You are on page 1of 26

E thical H acking and C o u n te rm e a su re s W e lc o m e t o C e rtifie d E th ica l H a cke r Class

Exam 3 1 2 -5 0 C e rtifie d E th ica l H acker

T A W c D 0 lU n
w w w .ta k e d o w n c o n .c o m
T A K E D 0 1 U I1 is a h a c k in g c o n fe re n c e th a t w a s co n c e iv e d by o u r m e m b e rs !

EC -C ouncil h a s b e e n flo o d e d w ith re q u e s ts to ta k e o u r w o rld -c la s s c o u rs e s o n th e ro a d ! W e have a n s w e re d th e c a ll a n d c re a te d T a keD ow nC on! T h is c o n fe re n c e w ill be fo c u s e d on th e le a rn e r a n d w ill fe a tu re s e v e ra l C e rtific a tio n & C e rtific a te T ra in in g c o u rs e s fo r A d va n ce d P ra c titio n e rs ! T TAKEDC A K O O U JH w ill h o s t E C -C ouncil's s o u g h t a fte r H a ckin g , F o ren sics a n d Pen T est c o u rs e s ,

C e rtifie d W ire le s s S e c u rity P ro fe ssio n a l, a n d s e v e ra l h ig h ly te c h n ic a l a n d a d v a n c e d w o rk s h o p s w h ic h w ill c o v e r c u r re n t a n d im p o rta n t s e c u rity to p ic s s u c h a s a d v a n c e d p e n e tra tio n te s tin g , c ry p to g ra p h y , n e tw o rk d e fe n s e , a p p lic a tio n s e c u rity a n d m o b ile fo re n s ic s . A t T A K C D O llin th e le a rn in g d o e s n 't s to p w h e n th e tra in in g e n d s l

W e h a ve lin e d up a lis t o f s o u g h t a fte r in d u s try p ra c titio n e rs a n d s u b je c t m a tte r e x p e rts th a t w ill p re s e n t re le v a n t a n d im p le m e n ta b le to p ic s !

For more information, about TAKEDOllin

please visitit w w w .ta k e d o w n c o n .c o m

&j 11^:jp_ _

*.\

H acker H alted
w w w .h a c k e rh a lte d .c o m

S ince 2 0 0 4 EC-Council ha s ho ste d 2 0 H acker H alted e ve n ts a cro ss fo u r c o n tin e n ts and in c itie s s u c h as M y rtle B each, M ia m i, D ubai, S ingap ore , H ong Kong, M exico City, Tokyo, K uala Lum pur, G uangzhou, Taiper a n d Cairo. H acker H alted N o rth A m erica w ill be held in M ia m i fo r th e 3 rd ye a r in a row an d ba sed on p a s t h is to ry is su re to b o a st an a m a z in g tu rn o u t o f In fo rm a tio n S e cu rity P rofe ssionals! H acker H alted is m o re th a n ju s t a c o n fe re n c e eve nt; p ra c titio n e rs tra v e l fro m all over th e w orld to a tte n d o u r w o rld -c la s s tra in in g , ga in p ra c tic a l k n o w le d g e fro m o u r e x p e rt p re s e n te rs and g e t a preview o f th e la te s t te c h n o lo g ie s an d In fo rm a tio n S e c u rity to o ls w h ic h w ill be sh o w ca se d by o u r e x h ib ito rs an d p a rtn e rs .

* I i

For more information, about Hacker Halted please visit

E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t by EC-COUDCil A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .

E thical H acking and C o u n te rm e a su re s W e lc o m e t o C e rtifie d E th ica l H a cke r Class

Exam 3 1 2 -5 0 C e rtifie d E th ica l H acker

V A M P IR E
w w w .v a m p ire te c h .c o m

Is yo u r w ebsite vulne rab ly to an attack? Could hackers e xp lo it a small weakness in you r w ebsite and o b tain access to sensitive com pany info rm atio n? VampireScan allow s users to test th e ir ow n Cloud and W eb ap plication s against advanced attacks and receive actionable results all w ith in th e ir ow n Web portal. O ur easy to use on lin e p o rta l w ill sim ply ask you fo r th e URL o f your w e b application, fro m there, o u r Services d o th e rest. For a lim ite d tim e, VampireTech is offering its Baseline Scan free o f charge to q u alified custom ers. This en titles you to one Free H ealth Check fo r one do m a in u tiliz in g o u r Baseline Scan. This Scan w ill test fo r Cross-site S cripting V ulnerabilities, Non-SSL Passwords, and Password A utoco m plete.

