Professional Documents
Culture Documents
CEHv8 Module 00
CEHv8 Module 00
CEHv8 Module 00
&
CEH
B O O K
Course
Evaluation
Compact
Disc
Reference
Materials
V
Copyright O by EG-Gouncil. All Rights Reserved. Reproduction IsStrictly Prohibited.
Ethical Hacking and Countermeasures Copyright by EC-C0lMCil
All Rights Reserved. Reproduction is Strictly P rohibited.
Module 00 Page II
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Welcome to Certified Ethical Hacker Class
CEH C E H v 8 C o u r s e O u t l i n e
1 1 1
Introduction to E thical
Hacking
Trojans and Backdoors
[ 6 1
2
F ootprinting and
R econnaissance
Viruses and Worms
[ 7 ]
[ 3 ]
S canning Networks S niffing
[ 8 ]
[ 4 ]
E numeration Social E ngineering
9
5
S ystem Hacking Denial-of-S ervice
1 0 ]
Copyright by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
C E H v 8 C o u r s e O u t l i n e
r
1 1
r 1
Session Hijacking
L________________________________________________ J
r
Hacking M obile P latforms
L u
r
1 6
1
2
r ^
Hacking Webservers
L___ ___J
r
E vading IDS, F irewalls and
Honeypots
r
1 7
r
1
L.
3
J
r
Hacking Web A pplications
L. A
r
B uffer O verflows
L. A
r
1 8
'
1
L
.
SQL Injection
j
r
C ryptography
L A
r
1 9
J
1
5
r
Hacking Wireless Networks P enetration Testing
2 0
Copyright O by EG-Gouncil. All Rights Reserved. Reproduction IsStrictly Prohibited.
Ethical Hacking and Countermeasures Copyright by EC-C0UIICil
All Rights Reserved. Reproduction is Strictly P rohibited.
Module 00 Page I
Exam 312-50 Certified Ethical Hacker Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class
ECCounci l Cer t i f i cat i on Pr ogram I CEH
T here are several levels o f c ertification tracks under the E C -C ouncil A c c reditation body:
ECCouncil Disaster Recovery
P rofessional (EDRP)
EC-Council Certified Security
Analyst (ECSA)
EC-Council Certified Secure
P rogrammer (ECSP)
Certified Secure Application
Developer (CSAD)
Licensed P enetration Tester
(LPT)
Master of Security Science
(MSS)
L
C ertified Secure Computer
User(CSCU)
C ertified e-Business
P rofessional
EC-Council Certified
Security Specialist (ECSS)
EC-Council Network Security
Administrator (ENSA)
You are
here '
C ertified Ethical
Hacker(CEH)
C omputer Hacking Forensic
Investigator (CHFI)
Copyright by IG-GOUIICil. All Rights Reserved. Reproduction is Strictly Prohibited.
Cer t i f i ed Et hi c al Hac k er Tr ac k CEH
UrtifM Etbitji IU(h
CEH C ertification Track
Complete the following steps:
, s
Attend the Ethical Hacking and
Countermeasures Course
V'
Attend
Training
Prepare for
312-50 Exam
Fai l
v
Take
Exam
Pass
Certification
Achieved
Pass the CEH Exam
Exam Code: 312-50-ANSI (IBT),
312-50v8 (VUE), or 350CEHv8
(APTC)
EH
Cortifiad Ethiol Hi.U.
Copyright O by tG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and CountermeasuresCopyright by EC-C0UIICil
All Rights Reserved. Reproduction is Strictly P rohibited.
Module 00 Page IV
Exam 312-50 Certified Ethical Hacker Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class
CEH
J
C E H v 8 E x a m I n f o r m a t i o n
X Exam Title: Certified Ethical Hacker v8 (ANSI )
^ Exam Code: 312-50-ANSI (I BT), 312-50v8 (VUE), or 350CEHv8 (APTC)
Number of Questions: 125
Duration: 4 hours
7 Availability: Prometric Prime/ Prometric APTC/ VUE
Passing Score: 70%
The instructor will tell you about the exam schedule/ exam voucher
details for your training
This is a difficult exam and requires extensive knowledge of
CEH Core Modules
Copyright by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.
CEH S t u d e n t F a c i l i t i e s
Copyright O by EG-Gouncil. All Rights Reserved. Reproduction IsStrictly Prohibited.
