Professional Documents
Culture Documents
Domain 4 of CEH V11 Network and Perimeter Hacking
Domain 4 of CEH V11 Network and Perimeter Hacking
Perimeter Hacking
www.infosectrain.com | sales@infosectrain.com
www.infosectrain.com | sales@infosectrain.com
Domains of CEH
2.Reconnaissance Techniques-21%
8.Cloud Computing-6%
9.Cryptography-6%
www.infosectrain.com | sales@infosectrain.com
www.infosectrain.com | sales@infosectrain.com
We will discuss the fourth domain of CEH, which is ‘Network and perimeter
hacking’.
Network
Networks are composed of two or more computers that share resources
(such as printers and CDs), exchange files, and allow electronic
communications. A network of computers may be connected by cables,
telephone lines, radio waves, satellites, or infrared beams.
www.infosectrain.com | sales@infosectrain.com
How are networks compromised?
As every big plan starts with a simple step, likewise, large-scale cyber attacks also start
by attacking or infecting a lower-end device and increasing the level of privileges
required to go forward inside the same network. While attacking the networks, ethical
hackers will have to think exactly like malicious hackers. Only then the organizations can
have a clear idea of their security vulnerabilities.
Attackers first start with the traditional methods. One of the most common traditional
methods is sending a false email. An attacker usually creates an incorrect email by
replicating it like an original one. For example, an attacker can create an Amazon Big
Billion day email asking you to click the links to get the 50% offer. Once you click on the
link, you’ll be redirected to a malicious webpage from where an attacker can install the
viruses on your network’s device.
Once the attacker enters your network, he will start escalating his privileges to the
administrator level because they are the ones who maintain the whole network.
www.infosectrain.com | sales@infosectrain.com
PivotSuite: With PivotSuite, penetration testers and red teams can move
around inside a network by using compromised systems. It is portable,
platform-independent, and powerful. It is a stand-alone application that
can be used as a client or a server.
www.infosectrain.com | sales@infosectrain.com
Network attack techniques
For example, an attacker can buy advertising space on any site and can post
some exciting advertisements that attract users to click on them. And if the
user clicks on that advertisement, he will be redirected to a malicious page
from where an attacker can install the viruses into the user’s system.
www.infosectrain.com | sales@infosectrain.com
Phishing: While the spelling is Phishing, we utter it as fishing. They
are not just phonetic but also somewhat comparable, since we use
a worm to capture a fish known as fishing. On the contrary, an
attacker can email, send a message, a web link, or a voice call to
seek our private data called “phishing.”
www.infosectrain.com | sales@infosectrain.com
CEH with InfosecTrain
www.infosectrain.com | sales@infosectrain.com
About InfosecTrain
• Established in 2016, we are one of the finest Security
and Technology Training and Consulting company
www.infosectrain.com | sales@infosectrain.com
Our Endorsements
www.infosectrain.com | sales@infosectrain.com
Why InfosecTrain Global Learning Partners
www.infosectrain.com | sales@infosectrain.com
Our Trusted Clients
www.infosectrain.com | sales@infosectrain.com
Contact us
Get your workforce reskilled by
our certified and experienced
instructors!
sales@infosectrain.com
www.infosectrain.com