Ethical Hacking & Cuntermeasure Specialist Curse Title: Ethical Hacking & Cuntermeasure Specialist: Linux, Macintsh and Mbile Systems Page 1 f 15 Linux, Macintsh and Mbile Systems Cpyright by EC-Cuncil All Rights Reserved. Reprductin is Strictly Prhibited.
Ethical Hacking & Cuntermeasure Specialist Curse Descriptin This certificatin cvers a plethra f ffensive security tpics ranging frm hw perimeter defenses wrk t scanning and attacking the simulated netwrks. A wide variety f tls, viruses, and malware is presented in this and the ther fur bks, prviding a cmplete understanding f the tactics and tls used by hackers. By gaining a thrugh understanding f hw hackers perate, an Ethical Hacker will be able t set up strng cuntermeasures and defensive systems t prtect an rganizatin's critical infrastructure and infrmatin. CertificateInf Ethical Hacking & Cuntermeasure Specialist: Linux, Macintsh and Mbile Systems Wh Shuld Attend This curse will significantly benefit security fficers, auditrs, security prfessinals, site administratrs, and anyne wh is cncerned abut the integrity f the netwrk infrastructure. Curse Duratin 2 days (9:00AM 5:00PM) CPE/ECE Qualificatin 16 ECE Credits awarded fr attendance (1 fr each classrm hur) Suggested Retail: $799 USD Page 2 f 15 Linux, Macintsh and Mbile Systems Cpyright by EC-Cuncil All Rights Reserved. Reprductin is Strictly Prhibited.
Ethical Hacking & Cuntermeasure Specialist Required Curseware: Visit www.cengage.cm/cmmunity/eccuncil and click n Training Wrkshps fr rdering details. What s included? Physical Curseware 1 year Access T EC-Cuncil Student LMS fr Practical Labs (if applicable), testing, and Certificate Curse + Supplement Cst: See the Training Wrkshps sectin at www.cengage.cm/cmmunity/eccuncil fr current pricing infrmatin. Related Certificates: Ethical Hacking & Cuntermeasure Specialist: Attack Phases Ethical Hacking and Cuntermeasures: Threats and Defense Mechanisms Ethical Hacking and Cuntermeasures: Web Applicatins and Data Servers Ethical Hacking and Cuntermeasures: Secure Netwrk Infrastructures Page 3 f 15 Linux, Macintsh and Mbile Systems Cpyright by EC-Cuncil All Rights Reserved. Reprductin is Strictly Prhibited.
Ethical Hacking & Cuntermeasure Specialist Curse Briefing 1. Linux Hacking Chapter Brief: The advent f Linux was the true genesis f the pen surce mvement. Backed by prgrammers wh believed in breaking away frm the prprietary mvement fr the right reasns, Linux made inrads int the crprate wrld cmputing. While Linux has evlved t a rbust perating system, the cmplex structure f Linux paves the way fr the security-related threats. Tday, several servers arund the glbe are hsted n the Linux servers. One f the primary reasns behind this is the inherent security ffered by the platfrm. Hwever, tday there is as much vulnerability in Linux as in prprietary systems leading t their cmprmise by attackers. This mdule deals with hacking n the Linux Operating System. It explains the basic cmmands in Linux, Linux file structure, and Linux security and vulnerabilities. It shws the Linux IP chains, Linux Rtkits, and Linux intrusin detectin systems. It lists the Linux hacking tls and the security cuntermeasures. 2. Mac OS X Hacking Chapter Brief: Mac OS X is a develpment platfrm, bringing a 32-bit and 64-bit architecture and multiprcessr capability t the desktp and server arenas. It prvides a prductive prgramming envirnment in Cca, the full pwer f real UNIX, and a hst f pen surce web, scripting, database, and develpment technlgies. MAC OS X may be hacked using the vulnerabilities in the perating system. This mdule explains abut Macintsh perating system, vulnerabilities in MAC OS X such as Crafted URL, CreText Uninitialized Pinter, ImageIO Integer verflw, DirectryService, ichat UPnP buffer verflw, and hw they can be used t hack the OS. The mdule als discusses viruses and wrms that may affect the perating system. MAC OS X security tls DrStp X Firewall, Integ NetBarrier, Integ CntentBarrier and Flying Buttress are presented in this mdule. These security tls and cunter measures prevent an attacker frm attacking. 