You are on page 1of 26

E thical H acking and C o u n te rm e a su re s Exam 3 1 2 -5 0 C e rtifie d E th ica l H acker

W e lc o m e t o C e rtifie d E th ica l H a cke r Class

T A W c D 0 lU n
w w w .ta k e d o w n c o n .c o m

T A K E D 0 1 U I1 is a h a c k in g c o n fe re n c e th a t w a s co n c e iv e d by o u r m e m b e rs !
EC -C ouncil h a s b e e n flo o d e d w ith re q u e s ts to ta k e o u r w o rld -c la s s c o u rs e s o n th e ro a d !
W e have a n s w e re d th e c a ll a n d c re a te d T a keD ow nC on!
T h is c o n fe re n c e w ill be fo c u s e d on th e le a rn e r a n d w ill fe a tu re
s e v e ra l C e rtific a tio n & C e rtific a te T ra in in g c o u rs e s fo r A d va n ce d P ra c titio n e rs !

TTAKEDC
A K O O U JH w ill h o s t E C -C ouncil's s o u g h t a fte r H a ckin g , F o ren sics a n d Pen T est c o u rs e s ,
C e rtifie d W ire le s s S e c u rity P ro fe ssio n a l, a n d s e v e ra l h ig h ly te c h n ic a l a n d a d v a n c e d w o rk s h o p s
w h ic h w ill c o v e r c u r re n t a n d im p o rta n t s e c u rity to p ic s s u c h a s a d v a n c e d p e n e tra tio n te s tin g ,
c ry p to g ra p h y , n e tw o rk d e fe n s e , a p p lic a tio n s e c u rity a n d m o b ile fo re n s ic s .

A t T A K C D O llin th e le a rn in g d o e s n 't s to p w h e n th e tra in in g e n d s l


W e h a ve lin e d up a lis t o f s o u g h t a fte r in d u s try p ra c titio n e rs a n d
s u b je c t m a tte r e x p e rts th a t w ill p re s e n t re le v a n t a n d im p le m e n ta b le to p ic s !

For more information, about TAKEDOllin please visitit w w w .ta k e d o w n c o n .c o m


■ &j 11^:•jp_ _ *.\

H acker H alted
w w w .h a c k e rh a lte d .c o m

. 1 i * I i *‫•־‬
S ince 2 0 0 4 EC-Council ha s ho ste d 2 0 H acker H alted e ve n ts a cro ss fo u r c o n tin e n ts and
in c itie s s u c h as M y rtle B each, M ia m i, D ubai, S ingap ore , H ong Kong, M exico City,
Tokyo, K uala Lum pur, G uangzhou, Taiper a n d Cairo.

H acker H alted N o rth A m erica w ill be held in M ia m i fo r th e 3 rd ye a r in a row an d


ba sed on p a s t h is to ry is su re to b o a st an a m a z in g tu rn o u t o f In fo rm a tio n S e cu rity P rofe ssionals!

H acker H alted is m o re th a n ju s t a c o n fe re n c e eve nt; p ra c titio n e rs tra v e l fro m all over th e w orld
to a tte n d o u r w o rld -c la s s tra in in g , ga in p ra c tic a l k n o w le d g e fro m o u r e x p e rt p re s e n te rs and
g e t a preview o f th e la te s t te c h n o lo g ie s an d In fo rm a tio n S e c u rity to o ls
w h ic h w ill be sh o w ca se d by o u r e x h ib ito rs an d p a rtn e rs .

For more information, about Hacker Halted please visit

E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t © by EC-COUDCil


A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .
E thical H acking and C o u n te rm e a su re s Exam 3 1 2 -5 0 C e rtifie d E th ica l H acker
W e lc o m e t o C e rtifie d E th ica l H a cke r Class

V A M P IR E
w w w .v a m p ire te c h .c o m

Is yo u r w ebsite vulne rab ly to an attack? Could hackers e xp lo it a small weakness in you r w ebsite and o b tain access
to sensitive com pany info rm atio n?

VampireScan allow s users to test th e ir ow n Cloud and W eb ap plication s against advanced attacks and receive
actionable results all w ith in th e ir ow n Web portal. O ur easy to use on lin e p o rta l w ill sim ply ask you fo r th e URL o f
your w e b application, fro m there, o u r Services d o th e rest.

