CEH_product_image_1

CEHv8 is a comprehensive ethical hacking and information systems security auditing program focusing on latest security threats, advanced attack vectors and practical real time demonstration of latest hacking techniques, methodologies, tools, tricks and security measures. Our researchers have invested thousands of man hours researching the latest trends and uncovering the covert techniques used by the underground community.

 

Machines Included in Student Virtual Private Cloud

 

Lab Content -Excercises

Introduction to Ethical Hacking

  • No labs for this module

Footprinting & Reconnaissance

  • Extracting Company’s Data Using Web Data Extractor
  • Mirroring Website Using HTTrack Website Copier Tool

Scanning Networks

  • Scanning System & Network Resources Using Advanced IP Scanner
  • Fingerprinting Open Ports Using the Amap Tool
  • Monitoring TCP/IP connections Using the CurrPorts Tool
  • Exploring & Auditing a Network Using Nmap
  • Scanning a Network Using the NetScan Tools Pro
  • Drawing Network Diagrams Using LANSurveyor
  • Mapping a Network Using the Friendly Pinger
  • Auditing Scanning by Using Global Network Inventory
  • Basic Network Troubleshooting Using the MegaPing

Enumeration

  • Enumerating NetBIOS Using the SuperScan Tool
  • Enumerating a Network Using SoftPerfect Network Scanner
  • Enumerating a Network Using SolarWinds Toolset

System Hacking

  • Extracting Administrator Passwords Using LCP
  • Hiding Files Using NTFS Steams
  • Find Hidden Files Using ADS Spy
  • Hiding Files Using the Stealth Files Tool
  • Extracting SAM Hashes Using PWdump7 Tool
  • Extracting Administrator Passwords Using LOphtCrack
  • System Monitoring Using RemoteExec
  • Hiding Data Using Snow Steganography
  • Disabling Auditing Using Auditpol

Trojans & Backdoors

  • Creating a Server Using the ProRat Tool
  • ICMP Backdoor
  • Wrapping a Trojan Using One File EXE Maker
  • Proxy Server Trojan
  • HTTP Trojan
  • Remote Access Trojans Using Atelier Web Remote Commander
  • Detecting Trojans

Viruses & Worms

  • Creating a Virus Using the JPS Virus Maker Tool

Sniffers

  • Mapping a Network Topology Using Look@LAN and Dude
  • Sniffing the Network Using the Colasoft Packet Builder
  • Sniffing the Network Using the OmniPeek Network Analyzer
  • Spoofing MAC Address Using SMAC
  • Sniffing a Network Using the WinArpAttacker Tool
  • Analyzing a Network Using the Colasoft Capsa Network Analyzer
  • Sniffing Passwords Using Wireshark
  • Performing Man-In-The-Middle Attack Using Can & Abel

Social Engineering

  • No Labs for this Module

Denial of Service

  • Creating a Zombie Using Poison Ivy
  • HTTP Flooding Using DoSHTTP

Session Hijacking

  • No Labs for this Module

Hacking Webservers

  • Footprinting a Webserver Using the httprecon Tool
  • Footprinting a Webserver Using ID Serve

Hacking Web Applications

  • Hacking Web Applications
  • Website Vulnerability Scanning Using Acunetix WVS

SQL Injection

  • SQL Injection Attacks on MS SQL Database

Hacking Wireless Networks

  • No Labs for this Module

Evading IDS, Firewalls & Honeypots

  • Detecting Intrusions Using Snort

Buffer Overflow

  • Buffer Overflow Example

Cryptography

  • Basic Data Encryption Using HashCalc
  • Basic Data Encryption Using MD5 Calculator
  • Basic Data Encryption Using Advanced Encryption Package
  • Basic Data Encryption Using TrueCrypt
  • Basic Data Encryption Using CrypTool