Ethical Hacking and Countermeasures Copyright by EC-C0UIICil
All Rights Reserved. Reproduction is Strictly P rohibited.
Module 00 Page V
Exam 312-50 Certified Ethical Hacker Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class
L a b S e s s i o n s
Lab Sessions are designed to
reinforce the classroom sessions
The sessions are intended to
give a hands on experience only
and does not guarantee
proficiency
There are tons of labs in the lab
manual. P lease practice these
labs back at home.
Copyright by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.
W h a t D o e s C E H T e a c h Y o u ? C E H
Denial of Service, Trojans, Worms, Virus,
Social Engineering, Password cracking,
Session Hijacking, System failure, Spam,
Phishing, I dentity theft, Wardriving,
warchalking, bluejacking Lock picking,
Buffer Overflow, System hacking,
Sniffing, SQL I njection....
Ethical Hacking
Defense, Cisco Security, Firewalls,
I DS, Logs, Network, Antivirus,
Hardware, Troubleshooting,
Availability, Server/ Client Security,
creating policies, network
Management etc.....
Bad Guy
This is What CEH Teaches You!
Copyright O by EG-Gouncil. All Rights Reserved. Reproduction IsStrictly Prohibited.
Ethical Hacking and Countermeasures Copyright by EC-C0UIICil
All Rights Reserved. Reproduction is Strictly P rohibited.
Module 00 Page VI
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Welcome to Certified Ethical Hacker Class
CEH W h a t C E H i s N O T ?
CEH class is NOT a
Security Analysis training
program
> Please attend EC-
Council's ECSA class
for that
CEH class is NOT a
Network Security training
program
> Please attend EC-
Council's ENSA class
for that
CEH class is 100%
NETWORK OFFENSIVE
Training P rogram
*
CEH class is NOT a
Security Testing training
program
> Please attend EC-
Council's LPT class
for that
Copyright by IC-Coiincil. All RightsKeserved.:Reproduction is Strictly Prohibited.
CEH
UrtifWJ Etkwjl IUcW*
The CEH Pr og r am Teaches you 100%
Net wor k Of f ensi ve Tr ai n i n g and not
Def ensi ve
Copyright O by EG-Gouncil. All Rights Reserved. Reproduction IsStrictly Prohibited.
Ethical Hacking and Countermeasures Copyright by EC-C0UIICil
All Rights Reserved. Reproduction is Strictly P rohibited.
Module 00 Page VII
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Welcome to Certified Ethical Hacker Class
C E H C l a s s S p e e d C E H
C*rtfW< Itkitjl lUckM
The CEH class is extremely fast paced
The class "speed" can be compared to the climax scene from the movie
Mission Impossible (Bullet train sequence)
There are tons of hacking tools and hacking technologies covered in the
curriculum
The instructor WILL NOT be able to demonstrate ALL the tools in this class
He will showcase only selected tools
The students are required to practice with the tools not demonstrated in the
class on their own
Copyright by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.
CEH L i v e H a c k i n g W e b s i t e
n
J P lease target your exercises for "Live Hacking" to www.certifiedhacker.com
J This website is meant for the students to try the tools on live target
J P lease refrain from using the exploits on any other domains on the Internet
Certified Hacker
CEH Classroom
Attack Lab
Website
Copyright O by EG-Gouncil. All Rights Reserved. Reproduction IsStrictly Prohibited.
Ethical Hacking and Countermeasures Copyright by EC-C0UIICil
All Rights Reserved. Reproduction is Strictly P rohibited.
Module 00 Page VIII
Exam 312-50 Certified Ethical Hacker Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class
C E H N D A D o c u m e n t
Sign this
document and
hand it over to
the ins tructor
P lease read the
contents o f the
provided EC-
C ouncil's CEH
NDA document
P lease approach
the ins tructor if
you are not
presented with
this document
We will NOT start
the class unless
you sign this
document
Copyright by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.
A d v a n c e d L a b E n v i r o n m e n t C E H
Back Track S Windows 7
Virtual P latform
Windows Server
2008 (64 Bit)
Windows 8
u
I nstructor Machine Student Machines
I nstructor and Student Machine Operating System: Windows Server 2012 (Fully Patched)
Copyright O by EG-Gouncil. All Rights Reserved. Reproduction IsStrictly Prohibited.
