+ All Categories
Home > Technology > C|EH Introduction

C|EH Introduction

Date post: 18-May-2015
Category:
Upload: sunnysmith
View: 6,163 times
Download: 0 times
Share this document with a friend
Popular Tags:
40
Ethical Hacking Ethical Hacking Presented By Presented By R. Sunil Kumar R. Sunil Kumar
Transcript
Page 1: C|EH Introduction

Ethical Hacking Ethical Hacking

Presented ByPresented By

R. Sunil KumarR. Sunil Kumar

Page 2: C|EH Introduction

OverviewOverview

History of InternetHistory of Internet

History of HackingHistory of Hacking

Ethical HackingEthical Hacking EC-Council : C|EHEC-Council : C|EH

C|EH ModulesC|EH Modules

Page 3: C|EH Introduction

Brief History of InternetBrief History of Internet 19691969 -  - The Advanced Research Projects Agency (ARPA) The Advanced Research Projects Agency (ARPA)

create the ARPANET, the forerunner of the Internet. The first create the ARPANET, the forerunner of the Internet. The first four nodes (networks) of ARPANET consisted of the University four nodes (networks) of ARPANET consisted of the University of California Los Angeles, University of California Santa of California Los Angeles, University of California Santa Barbara, University of Utah and the Stanford Research Barbara, University of Utah and the Stanford Research Institute.Institute.

19831983 -  - The Internet is founded by splitting the Arpanet into The Internet is founded by splitting the Arpanet into separate military and civilian networks.separate military and civilian networks.

19831983 -  - FidoNet is developed by Tom Jennings. FidoNet will FidoNet is developed by Tom Jennings. FidoNet will become the most widespread information exchange network become the most widespread information exchange network in the world for the next 10 years, until the Internet takes in the world for the next 10 years, until the Internet takes over.over.

19891989 -  - the WWW is developed at CERN labs, in the WWW is developed at CERN labs, in Switzerland.Switzerland.

19901990 -  - The Arpanet is dismantled.The Arpanet is dismantled.

Page 4: C|EH Introduction

Advantages of InternetAdvantages of Internet Sharing InformationSharing Information Collection of InformationCollection of Information NewsNews Searching JobsSearching Jobs AdvertisementAdvertisement CommunicationCommunication EntertainmentEntertainment Online EducationOnline Education Online ResultsOnline Results Online Airlines and Railway SchedulesOnline Airlines and Railway Schedules Online Medical AdviceOnline Medical Advice

Page 5: C|EH Introduction

Disadvantages of InternetDisadvantages of Internet Theft of Personal informationTheft of Personal information SpammingSpamming Viruses & WormsViruses & Worms Security ProblemsSecurity Problems ImmoralityImmorality Wastage of timesWastage of times chatting, playing games etcchatting, playing games etc

Page 6: C|EH Introduction

History of Hacking History of Hacking

Page 7: C|EH Introduction

HackerHacker

Page 8: C|EH Introduction

Hackers are here. Where are Hackers are here. Where are you?you?

The explosive growth of the Internet has brought The explosive growth of the Internet has brought many good things…As with most technological many good things…As with most technological advances, there is also a dark side: criminal advances, there is also a dark side: criminal hackers. hackers.

HACKER HACKER noun. noun. 1. A person who enjoys learning 1. A person who enjoys learning the details of computer systems and how to the details of computer systems and how to stretch their capabilities…. 2. One who programs stretch their capabilities…. 2. One who programs enthusiastically or who enjoys programming enthusiastically or who enjoys programming rather than just theorizing about programming. rather than just theorizing about programming.

Hacking : Hacking : The rapid crafting of a new program The rapid crafting of a new program or making changes to the existing, usually or making changes to the existing, usually complicated softwarecomplicated software

Page 9: C|EH Introduction

Hacker ClassesHacker Classes Black Hats:Black Hats: Individuals who have extraordinary Individuals who have extraordinary

computing skills resorting to malicious or computing skills resorting to malicious or destructive purposes.destructive purposes.

White Hats:White Hats: individuals professing hacking skills individuals professing hacking skills and using them for defensive purposes. Also and using them for defensive purposes. Also known as security professionalsknown as security professionals

Gray Hats:Gray Hats: Individuals who work both offensively Individuals who work both offensively and defensively at various times.and defensively at various times.

Suicide Hackers:Suicide Hackers: individuals who aim to bring individuals who aim to bring down the critical infrastructures for a “cause” .down the critical infrastructures for a “cause” .

Page 10: C|EH Introduction

Hacker ClassesHacker Classes Script Kiddies or Cyber-Punks:Script Kiddies or Cyber-Punks: Between 12-30; Between 12-30;

predominantly white and male; bored in school; get predominantly white and male; bored in school; get caught due to bragging online; intent is to caught due to bragging online; intent is to vandalize or disrupt systems.vandalize or disrupt systems.

Professional Criminals or Crackers:Professional Criminals or Crackers: Make a Make a living by breaking into systems and selling the living by breaking into systems and selling the information.information.

Coders and Virus Writers:Coders and Virus Writers: See themselves as an See themselves as an elite; programming background and write code but elite; programming background and write code but won’t use it themselves; have their own networks won’t use it themselves; have their own networks called “zoos”; leave it to others to release their called “zoos”; leave it to others to release their code into “The Wild” or Internet. code into “The Wild” or Internet. ((www.tlc.discovery.com))

Page 11: C|EH Introduction

Time Line and Major EventsTime Line and Major Events

Page 12: C|EH Introduction

1960s: The Dawn of Hacking1960s: The Dawn of HackingMIT becomes home to the first computer hackers, who MIT becomes home to the first computer hackers, who begin altering software and hardware to make it work begin altering software and hardware to make it work better and/or faster.better and/or faster.

1970s: Phone Phreaks and Cap'n Crunch: 1970s: Phone Phreaks and Cap'n Crunch: One One phreak, John Draper (aka "Cap'n Crunch"), discovers a phreak, John Draper (aka "Cap'n Crunch"), discovers a toy whistle inside Cap'n Crunch cereal gives 2600-hertz toy whistle inside Cap'n Crunch cereal gives 2600-hertz signal, and can access AT&T's long-distance switching signal, and can access AT&T's long-distance switching system.system. Draper Draper builds a "blue box" used with whistle builds a "blue box" used with whistle allows phreaks to make free calls.allows phreaks to make free calls.

Steve WozniakSteve Wozniak and Steve Jobs, future founders of and Steve Jobs, future founders of Apple Computer, make and sell blue boxes.Apple Computer, make and sell blue boxes.

1980s: Hacker Message Boards and Groups1980s: Hacker Message Boards and GroupsHacking groups form; such as Legion of Doom (US), Hacking groups form; such as Legion of Doom (US), Chaos Computer Club (Germany).Chaos Computer Club (Germany).

1983: Kids' Games1983: Kids' GamesMovie "War Games" introduces public to hacking.Movie "War Games" introduces public to hacking.

Page 13: C|EH Introduction

1984: Hacker Zines1984: Hacker ZinesHacker magazine 2600 publication; online zine Phrack.Hacker magazine 2600 publication; online zine Phrack.

1986: 1986: Congress passes Computer Fraud and Abuse Act; crime to break Congress passes Computer Fraud and Abuse Act; crime to break into computer systems.into computer systems.

11988: The Morris Worm988: The Morris WormRobert T. Morris, Jr., launches self-replicating worm on Arpanet.Robert T. Morris, Jr., launches self-replicating worm on Arpanet.

1989: The Germans , the KGB and Kevin Mitnick.1989: The Germans , the KGB and Kevin Mitnick. German HackersGerman Hackers arrested for breaking into U.S. arrested for breaking into U.S.

computers; sold information to Soviet KGB (computers; sold information to Soviet KGB (Komitet Gosudarstvennoy Bezopasnosti)..

Hacker "The Mentor“Hacker "The Mentor“ arrested; publishes Hacker's arrested; publishes Hacker's Manifesto. Manifesto.

