You are on page 1of 26

Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker

Welcome to Certified Ethical Hacker Class


T A W c D 0 l U n
w w w .ta ke d o w n c o n . c o m
TAKE D01UI1 is a hacking conference that was conceived by our members!
EC-Council has been flooded with requests to take our world-class courses on the road!
We have answered the call and created TakeDownCon!
This conference will be focused on the learner and will feature
several C ertification & Certificate Training courses for Advanced P ractitioners!
TAKEDC T A K O O U J H will host EC-Council's sought after Hacking, Forensics and Pen Test courses,
Certified Wireless S ecurity P rofessional, and several highly technical and advanced workshops
which will cover current and important security topics such as advanced penetration testing,
cryptography, network defense, application security and mobile forensics.
At T A K C D O llin the learning doesn't stop when the training endsl
We have lined up a list of sought after industry practitioners and
subject matter experts that will present relevant and implementable topics!
For more information, about TAKEDOl l i n please visitit w w w .t ak ed o w n c o n .c o m
&j 11^:jp_ _ *.\
Hac k er Hal t ed
www. hac kerhalted. c om
. 1 i * I i *
Since 2004 EC-Council has hosted 20 Hacker Halted events across four continents and
in cities such as Myrtle Beach, Miami, Dubai, Singapore, Hong Kong, Mexico City,
Tokyo, Kuala Lumpur, Guangzhou, Taiper and Cairo.
Hacker Halted North America will be held in Miami for the 3rd year in a row and
based on past history is sure to boast an amazing turnout of Information Security P rofessionals!
Hacker Halted is more than just a conference event; practitioners travel from all over the world
to attend our world-class training, gain practical knowledge from our expert presenters and
get a preview of the latest technologies and Information Security tools
which will be showcased by our exhibitors and partners.
For more information, about Hacker Halted please visit
Ethical Hacking and Countermeasures Copyright by EC-COUDCil
All Rights Reserved. Reproduction is Strictly P rohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Welcome to Certified Ethical Hacker Class
V A M P I R E
www.vampiretech.com
Is your website vulnerably to an attack? Could hackers exploit a small weakness in your website and obtain access
to sensitive company information?
VampireScan allows users to test their own Cloud and Web applications against advanced attacks and receive
actionable results all within their own Web portal. Our easy to use online portal will simply ask you for the URL of
your web application, from there, our Services do the rest.
For a limited time, VampireTech is offering its Baseline Scan free of charge to qualified customers. This entitles you
to one Free Health Check for one domain utilizing our Baseline Scan. This Scan will test for Cross-site Scripting
Vulnerabilities, Non-SSL Passwords, and Password Autocomplete.
A
f c
V Global CISO Executive Summit
r
Be on the forefront of a new global initiative where today's world-class leaders in information security will gather to
navigate through international waters. J oin these leaders as they follow the wind of change that is sweeping through
the IS community motivating today's information guardians to develop a new way of thinking to ensure success in
protecting their respective organizations.
The goal of EC-Council's Global CISO Forum is to create an open platform for top information security executives to
discuss their successes, failures, obstacles, and challenges. The open conversation will lead to the creation of
actionable items that can be discussed and applied to the organization.
For More I nformation About CI SO Executive Summit Please Visit: www.eccouncil.org/ resources/ ciso-executlve-summit.aspx
Ethical Hacking and Countermeasures Copyright by EC-COUDCil
All Rights Reserved. Reproduction is Strictly P rohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Welcome to Certified Ethical Hacker Class
H o w to D o w n l o a d M y C E H v 8 E - C o u r s e w a r e a n d A d d i ti o n a l
L ab M a n u a l s ?
P l e a s e f o l l o w t h e s t e p s b e l o w t o d o w n l o a d y o u r CEHv8 e - c o u r s e w a r e a n d
a d d i t i o n a l l ab m a n u a l .
S tep 1:
Visit: https:/ / academia.eccouncil.org. If you have an account already, skip to Step 4.
Step 2:
Click Register and fill out the registration form.
Step 3:
Using the email you provided in step 2, follow the instructions in the auto-generated
email to activate your Academia Portal account.
S tep 4:
Login using your Username and Password.
S tep 5:
Once successfully logged in, expand the About Academia navigation menu and select
Access Code.
Step 6:
Enter the access code provided to you to redeem access to the CEH V8 e-Courseware
and Lab Manuals.
