You are on page 1of 26

Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

T A W c D 0 lU n
www.takedowncon.com
T A K D 0 lU n is a hacking conference that was conceived by our members! EC-Council has been flooded with requests to take our world-class courses on the road! We have answered the call and created TakeDownCon! This conference will be focused on the learner and will feature several Certification & Certificate Training courses for Advanced Practitioners! TA K O G T 0 U JH will host EC-Council's sought after Hacking, Forensics and Pen Test courses, Certified Wireless Security Professional, and several highly technical and advanced workshops which will cover current and important security topics such as advanced penetration testing, cryptography, network defense, application security and mobile forensics. At T A K C D O llin the learning doesn't stop when the training endsl We have lined up a list of sought after industry practitioners and subject matter experts that will present relevant and implementable topics!

For more information, about TAKEDOllin

please visitit w w w .takedow ncon.com

Hacker Halted
www.hackerhalted.com

. 1 i * I i * Since 2004 EC-Council has hosted 20 Hacker Halted events across four continents and in cities such as Myrtle Beach, Miami, Dubai, Singapore, Hong Kong, Mexico City, Tokyo, Kuala Lumpur, Guangzhou, Taiper and Cairo.

Hacker Halted North America will be held in Miami for the 3rd year in a row and based on past history is sure to boast an amazing turnout of Information Security Professionals! Hacker Halted is more than just a conference event; practitioners travel from all over the world to attend our world-class training, gain practical knowledge from our expert presenters and get a preview of the latest technologies and Information Security tools which will be showcased by our exhibitors and partners.
For more information, about Hacker Halted please visit

Ethical Hacking and Countermeasures Copyright by EC-COUDCil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

VAMPIRE
www.vampiretech.com
Is your website vulnerably to an attack? Could hackers exploit a small weakness in your website and obtain access to sensitive company information? VampireScan allows users to test their own Cloud and Web applications against advanced attacks and receive actionable results all within their own Web portal. Our easy to use online portal will simply ask you for the URL of your web application, from there, our Services do the rest. For a limited time, VampireTech is offering its Baseline Scan free of charge to qualified customers. This entitles you to one Free Health Check for one domain utilizing our Baseline Scan. This Scan will test for Cross-site Scripting Vulnerabilities, Non-SSL Passwords, and Password Autocomplete.

A
r

fc

Global CISO Executive Summit

Be on the forefront of a new global initiative where today's world-class leaders in information security will gather to navigate through international waters. Join these leaders as they follow the wind of change that is sweeping through the IS community motivating today's information guardians to develop a new way of thinking to ensure success in protecting their respective organizations. The goal of EC-Council's Global CISO Forum is to create an open platform for top information security executives to discuss their successes, failures, obstacles, and challenges. The open conversation will lead to the creation of actionable items that can be discussed and applied to the organization. For More Information About CISO Executive Summit Please Visit: www.eccouncil.org/resources/ciso-executive-summit.aspx

Ethical Hacking and Countermeasures Copyright by EC-COIMCil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

How to Dow nload M y CEHv8 E-Courseware and Additional Lab M anuals?


Please follow the steps below to download your CEHv8 e-courseware and additional lab manual.

Step 1:
Visit: https://academia.eccouncil.org. If you have an account already, skip to Step 4.

Step 2:
Click Register and fill out the registration form.

Step 3:
Using the email you provided in step 2, follow the instructions in the auto-generated email to activate your Academia Portal account.

Step 4:
Login using your Username and Password.

Step 5:
Once successfully logged in, expand the A b o u t A c a d e m ia navigation menu and select
A c c e s s C ode.

Step 6:
Enter the access code provided to you to redeem access to the CEH V8 e-Courseware and Lab Manuals.

Access Code: XXXXXXXXXXXXXXXX

Step 8:
Once redeemed, expand the C o u rs e s menu and select iL e a rn - P D F C o u rs e w a re - The resulting page will list your CEH v8 e-Courseware and Lab Manuals.

Support:
E-mail support is available from academia(5>eccouncil.org.

System Requirements:
Visit https://academia.eccouncil.ore/AboutAcademia/WhatisiLearn.aspx to view the system requirements.

