IP

Wednesday, November 3, 2010

Ethical Hacking

Ethical Hacking

This course prepares you for EC-Council Certified Ethical Hacker exam 312-50

I have tried to cover the syllabus in my blogs

This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity
of the network infrastructure.

Certification
The Certified Ethical Hacker certification exam 312-50 will be conducted on the last day of training.
Students need to pass the online Prometric exam to receive CEH certification.

Course Outline
  • Ethics and Legality
  • What is an Exploit? 
  • The security functionality triangle 
  • The attacker’s process 
  • Passive reconnaissance 
  • Active reconnaissance 
  • Types of attacks 
  • Categories of exploits 
  • Goals attackers try to achieve 
  • Ethical hackers and crackers - who are they 
  • Self proclaimed ethical hacking 
  • Hacking for a cause (Hacktivism) 
  • Skills required for ethical hacking 
  • Categories of Ethical Hackers 
  • What do Ethical Hackers do? 
  • Security evaluation plan 
  • Types of Ethical Hacks 
  • Testing Types 
  • Ethical Hacking Report 
  • Cyber Security Enhancement Act of 2002 
  • Computer Crimes 
  • Overview of US Federal Laws 
  • Section 1029 
  • Section 1030 
  • Hacking Punishment 
  • Footprinting
  • What is Footprinting 
  • Steps for gathering information 
  • Whois 
  • http://tucows.com 
  • Hacking Tool: Sam Spade 
  • Analyzing Whois output 
  • NSLookup 
  • Finding the address range of the network 
  • ARIN 
  • Traceroute 
  • Hacking Tool: NeoTrace 
  • Visual Route 
  • Visual Lookout 
  • Hacking Tool: Smart Whois 
  • Hacking Tool: eMailTracking Pro 
  • Hacking Tool: MailTracking.com 
  • Scanning
  • Determining if the system is alive? 
  • Active stack fingerprinting 
  • Passive stack fingerprinting 
  • Hacking Tool: Pinger 
  • Hacking Tool: Friendly Pinger 
  • Hacking Tool: WS_Ping_Pro 
  • Hacking Tool: Netscan Tools Pro 2000 
  • Hacking Tool: Hping2 
  • Hacking Tool: KingPing 
  • Hacking Tool: icmpenum 
  • Hacking Tool: SNMP Scanner 
  • Detecting Ping sweeps 
  • ICMP Queries 
  • Hacking Tool: netcraft.com 
  • Port Scanning 
  • TCPs 3-way handshake 
  • TCP Scan types 
  • Hacking Tool: IPEye 
  • Hacking Tool: IPSECSCAN 
  • Hacking Tool: nmap 
  • Port Scan countermeasures 
  • Hacking Tool: HTTrack Web Copier 
  • Network Management Tools 
  • SolarWinds Toolset 
  • NeoWatch 
  • War Dialing 
  • Hacking Tool: THC-Scan 
  • Hacking Tool: PhoneSweep War Dialer 
  • Hacking Tool: Telesweep 
  • Hacking Tool: Queso 
  • Hacking Tool: Cheops 
  • Proxy Servers 
  • Hacking Tool: SocksChain 
  • Surf the web anonymously 
  • TCP/IP through HTTP Tunneling 
  • Hacking Tool: HTTPort 
  • Hacking Tool: Tunneld 
  • Hacking Tool: BackStealth 
  • Enumeration
  • What is Enumeration 
  • NetBios Null Sessions 
  • Null Session Countermeasures 
  • NetBIOS Enumeration 
  • Hacking Tool: DumpSec 
  • Hacking Tool: Hyena 
  • Hacking Tool: NAT 
  • SNMP Enumertion 
  • SNMPUtil 
  • Hacking Tool: IP Network Browser 
  • SNMP Enumeration Countermeasures 
  • Windows 2000 DNS Zone transfer 
  • Identifying Win2000 Accounts 
  • Hacking Tool: User2SID 
  • Hacking Tool: SID2User 
  • Hacking Tool: Enum 
  • Hacking Tool: UserInfo 
  • Hacking Tool: GetAcct 
  • Hacking Tool: smbbf 
  • SMB Auditing Tools 
  • Active Directory Enumeration 
  • W2K Active Directory attack 
  • System Hacking
  • Administrator Password Guessing 
  • Performing Automated Password Guessing 
  • Legion 
  • NTInfoScan 
  • Defending Against Password Guessing 
  • Monitoring Event Viewer Logs 
  • VisualLast 
  • Eavesdroppin on Network Password Exchange 
  • Hacking Tool: L0phtCrack 
