SlideShare a Scribd company logo
1 of 4
Download to read offline
Ethical Hacking and
Countermeasures
Lab Manual
Ethical Hacking and Countermeasures

Exam 312-50 Certified Ethical Hacker

EC-Council
C o p y rig h t © 2 0 1 3 b y E C - C o u 11cil. A ll rights reserved. E x c e p t as p e rm itte d u n d e r th e C o p y rig h t A c t
o f 1976, n o p a rt o f this p u b lic a tio n m a y be re p ro d u c e d o r d is trib u te d
o r stored

111

111

a n y fo r m o r b y a n y m eans,

a database o r re trie v a l system , w ith o u t th e p r io r w r itte n p e rm is s io n o f th e p u b lis h e r,

w ith th e e x c e p tio n th a t th e p ro g ra m listings m a y be e n te re d , sto red , an d execu ted

111

a c o m p u te r

system , b u t th e y m a y n o t be re p ro d u c e d fo r p u b lic a tio n .
In fo r m a tio n has b een o b ta in e d b y E C - C o u n c il fr o m sources b e lie v e d to be reliab le. E C -C o u n c il
uses reasonable en deavo rs to ensure th a t th e c o n te n t is c u rre n t an d accurate, h o w e v e r, because o f
th e p o ss ib ility o t h u m a n o r m e c h a n ic a l e rro r w e d o n o t g uarantee th e accuracy, adequacy, o r
co m p leten ess o t an y in fo rm a tio n and are n o t resp o nsib le fo r an y e rrors o r om issions o r the accuracy
o f th e results o b ta in e d fr o m use o f such in fo rm a tio n .
T h e co ursew are is a resu lt o f extensive research an d c o n trib u tio n s fr o m subject m a tte r experts fr o m
th e fie ld fr o m all o v e r the w o rld . D u e credits fo r all such c o n trib u tio n s and references are g iv e n in
th e

co ursew are

in

th e

research

en d n o tes. W e

are

c o m m itte d

to w a rd s

p ro te c tin g

in te lle c m a l

p ro p e rty . I t y o u are a c o p y rig h t o w n e r (an exclusive licensee o r th e ir a g ent), an d i f y o u believe
th a t an y p a rt o f the co ursew are co nstitu tes an in frin g e m e n t o f c o p y rig h t, o r a b reach o f an agreed
licence o r c o n tra c t, y o u m a y n o tiiy us at le g a l@ e c c o u n c il.o rg .
E C -C o u n c il w ill re m o v e th e m a te ria l

111

111

th e e v e n t o f a ju s tifie d c o m p la in t,

q u e s tio n an d m a k e necessary re c tific a tio n s .

T h e co ursew are m a y c o n ta in referen ces to o th e r in fo rm a tio n resources an d security so lu tion s, b u t
such referen ces sh ould n o t be co n sid ered as an e n d o rs e m e n t o f

01‫ ־‬re c o m m e n d a tio n

b y E C -C o u n c il.

R eaders

an d

to

are

en cou rag ed

to

re p o rt

errors,

om issions

inaccuracies

at le g a l@ e c c o u n c il.o rg .
I f y o u h ave an y issues, please co n ta c t s u p p o rt@ e c c o u n c il.o rg .

Ethical Hacking and Countermeasures
All Rights Reserved. Reproduc

E C -C o u n c il
Ethical Hacking and Countermeasures

Exam 312-50 Certified Ethical Hacker

T a b l e of C o n t e n t s
M odule N tim b er

M odule N am e

Page N o .

