CEH Certified Ethical Hacker Study Guide | Tutorial

-

Introduction
The Certified Ethical Hacker (CEH) exam was developed by the International Council of
E-Commerce Consultants (EC-Council) to provide an industry-wide means of certifying
the competency of security professionals. The CEH certification is granted to those who
have attained the level of knowledge and security skills needed to perform security audits
and penetration testing of systems and network.
The CEH exam is periodically updated to keep the certification applicable to the most
recent hacking tools and vulnerabilities. This is necessary because a CEH must be familiar
with the latest attacks and exploits. The most recent revisions to the exam as of this writing
are found in version 6. The version 6 exam objectives are reflected in this book.

Contents at a Glance

  • Introduction xxi
  • Assessment Test xxx
  • Chapter 1 Introduction to Ethical Hacking, Ethics, and Legality 1
  • Chapter 2 Gathering Target Information: Reconnaissance,
  • Footprinting, and Social Engineering 31
  • Chapter 3 Gathering Network and Host Information: Scanning
  • and Enumeration 63
  • Chapter 4 System Hacking: Password Cracking, Escalating
  • Privileges, and Hiding Files 95
  • Chapter 5 Trojans, Backdoors, Viruses, and Worms 125
  • Chapter 6 Gathering Data from Networks: Sniffers 153
  • Chapter 7 Denial of Service and Session Hijacking 173
  • Chapter 8 Web Hacking: Google, Web Servers, Web Application
  • Vulnerabilities, and Web-Based Password
  • Cracking Techniques 195
  • Chapter 9 Attacking Applications: SQL Injection and Buffer Overflows 221
  • Chapter 10 Wireless Network Hacking 239
  • Chapter 11 Physical Site Security 261
  • Chapter 12 Hacking Linux Systems 281
  • Chapter 13 Bypassing Network Security: Evading IDSs, Honeypots,
  • and Firewalls 301
  • Chapter 14 Cryptography 323
  • Chapter 15 Performing a Penetration Test 343
  • Appendix About the Companion CD 359
  • Glossary 363
  • Index 375

Table of Exercises

Exercise 2.1 Using SpyFu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Exercise 2.2 Using KeywordSpy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Exercise 2.3 Using the EDGAR Database to Gather Information . . . . . . . . . . . . . . . . . 36
Exercise 2.4 Using Whois . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Exercise 3.1 Using a Windows Ping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Exercise 3.2 Free IPTools Port Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Exercise 3.3 Use Netcraft to Identify the OS of a Web Server . . . . . . . . . . . . . . . . . . . 79
Exercise 3.4 Use Anonymouse to Surf Websites Anonymously . . . . . . . . . . . . . . . . . 80
Exercise 4.1 Use Ophcrack to Crack Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Exercise 4.2 Hiding Files Using NTFS File Streaming . . . . . . . . . . . . . . . . . . . . . . . . . . 114
Exercise 4.3 Hiding Data in an Image Using ImageHide . . . . . . . . . . . . . . . . . . . . . . . . 116
Exercise 5.1 Using Netcat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
Exercise 5.2 Signature Verification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
Exercise 5.3 Creating a Test Virus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Exercise 6.1 Use Wireshark to Sniff Traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
Exercise 6.2 Create a Wireshark filter to capture only traffic
to or from an IP address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
Exercise 7.1 Preventing SYN Flood Attacks on Windows 2000 Servers . . . . . . . . . . 181
Exercise 8.1 Disabling the Default Website in Internet Information Server . . . . . . . 199
Exercise 8.2 Using BlackWidow to Copy a Website . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
Exercise 8.3 Banner Grabbing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
Exercise 8.4 Using Metasploit to Exploit a Web Server Vulnerability . . . . . . . . . . . . 203
Exercise 8.5 Using Acunetix Web Vulnerability Scanner . . . . . . . . . . . . . . . . . . . . . . . . 211
Exercise 8.6 Using a Password Cracker . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
Exercise 9.1 Using HP’s Scrawlr to Test for SQL Injection Vulnerabilities . . . . . . . . . 227
Exercise 9.2 Performing a Buffer Overflow Attack Using Metasploit . . . . . . . . . . . . 231
Exercise 10.1 Installing and Using a WLAN Sniffer Tool . . . . . . . . . . . . . . . . . . . . . . . . 246
Exercise 10.2 MAC Address Spoofing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
Exercise 11.1 View a Video on Lockpicking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
Exercise 11.2 Audit Your Organization’s Physical Site Security . . . . . . . . . . . . . . . . . . 269
Exercise 12.1 Configuring and Compiling the Kernel . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
Exercise 12.2 Using a Live CD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287
Exercise 12.3 Detecting Listening Network Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
525203flast.indd 19 3/17/10 6:02:01 PM
xx Table of Exercises
Exercise 13.1 Installing and Using KFSensor as a Honeypot . . . . . . . . . . . . . . . . . . . . 310
Exercise 14.1 Viewing a Digital Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
Exercise 14.2 Using WinMD5 to Compute File Hashes . . . . . . . . . . . . . . . . . . . . . . . . . 333
Exercise 15.1 Viewing a Pen Testing Framework of Tools . . . . . . . . . . . . . . . . . . . . . . . 348
Exercise 15.2 Viewing a Sample Pen Testing Report Framework . . . . . . . . . . . . . . . . . 350

Go To Base64 & Decode:

aHR0cHM6Ly9tZWdhLm56L2ZpbGUvbWVJaTJDcUwjdzNEd1dXUGZUUlA4d2lEdjJ3S3pWOUh5bFg5Rk1KdmJGU182MGRfUkNLOA==

Enjoy!

10 Likes

Thanks bro.