rin g 1292 10 D en ial o f Service 1402 11 Session H ijack in g 1503 12 H a c k in g W ebservers 1600 13 H a c k in g W eb A pplications 1723 14 SQ L In jectio n 1986 15 H a c k in g W ireless N etw o rk s 2134 16 H a c k in g M obile P latform s 2392 17 E v ad in g ID S, Firew alls, an d H o n ey p o ts 2549 18 Buffer O verflow 2691 19 C ryptography 2782 P en etratio n T e stin g 2872 R eferences 2976 » | Ethical Hacking and Countermeasures Copyright © by EC-COIMCil All Rights Reserved. Reproduction is Strictly Prohibited.
  10. 10. This page is intentionally left blank.
  11. 11. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker W elcome to Certified Ethical Hacker Class! Student Introduction Engineered by Hackers. Presented by Professionals. CE H Q Ethical H acking an d C o u n term easu res Module 00: Welcome to Certified Ethical Hacker Class Exam 312-50 Module 00 Page I Ethical Hacking and Countermeasures Copyright © by EC-C0l1nCil All Rights Reserved. Reproduction is Strictly Prohibited.
  12. 12. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker Copyright © by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited. CE H Course M aterials / ^ ‫ויווווווו‬ ‫׳־‬ i ‫־‬V CEH ‫ ע־‬BOOK ‫עין‬ & 1 Identity Card Student Courseware Lab Manual/ Workbook Compact Disc Course Evaluation ‫ץ־‬ V Reference Materials Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited. Module 00 Page II Ethical Hacking and Countermeasures Copyright © by EC-C0lMCil All Rights Reserved. Reproduction is Strictly Prohibited.
  13. 13. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker CEH CEHv8 Course Outline Introduction to Ethical Hacking Trojans and Backdoors [ 61 Footprinting and Reconnaissance Viruses and Worms [ 7] [ 3] Scanning Networks Sniffing [ 8] [ 4] Enumeration Social Engineering System Hacking Denial-of-Service 111 2 5‫י‬ 9 10] Copyright © by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited. CEH CEHv8 Course Outline r ‫ד‬r 11 1 Session Hijacking ‫ יי‬r L . 13 ‫ד‬ r Evading IDS, Firewalls and Honeypots r ‫י־‬ r A L . Hacking W eb Applications L . ‫ר‬r Buffer Overflows A r 1V SQL Injection r 15 ‫יי‬ 18 r Cryptography j ‫די‬ 17 _ J _ ' L r Hacking Webservers L_ _ ‫יי‬ r ^ u L ‫־‬ ‫י‬ 16 Hacking Mobile Platforms L _____________________________________________________ J 12 ‫ יי‬r r A L ‫י‬ 19 J ‫די‬ Hacking Wireless Networks Penetration Testing 20 Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited. Module 00 Page I Ethical Hacking and Countermeasures Copyright © by EC-C0lMCil All Rights Reserved. Reproduction is Strictly Prohibited.
  14. 14. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker EC‫־‬Council Certification Program I C E H There are several levels of certification tracks under the EC-Council Accreditation body: Certified Secure Computer User(CSCU) EC‫־‬Council Disaster Recovery Professional (EDRP) Certified e-Business Professional EC-Council Certified Security Analyst (ECSA) — L EC-Council Certified Security Specialist (ECSS) EC-Council Certified Secure Programmer (ECSP) EC-Council Network Security Administrator (ENSA) Certified Secure Application Developer (CSAD) Certified Ethical Hacker(CEH) Licensed Penetration Tester (LPT) You are here ' Computer Hacking Forensic Investigator (CHFI) Master of Security Science (MSS) Copyright © by IG-GOUIICil. All Rights Reserved. Reproduction is Strictly Prohibited. Certified Ethical Hacker Track CEH UrtifM Etb IU(h« itji CEH Certification Track C o m p lete th e fo llo w in g steps: Attend the Ethical Hacking and Countermeasures Course s,‫״־‬ V' Attend Training Pass the CEH Exam Exam Code: 312-50-ANSI (IBT), 312-50v8 (VUE), or 350CEHv8 (APTC) Prepare for 312-50 Exam v Take Exam Fail ‫אי‬ Pass Cortifiad EH Certification Achieved Ethiol H i.U . Copyright O by tG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited. Module 00 Page IV Ethical Hacking and CountermeasuresCopyright © by EC-C0UIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  15. 15. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker CEHv8 Exam Inform ation ‫״‬ X ^ CEH Exam Title: Certified Ethical Hacker v8 (ANSI) Exam Code: 312-50-ANSI (IBT), 312-50v8 (VUE), or 350CEHv8 (APTC) Number of Questions: 125 Duration: 4 hours 7 Availability: Prometric Prime/ Prometric APTC/VUE Passing Score: 70% The instructor will tell you about the exam schedule/exam voucher details for your training This is a difficult exam and requires extensive knowledge of CEH Core Modules J Copyright © by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited. Student Facilities CEH Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited. Module 00 Page V Ethical Hacking and Countermeasures Copyright © by EC-C0UIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  16. 16. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker L ab Sessions Lab Sessions are designed to reinforce the classroom sessions The sessions are intended to give a hands on experience only and does not guarantee proficiency There are tons of labs in the lab manual. Please practice these labs back at home. Copyright © by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited. W hat Does CEH Teach You? Defense, Cisco Security, Firewalls, IDS, Logs, Network, Antivirus, Hardware, Troubleshooting, Availability, Server/Client Security, creating policies, network Management etc.... CEH Denial of Service, Trojans, Worms, Virus, Social Engineering, Password cracking, Session Hijacking, System failure, Spam, Phishing, Identity theft, Wardriving, warchalking, bluejacking Lock picking, Buffer Overflow, System hacking, Sniffing, SQL Injection.... Ethical Hacking Bad Guy This is W hat CEH Teaches You! Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited. Module 00 Page VI Ethical Hacking and Countermeasures Copyright © by EC-C0lMCil All Rights Reserved. Reproduction is Strictly Prohibited.
  17. 17. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker What CEH is NOT? CEH class is NOT a CEH class is NOT a N e tw o rk S e c u rity training S e c u rity A n alysis training program program > Please attend EC- > Please attend EC- Council's EN SA class Council's ECSA class for that * CEH for that CEH class is NOT a S e c u rity Testing training program > Please attend ECCouncil's LPT class CEH class is 100% N E T W O R K O FFEN SIV E Training Program for that •Copyright © by IG-GouilCil. All RightsKeserved.:Reproduction is Strictly Prohibited. CEH U J Etk jl IU W rtifW w c* The CEH Program T eaches you 100% Network O ffensive Training and not D efen sive Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited. Module 00 Page VII Ethical Hacking and Countermeasures Copyright © by EC-C0lMCil All Rights Reserved. Reproduction is Strictly Prohibited.
  18. 18. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker CEH Class Speed CE H ™ C*rt‫׳‬fW< Itkitjl lUckM The CEH class is extremely fast paced The class "speed" can be compared to the climax scene from the movie Mission Impossible (Bullet train sequence) There are tons of hacking tools and hacking technologies covered in the curriculum The instructor WILL NOT be able to demonstrate ALL the tools in this class He will showcase only selected tools The students are required to practice with the tools not demonstrated in the class on their own Copyright © by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited. CEH Live Hacking Website J Please target your exercises for "Live Hacking" to www.certifiedhacker.com J This website is meant for the students to try the tools on live target J Please refrain from using the exploits on any other domains on the Internet n Certified Hacker CEH Classroom Attack Lab Website Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited. Module 00 Page VIII Ethical Hacking and Countermeasures Copyright © by EC-C0lMCil All Rights Reserved. Reproduction is Strictly Prohibited.
  19. 19. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker NDA Document Please read the contents of the provided ECCouncil's CEH NDA document CEH Sign this document and hand it over to the instructor W e will NOT start the class unless you sign this document Please approach the instructor if you are not presented with this document Copyright © by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited. Advanced Lab Environm ent Windows 8 Windows Server 2008 (64 Bit) Windows 7 CEH Back Track S Virtual Platform u Instructor M achine Student M achines Instructor and Student M achine Operating System : W in d o w s Server 2012 (Fully Patched) Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited. Module 00 Page IX Ethical Hacking and Countermeasures Copyright © by EC-C0lMCil All Rights Reserved. Reproduction is Strictly Prohibited.
