Top Banner
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker Welcome to Certified Ethical Hacker Class TAWcD0lUn www.takedowncon.com TAK£D0lUn is a hacking conference that was conceived by our members! EC-Council has been flooded with requests to take our world-class courses on the road! We have answered the call and created TakeDownCon! This conference will be focused on the learner and will feature several Certification & Certificate Training courses for Advanced Practitioners! TAKOG TAKO0UJH will host EC-Council's sought after Hacking, Forensics and Pen Test courses, Certified Wireless Security Professional, and several highly technical and advanced workshops which will cover current and important security topics such as advanced penetration testing, cryptography, network defense, application security and mobile forensics. At TAKCDOllin the learning doesn't stop when the training endsl We have lined up a list of sought after industry practitioners and subject matter experts that will present relevant and implementable topics! For more information, about TAKEDOllin please visitit www.takedowncon.com Hacker Halted www.hackerhalted.com . 1 i * I i * •־Since 2004 EC-Council has hosted 20 Hacker Halted events across four continents and in cities such as Myrtle Beach, Miami, Dubai, Singapore, Hong Kong, Mexico City, Tokyo, Kuala Lumpur, Guangzhou, Taiper and Cairo. Hacker Halted North America will be held in Miami for the 3rd year in a row and based on past history is sure to boast an amazing turnout of Information Security Professionals! Hacker Halted is more than just a conference event; practitioners travel from all over the world to attend our world-class training, gain practical knowledge from our expert presenters and get a preview of the latest technologies and Information Security tools which will be showcased by our exhibitors and partners. For more information, about Hacker Halted please visit Ethical Hacking and Countermeasures Copyright © by EC-COUDCil All Rights Reserved. Reproduction is Strictly Prohibited.
26
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: CEHv8 Module 00

Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical HackerWelcome to Certified Ethical Hacker Class

T A W c D 0 lU nw w w .ta k e d o w n c o n .c o m

TAK£D0lUn is a hacking conference that was conceived by our members! EC-Council has been flooded with requests to take our world-class courses on the road!

We have answered the call and created TakeDownCon!This conference will be focused on the learner and will feature

several Certification & Certificate Training courses for Advanced Practitioners!

TAKOGT A K O 0 U JH will host EC-Council's sought after Hacking, Forensics and Pen Test courses, Certified Wireless Security Professional, and several highly technical and advanced workshops which will cover current and important security topics such as advanced penetration testing,

cryptography, network defense, application security and mobile forensics.

At TAKCDOllin the learning doesn't stop when the training endsl We have lined up a list of sought after industry practitioners and

subject matter experts that will present relevant and implementable topics!

For more information, about TAKEDOllin please visitit w w w .takedowncon.com

Hacker Haltedwww.hackerhalted.com

. 1 i * I i * •־Since 2004 EC-Council has hosted 20 Hacker Halted events across four continents and

in cities such as Myrtle Beach, Miami, Dubai, Singapore, Hong Kong, Mexico City, Tokyo, Kuala Lumpur, Guangzhou, Taiper and Cairo.

Hacker Halted North America will be held in Miami for the 3rd year in a row and based on past history is sure to boast an amazing turnout of Information Security Professionals!

Hacker Halted is more than just a conference event; practitioners travel from all over the world to attend our world-class training, gain practical knowledge from our expert presenters and

get a preview of the latest technologies and Information Security tools which will be showcased by our exhibitors and partners.

For more information, about Hacker Halted please visit

Ethical Hacking and Countermeasures Copyright © by EC-COUDCilAll Rights Reserved. Reproduction is Strictly Prohibited.

Page 2: CEHv8 Module 00

Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical HackerWelcome to Certified Ethical Hacker Class

VAMPIREwww.vampiretech.com

Is your website vulnerably to an attack? Could hackers exploit a small weakness in your website and obtain access to sensitive company information?

