Virtual Learning Environment

Topics: Denial-of-service attack, Password, Computer security exploits Pages: 23 (4651 words) Published: July 24, 2013
Course content of CEH :Exam – 312-50 Module 1: Introduction to Ethical Hacking • • • • •

Why Security? Essential Terminologies Elements of Security The Security, Functionality, and Ease of Use Triangle What Does a Malicious Hacker Do? o Reconnaissance o Scanning o Gaining access o Maintaining access o Covering Tracks



• • • • • • • • • • • • • • • • •

Types of Hacker Attacks o Operating System attacks o Application-level attacks o Shrink Wrap code attacks o Misconfiguration attacks Hacktivism Hacker Classes Hacker Classes and Ethical Hacking What Do Ethical Hackers Do? Can Hacking be Ethical? How to Become an Ethical Hacker? Skill Profile of an Ethical Hacker What is Vulnerability Research? Why Hackers Need Vulnerability Research? Vulnerability Research Tools Vulnerability Research Websites How to Conduct Ethical Hacking? Approaches to Ethical Hacking Ethical Hacking Testing Ethical Hacking Deliverables Computer Crimes and Implications Legal Perspective o U.S. Federal Law o Japan’s Cyber Laws o United Kingdom’s Cyber Laws

o o o

Australia’s Cyber Laws Germany’s Cyber Laws Singapore’s Cyber Laws

Module 2: Footprinting
• • • • • • • • • • • • • • •

Revisiting Reconnaissance Defining of Footprinting Information Gathering Methodology Unearthing Initial Information Finding a Company’s URL Internal URL Extracting Archive 0f a Website Google Search for Company’s Info. People Search Footprinting Through Job Sites Passive Information Gathering Competitive Intelligence Gathering Why Do You Need Competitive Intelligence? Companies Providing Competitive Intelligence Services Competitive Intelligence o When Did This Company Begin? o How Did It Develop? o What Are This Company's Plans? o What Does Expert Opinion Say About The Company? o Who Are The Leading Competitors?

• •

Public and Private Websites Tools o DNS Enumerator o SpiderFoot o Sensepost Footprint Tools BiLE.pl BiLE-weigh.pl tld-expand.pl vet-IPrange.pl qtrace.pl vet-mx.pl jarf-rev jarf-dnsbrute o Wikito Footprinting Tool o Web Data Extractor Tool o Whois o Nslookup



Necrosoft ARIN Traceroute Neo Trace GEOSpider Geowhere GoogleEarth VisualRoute Trace Kartoo Search Engine Touchgraph Visual Browser SmartWhois VisualRoute Mail Tracker eMailTrackerPro Read Notify HTTrack Web Site Copier Web Ripper robots.txt Website watcher E-mail Spider Power E-mail Collector Tool Steps to Perform Footprinting o o o o o o o o o o o o o o o o o o o o

Module 3: Scanning
• •

Definition of Scanning Types of Scanning o Port Scanning o Network Scanning o Vulnerability Scanning

• •

Objectives of Scanning CEH Scanning Methodology o Check for live systems ICMP Scanning Angry IP HPING2 Ping Sweep Firewalk o Check for open ports Nmap TCP Communication Flags Three Way Handshake SYN Stealth / Half Open Scan Stealth Scan

o

Xmas Scan FIN Scan NULL Scan IDLE Scan ICMP Echo Scanning/List Scan TCP Connect / Full Open Scan FTP Bounce Scan FTP Bounce Attack SYN/FIN Scanning Using IP Fragments UDP Scanning Reverse Ident Scanning RPC Scan Window Scan Blaster Scan PortScan Plus, Strobe IPSecScan NetScan Tools Pro WUPS – UDP Scanner SuperScan IPScanner MegaPing Global Network Inventory Scanner Net Tools Suite Pack FloppyScan War Dialer Technique Why War Dialing? Wardialing PhoneSweep THC Scan SandTrap Tool Banner grabbing/OS Fingerprinting OS Fingerprinting Active Stack Fingerprinting Passive Fingerprinting Active Banner Grabbing Using Telnet GET REQUESTS p0f – Banner Grabbing Tool p0f for Windows Httprint Banner Grabbing Tool Active Stack Fingerprinting XPROBE2 RING V2 Netcraft Disabling or Changing Banner Apache Server IIS Server

o o

o

o

o

o o o o o o o o

IIS Lockdown Tool ServerMask Hiding File Extensions PageXchanger 2.0 Identify Service Scan for Vulnerability Bidiblah Automated Scanner Qualys Web-based Scanner SAINT ISS Security Scanner Nessus GFI LANGuard SATAN (Security Administrator’s Tool for Analyzing Networks) Retina NIKTO SAFEsuite...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Virtual Learning Environments Essay
  • Virtual Learning Environment Essay
  • Virtual Learning Environments Essay
  • Virtual Learning Essay
  • Virtual Learning Environment and High School Essay
  • Essay about Learning Environments
  • Virtual Training Essay
  • Learning: a 21st Century Approach Essay

Become a StudyMode Member

Sign Up - It's Free