Access Code: XXXXXXXXXXXXXXXX
S tep 8:
Once redeemed, expand the Courses menu and select iLearn - PDF Courseware - The
resulting page will list your CEH v8 e-Courseware and Lab Manuals.
Support:
E-mail support is available from academia(5>eccouncil.org.
S ystem R equi rements:
Visit https:/ / academia.eccouncil.ore/ AboutAcademia/ WhatisiLearn.aspx to view the
system requirements.
Ethical Hacking and Countermeasures Copyright by EC-C0UIICil
All Rights Reserved. Reproduction is Strictly P rohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Welcome to Certified Ethical Hacker Class
D o w n l o a d C l a s s C e r t i f i c a t e o f A t t e n d a n c e
ECC011ncil
http://www.eccouncil.org
I C - C o u n c i l
T H I S IS T O A C K N O W L E D G E T H A T
H A S SUCCESS F UL L Y C O M P L E T E D A C O U K S E O N
A T A N E C - C O U N C I L A C C R E D I T E D T R A I N I N G C E N T E R
T R AINING C E NTE R :
Date I nstructor
Please follow the below stated steps to download digital copy (PDF format) of your class
certificate of attendance.
Step 1: Wait until the class is over (the last of the class).
Step 2: Visit http:/ / www.eccouncil.org/ eval.
Step 3: Complete the course evaluation form (please complete all the fields in the form -
correct e-mail address is required).
Step 4: Evaluation code is required to submit the form. See the attached code.
Step 5: Submit the form.
Step 6: A web link will be sent to you to download your PDF copy of the certificate.
C ourse E val uati on C ode: * *CEH *
Ethical Hacking and Countermeasures Copyright by EC-COIMCil
All Rights Reserved. Reproduction is Strictly P rohibited.
E t h i c a l H a c k i n g a n d
C o u n t e r m e a s u r e s
Version 8
Exam 312-50 Certified Ethical Hacker Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class
E C -C ounci l
Copyright 2013 by EC-Council. All rights reserved. Except as permitted under the Copyright Act
of 1976, no part of this publication may be reproduced or distributed 111 any form or by any means,
or stored 111 a database or retrieval system, without the prior written permission of the publisher,
with the exception that the program listings may be entered, stored, and executed 111 a computer
system, but they may not be reproduced for publication.
Information has been obtained by EC-Council from sources believed to be reliable. EC-Council
uses reasonable endeavors to ensure that the content is current and accurate, however, because of
the possibility ot human or mechanical error we do not guarantee the accuracy, adequacy, or
completeness ot any information and are not responsible for any errors or omissions or the accuracy
of the results obtained from use of such information.
The courseware is a result of extensive research and contributions from subject matter experts from
the field from all over the world. Due credits for all such contributions and references are given in
the courseware in the research endnotes. We are committed towards protecting intellectual
property. If you are a copyright owner (an exclusive licensee or their agent), and if vou believe
that any part of the courseware constitutes an infringement of copyright, or a breach of an agreed
licence or contract, you may notify us at legal@eccouncil.org. 111 the event of ajustified complaint,
EC-Council will remove the material 111 question and make necessary rectifications.
The courseware may contain references to other information resources and security solutions, but
such references should not be considered as an endorsement of or recommendation by EC-Council.
Readers are encouraged to report errors, omissions and inaccuracies to EC-Council
at legal@eccouncil.org.
I f vou have any issues, please contact support@eccouncil.org.
Ethical Hacking and Countermeasures Copyright by EC-COUDCil
All Rights Reserved. Reproduction is Strictly P rohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Welcome to Certified Ethical Hacker Class
F o r e w o r d
Since you are reading this CEHv8 courseware, you most likely realize the importance of
information systems security. However, we would like to put forth our motive behind compiling
a resource such as this one and what you can gain from this course.
You might find yourself asking what sets this course apart from the others out there. The truth
is that no single courseware can address all the issues of information security in a detailed
manner. Moreover, the rate at which exploits, tools, and methods are being discovered by the
security community makes it difficult for one program to cover all the necessary facets of
information security. This doesn't mean that this course is inadequate in any way as we have
worked to cover all major domains in such a manner that the reader will be able to appreciate
the way security has evolved over time as well as gain insight in to the fundamental workings
relevant to each domain. It is a blend of academic and practical wisdom supplemented with
tools that the reader can readily access in order to obtain a hands-on experience.