VampireScan allows users to test their own Cloud and Web applications against advanced attacks and receive actionable results all within their own Web portal. Our easy to use online portal will simply ask you for the URL of your web application, from there, our Services do the rest.

For a limited time, VampireTech is offering its Baseline Scan free of charge to qualified customers. This entitles you to one Free Health Check for one domain utilizing our Baseline Scan. This Scan will test for Cross-site Scripting Vulnerabilities, Non-SSL Passwords, and Password Autocomplete.

A

fcV Global CISO Executive Summit

r

Be on the forefront of a new global initiative where today's world-class leaders in information security will gather to navigate through international waters. Join these leaders as they follow the wind of change that is sweeping through the IS community motivating today's information guardians to develop a new way of thinking to ensure success in protecting their respective organizations.

The goal of EC-Council's Global CISO Forum is to create an open platform for top information security executives to discuss their successes, failures, obstacles, and challenges. The open conversation will lead to the creation of actionable items that can be discussed and applied to the organization.

For More Information About CISO Executive Summit Please Visit: www.eccouncil.org/resources/ciso-executive-summit.aspx

Ethical Hacking and Countermeasures Copyright © by EC-COIMCilAll Rights Reserved. Reproduction is Strictly Prohibited.

Page 3: CEHv8 Module 00

Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical HackerWelcome to Certified Ethical Hacker Class

How to Download My CEHv8 E-Courseware and Additional Lab M anuals?

Please follow the steps below to download your CEHv8 e-courseware and additional lab manual.

Step 1:Visit: https://academia.eccouncil.org. If you have an account already, skip to Step 4.

Step 2:Click Register and fill out the registration form.

Step 3:Using the email you provided in step 2, follow the instructions in the auto-generated email to activate your Academia Portal account.

Step 4:Login using your Username and Password.

Step 5:Once successfully logged in, expand the A b o u t A ca d e m ia navigation menu and select A c c e s s Code.

Step 6:Enter the access code provided to you to redeem access to the CEH V8 e-Courseware and Lab Manuals.

Access Code: XXXXXXXXXXXXXXXX

Step 8:Once redeemed, expand the Course s menu and select iLearn - PDF C o u rse w a re - The resulting page will list your CEH v8 e-Courseware and Lab Manuals.

Support:E-mail support is available from academia(5>eccouncil.org.

System Requirements:Visit https://academia.eccouncil.ore/AboutAcademia/WhatisiLearn.aspx to view the system requirements.

Ethical Hacking and Countermeasures Copyright © by EC-C0lMCilAll Rights Reserved. Reproduction is Strictly Prohibited.

Page 4: CEHv8 Module 00

Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical HackerWelcome to Certified Ethical Hacker Class

Download Class Certificate of Attendance

EC־C011ncilhttp://www.eccouncil.org

I C -C o u n c ilTHIS IS TO ACKNOWLEDGE THAT

HAS SUCCESSFULLY COMPLETED A COUKSE ON

AT AN EC-COUNCIL ACCREDITED TRAINING CENTER

T R A IN IN G C E N T E R :

DateInstructo r

Please follow the below stated steps to download digital copy (PDF format) of your class certificate of attendance.

Step 1: Wait until the class is over (the last of the class).

Step 2: Visit http://www.eccouncil.org/eval.

Step 3: Complete the course evaluation form (please complete all the fields in the form - correct e-mail address is required).

Step 4: Evaluation code is required to submit the form. See the attached code.

Step 5: Submit the form.

Step 6: A web link will be sent to you to download your PDF copy of the certificate.

Course Evaluation Code: *״*CEH־” *” ” ”

Ethical Hacking and Countermeasures Copyright © by EC-COIMCilAll Rights Reserved. Reproduction is Strictly Prohibited.

