EC-Council Certified Ethical Hacker v6.1. Cheat Sheet Exercises
|
|
|
- Jonah Gardner
- 10 years ago
- Views:
Transcription
1 EC-Council Certified Ethical Hacker v6.1 Cheat Sheet Exercises
2 How to Use the Cheat Sheets Students often report that the most difficult thing about the CEH exam is the terms, tools, numbers, log files, packet dumps and example scripts. None of these items can be understood without the concepts that give them meaning, but once the concepts are clear, it is still necessary to be exposed to the raw data until they are second nature. Cheatsheets are exercises that can be used to assist with memorization and refresh before the time of the exam. They are not comrehensive reference guides. They are designed to provide only enough data to trigger the memory or assess what needs to be better understood. Having a list of everything at your fingertips is helpful on the job but is almost useless as a study tool. You must interract with the data in order to convert it to information and own it. Since the exam is not open book, the goal is in fact to get to a point where you no longer need the cheat sheets at all. Each cheat sheet is a concept object. These are examples to get you started and provide enough information to establish a grasp of the object at hand. Print them out, and hand copy each one in your own writting to another sheet of paper. Arrange the material in your own way, and add notes to them as you study. Practice this at least three times. On the third try you may find you can copy the entire thing without looking at the original. Then you have mastered it, and will have problems recalling important data druing the real exam. In summary, to get the most out of these study aids, follow these simple tips: 1. Check back often for new versions 2. Print them out and copy them by hand to a blank piece of paper; three times. 3. Take additional notes, fill in any information that seems to be missing
3 Chapter Map for the Cheat Sheets 01 Ethical Hacking CEH Prerequisites Terms and Definitions Methodologies 02 Hacking Laws Legal Issues 03 Footprinting Domain Name Service 04 Google Hacking Google Hacking 05 Scanning NMap Scan Types TCP Handshake Ports and Protocols 06 Enumeration Enumeration 07 System Hacking Password Cracking 08 Trojans and Backdoors Trojans and Malware 09 Virus and Worms Virus Trivia 10 Sniffing, Spoofing, Hijacking Sniffing MAC Addresses Internet Protocol Internet Control Message Protocol User Datagram Protocol Transmission Control Protocol 11 Social Engineering Social Engineering 12 Denial of Service DoS and DDoS Tools 13 Buffer Overflows Buffer Overflows 14 Web Servers and Applications HTTP and URLs 15 Wireless Networks Wireless Technology Wardriving 16 Cryptography Cryptography 17 Hacking Linux Linux Operatinig System Linux Commands 18 IDS, Firewalls, Honeypots Firewalls and IPTables IDS and Snort ** Misc Cheat Sheets Command Line Tools Syntax Recognition Random Recall Exercise
4 CEH Prerequisites There are entry level security classes, but security is not an entry level subject. In order to be comfortable with the CEH training, pre-requisites are assumed and test items will involve topics that time might not permit covering during the live trainging. Prior to training, try to refresh your skill sin the following areas. The more time spent on this step the more comfortable the training experience will be. Know the basics of Information security Concepts such as "CIA (Confidentiality, Integrity, Availability) Coverage would have come during CompTIA or CISSP training Know the basics of networking Physical layer, cabling, hardware devices The function of switches, routers, firewalls IP Addressing, Subnetting and CIDR notation Know how to convert numbers Decimal, Octal, Binary; in all directions and combinations Know the basics of Cryptography There is a module in the class on Crypto, but there may not be time to cover it in class. Sufficient coverage would have come during CompTIA Security+ or CISSP Know the OSI model Application 7 Service protocols Presentation 6 Data formats Session 5 Authentication, Cryptographic agreements Transport 4 Ports, logical service to service connections Network 3 Network to network delivery Data Link 2 Host to host links, contention Physical 1 Media Know how to use a Windows PC Be familiar with the Windows Graphical User Interface Find toolbar icons, manage folders and files, use network shares The labs in this class are difficult and must move rapidly, slowdowns for poor PC skills may result in just watching the demonstration at times, please be understanding of this and courteous to the other students.
5 Terms and Definitions Read the following terms and makwe sure you know their meaning. Look up any that you are not comfortable with. On your own cheat sheet, jot down any additional terms you run across that struck you as new or odd. Term Hax0r Uberhacker L33t Sp33k Full disclosure Hacktivism Suicide Hacker Ethical Hacker Penetration Test Vulnerability Assessment Vulnerabilty Researcher White hat Grey hat Black hat White Box Grey Box Black Box Threat Vulnerability Exposure Exploit TOE Rootkit Botnet Buffer Overflow Shrinkwrap Code Definition Hacker Good hacker Replacing characters to avoid filters Revealing vulnerabilities Hacking for a cause Hopes to be caught Hacks for defensive purposes Determine true security risks Basic idea of security levels Tracks down vulnerabilities Hacks with permission Believes in full disclosure Hacks without permission A test everyone knows about A test with a very specific goal but unspecific means A test no one knows is happening Potential event Weakness Accessibility Act of attacking Target of Evaluation Hides processes that create backdoors Robot network that can be commanded remotely Hijack the execution steps of a program Reused code with vulnerabilities
6 Methodologies This class tells a story, and understanding that story is far more important than memoriing these lists. Think about what actions are taken during each phase, and notice how they logically progress. The phases of an attack 1. Reconnaissance Information gathering, physical and social engineering, locate network range 2. Scanning - Enumerating Live hosts, access points, accounts and policies, vulnerability assessment 3. Gaining Access Breech systems, plant malicious code, backdoors 4. Maintaining Access Rootkits, unpatched systems 5. Clearing Tracks IDS evasion, log manipulation, decoy traffic Information Gathering 1. Unearth initial information What/ Who is the target? 2. Locate the network range What is the attack surface? 3. Ascertain active machines What hosts are alive? 4. Open ports / access points How can they be accessed? 5. Detect operating systems What platform are they? 6. Uncover services on ports What software can be attacked? 7. Map the network Tie it all together, document, and form a strategy.