01

In tro d u ctio n to E th ic a l H a ck in g

—

02

Fo o tp rin tin g and Reconnaissance

01

03

Scann ing N etw orks

84

04

En u m eratio n

266

05

System H ack in g

307

06

T ro jan s and Backdoors

424

07

V iruses and W orm s

529

08

Sn iffin g

584

09

So cial En g in e e rin g

674

10

D e n ia l o f Service

702

11

Session H ija ck in g

715

12

H a ck in g W ebservers

730

13

H ack in g W eb A p p licatio n s

761

14

S Q L In je ctio n

781

15

H a ck in g W ireless N etw orks

818

16

H a ck in g M o b ile Platform s

—

17

E va d in g ID S , Fire w a lls, and H oneypots

846

18

B u ffe r O verflow

901

19

C ryptography

914

20

Pen etratio n T estin g

—

Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures

Exam 312-50 Certified Ethical Hacker

L a b s D V D

DVD

C o n t e n t s

C o n te n ts

01

Lab Prerequisites, Module 02 - Module 04

02

Module 05 - Module 07

03

Module 08 - Module 11

04

Module 12 - Module 14

05

Module 15 - Module 17

06

Module 18 - M odule 20, BackTrack

Ethical Hacking and Countermeasures Copyright © by EC-C0UIICil
All Rights Reserved. Reproduction is Strictly Prohibited.

More Related Content

Viewers also liked

Ceh v8 labs module 14 sql injection
Ceh v8 labs module 14 sql injectionCeh v8 labs module 14 sql injection
Ceh v8 labs module 14 sql injectionMehrdad Jingoism
 
Ceh v8 labs module 02 footprinting and reconnaissance
Ceh v8 labs module 02 footprinting and reconnaissanceCeh v8 labs module 02 footprinting and reconnaissance
Ceh v8 labs module 02 footprinting and reconnaissanceMehrdad Jingoism
 
Ceh v8 labs module 12 hacking webservers
Ceh v8 labs module 12 hacking webserversCeh v8 labs module 12 hacking webservers
Ceh v8 labs module 12 hacking webserversMehrdad Jingoism
 
Ceh v8 labs module 06 trojans and backdoors
Ceh v8 labs module 06 trojans and backdoorsCeh v8 labs module 06 trojans and backdoors
Ceh v8 labs module 06 trojans and backdoorsMehrdad Jingoism
 
Ceh v8 labs module 04 enumeration
Ceh v8 labs module 04 enumerationCeh v8 labs module 04 enumeration
Ceh v8 labs module 04 enumerationMehrdad Jingoism
 
Ceh v8 labs module 18 buffer overflow
Ceh v8 labs module 18 buffer overflowCeh v8 labs module 18 buffer overflow
Ceh v8 labs module 18 buffer overflowMehrdad Jingoism
 
High Speed Parameter Estimation for a Homogenized Energy Model- Doctoral Defe...
High Speed Parameter Estimation for a Homogenized Energy Model- Doctoral Defe...High Speed Parameter Estimation for a Homogenized Energy Model- Doctoral Defe...
High Speed Parameter Estimation for a Homogenized Energy Model- Doctoral Defe...Jon Ernstberger
 
Ceh v8 labs module 17 evading ids, firewalls and honeypots
Ceh v8 labs module 17 evading ids, firewalls and honeypotsCeh v8 labs module 17 evading ids, firewalls and honeypots
Ceh v8 labs module 17 evading ids, firewalls and honeypotsMehrdad Jingoism
 
Ceh v8 labs module 05 system hacking
Ceh v8 labs module 05 system hackingCeh v8 labs module 05 system hacking
Ceh v8 labs module 05 system hackingMehrdad Jingoism
 
Ceh v8 labs module 13 hacking web applications
Ceh v8 labs module 13 hacking web applicationsCeh v8 labs module 13 hacking web applications
Ceh v8 labs module 13 hacking web applicationsMehrdad Jingoism
 
Ceh v8 labs module 07 viruses and worms
Ceh v8 labs module 07 viruses and wormsCeh v8 labs module 07 viruses and worms
Ceh v8 labs module 07 viruses and wormsMehrdad Jingoism
 

Viewers also liked (14)

Ce hv8 module 00
Ce hv8 module 00Ce hv8 module 00
Ce hv8 module 00
 
Ceh v8 labs module 14 sql injection
Ceh v8 labs module 14 sql injectionCeh v8 labs module 14 sql injection
Ceh v8 labs module 14 sql injection
 
Ceh v8 labs module 02 footprinting and reconnaissance
Ceh v8 labs module 02 footprinting and reconnaissanceCeh v8 labs module 02 footprinting and reconnaissance
Ceh v8 labs module 02 footprinting and reconnaissance
 
