[ Certified Ethical Hacker v10 ] :: [ Module 4 ]

School for Hackers :: Red Glasses Girl
This entry is part 6 of 21 in the series [ Certified Ethical Hacker Training ]

Module 4: System Hacking (Exploitation) Cracking for Fun and System Penetration Hash-cracking communities: https://hashes.org/crackers.php Password dictionaries: https://wiki.skullsecurity.org/Passwords Kali supplies you with several wordlists and hash lists in /usr/share/. John the Ripper John can use Kali’s built-in wordlists: /usr/share/wordlists/rockyou.txt.gz etc. “How to crack passwords using john the ripper in kali linux” https://www.youtube.com/watch?v=eAn8dYdn1eY Exercises 1 Create a …

[ Certified Ethical Hacker v10 ] :: [ Module 3 Continued ]

School for Hackers :: Red Glasses Girl
This entry is part 5 of 21 in the series [ Certified Ethical Hacker Training ]

Module 3: Scanning and Enumeration continued Windows Enumeration NetBIOS: services, names and details nbtstat # nbtstat enumerates your current sessions. # It requires at least one switch. Remember -s or -S. nbtstat -s # Make nbtstat list addresses from a remote system: nbtstat -a <NetBIOS name or IP address> # Look into your own NetBIOS …

[ Certified Ethical Hacker v10 ] :: [ Module 3 ]

School for Hackers :: Red Glasses Girl
This entry is part 4 of 21 in the series [ Certified Ethical Hacker Training ]

Module 3: Scanning and Enumeration Stage 2 of a Hack: Scanning Pings and ping sweeps Port scanning traceroute Port scans Network scans Vulnerability scans TCP and UDP scans nmap nmap – https://nmap.org/, http://scanme.nmap.org/ nmap vs. scapy – https://blog.stalkr.net/2010/05/udp-scan-with-icmp-port-unreachable-and.html Videos on Nmap “Nmap Tutorial for Beginners – 1” https://www.youtube.com/watch?v=5MTZdN9TEO4 Note the switches: -A, -v –> Perform …

[ Review ] :: EC-Council’s iLabs Platform

Glenn Norman
This entry is part 19 of 21 in the series [ Certified Ethical Hacker Training ]

I’ve been trying to bring “hacker” training to UNM for over ten years without much success. Only in the past two semesters have I been able to run an Ethical Hacking class based on the CEH, but where my past efforts didn’t bring students, the CEH did. Red Team work has long interested me, likely …