7 Legal Issues Be able to describe the importance of each of these items. The exam will not go into depth on this, just be prepared to identify the issues. United States Computer fraud and abuse act Addresses hacking activities 18 U.S.C Possession of Access Devices 18 U.S.C Fraud and Related Activity in Conncetion with Computers CAN-SPAM Defines legal marketing SPY-Act Protects vendors monitoring for licence enforcement DMCA - Digital Milenium Copyright Act Protects intellectual property SOX - Sarbanes Oxley Controls for corporate financial processes GLBA - Gramm-Leech Bliley Act Controls use of personal financial data HIPPA - Health Imformation Portability and Protection Act Privacy for medical records FERPA - Family Educational Rights and Privacy Act Protection for education records FISMA - Federal Information Security Management Act Government networks must have security standards Europe Computer misuse act of 1990 Human Rights Act of 1990 Addresses hacking activities Ensures privacy rights
8 Domain Name Service DNS is critical in the footprinting of a target network. It can sometimes save the attacker a lot of time, or at least corroborate other information that has been gathered. DNS is also a target for several types of attack. Fields in the SOA record: (Time in seconds) Serial Refresh Retry Expiry TTL Requesting a zone transfer nslookup; ls -d example.dom AXFR host -t AXFR example.dom ns1.example.dom Using Whois whois example.dom Regional Internet Registrars ARIN APNIC LACNIC RIPE NCC AfriNIC (North America) (Asia Pacific Region) (Southern and Central America and Caribbean) (Europe, the Middle East and Central Asia) (Africa) Attacks against DNS servers Zone transfers Zone poisoning Cache poisoning Reflection DoS Information gathering shortcut Breach the primary server and alter the zone file to corrupt the domain Send false answers to cache servers until they store them Send bogus requests into a chain of servers that do recursive queries
9 Google Hacking An attacker will use Google to enumerate a target without ever touching it. The advanced search syntax is easy to use but can be quirky at times. It takes practice and experimentation. Using Advanced Search operator:keyword additional search terms Advanced Operators site ext loc intitle allintitle inurl allinurl incache Confines keywords to search only within a domain File extension Maps location Keywords in the title tag of the page Any of the keywords can be in the title Keywords anywhere in the URL Any of the keywords can be in the URL Search Google cache only Keyword combinations passsword passlist username user login logon Administrator Admin Root Prototype Proto Test Example Examples site:intenseschool.com (ceh ecsa lpt) intitle:index.of allinurl:login logon -ext:html -ext:htm -ext:asp -ext:aspx -ext:php
10 Nmap Scan Types Nmap is the de-facto tool for footprinting networks. It is capable of finding live hosts, access points, fingerprinting operating systems, and verifying services. It also has important IDS evasion capabilities. Discovery Scans Option -sp -sl -so -sv -sl Description Ping List Scan Protocol Verify List scan Normal Scans Windows Linux Option Desc Flags Open Closed Open Closed -st Connect S SA RA SA RA -ss Stealth S SA RA SA RA Inverse Scans Windows Linux Option Desc Flags Open Closed Open Closed -sn Null - RA RA - RA -sx Xmas UPF RA RA - RA -sf Fin F RA RA - RA -sa Ack A R R R R -sw Window A R R R R Other Important Nmap Options Option Description -A Enable OS detection, Version detection, Script scanning and Traceroute -n Do not lookup DNS -v Verbose output -T [0-5] Timing - 5 is faster -P0 Do not ping first
11 TCP Flags This test will have scenarios that require you demonstrate an understanding of TCP behavior including Nmap scan types. Be sure to know each of these combinations well. TCP Flags 0 0 URG ACK PSH RST SYN FIN TCP Handshake (Open Port) Direction Binary Hex Flags A -> B x02 S Seq = 1 Ack = 0 B -> A x12 A S Ack = 2 Seq = 10 A -> B x10 A Seq = 2 Ack = 11 TCP Handshake (Closed Port) A -> B x02 S Seq = 1 Ack = 0 B -> A x14 A R Ack = 2 Seq = 0 NMap Stealth Scan (Open Port) Direction Binary Hex Flags A -> B x02 S B -> A x12 A S A -> B x04 R NMap Xmas Scan (Open Port) Direction Binary Hex Flags A -> B x29 U P F No response from Linux hosts, R A from Windows NMap ACK Scan Direction Binary Hex Flags A -> B x10 A A -> B x04 R Solaris will not respond on open ports
12 Ports and Protocols These must be memorized! Also be prepared to convert them to hexadecimal representation in case they must be identified in a packet dump, log file, IDS rule, or a sniffer capture/display filter. Protocols 1 ICMP 6 TCP 17 UDP 47 GRE 50 AH 51 ESP Ports FTP 22 SSH 23 Telnet 25 SMTP 42 WINS 53 DNS HTTP 88 Kerberos 110 POP3 111 Portmapper (Linux) 119 NNTP 135 RPC-DCOM SMB 143 IMAP SNMP 389 LDAP 445 CIFS 1080 SOCKS RDP 6667 IRC Palm Pilot Remote Sync Trojan Horses 7777 Tini NetBus Back Orifice Sub7
13 Enumeration Enumeration is the act of making a list of policies, user accounts, shares and other resources. This step happens just before vulnerability assessment and helps the attack put together the best strategy for gaining access. Establishing a Null Session net use \\[target ip]\ipc$ "" /user:"" Protecting Information Disclosure HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\RestrictAnonymous 0 is the default for Windows 2000 and gives up everything 1 is the default for Windows 2003 and gives up less 2 is the most secure setting but makes a machine not very cooperative with others Microsoft SIDs S < >-500 Built-in Local administrator S < >-501 Built-in Local guest S < >-512 Built-in Domain administrator S < >-1000 Anything above 1000 are users that have been created Ports involved with enumerations attacks 111 Linux Portmapper Service 42 WINS 88 Kerberos 135 Windows RPC-DCOM 137 NetBIOS Name Service 138 NetBIOS Datagram Service 139 NetBIOS Sessions 161 SNMP Agent 162 SNMP Traps 389 LDAP 445 CIFS (Common Internet File System) Misc. "public" and "private" default community SNMP strings is an SNMP OID ou=sales,cn=example... is an LDAP (LDIF) name string fingerd the finger daemon was used in older UNIX systems
14 Password Cracking This test will have scenarios that require you demonstrate an understanding of TCP behavior. Be sure to know each of these combinations well. Types of password cracking techniques Guessing Dictionary Brute Force Hybrid Is the most efficient, assuming information gathering before hand Based on a predetermined list of words Trying every possible combination of characters A combination of all other attacks LM Hashes Every password is ultimately 14 characters long, split into two 7 character halved Passwords that are less than 7 character are easily identified in the SAM file (hash ends in 404EE) Rainbow Tables "Time / Memory Trade off"" Less memory than a lookup, less computing than a brute force. Salting the hash is a way to combat rainbow tables. Cracking Effort Weak passwords Strong passwords Rainbow Tables DNA can be cracked in seconds might take the lifetime of several universes to crack Solve the "Time / Memory Trade Off" Distributed Network Architecture Popular Cracking Tools John the Ripper L0phtcrack 0phtcrack Cain and Abel Command line tool that runs under both Windows and Linux Commercial tool Open source tool that supports rainbow tables Powerful multipurpose tool that than sniff and crack passwords af many types
