CEH_product_image_1

CEHv8 is a comprehensive ethical hacking and information systems security auditing program focusing on latest security threats, advanced attack vectors and practical real time demonstration of latest hacking techniques, methodologies, tools, tricks and security measures. Our researchers have invested thousands of man hours researching the latest trends and uncovering the covert techniques used by the underground community.

 

Machines Included in Student Virtual Private Cloud

 

Lab Content -Excercises

Introduction to Ethical Hacking

No labs for this module

Footprinting & Reconnaissance

  • Network Route Trace Using Path Analyzer Pro
  • Mirroring Website Using HTTrack Website Copier Tool
  • Extracting Company’s Data Using Web Data Extractor

Scanning Networks

  • Scanning System & Network Resources Using Advanced IP Scanner
  • Banner Grabbing to Determine a Remote Target System using ID Serve
  • Fingerprinting Open Ports Using the Amap Tool
  • Monitoring TCP/IP connections Using the CurrPorts Tool
  • Exploring & Auditing a Network Using Nmap
  • Scanning a Network Using the NetScan Tools Pro
  • Drawing Network Diagrams Using LANSurveyor
  • Mapping a Network Using the Friendly Pinger
  • Auditing Scanning by Using Global Network Inventory
  • Basic Network Troubleshooting Using the MegaPing
  • Scanning the Network Using the Colasoft Packet Builder
  • Scanning Devices in a Network Using The Dude

Enumeration

  • Enumerating a Target Network Using Nmap
  • Enumerating NetBIOS Using the SuperScan Tool
  • Enumerating NetBIOS Using the NetBIOS Enumerator Scanner
  • Enumerating a Network Using SoftPerfect Network Scanner
  • Enumerating a Network Using SolarWinds Toolset
  • Enumerating the System Using Hyena

System Hacking

  • Extracting Administrator Passwords Using LCP
  • Hiding Files Using NTFS Steams
  • Find Hidden Files Using ADS Spy
  • Hiding Files Using the Stealth Files Tool
  • Extracting SAM Hashes Using PWdump7 Tool
  • Creating the Rainbow Tables Using Winrtgen
  • Password Cracking Using RainbowCrack
  • Extracting Administrator Passwords Using LOphtCrack
  • Password Cracking Using OphCrack
  • Hiding Data Using Snow Steganography
  • Viewing, Enabling and Clearing the Audit Policies Using Auditpol
  • User System Monitoring and Surveillance Needs Using Spytech SpyAgent
  • Web Activity Monitoring and Recording Using Power Spy 2013
  • Image Steganography Using QuickStego

Trojans & Backdoors

  • Creating a Server Using the ProRat Tool
  • Wrapping a Trojan Using One File EXE Maker
  • Proxy Server Trojan
  • HTTP Trojan
  • Detecting Trojans
  • Creating a Server Using the Theef
  • Hack Windows 7 Using Metasploit

Viruses & Worms

  • Creating a Virus Using the JPS Virus Maker Tool
  • Virus Analysis Using IDA Pro
  • Virus Analysis Using OllyDbg
  • Creating a Worm Using the Internet Worm Maker Thing

Sniffers

  • Sniffing the Network Using the OmniPeek Network Analyzer
  • Spoofing MAC Addresses Using SMAC
  • Sniffing a Network Using the WinArpAttacker Tool
  • Sniffing Passwords Using Wireshark
  • Performing Man-In-The-Middle Attack Using Cain & Abel
  • Advanced ARP Spoofing Detection Using Xarp
  • Detecting Systems Running in Promiscuous Mode in a Netwrok Using PromqryUI
  • Sniffing Password from Captured Packets Using Sniff-O-Matic

Social Engineering

  • Social Engineering Penetration Testing Using Social Engineering ToolKit (SET)

Denial of Service

  • SYN Flooding a Target Host Using hping3

Session Hijacking

  • Session Hijacking Using the Zed Attack Proxy (ZAP)

Hacking Webservers

  • Footprinting a Webserver Using the httprecon Tool
  • Footprinting a Webserver Using ID Serve

Hacking Web Applications

  • Hacking Web Applications
  • Website Vulnerability Scanning Using Acunetix WVS

SQL Injection

  • SQL Injection Attacks on MS SQL Database
  • Testing for SQL Injection Using IBM Security AppScan Tool

Hacking Wireless Networks

  • Creating a WEP Network with Aircrack-ng for Windows
  • Sniffing the Network Using the OmniPeek Network Analyzer

  • No Labs For This Module

Evading IDS, Firewalls & Honeypots

  • Detecting Intrusions Using Snort
  • Detecting Intruders and Works Using KFSensor Honeypot IDS

Buffer Overflow

  • Buffer Overflow Example

Cryptography

  • Basic Data Encryption Using HashCalc
  • Basic Data Encryption Using MD5 Calculator
  • Basic Data Encryption Using Advanced Encryption Package
  • Basic Data Encryption Using TrueCrypt
  • Basic Data Encryption Using CrypTool
  • Encrypting and Decrypting the Data Using BCTextEncoder
  • Basic Data Encrypting Using Rohos Disk Encryption