  • Hacking Tool: KerbCrack 
  • Privilege Escalation 
  • Hacking Tool: GetAdmin 
  • Hacking Tool: hk 
  • Manual Password Cracking Algorithm 
  • Automatic Password Cracking Algorithm 
  • Password Types 
  • Types of Password Attacks 
  • Dictionary Attack 
  • Brute Force Attack 
  • Distributed Brute Force Attack 
  • Password Change Interval 
  • Hybrid Attack 
  • Cracking Windows 2000 Passwords 
  • Retrieving the SAM file 
  • Redirecting SMB Logon to the Attacker 
  • SMB Redirection 
  • Hacking Tool: SMBRelay 
  • Hacking Tool: SMBRelay2 
  • Hacking Tool: pwdump2 
  • Hacking Tool: SAMdump 
  • Hacking Tool: C2MYAZZ 
  • Win32 Create Local Admin User 
  • Offline NT Password Resetter 
  • Hacking Tool: psexec 
  • Hacking Tool: remoxec 
  • SMBRelay Man-in-the-Middle (MITM) 
  • SMBRelay MITM Countermeasures 
  • Hacking Tool: SMBGrinder 
  • Hacking Tool: SMBDie 
  • Hacking Tool: NBTDeputy 
  • NetBIOS DoS Attack 
  • Hacking Tool: nbname 
  • Hacking Tool: John the Ripper 
  • LanManager Hash 
  • Password Cracking Countermeasures 
  • Keystroke Logger 
  • Hacking Tool: Spector 
  • AntiSpector 
  • Hacking Tool: eBlaster 
  • Hacking Tool: SpyAnywhere 
  • Hacking Tool: IKS Software Logger 
  • Hacking Tool: Fearless Key Logger 
  • Hacking Tool: E-mail Keylogger 
  • Hardware Tool: Hardware Key Logger 
  • Hacking Tool: Rootkit 
  • Planting Rootkit on Windows 2000 Machine 
  • _rootkit_ embedded TCP/IP Stack 
  • Rootkit Countermeasures 
  • MD5 Checksum utility 
  • Tripwire 
  • Covering Tracks 
  • Disabling Auditing 
  • Auditpol 
  • Clearing the Event Log 
  • Hacking Tool: Elslave 
  • Hacking Tool: Winzapper 
  • Hacking Tool: Evidence Eliminator 
  • Hidding Files 
  • NTFS File Streaming 
  • Hacking Tool: makestrm 
  • NTFS Streams Countermeasures 
  • LNS 
  • Steganography 
  • Hacking Tool: ImageHide 
  • Hacking Tool: BlindSide 
  • Hacking Tool: MP3Stego 
  • Hacking Tool: Snow 
  • Hacking Tool: Camera/Shy 
  • Steganography Detection 
  • StegDetect 
  • Hacking Tool: Stealth Files 
  • Encrypted File System 
  • Hacking Tool: dskprobe 
  • Hacking Tool: EFSView 
  • Buffer Overflows 
  • Creating Buffer Overflow Exploit 
  • Outlook Buffer Overflow 
  • Hacking Tool: Outoutlook 
  • Trojans and Backdoors
  • What is a Trojan Horse? 
  • Overt and Covert 
  • Hacking Tool: QAZ 
  • Hacking Tool: Tini 
  • Hacking Tool: Netcat 
  • Hacking Tool: Donald Dick 
  • Hacking Tool: SubSeven 
  • Hacking Tool: BackOrifice 2000 
  • Back Oriffice Plug-ins 
  • BoSniffer 
  • Hacking Tool: NetBus 
  • ComputerSpy Key Logger 
  • Hacking Tool: Beast Trojan 
  • Hacking Tool: CyberSpy Telnet Trojan 
  • Hacking Tool: SubRoot Telnet Trojan 
  • Hacking Tool: LetMeRule 
  • Wrappers 
  • Hacking Tool: Graffiti 
  • Hacking Tool: Silk Rope 2000 
  • Hacking Tool: EliteWrap 
  • Hacking Tool: IconPlus 
  • Packaging Tool: Microsoft WordPad 
  • Hacking Tool: Whack a Mole 
  • Trojan Construction Kit 
  • Writing Trojans in Java 
  • Hacking Tool: FireKiller 2000 
  • Covert Channels 
  • ICMP Tunneling 
  • Hacking Tool: Loki 
  • Reverse WWW Shell 
  • Backdoor Countermeasures 
  • BO Startup and Registry Entries 
  • NetBus Startup and Registry Keys 
  • Port Monitoring Tools 
  • fPort 
  • TCPView 
  • Process Viewer 
  • Inzider - Tracks Processes and Ports 
  • Trojan Maker 
  • Hacking Tool: Hard Disk Killer 
  • Man-in-the-Middle Attack 
  • Hacking Tool: dsniff 
  • System File Verification 
  • TripWire 
  • Sniffers
  • What is a Sniffer? 
  • Hacking Tool: Ethereal 
  • Hacking Tool: Snort 
  • Hacking Tool: WinDump 
  • Hacking Tool: EtherPeek 
  • Passive Sniffing 
  • Active Sniffing 

1 comment: