SlideShare a Scribd company logo
Domain 4 of CEH V11: Network and
Perimeter Hacking
www.infosectrain.com | sales@infosectrain.com
www.infosectrain.com | sales@infosectrain.com
www.infosectrain.com | sales@infosectrain.com
Domains of CEH
1.Information Security and Ethical Hacking Overview-6%
2.Reconnaissance Techniques-21%
3.System hacking phases and Attack Techniques-17%
4.Network and perimeter hacking-14%
5.Web application hacking-16%
6.Wireless network hacking-6%
7.Mobile platform, IoT, and OT hacking-8%
8.Cloud Computing-6%
9.Cryptography-6%
www.infosectrain.com | sales@infosectrain.com
www.infosectrain.com | sales@infosectrain.com
We will discuss the fourth domain of CEH, which is โ€˜Network and perimeter
hackingโ€™.
Network
Networks are composed of two or more computers that share resources
(such as printers and CDs), exchange files, and allow electronic
communications. A network of computers may be connected by cables,
telephone lines, radio waves, satellites, or infrared beams.
In simple terms, a network is a cluster of devices connected to each other by
a physical communication medium.
What is network hacking?
As I have mentioned above, a network is a collection of devices. Hence,
network hacking is nothing but gaining access to the information present on
all network devices over the internet.
www.infosectrain.com | sales@infosectrain.com
How are networks compromised?
As every big plan starts with a simple step, likewise, large-scale cyber attacks also start
by attacking or infecting a lower-end device and increasing the level of privileges
required to go forward inside the same network. While attacking the networks, ethical
hackers will have to think exactly like malicious hackers. Only then the organizations
can have a clear idea of their security vulnerabilities.
Attackers first start with the traditional methods. One of the most common traditional
methods is sending a false email. An attacker usually creates an incorrect email by
replicating it like an original one. For example, an attacker can create an Amazon Big
Billion day email asking you to click the links to get the 50% offer. Once you click on the
link, youโ€™ll be redirected to a malicious webpage from where an attacker can install the
viruses on your networkโ€™s device.
Once the attacker enters your network, he will start escalating his privileges to the
administrator level because they are the ones who maintain the whole network.
In simple terms, privilege escalation can be described as exploiting a bug or
vulnerability in an application or operating system to gain access to resources that
would otherwise be protected from an average user.
www.infosectrain.com | sales@infosectrain.com
Tools used for network perimeter hacking
ARP Scan: ARP-Scan is used to scan internal networks. Compared to
netdiscover arp-scanning, it is much faster. With the assistance of the
ARP Scan tool, you can collect data about the internal networks in a
noisy way. By noisy, I mean that the tool will be caught by the IDS and
IPS sensors and leave traces behind.
The four general ARP Scan usage scenarios are:
1.We can identify all the IPv4 network devices.
2.We can identify the false IP addresses.
3.We can easily identify and map IP addresses to MAC addresses.
4.We can locate and isolate malicious devices.
www.infosectrain.com | sales@infosectrain.com
PivotSuite: With PivotSuite, penetration testers and red teams can move
around inside a network by using compromised systems. It is portable,
platform-independent, and powerful. It is a stand-alone application that
can be used as a client or a server.
Nmap: Nmap is a port scanner. Port scanning is a phase where hackers scan
the target system for data like live systems, open ports, and different
services running over the host.
In addition to port scanning, Nmap can identify various operating systems,
version numbers of services running, firewall configuration, and many
more features.
www.infosectrain.com | sales@infosectrain.com
Network attack techniques
Spoofing: In network security, a spoofing attack is a scenario in which an
individual successfully pretends as another data source, thereby gaining an
illegitimate advantage.
For example, an attacker can buy advertising space on any site and can
post some exciting advertisements that attract users to click on them. And
if the user clicks on that advertisement, he will be redirected to a malicious
page from where an attacker can install the viruses into the userโ€™s system.
Sniffing: An attacker can capture data while it is cycling across an insecure
network by using packet sniffing. Data on travel is generally captured by
sniffer software running on any network layer. Putting the sniffer at an
aggregation point would allow it to observe the entire traffic.
www.infosectrain.com | sales@infosectrain.com
Phishing: While the spelling is Phishing, we utter it as fishing. They
are not just phonetic but also somewhat comparable, since we use
a worm to capture a fish known as fishing. On the contrary, an
attacker can email, send a message, a web link, or a voice call to
seek our private data called โ€œphishing.โ€
The main aim of phishing attackers is to steal your sensitive and
personal data like login credentials, credit card information, etc.
They may also try to install malware on your system.
www.infosectrain.com | sales@infosectrain.com
CEH with InfosecTrain
InfosecTrain is one of the leading training providers with a pocket-friendly
budget. We invite you to join us for an unforgettable journey with industry
experts to gain a better understanding of the Certified Ethical Hacker
course. Courses can be taken as live instructor-led sessions or as self-paced
courses, allowing you to complete your training journey at your convenience.
About InfosecTrain
โ€ข Established in 2016, we are one of the finest
Security and Technology Training and
Consulting company
โ€ข Wide range of professional training programs,
certifications & consulting services in the IT
and Cyber Security domain
โ€ข High-quality technical services, certifications
or customized training programs curated with
professionals of over 15 years of combined
experience in the domain
www.infosectrain.com | sales@infosectrain.com
Our Endorsements
www.infosectrain.com | sales@infosectrain.com
Why InfosecTrain Global Learning Partners
Flexible modes
of Training
Tailor Made
Training
Post training
completion
Certified and
Experienced Instructors
Access to the
recorded
sessions
www.infosectrain.com | sales@infosectrain.com
Our Trusted Clients
www.infosectrain.com | sales@infosectrain.com
Contact us
Get your workforce reskilled
by our certified and
experienced instructors!
IND: 1800-843-7890 (Toll Free) / US: +1 657-221-1127 /
UK : +44 7451 208413
sales@infosectrain.com
www.infosectrain.com