Ceh v8 labs module 12 hacking webservers
Ceh v8 labs module 12 hacking webserversCeh v8 labs module 12 hacking webservers
Ceh v8 labs module 12 hacking webservers
 
Ceh v8 labs module 06 trojans and backdoors
Ceh v8 labs module 06 trojans and backdoorsCeh v8 labs module 06 trojans and backdoors
Ceh v8 labs module 06 trojans and backdoors
 
Ceh v8 labs module 04 enumeration
Ceh v8 labs module 04 enumerationCeh v8 labs module 04 enumeration
Ceh v8 labs module 04 enumeration
 
Ceh v8 labs module 18 buffer overflow
Ceh v8 labs module 18 buffer overflowCeh v8 labs module 18 buffer overflow
Ceh v8 labs module 18 buffer overflow
 
Proyecto manhattan
Proyecto manhattanProyecto manhattan
Proyecto manhattan
 
High Speed Parameter Estimation for a Homogenized Energy Model- Doctoral Defe...
High Speed Parameter Estimation for a Homogenized Energy Model- Doctoral Defe...High Speed Parameter Estimation for a Homogenized Energy Model- Doctoral Defe...
High Speed Parameter Estimation for a Homogenized Energy Model- Doctoral Defe...
 
Ceh v8 labs module 17 evading ids, firewalls and honeypots
Ceh v8 labs module 17 evading ids, firewalls and honeypotsCeh v8 labs module 17 evading ids, firewalls and honeypots
Ceh v8 labs module 17 evading ids, firewalls and honeypots
 
Ceh v8 labs module 05 system hacking
Ceh v8 labs module 05 system hackingCeh v8 labs module 05 system hacking
Ceh v8 labs module 05 system hacking
 
Legacy Project
Legacy ProjectLegacy Project
Legacy Project
 
Ceh v8 labs module 13 hacking web applications
Ceh v8 labs module 13 hacking web applicationsCeh v8 labs module 13 hacking web applications
Ceh v8 labs module 13 hacking web applications
 
Ceh v8 labs module 07 viruses and worms
Ceh v8 labs module 07 viruses and wormsCeh v8 labs module 07 viruses and worms
Ceh v8 labs module 07 viruses and worms
 

Similar to EC-312 Ethical Hacking Lab Manual

4th OpenAIRE Workshop, Nils Dietrich
4th OpenAIRE Workshop, Nils Dietrich4th OpenAIRE Workshop, Nils Dietrich
4th OpenAIRE Workshop, Nils DietrichOpenAIRE
 
Jm future of system verilog verification
Jm future of system verilog verificationJm future of system verilog verification
Jm future of system verilog verificationObsidian Software
 
Congresso Crimes Eletrônicos, 08/03/2009 - Apresentação Ghassan Dreibi
Congresso Crimes Eletrônicos, 08/03/2009 - Apresentação Ghassan DreibiCongresso Crimes Eletrônicos, 08/03/2009 - Apresentação Ghassan Dreibi
Congresso Crimes Eletrônicos, 08/03/2009 - Apresentação Ghassan DreibiFecomercioSP
 
Customer_Testimonial_IFFCO.pdf
Customer_Testimonial_IFFCO.pdfCustomer_Testimonial_IFFCO.pdf
Customer_Testimonial_IFFCO.pdfPRASHANTJUNNARKAR
 
Lodestar Investor Presentation V4.pdf
Lodestar Investor Presentation V4.pdfLodestar Investor Presentation V4.pdf
Lodestar Investor Presentation V4.pdfAdnet Communications
 
Hacking web applications CEHv8 module 13
Hacking web applications CEHv8 module 13Hacking web applications CEHv8 module 13
Hacking web applications CEHv8 module 13Wise Person
 
Ceh v8 labs module 11 session hijacking
Ceh v8 labs module 11 session hijackingCeh v8 labs module 11 session hijacking
Ceh v8 labs module 11 session hijackingAsep Sopyan
 