Page 5: CEHv8 Module 00

Ethical Hacking and Countermeasures

Version 8

Page 6: CEHv8 Module 00

Exam 312-50 Certified Ethical HackerEthical Hacking and CountermeasuresWelcome to Certified Ethical Hacker Class

EC-CouncilCopyright © 2013 by EC-Cou11cil. All rights reserved. Except as permitted under the Copyright Act o f 1976, no part o f tins publication may be reproduced or distributed 111 any form or by any means, or stored 111 a database or retrieval system, without the prior written permission o f the publisher, with the exception that the program listings may be entered, stored, and executed 111 a computer system, but they may not be reproduced for publication.

Information has been obtained by EC-Council from sources believed to be reliable. EC-Council uses reasonable endeavors to ensure that the content is current and accurate, however, because of the possibility־ ol human or mechanical error we do not guarantee the accuracy, adequacy, or completeness ol any information and are not responsible for any errors or omissions or the accuracy of the results obtained from use of such information.

The courseware is a result o f extensive research and contributions from subject matter experts from the field from all over the world. Due credits for all such contributions and references are given in the courseware in the research endnotes. We are committed towards protecting intellectual property. It you are a copyright owner (an exclusive licensee or their agent), and if you believe that any part of the courseware constitutes an infringement o f copyright, or a breach of an agreed licence or contract, you may notify us at le g al@ e cco u n cil.o rg . 111 the event of a justified complaint, EC-Council will remove the material 111 question and make necessary rectifications.

The courseware may contain references to other information resources and security solutions, but such references should not be considered as an endorsement of or recommendation by EC-Council.

Readers are encouraged to report errors, omissions and inaccuracies to EC-Council at le g al@ e cco u n cil.o rg .

If you have any issues, please contact su pp o rt@ e cco u n cil.o rg .

Ethical Hacking and Countermeasures Copyright © by EC-COUIICilAll Rights Reserved. Reproduction is Strictly Prohibited.

Page 7: CEHv8 Module 00

Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical HackerWelcome to Certified Ethical Hacker Class

F orewordSince you are reading this CEHv8 courseware, you most likely realize the importance of information systems security. However, we would like to put forth our motive behind compiling a resource such as this one and what you can gain from this course.

You might find yourself asking what sets this course apart from the others out there. The truth is that no single courseware can address all the issues of information security in a detailed manner. Moreover, the rate at which exploits, tools, and methods are being discovered by the security community makes it difficult for one program to cover all the necessary facets of information security. This doesn't mean that this course is inadequate in any way as we have worked to cover all major domains in such a manner that the reader will be able to appreciate the way security has evolved over time as well as gain insight in to the fundamental workings relevant to each domain. It is a blend of academic and practical wisdom supplemented with tools that the reader can readily access in order to obtain a hands-on experience.

The emphasis throughout the courseware is on gaining practical know-how, which explains the stress on free and accessible tools. You will read about some of the most widespread attacks seen, the popular tools used by attackers, and how attacks have been carried out using ordinary resources.

You may also want to know what to expect once you have completed the course. This courseware is a resource material. Any penetration tester can tell you that there is no one straight methodology or sequence of steps that you can follow while auditing a client site. There is no one template that will meet all your needs. Your testing strategy will vary with the client, the basic information about the system or situation, and the resources at your disposal. However, for each stage you choose - be it enumeration, firewall, penetration of other domains - you will find something in this courseware that you can definitely use.

Finally this is not the end! This courseware is to be considered a constant work-in-progress because we will be adding value to this courseware over time. You may find some aspects extremely detailed, while others may have less detail. We are constantly asking ourselves if the content helps explain the core point of the lesson, and we constant calibrate our material with that in mind. We would love to hear your viewpoints and suggestions so please send us your feedback to help in our quest to constantly improve our courseware.

Ethical Hacking and Countermeasures Copyright © by EC-COIMCilAll Rights Reserved. Reproduction is Strictly Prohibited.

Page 8: CEHv8 Module 00

This page is intentionally left blank.

Page 9: CEHv8 Module 00

Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical HackerWelcome to Certified Ethical Hacker Class

Table of ContentsM odule N um ber M odule N am e Page N o.