Ethical Hacking and Countermeasures Copyright by EC-C0lMCil
All Rights Reserved. Reproduction is Strictly P rohibited.
Module 00 Page IX
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Welcome to Certified Ethical Hacker Class
S t u d e n t C o m p u t e r C h e c k l i s t C E H
W indows 8 as V M
W indows 7 as V M
BackTrack 5 R3 as VM
M l
Copyright by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.
S t u d e n t C o m p u t e r C h e c k l i s t C E H
tortifM Etkkjl bito
1 For Wireless Hacking module
you will need AirPcap adapter
Make sure you can access
RealHome and Powergym
websites at
http://localhost/realhome and
http://localhost/powergym
Check if you can access
http://www.certifiedhacker.com
Check if you can launch
command shell by right clicking
on a folder
Check if you can access Internet
and browse the web using IE,
Chrome, Safari and Firefox
Write down IP addresses of the
host and all the Virtual
Machines
Check if you can ping between
the VM and the hosts
Check for snapshots of Virtual
Machines
Make sure that you can access
D:\CEH-T00ls directory in Windows
Server 2012 and Z:\CEH-T00ls from
all the VM's; Z: is mapped Network
Drive contai ning CEH tools
Copyright O by EG-Gouncil. All Rights Reserved. Reproduction IsStrictly Prohibited.
Ethical Hacking and Countermeasures Copyright by EC-C0lMCil
All Rights Reserved. Reproduction is Strictly P rohibited.
Module 00 Page X
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Welcome to Certified Ethical Hacker Class
CEH
(*MM tlfcxjl MmM*
Pi ng Bet ween Vi r t u al Mac h i n es
and Host
Administrator: C:\W11xlows\systefr132yc1rxl.exe
wi t h 32 byt ee of dat a:
: bytoo-32 cimo<ln& TTL=128
4: bytes-32 cine <11*3 TTL-128
: byte332 timeClns TTL-128
: bytes-32 tine<11u TTL-128
<
=151 *I
G:M J 3er3snd1ini3trtor>ping 1
with 32 bytes of data:
3
: bytes-32 t. M - l m ITL-128
: bytes 32 t ine<lns ITL-128
: bytfv32 tifw dn s ITL-12*
: bytes-32 tifwC ins ITL-128
j'-" C:\Windows\system32\cmd.exe
1 1 ; 1
Reply fron t
Reply frow i
Reply from 1
Plus u ta tls tic v fu r 1
Pac)<otc: Sont 4 . R<
Approximate round c rip ti l
Min inum One. flax imui
C iMlaer*sndninistrAtor>_
1\AH11in>ping 1
: but 32 1 t ine-1fi* TTL-12R
leuly fra r t I : bytu- 32 tin<1fix 11I.-12N
leply fra*> I : byt-32 t >.e<1..x TTL-12N
tvply fm m 1 : byt632 t i 1w<inv 11L-12H
,111H c ta tlvticw fo r i
P ackotc: Sont - 4. Rocolvod 4 . Loot 0> 0 X 1000).
ipproxlnato round tr i p tinoa in nilli-oocondo:
tllninun One. tfaxinun - ino. flvoraqo Ono
:1N4Urs\Hd1in>_
Copyright by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
(rtifwd Ethical >U(hM
CEH-Tool s Di r ect or y i n Wi ndows
Server 2012 (D: \CEH-Tool s)
V_J I * 1 DrMTOMI N<w Volume (t>)
| Home Share View V O
( $ ) ( )' * Computr NwVolum*(0:) V C1 1 Sairch NwVolum*(D:) P | |
1 )V Fivcrittc
D*ktap
4Download)
* Recent place [ ,
SRECYCIE.BIN CEH-Todv Syler Volume
Information
3 Documents
J '' Music
m! Pictures
9 Videos
Computer
i i . Local Disk (G)
1j NewVolume (D:)
* I I
*
*I Network
?items
Copyright O by EG-Gouncil. All Rights Reserved. Reproduction IsStrictly Prohibited.
Ethical Hacking and Countermeasures Copyright by EC-C0UIICil
All Rights Reserved. Reproduction is Strictly P rohibited.
