Professional Documents
Culture Documents
T A W c D 0 lU n
w w w .ta k e d o w n c o n .c o m
T A K E D 0 1 U I1 is a h a c k in g c o n fe re n c e th a t w a s co n c e iv e d by o u r m e m b e rs !
EC -C ouncil h a s b e e n flo o d e d w ith re q u e s ts to ta k e o u r w o rld -c la s s c o u rs e s o n th e ro a d ! W e have a n s w e re d th e c a ll a n d c re a te d T a keD ow nC on! T h is c o n fe re n c e w ill be fo c u s e d on th e le a rn e r a n d w ill fe a tu re s e v e ra l C e rtific a tio n & C e rtific a te T ra in in g c o u rs e s fo r A d va n ce d P ra c titio n e rs ! T TAKEDC A K O O U JH w ill h o s t E C -C ouncil's s o u g h t a fte r H a ckin g , F o ren sics a n d Pen T est c o u rs e s ,
C e rtifie d W ire le s s S e c u rity P ro fe ssio n a l, a n d s e v e ra l h ig h ly te c h n ic a l a n d a d v a n c e d w o rk s h o p s w h ic h w ill c o v e r c u r re n t a n d im p o rta n t s e c u rity to p ic s s u c h a s a d v a n c e d p e n e tra tio n te s tin g , c ry p to g ra p h y , n e tw o rk d e fe n s e , a p p lic a tio n s e c u rity a n d m o b ile fo re n s ic s . A t T A K C D O llin th e le a rn in g d o e s n 't s to p w h e n th e tra in in g e n d s l
&j 11^:jp_ _
*.\
H acker H alted
w w w .h a c k e rh a lte d .c o m
S ince 2 0 0 4 EC-Council ha s ho ste d 2 0 H acker H alted e ve n ts a cro ss fo u r c o n tin e n ts and in c itie s s u c h as M y rtle B each, M ia m i, D ubai, S ingap ore , H ong Kong, M exico City, Tokyo, K uala Lum pur, G uangzhou, Taiper a n d Cairo. H acker H alted N o rth A m erica w ill be held in M ia m i fo r th e 3 rd ye a r in a row an d ba sed on p a s t h is to ry is su re to b o a st an a m a z in g tu rn o u t o f In fo rm a tio n S e cu rity P rofe ssionals! H acker H alted is m o re th a n ju s t a c o n fe re n c e eve nt; p ra c titio n e rs tra v e l fro m all over th e w orld to a tte n d o u r w o rld -c la s s tra in in g , ga in p ra c tic a l k n o w le d g e fro m o u r e x p e rt p re s e n te rs and g e t a preview o f th e la te s t te c h n o lo g ie s an d In fo rm a tio n S e c u rity to o ls w h ic h w ill be sh o w ca se d by o u r e x h ib ito rs an d p a rtn e rs .
* I i
E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t by EC-COUDCil A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .
V A M P IR E
w w w .v a m p ire te c h .c o m
Is yo u r w ebsite vulne rab ly to an attack? Could hackers e xp lo it a small weakness in you r w ebsite and o b tain access to sensitive com pany info rm atio n? VampireScan allow s users to test th e ir ow n Cloud and W eb ap plication s against advanced attacks and receive actionable results all w ith in th e ir ow n Web portal. O ur easy to use on lin e p o rta l w ill sim ply ask you fo r th e URL o f your w e b application, fro m there, o u r Services d o th e rest. For a lim ite d tim e, VampireTech is offering its Baseline Scan free o f charge to q u alified custom ers. This en titles you to one Free H ealth Check fo r one do m a in u tiliz in g o u r Baseline Scan. This Scan w ill test fo r Cross-site S cripting V ulnerabilities, Non-SSL Passwords, and Password A utoco m plete.