00 Student In troduction I

01 In troduction to E th ical H ack ing 01

02 Footprin ting and R econnaissance 91

03 Scanning N etw orks 262

04 E num eration 434

05 System H ack ing 517

06 T rojans and Backdoors 827

07 Viruses and W orms 1006

08 Sniffing 1112

09 Social E ng ineering 1292

10 D enial of Service 1402

11 Session H ijacking 1503

12 H ack ing W ebservers 1600

13 H ack ing Web A pplications 1723

14 SQL Injection 1986

15 H ack ing W ireless N etw orks 2134

16 H ack ing M obile Platform s 2392

17 E vading IDS, Firewalls, and H oneypots 2549

18 Buffer Overflow 2691

19 C ryptography 2782

» | Penetration T esting 2872

References 2976

Ethical Hacking and Countermeasures Copyright © by EC-COIMCilAll Rights Reserved. Reproduction is Strictly Prohibited.

Page 10: CEHv8 Module 00

This page is intentionally left blank.

Page 11: CEHv8 Module 00

Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical HackerWelcome to Certified Ethical Hacker Class

Welcome to Certified Ethical Hacker Class!

Student Introduction

Engineered by Hackers. Presented by Professionals.

QC EH

Ethical Hacking and C ounterm easures Module 00: Welcome to Certified Ethical Hacker Class

Exam 312-50

Module 00 Page I Ethical Hacking and Countermeasures Copyright © by EC-C0l1nCilAll Rights Reserved. Reproduction is Strictly Prohibited.

Page 12: CEHv8 Module 00

Exam 312-50 Certified Ethical HackerEthical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class

Copyright © by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

C EHCourse Materials

IdentityCard

/

^ 1ויווווווו

Lab Manual/ Workbook

StudentCourseware

־V ־i׳ע־& עין

CEHBOOK

CourseEvaluation

CompactDisc

־ ץReferenceMaterialsV

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

Ethical Hacking and Countermeasures Copyright © by EC-C0lMCilAll Rights Reserved. Reproduction is Strictly Prohibited.

Module 00 Page II

Page 13: CEHv8 Module 00

Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical HackerWelcome to Certified Ethical Hacker Class

C EHCEHv8 Course Outline

111 Introduction to Ethical Hacking Trojans and Backdoors [61

2 Footprinting and Reconnaissance Viruses and Worms [ 7 ]

[ 3 ] Scanning Networks Sniffing [ 8 ]

[ 4 ] Enumeration Social Engineering 9

5י System Hacking Denial-of-Service 10]Copyright © by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

C EHCEHv8 Course Outline

r ד

11r 1

Session HijackingL_____________________________________________________ J

r יי

Hacking Mobile PlatformsL u

r י־

16

1יי

2r

Hacking WebserversL__ __ J

r דEvading IDS, Firewalls and Honeypots

r די

17r

1L.

יי

3r י־

Hacking Web ApplicationsL. A

r ר

Buffer OverflowsL. A

r יי

18'

1L

V SQL Injectionj

rCryptography

L A

r י

19J

15

r די

Hacking Wireless Networks Penetration Testing 20

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

Ethical Hacking and Countermeasures Copyright © by EC-C0lMCilAll Rights Reserved. Reproduction is Strictly Prohibited.

Module 00 Page I

Page 14: CEHv8 Module 00

Exam 312-50 Certified Ethical HackerEthical Hacking and CountermeasuresWelcome to Certified Ethical Hacker Class

EC־Council Certification Program I C E HThere are several levels of certification tracks under the EC-Council Accreditation body:

EC־Council Disaster Recovery Professional (EDRP)

EC-Council Certified Security Analyst (ECSA)

EC-Council Certified Secure Programmer (ECSP)

Certified Secure Application Developer (CSAD)

Licensed Penetration Tester (LPT)

Master of Security Science (MSS)

— L

Certified Secure Computer User(CSCU)

Certified e-Business Professional

EC-Council Certified Security Specialist (ECSS)

EC-Council Network Security Administrator (ENSA)

You are here '

Certified EthicalHacker(CEH)

Computer Hacking Forensic Investigator (CHFI)

Copyright © by IG-GOUIICil. All Rights Reserved. Reproduction is Strictly Prohibited.