1990 : Kevin Mitnick1990 : Kevin Mitnick convicted; first person convicted under law against convicted; first person convicted under law against

gaining access to interstate network for criminal gaining access to interstate network for criminal purposes.purposes.

Page 14: C|EH Introduction

1990s: Why Buy a Car When You Can Hack One?1990s: Why Buy a Car When You Can Hack One?Radio station call-in contest; hacker-fugitive Kevin Radio station call-in contest; hacker-fugitive Kevin Poulsen and friends crack phone; they allegedly get two Poulsen and friends crack phone; they allegedly get two Porsches, $20,000 cash, vacation trips; Poulsen now a Porsches, $20,000 cash, vacation trips; Poulsen now a freelance journalist covering computer crime. freelance journalist covering computer crime.

First Def ConFirst Def Con hacking conference in Las Vegas hacking conference in Las Vegas 1995: The Mitnick Takedown:1995: The Mitnick Takedown: Arrested again; Arrested again;

charged with stealing 20,000 credit card numbers. charged with stealing 20,000 credit card numbers. 1995: Russian Hackers1995: Russian Hackers Siphon $10 million from Siphon $10 million from

Citibank; Vladimir Levin, leader.Citibank; Vladimir Levin, leader. 1999 1999 hackers attack Pentagon, MIT, FBI web sites.hackers attack Pentagon, MIT, FBI web sites. damage through attacks on government and military

computer systems has been calculated at between $1.5 and $1.8 Billion for 1999

1999:1999: E-commerce company attacked; blackmail E-commerce company attacked; blackmail threats followed by 8 million credit card numbers threats followed by 8 million credit card numbers stolen. stolen.

Page 15: C|EH Introduction

2000 2000 May: May: The The ILOVEYOU worm, also known as VBS/Loveletter and Love  worm, also known as VBS/Loveletter and Love

Bug worm, is a computer worm written in VBScript. It infected Bug worm, is a computer worm written in VBScript. It infected millions of computers worldwide within a few hours of its release. millions of computers worldwide within a few hours of its release.

September: teenage hacker September: teenage hacker Jonathan James becomes first juvenile  becomes first juvenile to serve jail time for hacking.to serve jail time for hacking.

20012001

Microsoft becomes the prominent victim of a new type of hack that Microsoft becomes the prominent victim of a new type of hack that attacks the attacks the domain name server. In these denial-of-service . In these denial-of-service attacks, the DNS paths that take users to Microsoft's Web sites are attacks, the DNS paths that take users to Microsoft's Web sites are corrupted.corrupted.

August: August: Code Red worm, infects tens of thousands of machines., infects tens of thousands of machines.

Page 16: C|EH Introduction

20022002

August: Researcher August: Researcher Chris Paget publishes a paper describing " publishes a paper describing "shatter attacks", detailing how Windows' unauthenticated ", detailing how Windows' unauthenticated messaging system can be used to take over a machine. The paper  can be used to take over a machine. The paper raises questions about how securable Windows could ever be.raises questions about how securable Windows could ever be.

October: The October: The 

International Information Systems Security Certification Consortium -  - (ISC)2 - confers its 10,000th (ISC)2 - confers its 10,000th CISSP certification. certification.

2003 2003

March: March: CULT OF THE DEAD COW and  and Hacktivismo are given permission  are given permission by the by the United States Department of Commerce to export software  to export software utilizing strong encryption.utilizing strong encryption.

December 18: December 18: Milford Man pleas guilty to hacking. pleas guilty to hacking.

Page 17: C|EH Introduction

20042004 March: March: Myron Tereshchuk is arrested for attempting to extort $17  is arrested for attempting to extort $17

million from million from Micropatent..