Supervising management board culture, by Kroese brands & behaviour
Supervising management board culture, by Kroese brands & behaviourSupervising management board culture, by Kroese brands & behaviour
Supervising management board culture, by Kroese brands & behaviourKroese brands & behaviour
 
ISTE 2012 - Digital Citizenship and MyBigCampus
ISTE 2012 - Digital Citizenship and MyBigCampusISTE 2012 - Digital Citizenship and MyBigCampus
ISTE 2012 - Digital Citizenship and MyBigCampusStaci Trekles
 
Kostogryzov-for china-2013
 Kostogryzov-for china-2013 Kostogryzov-for china-2013
Kostogryzov-for china-2013Mathmodels Net
 
Maurizio_Taffone_Emerging_Security_Threats
Maurizio_Taffone_Emerging_Security_ThreatsMaurizio_Taffone_Emerging_Security_Threats
Maurizio_Taffone_Emerging_Security_ThreatsMaurizio Taffone
 
A Deep Dive into the Socio-Technical Aspects of Delays in Security Patching
A Deep Dive into the Socio-Technical Aspects of Delays in Security PatchingA Deep Dive into the Socio-Technical Aspects of Delays in Security Patching
A Deep Dive into the Socio-Technical Aspects of Delays in Security PatchingCREST @ University of Adelaide
 
Mixing it up: Developing and implementing a tagging system for a content-rich...
Mixing it up: Developing and implementing a tagging system for a content-rich...Mixing it up: Developing and implementing a tagging system for a content-rich...
Mixing it up: Developing and implementing a tagging system for a content-rich...Andrew Lewis
 
Skyals Manifest Your Dreams
Skyals Manifest Your DreamsSkyals Manifest Your Dreams
Skyals Manifest Your DreamsSheenaAhuja
 
Introduction to Energy Efficiency, EMS and Energy Audit
Introduction to Energy Efficiency, EMS and Energy AuditIntroduction to Energy Efficiency, EMS and Energy Audit
Introduction to Energy Efficiency, EMS and Energy Auditeecfncci
 
Patient Diary by Abhinandan Sandhu
Patient Diary by Abhinandan SandhuPatient Diary by Abhinandan Sandhu
Patient Diary by Abhinandan Sandhuabhigill
 
HOW TO TOKENIZE: PROCESS, POSSIBILITIES AND CHALLENGES
HOW TO TOKENIZE: PROCESS, POSSIBILITIES AND CHALLENGESHOW TO TOKENIZE: PROCESS, POSSIBILITIES AND CHALLENGES
HOW TO TOKENIZE: PROCESS, POSSIBILITIES AND CHALLENGESLiveplex
 
Immigration Compliance: How to keep the Government from knocking on the Door?
Immigration Compliance: How to keep the Government from knocking on the Door?Immigration Compliance: How to keep the Government from knocking on the Door?
Immigration Compliance: How to keep the Government from knocking on the Door?jvelie
 

Similar to EC-312 Ethical Hacking Lab Manual (20)

4th OpenAIRE Workshop, Nils Dietrich
4th OpenAIRE Workshop, Nils Dietrich4th OpenAIRE Workshop, Nils Dietrich
4th OpenAIRE Workshop, Nils Dietrich
 
Jm future of system verilog verification
Jm future of system verilog verificationJm future of system verilog verification
Jm future of system verilog verification
 
Safe To Play Whitepaper
Safe To  Play WhitepaperSafe To  Play Whitepaper
Safe To Play Whitepaper
 
Congresso Crimes Eletrônicos, 08/03/2009 - Apresentação Ghassan Dreibi
Congresso Crimes Eletrônicos, 08/03/2009 - Apresentação Ghassan DreibiCongresso Crimes Eletrônicos, 08/03/2009 - Apresentação Ghassan Dreibi
Congresso Crimes Eletrônicos, 08/03/2009 - Apresentação Ghassan Dreibi
 
Customer_Testimonial_IFFCO.pdf
Customer_Testimonial_IFFCO.pdfCustomer_Testimonial_IFFCO.pdf
Customer_Testimonial_IFFCO.pdf
 