3. Hacking Ruters, Cable Mdems, and Firewalls Chapter Brief: Cmputer netwrking devices transfer the data frm ne cmputer in a netwrk t anther.. The netwrk devices include ruters, cable mdems, firewalls, etc. The attacker may try t hack the netwrk devices t snp n the infrmatin being transferred n the netwrk. This mdule intrduces the cmputer netwrking devices such as Ruter, mdems, and cables and explains hw an attacker hacks them. This mdule explains the different vulnerabilities in the ruter and hw t explit these vulnerabilities. After cmpletin f this mdule, yu wuld have an idea abut hw t cllect the ruter passwrd by using different passwrd cracking tls. The mdule als deals with different ruter attacks, hw they ccur, and hw t prevent them. Page 4 f 15 Linux, Macintsh and Mbile Systems Cpyright by EC-Cuncil All Rights Reserved. Reprductin is Strictly Prhibited.
Ethical Hacking & Cuntermeasure Specialist 4. Hacking Mbile Phnes, PDAs, and Handheld Devices Chapter Brief: With individuals and rganizatins increasingly reliant n the handheld devices fr cmmunicatin and business, the threat t these devices nly grws. Mbile malware has seen pandemic increase in the recent years. The malware is aimed at sabtage and financial gain. These attacks finally can lead t denial f mbile resurces, data theft r destructin, and fraud. This mdule discusses abut hacking varius types f mbile devices such as BlackBerry, PDA, ipd, and iphne. This mdule als talks abut the perating systems used in mbile phnes. This mdule explains abut the threats t mbile devices, vulnerabilities in the mbile devices, and attacks against mbile devices. It als intrduces PDA security tls which are used t prevent mbile attacks. 5. Bluetth Hacking Chapter Brief: Bluetth is ne f the applicatins that help the cell phne users share/ send the infrmatin frm ne cell phne t the ther irrespective f the service prvider. It is a feature that is getting ppular and being widely used by every cmmn man in their rutine. As it is widely used, the vulnerabilities in it are explited t attack the device. The mdule Bluetth Hacking explains abut the different ways that a Bluetth device can be hacked and the security measures t prevent the devices frm being hacked. It explains the different techniques that can be used t attack Bluetth devices (Example: Bluejacking, BlueSpam, BlueSnarfing, BlueBug Attack, Blueprinting and mre). It lists the tls that are used t hack the Bluetth devices. This mdule discusses the wrms and viruses that can be used t infect the Bluetth devices. 6. RFID Hacking Chapter Brief: Radi Frequency Identificatin (RFID) is a system that transmits the identity f an bject using radi waves. The identity f the bjects is stred and retrieved using RFID tags and transpnders. It transmits the identity f the bjects in the frm f a unique serial number with the help f radi waves. This mdule describes RFID technlgy, the different cmpnents f RFID and their cllisins, RFID risks such as Business Prcess Risk, Business Intelligence Risk, Privacy Risk and Externality Risk, privacy issues f RFID. This mdule discusses RFID security and privacy threats and hw t prtect against RFID attacks. Writing a simple but pwerful RFID virus and wrm are shwcased in this mdule. The mdule als discusses the vulnerabilities in RFID-enabled credit cards and RFID security cntrls. 7. Hacking USB Devices Chapter Brief: Universal Serial Bus (USB) flash drives are remvable and rewritable devices. These devices can be cnnected r discnnected if the system is running as they are pluggable. This mdule discusses abut USB devices and hw they affect privacy. The mdule discusses electrical and sftware attacks, USB Attack n Windws, viruses, and wrms which spread thrugh USB devices. The tls that help in hacking USB devices are discussed. The mdule als talks abut tls such as MyUSBnly, USBDeview, USB-Blcker, USB CpyNtify, USB File Page 5 f 15 Linux, Macintsh and Mbile Systems Cpyright by EC-Cuncil All Rights Reserved. Reprductin is Strictly Prhibited.