For a lim ite d tim e, VampireTech is offering its Baseline Scan free o f charge to q u alified custom ers. This en titles you
to one Free H ealth Check fo r one do m a in u tiliz in g o u r Baseline Scan. This Scan w ill test fo r Cross-site S cripting
V ulnerabilities, Non-SSL Passwords, and Password A utoco m plete.

f c

V Global CISO Executive Summit

Be on th e fo re fro n t o f a ne w g lo b a l in itia tiv e w here today's w orld-class leaders in in fo rm a tio n security w ill g a th e r to
na vig ate th ro u g h in te rn a tio n a l waters. Join these leaders as th e y fo llo w th e w in d o f change th a t is sw eeping th ro u g h
th e IS c o m m u n ity m o tiv a tin g today's in fo rm a tio n guardians to d e velop a new w ay o f th in k in g to ensure success in
p ro te c tin g th e ir respective organizations.

The goal o f EC-Council's Global CISO Forum is to create an op en p la tfo rm fo r to p in fo rm a tio n security executives to
discuss th e ir successes, failures, obstacles, and challenges. The open conversation w ill lead to th e creation o f
a c tio n a b le item s th a t can be discussed and ap p lie d to th e organiza tion.

For M o re Inform ation A b o u t CISO Executive S u m m it Please Visit: w w w .e cco u n c il.o rg /re so u rce s/ciso -e xe cu tlv e -su m m it.a sp x

E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t © by EC-COUDCil


A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .
E thical H acking and C o u n te rm e a su re s Exam 3 1 2 -5 0 C e rtifie d E th ica l H acker
W e lc o m e t o C e rtifie d E th ica l H a cke r Class

H o w to D o w n lo a d M y C E H v 8 E - C o u r s e w a r e a n d A d d itio n a l
L a b M a n u a ls ?

P le a s e f o l l o w t h e s t e p s b e l o w to d o w n l o a d y o u r C EH v8 e - c o u r s e w a r e a n d
a d d i t i o n a l la b m a n u a l.

S t e p 1:
Visit: https://academ ia.eccouncil.org. If you have an account already, skip to Step 4.

S t e p 2:
Click Register and fill out the registration form.

S te p 3:
Using the email you provided in step 2, follow the instructions in the auto-generated
email to activate your Academ ia Portal account.

S t e p 4:
Login using your Username and Password.

S t e p 5:
Once successfully logged in, expand the About A cadem ia navigation menu and select
A ccess Code.

S t e p 6:
Enter the access code provided to you to redeem access to the CEH V8 e-Courseware
and Lab Manuals.

Access Code: XXXXXXXXXXXXXXXX


S te p 8:
Once redeemed, expand the C ourses menu and select iLearn - PDF C oursew are - The
resulting page will list your CEH v8 e-Courseware and Lab Manuals.

S u p p o rt:
E-mail support is available from academia(5>eccouncil.org.

S y s te m R e q u ire m e n ts :
Visit https://academ ia.eccouncil.ore/AboutAcadem ia/W hatisiLearn.aspx to view the
system requirements.

E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t © by EC-C0UIICil


A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .
E thical H acking and C o u n te rm e a su re s Exam 3 1 2 -5 0 C e rtifie d E th ica l H acker
W e lc o m e t o C e rtifie d E th ica l H a cke r Class

D o w n lo a d C la s s C e r t if ic a t e o f A t t e n d a n c e

IC -C o u n c il
T H I S IS T O A C K N O W L E D G E T H A T

H A S SUCCESSFULLY C O M P L E T E D A C O U K S E O N

A T A N E C - C O U N C IL A C C R E D IT E D T R A IN IN G CENTER

I n s tru c to r D ate

T R A IN IN G C E N T E R :

h ttp ://w w w .e cco u n cil.o rg EC‫־‬C011ncil

Please fo llo w the below stated steps to dow nload digital copy (PDF format) of your class
certificate of attendance.

Step 1: W a it until the class is over (the last of the class).

Step 2: Visit http://w w w .eccouncil.org/eval.

Step 3: Com plete the course evaluation form (please com plete all the fields in the form -
correct e-mail address is required).

Step 4: Evaluation code is required to subm it the form. See the attached code.

Step 5: Submit the form.

Step 6: A w eb link will be sent to you to dow nload your PDF copy of the certificate.

C o u r s e E v a l u a t i o n C o d e : *‫* ״‬CEH‫” ” ”* ” ־‬

E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t © by EC-COIMCil


A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .
E t h i c a l H a c k i n g a n d

C o u n t e r m e a s u r e s

Version 8
E thical H acking and C o u n te rm e a su re s Exam 3 1 2 -5 0 C e rtifie d E thical H acker
W e lc o m e t o C e rtifie d E th ica l H a cke r Class