Lodestar Investor Presentation V4.pdf
Lodestar Investor Presentation V4.pdfLodestar Investor Presentation V4.pdf
Lodestar Investor Presentation V4.pdf
 
Hacking web applications CEHv8 module 13
Hacking web applications CEHv8 module 13Hacking web applications CEHv8 module 13
Hacking web applications CEHv8 module 13
 
Ceh v8 labs module 11 session hijacking
Ceh v8 labs module 11 session hijackingCeh v8 labs module 11 session hijacking
Ceh v8 labs module 11 session hijacking
 
Supervising management board culture, by Kroese brands & behaviour
Supervising management board culture, by Kroese brands & behaviourSupervising management board culture, by Kroese brands & behaviour
Supervising management board culture, by Kroese brands & behaviour
 
Research and Development in Roof-Top Solar Potentiality Using LiDAR Technology
Research and Development in Roof-Top Solar Potentiality Using LiDAR TechnologyResearch and Development in Roof-Top Solar Potentiality Using LiDAR Technology
Research and Development in Roof-Top Solar Potentiality Using LiDAR Technology
 
ISTE 2012 - Digital Citizenship and MyBigCampus
ISTE 2012 - Digital Citizenship and MyBigCampusISTE 2012 - Digital Citizenship and MyBigCampus
ISTE 2012 - Digital Citizenship and MyBigCampus
 
Kostogryzov-for china-2013
 Kostogryzov-for china-2013 Kostogryzov-for china-2013
Kostogryzov-for china-2013
 
Maurizio_Taffone_Emerging_Security_Threats
Maurizio_Taffone_Emerging_Security_ThreatsMaurizio_Taffone_Emerging_Security_Threats
Maurizio_Taffone_Emerging_Security_Threats
 
A Deep Dive into the Socio-Technical Aspects of Delays in Security Patching
A Deep Dive into the Socio-Technical Aspects of Delays in Security PatchingA Deep Dive into the Socio-Technical Aspects of Delays in Security Patching
A Deep Dive into the Socio-Technical Aspects of Delays in Security Patching
 
Mixing it up: Developing and implementing a tagging system for a content-rich...
Mixing it up: Developing and implementing a tagging system for a content-rich...Mixing it up: Developing and implementing a tagging system for a content-rich...
Mixing it up: Developing and implementing a tagging system for a content-rich...
 
Skyals Manifest Your Dreams
Skyals Manifest Your DreamsSkyals Manifest Your Dreams
Skyals Manifest Your Dreams
 
Introduction to Energy Efficiency, EMS and Energy Audit
Introduction to Energy Efficiency, EMS and Energy AuditIntroduction to Energy Efficiency, EMS and Energy Audit
Introduction to Energy Efficiency, EMS and Energy Audit
 
Patient Diary by Abhinandan Sandhu
Patient Diary by Abhinandan SandhuPatient Diary by Abhinandan Sandhu
Patient Diary by Abhinandan Sandhu
 
HOW TO TOKENIZE: PROCESS, POSSIBILITIES AND CHALLENGES
HOW TO TOKENIZE: PROCESS, POSSIBILITIES AND CHALLENGESHOW TO TOKENIZE: PROCESS, POSSIBILITIES AND CHALLENGES
HOW TO TOKENIZE: PROCESS, POSSIBILITIES AND CHALLENGES
 
Immigration Compliance: How to keep the Government from knocking on the Door?
Immigration Compliance: How to keep the Government from knocking on the Door?Immigration Compliance: How to keep the Government from knocking on the Door?
Immigration Compliance: How to keep the Government from knocking on the Door?
 