The emphasis throughout the courseware is on gaining practical know-how, which explains the
stress on free and accessible tools. You will read about some of the most widespread attacks
seen, the popular tools used by attackers, and how attacks have been carried out using
ordinary resources.
You may also want to know what to expect once you have completed the course. This
courseware is a resource material. Any penetration tester can tell you that there is no one
straight methodology or sequence of steps that you can follow while auditing a client site.
There is no one template that will meet all your needs. Your testing strategy will vary with the
client, the basic information about the system or situation, and the resources at your disposal.
However, for each stage you choose - be it enumeration, firewall, penetration of other
domains - you will find something in this courseware that you can definitely use.
Finally this is not the end! This courseware is to be considered a constant work-in-progress
because we will be adding value to this courseware over time. You may find some aspects
extremely detailed, while others may have less detail. We are constantly asking ourselves if the
content helps explain the core point of the lesson, and we constant calibrate our material with
that in mind. We would love to hear your viewpoints and suggestions so please send us your
feedback to help in our quest to constantly improve our courseware.
Ethical Hacking and Countermeasures Copyright by EC-COIMCil
All Rights Reserved. Reproduction is Strictly P rohibited.
T h i s p a g e i s i n t e n t i o n a l l y l e f t b l a n k .
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Welcome to Certified Ethical Hacker Class
T a b l e o f C o n t e n t s
Module Number Module Name Page No.
00 Student I ntroduction I
01 I ntroduction to Ethical Hacking 01
02 Footprinting and Reconnaissance 91
03 Scanning Networks 262
04 Enumeration 434
05 System Hacking 517
06 Trojans and Backdoors 827
07 Viruses and Worms 1006
08 Sniffing 1112
09 Social Engineering 1292
10 Denial of Service 1402
11 Session Hijacking 1503
12 Hacking Webservers 1600
13 Hacking Web Applications 1723
14 SQL I njection 1986
15 Hacking Wireless Networks 2134
16 Hacking Mobile Platforms 2392
17 Evading IDS, Firewalls, and Honeypots 2549
18 Buffer Overflow 2691
19 Cryptography 2782
| Penetration Testing 2872
References 2976
Ethical Hacking and Countermeasures Copyright by EC-COIMCil
All Rights Reserved. Reproduction is Strictly P rohibited.
T h i s p a g e i s i n t e n t i o n a l l y l e f t b l a n k .
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Welcome to Certified Ethical Hacker Class
W e l c o m e t o C e r t i f i e d E t h i c a l
H a c k e r C l a s s !
S tudent I ntr o duc ti o n
Engineered by Hackers. Presented by Professionals.
Q
CEH
E thi cal H ack i ng an d C o u n ter m easu r es
M odul e 00: W el come to C erti f i ed E thi cal H ack er C l ass
E xam 312-50
Module 00 Page I Ethical Hacking and Countermeasures Copyright by EC-C0l1nCil
All Rights Reserved. Reproduction is Strictly P rohibited.
Exam 312-50 Certified Ethical Hacker Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class
Copyright by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
C o u r s e M a t e r i a l s
I dentity
Card
/
^ 1
Lab Manual/
Workbook
Student
Courseware
i
V

&
CEH
B O O K
Course
Evaluation
Compact
Disc

Reference
Materials
V
Copyright O by EG-Gouncil. All Rights Reserved. Reproduction IsStrictly Prohibited.
Ethical Hacking and Countermeasures Copyright by EC-C0lMCil
All Rights Reserved. Reproduction is Strictly P rohibited.
Module 00 Page II
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Welcome to Certified Ethical Hacker Class
CEH C E H v 8 C o u r s e O u t l i n e
1 1 1
Introduction to E thical
Hacking
Trojans and Backdoors
[ 6 1
2
F ootprinting and
R econnaissance
Viruses and Worms
[ 7 ]
[ 3 ]
S canning Networks S niffing
[ 8 ]
[ 4 ]
E numeration Social E ngineering
9
5
S ystem Hacking Denial-of-S ervice
1 0 ]
Copyright by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
C E H v 8 C o u r s e O u t l i n e
r
1 1
r 1
Session Hijacking
L________________________________________________ J
r
Hacking M obile P latforms
L u
r
1 6
1

2
r ^
Hacking Webservers
L___ ___J
r
E vading IDS, F irewalls and
Honeypots
r
1 7
r
1
L.