15 Trojans and Malware The official definition is: A legitimate application that has been modified with malicious code. A Trojan horse is a social engineering technique. It masquerades as a legitimate download and injects the victim's host with an access point, or a client that can connect outbound to a server waiting remotely. They don't necessarily exploit a vulnerability unless privilege escalation is necessary. They provide a command environment for whoever connects to them that includes: File browsers, keyloggers, web cam viewer, and many additional tools. Terms Wrapper or Binder Rootkit HTTP Trojan Netcat Hoax Keylogger Application used to combine a malicious binary and a legitimate program Can be installed via Trojan, used to hide processes that create backdoor access Reverses a connection outbound through an HTTP or SHTTP tunnel Not really a Trojan, but often used in Trojan code to setup the listening socket Many legit tools are rumored to be Trojans but might not be Records the keystrokes on the install host and saves them in a log Famous Trojans Tini Small 3Kb file, uses port 7777 Loki Used ICMP as a tunneling protocol Netbus One of the first RATs (Remote Authentication Trojan) Sub 7 Written in Delphi, expanded on what Netbus had demonstrated Back Orifice First modular malware, had the capabilities to be expanded on by outside authors Beast All in one Client / Server binary MoSucker Client could select the infection method for each binary Nuclear RAT Reverse connecting Trojan Monkey Shell Provides a powerful shell environment that can reverse connections and encrypt commands. Detecting Trojans netstat / fport tcpview Process Viewer Autoruns Hijack This Spybot S&D Command line tools for viewing open ports and connections GUI tool for viewing open ports and connections GUI tool for showing open processes including child processes Lists all programs that will run on start up and where they are called from Displays a list of unusual registry entries and files on the drive Originally volunteer supported scanning and detection tool
16 Virus Trivia No one is expecting you the student to stay on top of the 40k or so known malware variants that have been discovered. But there are a few that are significant for demonstrating the capabilities of this method of attack. Think of the malware mentions in the course as examples of what thousands of others have copied or improved upon. Phases of an outbreak Infection -> Spreading -> Attack Virus Lifecycle Design - > Replication -> Launch -> Detection -> Incorporation -> Elimination Types of Viruses Boot Virus Infects the boot sector of floppies or hard disks Macro Virus Written in Microsoft Office Macro language Network Virus Spreads via network shares Stealth Virus Hides in a file, copies itself out to deliver payload Polymorphic Virus Encrypts itself Cavity Virus Hides in the empty areas of executables Tunneling Virus Trace interceptor programs that monitor OS Kernel requests Camouflage Virus Disguise themselves as legit files Multipartite Virus Infects via multiple vectors Metamorphic Virus Rewrites itself Famous Viruses Elk Cloner Morris I Love You Melissa Klez Slammer MyDoom MonteCarlo 1st virus 1st worm VBScript worm, sent via Macro virus Mass mailer with its own SMTP engine Targets SQL server, total size of 376 bytes Mass mailer, uses port 3127, attacks the hosts file Memory resident, copies to the end on exe files
17 Sniffing Social Engineering is the most powerful attack tool. It requires no equipment or technology, and often minimal expense. Only proper user education and awareness can prevent it and even then, errors in judgment can still be exploited. Methods for defeating a switch Admin the switch MAC Spoofing MAC Flooding ARP Poisoning If the password for the switch can be guessed, a port can be placed into monitor mode Set the MAC address of a NIC to the same value as another Overwhelm the CAM table of the switch so it coverts to hub mode Inject incorrect information into the ARP caches of two or more endpoints. Wireshark command line tools tshark dumpcap capinfos editcap mergecap text2pcap tcpflow tcptrace tcpreplay Command line version of Wireshark Captures traffic Reads a saved capture file and returns statistics about it Edit and/or translate the format of capture files Merges multiple capture files into one Generates a capture file from an ASCII hexdump of packets Extracts data streams from dump files Analyzes TCP conversations Can resend capture packets TCPDump capture filters Capture filters will be kept simple on the test. They look basically like English phrases. Analyze the examples below to get an idea. host and not (port 80 or port 25) port not 53 and not arp ip proto 1 (tcp[2:2] > 1500 and tcp[2:2] < 1550 Wireshark display filters Display filters work basically like: proto.field operator value Analyse the following examples: tcp.flags == 0x29 ip.addr!= tcp.port eq 25 or icmp ip.src== /16 and ip.dst== /16 http.request.uri matches "login.html"
18 MAC Addresses Sniffing and defeating Ethernet switches requires an understanding of hardware addresses. Due to the risks involved with these local attacks, Intrusion Detection Systems are looking for too much ARP traffic or strange MAC addresses. The MAC 48 Format A Media Access Control address is 48 bits The first 3 bytes of the MAC is a vendor code The other three bytes are arbitrarily assigned A broadcast MAC address is FF:FF:FF:FF:FF:FF Addresses can be assigned in two ways BIA - Burned in Address OUI - Organizationally Unique Identifier The two least significant bits of the first byte in the OUI address nnnnnn0n = Universally administered address nnnnnn1n = Administratively assigned nnnnnnn0 = Unicast traffic nnnnnnn1 = Multicast traffic
19 Internet Protocol Internet protocol is responsible for packaging datagrams for delivery between networks. It is a "best effort" protocol with no error control or correction. For more information read RFC 791 Internet Protocol Header Checklist of items to concentrate on: How IPIDs work How the fragmentation works How the TTL works Protocol IDs Basic IP addressing principles DoS attacks relating to IP
20 Internet Control Message Protocol ICMP is a transport protocol that creates message datagrams that can be exchanged by network hosts for troubleshooting, error reporting, and information. For more information read RFC 792 For a complete list of type and codes visit ICMP Header Example: Type Code Description 0 0 Echo Reply 3 Destination Unreachable 3 13 Administratively Prohibited 8 0 Echo Request 5 0 Redirect 11 0 Time Exceeded 13 - Timestamp Request Don't forget!! Type 3 Code 13 means administratively prohibited
21 User Datagram Protocol User Datagram Protocol is a simple fast transport protocol that is used for its low overhead in situations where error correction and flow control is not needed, such as short bursts of messages. UDP is difficult to firewall off effectively because it is stateless. For more information read RFC 768 User Datagram Protocol Checklist of items to concentrate on: Port addresses and ranges How ICMP and UDP assist each other UDP based Denial of Service Attacks
22 Transmission Control Protocol TCP provides guaranteed transport and flow control of layer 5-7 messages. Along with IP, ICMP, and UDP, a good solid understanding of this protocol is critical for understanding: Scanning, Firewalls, Intrusion Detection, and various types of DoS attacks. For more information read RFC 793 Transmission Control Protocol Checklist of items to concentrate on: Port addresses and ranges Order of the six flags How the handshake works How the sequence numbers work How session hijacking works Denial of service attacks related to TCP
23 Social Engineering Social Engineering is the most powerful attack tool. It requires no equipment or technology, and often minimal expense. Only proper user education and awareness can prevent it and even then, errors in judgment can still be exploited. The principles of Social Engineering Authority Scarcity Liking Reciprocation Consistency Social Validation An intimidating presence Create the perception of loss or lack of access to a resource Charm and charisma The victim believes they owe the attacker a favor Appealing the a victims true feelings and opinions Compliments and praise Types of Social Engineers Insider Associates Insider Affiliates Outsider Affiliates Have limited authorized access, and escalate privileges from there. Are insiders by virtue of an affiliation, they spoof the identity of the insider. Are non trusted outsiders that use an access point that was left open.