  20. 20. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker Student C om puter C hecklist C EH W indows 8 a sV M Ml W indows 7 as VM BackTrack 5 R3 as VM Copyright © by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited. Student C om puter C hecklist C EH Certified Etkxjl b i t o Write down IP addresses of the host and all the Virtual Machines Check if you can launch command shell by right clicking on a folder Check if you can ping between the VM and the hosts Check if you can access Internet and browse the web using IE, Chrome, Safari and Firefox Make sure you can access RealHome and Powergym websites at http://localhost/realhome and http://localhost/powergym Check for snapshots of Virtual Machines Check if you can access http://www.certifiedhacker.com Make sure that you can access D:CEH-T00 ls directory in W indow s Server 2012 and Z:CEH-T00ls from all the VM's; Z: is mapped Network 1 For Wireless Hacking module you will need AirPcap adapter Drive containing CEH tools Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited. Module 00 Page X Ethical Hacking and Countermeasures Copyright © by EC-C0lMCil All Rights Reserved. Reproduction is Strictly Prohibited.
  21. 21. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker Ping B etw een Virtual M achines and Host CEH (•*MM tlfcxjl M M* m Administrator: C:W1xlowssystefr132yc1 1 nd.exe w ith 32 b y te e o f d a ta : : bytoo-32 cimo<ln& TTL=128 4: bytes-32 cine < 11*3 TTL-128 : byte332‫ ־‬tim eClns TTL-128 : bytes-32 tine<11u TTL-128 =151 * I ■ C:SU3cr3snd1»ini5tr«tor>ping 1 w ith 32 bytes of data: : b y t e 5 -3 2 t . M - l m : b y te s — t in e < ln s 32 : b y t« fv 3 2 ‫ ־‬t if w < in s : b y t e s -3 2 t ifw C in s £1;‫ד‬r1n 1 Reply f o t 3 Reply frow i Reply fruw 1 < ■ ITL-128 ITL-128 ITL-12* ITL-128 Plus u t a t i s t i c v f u r 1 Pac)<otc: S o n t 4 ‫ . ־‬R«< Approxim ate round c r i p t i l Min inum ‫ ־‬One. M imui ax C U iV aoraR nln trA _ d iA tor> C:Windowssystem32cmd.exe I'-"• — ■ 1AH1 in>ping 1 1 leuly f r a r t leply fra*> I tvply fmm 1 I : but 32•1‫ י‬t ine-1fi* TTL-12B : b ytu -3 2 I i1 < 11n TTL-12B r : byt««-32 t >.«e<1..x TTL-12N : b yte v-32 t i1w<111v 11L-12H ,1 1 c t a t iv tic w f o r 1 1H F ack a to : Son t - A . R ocoivod 4 ‫ .־‬Loot 0> 0 ‫ ־‬X 1 0 0 0 ). ip p roxln ato round t r i p t in o a in n i l l i - o o c o n d o : tlin in u n 9 ‫־‬r»e. tfaxinun - i n o . flvoraqo ■ Ono :1NJta«r«VM1»in > ‫״‬ Copyright © by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited. CEH-Tools Directory in Windows Server 2012 (D:CEH-Tools) V_J I * 1 | ($ ) ( 1 Home )' Ethical > U(hM N<‫״‬w Volum e (t>) DrMTOMI Share CEH (•rt'fwd V View V C 1 1 s*1rch N*wVolum*(D:) * Comput«r ► NawVolum*(0:) P O | | )V Fivcrittc ■ D«*ktap 4 . Download) ,‫ [ ע‬Recent ploce« SRECYCIE.BIN CEH-Todv Sy*te»r Volume Information 3 Documents J ' Music m! Pictures 9 Videos Computer i i . Local Disk (G) 1 rf New Volume (D:) £* II * *■I Network ?items Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited. Module 00 Page XI Ethical Hacking and Countermeasures Copyright © by EC-C0lMCil All Rights Reserved. Reproduction is Strictly Prohibited.
  22. 22. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker Copyright © by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited. M apped Network D rive (Z:) in W indows Server 2008 VM oo F!c £d1 t CEH -Jnl*J * vn |s d e l(J * * Computer View orgarize ▼ Jo®1 ® j j j views Favonte bn<s to d*P ‫־׳י‬ y f Properties ‫אם׳»»)זסוי©מ׳,<! ט‬ Mamt urrstai or :range a prog'a* 11 * * ‫״י!־‬ * j t ‫»־‬ * tap nerA-ork drive | .| T 0 U I5 H « I . I f t m Sm m Hard Disk Drives (1 ) Docu‫׳‬rentt P t rs icue : muo & .o c a l Disk (Cl) Device* wltli Removable Storage (2) ecendy Changed^ 1 1 5 fl Searches ulc b^ h jj ‫״‬loppy D Orr‫׳״‬e (*:) is< Ftcppy Dak Drive ^ CD Drive DVD Drive (D!) Network Location (1 ) J ±J Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited. Module 00 Page XII Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.