3
J
r
Hacking Web A pplications
L. A
r
B uffer O verflows
L. A
r
1 8
'
1
L
.
SQL Injection
j
r
C ryptography
L A
r
1 9
J
1
5
r
Hacking Wireless Networks P enetration Testing
2 0
Copyright O by EG-Gouncil. All Rights Reserved. Reproduction IsStrictly Prohibited.
Ethical Hacking and Countermeasures Copyright by EC-C0UIICil
All Rights Reserved. Reproduction is Strictly P rohibited.
Module 00 Page I
Exam 312-50 Certified Ethical Hacker Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class
ECCounci l Cer t i f i cat i on Pr ogram I CEH
T here are several levels o f c ertification tracks under the E C -C ouncil A c c reditation body:
ECCouncil Disaster Recovery
P rofessional (EDRP)
EC-Council Certified Security
Analyst (ECSA)
EC-Council Certified Secure
P rogrammer (ECSP)
Certified Secure Application
Developer (CSAD)
Licensed P enetration Tester
(LPT)
Master of Security Science
(MSS)
L
C ertified Secure Computer
User(CSCU)
C ertified e-Business
P rofessional
EC-Council Certified
Security Specialist (ECSS)
EC-Council Network Security
Administrator (ENSA)
You are
here '
C ertified Ethical
Hacker(CEH)
C omputer Hacking Forensic
Investigator (CHFI)
Copyright by IG-GOUIICil. All Rights Reserved. Reproduction is Strictly Prohibited.
Cer t i f i ed Et hi c al Hac k er Tr ac k CEH
UrtifM Etbitji IU(h
CEH C ertification Track
Complete the following steps:
, s
Attend the Ethical Hacking and
Countermeasures Course
V'
Attend
Training
Prepare for
312-50 Exam
Fai l

v
Take
Exam
Pass
Certification
Achieved
Pass the CEH Exam
Exam Code: 312-50-ANSI (IBT),
312-50v8 (VUE), or 350CEHv8
(APTC)
EH
Cortifiad Ethiol Hi.U.
Copyright O by tG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and CountermeasuresCopyright by EC-C0UIICil
All Rights Reserved. Reproduction is Strictly P rohibited.
Module 00 Page IV
Exam 312-50 Certified Ethical Hacker Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class
CEH
J
C E H v 8 E x a m I n f o r m a t i o n
X Exam Title: Certified Ethical Hacker v8 (ANSI )
^ Exam Code: 312-50-ANSI (I BT), 312-50v8 (VUE), or 350CEHv8 (APTC)
Number of Questions: 125
Duration: 4 hours
7 Availability: Prometric Prime/ Prometric APTC/ VUE
Passing Score: 70%
The instructor will tell you about the exam schedule/ exam voucher
details for your training
This is a difficult exam and requires extensive knowledge of
CEH Core Modules
Copyright by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.
CEH S t u d e n t F a c i l i t i e s
Copyright O by EG-Gouncil. All Rights Reserved. Reproduction IsStrictly Prohibited.
Ethical Hacking and Countermeasures Copyright by EC-C0UIICil
All Rights Reserved. Reproduction is Strictly P rohibited.
Module 00 Page V
Exam 312-50 Certified Ethical Hacker Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class
L a b S e s s i o n s
Lab Sessions are designed to
reinforce the classroom sessions
The sessions are intended to
give a hands on experience only
and does not guarantee
proficiency
There are tons of labs in the lab
manual. P lease practice these
labs back at home.
Copyright by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.
W h a t D o e s C E H T e a c h Y o u ? C E H
Denial of Service, Trojans, Worms, Virus,
Social Engineering, Password cracking,
Session Hijacking, System failure, Spam,
Phishing, I dentity theft, Wardriving,
warchalking, bluejacking Lock picking,
Buffer Overflow, System hacking,
Sniffing, SQL I njection....
Ethical Hacking
Defense, Cisco Security, Firewalls,
I DS, Logs, Network, Antivirus,
Hardware, Troubleshooting,
Availability, Server/ Client Security,
creating policies, network
Management etc.....
Bad Guy
This is What CEH Teaches You!
Copyright O by EG-Gouncil. All Rights Reserved. Reproduction IsStrictly Prohibited.