24 DoS and DDoS Denial of Services and Distributed Denial of Service attacks are embarrassing and inconvenient. They are extremely difficult to prevent from being attempted. The best defense is a well designed network that is hard to overwhelm. DoS Methods Buffer Overflows Smurf Fraggle Ping of Death Teardrop Unnamed Syn Flood Land Winnuke Crashes applications or services Spoofed traffic sent to the broadcast address of a network UDP version of the Smurf, usually bouncing Chargen traffic off Echo ports Packet larger than the 64k limit Offset values modified to cause fragments to overlap during reassembly, results in short packet Offset values modified to cause gaps between fragments, results in long packets SYN flags sent to open ports, no completion of the hansdshake Traffic sent to a victim spoofing itselft as the source, results in ACK storms Sends TCP traffic with the URG flag set, causes CPU utilization to peak Dos Tools Jolt2 Land and La Tierra Targa Blast20 Crazy Pinger UDP Flood Floods with invalid traffic results in 100% CPU utilization Executes teardrop and land attacks Provides a menu of several DoS attacks Also considered to be a web server load tester ICMP flooder UDP flooder written by Foundstone DDos Attacks Botnets - Command and Control Center communicates with "Handlers" which in term communicate with Zombies. The handlers and zombies are machines infected with malware. The C&CC is either a chatroom on IRC, or can even be a distributed system of infected machines. DDoS Tools Trinoo Tribal Flood Network TFN2K Stacheldraht Agobot Nuclear Bot One of the first to demonstrate "Master/slave" DDoS attacks Could launch several DoS attacks from distributed positions at the same time Bug fixes and updates to the original TFN Means "Barbed Wire" in German A modular IRC bot, many derivatives have been created from this code Developed by "Nuclear Winter Crew" and written in Delphi, many features
25 Buffer Overflows It isn't necessary to become a "C" programmer to pass the test, but several basic concepts and terms are critical in the understanding of BO scripts and the detection of BO attacks. Terminology Stack Heap Push Pop EIP NOOP NOOP Sled Memory place for short term processing Memory space for long term program execution "Push" new instructions onto the stack "Pop" instructions off the stack when processed Execute Instruction Pointer, memory address of next instruction to be executed A "do nothing" instruction that wastes a clock cycle Placed in a buffer overflow exploit to aid in running the payload Dangerous Functions The following functions are dangerous because they do not check the size of the destination buffers: gets() strcpy() strcat() printf() The >> operator is also dangerous for the same reason Canary bytes String terminating characters: LF CR NULL EOF Line Feed Carriage Return Null End of File A randomly chosen value can also be placed at the end of a stack and checked. Recognizing a buffer overflow attempt Apr 5 02:02:09 [3432] : nops: :3211 -> :135 0x90/0x90/0x90/0x90/0x90/0x90/0x90/0x90/0x90/
26 HTTP and URLs HTTP is the protocol for the World Wide Web. The client (web browser) sends request to the server (Apache, IIS) which is turn passes the request to an application. There are several attack types that are possible in this exchange since all of these components can have vulnerabilities. HTTP Error Codes 200 Series Everything is OK 400 Series Could not provide requested resource (page not found, moved, authentication failure) 500 Series Could not process request (script error, database connection error) ASCII Characters. %2E / %2F < %3C > %3E Uniform Resource Locators (URL) Protocol FQDN Resource Path Query String Representing IP Addresses Dotted Quad Hex Quad Decimal Converting Dotted Quad to Decimal (using above example) Formula (256^3 * 192) + (256^2 * 168) + (256^1 * 100) + (256^0 * 125) Simplified ( * 192) + (65536 * 168) + (256 * 100) Simplified again = Answer
27 Wireless Technology Wireless is fast becoming the network technology of choice because it is cheap and easy. It is also a hubbed environment that can leak signals for miles. Configuring wireless technologies is an often misunderstood process, and often leaves many opportunities available for attack Spec Distance Speed Freq a 30M 54Mbps 5Ghz b 100M 11Mbps 2.4Ghz g 100M 54Mbps 2.4Ghz n 125M 600Mbps 5Ghz i is a rewrite of WEP called WPA/TKIP Wireless Security WEP WPA WPA/TKIP WPA2 OSA PSK Uses RC4 for the stream cipher with a 24b initialization vector Key sizes are 40b or 104b Uses RC4 for the stream cipher but supports longer keys Changes the IV with each frame and includes key mixing Uses AES as the stream cipher and includes all the features of TKIP Open Systems Authentication is a non-protected AP that broadcasts its SSID Pre-Shared Key is protected by an encryption standard Terms and Tools Wardriving Warchalking Jamming Netstumbler Ministumbler Macstumbler AirPcap Airopeek AircrackNG Airsnort CoWPAtty Driving around with portable equipment and locating wireless networks Writing symbols on the sidewalk or buildings communicating found networks Producing white noise signals that overpower the Wifi networks Finds wireless networks, SSIDS, and channels for the pocket pc for the Macintosh Hardware tools for wardriving, WEP cracking, and sniffing Sniffer that specializes in wireless traffic WEP cracker Another WEP cracker WPA offline brute force cracker
28 Wireless Technology Wireless is fast becoming the network technology of choice because it is cheap and easy. It is also a hubbed environment that can leak signals for miles. Configuring wireless technologies is an often misunderstood process, and often leaves many opportunities available for attack. WLAN Channels Each channel increments by.005mhz Wardriving Symbols
29 Cryptography Cryptography is assumed pre-requisite for this class. Its still a good idea to review some core terminology before the exam. Terms and Definitions Plaint Text Cipher Text Cryptanalysis Cryptography Steganography Salt Initialization Vector The data set before encryption The result of encryption Attempting to "break" and encryption algorithm Obscuring the meaning of a message Hiding a message within another Ensures different keys are created each time Change the characteristics of the key each time it is reused Types of Cryptography Symmetric Asymmetric One-Way Hash Single key both encrypts and decrypts A pair of keys, public and private are mathematically associated One encrypts and the other decrypts, private key is always a secret Cannot be reversed, only brute forced Used to represent data, sometimes called "Digital Fingerprint" or "Message Digest". Symmetric Algorithms DES Block 56 bit key used in LM Hash password storage 3DES Block 128 bit key used in NTLM RC4 Stream Used in WEP AES Stream Used in WPA2 Asymmetric Algorithms RSA Asymmetric Used in SSL/TLS Elliptic Curve Asymmetric Used in TLS for portable devices One-Way Hashes MD5 One Way Hash 128b hash value, used for integrity checks SHA-1 One Way Hash 160b hash value, stronger than MD5
30 Linux Operating System While it is not necessary to be a Linux administrator or developer to pass this test, there is some assumed knowledge of a few basics, particularly pertaining to Security issues. Linux File System / Root of the file system /var Variable data, log files are found here /bin Binaries, commands for users /sbin System Binaries, commands for administration /root Home directory for the root user /home Directory for all home folders for non-privileged users /boot Stores the Linux Kernel image and other boot files /proc Direct access to the Linux kernel /dev direct access to hardware storage devices /mnt place to mount devices on onto user mode file system Identifying Users and Processes INIT process ID 1 Root UID, GID 0 Accounts for services All other users Above 1000 MAC Times Modify Access Change Modify the contents of the file When the files was accessed last Metadata change Use the "touch -mac filename" command to update all of them at the same time Permissions User Group Others R W X SUID 4000 SGID 2000 Examples User can RWX, Group can RW and Others can R 764 User can RW, Group can R and others can R 644 SUID bit set, User and group can RWX 4770 SUID and GUID bit set, all users can RWX 6777
31 Linux Commands Practice the following commands and be able to recognize them in a shell script or log file. Always remember to "manpage" a command. Get used to reading about options and usage. Command Notable Options Description Using Linux (Basic Commands) man / Manual pages ls -l Looksee into a directory cd Change directory pwd Print working directory touch -macr Create a file or update its attributes mv Move a file rm Remove a file mkdir Make a directory grep String search utility more Paginate the output to the console nano Simple text editor vi Powerful text editor gcc -o Compile from source code Administration and Troubleshooting dd Create an image file of a volume or device file Query a file for its type netstat List state of TCP/UDP ports dig DNS Zone transfer host Look up DNS records lsof List open files ps aux View process list rpcinfo Enumerate portmapper smbclient -L List or use SMB shares md5sum Calculate MD5 hash Security tools that run best under Linux (add your own to this list!) mailsnarf, urlsnarf, filesnarf ettercap -q -z MiTM sniffer nmap Network mapper hping -c count -S Packet crafter snort Network Intrusion Detection iptables -P -A -j --sport --dport -p Kernel mode firewall kismet WiFi scanner and sniffer nikto Web vulnerability scanner maltego Information gathering tcpdump -i Command line sniffer firewalk -u Firewall enumerator nc -l -e -v "Swiss army knife"