E C -C o u n c il

Copyright © 2013 by EC-Council. All rights reserved. Except as permitted under the Copyright Act
o f 1976, no part o f this publication may be reproduced or distributed 111 any form or by any means,
or stored 111 a database or retrieval system, without the prior written permission o f the publisher,
with the exception that the program listings may be entered, stored, and executed 111 a computer
system, but they may not be reproduced for publication.
Inform ation has been obtained by EC-Council from sources believed to be reliable. EC-Council
uses reasonable endeavors to ensure that the content is current and accurate, however, because of
the possibility ot human or mechanical error we do not guarantee the accuracy, adequacy, or
completeness ot any information and are not responsible for any errors or omissions or the accuracy
o f the results obtained from use o f such information.
The courseware is a result o f extensive research and contributions from subject matter experts from
the field from all over the world. Due credits for all such contributions and references are given in
the courseware in the research endnotes. We are committed towards protecting intellectual
property. If you are a copyright owner (an exclusive licensee or their agent), and if vou believe
that any part o f the courseware constitutes an infringement o f copyright, or a breach o f an agreed
licence or contract, you may notify us at legal@ eccouncil.org. 111 the event o f a justified complaint,
EC-Council will remove the material 111 question and make necessary rectifications.
The courseware may contain references to other information resources and security solutions, but
such references should not be considered as an endorsement o f or recommendation by EC-Council.
Readers are encouraged to report errors, omissions and inaccuracies to EC-Council
at legal@ eccouncil.org.
If vou have any issues, please contact support@ eccouncil.org.

E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t © by EC-COUDCil


A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .
E thical H acking and C o u n te rm e a su re s Exam 3 1 2 -5 0 C e rtifie d E th ica l H acker
W e lc o m e t o C e rtifie d E th ica l H a cke r Class

F o r e w o r d

Since you are reading this CEHv8 courseware, you most likely realize the im portance of
inform ation systems security. However, we would like to put forth our motive behind compiling
a resource such as this one and w hat you can gain from this course.

You might find yourself asking w hat sets this course apart from the others out there. The truth
is that no single courseware can address all the issues of inform ation security in a detailed
manner. M oreover, the rate at which exploits, tools, and m ethods are being discovered by the
security c om m un ity makes it difficult for one program to cover all the necessary facets of
inform ation security. This doesn't mean that this course is inadequate in any way as we have
worked to cover all major dom ains in such a m anner that the reader will be able to appreciate
the way security has evolved over tim e as well as gain insight in to the fundam ental workings
relevant to each domain. It is a blend of academ ic and practical w isdom supplem ented with
tools that the reader can readily access in order to obtain a hands-on experience.

The emphasis through out the courseware is on gaining practical know-how, which explains the
stress on free and accessible tools. You will read about some of the most widespread attacks
seen, the popular tools used by attackers, and how attacks have been carried out using
ordinary resources.

You may also w ant to know w hat to expect once you have com pleted the course. This
coursew are is a resource material. Any penetration tester can tell you that there is no one
straight m ethodology or sequence of steps that you can follow w hile auditing a client site.
There is no one tem plate that will meet all your needs. Your testing strategy will vary with the
client, the basic inform ation about the system or situation, and the resources at your disposal.
However, for each stage you choose - be it enumeration, firewall, penetration of other
dom ains - you will find som ething in this coursew are that you can definitely use.

Finally this is not the end! This courseware is to be considered a constant work-in-progress
because we will be adding value to this courseware over time. You may find some aspects
extrem ely detailed, w hile others may have less detail. W e are constantly asking ourselves if the
content helps explain the core point of the lesson, and w e constant calibrate our material with
that in mind. W e w ould love to hear your view points and suggestions so please send us your
feedback to help in our quest to constantly im prove our courseware.

E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t © by EC-COIMCil


A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .
T h is p a g e is in te n tio n a lly le ft b la n k .
E thical H acking and C o u n te rm e a su re s Exam 3 1 2 -5 0 C e rtifie d E th ica l H acker
W e lc o m e t o C e rtifie d E th ica l H a cke r Class

T a b le o f C o n te n ts

M odule N u m b e r M odule N a m e P ag e N o.

00 S tu d en t In tro d u ctio n I

01 In tro d u ctio n to E th ical H a c k in g 01

02 F o o tp rin tin g an d R eco n n aissan ce 91

03 S can n in g N etw o rk s 262

04 E n u m e ra tio n 434

05 System H a c k in g 517

06 T ro jan s an d B ackdoors 827

07 V iruses an d W orm s 1006

08 Sniffing 1112

09 Social E n g in e e rin g 1292

10 D en ial o f Service 1402

11 Session H ijack in g 1503

12 H a c k in g W ebservers 1600

13 H a c k in g W eb A pplications 1723

14 SQ L In jectio n 1986

15 H a c k in g W ireless N etw o rk s 2134

16 H a c k in g M obile P latform s 2392

17 E v ad in g ID S, Firew alls, an d H o n ey p o ts 2549

18 Buffer O verflow 2691

19 C ryptography 2782

» | P en etratio n T e stin g 2872

R eferences 2976

E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t © by EC-COIMCil


A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .
T h is p a g e is in te n tio n a lly le ft b la n k .
E thical H acking and C o u n te rm e a su re s Exam 3 1 2 -5 0 C e rtifie d E th ica l H acker
W e lc o m e t o C e rtifie d E th ica l H a cke r Class

W e lc o m e to C e r t if ie d E t h ic a l

H a c k e r C la s s !
S tu d e n t I n tr o d u c tio n

Engineered by Hackers. Presented by Professionals.

