[ Certified Ethical Hacker v10 ] :: [ Module 12 ] :: WiFi and Bluetooth

Image: Benjamin Caudill
This entry is part 14 of 21 in the series [ Certified Ethical Hacker Training ]

WiFi Basics SSID: the human-readable name of the network BSSID: the MAC address of the access point ESSID: the name of a network that spans multiple access points IVs: Initialization vectors, short string of bits that allow users to access the network with unique session keys PWR (as listed in airodump-ng) is a negative number …

[ How to Teach Hacker Highschool: Unit 1 ]

School for Hackers Red Glasses Girl
This entry is part 2 of 6 in the series [ How to Teach Hacker Highschool ]

This is post 1 of 5 in the series “[ How to Teach Hacker Highschool ]” We’re getting started with this course for teachers, which brings together a lot of material I generated while working as Project Manager for the Hacker Highschool v2 Rewrite Project, 2012-2016. This session discusses some of the issues you may …

[ Certified Ethical Hacker v10 ] :: [ Module 7 ]

School for Hackers :: Red Glasses Girl
This entry is part 9 of 21 in the series [ Certified Ethical Hacker Training ]

Module 7: Social Engineering Social engineering falls into the category of non-technical attacks. For the purposes of the CEH test, remember the usual lists. Tactics: exploiting moral obligation, abusing trust, making threats, offering something for nothing, and taking advantage of ignorance. Impacts: financial loss, terrorism, privacy loss, legal problems, loss of goodwill, outright business collapse. …

[ Certified Ethical Hacker v10 ] :: [ Module 4 ]

School for Hackers :: Red Glasses Girl
This entry is part 6 of 21 in the series [ Certified Ethical Hacker Training ]

Module 4: System Hacking (Exploitation) Cracking for Fun and System Penetration Hash-cracking communities: https://hashes.org/crackers.php Password dictionaries: https://wiki.skullsecurity.org/Passwords Kali supplies you with several wordlists and hash lists in /usr/share/. John the Ripper John can use Kali’s built-in wordlists: /usr/share/wordlists/rockyou.txt.gz etc. “How to crack passwords using john the ripper in kali linux” https://www.youtube.com/watch?v=eAn8dYdn1eY Exercises 1 Create a …

[ Certified Ethical Hacker v10 ] :: [ Module 3 ]

School for Hackers :: Red Glasses Girl
This entry is part 4 of 21 in the series [ Certified Ethical Hacker Training ]

Module 3: Scanning and Enumeration Stage 2 of a Hack: Scanning Pings and ping sweeps Port scanning traceroute Port scans Network scans Vulnerability scans TCP and UDP scans nmap nmap – https://nmap.org/, http://scanme.nmap.org/ nmap vs. scapy – https://blog.stalkr.net/2010/05/udp-scan-with-icmp-port-unreachable-and.html Videos on Nmap “Nmap Tutorial for Beginners – 1” https://www.youtube.com/watch?v=5MTZdN9TEO4 Note the switches: -A, -v –> Perform …