32 Firewalls and IPTables The Linux firewall makes a good teaching example because once you understand it, all firewalls are easier. It is free, open source, and widely available. Types of Firewalls Packet filter The simplest form of filtering, looks only at layer 3 and 4 Stateful Inspection Understands directionality and established sockets Circuit Level Gateway Translates sequence numbers along with addresses and ports Application Proxy Deep packet inspection al the way into the payload Attacking Firewalls TCP Flag combinations Firewalking ACK floods 0th fragment not ICMP redirection Tunneling and port redirection While some flag combinations are filtered, others may pass Enumerating ACLs on a filter Overwhelming an SPI firewall into thinking the traffic should pass Host based firewalls only: The 0th fragment has TCP data, the others do Hijack local hosts to use the attackers host as a gateway, the traffic can be altered or observed Hiding data inside encapsulation Setting up a network firewall A host based firewall only protect the host, a network based firewall must also be a router. In Linux, the Kernel must be told to forward packets: echo 1 > /proc/sys/net/ipv4/ip_forward There are several default tables for a forwarding firewall to be aware of: INPUT OUTPUT FORWARD ACCEPT NAT IPTables Example: Defending against a Smurf attack iptables -A FORWARD -p tcp -s 0/0 -d x.y.z.m/32 --destination-port 25 --syn -j ACCEPT iptables -A FORWARD -p tcp -s 0/0 -d x.y.z.w/32 --destination-port 80 --syn -j ACCEPT iptables -A FORWARD -p tcp -s 0/0 -d x.y.z.w/32 --destination-port syn -j ACCEPT iptables -A FORWARD -p tcp -s 0/0 -d 0/0 --destination-port 22 --syn -j ACCEPT
33 IDS and Snort Intrusion Detection Systems are a key technology for protecting a network. Attackers can also use them to look to look for very specific events on the network such as logins or other attackers. As a counterpart to firewalls, IDS is a great way to bring together the many of the concepts that been discussed in this course including; sniffing, scanning, and the four major protocols (IP, ICMP, TCP, UDP). Types of IDS Host Based Active Listens on the hosts Network Based Passive Listens on the network Detection Engines Signature Analysis Real time Uses a rules based approach Anomaly Analysis Real time Requires a baseline to compare with Statistical Analysis Not real time Analysis of patterns and occurances Evasion Techniques Encryption Fragmentation Decoy traffic IDS cannot decrypt data to look at it IDS might be too busy peicving together traffic and start ignoring some False positives can confuse investigators Snort rules Snort rules take on the following syntax: action protocol address prot -> <> address prot (option:value; option:value;) Starting Snort Display layer 2 and 7 to the console, use our own rules file and log here snort -dve -c./rules.local -l. Examples of Snort rules The simplest rule alert tcp any any -> any any (msg: Sample alert ; sid: ;) Detecting a simple signature alert tcp any -> \ (msg: Possible SMBDie Attempt"; content: 5c ; sid: ;) Dynamic rules (May be phased out in favor of a new method called "tagging") activate tcp any any -> any 21 (content:"login"; activates:1; sid: ;) dynamic tcp any any -> any 21 (activated_by: 1; count:100;)
34 Command Line Tools The key to becoming comfortable with command line tools is to practice saying in plain language what a command is trying to instruct the computerto do. Its hard to memorize switches and far easier to understand what a tool does. As you study and find more examples, add them to this list. NMap nmap -st -T5 -n -p Use nmap to run a connect scan at a fast rate without DNS resolution to ports at host Netcat nc -v -z -w Use netcat, show on the console a scan that sends packets every 2 seconds to host tcpdump tcpdump -i eth0 -v -X ip proto 1 Use tcpdump to listen on interface eth0 andsdisplay layer 2 and 7 for ICMP traffic snort snort -vde -c my.rules -l. Use snort and show on the console layer 2 and 7 data using configuration file my.rules and log in this directory. hping hping3 -I eth0 -c 10 -a t Use hping3 on eth0 and send 10 packets spoofing and a TTL of 100 to host iptables iptables A FORWARD j ACCEPT p tcp --dport 80 Use iptables and append the forward table with a rule that will jump to the accept table when tcp traffic that has a destination port of 80 is noticed.
35 Syntax Recognition The CEH exam rewuires that you can recognize what an attack looks like from a log file. The following are examples that can be used to help explain the principles of each type of attack: Directory Traversal XSS (Cross Site Scripting) ang= SQL Injection )%3B+--lang= blah' or 1 = 1 -- Nimda Virus Code Red GET/default.ida?NNNNNNNNNNN%u9090%u688%u8b00%u0000%u00=a HTTP/1.0 SNMP OID Buffer overflow attempt Apr 5 02:02:09 [3432] : nops: :3211 -> :135 0x90/0x90/0x90/0x90/0x90/0x90/0x90/0x90/0x90/ Zone Transfer Apr 5 02:02:09 [3432] : AXFR: :4865 -> :53 Enumerate accounts Apr 5 02:02:09 [3432] : VRFY: :5674 -> :25 Snort Signature Rule Alert tcp any any -> any any (msg:"test Rule"; sid: ;) IPTables Rule iptables A FORWARD j ACCEPT p udp -dport 53 Capture Filter host and host ip proto 1 Display Filter ip.addr == && tcp.flags == 0x29
36 Random Recall Exercise Memorizing a list of tool names is difficult and not actually very beneficial. A better approach is too strengthen your minds ability to "think" it has seen all of these things before and map them to an important concept. The list below is made up of names of tools and malware code divided into groups of five. Sometimes they are related and other times have nothing in common at all. Glance at a group and jot down the first word or phrase that comes to mind and move on to the next group. So not try to explain every item; just one word or phrase an keep going. One term may remind you of something, but your subconscious will see the others as well. On each pass, try to recall something different. DOS Smurf SYN flood Fraggle Buffer Overflow Ping OF Death Tear drop The UNnamed Attack Land SMB Die Chargen CPU Hog Dos Attack Tools Jolt2 Bubonic Land and LaTierra Targa Blast20 Nemesys Panther2 (Nuke) ICMP Packets Sender Some Trouble UDPFlod FSMax Trinoo TFN (trible Flow Network) Stacheldrach TFN2K Shaft Mstream Trinity Knight Kaiten Worms Slammer Bots Bot Nets
37 Agobot/Phatbot/Forbot.Xtrembot SDBot/RBot/UrXBot mirc-based Bots-GT-Bots: DSNX Bots Q8 Bots Kaiten r1-based bots nslookup whois Sam Spade Smart Whois NetScan GTWhois Xwhois ARIN LACNIC APNIC DNS Enumnerator subdomain retrieval Spiderfoot Domain footprinting tool SensePost Footprint Footprinting toolset Bile Bile-Weigh TLD vet-iprange qtrace vet-mx jarf-rev jarf-dnsbrute Teleport Pro Wikto HTTrack Web Copier Tifny Google Google Earth ciseek.com DMOZ Internal URL guessing Archive.org Neotrace VisualRoute Trace Smart Whois Tacker Pro Website Watcher (change notification) GEO Spider
38 GEOwhere (news search) Spider Necrosoft Advanced DIG IANA (Internet Assigned Numbers Authority 3D Traceroute Kartoo Search Engine Touchgraph Visual Browser VisualRoute Mail Tracker ReadNotify.com ( tracking) Web Ripper Robots.txt Spiders Web Data Extractor 1st Address Spider Power Collector Tool HPing2 Firewalk Nmap Blaster Scan Port Scan Plus Strobe IPSecScan NetScan Tools Pro WUPS - UDP Scanner SuperScan IPScanner MegaPing Global Netwrok Inventory Net Tools Suite Pack FloppyScan PhoneSweep - War Dialing Tool THC Scan Sandtrap Tool pof-banner Grabbing Tool Httprint Banner Grabbing Tool Xprobe2 Ring V2 Netcraft URL site IIS Lockdown Tool Servermask PageXchange Bidiblah Automated Scanner Qualys Web Based Scanner SAINT ISS Security Scanner Nessus