A
r
f c

Global CISO Executive Summit

Be on th e fo re fro n t o f a ne w g lo b a l in itia tiv e w here today's w orld-class leaders in in fo rm a tio n security w ill g a th e r to na vig ate th ro u g h in te rn a tio n a l waters. Join these leaders as th e y fo llo w th e w in d o f change th a t is sw eeping th ro u g h th e IS c o m m u n ity m o tiv a tin g today's in fo rm a tio n guardians to d e velop a new w ay o f th in k in g to ensure success in p ro te c tin g th e ir respective organizations. The goal o f EC-Council's Global CISO Forum is to create an op en p la tfo rm fo r to p in fo rm a tio n security executives to discuss th e ir successes, failures, obstacles, and challenges. The open conversation w ill lead to th e creation o f a c tio n a b le item s th a t can be discussed and ap p lie d to th e organiza tion.
For M o re Inform ation A b o u t CISO Executive S u m m it Please Visit: w w w .e cco u n c il.o rg /re so u rce s/ciso -e xe cu tlv e -su m m it.a sp x

E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t by EC-COUDCil A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .

E thical H acking and C o u n te rm e a su re s W e lc o m e t o C e rtifie d E th ica l H a cke r Class

Exam 3 1 2 -5 0 C e rtifie d E th ica l H acker

H o w to D o w n lo a d M y C E H v 8 E - C o u r s e w a r e a n d A d d itio n a l L a b M a n u a ls ? P le a s e f o l l o w t h e s t e p s b e l o w to d o w n l o a d y o u r C EH v8 e - c o u r s e w a r e a n d a d d i t i o n a l la b m a n u a l.

S t e p 1:
Visit: https://academ ia.eccouncil.org. If you have an account already, skip to Step 4.

S t e p 2:
Click Register and fill out the registration form.

S te p 3:
Using the email you provided in step 2, follow the instructions in the auto-generated email to activate your Academ ia Portal account.

S t e p 4:
Login using your Username and Password.

S t e p 5:
Once successfully logged in, expand the About A cadem ia navigation menu and select

A ccess Code. S t e p 6:
Enter the access code provided to you to redeem access to the CEH V8 e-Courseware and Lab Manuals.

Access Code: XXXXXXXXXXXXXXXX


S te p 8:
Once redeemed, expand the C ourses menu and select iLearn - PDF C oursew are - The resulting page will list your CEH v8 e-Courseware and Lab Manuals.

S u p p o rt:
E-mail support is available from academia(5>eccouncil.org.

S y s te m R e q u ire m e n ts :
Visit https://academ ia.eccouncil.ore/AboutAcadem ia/W hatisiLearn.aspx to view the system requirements.

E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t by EC-C0UIICil A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .

E thical H acking and C o u n te rm e a su re s W e lc o m e t o C e rtifie d E th ica l H a cke r Class

Exam 3 1 2 -5 0 C e rtifie d E th ica l H acker

D o w n lo a d C la s s C e r t if ic a t e o f A t t e n d a n c e

IC -C o u n c il
T H I S IS T O A C K N O W L E D G E T H A T

H A S SUCCESSFULLY C O M P L E T E D A C O U K S E O N

A T A N E C - C O U N C IL A C C R E D IT E D T R A IN IN G

CENTER

I n s tru c to r

D ate

T R A IN IN G C E N T E R :

h ttp ://w w w .e cco u n cil.o rg

E C C011ncil

Please fo llo w the below stated steps to dow nload digital copy (PDF format) of your class certificate of attendance. Step 1: W a it until the class is over (the last of the class). Step 2: Visit http://w w w .eccouncil.org/eval. Step 3: Com plete the course evaluation form (please com plete all the fields in the form correct e-mail address is required). Step 4: Evaluation code is required to subm it the form. See the attached code. Step 5: Submit the form. Step 6: A w eb link will be sent to you to dow nload your PDF copy of the certificate.

C o u r s e E v a l u a t i o n C o d e : ** CEH *

E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t by EC-COIMCil A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .

E t h i c a l C

a c k i n g

a n d

o u n t e r m

e a s u r e s Version 8

E thical H acking and C o u n te rm e a su re s W e lc o m e t o C e rtifie d E th ica l H a cke r Class

Exam 3 1 2 -5 0 C e rtifie d E thical H acker

E C -C o u n c il Copyright 2013 by EC-Council. All rights reserved. Except as permitted under the Copyright Act o f 1976, no part o f this publication may be reproduced or distributed 111 any form or by any means, or stored 111 a database or retrieval system, without the prior written permission o f the publisher, with the exception that the program listings may be entered, stored, and executed 111 a computer system, but they may not be reproduced for publication. Inform ation has been obtained by EC-Council from sources believed to be reliable. EC-Council uses reasonable endeavors to ensure that the content is current and accurate, however, because of the possibility ot human or mechanical error we do not guarantee the accuracy, adequacy, or completeness ot any information and are not responsible for any errors or omissions or the accuracy o f the results obtained from use o f such information. The courseware is a result o f extensive research and contributions from subject matter experts from the field from all over the world. Due credits for all such contributions and references are given in the courseware in the research endnotes. We are committed towards protecting intellectual property. If you are a copyright owner (an exclusive licensee or their agent), and if vou believe that any part o f the courseware constitutes an infringement o f copyright, or a breach o f an agreed licence or contract, you may notify us at legal@ eccouncil.org. 111 the event o f a justified complaint, EC-Council will remove the material 111 question and make necessary rectifications. The courseware may contain references to other information resources and security solutions, but such references should not be considered as an endorsement o f or recommendation by EC-Council. Readers are encouraged at legal@ eccouncil.org. to report errors, omissions and inaccuracies to EC-Council

If vou have any issues, please contact support@ eccouncil.org.

E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t by EC-COUDCil A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .

E thical H acking and C o u n te rm e a su re s W e lc o m e t o C e rtifie d E th ica l H a cke r Class

Exam 3 1 2 -5 0 C e rtifie d E th ica l H acker

F o r e w

o r d

Since you are reading this CEHv8 courseware, you most likely realize the im portance of inform ation systems security. However, we would like to put forth our motive behind compiling a resource such as this one and w hat you can gain from this course. You might find yourself asking w hat sets this course apart from the others out there. The truth is that no single courseware can address all the issues of inform ation security in a detailed manner. M oreover, the rate at which exploits, tools, and m ethods are being discovered by the security c om m un ity makes it difficult for one program to cover all the necessary facets of inform ation security. This doesn't mean that this course is inadequate in any way as we have worked to cover all major dom ains in such a m anner that the reader will be able to appreciate the way security has evolved over tim e as well as gain insight in to the fundam ental workings relevant to each domain. It is a blend of academ ic and practical w isdom supplem ented with tools that the reader can readily access in order to obtain a hands-on experience. The emphasis through out the courseware is on gaining practical know-how, which explains the stress on free and accessible tools. You will read about some of the most widespread attacks seen, the popular tools used by attackers, and how attacks have been carried out using ordinary resources. You may also w ant to know w hat to expect once you have com pleted the course. This coursew are is a resource material. Any penetration tester can tell you that there is no one straight m ethodology or sequence of steps that you can follow w hile auditing a client site. There is no one tem plate that will meet all your needs. Your testing strategy will vary with the client, the basic inform ation about the system or situation, and the resources at your disposal. However, for each stage you choose be it enumeration, firewall, penetration of other dom ains - you will find som ething in this coursew are that you can definitely use. Finally this is not the end! This courseware is to be considered a constant work-in-progress because we will be adding value to this courseware over time. You may find some aspects extrem ely detailed, w hile others may have less detail. W e are constantly asking ourselves if the content helps explain the core point of the lesson, and w e constant calibrate our material with that in mind. W e w ould love to hear your view points and suggestions so please send us your feedback to help in our quest to constantly im prove our courseware.

E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t by EC-COIMCil A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .

T h is

p a g e

is

in te n tio n a lly

le ft b la n k .

E thical H acking and C o u n te rm e a su re s W e lc o m e t o C e rtifie d E th ica l H a cke r Class

Exam 3 1 2 -5 0 C e rtifie d E th ica l H acker

T a b le
M odule N u m b e r 00 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19

o f C o n te n ts
M odule N a m e P ag e N o. I 01 91 262 434 517 827 1006 1112 1292 1402 1503 1600 1723 1986 2134 2392 2549 2691 2782 2872 2976

S tu d en t In tro d u ctio n In tro d u ctio n to E th ical H a c k in g F o o tp rin tin g an d R eco n n aissan ce S can n in g N etw o rk s E n u m e ra tio n System H a c k in g T ro jan s an d B ackdoors V iruses an d W orm s Sniffing Social E n g in e e rin g D en ial o f Service Session H ijack in g H a c k in g W ebservers H a c k in g W eb A pplications SQ L In jectio n H a c k in g W ireless N etw o rk s H a c k in g M obile P latform s E v ad in g ID S, Firew alls, an d H o n ey p o ts Buffer O verflow C ryptography

P en etratio n T e stin g R eferences

E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t by EC-COIMCil A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .

T h is

p a g e

is

in te n tio n a lly

le ft b la n k .

E thical H acking and C o u n te rm e a su re s W e lc o m e t o C e rtifie d E th ica l H a cke r Class

Exam 3 1 2 -5 0 C e rtifie d E th ica l H acker

W e lc o m e to C e r t if ie d E t h ic a l H a c k e r C la s s !
S tu d e n t I n tr o d u c tio n

Engineered by Hackers. Presented by Professionals.

CEH

E th ic a l H a c k in g a n d C o u n te r m e a s u r e s M o d u le 0 0 : W e l c o m e to C e r t i f i e d E th ic a l H a c k e r C la s s E x a m 3 1 2 -5 0

M o d u le 00 Page I

E th ica l H ackin g a n d C o u n te rm e a s u re s C o p y rig h t by EC-C0l1nCil A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .

E thical H acking and C o u n te rm e a su re s W e lc o m e t o C e rtifie d E th ic a l H a c k e r Class

Exam 3 1 2 -5 0 C e rtifie d E thical H acker

Copyright by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

C o u rs e M a te r ia ls
/

CEH

^
i V &
Student Courseware

Identity Card

CEH

BOOK

Lab M a n u a l/ W orkbook

Compact Disc

Course Evaluation

Reference Materials

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

M o d u le 00 Page II

E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t by EC-C0lMCil A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .

E thical H acking and C o u n te rm e a su re s W e lc o m e t o C e rtifie d E th ica l H a cke r Class

Exam 3 1 2 -5 0 C e rtifie d E th ica l H acker

C E H v

C o u rs e O u tlin e

CEH

In t r o d u c t io n t o E th ic a l

1 1 1

H a c k in g

T r o ja n s a n d B a c k d o o rs

[ 6 1

F o o tp r in tin g a n d

R e c o n n a is s a n c e

V iru s e s a n d W o r m s

[ 7

[ 3

S c a n n in g N e tw o r k s

S n iffin g

[ 8

[ 4

E n u m e r a tio n

S o c ia l E n g in e e rin g

S y s te m H a c k in g

D e n ia l-o f- S e rv ic e

1 0 ]

Copyright by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

C E H v
r
1 1 r 1 2 L ___
r

C o u rs e O u tlin e
r H a c k in g M o b ile P la tfo r m s L r E v a d in g IDS, F ir e w a lls a n d H o n e y p o ts ___J

CEH

r
S e s s io n H ija c k in g

1 6

L ________________________________________________ J ^ H a c k in g W e b s e rv e rs

1 7
r

r
H a c k in g W e b A p p lic a tio n s

r B u ffe r O v e r flo w s

1 3 L . J L .

A
SQL In je c tio n

L .

A
r C r y p to g r a p h y

1 8 1 9 J

'
1 . L

r
j
L

A
P e n e tr a tio n T e s tin g

r
1 5 H a c k in g W ire le s s N e tw o r k s

2 0

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

M o d u le 00 Page I

E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t by EC-C0UIICil A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .

E thical H acking and C o u n te rm e a su re s W e lc o m e t o C e rtifie d E th ica l H a cke r Class

Exam 3 1 2 -5 0 C e rtifie d E thical H acker

ECCouncil Certification Program I CEH


T h e r e a r e s e v e ra l le v e ls o f c e r t if ic a t io n tr a c k s u n d e r t h e E C -C o u n c il A c c r e d it a t i o n b o d y :

C e rtifie d S ecure C o m p u te r U ser(C SC U ) C e rtifie d e-B usiness P ro fe s s io n a l EC-Council C e rtifie d S e c u rity S pe c ia lis t (ECSS) EC-Council N e tw o r k S e c u rity A d m in is tr a to r (ENSA)

ECC o u n cil D isa ste r R ecove ry P ro fe ssio n a l (EDRP) EC-Council C e rtifie d S e c u rity

A n a ly s t (ECSA) EC-Council C e rtifie d Secure P ro g ra m m e r (ECSP) C e rtifie d Secure A p p lic a tio n D e v e lo p e r (CSAD)

C e rtifie d E thical H acker(C E H )

You are here '

Licensed P e n e tra tio n Tester (LPT) M a s te r o f S e c u rity Science (MSS)

C o m p u te r H acking Forensic In v e s tig a to r (CHFI)

Copyright by IG-GOUIICil. All Rights Reserved. Reproduction is Strictly Prohibited.