More Related Content

Similar to Domain 4 of CEH V11 Network and Perimeter Hacking.pptx

M1_Introduction_IPS.pptx
M1_Introduction_IPS.pptxM1_Introduction_IPS.pptx
M1_Introduction_IPS.pptx
imanuelantoniussohir
ย 
Domain 1 of CEH v11 Information Security and Ethical Hacking.pptx
Domain 1 of CEH v11  Information Security and Ethical Hacking.pptxDomain 1 of CEH v11  Information Security and Ethical Hacking.pptx
Domain 1 of CEH v11 Information Security and Ethical Hacking.pptx
Infosectrain3
ย 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
Sripati Mahapatra
ย 
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
ShivamSharma909
ย 
Top Interview Questions for CompTIA Security +
Top Interview Questions for CompTIA Security +Top Interview Questions for CompTIA Security +
Top Interview Questions for CompTIA Security +
infosec train
ย 
CompTIA Security+
CompTIA Security+CompTIA Security+
CompTIA Security+
Infosec Train
ย 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
dpd
ย 
Top 13 hacking software for beginners.pdf
Top 13 hacking software for beginners.pdfTop 13 hacking software for beginners.pdf
Top 13 hacking software for beginners.pdf
Dipak Tiwari
ย 
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
SuhailShaik16
ย 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
Aaron White
ย 
E commerce security 4
E commerce security 4E commerce security 4
E commerce security 4
Anne ndolo
ย 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
MuhammadRehan856177
ย 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
MuhammadRehan856177
ย 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
Shivam Sahu
ย 
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxDomain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Infosectrain3
ย 
Top 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdfTop 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdf
infosec train
ย 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
Q Fadlan
ย 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
belsis
ย 
Types-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdfTypes-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdf
ANUSREEASHOK5
ย 
Ethical hacking-guide-infosec
Ethical hacking-guide-infosecEthical hacking-guide-infosec
Ethical hacking-guide-infosec
Erfan Mallick
ย 

Similar to Domain 4 of CEH V11 Network and Perimeter Hacking.pptx (20)