CEH
Q

E th ic a l H a c k in g a n d C o u n te r m e a s u r e s

M o d u le 0 0 : W e l c o m e to C e r t i f i e d E th ic a l H a c k e r C la s s

E x a m 3 1 2 -5 0

M o d u le 00 Page I E th ica l H ackin g a n d C o u n te rm e a s u re s C o p y rig h t © by EC-C0l1nCil


A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .
E thical H acking and C o u n te rm e a su re s Exam 3 1 2 -5 0 C e rtifie d E thical H acker
W e lc o m e t o C e rtifie d E th ic a l H a c k e r Class

Copyright © by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

C o u rs e M a te r ia ls CEH

/
Identity
^ 1 Card

‫־‬i ‫׳‬
‫־‬V Student Lab M a n u a l/
‫ע־‬ CEH

‫עין‬ BOOK
Courseware W orkbook
&

Compact Course
Disc Evaluation

‫ץ־‬
Reference
Materials
V

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

M o d u le 00 Page II E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t © by EC-C0lMCil


A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .
E thical H acking and C o u n te rm e a su re s Exam 3 1 2 -5 0 C e rtifie d E th ica l H acker
W e lc o m e t o C e rtifie d E th ica l H a cke r Class

C E H v 8 C o u rs e O u tlin e CEH

In t r o d u c t io n t o E th ic a l
T r o ja n s a n d B a c k d o o rs
1 1 1 H a c k in g [ 6 1

F o o tp r in tin g a n d
V iru s e s a n d W o r m s
2 R e c o n n a is s a n c e [ 7 ]

S c a n n in g N e tw o r k s S n iffin g
[ 3 ] [ 8 ]

E n u m e r a tio n S o c ia l E n g in e e rin g
[ 4 ] 9

S y s te m H a c k in g D e n ia l-o f- S e rv ic e
5 ‫י‬ 1 0 ]

Copyright © by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

C E H v 8 C o u rs e O u tlin e CEH

r ‫ד‬ r 1 r ‫ יי‬r ‫י־‬

S e s s io n H ija c k in g H a c k in g M o b ile P la tfo r m s


1 1 1 6
L________________________________________________ J L u
‫ יי‬r ^ r ‫ד‬ r ‫די‬

E v a d in g IDS, F ir e w a lls a n d
H a c k in g W e b s e rv e rs
1 2 H o n e y p o ts 1 7
L___ ___J
r ‫יי‬ r ‫י־‬ r ‫ר‬ r ‫יי‬

H a c k in g W e b A p p lic a tio n s B u ffe r O v e r flo w s


1 3 1 8
L. J L. A L. A
' r r ‫י‬

SQL In je c tio n C r y p to g r a p h y
1 . ‫ו‬ 1 9
L j L A J
r ‫די‬

H a c k in g W ire le s s N e tw o r k s P e n e tr a tio n T e s tin g


1 2 0
5

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

M o d u le 00 Page I E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t © by EC-C0UIICil


A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .
E thical H acking and C o u n te rm e a su re s Exam 3 1 2 -5 0 C e rtifie d E thical H acker
W e lc o m e t o C e rtifie d E th ica l H a cke r Class

EC‫־‬Council Certification Program I CEH

T h e r e a r e s e v e ra l le v e ls o f c e r t if ic a t io n tr a c k s u n d e r t h e E C -C o u n c il A c c r e d it a t i o n b o d y :

C e rtifie d S ecure C o m p u te r EC‫־‬C o u n cil D isa ste r R ecove ry


U ser(C SC U ) P ro fe ssio n a l (EDRP)

C e rtifie d e-B usiness EC-Council C e rtifie d S e c u rity


P ro fe s s io n a l A n a ly s t (ECSA)
— L
EC-Council C e rtifie d EC-Council C e rtifie d Secure
S e c u rity S pe c ia lis t (ECSS) P ro g ra m m e r (ECSP)

EC-Council N e tw o r k S e c u rity C e rtifie d Secure A p p lic a tio n


A d m in is tr a to r (ENSA) D e v e lo p e r (CSAD)

C e rtifie d E thical You are Licensed P e n e tra tio n Tester


H acker(C E H ) here ' (LPT)

C o m p u te r H acking Forensic M a s te r o f S e c u rity Science


In v e s tig a to r (CHFI) (MSS)

Copyright © by IG-GOUIICil. All Rights Reserved. Reproduction is Strictly Prohibited.

