Welcome to My Website

Showing posts with label Ethical Hacking. Show all posts
Showing posts with label Ethical Hacking. Show all posts


Certified Ethical Hacker Certification from Specialized Solutions enables the system administrator with critical information to identify, counter and stop or defend hackers from penetrating the corporate network. With this certification, you will begin to understand how a hacker thinks and what tactics they use to penetrate corporate networks. This allows system administrators to deploy proactive countermeasures and stay ahead of information security developments and exploited vulnerabilities.The Certified Ethical Hacker Training Solution from Specialized Solutions explores the existence and the use of hacking tools and security systems across 21 topical domains. Within each domain, students are presented with several tools that a hacker can use, and which countermeasures are most effective against their use.
Posted Image
>> Ethics and Legal Issues
>>Footprinting Techniques
>>Scanning
>>Enumeration
>>System Hacking
>>Trojans and Backdoors
>>Sniffers
>>Denial of Service
>>Social Engineering
>>Session Hijacking
>>CEH Hacking Web Servers
>>Web Application Vulnerabilities
>>Web Based Password Cracking
>>SQL Injection
>>Hacking Wireless Networks
>>Virus and Worms
>>Hacking Novell
>>Hacking Linux
>>IDS, Firewalls and Honeypots
>>Buffer Overflows
>>Cryptography
>>Penetration Testing Methodologies

Course Details:
Module 00 - CEH Introduction
Module 01 - Introduction to Ethical Hacking
Module 02 - Footprinting
Module 03 - Scanning
Module 04 - Enumeration
Module 05 - System Hacking
Module 06 - Trojans and Backdoors
Module 07 - Sniffers
Module 08 - Denial of Service
Module 09 - Social Engineering
Module 10 - Session Hijacking
Module 11 - Hacking Web Servers
Module 12 - Web Application Vulnerabilities
Module 13 - Web-based Password Cracking Techniques
Module 14 - SQL Injection
Module 15 - Hacking Wireless Networks
Module 16 - Virus and Worms
Module 17 - Physical Security
Module 18 - Linux Hacking
Module 19 - Evading, IDS, Firewalls, and Honeypots
Module 20 - Buffer Overflows
Module 21 - Cryptography
Module 22 - Penetration Testing
Self Study Module 23 - Exploit Writing
Self Study Module 24 - Covert Hacking
Self Study Module 25 - Writing Virus Codes
Self Study Module 26 - Advanced Module of Reverse Engineering

Contains 9 CDs in iso format
http://rapidshare.com/files/235489673/c.e.h.c.part01.rar
http
://rapidshare.com/files/235489641/c.e.h.c.part02.rar
http
://rapidshare.com/files/235489603/c.e.h.c.part03.rar
http
://rapidshare.com/files/235489596/c.e.h.c.part04.rar
http
://rapidshare.com/files/235490034/c.e.h.c.part05.rar
http
://rapidshare.com/files/235490054/c.e.h.c.part06.rar
http
://rapidshare.com/files/235490018/c.e.h.c.part07.rar
http
://rapidshare.com/files/235490041/c.e.h.c.part08.rar
http
://rapidshare.com/files/235490289/c.e.h.c.part09.rar


Well many one ask this as what to study as a curriculum for Ethical hacking..
hmm well i made dis generalized mannual fr u guys. may help a lot

• Security testing methodologies
• The Ethical Hacking Profession
• Passive Intelligence Gathering – 2007 Version
• Network Sweeps
• Stealthily Network Recon
• Passive traffic identification
• Identifying system vulnerabilities
• Abusing Domain Name System (DNS)
• Abusing Simple Network Management Protocol
(SNMP)

• Introduction to Remote Exploits
• Engineering remote exploits
• Running shellcode in RAM vs. on disk
• Heap Buffer Overflows
• Compromising Windows 2003 Server Systems
• Compromising Solaris Unix and Linux Systems
• Attacking RDP (Remote Desktop Protocol) in
Windows XP, 2003 & Vista
• Windows password weaknesses & Rainbow Tables
• Unix password weaknesses
• Attacking Cisco’s IOS password weaknesses

Trojan genres
• Windows, Unix and Linux Trojans
• Kernel Mode Windows Rootkits – System Call
Hijacking and Direct Kernel Object Modification
• Kernel Mode Linux Rootkits
• Covert communication channels
• Spoofing endpoints of communication tunnels
• Tunneling through IPSec VPNs by abusing ESP
• Steganographic Tunnels
• Remote command execution
• Sniffing and hijacking SSL encrypted sessions
• Installing sniffers on low privilege account in
Windows 2003 Server
• Stealthy Remote keylogger installation
• Circumventing Antivirus

Modifying syslog entries
• Raw binary editing to prevent forensic
investigations
• Editing the Windows Event Log
• Abusing Windows Named Pipes for Domain
Impersonation
• Impersonation of other Users- Hijacking kernel
tokens
• Disguising network connections
• Attacking Cisco IOS
• Attacking STP & BGP protocols
• Wireless Insecurity
• Breaking Wireless Security – WEP, WPA, WPA2
• Blinding IDS & IPS
• Attacking IDS & IPS

Malicious event log editing
• Binary filesystem modification for anti-forensics
• Named Pipe abuse
• Kernel Token Hijacking
• Attacking Border Gateway Protocol (BGP)
• Attack WEP
• Cracking WPA
• Cracking WPA2
• Cisco IOS Exploits
• Breaking into Cisco routers
• Blinding IPS
• Attacking IPS

Abusing Web Applications
• Attacking Java Applets
• Breaking web app authentication
• SQL Injection techniques
• Modifying form data
• Attacking session IDs
• Cookie stealing
• Cross Site Scripting
• Cross Site Request Forgery (CSRF) Attacks

Remote buffer overflow exploit lab
• Custom compiling Shellcode
• Running payloads in RAM
• Hiding exploit payloads in jpeg and gif image
files
• Attacking email vectors (Lotus Notes and
Microsoft Exchange, and Outlook Web Access)
• Registry manipulation
• Client side IE & Firefox exploits
• Using custom Trojans to circumvent Antivirus
• Remote kernel overflows
• RDP (Remote Desktop Protocol) Exploitation
• Cracking Windows Passwords
• Building Rainbow Tables
• Cracking Windows 2003 native mode passwords
• Brute forcing salted Unix passwords
• Attacking Kerberos Pre-Auth Hashes
• Cracking IOS and PIX passwords

• Compromise a DMZ setting with port redirection
• Circumvent firewall IP access list (ACL)
• Customizing Trojans to avoid Antivirus
• Deploying kernel mode rootkits on Windows 2003
& Vista
• Installing LKM rootkits on Linux servers
• Hijacking MSN messenger traffic
• Running commands remotely
• Breaking wireless encryption – WEP, WPA, WPA2
• Installing sniffers in low privilege user accounts
• Sniffing remotely and retrieving results
• Remote keylogging
• Tunneling with cover channels through IPSec VPNs
• Hijack and capture SSL traffic

Network Sweeping
• Scanning from spoofed IP addresses
• Stealthy Recon
• Injecting p0f for passive OS fingerprinting
• Scanning through firewalls
• IPv6 Scanning
• Discover all subdomains owned by an
organization
• Inspect changes to whois record over last 3
years
• Windows 2003 Server & Vista DNS Cache
Poisoning Attacks
• Pumping SNMP for data – OID Dissection
• Attacking SNMP