Recently uploaded

Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Recently uploaded (20)

Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

EC-312 Ethical Hacking Lab Manual

  • 2. Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker EC-Council C o p y rig h t © 2 0 1 3 b y E C - C o u 11cil. A ll rights reserved. E x c e p t as p e rm itte d u n d e r th e C o p y rig h t A c t o f 1976, n o p a rt o f this p u b lic a tio n m a y be re p ro d u c e d o r d is trib u te d o r stored 111 111 a n y fo r m o r b y a n y m eans, a database o r re trie v a l system , w ith o u t th e p r io r w r itte n p e rm is s io n o f th e p u b lis h e r, w ith th e e x c e p tio n th a t th e p ro g ra m listings m a y be e n te re d , sto red , an d execu ted 111 a c o m p u te r system , b u t th e y m a y n o t be re p ro d u c e d fo r p u b lic a tio n . In fo r m a tio n has b een o b ta in e d b y E C - C o u n c il fr o m sources b e lie v e d to be reliab le. E C -C o u n c il uses reasonable en deavo rs to ensure th a t th e c o n te n t is c u rre n t an d accurate, h o w e v e r, because o f th e p o ss ib ility o t h u m a n o r m e c h a n ic a l e rro r w e d o n o t g uarantee th e accuracy, adequacy, o r co m p leten ess o t an y in fo rm a tio n and are n o t resp o nsib le fo r an y e rrors o r om issions o r the accuracy o f th e results o b ta in e d fr o m use o f such in fo rm a tio n . T h e co ursew are is a resu lt o f extensive research an d c o n trib u tio n s fr o m subject m a tte r experts fr o m th e fie ld fr o m all o v e r the w o rld . D u e credits fo r all such c o n trib u tio n s and references are g iv e n in th e co ursew are in th e research en d n o tes. W e are c o m m itte d to w a rd s p ro te c tin g in te lle c m a l p ro p e rty . I t y o u are a c o p y rig h t o w n e r (an exclusive licensee o r th e ir a g ent), an d i f y o u believe th a t an y p a rt o f the co ursew are co nstitu tes an in frin g e m e n t o f c o p y rig h t, o r a b reach o f an agreed licence o r c o n tra c t, y o u m a y n o tiiy us at le g a l@ e c c o u n c il.o rg . E C -C o u n c il w ill re m o v e th e m a te ria l 111 111 th e e v e n t o f a ju s tifie d c o m p la in t, q u e s tio n an d m a k e necessary re c tific a tio n s . T h e co ursew are m a y c o n ta in referen ces to o th e r in fo rm a tio n resources an d security so lu tion s, b u t such referen ces sh ould n o t be co n sid ered as an e n d o rs e m e n t o f 01‫ ־‬re c o m m e n d a tio n b y E C -C o u n c il. R eaders an d to are en cou rag ed to re p o rt errors, om issions inaccuracies at le g a l@ e c c o u n c il.o rg . I f y o u h ave an y issues, please co n ta c t s u p p o rt@ e c c o u n c il.o rg . Ethical Hacking and Countermeasures All Rights Reserved. Reproduc E C -C o u n c il
  • 3. Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker T a b l e of C o n t e n t s M odule N tim b er M odule N am e Page N o . 01 In tro d u ctio n to E th ic a l H a ck in g — 02 Fo o tp rin tin g and Reconnaissance 01 03 Scann ing N etw orks 84 04 En u m eratio n 266 05 System H ack in g 307 06 T ro jan s and Backdoors 424 07 V iruses and W orm s 529 08 Sn iffin g 584 09 So cial En g in e e rin g 674 10 D e n ia l o f Service 702 11 Session H ija ck in g 715 12 H a ck in g W ebservers 730 13 H ack in g W eb A p p licatio n s 761 14 S Q L In je ctio n 781 15 H a ck in g W ireless N etw orks 818 16 H a ck in g M o b ile Platform s — 17 E va d in g ID S , Fire w a lls, and H oneypots 846 18 B u ffe r O verflow 901 19 C ryptography 914 20 Pen etratio n T estin g — Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 4. Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker L a b s D V D DVD C o n t e n t s C o n te n ts 01 Lab Prerequisites, Module 02 - Module 04 02 Module 05 - Module 07 03 Module 08 - Module 11 04 Module 12 - Module 14 05 Module 15 - Module 17 06 Module 18 - M odule 20, BackTrack Ethical Hacking and Countermeasures Copyright © by EC-C0UIICil All Rights Reserved. Reproduction is Strictly Prohibited.