C e rtifie d E th ic al H a c k e r T ra c k C EH
UrtifM Etbitji IU(h«

CEH C e r t if ic a t io n T ra c k
Com plete th e fo llo w in g steps:

A tte n d th e Ethical H acking and s, ‫״ ־‬


C ou n term e asu res Course
V'
Attend
Training

Pass th e CEH Exam


Prepare for
Exam Code: 312-50-ANSI (IBT),
312-50 Exam
312-50v8 (VUE), o r 350CEHv8
(APTC) v
Take Fail
Exam
‫אי‬
Pass

Certification

Cortifiad
EH
Ethiol H i.U .
Achieved

Copyright O by tG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

M o d u le 00 Page IV E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t © by EC-C0UIICil


A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .
E thical H acking and C o u n te rm e a su re s Exam 3 1 2 -5 0 C e rtifie d E thical H acker
W e lc o m e t o C e rtifie d E th ica l H a cke r Class

C E H v 8 E x a m In fo r m a tio n CEH

‫״‬X E xam T itle : C e rtifie d E th ic a l H a ck e r v8 (ANSI)

^ E xam C od e: 3 12 -5 0-A N S I (IBT), 3 1 2 -5 0 v 8 (V U E ), o r 3 5 0 C E H v 8 (APTC)

N u m b e r o f Q u e s tio n s : 125

D u ra tio n : 4 h o u rs

7 A v a ila b ility : P ro m e t ric P r im e / P ro m e t ric A P T C / V U E

P a ssin g Score: 70%

T h e in s tru c to r w ill te ll y o u a b o u t th e e x a m s c h e d u le / e x a m v o u c h e r
d e ta ils fo r y o u r tra in in g

T h is is a d iffic u lt e x a m a n d re q u ire s e x te n s iv e k n o w le d g e o f
CEH C o re M o d u le s

J
Copyright © by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

S tu d e n t F a c ilitie s CEH

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

M o d u le 00 Page V E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t © by EC-C0UIICil


A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .
E thical H acking and C o u n te rm e a su re s Exam 3 1 2 -5 0 C e rtifie d E thical H acker
W e lc o m e t o C e rtifie d E th ica l H a cke r Class

L a b S e s s io n s

Lab S essions a re d e s ig n e d to
r e in fo r c e th e c la s s ro o m sessio n s

T h e ses s io n s a re in te n d e d to
g iv e a h a n d s o n e x p e r ie n c e o n ly
a n d d o e s n o t g u a ra n te e
p ro fic ie n c y

T h e re a re to n s o f la b s in th e la b
m a n u a l. P lease p r a c tic e th e s e
la b s b a c k a t h o m e .

Copyright © by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

W h a t D oes C E H T each You? CEH

D e n ia l o f Service, Trojans, W o rm s , V iru s,


D e fe n se , C is co S e cu rity , F ire w a lls ,
S o cia l E n g in eerin g , Pa ssw o rd cra ckin g,
IDS, Logs, N e tw o rk , A n tiv iru s ,
S ession H ija ckin g , System fa ilu re , Spam ,
H a rd w a re , T ro u b le s h o o tin g ,
P h ish in g , Id e n tity th e ft, W a rd riv in g ,
A v a ila b ility , S e r v e r/ C lie n t S e cu rity ,
w a rc h a lk in g , b lu e ja ck in g Lock pick in g ,
c re a tin g p o lic ie s , n e tw o r k
B u ffe r O v e rflo w , System hackin g ,
M a n a g e m e n t e tc .....
S n iffin g , SQL In je ctio n ....

Ethical Hacking

Bad G uy

This is W hat CEH Teaches You!

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

M o d u le 00 Page VI E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t © by EC-C0UIICil


A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .
E thical H acking and C o u n te rm e a su re s Exam 3 1 2 -5 0 C e rtifie d E th ica l H acker
W e lc o m e t o C e rtifie d E th ica l H a cke r Class

W h a t C E H is N O T ? CEH

CEH class is NOT a CEH class is NOT a


N etw o rk Security training Security Analysis training
program program

> Please attend EC- > Please attend EC-


Council's ENSA class Council's ECSA class
for that for that

CEH class is NOT a


* Security Testing training
program CEH class is 100 %
NETW ORK OFFENSIVE
> Please attend EC-
Council's LPT class T ra in in g P ro g ra m
for that

•Copyright © by IC-Coiincil. All RightsKeserved.:Reproduction is Strictly Prohibited.

