You are on page 1of 4

E thical H acking and

C ounterm easures
Lab Manual

Ethical Hacking and Countermeasures

Exam 312-50 Certified Ethical Hacker

EC-Council
Copyright 2013 by EC-Cou 11cil. All rights reserved. Except as permitted under the Copyright Act
o f 1976, no part o f tins publication may be reproduced or distributed 111 any form or by any means,
or stored 111 a database or retrieval system, without the prior written permission o f the publisher,
with the exception that the program listings may be entered, stored, and executed 111 a computer
system, but they may not be reproduced for publication.
Information has been obtained by EC-Council from sources believed to be reliable. EC-Council
uses reasonable endeavors to ensure that the content is current and accurate, however, because o f
the possibility o l human or mechanical error we do not guarantee the accuracy, adequacy, or
completeness o l any information and are not responsible for any errors or omissions or the accuracy
o f the results obtained from use o f such information.
The courseware is a result o f extensive research and contributions from subject matter experts from
the field from all over the world. Due credits for all such contributions and references are given in
the courseware in the research endnotes. We are committed towards protecting intellectual
property. It you are a copyright owner (an exclusive licensee or their agent), and if you believe
that any part o f the courseware constitutes an infringement o f copyright, or a breach o f an agreed
licence or contract, you may notify us at le g a l@ e c c o u n c il.o r g . 1 1 1 the event o f a justified complaint,
EC-Council will remove the material 111 question and make necessary rectifications.
The courseware may contain references to other information resources and security solutions, but
such references should not be considered as an endorsement o f 01 recommendation by EC-Council.
Readers are encouraged
at le g a l@ e c c o u n c il.o r g .

to

report

errors,

omissions

and

inaccuracies

If you have any issues, please contact s u p p o r t@ e c c o u n c il.o r g .

Ethical Hacking and Countermeasures


All Rights Reserved. Reproduc

to

EC-Council

Ethical Hacking and Countermeasures

Exam 312-50 Certified Ethical Hacker

Table of Contents
M odule N tim b er

M odule N a m e

P age N o .

01

Introduction to E th ical H a ck in g

02

F ootprin ting and R econ n aissan ce

01

03

Scan n in g N etw ork s

84

04

E n u m eration

266

05

System H a ck in g

307

06

Trojans and B ackdoors

424

07

V iruses and W orm s

529

08

Sniffing

584

09

Social E n g in eerin g

674

10

D en ia l o f Service

702

11

S ession H ijack in g

715

12

H a ck in g W ebservers

730

13

H a ck in g W eb A pplications

761

14

SQ L Injection

781

15

H a ck in g W ireless N etw ork s

818

16

H a ck in g M obile Platform s

17

E vad in g ID S, Firew alls, and H o n ey p o ts

846

18

Buffer O verflow

901

19

Cryptography

914

20

Penetration T e stin g

Ethical Hacking and Countermeasures Copyright by EC-COlMCil


All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures

Exam 312-50 Certified Ethical Hacker

Labs DVD Contents


DVD

Contents

01

L ab P rereq u isites, M odule 02 - M odule 04

02

M odule 05 - M odule 07

03

M odule 08 - M odule 11

04

M odule 12 - M odule 14

05

M odule 15 - M odule 17

06

M odule 18 - M odule 20, B ack T rack

Ethical Hacking and Countermeasures Copyright by EC-COlMCil


All Rights Reserved. Reproduction is Strictly Prohibited.

You might also like