M1_Introduction_IPS.pptx
M1_Introduction_IPS.pptxM1_Introduction_IPS.pptx
M1_Introduction_IPS.pptx
ย 
Domain 1 of CEH v11 Information Security and Ethical Hacking.pptx
Domain 1 of CEH v11  Information Security and Ethical Hacking.pptxDomain 1 of CEH v11  Information Security and Ethical Hacking.pptx
Domain 1 of CEH v11 Information Security and Ethical Hacking.pptx
ย 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
ย 
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
ย 
Top Interview Questions for CompTIA Security +
Top Interview Questions for CompTIA Security +Top Interview Questions for CompTIA Security +
Top Interview Questions for CompTIA Security +
ย 
CompTIA Security+
CompTIA Security+CompTIA Security+
CompTIA Security+
ย 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
ย 
Top 13 hacking software for beginners.pdf
Top 13 hacking software for beginners.pdfTop 13 hacking software for beginners.pdf
Top 13 hacking software for beginners.pdf
ย 
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
ย 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
ย 
E commerce security 4
E commerce security 4E commerce security 4
E commerce security 4
ย 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
ย 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
ย 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
ย 
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxDomain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
ย 
Top 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdfTop 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdf
ย 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
ย 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
ย 
Types-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdfTypes-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdf
ย 
Ethical hacking-guide-infosec
Ethical hacking-guide-infosecEthical hacking-guide-infosec
Ethical hacking-guide-infosec
ย 

More from Infosectrain3

Turning off Autofill.pdf
Turning off Autofill.pdfTurning off Autofill.pdf
Turning off Autofill.pdf
Infosectrain3
ย 
Targeted Ransomware.pdf
Targeted Ransomware.pdfTargeted Ransomware.pdf
Targeted Ransomware.pdf
Infosectrain3
ย 
Exploring-Biometrics-Security-&-Privacy-Concerns (1).pdf
Exploring-Biometrics-Security-&-Privacy-Concerns (1).pdfExploring-Biometrics-Security-&-Privacy-Concerns (1).pdf
Exploring-Biometrics-Security-&-Privacy-Concerns (1).pdf
Infosectrain3
ย 
LoT & 5G Threats Unveiled1.pdf
LoT & 5G Threats Unveiled1.pdfLoT & 5G Threats Unveiled1.pdf
LoT & 5G Threats Unveiled1.pdf
Infosectrain3
ย 
Security tips for Travelers.pdf
Security tips for Travelers.pdfSecurity tips for Travelers.pdf
Security tips for Travelers.pdf
Infosectrain3
ย 
Threat Intelligence vs. Threat Assessment vs. Threat Modeling (1).pdf
Threat Intelligence vs. Threat Assessment vs. Threat Modeling (1).pdfThreat Intelligence vs. Threat Assessment vs. Threat Modeling (1).pdf
Threat Intelligence vs. Threat Assessment vs. Threat Modeling (1).pdf
Infosectrain3
ย 
SOC 2 Type 2 Checklist - Part 1 - V2.pdf
SOC 2 Type 2 Checklist - Part 1 - V2.pdfSOC 2 Type 2 Checklist - Part 1 - V2.pdf
SOC 2 Type 2 Checklist - Part 1 - V2.pdf
Infosectrain3
ย 
The Cyber Villains.pdf
The Cyber Villains.pdfThe Cyber Villains.pdf
The Cyber Villains.pdf
Infosectrain3
ย 
Types of Servers in Computing.pdf
Types of Servers in Computing.pdfTypes of Servers in Computing.pdf
Types of Servers in Computing.pdf
Infosectrain3
ย 
Types of Web Application Firewalls (1).pdf
Types of Web Application Firewalls (1).pdfTypes of Web Application Firewalls (1).pdf
Types of Web Application Firewalls (1).pdf
Infosectrain3
ย 
Google's AI Red Team.pdf
Google's AI Red Team.pdfGoogle's AI Red Team.pdf
Google's AI Red Team.pdf
Infosectrain3
ย 
A to Z Guide Data Privacy in Operational Technology.pdf
A to Z Guide Data Privacy in Operational Technology.pdfA to Z Guide Data Privacy in Operational Technology.pdf
A to Z Guide Data Privacy in Operational Technology.pdf
Infosectrain3
ย 
IOT and Security.pptx
IOT and Security.pptxIOT and Security.pptx
IOT and Security.pptx
Infosectrain3
ย 
Interview Questions for Microsoft Azure Architect Technologies AZ-303.pptx
Interview Questions for Microsoft Azure Architect Technologies AZ-303.pptxInterview Questions for Microsoft Azure Architect Technologies AZ-303.pptx
Interview Questions for Microsoft Azure Architect Technologies AZ-303.pptx
Infosectrain3
ย 
Interview Questions for Microsoft Azure Architect Design AZ-304.pptx
Interview Questions for Microsoft Azure Architect Design AZ-304.pptxInterview Questions for Microsoft Azure Architect Design AZ-304.pptx
Interview Questions for Microsoft Azure Architect Design AZ-304.pptx
Infosectrain3
ย 
IBM QRadarโ€™s DomainTools Application.pptx
IBM QRadarโ€™s DomainTools Application.pptxIBM QRadarโ€™s DomainTools Application.pptx
IBM QRadarโ€™s DomainTools Application.pptx
Infosectrain3
ย 
How to become a SOC Analyst and build a dream career with it.pptx
How to become a SOC Analyst and build a dream career with it.pptxHow to become a SOC Analyst and build a dream career with it.pptx
How to become a SOC Analyst and build a dream career with it.pptx
Infosectrain3
ย 
How to Analyze Data (1).pptx
How to Analyze Data (1).pptxHow to Analyze Data (1).pptx
How to Analyze Data (1).pptx
Infosectrain3
ย 
How DNS Works.pptx
How DNS Works.pptxHow DNS Works.pptx
How DNS Works.pptx
Infosectrain3
ย 
Frequently Asked Questions in the AWS Security Interview.pptx
Frequently Asked Questions in the AWS Security Interview.pptxFrequently Asked Questions in the AWS Security Interview.pptx
Frequently Asked Questions in the AWS Security Interview.pptx
Infosectrain3
ย 