Ethical Hacking and Countermeasures Copyright by EC-C0lMCil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

Download Class Certificate of Attendance I C - C o u n c il


THIS IS TO ACKNOWLEDGE THAT

HAS SUCCESSFULLY COMPLETED A COUKSE ON

AT AN EC-COUNCIL ACCREDITED TRAINING CENTER

In stru cto r

Date

T R A IN IN G C E N T E R :

http://www.eccouncil.org

E C C 011ncil

Please follow the below stated steps to download digital copy (PDF format) of your class certificate of attendance. Step 1: W ait until the class is over (the last of the class). Step 2: Visit http://www.eccouncil.org/eval. Step 3: Complete the course evaluation form (please complete all the fields in the form correct e-mail address is required). Step 4: Evaluation code is required to submit the form. See the attached code. Step 5: Submit the form. Step 6: A web link will be sent to you to download your PDF copy of the certificate.

Course Evaluation Code: **CEH *


Ethical Hacking and Countermeasures Copyright by EC-COIMCil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Counterm easures


Version 8

Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

EC-Council
Copyright 2013 by EC-Cou 11cil. All rights reserved. Except as permitted under the Copyright Act o f 1976, no part o f tins publication may be reproduced or distributed 111 any form or by any means, or stored 111 a database or retrieval system, without the prior written permission o f the publisher, with the exception that the program listings may be entered, stored, and executed 111 a computer system, but they may not be reproduced for publication. Inform ation has been obtained by EC-Council from sources believed to be reliable. EC-Council uses reasonable endeavors to ensure that the content is current and accurate, however, because of the possibility ol human or mechanical error we do not guarantee the accuracy, adequacy, or completeness ol any information and are not responsible for any errors or omissions or the accuracy o f the results obtained from use o f such information. The courseware is a result o f extensive research and contributions from subject matter experts from the field from all over the world. Due credits for all such contributions and references are given in the courseware in the research endnotes. We are committed towards protecting intellectual property. It you are a copyright owner (an exclusive licensee or their agent), and if you believe that any part o f the courseware constitutes an infringement o f copyright, or a breach o f an agreed licence or contract, you may notify us at le g a l@ e c c o u n c il.o rg . 111 the event o f a justified complaint, EC-Council will remove the material 111 question and make necessary rectifications. The courseware may contain references to other information resources and security solutions, but such references should not be considered as an endorsement o f or recommendation by EC-Council. Readers are encouraged at le g a l@ e c c o u n c il.o rg . to report errors, omissions and inaccuracies to EC-Council

If you have any issues, please contact s u p p o rt@ e c c o u n c il.o rg .

Ethical Hacking and Countermeasures Copyright by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

Foreword
Since you are reading this CEHv8 courseware, you most likely realize the importance of information systems security. However, we would like to put forth our motive behind compiling a resource such as this one and what you can gain from this course. You might find yourself asking what sets this course apart from the others out there. The truth is that no single courseware can address all the issues of information security in a detailed manner. Moreover, the rate at which exploits, tools, and methods are being discovered by the security community makes it difficult for one program to cover all the necessary facets of information security. This doesn't mean that this course is inadequate in any way as we have worked to cover all major domains in such a manner that the reader will be able to appreciate the way security has evolved over time as well as gain insight in to the fundamental workings relevant to each domain. It is a blend of academic and practical wisdom supplemented with tools that the reader can readily access in order to obtain a hands-on experience. The emphasis throughout the courseware is on gaining practical know-how, which explains the stress on free and accessible tools. You will read about some of the most widespread attacks seen, the popular tools used by attackers, and how attacks have been carried out using ordinary resources. You may also want to know what to expect once you have completed the course. This courseware is a resource material. Any penetration tester can tell you that there is no one straight methodology or sequence of steps that you can follow while auditing a client site. There is no one template that will meet all your needs. Your testing strategy will vary with the client, the basic information about the system or situation, and the resources at your disposal. However, for each stage you choose - be it enumeration, firewall, penetration of other domains - you will find something in this courseware that you can definitely use. Finally this is not the end! This courseware is to be considered a constant work-in-progress because we will be adding value to this courseware over time. You may find some aspects extremely detailed, while others may have less detail. W e are constantly asking ourselves if the content helps explain the core point of the lesson, and we constant calibrate our material with that in mind. W e would love to hear your viewpoints and suggestions so please send us your feedback to help in our quest to constantly improve our courseware.