C e rtifie d E th ic al H a c k e r T ra c k

C EH
UrtifM Etbitji IU(h

CEH C e r t if ic a t io n T ra c k
Com plete th e fo llo w in g steps:
A tte n d th e Ethical H acking and C ou n term e asu res Course

s,

V '
Attend Training Pass th e CEH Exam Exam Code: 312-50-ANSI (IBT), 312-50v8 (VUE), o r 350CEHv8 (APTC) Prepare for 312-50 Exam

v
Take Exam
Pass Fail

EH
Cortifiad Ethiol H i.U .

Certification Achieved

Copyright O by tG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

M o d u le 00 Page IV

E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t by EC-C0UIICil A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .

E thical H acking and C o u n te rm e a su re s W e lc o m e t o C e rtifie d E th ica l H a cke r Class

Exam 3 1 2 -5 0 C e rtifie d E thical H acker

C E H v 8 E x a m In fo r m a tio n

CEH

E xam T itle : C e rtifie d E th ic a l H a ck e r v8 (ANSI)

E xam C od e: 3 12 -5 0-A N S I (IBT), 3 1 2 -5 0 v 8 (V U E ), o r 3 5 0 C E H v 8 (APTC)

N u m b e r o f Q u e s tio n s : 125

D u ra tio n : 4 h o u rs

A v a ila b ility : P ro m e t ric P r im e / P ro m e t ric A P T C / V U E

P a ssin g Score: 70% T h e in s tru c to r w ill te ll y o u a b o u t th e e x a m s c h e d u le / e x a m v o u c h e r d e ta ils fo r y o u r tra in in g T h is is a d iffic u lt e x a m a n d re q u ire s e x te n s iv e k n o w le d g e o f CEH C o re M o d u le s

J
Copyright by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

S tu d e n t F a c ilitie s

CEH

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

M o d u le 00 Page V

E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t by EC-C0UIICil A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .

E thical H acking and C o u n te rm e a su re s W e lc o m e t o C e rtifie d E th ica l H a cke r Class

Exam 3 1 2 -5 0 C e rtifie d E thical H acker

L a b S e s s io n s

Lab S essions a re d e s ig n e d to r e in fo r c e th e c la s s ro o m sessio n s T h e ses s io n s a re in te n d e d to g iv e a h a n d s o n e x p e r ie n c e o n ly a n d d o e s n o t g u a ra n te e p ro fic ie n c y T h e re a re to n s o f la b s in th e la b m a n u a l. P lease p r a c tic e th e s e la b s b a c k a t h o m e .

Copyright by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

W h a t D oes C E H T each You?

CEH

D e fe n se , C is co S e cu rity , F ire w a lls , IDS, Logs, N e tw o rk , A n tiv iru s , H a rd w a re , T ro u b le s h o o tin g , A v a ila b ility , S e r v e r/ C lie n t S e cu rity , c re a tin g p o lic ie s , n e tw o r k M a n a g e m e n t e tc .....

D e n ia l o f Service, Trojans, W o rm s , V iru s, S o cia l E n g in eerin g , Pa ssw o rd cra ckin g, S ession H ija ckin g , System fa ilu re , Spam , P h ish in g , Id e n tity th e ft, W a rd riv in g , w a rc h a lk in g , b lu e ja ck in g Lock pick in g , B u ffe r O v e rflo w , System hackin g , S n iffin g , SQL In je ctio n ....

Ethical Hacking
Bad G uy

This is W hat CEH Teaches You!


Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

M o d u le 00 Page VI

E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t by EC-C0UIICil A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .

E thical H acking and C o u n te rm e a su re s W e lc o m e t o C e rtifie d E th ica l H a cke r Class

Exam 3 1 2 -5 0 C e rtifie d E th ica l H acker

W h a t C E H

is N O T ?