Ethical Hacking and Countermeasures Copyright by EC-C0UIICil
All Rights Reserved. Reproduction is Strictly P rohibited.
Module 00 Page VI
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Welcome to Certified Ethical Hacker Class
CEH W h a t C E H i s N O T ?
CEH class is NOT a
Security Analysis training
program
> Please attend EC-
Council's ECSA class
for that
CEH class is NOT a
Network Security training
program
> Please attend EC-
Council's ENSA class
for that
CEH class is 100%
NETWORK OFFENSIVE
Training P rogram
*
CEH class is NOT a
Security Testing training
program
> Please attend EC-
Council's LPT class
for that
Copyright by IC-Coiincil. All RightsKeserved.:Reproduction is Strictly Prohibited.
CEH
UrtifWJ Etkwjl IUcW*
The CEH Pr og r am Teaches you 100%
Net wor k Of f ensi ve Tr ai n i n g and not
Def ensi ve
Copyright O by EG-Gouncil. All Rights Reserved. Reproduction IsStrictly Prohibited.
Ethical Hacking and Countermeasures Copyright by EC-C0UIICil
All Rights Reserved. Reproduction is Strictly P rohibited.
Module 00 Page VII
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Welcome to Certified Ethical Hacker Class
C E H C l a s s S p e e d C E H
C*rtfW< Itkitjl lUckM
The CEH class is extremely fast paced
The class "speed" can be compared to the climax scene from the movie
Mission Impossible (Bullet train sequence)
There are tons of hacking tools and hacking technologies covered in the
curriculum
The instructor WILL NOT be able to demonstrate ALL the tools in this class
He will showcase only selected tools
The students are required to practice with the tools not demonstrated in the
class on their own
Copyright by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.
CEH L i v e H a c k i n g W e b s i t e
n
J P lease target your exercises for "Live Hacking" to www.certifiedhacker.com
J This website is meant for the students to try the tools on live target
J P lease refrain from using the exploits on any other domains on the Internet
Certified Hacker
CEH Classroom
Attack Lab
Website
Copyright O by EG-Gouncil. All Rights Reserved. Reproduction IsStrictly Prohibited.
Ethical Hacking and Countermeasures Copyright by EC-C0UIICil
All Rights Reserved. Reproduction is Strictly P rohibited.
Module 00 Page VIII
Exam 312-50 Certified Ethical Hacker Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class
C E H N D A D o c u m e n t
Sign this
document and
hand it over to
the ins tructor
P lease read the
contents o f the
provided EC-
C ouncil's CEH
NDA document
P lease approach
the ins tructor if
you are not
presented with
this document
We will NOT start
the class unless
you sign this
document
Copyright by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.
A d v a n c e d L a b E n v i r o n m e n t C E H
Back Track S Windows 7
Virtual P latform
Windows Server
2008 (64 Bit)
Windows 8
u
I nstructor Machine Student Machines
I nstructor and Student Machine Operating System: Windows Server 2012 (Fully Patched)
Copyright O by EG-Gouncil. All Rights Reserved. Reproduction IsStrictly Prohibited.
Ethical Hacking and Countermeasures Copyright by EC-C0lMCil
All Rights Reserved. Reproduction is Strictly P rohibited.
Module 00 Page IX
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Welcome to Certified Ethical Hacker Class
S t u d e n t C o m p u t e r C h e c k l i s t C E H
W indows 8 as V M
W indows 7 as V M
BackTrack 5 R3 as VM
M l
Copyright by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.
S t u d e n t C o m p u t e r C h e c k l i s t C E H
tortifM Etkkjl bito
1 For Wireless Hacking module
you will need AirPcap adapter
Make sure you can access
RealHome and Powergym
websites at
http://localhost/realhome and
http://localhost/powergym
Check if you can access
http://www.certifiedhacker.com
Check if you can launch
command shell by right clicking
on a folder
Check if you can access Internet
and browse the web using IE,
Chrome, Safari and Firefox
Write down IP addresses of the
host and all the Virtual
Machines
Check if you can ping between
the VM and the hosts
Check for snapshots of Virtual
Machines
Make sure that you can access
D:\CEH-T00ls directory in Windows
Server 2012 and Z:\CEH-T00ls from
all the VM's; Z: is mapped Network
Drive contai ning CEH tools
Copyright O by EG-Gouncil. All Rights Reserved. Reproduction IsStrictly Prohibited.