Ethical Hacking and Countermeasures Copyright by EC-COIMCil All Rights Reserved. Reproduction is Strictly Prohibited.

This page is intentionally left blank.

Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

Table of Contents
M odule N u m b e r 00 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 M odule N a m e S tu d en t In tro d u ctio n In tro d u ctio n to E th ical H a c k in g F o o tp rin tin g an d R eco n n aissan ce S can n in g N etw o rk s E n u m e ra tio n System H a c k in g T ro jan s an d B ackdoors V iruses an d W orm s Sniffing Social E n g in e e rin g D en ial o f Service Session H ijack in g H a c k in g W ebservers H a c k in g W eb A pplications SQ L In jectio n H a c k in g W ireless N etw o rk s H a c k in g M obile P latform s E v ad in g ID S, Firew alls, an d H o n ey p o ts Buffer O verflow C ryptography P ag e N o. I 01 91 262 434 517 827 1006 1112 1292 1402 1503 1600 1723 1986 2134 2392 2549 2691 2782 2872 2976

P en etratio n T e stin g R eferences

Ethical Hacking and Countermeasures Copyright by EC-COIMCil All Rights Reserved. Reproduction is Strictly Prohibited.

This page is intentionally left blank.

Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

W elcome to Certified Ethical Hacker Class!


Student Introduction

Engineered by Hackers. Presented by Professionals.

CE H

Ethical H acking an d C o u n term easu res Module 00: Welcome to Certified Ethical Hacker Class Exam 312-50

Module 00 Page I

Ethical Hacking and Countermeasures Copyright by EC-C0l1nCil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

Copyright by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

Course M aterials
/

CE H

^
i V CEH BOOK

Identity Card

&

Student Courseware

Lab Manual/ Workbook

Compact Disc

Course Evaluation

V
Module 00 Page II

Reference Materials

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

Ethical Hacking and Countermeasures Copyright by EC-C0lMCil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

CEHv8 Course Outline


111 2 [ 3] [ 4] 5
Introduction to Ethical Hacking Trojans and Backdoors

CEH
[ 61 [ 7] [ 8] 9 10]

Footprinting and Reconnaissance

Viruses and Worms

Scanning Networks

Sniffing

Enumeration

Social Engineering

System Hacking

Denial-of-Service

Copyright by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

CEHv8 Course Outline


r
r 1 Session Hijacking L _____________________________________________________ J r ^ Hacking Webservers L _ _

CEH
r

r Hacking Mobile Platforms L r Evading IDS, Firewalls and Honeypots

11 12
r

16

_ _J

17
r

r
Hacking W eb Applications L .

r Buffer Overflows

L .

13 1V

L .

A
r Cryptography

18

'
SQL Injection
j

19 20

15

Hacking Wireless Networks

Penetration Testing

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

Module 00 Page I

Ethical Hacking and Countermeasures Copyright by EC-C0lMCil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

ECCouncil Certification Program I C E H


There are several levels of certification tracks under the EC-Council Accreditation body:

Certified Secure Computer User(CSCU) Certified e-Business Professional EC-Council Certified Security Specialist (ECSS) EC-Council Network Security Administrator (ENSA) Certified Ethical Hacker(CEH)
You are here '

ECCouncil Disaster Recovery Professional (EDRP) EC-Council Certified Security Analyst (ECSA) EC-Council Certified Secure Programmer (ECSP) Certified Secure Application Developer (CSAD) Licensed Penetration Tester (LPT) Master of Security Science (MSS)

Computer Hacking Forensic Investigator (CHFI)

Copyright by IG-GOUIICil. All Rights Reserved. Reproduction is Strictly Prohibited.

Certified Ethical Hacker Track


CEH Certification Track
C o m p lete th e fo llo w in g steps:
Attend the Ethical Hacking and Countermeasures Course

UrtifM Etb itji IU(h

CEH

s, V'
Attend Training

Pass the CEH Exam Exam Code: 312-50-ANSI (IBT), 312-50v8 (VUE), or 350CEHv8 (APTC)

Prepare for 312-50 Exam

v
Take Exam
Pass Fail

Cortifiad

Ethiol H i.U .