CEH
UrtifWJ Etkwjl IUcW*

The C EH P ro g ra m Teaches you 100%


N etw o rk O ffensive T ra in in g and not
D efensive

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

M o d u le 00 Page VII E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t © by EC-C0UIICil


A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .
E thical H acking and C o u n te rm e a su re s Exam 3 1 2 -5 0 C e rtifie d E th ica l H acker
W e lc o m e t o C e rtifie d E th ica l H a cke r Class

C E H C la s s S p e e d ™
CEH
C*rt‫׳‬fW< Itkitjl lUckM

T h e CEH class is e x tr e m e ly fa s t p a c e d

T h e class " s p e e d " c an b e c o m p a re d t o th e c lim a x s c e n e fr o m th e m o v ie


M is s io n Im p o s s ib le (B u lle t tr a in s e q u e n c e )

T h e re a re to n s o f h a c k in g to o ls a n d h a c k in g te c h n o lo g ie s c o v e re d in th e
c u r r ic u lu m

T h e in s tr u c to r W IL L N O T b e a b le to d e m o n s tra te A LL th e to o ls in th is class

H e w ill s h o w c a s e o n ly s e le c te d to o ls

T h e s tu d e n ts a re re q u ire d to p ra c tic e w i t h t h e to o ls n o t d e m o n s tra te d in th e


class o n t h e ir o w n

Copyright © by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

L iv e H a c k in g W e b s ite CEH

J P lease ta r g e t y o u r e x e rc is e s f o r "L iv e H a c k in g " t o w w w .c e rtifie d h a c k e r.c o m

J T h is w e b s ite is m e a n t f o r th e s tu d e n ts to t r y th e to o ls o n liv e ta r g e t

J P lease re fra in fr o m u s in g th e e x p lo its o n a n y o t h e r d o m a in s o n th e In te r n e t n

C e rtifie d H a c k e r

CEH C la s s ro o m
A tta c k Lab
W e b s ite

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

M o d u le 00 Page VIII E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t © by EC-C0UIICil


A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .
E thical H acking and C o u n te rm e a su re s Exam 3 1 2 -5 0 C e rtifie d E thical H acker
W e lc o m e t o C e rtifie d E th ic a l H a c k e r Class

N D A D o cu m en t CEH

P le a s e re a d th e
S ign th is
c o n te n ts o f th e
d o cu m e n t and
p r o v id e d EC-
h a n d i t o v e r to
C o u n c il's CEH
t h e in s t r u c t o r
NDA d o cu m e n t

W e w i l l N O T s ta r t P le a s e a p p ro a c h
t h e class u n le s s t h e in s t r u c t o r if
y o u s ig n th is y o u a re n o t
docum ent p r e s e n te d w i t h
th is d o c u m e n t

Copyright © by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

A d v a n c e d L a b E n v ir o n m e n t CEH

W in d o w s S e rv e r
W in d o w s 8 W in d o w s 7 B a ck Tra ck S
2 00 8 (64 Bit)

V irtu a l P la tfo rm

I n s t r u c t o r M a c h in e S t u d e n t M a c h in e s

I n s tr u c to r a n d S t u d e n t M a c h in e O p e r a t in g S y s te m : W in d o w s S e r v e r 2 0 1 2 ( F u lly P a tc h e d )

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

M o d u le 00 Page IX E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t © by EC-C0lMCil


A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .
E thical H acking and C o u n te rm e a su re s Exam 3 1 2 -5 0 C e rtifie d E th ica l H acker
W e lc o m e t o C e rtifie d E th ica l H a cke r Class

S tu d e n t C o m p u te r C h e c k lis t CEH

W in d o w s 8 a s V M

W in d o w s 7 as V M

M l
B a c k T ra c k 5 R3 as V M

Copyright © by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

S tu d e n t C o m p u te r C h e c k lis t CEH
tortifM Etkkjl bito

W rite down IP addresses of the Check if you can launch


1 For Wireless Hacking module
host and all the Virtual command shell by right clicking
you w ill need AirPcap adapter
Machines on a folder

Make sure you can access


Check if you can access Internet RealHome and Powergym
Check if you can ping between
and browse the web using IE, websites at
the VM and the hosts
Chrome, Safari and Firefox http://localhost/realhom e and
http://localhost/pow ergym

Make sure that you can access


D:\CEH-T00ls directory in W in d o w s
Check fo r snapshots o f Virtual Check if you can access
S e rv e r 2 0 1 2 and Z:\CEH-T00ls from
Machines http://www.certifiedhacker.com
all the VM's; Z: is mapped N e tw o rk
D rive c o n ta in in g CEH to o ls

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

M o d u le 00 Page X E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t © by EC-C0lMCil


A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .
E thical H acking and C o u n te rm e a su re s Exam 3 1 2 -5 0 C e rtifie d E th ica l H acker
W e lc o m e t o C e rtifie d E th ica l H a cke r Class