Ethical Hacking and Countermeasures Copyright by EC-C0lMCil
All Rights Reserved. Reproduction is Strictly P rohibited.
Module 00 Page X
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Welcome to Certified Ethical Hacker Class
CEH
(*MM tlfcxjl MmM*
Pi ng Bet ween Vi r t u al Mac h i n es
and Host
Administrator: C:\W11xlows\systefr132yc1rxl.exe
wi t h 32 byt ee of dat a:
: bytoo-32 cimo<ln& TTL=128
4: bytes-32 cine <11*3 TTL-128
: byte332 timeClns TTL-128
: bytes-32 tine<11u TTL-128
<
=151 *I

G:M J 3er3snd1ini3trtor>ping 1
with 32 bytes of data:
3
: bytes-32 t. M - l m ITL-128
: bytes 32 t ine<lns ITL-128
: bytfv32 tifw dn s ITL-12*
: bytes-32 tifwC ins ITL-128
j'-" C:\Windows\system32\cmd.exe
1 1 ; 1
Reply fron t
Reply frow i
Reply from 1
Plus u ta tls tic v fu r 1
Pac)<otc: Sont 4 . R<
Approximate round c rip ti l
Min inum One. flax imui
C iMlaer*sndninistrAtor>_
1\AH11in>ping 1
: but 32 1 t ine-1fi* TTL-12R
leuly fra r t I : bytu- 32 tin<1fix 11I.-12N
leply fra*> I : byt-32 t >.e<1..x TTL-12N
tvply fm m 1 : byt632 t i 1w<inv 11L-12H
,111H c ta tlvticw fo r i
P ackotc: Sont - 4. Rocolvod 4 . Loot 0> 0 X 1000).
ipproxlnato round tr i p tinoa in nilli-oocondo:
tllninun One. tfaxinun - ino. flvoraqo Ono
:1N4Urs\Hd1in>_
Copyright by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
(rtifwd Ethical >U(hM
CEH-Tool s Di r ect or y i n Wi ndows
Server 2012 (D: \CEH-Tool s)
V_J I * 1 DrMTOMI N<w Volume (t>)
| Home Share View V O
( $ ) ( )' * Computr NwVolum*(0:) V C1 1 Sairch NwVolum*(D:) P | |
1 )V Fivcrittc
D*ktap
4Download)
* Recent place [ ,
SRECYCIE.BIN CEH-Todv Syler Volume
Information
3 Documents
J '' Music
m! Pictures
9 Videos
Computer
i i . Local Disk (G)
1j NewVolume (D:)
* I I
*
*I Network
?items
Copyright O by EG-Gouncil. All Rights Reserved. Reproduction IsStrictly Prohibited.
Ethical Hacking and Countermeasures Copyright by EC-C0UIICil
All Rights Reserved. Reproduction is Strictly P rohibited.
Module 00 Page XI
Exam 312-50 Certified Ethical Hacker Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class
Copyright by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
Map p ed Net wor k Dr i v e (Z: ) i n
Wi ndows Ser ver 2008 VM
-J nl*J
to - vn |sedl(J
o o
|.|T 0U I 5H I . I f t mSm m
* ! 1 * 1
Mamt
Computer * *
F!c d1t View Jo1 d*P
t)es urrstai or :range aprog'a* *j t viapnerA-orkdrive fste^pr0pe !<, y f Properties orgarize j j j views
Favonte bn<s
Docurrentt
Pictures
muo :
15 1 ^ ecendy Changed
f l Searches
^ ublc
Rcppy Dak Drive
CDDrive
Hard Disk Drives (1)
&.ocal Disk (Cl)
Device* wltli Removable Storage (2)
hj j loppy Dis<Orre (*:)
^ DVDDrive(D!)
Network L ocation (1)
J J
Copyright O by EG-Gouncil. All Rights Reserved. Reproduction IsStrictly Prohibited.