More from Infosectrain3 (20)

Turning off Autofill.pdf
Turning off Autofill.pdfTurning off Autofill.pdf
Turning off Autofill.pdf
ย 
Targeted Ransomware.pdf
Targeted Ransomware.pdfTargeted Ransomware.pdf
Targeted Ransomware.pdf
ย 
Exploring-Biometrics-Security-&-Privacy-Concerns (1).pdf
Exploring-Biometrics-Security-&-Privacy-Concerns (1).pdfExploring-Biometrics-Security-&-Privacy-Concerns (1).pdf
Exploring-Biometrics-Security-&-Privacy-Concerns (1).pdf
ย 
LoT & 5G Threats Unveiled1.pdf
LoT & 5G Threats Unveiled1.pdfLoT & 5G Threats Unveiled1.pdf
LoT & 5G Threats Unveiled1.pdf
ย 
Security tips for Travelers.pdf
Security tips for Travelers.pdfSecurity tips for Travelers.pdf
Security tips for Travelers.pdf
ย 
Threat Intelligence vs. Threat Assessment vs. Threat Modeling (1).pdf
Threat Intelligence vs. Threat Assessment vs. Threat Modeling (1).pdfThreat Intelligence vs. Threat Assessment vs. Threat Modeling (1).pdf
Threat Intelligence vs. Threat Assessment vs. Threat Modeling (1).pdf
ย 
SOC 2 Type 2 Checklist - Part 1 - V2.pdf
SOC 2 Type 2 Checklist - Part 1 - V2.pdfSOC 2 Type 2 Checklist - Part 1 - V2.pdf
SOC 2 Type 2 Checklist - Part 1 - V2.pdf
ย 
The Cyber Villains.pdf
The Cyber Villains.pdfThe Cyber Villains.pdf
The Cyber Villains.pdf
ย 
Types of Servers in Computing.pdf
Types of Servers in Computing.pdfTypes of Servers in Computing.pdf
Types of Servers in Computing.pdf
ย 
Types of Web Application Firewalls (1).pdf
Types of Web Application Firewalls (1).pdfTypes of Web Application Firewalls (1).pdf
Types of Web Application Firewalls (1).pdf
ย 
Google's AI Red Team.pdf
Google's AI Red Team.pdfGoogle's AI Red Team.pdf
Google's AI Red Team.pdf
ย 
A to Z Guide Data Privacy in Operational Technology.pdf
A to Z Guide Data Privacy in Operational Technology.pdfA to Z Guide Data Privacy in Operational Technology.pdf
A to Z Guide Data Privacy in Operational Technology.pdf
ย 
IOT and Security.pptx
IOT and Security.pptxIOT and Security.pptx
IOT and Security.pptx
ย 
Interview Questions for Microsoft Azure Architect Technologies AZ-303.pptx
Interview Questions for Microsoft Azure Architect Technologies AZ-303.pptxInterview Questions for Microsoft Azure Architect Technologies AZ-303.pptx
Interview Questions for Microsoft Azure Architect Technologies AZ-303.pptx
ย 
Interview Questions for Microsoft Azure Architect Design AZ-304.pptx
Interview Questions for Microsoft Azure Architect Design AZ-304.pptxInterview Questions for Microsoft Azure Architect Design AZ-304.pptx
Interview Questions for Microsoft Azure Architect Design AZ-304.pptx
ย 
IBM QRadarโ€™s DomainTools Application.pptx
IBM QRadarโ€™s DomainTools Application.pptxIBM QRadarโ€™s DomainTools Application.pptx
IBM QRadarโ€™s DomainTools Application.pptx
ย 
How to become a SOC Analyst and build a dream career with it.pptx
How to become a SOC Analyst and build a dream career with it.pptxHow to become a SOC Analyst and build a dream career with it.pptx
How to become a SOC Analyst and build a dream career with it.pptx
ย 
How to Analyze Data (1).pptx
How to Analyze Data (1).pptxHow to Analyze Data (1).pptx
How to Analyze Data (1).pptx
ย 
How DNS Works.pptx
How DNS Works.pptxHow DNS Works.pptx
How DNS Works.pptx
ย 
Frequently Asked Questions in the AWS Security Interview.pptx
Frequently Asked Questions in the AWS Security Interview.pptxFrequently Asked Questions in the AWS Security Interview.pptx
Frequently Asked Questions in the AWS Security Interview.pptx
ย 