  23. 23. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker M apped Network D rive (Z:) in W indows 7 VM CEH M M* m G Z IC lL lI^ , v | :® . ► Computet ► Organize▼ Properties ‫ ׳ ־‬Favorites A E System properties - Uninstall or charge ‫ ג‬program | p 1 SeorcA Ccrr.outer Map network drive » [|£ ▼ (Jjj O H a r d D is k D rive s (1 ) Desktop Local Disk (C:] m Downloads ^ ▼1 fti/ * Recent Places ' 6.37 G3*'reeo*'158 G3 D e v ic e s w iT h R e m o v a b le S to ra g e (2 ) Libraries 1 Floppy Disk Drive (A:) Documents ^ DVD Drive (DO Music B ' Pictures Q N e t w o r k L o c a tio n (1 ) Videos CEH-Tools < * jf : ■ Computer (Z:) j B tree of 269 OB *'p Network r£H-Tnnlc (107.1fift1Ml 11J ) (7•) I Tntalc■*•• Space free: 365 6B Network Drive Fie s/stem: NTFS Copyright © by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited. Launching C om m and Shell CEH (•rtifwd New Volume [D.) . Ethical >U(hM ‫■ °: ־‬ . * I ] 'M '3 9 lnrlud*<nMx*ry *Jdlsmlw•. AddM'CEHTootuar' C»m pn*»•nj «mtJ_ CompmstoCERToofc-ur‫* ־‬ Administrator: C:Wind 0wssystem32crnd.exe C'tttt 0< t« « Copyright © by EG-Gouncil. All Rights )ieServ6d:: Reproduction is Strictly Probfbited. Module 00 Page XIII Ethical Hacking and Countermeasures Copyright © by EC-COlMCil All Rights Reserved. Reproduction is Strictly Prohibited.
  24. 24. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker CEH Snapshots o f Virtual M a ch in es M M* m Hyper-V File Action View I Manager I — Help * * I 81! 0 1 j j Hyper-V Manager ^3 WIN-ROPCM8VKVOQ V irtu a l M a c h in e s WIN-ROPCM8VKVOQ CPU Usage Assigned Memory Up* New = B32k Track 6 j Import Virtual Machine... § Windows 3 j V/indows 2008 Ser/or 1024 MB Hyper-V Settings... 024 ‫ ז‬M3 . settings 5 5 Virtual SAitch Manager... Turn Off.. ^ Shut Down.. Snapshots Edit Disk... Save ₪ g j, Wr*fow3 7 -(4/16/ H Now Virtual SAN Manager... Pause Inspect Disk,.. (•) Stop Service Reset ^ | Snapshot Remove Server Q Rfreh e s Revert.. View Q H«p Rename.. Windows 7 Enable Replication .. Help □ C h^trrrtt 1‫י‬ 0 hd e t: D fS / k e rtbd K b tu Connect... fr l Sfttingc.. (•) Turn Off... Sjrrrra‫׳‬i 0 Marory Namxkng [ Rcpkdton Shut Down... Q Save || Paute Reset Copyright © by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited. AirPcap CEH (•rt.fwa Ethical >U(hM Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited. Module 00 Page XIV Ethical Hacking and Countermeasures Copyright © by EC-COlMCil All Rights Reserved. Reproduction is Strictly Prohibited.
  25. 25. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker P o w erg y m a n d R ea lH o m e w v • ? W eb sites t‫־‬ c [ .... C E H toMlfOS ;• ./rq>nV -> n 1 • kMMltnc kMh 1 Real Home! * !‫ ״‬tin * K ‫־‬r !‫;ר‬ ■I TING stlJ LING KI.N 1IM . Supp*rt 1 FAQ* IMSINO t :•Irip CUJTIACl US LOGIN Powergym: http://localhost/powergym RealHome: http://localhost/realhome Copyright © by EG-Gauncil. All Rights Reserved. Reproduction is Strictly Prohibited. Live Hack W ebsite h ttp :/ / w w w . certifiedhacker. c o m CEH Labs CEH Labs CEH Labs C EH CEH Labs JuGGY B0V ‫״‬unite J Nl fc t i Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited. Module 00 Page XV Ethical Hacking and Countermeasures Copyright © by EC-C0UIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  26. 26. Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class Exam 312-50 Certified Ethical Hacker CE H L et’s Start H a ck in g Copyright © by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited. Module 00 Page XVI Ethical Hacking and Countermeasures Copyright © by EC-COlMCil All Rights Reserved. Reproduction is Strictly Prohibited.

×