P ing B etw een V irtu a l M a c h in e s


CEH
and Host (•*M M tlfcxjl Mm M*

Administrator: C:\W11xlows\systefr132yc1rxl.exe

w ith 32 bytee o f data:


: b ytoo -3 2 cimo<ln& TTL=128
4: b y te s -3 2 c in e <11*3 TTL-128
: b y te 3 3 2 ‫ ־‬tim eC lns TTL-128
: b y te s -32 tine < 11 u TTL-128

=151 * I

G :M J3 e r3 s n d 1 » in i3 tr« to r> p in g 1 ■ <■


£1;‫ד‬1 1 w ith 32 byte s o f d a ta :

3
: b y te s -3 2 t . M - l m IT L-128
Reply fr o n t : bytes —32 t in e < ln s IT L-128
Reply fro w i : b yt« fv 3 2 ‫ ־‬t i f w d n s IT L -1 2 *
Reply from 1 : b y te s -32 tifw C in s IT L-128
Plus u t a t l s t i c v f u r
Pac)<otc: Sont 4 ‫ ־‬. R«<
1
Approxim ate round c r i p t i l
Min inum ‫ ־‬One. flax imui
C iM la e r * s n d n in is tr A to r > _ C :\W in dow s\system 32\cm d.exe j'-"• —
1 11
■ \AH in > p in g 1

le u ly f r a r t I
1
: bu t 32• ‫ י‬t in e -1 fi* TTL-12R
: b y t u - 3 2 tin » < 1 fix 11I.-12N
1
le p ly fra*> I : byt» « -3 2 t >.«e<1..x TTL-12N
tv p ly f m m 1 : b y t•6 •3 2 t i w < in v 11L-12H
111
, H c ta tlv tic w f o r i
P a ckotc: Sont - 4 . Rocolvod 4 ‫־‬. Loot 0> 0 ‫ ־‬X 1000).
ip p ro x ln a to round t r i p tin o a in n i lli- o o c o n d o :
tlln in u n ‫ ־‬One. tfa xinu n - in o . flvoraqo ■ Ono
:1N4U«rs\Hd1»in>_

Copyright © by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

CEH-Tools Directory in Windows


CEH
Server 2012 (D:\CEH-Tools) (•rtifwd Ethical >U(hM

V_J I * 1 DrMTOMI N<‫״‬w V o lu m e ( t> )

| Home Share View V O

($ ) ( )' * Comput«r ► N«wVolum*(0:) V C 1 1 Sairch N«wVolum*(D:) P | |

1 )V Fivcrittc
■ D«*ktap
4■ Download)
,‫ [ ע‬Recent place *

SRECYCIE.BIN CEH-Todv Sy»le»r Volume


Information
3 Documents
J'' Music
m ! Pictures
9 Videos

Computer
i i . Local Disk (G)
1 j New Volume (D:)
£* II

*
*■I Network

?item s

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

M o d u le 00 Page XI E th ica l H ackin g a nd C o u n te rm e a s u re s C o p y rig h t © by EC-C0UIICil


A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .
E thical H acking and C o u n te rm e a su re s Exam 3 1 2 -5 0 C e rtifie d E thical H acker
W e lc o m e t o C e rtifie d E th ica l H a cke r Class

Copyright © by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

M a p p e d N e tw o rk D riv e (Z:) in
CEH
W indow s Server 2008 V M
-Jnl*J

o o * * Computer - vn |sedl(J to
F!c 1
£d t View Jo®1® d*P
orgarize ▼ jjj views ‫ ־׳י‬y f Properties ‫<! ט‬,fste^pr0pe‫» ׳‬ t)es urrstai or :range a prog'a* *jt viap nerA-ork drive

Favonte bn<s
Mamt
H ard D isk D riv es ( 1 )
1*1‫* ״י!־‬ |.|T 0 U I 5 H « I . I f t m Sm m

Docurrentt
Pictures &.ocal Disk (Cl)

:muo D evice* w ltli R e m o v a b le S to ra g e (2)


ecendy Changed^ 15 1
hjj ‫״‬loppy Dis< Orr‫׳״‬e (*:) Rcppy Dak Drive
f l Searches
^ DVD Drive (D!) CD Drive
ublc^
N etw o rk L ocation (1)

J ±J

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

M o d u le 00 Page XII E th ica l H ackin g a n d C o u n te rm e a s u re s C o p y rig h t © by EC-C0UnCil


A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .
E thical H acking and C o u n te rm e a su re s Exam 3 1 2 -5 0 C e rtifie d E th ica l H acker
W e lc o m e t o C e rtifie d E th ica l H a cke r Class