Module 00 Page XI
Exam 312-50 Certified Ethical Hacker Ethical Hacking and Countermeasures
Welcome to Certified Ethical Hacker Class
Copyright by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.
CEH
Map p ed Net wor k Dr i v e (Z: ) i n
Wi ndows Ser ver 2008 VM
-J nl*J
to - vn |sedl(J
o o
|.|T 0U I 5H I . I f t mSm m
* ! 1 * 1
Mamt
Computer * *
F!c d1t View Jo1 d*P
t)es urrstai or :range aprog'a* *j t viapnerA-orkdrive fste^pr0pe !<, y f Properties orgarize j j j views
Favonte bn<s
Docurrentt
Pictures
muo :
15 1 ^ ecendy Changed
f l Searches
^ ublc
Rcppy Dak Drive
CDDrive
Hard Disk Drives (1)
&.ocal Disk (Cl)
Device* wltli Removable Storage (2)
hj j loppy Dis<Orre (*:)
^ DVDDrive(D!)
Network L ocation (1)
J J
Copyright O by EG-Gouncil. All Rights Reserved. Reproduction IsStrictly Prohibited.
Module 00 Page XII Ethical Hacking and Countermeasures Copyright by EC-C0UnCil
All Rights Reserved. Reproduction is Strictly P rohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Welcome to Certified Ethical Hacker Class
CEH
tlfcxjl MmM*
Map p ed Net wor k Dr i v e (Z: ) i n
Wi ndows 7 VM
G Z I C l L l I ^
, v | : . Computet 1 | SeorcA Ccrr.outer p 1
Organize Properties System properties Uninstall or charge a program Map net A/ork drive [j|p (Jjj O
A Favorites
E Desktop
m Downloads
^ Recent Places
Libraries
1 Documents
^ Music
B Pictures
Q Videos
- Har d Di sk Dr i v es (1)
Local Disk (C:]
f t i / * 6.37 G3*' reeo*' 158 G3
' Devi ces wiTh Removabl e St or age (2)
Floppy Disk Drive (A:) DVD Drive (DO
' Net wor k Locati on (1)
CEH-Tools <\\ (Z:)
: Computer
*' p Network
* j f j B tree of 269 OB
r H-Tnnl c (\\107.1f i f t 1Ml 11J) (7) I Tntalc*
Network Drive Spacefree: 365 GB Fie system: NTFS
Copyright by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.
L a u n c h i n g C o m m a n d S h e l l
: NewVolume [D.)
. .
Administrator: C:\Wind0ws\system32\cmd.exe
lnrlud*<nMx*ry
] *Jdl smlw.
'M AddM'CEHTootuar'
'3 Cmpn*nj mtJ_
9 CompmstoCERToofc-rjr *
C'tttt
0t<
* I
CEH
(rtifwd Ethical >U(hM
copyright by EG-Gouncil. All Rights AeServfeifc;Reproduction is Strictly Probfbited.
Module 00 Page XIII Ethical Hacking and Countermeasures Copyright by EC-C0UnCll
All Rights Reserved. Reproduction is Strictly P rohibited.
Ethical Hacking and Countermeasures Exam312-50 Certified Ethical Hacker
Welcome to Certified Ethical Hacker Class
C E H
tlfcxjl MmM*
S n a p s h o t s o f V i r t u a l M a c h i n e s
I I
Hyper-V M anager
File Action View Help
* * I 8 1! 0 1
WIN-ROPCM8VKVOQ
New
Import Virtual Machine...
Hyper-V Settings...
55 Virtual SAitch Manager...
^ Virtual SAN Manager...
Edit Disk...
Inspect Disk,..
() Stop Service
^ Remove Server
Q Refresh
View
Q Hp
Windows7
Connect...
f r l Sfttingc..
() Turn Off...
0 Shut Down...
Q Save
| | Paute
Reset
V i rtual M achi nes
CPU Usage AssignedMemory Up*
1024MB
024 M3
Ch^lrrrtt 10
hedrtbedt: DKfSb/ tuk
settings..
Turn Off..
Shut Down..
Save
Pause
Reset
| Snapshot
Revert..
Rename..
EnableReplication ..
Help
=j B32k Track6
Windows 3
j Windows 2002Server
Snapshots
gj, Wrdo*3 7-(4/16/
H Now