EH

Certification Achieved

Copyright O by tG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

Module 00 Page IV

Ethical Hacking and CountermeasuresCopyright by EC-C0UIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

CEHv8 Exam Inform ation


X Exam Title: Certified Ethical Hacker v8 (ANSI)

CEH

Exam Code: 312-50-ANSI (IBT), 312-50v8 (VUE), or 350CEHv8 (APTC)

Number of Questions: 125

Duration: 4 hours

Availability: Prometric Prime/ Prometric APTC/VUE

Passing Score: 70% The instructor will tell you about the exam schedule/exam voucher details for your training This is a difficult exam and requires extensive knowledge of CEH Core Modules

J
Copyright by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

Student Facilities

CEH

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

Module 00 Page V

Ethical Hacking and Countermeasures Copyright by EC-C0UIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

L ab Sessions
Lab Sessions are designed to reinforce the classroom sessions The sessions are intended to give a hands on experience only and does not guarantee proficiency There are tons of labs in the lab manual. Please practice these labs back at home.

Copyright by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

W hat Does CEH Teach You?

CEH

Defense, Cisco Security, Firewalls, IDS, Logs, Network, Antivirus, Hardware, Troubleshooting, Availability, Server/Client Security, creating policies, network Management etc....

Denial of Service, Trojans, Worms, Virus, Social Engineering, Password cracking, Session Hijacking, System failure, Spam, Phishing, Identity theft, Wardriving, warchalking, bluejacking Lock picking, Buffer Overflow, System hacking, Sniffing, SQL Injection....

Ethical Hacking
Bad Guy

This is W hat CEH Teaches You!


Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

Module 00 Page VI

Ethical Hacking and Countermeasures Copyright by EC-C0lMCil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

What CEH is NOT?


CEH class is NOT a N e tw o rk S e c u rity training program CEH class is NOT a S e c u rity A n alysis training program > Please attend ECCouncil's ECSA class for that

CEH

> Please attend ECCouncil's EN SA class for that

CEH class is NOT a S e c u rity Testing training program

CEH class is 100% N E T W O R K O FFEN SIV E Training Program

> Please attend ECCouncil's LPT class for that

Copyright by IG-GouilCil. All RightsKeserved.:Reproduction is Strictly Prohibited.

U rtifW J Etk w jl IU c W *

CEH

The CEH Program T eaches you 100% Network O ffensive Training and not D efen sive

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

Module 00 Page VII

Ethical Hacking and Countermeasures Copyright by EC-C0lMCil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

CEH Class Speed

C*rtfW<

CE H
Itkitjl lUckM

The CEH class is extremely fast paced

The class "speed" can be compared to the climax scene from the movie Mission Impossible (Bullet train sequence)

There are tons of hacking tools and hacking technologies covered in the curriculum

The instructor WILL NOT be able to demonstrate ALL the tools in this class

He will showcase only selected tools

The students are required to practice with the tools not demonstrated in the class on their own

Copyright by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

Live Hacking Website


J J J Please target your exercises for "Live Hacking" to www.certifiedhacker.com This website is meant for the students to try the tools on live target Please refrain from using the exploits on any other domains on the Internet

CEH
n

Certified Hacker

CEH Classroom Attack Lab Website

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

Module 00 Page VIII

Ethical Hacking and Countermeasures Copyright by EC-C0lMCil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

NDA Document

CEH

Please read the contents of the provided ECCouncil's CEH NDA document

Sign this document and hand it over to the instructor

W e will NOT start the class unless you sign this document

Please approach the instructor if you are not presented with this document

Copyright by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

Advanced Lab Environm ent

CEH

Windows 8

Windows Server 2008 (64 Bit)

Windows 7

Back Track S

Virtual Platform

u
Instructor M achine Student M achines Instructor and Student M achine Operating System : W in d o w s Server 2012 (Fully Patched)

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

Module 00 Page IX

Ethical Hacking and Countermeasures Copyright by EC-C0lMCil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

Student C om puter C hecklist

C EH

W indows 8 a sV M

Ml

W indows 7 as VM

BackTrack 5 R3 as VM

Copyright by EG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

Student C om puter C hecklist

C EH
Certified Etkxjl b i t o

Write down IP addresses of the host and all the Virtual Machines

Check if you can launch command shell by right clicking on a folder

For Wireless Hacking module you will need AirPcap adapter

Check if you can ping between the VM and the hosts

Check if you can access Internet and browse the web using IE, Chrome, Safari and Firefox