Certified Ethical Hacker Track CEHUrtifM Etbitji IU(h«

CEH Certification TrackCom plete the fo llow ing steps:

sAttend the Ethical Hacking and״־,Countermeasures Course

V'Attend

Training

Prepare for 312-50 Exam

Fail

יא

vTakeExam

Pass

CertificationAchieved

Pass the CEH Exam Exam Code: 312-50-ANSI (IBT), 312-50v8 (VUE), or 350CEHv8

(APTC)

EHCortifiad Ethiol H i.U .

Copyright O by tG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and CountermeasuresCopyright © by EC-C0UIICilAll Rights Reserved. Reproduction is Strictly Prohibited.

Module 00 Page IV

Page 15: CEHv8 Module 00

Exam 312-50 Certified Ethical HackerEthical Hacking and CountermeasuresWelcome to Certified Ethical Hacker Class

CEH

J

CEHv8 Exam Inform ation

X״ Exam Title: Certified Ethical Hacker v8 (ANSI)

^ Exam Code: 312-50-ANSI (IBT), 312-50v8 (VUE), or 350CEHv8 (APTC)

Number of Questions: 125

Duration: 4 hours

7 Availability: Prometric Prime/ Prometric APTC/VUE

Passing Score: 70%

The instructor will tell you about the exam schedule/exam voucher details for your training

This is a difficult exam and requires extensive knowledge of CEH Core Modules

Copyright © by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

CEHStudent Facilities

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

Ethical Hacking and Countermeasures Copyright © by EC-C0UIICilAll Rights Reserved. Reproduction is Strictly Prohibited.

Module 00 Page V

Page 16: CEHv8 Module 00

Exam 312-50 Certified Ethical HackerEthical Hacking and CountermeasuresWelcome to Certified Ethical Hacker Class

L ab Sessions

Lab Sessions are designed to reinforce the classroom sessions

The sessions are intended to give a hands on experience only and does not guarantee proficiency

There are tons of labs in the lab manual. Please practice these labs back at home.

Copyright © by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

What Does CEH Teach You? CEH

Denial of Service, Trojans, Worms, Virus, Social Engineering, Password cracking, Session Hijacking, System failure, Spam, Phishing, Identity theft, Wardriving, warchalking, bluejacking Lock picking, Buffer Overflow, System hacking, Sniffing, SQL Injection....

Ethical Hacking

Defense, Cisco Security, Firewalls, IDS, Logs, Network, Antivirus, Hardware, Troubleshooting, Availability, Server/Client Security, creating policies, network Management etc....

Bad Guy

This is What CEH Teaches You!

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

Ethical Hacking and Countermeasures Copyright © by EC-C0lMCilAll Rights Reserved. Reproduction is Strictly Prohibited.

Module 00 Page VI

Page 17: CEHv8 Module 00

Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical HackerWelcome to Certified Ethical Hacker Class

CEHWhat CEH is NOT?

CEH class is NOT a Security Analysis training program

> Please attend EC- Council's ECSA class for that

CEH class is NOT a N etw ork Security training program

> Please attend EC- Council's ENSA class for that

CEH class is 100% NETWORK OFFENSIVE Training Program

* CEH class is NOT aSecurity Testing trainingprogram

> Please attend EC-Council's LPT classfor that

•Copyright © by IG-GouilCil. All RightsKeserved.:Reproduction is Strictly Prohibited.

CEHUrtifWJ Etkwjl IUcW*

The CEH Program Teaches you 100% Network Offensive Training and not

D efensive

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

Ethical Hacking and Countermeasures Copyright © by EC-C0lMCilAll Rights Reserved. Reproduction is Strictly Prohibited.