Recently uploaded

78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
Kalna College
ย 
BPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end examBPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end exam
sonukumargpnirsadhan
ย 
Observational Learning
Observational Learning Observational Learning
Observational Learning
sanamushtaq922
ย 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
ย 
220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science
Kalna College
ย 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
heathfieldcps1
ย 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
Kalna College
ย 
Ch-4 Forest Society and colonialism 2.pdf
Ch-4 Forest Society and colonialism 2.pdfCh-4 Forest Society and colonialism 2.pdf
Ch-4 Forest Society and colonialism 2.pdf
lakshayrojroj
ย 
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
220711130100 udita Chakraborty  Aims and objectives of national policy on inf...220711130100 udita Chakraborty  Aims and objectives of national policy on inf...
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
Kalna College
ย 
CHUYรŠN ฤแป€ ร”N TแบฌP Vร€ PHรT TRIแป‚N Cร‚U HแปŽI TRONG ฤแป€ MINH HแปŒA THI TแปT NGHIแป†P THPT ...
CHUYรŠN ฤแป€ ร”N TแบฌP Vร€ PHรT TRIแป‚N Cร‚U HแปŽI TRONG ฤแป€ MINH HแปŒA THI TแปT NGHIแป†P THPT ...CHUYรŠN ฤแป€ ร”N TแบฌP Vร€ PHรT TRIแป‚N Cร‚U HแปŽI TRONG ฤแป€ MINH HแปŒA THI TแปT NGHIแป†P THPT ...
CHUYรŠN ฤแป€ ร”N TแบฌP Vร€ PHรT TRIแป‚N Cร‚U HแปŽI TRONG ฤแป€ MINH HแปŒA THI TแปT NGHIแป†P THPT ...
Nguyen Thanh Tu Collection
ย 
Information and Communication Technology in Education
Information and Communication Technology in EducationInformation and Communication Technology in Education
Information and Communication Technology in Education
MJDuyan
ย 
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapitolTechU
ย 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
nitinpv4ai
ย 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
zuzanka
ย 
Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH LแปšP 8 - Cแบข Nฤ‚M - FRIENDS PLUS - Nฤ‚M HแปŒC 2023-2024 (B...
Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH LแปšP 8 - Cแบข Nฤ‚M - FRIENDS PLUS - Nฤ‚M HแปŒC 2023-2024 (B...Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH LแปšP 8 - Cแบข Nฤ‚M - FRIENDS PLUS - Nฤ‚M HแปŒC 2023-2024 (B...
Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH LแปšP 8 - Cแบข Nฤ‚M - FRIENDS PLUS - Nฤ‚M HแปŒC 2023-2024 (B...
Nguyen Thanh Tu Collection
ย 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Henry Hollis
ย 
How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17
Celine George
ย 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
ย 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
Prof. Dr. K. Adisesha
ย 
220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx
Kalna College
ย 