July: North Korea claims to have trained 500 hackers who July: North Korea claims to have trained 500 hackers who successfully crack South Korean, Japanese, and their allies' successfully crack South Korean, Japanese, and their allies' computer systems.computer systems.[18]

2005 2005 September 13: : Cameron Lacroix is sentenced to 11 months for  is sentenced to 11 months for

gaining access to gaining access to T-Mobile USA's network and exploiting  network and exploiting Paris Hilton's  Sidekick..[19]

November 3: : Jeanson James Ancheta, whom prosecutors say was a , whom prosecutors say was a member of the "Botmaster Underground", a group of member of the "Botmaster Underground", a group of script kiddies mostly noted for their excessive use of  mostly noted for their excessive use of bot attacks and  and propagating vast amounts of propagating vast amounts of spam, was taken into custody after , was taken into custody after being lured to FBI offices in Los Angeles.being lured to FBI offices in Los Angeles.[20]

Page 18: C|EH Introduction

2006 2006 May: Jeanson James Ancheta receives a 57 month prison sentence, May: Jeanson James Ancheta receives a 57 month prison sentence, 

[6] and is ordered to pay damages amounting to $15,000.00 to the  and is ordered to pay damages amounting to $15,000.00 to the Naval Air Warfare Center in China Lake and the Defense Naval Air Warfare Center in China Lake and the Defense Information Systems Agency, for damage done due to DDoS Information Systems Agency, for damage done due to DDoS attacks and hacking. Ancheta also had to forfeit his gains to the attacks and hacking. Ancheta also had to forfeit his gains to the government, which include $60,000 in cash, a BMW, and computer government, which include $60,000 in cash, a BMW, and computer equipment equipment [7]..

May: Largest Defacement in Web History is performed by the May: Largest Defacement in Web History is performed by the Turkish hacker  hacker iSKORPiTX who successfully hacked 21,549 websites  who successfully hacked 21,549 websites in one shot. in one shot. [8]

October: Jesus Oquendo releases Asteroid, a SIP Denial of Service October: Jesus Oquendo releases Asteroid, a SIP Denial of Service

testing tool. It broke all versions of Asterisk until 1.2.13. Asteroid is testing tool. It broke all versions of Asterisk until 1.2.13. Asteroid is also known to affect certain SIP Softphones, SIP Phones and also known to affect certain SIP Softphones, SIP Phones and possibly other products using the SIP protocol. It was used possibly other products using the SIP protocol. It was used in Henning Schulzrinne's Columbia University seminars. See MITRE in Henning Schulzrinne's Columbia University seminars. See MITRE CVE-2006-5444 and CVE-2006-5445CVE-2006-5444 and CVE-2006-5445

Page 19: C|EH Introduction

2007 2007

May 17: Estonia recovers from massive denial-of-service attackMay 17: Estonia recovers from massive denial-of-service attack [21][21]

June 13: FBI Operation Bot Roast finds over 1 million botnet victimsJune 13: FBI Operation Bot Roast finds over 1 million botnet victims

June 21: A spear phishing incident at the Office of the Secretary of June 21: A spear phishing incident at the Office of the Secretary of Defense steals sensitive U.S. defense information, leading to Defense steals sensitive U.S. defense information, leading to significant changes in identity and message-source verification at significant changes in identity and message-source verification at OSD.OSD.

August 11: United Nations website hacked by Turkish Hacker August 11: United Nations website hacked by Turkish Hacker Kerem125Kerem125

October 7: Trend Micro website successfully hacked by Turkish hacker October 7: Trend Micro website successfully hacked by Turkish hacker Janizary(a.k.a Utku)Janizary(a.k.a Utku)

November 29: FBI Operation Bot Roast II: 1 million infected PCs, $20 November 29: FBI Operation Bot Roast II: 1 million infected PCs, $20 million in losses and 8 indictmentsmillion in losses and 8 indictments

Page 20: C|EH Introduction

2008 2008

January 18: Project Chanology Anon attacks January 18: Project Chanology Anon attacks Scientology website servers around the world. Private Scientology website servers around the world. Private documents are stolen from Scientology computers documents are stolen from Scientology computers and distributed over the Internet.and distributed over the Internet.