Ethical Hacking & Cuntermeasure Specialist Guard, and Advanced USB Prt Mnitr that help t prtect privacy and lists cuntermeasures t prevent the devices frm being hacked. Page 6 f 15 Linux, Macintsh and Mbile Systems Cpyright by EC-Cuncil All Rights Reserved. Reprductin is Strictly Prhibited.
Ethical Hacking & Cuntermeasure Specialist Curse Outline Hacking Bk 4: Linux, Macintsh and Mbile Systems Chapter 1: Linux Hacking Case Example Cmmn Terminlgy Intrductin t Linux Hacking Linux Distributins Linux Basics Linux LiveCDs Files and Directries File System Linux Basic Cmmands Linux Netwrking Cmmands Directries in Linux Linux Kernel Installing. Cnfiguring. and Cmpiling Linux Kernel Hw t Install a Kernel Patch Cmpiling Prgrams in Linux GNU Cmpiler Cllectin (GCC) Cmpiler GCC Cmmands Make Files Make Install Cmmand Linux Vulnerabilities Linux Security chrting Limitatins f chrting Linux Vulnerabilities Linux Kernel BER Decding Remte Buffer Overflw Vulnerability Why Is Linux Hacked? GRUB Btlader Hw t Hack Rt Passwrd in Linux LILO Btlader Steps t Hack Rt Passwrd in Linux Linux Hacking Tls Scanning Netwrks Page 7 f 15 Linux, Macintsh and Mbile Systems Cpyright by EC-Cuncil All Rights Reserved. Reprductin is Strictly Prhibited.
Ethical Hacking & Cuntermeasure Specialist Tl: Nessus Prt Scan Detectin Tls Passwrd Cracking in Linux Tl: Jhn the Ripper Firewall in Linux: IPTables Hw IPTables Wrks Netfilter IPTables Cmmand Basic Linux Operating System Defense Tcpdump Hping2 Linux Ladable Kernel Mdules Tl: Chkrtkit Linux Security Tls Linux Tls: Applicatin Security Advanced Intrusin Detectin Envirnment (AIDE) EnGarde Secure Linux EnGarde Secure Linux: Secure Shell Cnfiguratin EnGarde Secure Linux: Attack Graph AppArmr Strbe Encryptin Lg and Traffic Mnitrs Linux Security Auditing Tl (LSAT) Linux Security Cuntermeasures Best Practices Steps fr Hardening Linux Issues with Open Surce Linux Linux Security Checklist Chapter 2: Mac OS X Hacking Case Example Intrductin t Mac OS X Hacking Intrductin t Mac OS Vulnerabilities in MAC OS MAC OS X Vulnerabilities and Slutin Statistics Apple QuickTime Buffer Overflw Vulnerability Page 8 f 15 Linux, Macintsh and Mbile Systems Cpyright by EC-Cuncil All Rights Reserved. Reprductin is Strictly Prhibited.