Recently uploaded (20)

78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
ย 
BPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end examBPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end exam
ย 
Observational Learning
Observational Learning Observational Learning
Observational Learning
ย 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
ย 
220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science
ย 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
ย 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
ย 
Ch-4 Forest Society and colonialism 2.pdf
Ch-4 Forest Society and colonialism 2.pdfCh-4 Forest Society and colonialism 2.pdf
Ch-4 Forest Society and colonialism 2.pdf
ย 
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
220711130100 udita Chakraborty  Aims and objectives of national policy on inf...220711130100 udita Chakraborty  Aims and objectives of national policy on inf...
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
ย 
CHUYรŠN ฤแป€ ร”N TแบฌP Vร€ PHรT TRIแป‚N Cร‚U HแปŽI TRONG ฤแป€ MINH HแปŒA THI TแปT NGHIแป†P THPT ...
CHUYรŠN ฤแป€ ร”N TแบฌP Vร€ PHรT TRIแป‚N Cร‚U HแปŽI TRONG ฤแป€ MINH HแปŒA THI TแปT NGHIแป†P THPT ...CHUYรŠN ฤแป€ ร”N TแบฌP Vร€ PHรT TRIแป‚N Cร‚U HแปŽI TRONG ฤแป€ MINH HแปŒA THI TแปT NGHIแป†P THPT ...
CHUYรŠN ฤแป€ ร”N TแบฌP Vร€ PHรT TRIแป‚N Cร‚U HแปŽI TRONG ฤแป€ MINH HแปŒA THI TแปT NGHIแป†P THPT ...
ย 
Information and Communication Technology in Education
Information and Communication Technology in EducationInformation and Communication Technology in Education
Information and Communication Technology in Education
ย 
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
ย 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
ย 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
ย 
Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH LแปšP 8 - Cแบข Nฤ‚M - FRIENDS PLUS - Nฤ‚M HแปŒC 2023-2024 (B...
Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH LแปšP 8 - Cแบข Nฤ‚M - FRIENDS PLUS - Nฤ‚M HแปŒC 2023-2024 (B...Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH LแปšP 8 - Cแบข Nฤ‚M - FRIENDS PLUS - Nฤ‚M HแปŒC 2023-2024 (B...
Bร€I TแบฌP Bแป” TRแปข TIแบพNG ANH LแปšP 8 - Cแบข Nฤ‚M - FRIENDS PLUS - Nฤ‚M HแปŒC 2023-2024 (B...
ย 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
ย 
How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17
ย 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
ย 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
ย 
220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx
ย 