March 7: Around 20 Chinese hackers claim to have March 7: Around 20 Chinese hackers claim to have gained access to the world's most sensitive sites, gained access to the world's most sensitive sites, including The Pentagon. They operate from a bare including The Pentagon. They operate from a bare apartment on a Chinese island.apartment on a Chinese island.

Page 21: C|EH Introduction

2009 2009

April 1: Conficker worm has infiltrated billions of PCs April 1: Conficker worm has infiltrated billions of PCs worldwide including many government-level top-worldwide including many government-level top-security computer networks.security computer networks.

Page 22: C|EH Introduction

Ethical HackingEthical Hacking

Page 23: C|EH Introduction

What is Ethical Hacking?What is Ethical Hacking? Ethical hackingEthical hacking – defined “methodology adopted – defined “methodology adopted

by ethical hackers to discover the vulnerabilities by ethical hackers to discover the vulnerabilities existing in information systems, operating existing in information systems, operating environments.”environments.”

With the growth of the Internet, computer security With the growth of the Internet, computer security has become a major concern for businesses and has become a major concern for businesses and governments. governments.

In their search for a way to approach the problem, In their search for a way to approach the problem, organizations came to realize that one of the best organizations came to realize that one of the best ways to evaluate the intruder threat to their ways to evaluate the intruder threat to their interests would be to have independent computer interests would be to have independent computer security professionals attempt to break into their security professionals attempt to break into their computer systems. computer systems.

Page 24: C|EH Introduction

Who are Ethical Hackers?Who are Ethical Hackers? ““One of the best ways to evaluate the intruder One of the best ways to evaluate the intruder

threat is to have an independent computer threat is to have an independent computer security professionals attempt to break their security professionals attempt to break their computer systems” computer systems”

Successful ethical hackers possess a variety of skills. Successful ethical hackers possess a variety of skills. First and foremost, they must be completely trustworthy. First and foremost, they must be completely trustworthy.

Ethical hackers typically have very strong programming Ethical hackers typically have very strong programming and computer networking skills. and computer networking skills.

They are also adept at installing and maintaining They are also adept at installing and maintaining systems that use the more popular operating systems systems that use the more popular operating systems (e.g., Linux , Unix, Windows ) used on target systems. (e.g., Linux , Unix, Windows ) used on target systems.

These base skills are augmented with detailed These base skills are augmented with detailed knowledge of the hardware and software provided by knowledge of the hardware and software provided by the more popular computer and networking hardware the more popular computer and networking hardware vendors. vendors.

Page 25: C|EH Introduction

Ethical Hacker classesEthical Hacker classes

• Former Black hatsFormer Black hats – Reformed – Reformed hackers, first-hand experience,hackers, first-hand experience,

lesser credibility perceivedlesser credibility perceived• WWhite hatshite hats – Individual security – Individual security

consultants, knowledgeable about black consultants, knowledgeable about black hatshats

• Consulting FirmsConsulting Firms– Part of ICT firms, – Part of ICT firms, good credentialsgood credentials

Page 26: C|EH Introduction

What do Ethical Hackers do?What do Ethical Hackers do?

An ethical hacker’s evaluation of a system’s An ethical hacker’s evaluation of a system’s security seeks answers to these basic questions: security seeks answers to these basic questions: • What can an intruder see on the target systems? What can an intruder see on the target systems? • What can an intruder do with that information? What can an intruder do with that information? • Does anyone at the target notice the intruder’s at Does anyone at the target notice the intruder’s at

tempts or successes? tempts or successes? • What are you trying to protect? What are you trying to protect? • What are you trying to protect against? What are you trying to protect against? • How much time, effort, and money are you How much time, effort, and money are you

willing to expend to obtain adequate protection? willing to expend to obtain adequate protection?

Page 27: C|EH Introduction

Required Skills of an Ethical Required Skills of an Ethical HackerHacker

Routers:Routers: knowledge of routers, routing protocols, and knowledge of routers, routing protocols, and access control listsaccess control lists

Windows:Windows: skills in operation, configuration and skills in operation, configuration and management.management.

Linux:Linux: knowledge of Linux/Unix; security setting, knowledge of Linux/Unix; security setting, configuration, and services.configuration, and services.

Firewalls & IDS & IPS:Firewalls & IDS & IPS: configurations, and operation configurations, and operation of IDS and IPS.of IDS and IPS.

MainframesMainframes Network Protocols:Network Protocols: TCP/IP; how they function and TCP/IP; how they function and

can be manipulated.can be manipulated. Project Management:Project Management: knowledge of leading, knowledge of leading,

planning, organizing, and controlling a penetration planning, organizing, and controlling a penetration testing team.testing team.

(Source: http://www.examcram.com)

Page 28: C|EH Introduction

Approaches to Ethical HackingApproaches to Ethical Hacking

Remote networkRemote network Remote dial-up networkRemote dial-up network Local networkLocal network Stolen EquipmentStolen Equipment Physical entryPhysical entry Social engineering Social engineering

(Source: http://www.examcram.com)

Page 29: C|EH Introduction

Anatomy of an attack:Anatomy of an attack:• ReconnaissanceReconnaissance – attacker gathers – attacker gathers

information; can include social engineering.information; can include social engineering.• ScanningScanning – searches for open ports (port – searches for open ports (port

scan) probes target for vulnerabilities.scan) probes target for vulnerabilities.• Gaining accessGaining access – attacker exploits – attacker exploits

vulnerabilities to get inside system; used for vulnerabilities to get inside system; used for spoofing IP.spoofing IP.

• Maintaining accessMaintaining access – creates backdoor – creates backdoor through use of Trojans; once attacker gains through use of Trojans; once attacker gains access makes sure he/she can get back in.access makes sure he/she can get back in.

• Covering tracksCovering tracks – deletes files, hides files, – deletes files, hides files, and erases log files. So that attacker cannot and erases log files. So that attacker cannot be detected or penalized. be detected or penalized.

(Source: www.eccouncil.org)

Page 30: C|EH Introduction

How Much Do Ethical Hackers How Much Do Ethical Hackers Get Paid?Get Paid?

Globally, the hiring of ethical hackers is on Globally, the hiring of ethical hackers is on the rise with most of them working with the rise with most of them working with top consulting firms. top consulting firms.

In the United States, an ethical hacker can In the United States, an ethical hacker can make upwards of $120,000 per annum. make upwards of $120,000 per annum.

Freelance ethical hackers can expect to Freelance ethical hackers can expect to make $10,000 per assignment. make $10,000 per assignment.

Some ranges from $15,000 to Some ranges from $15,000 to $45,000 for a standalone ethical $45,000 for a standalone ethical hack. hack.

Page 31: C|EH Introduction

Ec-Council: Certified Ethical Ec-Council: Certified Ethical HackerHacker

Page 32: C|EH Introduction

EC-COUNCILEC-COUNCIL

International council of electronic commerce International council of electronic commerce consultantsconsultants• Most successful and rapidly growing IT security and Most successful and rapidly growing IT security and

certification providerscertification providers• Standardized the concept of “Ethical Hacking”Standardized the concept of “Ethical Hacking”• EC-Council was the first to provide certification EC-Council was the first to provide certification

standards for these “Ethical Hackers”standards for these “Ethical Hackers”• EC-Council has trained more than 60,000 IT EC-Council has trained more than 60,000 IT

professionals, with over 20,000 earning a certificationprofessionals, with over 20,000 earning a certification

Page 33: C|EH Introduction

EC-Council has certified IT EC-Council has certified IT professionals from the following professionals from the following

organizations as CEH:organizations as CEH:

Novell, Canon, Hewlett Packard, US Air Force Novell, Canon, Hewlett Packard, US Air Force Reserve, US Embassy, Verizon, PFIZER, HDFC Reserve, US Embassy, Verizon, PFIZER, HDFC Bank, University of Memphis, Microsoft Bank, University of Memphis, Microsoft Corporation, Worldcom, Trusecure, US Department Corporation, Worldcom, Trusecure, US Department of Defense, Fedex, Dunlop, British Telecom, Cisco, of Defense, Fedex, Dunlop, British Telecom, Cisco, Supreme Court of the Philippines, United Nations, Supreme Court of the Philippines, United Nations, Ministry of Defense, UK, Nortel Networks, MCI, Ministry of Defense, UK, Nortel Networks, MCI, Check Point Software, KPMG, Fleet International, Check Point Software, KPMG, Fleet International, Cingular Wireless, Columbia Daily Tribune, Johnson Cingular Wireless, Columbia Daily Tribune, Johnson & Johnson, Marriott Hotel, Tucson Electric Power & Johnson, Marriott Hotel, Tucson Electric Power Company, Singapore Police Force Company, Singapore Police Force

Page 34: C|EH Introduction

PriceWaterhouseCoopers, SAP, Coca-Cola PriceWaterhouseCoopers, SAP, Coca-Cola Corporation, Quantum Research, US Military, IBM Corporation, Quantum Research, US Military, IBM Global Services, UPS, American Express, FBI, Global Services, UPS, American Express, FBI, Citibank Corporation, Boehringer Ingelheim, Citibank Corporation, Boehringer Ingelheim, Wipro, New York City Dept Of IT & Telecom – Wipro, New York City Dept Of IT & Telecom – DoITT, United States Marine Corps, Reserve Bank DoITT, United States Marine Corps, Reserve Bank of India, US Air Force, EDS, Bell Canada, SONY, of India, US Air Force, EDS, Bell Canada, SONY, Kodak, Ontario Provincial Police, Harris Kodak, Ontario Provincial Police, Harris Corporation, Xerox, Philips Electronics, U.S. Corporation, Xerox, Philips Electronics, U.S. Army, Schering, Accenture, Bank One, SAIC, Army, Schering, Accenture, Bank One, SAIC, Fujitsu, Deutsche BankFujitsu, Deutsche Bank

(Cont.)(Cont.)

Page 35: C|EH Introduction

Certified Ethical Hacker (C|EH) Certified Ethical Hacker (C|EH) TrainingTraining

EC-Council AcademyEC-Council Academy http://www.eccouncil.orghttp://www.eccouncil.org

• Five-dayFive-day CourseCourse• (C|EH)(C|EH) exam Code 312-50 exam Code 312-50• No. Of questions : 150No. Of questions : 150• Exam Duration : 4 hoursExam Duration : 4 hours• Passing Score : 70%Passing Score : 70%• Prometric and vuePrometric and vue

Page 36: C|EH Introduction

C|EH ModulesC|EH Modules

Page 37: C|EH Introduction

EC-CouncilEC-Council

Certified Ethical HackerCertified Ethical Hacker

www.eccouncil.org

ISBN 0-9729362-1-1

Page 38: C|EH Introduction

Ec-Council Topics CoveredEc-Council Topics Covered Introduction to Ethical HackingIntroduction to Ethical Hacking Hacking LawsHacking Laws Foot printingFoot printing Google hackingGoogle hacking ScanningScanning EnumerationEnumeration System HackingSystem Hacking Trojans and BackdoorsTrojans and Backdoors Viruses and wormsViruses and worms SniffersSniffers Social EngineeringSocial Engineering

Page 39: C|EH Introduction

Ec-Council (Cont.)Ec-Council (Cont.)

PhishingPhishing Hacking Email AccountsHacking Email Accounts Denial-of-serviceDenial-of-service Session HijackingSession Hijacking Hacking Web serversHacking Web servers Web Application vulnerabilitiesWeb Application vulnerabilities Web base password crackingWeb base password cracking Sql InjectionSql Injection Hacking wireless networksHacking wireless networks Physical SecurityPhysical Security

Page 40: C|EH Introduction

Ec-Council (Cont.)Ec-Council (Cont.)

Linux HackingLinux Hacking Evading IDS, Firewalls and detecting honey Evading IDS, Firewalls and detecting honey

potspots Buffer overflowsBuffer overflows CryptographyCryptography Penetration testingPenetration testing


Recommended