Module 00 Page VII

Page 18: CEHv8 Module 00

Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical HackerWelcome to Certified Ethical Hacker Class

CEH Class Speed C EH™ C*rt׳fW< Itkitjl lUckM

The CEH class is extremely fast paced

The class "speed" can be compared to the climax scene from the movie Mission Impossible (Bullet train sequence)

There are tons of hacking tools and hacking technologies covered in the curriculum

The instructor WILL NOT be able to demonstrate ALL the tools in this class

He will showcase only selected tools

The students are required to practice with the tools not demonstrated in the class on their own

Copyright © by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

CEHLive Hacking Website

nJ Please target your exercises for "Live Hacking" to www.certifiedhacker.com

J This website is meant for the students to try the tools on live target

J Please refrain from using the exploits on any other domains on the Internet

Certified Hacker

CEH Classroom Attack Lab Website

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

Ethical Hacking and Countermeasures Copyright © by EC-C0lMCilAll Rights Reserved. Reproduction is Strictly Prohibited.

Module 00 Page VIII

Page 19: CEHv8 Module 00

Exam 312-50 Certified Ethical HackerEthical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class

CEHNDA Document

Sign this document and hand it over to the instructor

Please read the contents of the provided EC- Council's CEH NDA document

Please approach the instructor if you are not presented with this document

We will NOT start the class unless you sign this document

Copyright © by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

Advanced Lab Environment CEH

Back Track SWindows 7

Virtual Platform

Windows Server 2008 (64 Bit)

Windows 8

uInstructor Machine Student Machines

Instructor and Student Machine Operating System: W indows Server 2012 (Fully Patched)

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

Ethical Hacking and Countermeasures Copyright © by EC-C0lMCilAll Rights Reserved. Reproduction is Strictly Prohibited.

Module 00 Page IX

Page 20: CEHv8 Module 00

Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical HackerWelcome to Certified Ethical Hacker Class

Student Com puter Checklist C E H

Windows 8 asVM

Windows 7 as VM

BackTrack 5 R3 as VM

M l

Copyright © by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

Student Com puter Checklist C E HCertified Etkxjl b i t o

1 For Wireless Hacking module you will need AirPcap adapter

Make sure you can accessRealHome and Powergym websites athttp://localhost/realhome and http://localhost/powergym

Check if you can access http://www.certifiedhacker.com

Check if you can launchcommand shell by right clicking on a folder

Check if you can access Internet and browse the web using IE,Chrome, Safari and Firefox

Write down IP addresses of the host and all the Virtual Machines

Check if you can ping between the VM and the hosts

Check for snapshots of Virtual Machines

Make sure that you can access D:\CEH-T00ls directory in Windows Server 2012 and Z:\CEH-T00ls from all the VM's; Z: is mapped Network Drive containing CEH tools

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

Ethical Hacking and Countermeasures Copyright © by EC-C0lMCilAll Rights Reserved. Reproduction is Strictly Prohibited.

Module 00 Page X

Page 21: CEHv8 Module 00

Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical HackerWelcome to Certified Ethical Hacker Class

CEH(•*MM tlfcxjl MmM*

Ping Between Virtual M achines and Host

Administrator: C:\W11xlows\systefr132yc1nd.exe

w ith 32 by tee o f d a ta:: bytoo-32 cimo<ln& TTL=128

4: bytes-32 cine <11*3 TTL-128 : byte332־ timeClns TTL-128 : bytes-32 tine<11u TTL-128

<■=151 * I ■C:SU3cr3snd1»ini5tr«tor>ping 1

with 32 bytes of data:

3: b y te 5 -32 t . M - l m ITL-128 : b y tes —32 t in e< ln s ITL-128 : b y t«fv32־ t ifw < in s ITL-12* : b y te s -3 2 t ifw C in s ITL-128