Module 00 Page XII Ethical Hacking and Countermeasures Copyright by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly P rohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Welcome to Certified Ethical Hacker Class
CEH
tlfcxjl MmM*
Map p ed Net wor k Dr i v e (Z: ) i n
Wi ndows 7 VM
G Z I C l L l I ^
, v | : . Computet 1 | SeorcA Ccrr.outer p 1
Organize Properties System properties Uninstall or charge a program Map net A/ork drive [j|p (Jjj O
A Favorites
E Desktop
m Downloads
^ Recent Places
Libraries
1 Documents
^ Music
B Pictures
Q Videos
- Har d Di sk Dr i v es (1)
Local Disk (C:]
f t i / * 6.37 G3*' reeo*' 158 G3
' Devi ces wiTh Removabl e St or age (2)
Floppy Disk Drive (A:) DVD Drive (DO
' Net wor k Locati on (1)
CEH-Tools <\\ (Z:)
: Computer
*' p Network
* j f j B tree of 269 OB
r H-Tnnl c (\\107.1f i f t 1Ml 11J) (7) I Tntalc*
Network Drive Spacefree: 365 GB Fie system: NTFS
Copyright by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.
L a u n c h i n g C o m m a n d S h e l l
: NewVolume [D.)
. .
Administrator: C:\Wind0ws\system32\cmd.exe
lnrlud*<nMx*ry
] *Jdl smlw.
'M AddM'CEHTootuar'
'3 Cmpn*nj mtJ_
9 CompmstoCERToofc-rjr *
C'tttt
0t<
* I
CEH
(rtifwd Ethical >U(hM
copyright by EG-Gouncil. All Rights AeServfeifc;Reproduction is Strictly Probfbited.
Module 00 Page XIII Ethical Hacking and Countermeasures Copyright by EC-C0UnCll
All Rights Reserved. Reproduction is Strictly P rohibited.
Ethical Hacking and Countermeasures Exam312-50 Certified Ethical Hacker
Welcome to Certified Ethical Hacker Class
C E H
tlfcxjl MmM*
S n a p s h o t s o f V i r t u a l M a c h i n e s
I I
Hyper-V M anager
File Action View Help
* * I 8 1! 0 1
WIN-ROPCM8VKVOQ
New
Import Virtual Machine...
Hyper-V Settings...
55 Virtual SAitch Manager...
^ Virtual SAN Manager...
Edit Disk...
Inspect Disk,..
() Stop Service
^ Remove Server
Q Refresh
View
Q Hp
Windows7
Connect...
f r l Sfttingc..
() Turn Off...
0 Shut Down...
Q Save
| | Paute
Reset
V i rtual M achi nes
CPU Usage AssignedMemory Up*
1024MB
024 M3
Ch^lrrrtt 10
hedrtbedt: DKfSb/ tuk
settings..
Turn Off..
Shut Down..
Save
Pause
Reset
| Snapshot
Revert..
Rename..
EnableReplication ..
Help
=j B32k Track6
Windows 3
j Windows 2002Server
Snapshots
gj, Wrdo*3 7-(4/16/
H Now

Sumrray Moray Nfcsvwxtjng [ Rcpkdton


j j Hyper-V Manager
^3 WI N-ROPCM8VKVOQ
Copyright by I G-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.
C E H
(rtifwd Ethical >U(hM
A i r P c a p
Copyright O by EG-Gouncil. All Rights Reserved. Reproduction IsStrictly Prohibited.
Module 00 Page XIV Ethical Hacking and Countermeasures Copyright by EC-C0UnCll
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam312-50 Certified Ethical Hacker
Welcome to Certified Ethical Hacker Class
P o w e r g y m a n d R e a l H o m e . . . .
w v ? C E H
W e b s i t e s
c [ toMlfOS ; ./rq>nV t
-> n 1 kMMltnc kMh 1
Real Home!
\ KKr rs I TING stlJ
tin Supp*rt 1 FAQ* Sitenap t :Irip ! *
IAC1 US LING KI.NIIM' liASINO CUX
LOGIN
RealHome: http://localhost/realhome
Copyright by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.
Powergym: http://localhost/powergym
C E H
L i v e H a c k W e b s i t e
http://www. certifiedhacker. com
CEH Labs
CEH Labs
CEH Labs
CEH Labs
JuGGY B0V
unite
N i fc t i
J
Copyright O by EG-Gouncil. All Rights Reserved. Reproduction IsStrictly Prohibited.
Ethical Hacking and Countermeasures Copyright by EC-C0UIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Module 00 Page XV
Ethical Hacking and Countermeasures Exam312-50 Certified Ethical Hacker
Welcome to Certified Ethical Hacker Class
C E H
L e t s S t a r t H a c k i n g
Copyright by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.
Module 00 Page XVI Ethical Hacking and Countermeasures Copyright by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly Prohibited.

You might also like