[ Certified Ethical Hacker v10 ] :: [ Module 4 ]

School for Hackers :: Red Glasses Girl
This entry is part 6 of 21 in the series [ Certified Ethical Hacker Training ]

Module 4: System Hacking (Exploitation) Cracking for Fun and System Penetration Hash-cracking communities: https://hashes.org/crackers.php Password dictionaries: https://wiki.skullsecurity.org/Passwords Kali supplies you with several wordlists and hash lists in /usr/share/. John the Ripper John can use Kali’s built-in wordlists: /usr/share/wordlists/rockyou.txt.gz etc. “How to crack passwords using john the ripper in kali linux” https://www.youtube.com/watch?v=eAn8dYdn1eY Exercises 1 Create a …

[ Certified Ethical Hacker v10 ] :: [ Module 3 Continued ]

School for Hackers :: Red Glasses Girl
This entry is part 5 of 21 in the series [ Certified Ethical Hacker Training ]

Module 3: Scanning and Enumeration continued Windows Enumeration NetBIOS: services, names and details nbtstat # nbtstat enumerates your current sessions. # It requires at least one switch. Remember -s or -S. nbtstat -s # Make nbtstat list addresses from a remote system: nbtstat -a <NetBIOS name or IP address> # Look into your own NetBIOS …

[ Certified Ethical Hacker v10 ] :: [ Module 3 ]

School for Hackers :: Red Glasses Girl
This entry is part 4 of 21 in the series [ Certified Ethical Hacker Training ]

Module 3: Scanning and Enumeration Stage 2 of a Hack: Scanning Pings and ping sweeps Port scanning traceroute Port scans Network scans Vulnerability scans TCP and UDP scans nmap nmap – https://nmap.org/, http://scanme.nmap.org/ nmap vs. scapy – https://blog.stalkr.net/2010/05/udp-scan-with-icmp-port-unreachable-and.html Videos on Nmap “Nmap Tutorial for Beginners – 1” https://www.youtube.com/watch?v=5MTZdN9TEO4 Note the switches: -A, -v –> Perform …

[ Certified Ethical Hacker v10 ] :: [ Modules 1 & 2 ]

School for Hackers :: Red Glasses Girl
This entry is part 3 of 21 in the series [ Certified Ethical Hacker Training ]

Introductions Short bios and description of experience Assessment test: https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/ceh-assessment/ Study Guide: Modules 1 and 2 Module 1: Introduction to Ethical Hacking Module 2: Stage 1 of a Hack: Footprinting / Reconnaisance “Phone book” information Employee names and info Company/facility info IP address ranges Job information Tools: Google: Advanced Search Operators https://duckduckgo.com/?q=google+advanced+search+operators&t=ffsb&ia=web http://www.googleguide.com/advanced_operators_reference.html The Google …

[ Certified Ethical Hacker v10 ] :: [ Syllabus ]

School for Hackers :: Red Glasses Girl
This entry is part 2 of 21 in the series [ Certified Ethical Hacker Training ]

 SYLLABUS Text: CEHv10 Study Guide, by Sean-Philip Oriyano (provided by UNM) The Hacker Playbook 3, by Peter Kim (optional and student-bought, but encouraged) Past texts: # Certified Ethical Hacker Exam Guide, Third Edition, by Matt Walker # CEH v9: Certified Ethical Hacker Version 9 Study Guide 3rd Edition, by Sean-Philip Oriyano Learning Objectives Gaining a …

[ Review ] :: EC-Council’s iLabs Platform

Glenn Norman
This entry is part 19 of 21 in the series [ Certified Ethical Hacker Training ]

I’ve been trying to bring “hacker” training to UNM for over ten years without much success. Only in the past two semesters have I been able to run an Ethical Hacking class based on the CEH, but where my past efforts didn’t bring students, the CEH did. Red Team work has long interested me, likely …