39 GFI Languard SATAN Retina Nikto SAFEsuite Internet Scanner IdentTCPScan Cheops Friendly Printer Free Proxy Servers (page 352) SocksChain Proxy Workbench Proxymanager Tool Super Proxy Helper Tool Happy Browser Tool Multiproxy Tor Proxy Chaining Software Proxy Finder Proxybag Proxy Scanner Server Cheron Anonymizers Primedious Anonymyzer Anonymous Surfing Browzar Torpark Browser G-Zapper SSL Proxy Tool HTTP-Tunnel HTTP Port Despoof Tool What It Is Sentry PC Enumeration SNMP Enumeration Countermeasures Windows 2000 DNS Zone transfer Identifying Win2000 Accounts Active Directory Enumeration SNMP Enumertion SNMPUtil NetBios Null Sessions NetBIOS Enumeration DumpSec NAT IP Network Browser User2SID SID2User Enum UserInfo
40 GetAcct NewSID NetBrute wmidump ShareEnum WinFingerprint Untility snmpenum winfo w2k Active Directory Attack IP-Tools getacct netview superscan enum pstools ps exe ps file psgetrid pskill psinfo pslist pslogged on pspaaswd psservice solarwinds snscan getif Network View The Dude Sniffer Ethereal tcpdump ARP Spoof Ethercap Macof Etherflood IRS ARPWorks Nemesis arpspoof dnsspoof dsniff filesnarf mailsnarf msgsnarf sshmitm tcpkill tcpnice
41 urlsnarf webspy Webmitm TCP Relay EffeTech Password Sniffer MSN Sniffer SmartSniff Netwitness Cain and Abel Packet Crafter SMAC NetSetMan RAW SNIFFING TOOLS: Sniffit Aldebaran Hunt NGSSniff Ntop pf IPTraf EtherApe Snort Windump/tcpdump Etherpeek Mac Changer Iris NetIntercept WinDNSSpoof Netfilter Network Probe MaaTec Network Analyzer Antisniff ArpWatch PromiScan AntiSniff Prodetect Apple II Virus 1981 Brain 1983 Virdem 1986 Lehigh Virus IBM Christmas Worm MacMag Scores Virus Internet Worm AIDS Trojan
42 VX BBS Little Black Book (AT&T Attack) Tequila (first Polymorphic virus) Michelangelo DAME (Dark Avenger Mutation Engine) VCL (Virus Creation Laboratory) Boza (Windows 95) Laroux (Excel Macro) Staog (Excel Macro) Strange Brew (Java based) Back Orifice (first remote admin control) Melissa (Word macro virus and worm) Corner (ms project) Tristate (multi-program macro) Bubbleboy (opening spread) Love Letter (fast, shuts down ) Timofonica (VBS on phones) LIberty (for PDA's) Pirus (PHP scripting) Gnuman (masked in file sharing) Winux virus (infects both Windows and Linux) LogoLogic-A Worm (MIRC chat and ) PeachyPDF (Adobe PDF worm) Apple Script worm Nimda LFM-926 (against shockwave flash) Donut (against.net) Sharp A Javascript Worm/SQLSpider (MS SQL) Benjamin (P2P Perrun Virus (Jpeg) Scalper Worm (FreeBSD and Apache) Sobig (SMTP Slammer worm (MS SQL servers) Lovegate (trojan and worm) Fizzer ( and P2P) Welchia Trojan.Xombe Randex Bizex Witty MP3Concept Sassar Mac OS X W64.Rugrat.3344 Symb/Cabir-A JS/Scob-A
43 WCE/Duts-A W32/Amus-A WinCE/Brador-A JPEG Weakness SH/Renepo-a Bofra/IFrame Santy MYDOOM I Love you virus (VBS Script) Virus Hoaxes CT Cookie Spy Dictionary Maker LophtCrack (LC4) Brutus AuthForce Cain&Abel Munga Bunga ReadCookies.html WinSSLMiM GammaProg John the Ripper Obiwan Hydra Webcracker Passlist Snadboy RAR Messenpass Wireless WEP Key Password Spy RockXP PasswordSpectator Instant Source wget Web Sleuth Black Widow Window Bomb Burp curl sitescope Tool WSDigger CookieDigger SSLDigger SiteDigger dotdefender Google Hacking Database (GHDB) Acunetix Webscanner Appscan
44 AccessDiver Xsite Scripting SQL Inject CMD Inject Cookies/Session Poisoning Parameter/Form Tampering Buffer Overflow Doirectory Traversal/Forceful Browsing Cryptographic Interception Authentication Hijack Log Tampering Error Msg Intercept attack Obfuscation Application Platform Exploits DMZ Protocol Attacks Security Management Exploits Web Services Attack Zero Day Attacks Networtk Access Attacks TCP Fragmentation Log Analyzer CleanIISlog Metasploit Framework Immunity Canvas Professional Core Impact UpdateExpert qfecheck HFNetchk cacls.exe Whisker N-Stealth HTTP Vul Scanner WebInspect Shadow Security Scanner SecureIIS Buffer Overflow $DATA IIS vulnerability ShowCode.ASP IIS Directory Traversal ISSxploit.exe Msw3prt IPP Vulnerability WebDav/ntdll.dll Vul RPC DCOM ASN exploits ASP Trojan URL Poisoning SQL Injection
45 Authorization bypass SQL injection using single quotes execute OS command Bad login and bad product list Getting Output of SLQ Query. Get Data from DB using ODBC Error message AutoMagic SQL Absinthe SQLDict sqlexec SQLbf SQLSmack SQL2.exe AppDetective Database Scanner SQLPoke NGSSQuirreL SWLPing v2.2 Walking Wardriving WarFlying WarChalking Blue jacking GPS Rogue AP Fake AP NetStumbler MiniStumbler AiroPeek WEPCrack, AirSnort KisMAC Kismet WepLab Wellenreiter Fatajack Redfang 2.5 THC-WarDrive PrismStumbler MacStumbler Mognet WaveStumbler StumbVerter AP Scanner SSID Sniff Wavemon Wireless Security Auditor AirFraf
46 Wifi Finder AirMagnet NAI Wireless Ethereal VPNmonitorl Aerosolve.65 VxSniffer EtherPEG DriftNeit WinDump Ssidsniff NetChaser v1.0 WinPcap AirPcap BSD-Airtools AirDefense Guard WIDZ Netbios Auditing Tool Smbbr SMBCrack Tool Legion L0phtCrack PWdump RainbowCrack KerbCrack NBTDeputy NetBios Dos Attack John the Ripper ScoopLM SMBRelay SMBCapture SMBProxy SMBGrind SMBDie Syskey Utility Active Password Changer X.EXE PsExec Remoxec Alchemy Remote Executor SC-KEylog SC-Keylog PRO SpyTestor FTP Keylogger IKS Software Invisible Keylogger Ghost Keylogger KeyGhost USB Keylogger Perfect Keylogger
47 Stealth Redirector Spyware Spector Pro RemoteSpy eblaster Stealth Voice Recorder Stealth Keylogger Stealth Website Logger Digi-Watcher Video Surveillance Desktop Spy Screen Capture Program Telephone Spy Print Monitor Spy Tool Wiretap Professional FlexiSpy PC Phonehome Rootkits Blacklight Rootkit Revealer AFX Rootkit 2005 Nuclear Vanquish Rootkit Countermeasures Pathfinder Rootkit Revealer Back Orifice Deep Throat NetBus Whack-a-mole NetBus 2 Girl Friend Sub Seven WinTrinoo Tini icmd netcat Beast MoSucker Trojan Proxy Server Trojan SARS Trojan Wrappers RemoteByMAil HTTP RAT Shttpd Trojan Nuclear RAT BadLucj Destructive Trojan ICMP Tunneling
48 ScreenSaver Password Hack Phatbot Amitis Senna Spy QAZ Cyber Spy Subroot Telnet RECUB Loki Sockets de Troie MAsters Paradise DEvil Evil Doly Trojan Chargen Stealth Spy Phaze NetBIOS datagram ICQ Trojan MStream The PRayer Online KEyLogger Portal of Doom Senna Spy Trojan Cow netstat fport TCPview CurrPorts Tool Process Viewer Device Drivers Registry Autoruns Startup List Tripwire (SIV) SIV / SFV MD5sum ipchains SARA gcc make chroot nessus nmap cheops portsentry iptables netcat
49 snort saint tcpdump ethereal dsniff hping sniffit nemesis lsof iptraf lids hunt tcp wrappers LKMs chkrootkit ntop lsat IDS firewall honeypot ids techniques SIV sidestep Tripwire fragroute firewall types firewalk banner grabbing HTTP Tunnel loki specter honeyd KFSSensor
CYBERTRON NETWORK SOLUTIONS
CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified
Ethical Hacking and Countermeasures 5.0 Course ECEH5.0 5 Days COURSE OVERVIEW AUDIENCE OBJECTIVES OUTLINE
COURSE OVERVIEW This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting Chapter 1 1. Introducing Penetration Testing 1.1 What is penetration testing 1.2 Different types of test 1.2.1 External Tests
Certified Ethical Hacker (CEH)
Certified Ethical Hacker (CEH) Course Number: CEH Length: 5 Day(s) Certification Exam This course will help you prepare for the following exams: Exam 312 50: Certified Ethical Hacker Course Overview The
Ethical Hacking Course Layout
Ethical Hacking Course Layout Introduction to Ethical Hacking o What is Information Security? o Problems faced by the Corporate World o Why Corporate needs Information Security? Who is a Hacker? o Type
Penetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or
Vulnerability Assessment and Penetration Testing
Vulnerability Assessment and Penetration Testing Module 1: Vulnerability Assessment & Penetration Testing: Introduction 1.1 Brief Introduction of Linux 1.2 About Vulnerability Assessment and Penetration
ETHICAL HACKING. By REAL TIME FACULTY
w w ẉ s u n m ar s ṣ n et ETHICAL HACKING Duration : 1 Month Timings : 4.30 p.m. to 6.00 p.m. By REAL TIME FACULTY # 407, 4 th Floor, New HUDA MYTHRI VIHAR, Beside Aditya Trade Centre, Ameerpet, Hyd. -
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed
Venue Nairobi Kenya (exact hotel name to be confirmed before course) Dates March 31, 2014 April 4, 2014 Inovatec College Certified Ethical Hacker (CEH) boot camp The Certified Ethical Hacker (CEH) Certification
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.