I'-"• —C:\Windows\system32\cmd.exe

1 £1ד;1Reply fron t Reply frow i Reply fruw 1

Plus u t a t i s t i c v f u r 1Pac)<otc: Sont 4 ־ . R«<

Approximate round c r ip t i l Min inum ־ One. Maximui

CiVUaora\RdnlniAtrAtor>_

■1\AH11in>ping 1

: but 32• 1 י t ine-1fi* TTL-12B leuly fr a r t I : bytu-32 I i1r< 11n TTL-12Bleply fra*> I : byt««-32 t >.«e<1..x TTL-12Ntvply fmm 1 : bytev-32 t i1w<111v 11L-12H,111H c ta tiv ticw fo r 1

F ack ato: Sont - A. Rocoivod 4 .־ Loot 0> 0 ־ X 1 0 0 0 ). ipproxlnato round t r ip t in o a in n i l l i - o o c o n d o :

tlin inu n - r»e. tfaxinun־ 9 in o . flvoraqo ■ Ono

: 1 NJta«r«VM1»in >״

Copyright © by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

CEH(•rt'fwd Ethical >U(hM

CEH-Tools Directory in Windows Server 2012 (D:\CEH-Tools)

V_J I * 1 DrMTOMI N<״w Volume (t>)

| Home Share View V O

( $ ) ( ) ' * Comput«r ► NawVolum*(0:) V C 1 1 s*1rch N*wVolum*(D:) P | |

1 )V Fivcrittc■ D«*ktap4 . Download)

«Recent ploce ע [,

SRECYCIE.BIN CEH-Todv Sy*te»r VolumeInformation

3 DocumentsJ ' Musicm! Pictures9 Videos

Computeri i . Local Disk (G)1 rf New Volume (D:)£ * I I

*

*■I Network

?items

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

Ethical Hacking and Countermeasures Copyright © by EC-C0lMCilAll Rights Reserved. Reproduction is Strictly Prohibited.

Module 00 Page XI

Page 22: CEHv8 Module 00

Exam 312-50 Certified Ethical HackerEthical Hacking and CountermeasuresWelcome to Certified Ethical Hacker Class

Copyright © by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

CEHMapped Network Drive (Z:) in Windows Server 2008 VM

-Jnl*Jto* vn |sedl(Joo

|.|T0 U I5 H « I . I f t m Sm m* 1*1 ״י!־Mamt

Computer * *

F!c £d1t View Jo®1® d*P

tap nerA-ork drive »־* urrstai or :range a prog'a* * j t !<,ט אם׳««(זסוי©מ׳ y f Properties ־׳י orgarize ▼ j j j views

Favonte bn<s

rentt׳Docu Pictures muo:

15 1 ^ecendy Changed f l Searches

^ublcFtcppy Dak Drive CD Drive

Hard Disk Drives (1 )

& .o ca l Disk (Cl)

Device* wltli Removable Storage (2)

h jj ״loppy Dis< Orr׳״e (*:)^ DVD Drive (D!)

Network Location (1 )

J ±J

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

Module 00 Page XII Ethical Hacking and Countermeasures Copyright © by EC-C0UnCilAll Rights Reserved. Reproduction is Strictly Prohibited.

Page 23: CEHv8 Module 00

Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical HackerWelcome to Certified Ethical Hacker Class

CEHMmM*

Mapped Network Drive (Z:) in Windows 7 VM

G Z I C l L l I ^

, v|:® . ► Computet ► ▼ 1 | SeorcA Ccrr.outer p 1

Organize▼ Properties System properties Uninstall or charge ג program Map network drive » [|£ ▼ (Jjj O

A־ Favorites ׳E Desktop m Downloads

^ Recent Places

Libraries 1 Documents ^ Music B Pictures Q Videos

- H a rd D isk D rive s (1 )

Local Disk (C:]

f t i / * 6.37 G3*'reeo*'158 G3

' D e vice s w iTh R e m o v a b le S to ra g e (2 )

Floppy Disk Drive (A:) DVD Drive (DO

' N e tw o rk L o ca tion (1 )

CEH-Tools <\\ (Z:)

: ■ Computer

*'p Network

* j f jB tree of 269 OB

r£H-Tnnlc (\\107.1fift1Ml 11J ) (7•) I Tntalc■*•• Network Drive Space free: 365 6B Fie s/stem: NTFS

Copyright © by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

Launching Com m and Shell

־ :° ■New Volume [D.)