A
r
f c
Be on th e fo re fro n t o f a ne w g lo b a l in itia tiv e w here today's w orld-class leaders in in fo rm a tio n security w ill g a th e r to na vig ate th ro u g h in te rn a tio n a l waters. Join these leaders as th e y fo llo w th e w in d o f change th a t is sw eeping th ro u g h th e IS c o m m u n ity m o tiv a tin g today's in fo rm a tio n guardians to d e velop a new w ay o f th in k in g to ensure success in p ro te c tin g th e ir respective organizations. The goal o f EC-Council's Global CISO Forum is to create an op en p la tfo rm fo r to p in fo rm a tio n security executives to discuss th e ir successes, failures, obstacles, and challenges. The open conversation w ill lead to th e creation o f a c tio n a b le item s th a t can be discussed and ap p lie d to th e organiza tion.
For M o re Inform ation A b o u t CISO Executive S u m m it Please Visit: w w w .e cco u n c il.o rg /re so u rce s/ciso -e xe cu tlv e -su m m it.a sp x
E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t by EC-COUDCil A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .
H o w to D o w n lo a d M y C E H v 8 E - C o u r s e w a r e a n d A d d itio n a l L a b M a n u a ls ? P le a s e f o l l o w t h e s t e p s b e l o w to d o w n l o a d y o u r C EH v8 e - c o u r s e w a r e a n d a d d i t i o n a l la b m a n u a l.
S t e p 1:
Visit: https://academ ia.eccouncil.org. If you have an account already, skip to Step 4.
S t e p 2:
Click Register and fill out the registration form.
S te p 3:
Using the email you provided in step 2, follow the instructions in the auto-generated email to activate your Academ ia Portal account.
S t e p 4:
Login using your Username and Password.
S t e p 5:
Once successfully logged in, expand the About A cadem ia navigation menu and select
A ccess Code. S t e p 6:
Enter the access code provided to you to redeem access to the CEH V8 e-Courseware and Lab Manuals.
S u p p o rt:
E-mail support is available from academia(5>eccouncil.org.
S y s te m R e q u ire m e n ts :
Visit https://academ ia.eccouncil.ore/AboutAcadem ia/W hatisiLearn.aspx to view the system requirements.
E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t by EC-C0UIICil A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .
D o w n lo a d C la s s C e r t if ic a t e o f A t t e n d a n c e
IC -C o u n c il
T H I S IS T O A C K N O W L E D G E T H A T
H A S SUCCESSFULLY C O M P L E T E D A C O U K S E O N
A T A N E C - C O U N C IL A C C R E D IT E D T R A IN IN G
CENTER
I n s tru c to r
D ate
T R A IN IN G C E N T E R :
E C C011ncil
Please fo llo w the below stated steps to dow nload digital copy (PDF format) of your class certificate of attendance. Step 1: W a it until the class is over (the last of the class). Step 2: Visit http://w w w .eccouncil.org/eval. Step 3: Com plete the course evaluation form (please com plete all the fields in the form correct e-mail address is required). Step 4: Evaluation code is required to subm it the form. See the attached code. Step 5: Submit the form. Step 6: A w eb link will be sent to you to dow nload your PDF copy of the certificate.
C o u r s e E v a l u a t i o n C o d e : ** CEH *
E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t by EC-COIMCil A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .
E t h i c a l C
a c k i n g
a n d
o u n t e r m
e a s u r e s Version 8
E C -C o u n c il Copyright 2013 by EC-Council. All rights reserved. Except as permitted under the Copyright Act o f 1976, no part o f this publication may be reproduced or distributed 111 any form or by any means, or stored 111 a database or retrieval system, without the prior written permission o f the publisher, with the exception that the program listings may be entered, stored, and executed 111 a computer system, but they may not be reproduced for publication. Inform ation has been obtained by EC-Council from sources believed to be reliable. EC-Council uses reasonable endeavors to ensure that the content is current and accurate, however, because of the possibility ot human or mechanical error we do not guarantee the accuracy, adequacy, or completeness ot any information and are not responsible for any errors or omissions or the accuracy o f the results obtained from use o f such information. The courseware is a result o f extensive research and contributions from subject matter experts from the field from all over the world. Due credits for all such contributions and references are given in the courseware in the research endnotes. We are committed towards protecting intellectual property. If you are a copyright owner (an exclusive licensee or their agent), and if vou believe that any part o f the courseware constitutes an infringement o f copyright, or a breach o f an agreed licence or contract, you may notify us at legal@ eccouncil.org. 111 the event o f a justified complaint, EC-Council will remove the material 111 question and make necessary rectifications. The courseware may contain references to other information resources and security solutions, but such references should not be considered as an endorsement o f or recommendation by EC-Council. Readers are encouraged at legal@ eccouncil.org. to report errors, omissions and inaccuracies to EC-Council
E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t by EC-COUDCil A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .
F o r e w
o r d
Since you are reading this CEHv8 courseware, you most likely realize the im portance of inform ation systems security. However, we would like to put forth our motive behind compiling a resource such as this one and w hat you can gain from this course. You might find yourself asking w hat sets this course apart from the others out there. The truth is that no single courseware can address all the issues of inform ation security in a detailed manner. M oreover, the rate at which exploits, tools, and m ethods are being discovered by the security c om m un ity makes it difficult for one program to cover all the necessary facets of inform ation security. This doesn't mean that this course is inadequate in any way as we have worked to cover all major dom ains in such a m anner that the reader will be able to appreciate the way security has evolved over tim e as well as gain insight in to the fundam ental workings relevant to each domain. It is a blend of academ ic and practical w isdom supplem ented with tools that the reader can readily access in order to obtain a hands-on experience. The emphasis through out the courseware is on gaining practical know-how, which explains the stress on free and accessible tools. You will read about some of the most widespread attacks seen, the popular tools used by attackers, and how attacks have been carried out using ordinary resources. You may also w ant to know w hat to expect once you have com pleted the course. This coursew are is a resource material. Any penetration tester can tell you that there is no one straight m ethodology or sequence of steps that you can follow w hile auditing a client site. There is no one tem plate that will meet all your needs. Your testing strategy will vary with the client, the basic inform ation about the system or situation, and the resources at your disposal. However, for each stage you choose be it enumeration, firewall, penetration of other dom ains - you will find som ething in this coursew are that you can definitely use. Finally this is not the end! This courseware is to be considered a constant work-in-progress because we will be adding value to this courseware over time. You may find some aspects extrem ely detailed, w hile others may have less detail. W e are constantly asking ourselves if the content helps explain the core point of the lesson, and w e constant calibrate our material with that in mind. W e w ould love to hear your view points and suggestions so please send us your feedback to help in our quest to constantly im prove our courseware.
E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t by EC-COIMCil A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .
T h is
p a g e
is
in te n tio n a lly
le ft b la n k .
T a b le
M odule N u m b e r 00 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19
o f C o n te n ts
M odule N a m e P ag e N o. I 01 91 262 434 517 827 1006 1112 1292 1402 1503 1600 1723 1986 2134 2392 2549 2691 2782 2872 2976
S tu d en t In tro d u ctio n In tro d u ctio n to E th ical H a c k in g F o o tp rin tin g an d R eco n n aissan ce S can n in g N etw o rk s E n u m e ra tio n System H a c k in g T ro jan s an d B ackdoors V iruses an d W orm s Sniffing Social E n g in e e rin g D en ial o f Service Session H ijack in g H a c k in g W ebservers H a c k in g W eb A pplications SQ L In jectio n H a c k in g W ireless N etw o rk s H a c k in g M obile P latform s E v ad in g ID S, Firew alls, an d H o n ey p o ts Buffer O verflow C ryptography
E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t by EC-COIMCil A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .
T h is
p a g e
is
in te n tio n a lly
le ft b la n k .
W e lc o m e to C e r t if ie d E t h ic a l H a c k e r C la s s !
S tu d e n t I n tr o d u c tio n
CEH
E th ic a l H a c k in g a n d C o u n te r m e a s u r e s M o d u le 0 0 : W e l c o m e to C e r t i f i e d E th ic a l H a c k e r C la s s E x a m 3 1 2 -5 0
M o d u le 00 Page I
E th ica l H ackin g a n d C o u n te rm e a s u re s C o p y rig h t by EC-C0l1nCil A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .
C o u rs e M a te r ia ls
/
CEH
^
i V &
Student Courseware
Identity Card
CEH
BOOK
Lab M a n u a l/ W orkbook
Compact Disc
Course Evaluation
Reference Materials
M o d u le 00 Page II
E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t by EC-C0lMCil A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .
C E H v
C o u rs e O u tlin e
CEH
In t r o d u c t io n t o E th ic a l
1 1 1
H a c k in g
T r o ja n s a n d B a c k d o o rs
[ 6 1
F o o tp r in tin g a n d
R e c o n n a is s a n c e
V iru s e s a n d W o r m s
[ 7
[ 3
S c a n n in g N e tw o r k s
S n iffin g
[ 8
[ 4
E n u m e r a tio n
S o c ia l E n g in e e rin g
S y s te m H a c k in g
D e n ia l-o f- S e rv ic e
1 0 ]
C E H v
r
1 1 r 1 2 L ___
r
C o u rs e O u tlin e
r H a c k in g M o b ile P la tfo r m s L r E v a d in g IDS, F ir e w a lls a n d H o n e y p o ts ___J
CEH
r
S e s s io n H ija c k in g
1 6
L ________________________________________________ J ^ H a c k in g W e b s e rv e rs
1 7
r
r
H a c k in g W e b A p p lic a tio n s
r B u ffe r O v e r flo w s
1 3 L . J L .
A
SQL In je c tio n
L .
A
r C r y p to g r a p h y
1 8 1 9 J
'
1 . L
r
j
L
A
P e n e tr a tio n T e s tin g
r
1 5 H a c k in g W ire le s s N e tw o r k s
2 0
M o d u le 00 Page I
E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t by EC-C0UIICil A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .
C e rtifie d S ecure C o m p u te r U ser(C SC U ) C e rtifie d e-B usiness P ro fe s s io n a l EC-Council C e rtifie d S e c u rity S pe c ia lis t (ECSS) EC-Council N e tw o r k S e c u rity A d m in is tr a to r (ENSA)
ECC o u n cil D isa ste r R ecove ry P ro fe ssio n a l (EDRP) EC-Council C e rtifie d S e c u rity
A n a ly s t (ECSA) EC-Council C e rtifie d Secure P ro g ra m m e r (ECSP) C e rtifie d Secure A p p lic a tio n D e v e lo p e r (CSAD)
C e rtifie d E th ic al H a c k e r T ra c k
C EH
UrtifM Etbitji IU(h
CEH C e r t if ic a t io n T ra c k
Com plete th e fo llo w in g steps:
A tte n d th e Ethical H acking and C ou n term e asu res Course
s,
V '
Attend Training Pass th e CEH Exam Exam Code: 312-50-ANSI (IBT), 312-50v8 (VUE), o r 350CEHv8 (APTC) Prepare for 312-50 Exam
v
Take Exam
Pass Fail
EH
Cortifiad Ethiol H i.U .
Certification Achieved
M o d u le 00 Page IV
E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t by EC-C0UIICil A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .
C E H v 8 E x a m In fo r m a tio n
CEH
N u m b e r o f Q u e s tio n s : 125
D u ra tio n : 4 h o u rs
P a ssin g Score: 70% T h e in s tru c to r w ill te ll y o u a b o u t th e e x a m s c h e d u le / e x a m v o u c h e r d e ta ils fo r y o u r tra in in g T h is is a d iffic u lt e x a m a n d re q u ire s e x te n s iv e k n o w le d g e o f CEH C o re M o d u le s
J
Copyright by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.
S tu d e n t F a c ilitie s
CEH
M o d u le 00 Page V
E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t by EC-C0UIICil A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .
L a b S e s s io n s
CEH
D e fe n se , C is co S e cu rity , F ire w a lls , IDS, Logs, N e tw o rk , A n tiv iru s , H a rd w a re , T ro u b le s h o o tin g , A v a ila b ility , S e r v e r/ C lie n t S e cu rity , c re a tin g p o lic ie s , n e tw o r k M a n a g e m e n t e tc .....
