CEHv8 is a comprehensive ethical hacking and information systems security auditing program focusing on latest security threats, advanced attack vectors and practical real time demonstration of latest hacking techniques, methodologies, tools, tricks and security measures. Our researchers have invested thousands of man hours researching the latest trends and uncovering the covert techniques used by the underground community.
Machines Included in Student Virtual Private Cloud
Lab Content -Excercises
Introduction to Ethical Hacking
- No labs for this module
Footprinting & Reconnaissance
- Extracting Company’s Data Using Web Data Extractor
- Mirroring Website Using HTTrack Website Copier Tool
Scanning Networks
- Scanning System & Network Resources Using Advanced IP Scanner
- Fingerprinting Open Ports Using the Amap Tool
- Monitoring TCP/IP connections Using the CurrPorts Tool
- Exploring & Auditing a Network Using Nmap
- Scanning a Network Using the NetScan Tools Pro
- Drawing Network Diagrams Using LANSurveyor
- Mapping a Network Using the Friendly Pinger
- Auditing Scanning by Using Global Network Inventory
- Basic Network Troubleshooting Using the MegaPing
Enumeration
- Enumerating NetBIOS Using the SuperScan Tool
- Enumerating a Network Using SoftPerfect Network Scanner
- Enumerating a Network Using SolarWinds Toolset
System Hacking
- Extracting Administrator Passwords Using LCP
- Hiding Files Using NTFS Steams
- Find Hidden Files Using ADS Spy
- Hiding Files Using the Stealth Files Tool
- Extracting SAM Hashes Using PWdump7 Tool
- Extracting Administrator Passwords Using LOphtCrack
- System Monitoring Using RemoteExec
- Hiding Data Using Snow Steganography
- Disabling Auditing Using Auditpol
Trojans & Backdoors
- Creating a Server Using the ProRat Tool
- ICMP Backdoor
- Wrapping a Trojan Using One File EXE Maker
- Proxy Server Trojan
- HTTP Trojan
- Remote Access Trojans Using Atelier Web Remote Commander
- Detecting Trojans
Viruses & Worms
- Creating a Virus Using the JPS Virus Maker Tool
Sniffers
- Mapping a Network Topology Using [email protected] and Dude
- Sniffing the Network Using the Colasoft Packet Builder
- Sniffing the Network Using the OmniPeek Network Analyzer
- Spoofing MAC Address Using SMAC
- Sniffing a Network Using the WinArpAttacker Tool
- Analyzing a Network Using the Colasoft Capsa Network Analyzer
- Sniffing Passwords Using Wireshark
- Performing Man-In-The-Middle Attack Using Can & Abel
Social Engineering
- No Labs for this Module
Denial of Service
- Creating a Zombie Using Poison Ivy
- HTTP Flooding Using DoSHTTP
Session Hijacking
- No Labs for this Module
Hacking Webservers
- Footprinting a Webserver Using the httprecon Tool
- Footprinting a Webserver Using ID Serve
Hacking Web Applications
- Hacking Web Applications
- Website Vulnerability Scanning Using Acunetix WVS
SQL Injection
- SQL Injection Attacks on MS SQL Database
Hacking Wireless Networks
- No Labs for this Module
Evading IDS, Firewalls & Honeypots
- Detecting Intrusions Using Snort
Buffer Overflow
- Buffer Overflow Example
Cryptography
- Basic Data Encryption Using HashCalc
- Basic Data Encryption Using MD5 Calculator
- Basic Data Encryption Using Advanced Encryption Package
- Basic Data Encryption Using TrueCrypt
- Basic Data Encryption Using CrypTool