Ethical Hacking & Cuntermeasure Specialist Apple Mac OS X Pixlet Vide Handling Remte Cde Executin Vulnerability Heap-based Buffer Overflw Vulnerability in ClrSync Prfile Apple ImageIO EXIF Metadata Buffer Overflw Vulnerability Apple Mac OS X MbileMe Sessin Hijack Vulnerability Apple Mac OS X AppleTalk Kernel Buffer Overflw Vulnerability Apple Mac OS X Remte Apple Events Out f Bunds Memry Access Security Vulnerability Crafted URL Vulnerability CreText Uninitialized Pinter Vulnerability ImageIO Integer verflw Vulnerability DirectryService Vulnerability ichat UPnP Buffer Overflw Vulnerability ImageIO Memry Crruptin Vulnerability Cde Executin Vulnerability UFS Filesystem Integer Overflw Vulnerability Kernel "fpathcnf()" System call Vulnerability UserNtificatinCenter Privilege Escalatin Vulnerability Other Vulnerabilities in MAC Hw a Malfrmed Installer Package Can Crack Mac OS X Demnstrated Damage Wrms, Viruses, and Trjans in MAC OS X MAC OS X Threats Trjan: OSX/Jahlav-C OSX/iWrkS-A OSX.Trjan.iServices.A Wrm: OSX/Tred.A OSX/Leap-A Inqtana.A: F-Secure Wrm n OS X Preventive Measures fr OSX Inqtana.A Viruses in MAC: Macr Viruses Antivirus Applicatins in Mac OS X Mac OS X Security Tls DrStp X Firewall Integ NetBarrier Integ CntentBarrier Flying Buttress Page 9 f 15 Linux, Macintsh and Mbile Systems Cpyright by EC-Cuncil All Rights Reserved. Reprductin is Strictly Prhibited.
Ethical Hacking & Cuntermeasure Specialist Cuntermeasures Chapter 3: Hacking Ruters, Cable Mdems, and Firewalls Intrductin t Hacking Ruters, Cable Mdems, and Firewalls Ruters Cable Characteristics: Netwrking Cables Types f Twisted Pair Cable Types f Caxial Cables Types f Fiber Optic Cables Cable Mdems Media Cnnectrs Cncentratrs Repeaters and Hubs Mdems Multiplexers Gateways Patch Panel Switch Firewalls Security Features f Firewall Sftware and Hardware Firewall Difference between Hardware and Sftware Firewalls Types f Firewalls: IP Packet Filters Circuit Level Gateway Applicatin Level Firewalls Stateful Multilayer Inspectin Firewall Netwrk Security Sftware Types f Ruter Attacks Ruter Attack Tplgy Denial f Service (DS) Attacks Packet Mistreating Attacks Ruting Table Pisning Flding Hit-and-run Attacks vs. Persistent Attacks Tls Yersinia fr HSRP, CDP, and Other Layer 2 Attacks Page 10 f 15 Linux, Macintsh and Mbile Systems Cpyright by EC-Cuncil All Rights Reserved. Reprductin is Strictly Prhibited.
Ethical Hacking & Cuntermeasure Specialist Cisc Trch Cracking the Enable Passwrd Tl: Jhn the Ripper Cain and Abel Chapter 4: Hacking Mbile Phnes, PDAs, and Handheld Devices Intrductin t Hacking Mbile Phnes, PDAs, and Handheld Devices Types f Handheld Devices Cmmn Operating Systems in Handheld Devices Threats t Mbile Devices Vulnerabilities in Handheld Devices Vulnerabilities in Different Mbile Phnes Malware Symbs_Lcknut.B Spyware SymbOS/Htl-SMSSender.A.intd SymbOS/MultiDrpper.CG Warm: SYMBOS_CABIR.A Wrm: Symb/Cabir-A Trjan: SymbOS.Sendtl.A SMS.Pythn.Flcker Best Practices Against Malware Hacking Handheld Devices Persnal Digital Assistant (PDA) PDA Security Issues ActiveSync Attacks HtSync Attack PDA Virus: Bradr PDA Security Tls: TigerSuite PDA PDA Security Tls: SecuBx fr Pcket PC SecuWipe fr Pcket PC Trend Micr Mbile Security avast! PDA Editin Cellcrypt Page 11 f 15 Linux, Macintsh and Mbile Systems Cpyright by EC-Cuncil All Rights Reserved. Reprductin is Strictly Prhibited.