D e n ia l o f Service, Trojans, W o rm s , V iru s, S o cia l E n g in eerin g , Pa ssw o rd cra ckin g, S ession H ija ckin g , System fa ilu re , Spam , P h ish in g , Id e n tity th e ft, W a rd riv in g , w a rc h a lk in g , b lu e ja ck in g Lock pick in g , B u ffe r O v e rflo w , System hackin g , S n iffin g , SQL In je ctio n ....
Ethical Hacking
Bad G uy
M o d u le 00 Page VI
E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t by EC-C0UIICil A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .
W h a t C E H
is N O T ?
CEH
CEH class is NOT a N etw o rk Security training program > Please attend ECCouncil's ENSA class for that
CEH class is NOT a Security Analysis training program > Please attend ECCouncil's ECSA class for that
CEH class is NOT a Security Testing training program > Please attend ECCouncil's LPT class for that
CEH
U rtifW J Etkw jl IU c W *
M o d u le 00 Page VII
E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t by EC-C0UIICil A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .
C E H
C la s s S p e e d
CEH
T h e CEH class is e x tr e m e ly fa s t p a c e d
T h e re a re to n s o f h a c k in g to o ls a n d h a c k in g te c h n o lo g ie s c o v e re d in th e c u r r ic u lu m
T h e in s tr u c to r W IL L N O T b e a b le to d e m o n s tra te A LL th e to o ls in th is class
H e w ill s h o w c a s e o n ly s e le c te d to o ls
L iv e H a c k in g W e b s ite
J J J P lease ta r g e t y o u r e x e rc is e s f o r "L iv e H a c k in g " t o w w w .c e rtifie d h a c k e r.c o m T h is w e b s ite is m e a n t f o r th e s tu d e n ts to t r y th e to o ls o n liv e ta r g e t P lease re fra in fr o m u s in g th e e x p lo its o n a n y o t h e r d o m a in s o n th e In te r n e t
CEH
C e rtifie d H a c k e r
M o d u le 00 Page VIII
E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t by EC-C0UIICil A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .
N D A D o cu m en t
CEH
S ign th is d o cu m e n t and h a n d i t o v e r to t h e in s t r u c t o r
P le a s e a p p ro a c h t h e in s t r u c t o r if y o u a re n o t p r e s e n te d w i t h th is d o c u m e n t
A d v a n c e d L a b E n v ir o n m e n t
CEH
W in d o w s 8
W in d o w s S e rv e r 2 00 8 (64 Bit)
W in d o w s 7
B a ck Tra ck S
V irtu a l P la tfo rm
u
I n s t r u c t o r M a c h in e S t u d e n t M a c h in e s
I n s tr u c to r a n d S t u d e n t M a c h in e O p e r a t in g S y s te m : W in d o w s S e r v e r 2 0 1 2 ( F u lly P a tc h e d )
M o d u le 00 Page IX
E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t by EC-C0lMCil A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .
S tu d e n t C o m p u te r C h e c k lis t
CEH
W in d o w s 8 a s V M
W in d o w s 7 as V M
l
B a c k T ra c k 5 R3 as V M
S tu d e n t C o m p u te r C h e c k lis t
CEH
tortifM Etkkjl bito
W rite down IP addresses of the host and all the Virtual Machines
Check if you can access Internet and browse the web using IE, Chrome, Safari and Firefox
Make sure you can access RealHome and Powergym websites at http://localhost/realhom e and http://localhost/pow ergym
Make sure that you can access D:\CEH-T 00 ls directory in W in d o w s S e rv e r 2 0 1 2 and Z:\CEH-T 00 ls from all the VM's; Z: is mapped N e tw o rk
D rive c o n ta in in g CEH to o ls
M o d u le 00 Page X
E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t by EC-C0lMCil A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .
CEH
(*M M tlfcxjl M m M*
=151 * I
G :M J3 e r3 s n d 1 in i3 tr to r> p in g 1
<
1;1 1
Reply fr o n t Reply fro w i Reply from 1
Plus u t a t l s t i c v f u r Pac)<otc: Sont 4 . R< Approxim ate round c r i p t i l Min inum One. flax imui C iM la e r * s n d n in is tr A to r > _
j'-"
\AH in > p in g 1 : bu t 32 t in e -1 fi* TTL-12R le u ly f r a r t I : b y t u - 3 2 tin < 1 fix 11I.-12N le p ly fra*> I : byt -3 2 t >.e<1..x TTL-12N tv p ly f m m 1 : b y t6 3 2 t i w < in v 11L-12H , H c ta tlv tic w f o r i P a ckotc: Sont - 4 . Rocolvod 4 . Loot 0> 0 X 1000). ip p ro x ln a to round t r i p tin o a in n i lli- o o c o n d o : tlln in u n One. tfa xinu n - in o . flvoraqo Ono :1N4Urs\Hd1in>_
1 1 1
1 1 1
CEH
(rtifwd Ethical >U(hM
)'
D*ktap Download)
* Computr NwVolum*(0:)
1 1 Sairch NwVolum*(D:)
)V Fivcrittc
*
*I Network
?item s
M o d u le 00 Page XI
E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t by EC-C0UIICil A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .
CEH
to
o o
F!c
* * Computer
d t
- vn |s e d l(J
<! ,fste^pr0pe t)es urrstai or :range a prog'a*
*jt viap nerA-ork drive |.|T 0 U I 5 H
View
1 * 1 * !
I . I f t m Sm m
M o d u le 00 Page XII
E th ica l H ackin g a n d C o u n te rm e a s u re s C o p y rig h t by EC-C0UnCil A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .
CEH
tlfcxjl M m M*
m Downloads
^ Recent Places
: Computer
* j f
jB tree of 269 OB
*'p Network
Tntalc*
Network Drive
L a u n c h in g C o m m a n d S h e ll
:
CEH
(rtifwd Ethical >U(hM
*I
] M ' '3 9
C'tttt
0t<
M o d u le 00 Page XIII
E th ica l H ackin g a n d C o u n te rm e a s u re s C o p y rig h t by EC-C0UnCll A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .
S n a p s h o ts o f V i r t u a l M a c h in e s
H y p er-V M a n a g e r File Action View Help
CEH
tlfcxjl M m M*
* * I 8 1! 0 1
j j Hyper-V Manager
^3 WIN-ROPCM8VKVOQ V i r tu a l M a c h i n e s CPU Usage =j B32k Track 6 Import Virtual Machine... Windows 3 j Windows 2002 Server 1024 MB 024 M3 Hyper-V Settings... Assigned Memory Up*
W IN -R O PC M 8V K V O Q
New
settings..
Turn Off.. Shut Down..
5
^
5 Virtual SAitch Manager... Virtual SAN Manager... Edit Disk... Inspect Disk,..
S av e
Pause Reset | Snapshot Revert.. ^
Q R efresh
View Q Hp
Sumrray M oray
W indows 7 Ch^lrrrtt 10
hedrtbedt: D K fS b /tu k () Turn Off... 0 Q Shut Down... Save Paute Reset Connect... fr l Sfttingc..
Help
Nfcsvwxtjng [ Rcpkdton
||
A ir P c a p
CEH
(rtifwd Ethical >U(hM
Ethical Hacking and Countermeasures Copyright by EC-C0UnCll All Rights Reserved. Reproduction is Strictly Prohibited.
P o w e r g y m a n d R e a lH o m e
w v W eb s i t?e s
. . . .
C E H
c[
toMlfOS ; ./rq>nV
R e a lH o m e !
\KK rrs
I TING s tlJ LING
! tin
Supp*rt 1 FAQ*
Sitenap t
:Irip
liASINO
CUXIAC1 US
LOG IN
L iv e H a c k W e b s ite
http://www.certifiedhacker. com
CEH Labs CEH Labs
CEH
CEH Labs
CEH Labs
JuGGY
B0V
u n it e
N i fc t i
Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.
Module 00 Page XV
Ethical Hacking and Countermeasures Copyright by EC-C0UIICil All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
L e t s S t a r t H a c k i n g
Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.