M a p p e d N e tw o rk D riv e (Z:) in
CEH
W indow s 7 V M tlfcxjl Mm M*

G Z IC lL lI^

, v |: ® . ► Computet ► ▼1 | SeorcA Ccrr.outer p 1

Organize▼ Properties System properties Uninstall or charge a program Map net A/ork drive » [j|p ▼ (Jjj O

‫־‬A ‫ ׳‬Favorites - Hard D isk D riv es (1 )


E Desktop Local Disk (C:]
m Downloads
f t i / * 6.37 G3*'reeo*'158 G3
^ Recent Places
' Devices wiTh Removable Storage (2)
Libraries
1 Documents Floppy Disk Drive (A:) DVD Drive (DO

^ Music
B Pictures ' Network Location (1)
Q Videos CEH-Tools <\\ (Z:)

* j f jB tree of 269 OB
: ■ Computer

*'p Network

r£ H -T n n lc (\\1 07 .1fift1 M l 11 J) (7•) I Tntalc■*••


Network Drive Space free: 365 GB Fie system: NTFS

Copyright © by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

L a u n c h in g C o m m a n d S h e ll CEH
(•rtifwd Ethical >U(hM

New Volume [D.) ‫־‬:°■


. .

*I

lnrlud*<nMx*ry
] *Jdlsmlw•.
'M AddM'CEHTootuar'
'3 C»mpn*»•nj «mtJ_
9 CompmstoCERToofc-rjr‫* ־‬

A dm inistrator: C:\W ind 0 w s\system 32\cm d.exe


C'tttt
0t<««

copyright © by EG-Gouncil. All Rights AeServfeifc;Reproduction is Strictly Probfbited.

M o d u le 00 Page XIII E th ica l H ackin g a n d C o u n te rm e a s u re s C o p y rig h t © by EC-C0UnCll


A ll Rights R eserved. R e p ro d u c tio n is S tric tly P ro h ib ite d .
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Welcome to Certified Ethical Hacker Class

S n a p s h o ts o f V i r t u a l M a c h in e s CEH tlfcxjl Mm M*

H y p er-V M a n a g e r I I —
File Action View Help

* * I 8 1! 0 1
j j Hyper-V Manager
^3 WIN-ROPCM8VKVOQ V i r tu a l M a c h i n e s
WIN-ROPCM8VKVOQ
CPU Usage Assigned Memory Up*
New
=j B32k Track 6
Import Virtual Machine...

§ Windows 3 1024 MB Hyper-V Settings...


j Windows 2002 Server settings.. 024 ‫ ז‬M3 5 5 Virtual SAitch Manager...
Turn Off.. ^ Virtual SAN Manager...
Shut Down..
Edit Disk...
S n a p s h o ts Save Inspect Disk,..
₪ g j, Wrdo*3 7-(4/16/ Pause
H Now (•) Stop Service
Reset
^ Remove Server
| Snapshot
Q Refresh
Revert..
View

Q H«p
Rename..
Enable Replication .. Windows 7

□ Help Connect...
Ch^lrrrtt 10‫י‬ fr l Sfttingc..
hedrtbedt: D K fS b /tu k
(•) Turn Off...
0 Shut Down...

Q Save
Sumrray M oray Nfcsvwxtjng [ Rcpkdton || Paute

Reset

Copyright © by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

A ir P c a p CEH
(•rtifwd Ethical >U(hM

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

Module 00 Page XIV Ethical Hacking and Countermeasures Copyright © by EC-C0UnCll


All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Welcome to Certified Ethical Hacker Class

P o w e r g y m a n d R e a lH o m e . . . .
w v
W eb s i• t?e s C E H

t‫־‬ c[ toMlfOS ;• ./rq>nV

-> n 1 • kMMltnc kMh 1

Real Home! * !‫ ״‬tin Supp*rt 1 FAQ* Sitenap t :•Irip

\KK‫־‬rrs ■I TING s tlJ LING K I.N IIM ' liASINO CUX‫־‬IAC1 US

LOGIN

Powergym : h ttp ://lo c a lh o s t/p o w e rg y m

RealHome: h ttp ://lo c a lh o s t/re a lh o m e

Copyright © by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

L iv e H a c k W e b s ite CEH
http://www.certifiedhacker. com

CEH Labs CEH Labs

CEH Labs CEH Labs

JuGGY B0V
‫״‬u n it e

N i fc t i

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

Module 00 Page XV Ethical Hacking and Countermeasures Copyright © by EC-C0UIICil


All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Welcome to Certified Ethical Hacker Class

CEH

L e t ’s S t a r t H a c k i n g

Copyright © by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

Module 00 Page XVI Ethical Hacking and Countermeasures Copyright © by EC-C0UnCil


All Rights Reserved. Reproduction is Strictly Prohibited.

You might also like