Make sure you can access RealHome and Powergym websites at http://localhost/realhome and http://localhost/powergym

Make sure that you can access D:\CEH-T00 ls directory in W indow s Server 2012 and Z:\CEH-T00ls from all the VM's; Z: is mapped Network
Drive containing CEH tools

Check for snapshots of Virtual Machines

Check if you can access http://www.certifiedhacker.com

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

Module 00 Page X

Ethical Hacking and Countermeasures Copyright by EC-C0lMCil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

Ping B etw een Virtual M achines and Host


Administrator: C:\W1 1 xlows\systefr132yc1 nd.exe w ith 32 b y te e o f d a ta : : bytoo-32 cimo<ln& TTL=128 4: bytes-32 cine < 11*3 TTL-128 : byte332 tim eClns TTL-128 : bytes-32 tine<11u TTL-128

(*MM

CEH

tlfcxjl M m M*

C:SU3cr3snd1ini5trtor>ping 1

ITL-128 ITL-128 ITL-12* ITL-128 1\AH1 1 in>ping 1

=151 * I

<

1 ; 1 1 Reply f r o n t
Reply frow i Reply fruw 1

w ith 32 bytes of data: : b y t e 5 -3 2 t . M - l m : b y te s 32 t in e < ln s : b y t fv 3 2 t if w < in s : b y t e s -3 2 t ifw C in s

Plus u t a t i s t i c v f u r 1 Pac)<otc: S o n t 4 . R< Approxim ate round c r i p t i l Min inum One. M ax imui

C iV U aora\R d nln iA trA tor> _

C:\Windows\system32 \cmd.exe

I'-"

leuly f r a r t leply fra*> I tvply fmm 1

: but 321 t ine-1fi* TTL-12B : b ytu -3 2 I i1 r < 11n TTL-12B : byt-32 t >.e<1..x TTL-12N : b yte v-32 t i1w<111v 11L-12H

,1 1 1 H c t a t iv tic w f o r 1 F ack a to : Son t - A . R ocoivod 4 . Loot 0> 0 X 1 0 0 0 ). ip p roxln ato round t r i p t in o a in n i l l i - o o c o n d o : tlin in u n 9 re. tfaxinun - i n o . flvoraqo Ono :1NJtarVM 1in >

Copyright by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

CEH-Tools Directory in Windows Server 2012 (D:\CEH-Tools)


V_J I | ($ ) ( 1 )' * 1 Home Share View V C 1 1 s*1rch N*wVolum*(D:) DrMTOMI N<w Volum e (t>) V P O | | * Computr NawVolum*(0:)

(rt'fwd

CEH

Ethical > U(hM

)V Fivcrittc D*ktap 4 . Download) , [ Recent ploce SRECYCIE.BIN 3 Documents J ' Music m! Pictures 9 Videos CEH-Todv Sy*ter Volume Information

Computer i i . Local Disk (G) 1 rf New Volume (D:) * II

* *I Network

?items

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

Module 00 Page XI

Ethical Hacking and Countermeasures Copyright by EC-C0lMCil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

Copyright by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

M apped Network D rive (Z:) in W indows Server 2008 VM

CEH
-Jnl*J

oo
F!c d1 t

* * Computer View Jo1 j j j views d*P y f Properties <! ,)

* vn |s e d l(J
urrstai or :range a prog'a* * jt * tap nerA-ork drive

to
I . I f t m Sm m

orgarize Favonte bn<s Docurentt

Mamt Hard Disk Drives (1 ) & .o c a l Disk (Cl) Device* wltli Removable Storage (2) h jj loppy D is< Orre (*:) ^ DVD Drive (D!)

