steve.graham

/Steve Graham

About Steve Graham

This author has not yet filled in any details.
So far Steve Graham has created 18 blog entries.

Sniffers

Sniffing is performed to collect basic information from the target and its network. It helps to find vulnerabilities and select exploits for attack. It determines network information, system information, and organizational information. Sniff the network Analyze incoming and outgoing packets Troubleshoot the network for performance [...]

July 16th, 2014|Categories: Ethical Hacking Exercises, Sniffers|Comments Off on Sniffers

Viruses and Worms

A virus is a self-replicating program that produces its own code by attaching copies of it onto other executable codes. Some viruses affect computers as soon as their codes are executed; others lie dormant until a predetermined logical circumstance is met. Create viruses using tools Create worms using worm generator tool [...]

July 16th, 2014|Categories: Ethical Hacking Exercises, Viruses and Worms|Comments Off on Viruses and Worms

Trojans and Backdoors

A Trojan is a program that contains malicious or harmful code inside apparently harmless programming or data in such a way that it can gain control and cause damage, such as ruining the file allocation table on a hard disk. With the help of a Trojan, an attacker gets access to stored passwords in a [...]

July 16th, 2014|Categories: Ethical Hacking Exercises, Trojans and Backdoors|Comments Off on Trojans and Backdoors

System Hacking

The goal of system hacking is to gain access, escalate privileges, execute applications, and hide files. Extracting administrative passwords Hiding files and extracting hidden files Recovering passwords Monitoring a system remotely System Hacking Exercises Ethical Hacking Exercises / System Hacking contains the [...]

July 16th, 2014|Categories: Ethical Hacking Exercises, System Hacking|Comments Off on System Hacking

Enumeration

Enumeration is the process of extracting user names, machine names, network resources, shares, and services from a system. Enumeration techniques are conducted in an intranet environment. User name and user groups Lists of computers, their operating systems, and ports Machine names, network resources, and services Lists of shares on individual [...]

July 16th, 2014|Categories: Enumeration VMs, Ethical Hacking Exercises|Comments Off on Enumeration

Scanning Networks

Building on exercises from our information gathering and threat modeling, we can now begin to actively query our victims for vulnerabilities that may lead to a compromise. We have narrowed down our attack surface considerably since we first began the penetration test with everything potentially in scope. Check live systems [...]

July 16th, 2014|Categories: Ethical Hacking Exercises, Scanning Networks|Comments Off on Scanning Networks

Footprinting and Reconnaissance

Before a penetration test even begins, penetration testers spend time with their clients working out the scope, rules, and goals of the test. The penetration testers may break in using any means necessary, from using information found in the dumpster, to locating web application security holes, to posing as the cable guy. After pre-engagement activities, [...]

July 16th, 2014|Categories: Ethical Hacking Exercises, Footprinting and Reconnaissance|Comments Off on Footprinting and Reconnaissance

Ethical Hacking Exercises

Ethical Hacking Exercises are available as part of the following subscription: The Exercises in this lab map to the Certified Ethical Hacker V10 Course. Each subscription provides 6 months of access to 107 Different Exercises. Each exercise contains a Scenario, Objectives, and individual step by step tasks to guide the user through all steps necessary [...]

July 15th, 2014|Categories: Ethical Hacking Exercises|Comments Off on Ethical Hacking Exercises