CEH

CEH class is NOT a N etw o rk Security training program > Please attend ECCouncil's ENSA class for that

CEH class is NOT a Security Analysis training program > Please attend ECCouncil's ECSA class for that

CEH class is NOT a Security Testing training program > Please attend ECCouncil's LPT class for that

CEH class is 100 % NETW ORK OFFENSIVE T ra in in g P ro g ra m

Copyright by IC-Coiincil. All RightsKeserved.:Reproduction is Strictly Prohibited.

CEH
U rtifW J Etkw jl IU c W *

The C EH P ro g ra m Teaches you 100% N etw o rk O ffensive T ra in in g and not D efensive

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

M o d u le 00 Page VII

E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t by EC-C0UIICil A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .

E thical H acking and C o u n te rm e a su re s W e lc o m e t o C e rtifie d E th ica l H a cke r Class

Exam 3 1 2 -5 0 C e rtifie d E th ica l H acker

C E H

C la s s S p e e d

C *rtfW < Itkitjl lU ckM

CEH

T h e CEH class is e x tr e m e ly fa s t p a c e d

T h e class " s p e e d " c an b e c o m p a re d t o th e c lim a x s c e n e fr o m th e m o v ie M is s io n Im p o s s ib le (B u lle t tr a in s e q u e n c e )

T h e re a re to n s o f h a c k in g to o ls a n d h a c k in g te c h n o lo g ie s c o v e re d in th e c u r r ic u lu m

T h e in s tr u c to r W IL L N O T b e a b le to d e m o n s tra te A LL th e to o ls in th is class

H e w ill s h o w c a s e o n ly s e le c te d to o ls

T h e s tu d e n ts a re re q u ire d to p ra c tic e w i t h t h e to o ls n o t d e m o n s tra te d in th e class o n t h e ir o w n

Copyright by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

L iv e H a c k in g W e b s ite
J J J P lease ta r g e t y o u r e x e rc is e s f o r "L iv e H a c k in g " t o w w w .c e rtifie d h a c k e r.c o m T h is w e b s ite is m e a n t f o r th e s tu d e n ts to t r y th e to o ls o n liv e ta r g e t P lease re fra in fr o m u s in g th e e x p lo its o n a n y o t h e r d o m a in s o n th e In te r n e t

CEH

C e rtifie d H a c k e r

CEH C la s s ro o m A tta c k Lab W e b s ite

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

M o d u le 00 Page VIII

E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t by EC-C0UIICil A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .

E thical H acking and C o u n te rm e a su re s W e lc o m e t o C e rtifie d E th ic a l H a c k e r Class

Exam 3 1 2 -5 0 C e rtifie d E thical H acker

N D A D o cu m en t

CEH

P le a s e re a d th e c o n te n ts o f th e p r o v id e d ECC o u n c il's CEH NDA d o cu m e n t

S ign th is d o cu m e n t and h a n d i t o v e r to t h e in s t r u c t o r

W e w i l l N O T s ta r t t h e class u n le s s y o u s ig n th is docum ent

P le a s e a p p ro a c h t h e in s t r u c t o r if y o u a re n o t p r e s e n te d w i t h th is d o c u m e n t

Copyright by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

A d v a n c e d L a b E n v ir o n m e n t

CEH

W in d o w s 8

W in d o w s S e rv e r 2 00 8 (64 Bit)

W in d o w s 7

B a ck Tra ck S

V irtu a l P la tfo rm

u
I n s t r u c t o r M a c h in e S t u d e n t M a c h in e s

I n s tr u c to r a n d S t u d e n t M a c h in e O p e r a t in g S y s te m : W in d o w s S e r v e r 2 0 1 2 ( F u lly P a tc h e d )

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

M o d u le 00 Page IX

E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t by EC-C0lMCil A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .

E thical H acking and C o u n te rm e a su re s W e lc o m e t o C e rtifie d E th ica l H a cke r Class

Exam 3 1 2 -5 0 C e rtifie d E th ica l H acker

S tu d e n t C o m p u te r C h e c k lis t

CEH

W in d o w s 8 a s V M

W in d o w s 7 as V M

l
B a c k T ra c k 5 R3 as V M

Copyright by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

S tu d e n t C o m p u te r C h e c k lis t

CEH
tortifM Etkkjl bito

W rite down IP addresses of the host and all the Virtual Machines

Check if you can launch command shell by right clicking on a folder

For Wireless Hacking module you w ill need AirPcap adapter

Check if you can ping between the VM and the hosts

Check if you can access Internet and browse the web using IE, Chrome, Safari and Firefox

Make sure you can access RealHome and Powergym websites at http://localhost/realhom e and http://localhost/pow ergym

Make sure that you can access D:\CEH-T 00 ls directory in W in d o w s S e rv e r 2 0 1 2 and Z:\CEH-T 00 ls from all the VM's; Z: is mapped N e tw o rk
D rive c o n ta in in g CEH to o ls

Check fo r snapshots o f Virtual Machines

Check if you can access http://www.certifiedhacker.com

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

M o d u le 00 Page X

E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t by EC-C0lMCil A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .

E thical H acking and C o u n te rm e a su re s W e lc o m e t o C e rtifie d E th ica l H a cke r Class

Exam 3 1 2 -5 0 C e rtifie d E th ica l H acker

P ing B etw een V irtu a l M a c h in e s and Host


Administrator: C:\W11xlows\systefr132yc1rxl.exe w ith 32 bytee o f data: : b ytoo -3 2 cimo<ln& TTL=128 4: b y te s -3 2 c in e <11*3 TTL-128 : b y te 3 3 2 tim eC lns TTL-128 : b y te s -32 tine < 11 u TTL-128

CEH
(*M M tlfcxjl M m M*

=151 * I

G :M J3 e r3 s n d 1 in i3 tr to r> p in g 1

IT L-128 IT L-128 IT L -1 2 * IT L-128

<

1;1 1
Reply fr o n t Reply fro w i Reply from 1

Plus u t a t l s t i c v f u r Pac)<otc: Sont 4 . R< Approxim ate round c r i p t i l Min inum One. flax imui C iM la e r * s n d n in is tr A to r > _

w ith 32 byte s o f d a ta : : b y te s -3 2 t . M - l m : bytes 32 t in e < ln s : b yt fv 3 2 t i f w d n s : b y te s -32 tifw C in s

C :\W in dow s\system 32\cm d.exe

j'-"

\AH in > p in g 1 : bu t 32 t in e -1 fi* TTL-12R le u ly f r a r t I : b y t u - 3 2 tin < 1 fix 11I.-12N le p ly fra*> I : byt -3 2 t >.e<1..x TTL-12N tv p ly f m m 1 : b y t6 3 2 t i w < in v 11L-12H , H c ta tlv tic w f o r i P a ckotc: Sont - 4 . Rocolvod 4 . Loot 0> 0 X 1000). ip p ro x ln a to round t r i p tin o a in n i lli- o o c o n d o : tlln in u n One. tfa xinu n - in o . flvoraqo Ono :1N4Urs\Hd1in>_

1 1 1

1 1 1

Copyright by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

CEH-Tools Directory in Windows Server 2012 (D:\CEH-Tools)


V_J I | ($ ) ( 1 * 1 Share View V DrMTOMI N<w V o lu m e ( t> ) V O | | Home

CEH
(rtifwd Ethical >U(hM

)'
D*ktap Download)

* Computr NwVolum*(0:)

1 1 Sairch NwVolum*(D:)

)V Fivcrittc

, [ Recent place * SRECYCIE.BIN 3 Documents CEH-Todv Syler Volume Information

J'' Music m ! Pictures 9 Videos

Computer i i . Local Disk (G)

j New Volume (D:) II

*
*I Network

?item s

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

M o d u le 00 Page XI

E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t by EC-C0UIICil A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .

E thical H acking and C o u n te rm e a su re s W e lc o m e t o C e rtifie d E th ica l H a cke r Class

Exam 3 1 2 -5 0 C e rtifie d E thical H acker

Copyright by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

M a p p e d N e tw o rk D riv e (Z:) in W indow s Server 2008 V M


-Jnl*J

CEH
to

o o
F!c

* * Computer

d t

- vn |s e d l(J
<! ,fste^pr0pe t)es urrstai or :range a prog'a*
*jt viap nerA-ork drive |.|T 0 U I 5 H

View

Jo1 d*P jjj views y f Properties


Mamt H ard D isk D riv es ( 1 )

orgarize Favonte bn<s


Docurrentt Pictures :muo

1 * 1 * !

I . I f t m Sm m

&.ocal D isk (Cl)


D evice* w ltli R e m o v a b le S to ra g e (2)

ecendy Changed^ 1 51 f l Searches ublc^ N etw o rk L ocation (1)

hjj loppy D is< O rr e (*:)


^ DVD Drive (D!)

Rcppy Dak Drive CD Drive

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

M o d u le 00 Page XII

E th ica l H ackin g a n d C o u n te rm e a s u re s C o p y rig h t by EC-C0UnCil A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .

E thical H acking and C o u n te rm e a su re s W e lc o m e t o C e rtifie d E th ica l H a cke r Class

Exam 3 1 2 -5 0 C e rtifie d E th ica l H acker

M a p p e d N e tw o rk D riv e (Z:) in W indow s 7 V M


G Z IC lL lI^ , v |: . Computet Properties System properties - Hard D isk D riv es (1 ) Local Disk (C:] f t i / * ' Libraries 1 ^ B Q Documents Music Pictures Videos ' Floppy Disk Drive (A:) DVD Drive (DO 6.37 G3*'reeo*'158 G3 Uninstall or charge a program 1 | SeorcA Ccrr.outer [j|p (Jjj O p 1

CEH
tlfcxjl M m M*

Organize A Favorites E Desktop

Map net A/ork drive

m Downloads
^ Recent Places

Devices wiTh Removable Storage (2)

Network Location (1)


CEH-Tools <\\ (Z:)

: Computer

* j f

jB tree of 269 OB

*'p Network

r H -T n n lc (\\1 07 .1fift1 M l 11 J) (7)

Tntalc*

Network Drive

Space free: 365 GB

Fie system: NTFS

Copyright by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

L a u n c h in g C o m m a n d S h e ll
:

CEH
(rtifwd Ethical >U(hM

New Volume [D.) . .

*I

] M ' '3 9

lnrlud*<nMx*ry *Jdlsmlw. AddM'CEHTootuar' Cmpn*nj mtJ_ CompmstoCERToofc-rjr*

C'tttt
0t<

A dm inistrator: C:\W ind 0 w s\system 32\cm d.exe

copyright by EG-Gouncil. All Rights AeServfeifc;Reproduction is Strictly Probfbited.

M o d u le 00 Page XIII

E th ica l H ackin g a n d C o u n te rm e a s u re s C o p y rig h t by EC-C0UnCll A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .

Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

S n a p s h o ts o f V i r t u a l M a c h in e s
H y p er-V M a n a g e r File Action View Help

CEH
tlfcxjl M m M*

* * I 8 1! 0 1
j j Hyper-V Manager
^3 WIN-ROPCM8VKVOQ V i r tu a l M a c h i n e s CPU Usage =j B32k Track 6 Import Virtual Machine... Windows 3 j Windows 2002 Server 1024 MB 024 M3 Hyper-V Settings... Assigned Memory Up*

W IN -R O PC M 8V K V O Q
New

settings..
Turn Off.. Shut Down..

5
^

5 Virtual SAitch Manager... Virtual SAN Manager... Edit Disk... Inspect Disk,..

S n a p s h o ts g j, Wrdo*3 7-(4/16/ H Now

S av e
Pause Reset | Snapshot Revert.. ^

() Stop Service Remove Server

Q R efresh
View Q Hp

Rename.. Enable Replication ..

Sumrray M oray

W indows 7 Ch^lrrrtt 10
hedrtbedt: D K fS b /tu k () Turn Off... 0 Q Shut Down... Save Paute Reset Connect... fr l Sfttingc..

Help

Nfcsvwxtjng [ Rcpkdton

||

Copyright by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

A ir P c a p

CEH
(rtifwd Ethical >U(hM

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

Module 00 Page XIV

Ethical Hacking and Countermeasures Copyright by EC-C0UnCll All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

P o w e r g y m a n d R e a lH o m e
w v W eb s i t?e s

. . . .
C E H

c[

toMlfOS ; ./rq>nV

-> n 1 kMMltnc kMh

R e a lH o m e !
\KK rrs
I TING s tlJ LING

! tin

Supp*rt 1 FAQ*

Sitenap t

:Irip

K I.N IIM '

liASINO

CUXIAC1 US

LOG IN

Powergym : h ttp ://lo c a lh o s t/p o w e rg y m

RealHome: h ttp ://lo c a lh o s t/re a lh o m e


Copyright by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

L iv e H a c k W e b s ite
http://www.certifiedhacker. com
CEH Labs CEH Labs

CEH

CEH Labs

CEH Labs

JuGGY

B0V

u n it e

N i fc t i
Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

Module 00 Page XV

Ethical Hacking and Countermeasures Copyright by EC-C0UIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

CEH

L e t s S t a r t H a c k i n g

Copyright by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

Module 00 Page XVI

Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.

You might also like