Domain 4 of CEH V11 Network and Perimeter Hacking.pptx

  • 1. Domain 4 of CEH V11: Network and Perimeter Hacking www.infosectrain.com | sales@infosectrain.com
  • 3. www.infosectrain.com | sales@infosectrain.com Domains of CEH 1.Information Security and Ethical Hacking Overview-6% 2.Reconnaissance Techniques-21% 3.System hacking phases and Attack Techniques-17% 4.Network and perimeter hacking-14% 5.Web application hacking-16% 6.Wireless network hacking-6% 7.Mobile platform, IoT, and OT hacking-8% 8.Cloud Computing-6% 9.Cryptography-6%
  • 5. www.infosectrain.com | sales@infosectrain.com We will discuss the fourth domain of CEH, which is โ€˜Network and perimeter hackingโ€™. Network Networks are composed of two or more computers that share resources (such as printers and CDs), exchange files, and allow electronic communications. A network of computers may be connected by cables, telephone lines, radio waves, satellites, or infrared beams. In simple terms, a network is a cluster of devices connected to each other by a physical communication medium. What is network hacking? As I have mentioned above, a network is a collection of devices. Hence, network hacking is nothing but gaining access to the information present on all network devices over the internet.
  • 6. www.infosectrain.com | sales@infosectrain.com How are networks compromised? As every big plan starts with a simple step, likewise, large-scale cyber attacks also start by attacking or infecting a lower-end device and increasing the level of privileges required to go forward inside the same network. While attacking the networks, ethical hackers will have to think exactly like malicious hackers. Only then the organizations can have a clear idea of their security vulnerabilities. Attackers first start with the traditional methods. One of the most common traditional methods is sending a false email. An attacker usually creates an incorrect email by replicating it like an original one. For example, an attacker can create an Amazon Big Billion day email asking you to click the links to get the 50% offer. Once you click on the link, youโ€™ll be redirected to a malicious webpage from where an attacker can install the viruses on your networkโ€™s device. Once the attacker enters your network, he will start escalating his privileges to the administrator level because they are the ones who maintain the whole network. In simple terms, privilege escalation can be described as exploiting a bug or vulnerability in an application or operating system to gain access to resources that would otherwise be protected from an average user.
  • 7. www.infosectrain.com | sales@infosectrain.com Tools used for network perimeter hacking ARP Scan: ARP-Scan is used to scan internal networks. Compared to netdiscover arp-scanning, it is much faster. With the assistance of the ARP Scan tool, you can collect data about the internal networks in a noisy way. By noisy, I mean that the tool will be caught by the IDS and IPS sensors and leave traces behind. The four general ARP Scan usage scenarios are: 1.We can identify all the IPv4 network devices. 2.We can identify the false IP addresses. 3.We can easily identify and map IP addresses to MAC addresses. 4.We can locate and isolate malicious devices.
  • 8. www.infosectrain.com | sales@infosectrain.com PivotSuite: With PivotSuite, penetration testers and red teams can move around inside a network by using compromised systems. It is portable, platform-independent, and powerful. It is a stand-alone application that can be used as a client or a server. Nmap: Nmap is a port scanner. Port scanning is a phase where hackers scan the target system for data like live systems, open ports, and different services running over the host. In addition to port scanning, Nmap can identify various operating systems, version numbers of services running, firewall configuration, and many more features.
  • 9. www.infosectrain.com | sales@infosectrain.com Network attack techniques Spoofing: In network security, a spoofing attack is a scenario in which an individual successfully pretends as another data source, thereby gaining an illegitimate advantage. For example, an attacker can buy advertising space on any site and can post some exciting advertisements that attract users to click on them. And if the user clicks on that advertisement, he will be redirected to a malicious page from where an attacker can install the viruses into the userโ€™s system. Sniffing: An attacker can capture data while it is cycling across an insecure network by using packet sniffing. Data on travel is generally captured by sniffer software running on any network layer. Putting the sniffer at an aggregation point would allow it to observe the entire traffic.
  • 10. www.infosectrain.com | sales@infosectrain.com Phishing: While the spelling is Phishing, we utter it as fishing. They are not just phonetic but also somewhat comparable, since we use a worm to capture a fish known as fishing. On the contrary, an attacker can email, send a message, a web link, or a voice call to seek our private data called โ€œphishing.โ€ The main aim of phishing attackers is to steal your sensitive and personal data like login credentials, credit card information, etc. They may also try to install malware on your system.
  • 11. www.infosectrain.com | sales@infosectrain.com CEH with InfosecTrain InfosecTrain is one of the leading training providers with a pocket-friendly budget. We invite you to join us for an unforgettable journey with industry experts to gain a better understanding of the Certified Ethical Hacker course. Courses can be taken as live instructor-led sessions or as self-paced courses, allowing you to complete your training journey at your convenience.
  • 12. About InfosecTrain โ€ข Established in 2016, we are one of the finest Security and Technology Training and Consulting company โ€ข Wide range of professional training programs, certifications & consulting services in the IT and Cyber Security domain โ€ข High-quality technical services, certifications or customized training programs curated with professionals of over 15 years of combined experience in the domain www.infosectrain.com | sales@infosectrain.com
  • 13. Our Endorsements www.infosectrain.com | sales@infosectrain.com
  • 14. Why InfosecTrain Global Learning Partners Flexible modes of Training Tailor Made Training Post training completion Certified and Experienced Instructors Access to the recorded sessions www.infosectrain.com | sales@infosectrain.com
  • 15. Our Trusted Clients www.infosectrain.com | sales@infosectrain.com
  • 16.
  • 17. Contact us Get your workforce reskilled by our certified and experienced instructors! IND: 1800-843-7890 (Toll Free) / US: +1 657-221-1127 / UK : +44 7451 208413 sales@infosectrain.com www.infosectrain.com