Wireless LAN Attacks and Protection Tools (Section 3 contd.) WLAN Attacks Passive Attack unauthorised party gains access to a network and does not modify any resources on the network Active Attack unauthorised
Build Your Own Security Lab
Build Your Own Security Lab A Field Guide for Network Testing Michael Gregg WILEY Wiley Publishing, Inc. Contents Acknowledgments Introduction XXI xxiii Chapter 1 Hardware and Gear Why Build a Lab? Hackers
Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)
Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2) Course number: CFED Length: 5 days Certification Exam This course will help you prepare for the following exams: CCE --
EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp
EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp ECSA/LPT is a security class like no other! Providing real world hands on experience, it is the only in-depth
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
Description: Objective: Attending students will learn:
Course: Introduction to Cyber Security Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Description: In 2014 the world has continued to watch as breach after breach results in millions of
Certified Penetration Testing Specialist
Certified Penetration Testing Specialist Course Length: 5 days Course Code: CPTS Course Description CPTS is built upon proven hands-on Penetration Testing methodologies as utilized by our international
Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important
Presented By: Holes in the Fence Dave Engebretson, Contributing Technology writer, SDM Magazine Industry Instructor in Fiber and Networking Prevention of Security System breaches of networked Edge Devices
Ethical Hacking v7 40 H.
ΦΑΛΗΡΟΥ 93, ΚΟΥΚΑΚΙ, 11741 Τ. 210-9230099, Φ. 210-9229280 www.ictc.gr [email protected] TITLE DURATION Ethical Hacking v7 40 H. Overview This class will immerse the student into an interactive environment where
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
EC Council Security Analyst (ECSA)
EC Council Security Analyst (ECSA) Course ID SEC190 Course Description Any computer user needs to know how to protect information assets and securely connect to another system over a network. Security5
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
SONDRA SCHNEIDER JOHN NUNES
TECHNOLOGY TRANSFER PRESENTS SONDRA SCHNEIDER JOHN NUNES CERTIFIED ETHICAL HACKER TM THE ONLY WAY TO STOP A HACKER IS TO THINK LIKE ONE MAY 21-25, 2007 VISCONTI PALACE HOTEL - VIA FEDERICO CESI, 37 ROME
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.
Chapter 8 Phase3: Gaining Access Using Network Attacks
Chapter 8 Phase3: Gaining Access Using Network Attacks Tools used in Network Attacks Sniffing Spoofing Session hijacking Netcat Sniffer Allows attacker to see everything sent across the network, including
CRYPTUS DIPLOMA IN IT SECURITY
CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information
CEH Version8 Course Outline
CEH Version8 Course Outline Module 01: Introduction to Ethical Hacking Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts Hacking Phases Types of Attacks Information
Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours
Ethical Hacking and Information Security Duration Detailed Module Foundation of Information Security Lecture with Hands On Session: 90 Hours Elements of Information Security Introduction As technology
Learn Ethical Hacking, Become a Pentester
Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Professional Penetration Testing Techniques and Vulnerability Assessment ...
Course Introduction Today Hackers are everywhere, if your corporate system connects to internet that means your system might be facing with hacker. This five days course Professional Vulnerability Assessment
Course Duration: 80Hrs. Course Fee: INR 7000 + 1999 (Certification Lab Exam Cost 2 Attempts)
Course Duration: 80Hrs. Course Fee: INR 7000 + 1999 (Certification Lab Exam Cost 2 Attempts) Course Module: 1. Introduction to Ethical Hacking 2. Footprinting a. SAM Spade b. Nslookup c. Nmap d. Traceroute
Network Attacks and Defenses
Network Attacks and Defenses Tuesday, November 25, 2008 Sources: Skoudis, CounterHack; S&M Chapter 5 (including many images) CS342 Computer Security Department of Computer Science Wellesley College Networks
Vulnerability Assessment and Penetration Testing. CC Faculty ALTTC, Ghaziabad
Vulnerability Assessment and Penetration Testing CC Faculty ALTTC, Ghaziabad Need Vulnerabilities Vulnerabilities are transpiring in different platforms and applications regularly. Information Security
Course Outline: Certified Ethical Hacker v8. Learning Method: Instructor-led Classroom Learning
Course Outline: Certified Ethical Hacker v8 Learning Method: Instructor-led Classroom Learning Duration: 5.00 Day(s)/ 35 hrs Overview: This class will immerse the students into an interactive environment
Detailed Description about course module wise:
Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology
Port Scanning and Vulnerability Assessment ECE4893 Internetwork Security Georgia Institute of Technology Agenda Reconnaissance Scanning Network Mapping OS detection Vulnerability assessment Reconnaissance
How To Classify A Dnet Attack
Analysis of Computer Network Attacks Nenad Stojanovski 1, Marjan Gusev 2 1 Bul. AVNOJ 88-1/6, 1000 Skopje, Macedonia [email protected] 2 Faculty of Natural Sciences and Mathematics, Ss. Cyril
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
642 552 Securing Cisco Network Devices (SND)
642 552 Securing Cisco Network Devices (SND) Course Number: 642 552 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional, Cisco Firewall Specialist,
Network Security and Firewall 1
Department/program: Networking Course Code: CPT 224 Contact Hours: 96 Subject/Course WEB Access & Network Security: Theoretical: 2 Hours/week Year Two Semester: Two Prerequisite: NET304 Practical: 4 Hours/week
Security: Attack and Defense
Security: Attack and Defense Aaron Hertz Carnegie Mellon University Outline! Breaking into hosts! DOS Attacks! Firewalls and other tools 15-441 Computer Networks Spring 2003 Breaking Into Hosts! Guessing
Cain & Abel v 2.5. Password Cracking Via ARP Cache Poisoning Attacks. v.1. Page 1 of 15
Cain & Abel v 2.5 Password Cracking Via ARP Cache Poisoning Attacks v.1 2004 Page 1 of 15 Objective: At the end of this lab students will be able to use the password auditing and ARP Poison Routing (APR)
Secure Software Programming and Vulnerability Analysis
Secure Software Programming and Vulnerability Analysis Christopher Kruegel [email protected] http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview
1. LAB SNIFFING LAB ID: 10
H E R A LAB ID: 10 SNIFFING Sniffing in a switched network ARP Poisoning Analyzing a network traffic Extracting files from a network trace Stealing credentials Mapping/exploring network resources 1. LAB
Certified Penetration Testing Engineer
Training Days: 5 Overview The Certified Penetration Testing Engineer course trains students on the 5 key elements of penetration testing: information gathering, scanning, enumeration, exploitation and
Ethical Hacking and Attack Tools
Ethical Hacking and Attack Tools Kenneth Ingham September 29, 2009 1 Course overview Attackers have at their disposal a large collection of tools that aid their exploiting systems. If you plan to defend
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
CIT 380: Securing Computer Systems
CIT 380: Securing Computer Systems Scanning CIT 380: Securing Computer Systems Slide #1 Topics 1. Port Scanning 2. Stealth Scanning 3. Version Identification 4. OS Fingerprinting 5. Vulnerability Scanning
Malicious Network Traffic Analysis
Malicious Network Traffic Analysis Uncover system intrusions by identifying malicious network activity. There are a tremendous amount of network based attacks to be aware of on the internet today and the
PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access
The Best First for Beginners who want to become Penetration Testers PTSv2 in pills: Self-paced, online, flexible access 900+ interactive slides and 3 hours of video material Interactive and guided learning
Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
CERTIFIED PENETRATION TESTING CONSULTANT
Cyber Security Training & Consulting CERTIFIED PENETRATION TESTING CONSULTANT COURSE OVERVIEW 4 Days 32 CPE Credits $3,500 The Certified Penetration Testing Consultant course is our advanced course in
E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications
Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html
Network Attacks. Common Network Attacks and Exploits
Common and Exploits AGENDA A Few Observations Hacker Resources Attack Categories Some Common Attacks Wireless Specific Attacks Wireless Observations Because of Common Network Layers, Most of the Attacks
P Principles of Network Forensics P Terms & Log-based Tracing P Application Layer Log Analysis P Lower Layer Log Analysis
Agenda Richard Baskerville P Principles of P Terms & -based Tracing P Application Layer Analysis P Lower Layer Analysis Georgia State University 1 2 Principles Kim, et al (2004) A fuzzy expert system for
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Security Considerations White Paper for Cisco Smart Storage 1
Security Considerations White Paper for Cisco Smart Storage An open network is like a bank s vault with windows Bill Thomson Network-Attached Storage (NAS) is a relatively simple and inexpensive way to
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
Firewalls, NAT and Intrusion Detection and Prevention Systems (IDS)
Firewalls, NAT and Intrusion Detection and Prevention Systems (IDS) Internet (In)Security Exposed Prof. Dr. Bernhard Plattner With some contributions by Stephan Neuhaus Thanks to Thomas Dübendorfer, Stefan
Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.
Firewalls 1 Firewalls Idea: separate local network from the Internet Trusted hosts and networks Firewall Intranet Router DMZ Demilitarized Zone: publicly accessible servers and networks 2 1 Castle and
Network Traffic Analysis
2013 Network Traffic Analysis Gerben Kleijn and Terence Nicholls 6/21/2013 Contents Introduction... 3 Lab 1 - Installing the Operating System (OS)... 3 Lab 2 Working with TCPDump... 4 Lab 3 - Installing
Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.
Port Scanning Objectives 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap. Introduction: All machines connected to a LAN or connected to Internet via a modem
Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led
Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led Course Description This class will immerse the student into an interactive environment where they will
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis? This paper presents a scenario in which an attacker attempts to hack into the internal network
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
Certified Penetration Testing Specialist
Certified Penetration Testing Specialist Course Name: CPTS V8.8 Duration: 5 days Language: English Format: Instructor-led Live Virtual Training CBT - Pre-recorded Prerequisites: A minimum of 12 months
Own your LAN with Arp Poison Routing
Own your LAN with Arp Poison Routing By: Rorik Koster April 17, 2006 Security is a popular buzzword heard every day throughout our American culture and possibly even more so in our global economy. From
Demystifying Penetration Testing
Demystifying Penetration Testing Prepared by Debasis Mohanty www.hackingspirits.com E-Mail: [email protected] Goals Of This Presentation An overview of how Vulnerability Assessment (VA) & Penetration
Scanning Tools. Scan Types. Network sweeping - Basic technique used to determine which of a range of IP addresses map to live hosts.
Scanning Tools The goal of the scanning phase is to learn more information about the target environment and discover openings by interacting with that target environment. This paper will look at some of
Denial Of Service. Types of attacks
Denial Of Service The goal of a denial of service attack is to deny legitimate users access to a particular resource. An incident is considered an attack if a malicious user intentionally disrupts service
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router
Firewalls. Chapter 3
Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border
Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
SCP - Strategic Infrastructure Security
SCP - Strategic Infrastructure Security Lesson 1 - Cryptogaphy and Data Security Cryptogaphy and Data Security History of Cryptography The number lock analogy Cryptography Terminology Caesar and Character
Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort
License Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons
Firewalls. Pehr Söderman KTH-CSC [email protected]
Firewalls Pehr Söderman KTH-CSC [email protected] 1 Definition A firewall is a network device that separates two parts of a network, enforcing a policy for all traversing traffic. 2 Fundamental requirements
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)
APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist [email protected] Specialties: Routing &
During your session you will have access to the following lab configuration. CLIENT1 (Windows XP Workstation) 192.168.0.2 /24
Introduction The Network Vulnerabilities module provides you with the instruction and Server hardware to develop your hands on skills in the defined topics. This module includes the following exercises:
Networking: EC Council Network Security Administrator NSA
coursemonster.com/uk Networking: EC Council Network Security Administrator NSA View training dates» Overview The EC-Council's NSA certification looks at network security from a defensive view. The NSA
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
Network Security Fundamentals
APNIC elearning: Network Security Fundamentals 27 November 2013 04:30 pm Brisbane Time (GMT+10) Introduction Presenter Sheryl Hermoso Training Officer [email protected] Specialties: Network Security IPv6
WEB APPLICATION HACKING. Part 2: Tools of the Trade (and how to use them)
WEB APPLICATION HACKING Part 2: Tools of the Trade (and how to use them) Jonathan Eddy September 27, 2013 Last Updated September 27, 2013 MAPPING THE APPLICATION 4 2 ENUMERATING CONTENT AND FUNCTIONALITY
INFORMATION SECURITY TRAINING
INFORMATION SECURITY TRAINING Course Duration: 45 days Pre-Requisite: Basic Knowledge of Internet Course Content Course Fee: 15,000 ( Online Examination Fee, Books, Certification, Tools & Software's Included
If you know the enemy and know yourself, you need not fear the result of a hundred battles.
Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group [email protected] 1 (604) 961-0701 If you know the enemy and know yourself, you
Certified Penetration Testing Specialist (CPTS) with CEH Backtrack
Certified Penetration Testing Specialist (CPTS) with CEH Backtrack Course Number: CPTS CEH Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: Exam 312 50: Certified
Stop that Big Hack Attack Protecting Your Network from Hackers. www.lauraknapp.com
Stop that Big Hack Attack Protecting Your Network from Hackers Laura Jeanne Knapp Technical Evangelist 1-919-224-2205 [email protected] www.lauraknapp.com NetSec_ 010 Agenda Components of security threats
Firewalls. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49. Firewall Design Principles
Firewalls Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Firewall Design Principles Firewall Characteristics Types of Firewalls Firewall Configurations
CYBER ATTACKS EXPLAINED: PACKET CRAFTING
CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure
Some Tools for Computer Security Incident Response Team (CSIRT)
Some Tools for Computer Security Incident Response Team (CSIRT) AfNOG 12 30 th May 2011 10 th June 2011 Tanzania By Marcus K. G. Adomey Overview Some Unix Commands Some Selected Tools Snort AirSnort hping
NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs
Mandatory Knowledge Units 1.0 Core2Y 1.1 Basic Data Analysis The intent of this Knowledge Unit is to provide students with basic abilities to manipulate data into meaningful information. 1.1.1 Topics Summary