. .

Administrator: C:\Wind 0ws\system32\crnd.exe

lnrlud*<nMx*ry ] *Jdlsmlw•.'M AddM'CEHTootuar''3 C »mpn*» •nj «mtJ_9 CompmstoCERToofc-ur־ *

C'tttt 0t<««

* I

CEH(•rtifwd Ethical >U(hM

Copyright © by EG-Gouncil. All Rights )ieServ6d:: Reproduction is Strictly Probfbited.

Module 00 Page XIII Ethical Hacking and Countermeasures Copyright © by EC-COlMCilAll Rights Reserved. Reproduction is Strictly Prohibited.

Page 24: CEHv8 Module 00

Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical HackerWelcome to Certified Ethical Hacker Class

CEHMmM*

Snapshots o f Virtual M achines

I I —Hyper-V Manager

File Action View Help

* * I 8 1 ! 0 1

WIN-ROPCM8VKVOQNew

Import Virtual Machine...

Hyper-V Settings...

5 5 Virtual SAitch Manager...

^ Virtual SAN Manager...

Edit Disk...

Inspect Disk,..

(•) Stop Service

^ Remove Server

Q RefreshView

Q H«p

Windows 7Connect...

fr l Sfttingc..

(•) Turn Off... 0 Shut Down...

Q Save

|| Paute

Reset

V irtu a l M a c hine s

CPU Usage Assigned Memory Up*

1024 MB M3 ז 024

Ch trrrtt 10י hedrtbedt: DKfSb/tuk

settings..Turn Off.. Shut Down.. Save

Pause Reset

|SnapshotRevert..

Rename..Enable Replication ..

Help

=j B32k Track 6

§ Windows 3 j V/indows 2008 Ser/or

Snapshots

₪ g j, Wr*fow3 7 -(4/16/ H Now

□Sjrrrra׳i Marory Namxkng [ Rcpkdton

j j Hyper-V Manager^3 WIN-ROPCM8VKVOQ

Copyright © by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

CEH(•rt.fwa Ethical >U(hM

AirPcap

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

Module 00 Page XIV Ethical Hacking and Countermeasures Copyright © by EC-COlMCilAll Rights Reserved. Reproduction is Strictly Prohibited.

Page 25: CEHv8 Module 00

Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical HackerWelcome to Certified Ethical Hacker Class

P ow ergym and R ealH om e . . . .w v • ? C E HW ebsites

c [ toMlfOS ;• ./rq>nV ־t

-> n 1 • kMMltnc kMh 1

Real Home!

\* K r־ ;ר! ■I TING stlJ

tin Supp*rt 1 FAQ* t :•Irip!״ *

LING KI.N 1IM . IMSINO CUJTIACl US

LOGIN

RealHome: http://localhost/realhome

Copyright © by EG-Gauncil. All Rights Reserved. Reproduction is Strictly Prohibited.

Powergym: http://localhost/powergym

C EHLive Hack Websiteh ttp ://w w w . certifiedhacker. com

CEH Labs

CEH Labs

CEH Labs

CEH Labs

JuGGY B0Vunite״

N l fc t i

J

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

Ethical Hacking and Countermeasures Copyright © by EC-C0UIICilAll Rights Reserved. Reproduction is Strictly Prohibited.

Module 00 Page XV

Page 26: CEHv8 Module 00

Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical HackerWelcome to Certified Ethical Hacker Class

C EH

L et’s Start H acking

Copyright © by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

Module 00 Page XVI Ethical Hacking and Countermeasures Copyright © by EC-COlMCilAll Rights Reserved. Reproduction is Strictly Prohibited.