1 *1 * !

| .| T 0 U I5 H

P ic t u r e s
: muo ecendy Changed^ 1 51 fl Searches

Ftcppy Dak Drive CD Drive

u b lc ^

Network Location (1 )

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

Module 00 Page XII

Ethical Hacking and Countermeasures Copyright by EC-C0UnCil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

M apped Network D rive (Z:) in W indows 7 VM


G Z IC lL lI^ , v | : . Computet Properties System properties H a r d D is k D rive s (1 ) Local Disk (C:] fti/ * ' Libraries 1 ^ B Q Documents Music Pictures Videos ' N e t w o r k L o c a tio n (1 ) CEH-Tools <\\ (Z:) Floppy Disk Drive (A:) DVD Drive (DO 6.37 G3*'reeo*'158 G3 Uninstall or charge program 1 | SeorcA Ccrr.outer [| (Jjj O p 1

CEH

M m M*

Organize A Favorites E Desktop

Map network drive

m Downloads
^ Recent Places

D e v ic e s w iT h R e m o v a b le S to ra g e (2 )

: Computer

* jf

j B tree of 269 OB

*'p Network

rH-Tnnlc (\\107.1fift1Ml 11J ) (7) Network Drive

I Space free: 365 6B

Tntalc* Fie s/stem: NTFS

Copyright by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

Launching C om m and Shell


New Volume [D.) . .

(rtifwd

CEH

Ethical >U(hM

* I

] 'M '3 9

lnrlud*<nMx*ry *Jdlsmlw. AddM'CEHTootuar' Cm pn*nj mtJ_ CompmstoCERToofc-ur*

Administrator: C:\Wind 0ws\system32\crnd.exe C'tttt

0 t <

Copyright by EG-Gouncil. All Rights )ieServ6d:: Reproduction is Strictly Probfbited.

Module 00 Page XIII

Ethical Hacking and Countermeasures Copyright by EC-COlMCil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

Snapshots o f Virtual M a ch in es
Hyper-V
File Action View Help

CEH
I I

M m M*

Manager

* * I 81! 0 1
j j Hyper-V Manager ^3 WIN-ROPCM8VKVOQ V irtu a l M a c h in e s CPU Usage = j B32k Track 6 Windows 3 j V/indows 2008 Ser/or 1024 MB 024 M3 Assigned Memory Up*

WIN-ROPCM8VKVOQ
New Import Virtual Machine...

settings

Hyper-V Settings... 5 5 Virtual SAitch Manager... ^ Virtual SAN Manager... Edit Disk... Inspect Disk,.. () Stop Service ^ Remove Server

Turn Off.. Shut Down..

Snapshots
g j, Wr*fow3 7 -(4/16/ H Now

Save Pause Reset | Snapshot Revert..

Q R e fre s h
View Q Hp

Rename.. Enable Replication .. Help

Windows 7

Sjrrrrai Marory Namxkng [ Rcpkdton

C h^trrrtt 1 0

Connect... fr l Sfttingc..

h e d rtb e d t: D K fS b / tu k

() Turn Off... 0 Q || Shut Down... Save Paute Reset

Copyright by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

AirPcap

(rt.fwa

CEH

Ethical >U(hM

Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

Module 00 Page XIV

Ethical Hacking and Countermeasures Copyright by EC-COlMCil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

P o w erg y m a n d R ea lH o m e w v ? W eb sites
t c
[ toMlfOS ; ./rq>nV

....
C E H

-> n 1 kMMltnc kMh

Real Home!
\* K r !; I TING

* ! tin

Supp*rt 1 FAQ*

:Irip

stlJ

LING

KI.N 1IM .

IMSINO

CUJTIACl US

LOGIN

Powergym: http://localhost/powergym

RealHome: http://localhost/realhome
Copyright by EG-Gauncil. All Rights Reserved. Reproduction is Strictly Prohibited.

Live Hack W ebsite


h ttp :/ / w w w . certifiedhacker. c o m
CEH Labs CEH Labs

C EH

CEH Labs

CEH Labs

JuGGY

unite
J

B0V

Nl fc t i
Copyright O by EG-Gouncil. All Rights Reserved. Reproduction Is Strictly Prohibited.

Module 00 Page XV

Ethical Hacking and Countermeasures Copyright by EC-C0UIICil All Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and Countermeasures Welcome to Certified Ethical Hacker Class

Exam 312-50 Certified Ethical Hacker

CE H

L ets Start H a ck in g

Copyright by IG-Gouncil. All Rights Reserved. Reproduction is Strictly Prohibited.

Module 00 Page XVI

Ethical Hacking and Countermeasures Copyright by EC-COlMCil All Rights Reserved. Reproduction is Strictly Prohibited.

You might also like