Ethical Hacking & Cuntermeasure Specialist Security Plicies fr PDAs PDA Attack Cuntermeasures Defending Handheld Devices ipd Misuse f ipd Jailbreaking Tl fr Jailbreaking: idemcracy iactivatr Chapter 5: Bluetth Hacking Intrductin t Bluetth Bluetth Security Issues Bluetth Attacks Bluejacking Steps fr Bluejacking in Mbile Phnes Bluesniff BlueSpam BlueSnarfing BlueBug Attack Bluestab (Denial-f-Service Attack) Blueprinting Bluesmacking - The Ping f Death Bluecasting BlueDump Attack BlueBump Bluechp Bluetne BlueSniper BTViceBugging Attack Shrt Pairing Cde Attacks Man-in-the-Middle Attack OnLine PIN Cracking Attack BTKeylgging Attack Fuzzing Attacks Bluetth Hacking Tls Viruses and Wrms Page 12 f 15 Linux, Macintsh and Mbile Systems Cpyright by EC-Cuncil All Rights Reserved. Reprductin is Strictly Prhibited.
Ethical Hacking & Cuntermeasure Specialist Bluetth Security Tls Bluesnarfer BTCrawler Bluediving TBEAR - Transient Bluetth Envirnment auditr BTBrwser BTCrack BTScanner Hidattack BlueAlert and BlueFish Prximity HaraldScan BlueWatch Other BT Hacking Tls Cuntermeasures Chapter 6: RFID Hacking Case Example Intrductin t RFID Hacking RFID (Radi Frequency Identificatin) RFID Frequency Bands Cmpnents f RFID Systems A Simple RFID System Wrking f an RFID Challenges in RFID Deplyment Steps fr RFID Deplyment RFID Applicatins RFID Cllisins RFID Risks Business Prcess Risk Business Intelligence Risk Privacy Risk Externality Risk RFID and Privacy Issues RFID Security and Privacy Threats Cuntermeasures Used t Avid RFID Attacks RFID Security and Privacy Threats Page 13 f 15 Linux, Macintsh and Mbile Systems Cpyright by EC-Cuncil All Rights Reserved. Reprductin is Strictly Prhibited.
Ethical Hacking & Cuntermeasure Specialist Sniffing Tracking Spfing Replay Attacks Denial-f-service Generic Attack Virus Attacks Hw t Write an RFID Virus Hw t Write an RFID Wrm RFID Malware Defenses Against RFID Malware RFID Explits Vulnerabilities in RFID-Enabled Credit Cards RFD Hacking Tl RFID Security Cntrls Management Cntrls Operatinal Cntrls Technical Cntrls RFID Security Chapter 7: Hacking USB Devices Case Example Intrductin t Hacking USB Devices Intrductin t USB Devices USB Attacks Electrical Attack Sftware Attack USB Attack n Windws Viruses and Wrms Virus: W32/Madang-Fam VBS/Repvblik-A Wrm: W32/Hasnt-A W32/Uisgn-A W32/Fujacks-AK W32/Fujacks-E Page 14 f 15 Linux, Macintsh and Mbile Systems Cpyright by EC-Cuncil All Rights Reserved. Reprductin is Strictly Prhibited.
Ethical Hacking & Cuntermeasure Specialist W32/Dzan-C W32/SillyFD-AA W32/SillyFDC-BK W32/SillyFDC-W W32/LiarVB-A W32/Hairy-A W32/QQRb-ADN W32/VBAut-B W32/Titua-G HTTP W32.Drm W32/VB-DWC W32/Bdr-AEE Mal/Cnficker-A Hacking Tls USBSecure Prfessinal MyUSBnly USBDeview USB Blcker USB CpyNtify Remra USB File Guard Advanced USB Prt Mnitr Flder Passwrd Expert USB USBlyzer USB PC Lck Pr Virus Chaser USB uhk Persnal Cuntermeasures Page 15 f 15 Linux, Macintsh and Mbile Systems Cpyright by EC-Cuncil All Rights Reserved. Reprductin is Strictly Prhibited.