[ Certified Ethical Hacker v10 ] :: [ Module 5 ]

Glenn Norman hacking
This entry is part 7 of 21 in the series [ Certified Ethical Hacker Training ]

Module 5: Malware Malware for Evil and System Penetration Painful Computer Pranks: https://web.archive.org/web/20120820161357/http://www.hackpconline.com/2010/05/painfully-computer-pranks.html http://www.instructables.com/id/Computer-Shutdown-Prank-Windows/ http://www.zdnet.com/pictures/ten-epic-windows-7-pranks-you-absolutely-must-try/  

[ Certified Ethical Hacker v10 ] :: [ Module 4 ]

School for Hackers :: Red Glasses Girl
This entry is part 6 of 21 in the series [ Certified Ethical Hacker Training ]

Module 4: System Hacking (Exploitation) Cracking for Fun and System Penetration Hash-cracking communities: https://hashes.org/crackers.php Password dictionaries: https://wiki.skullsecurity.org/Passwords Kali supplies you with several wordlists and hash lists in /usr/share/. John the Ripper John can use Kali’s built-in wordlists: /usr/share/wordlists/rockyou.txt.gz etc. “How to crack passwords using john the ripper in kali linux” https://www.youtube.com/watch?v=eAn8dYdn1eY Exercises 1 Create a …

[ Certified Ethical Hacker v10 ] :: [ Module 3 Continued ]

School for Hackers :: Red Glasses Girl
This entry is part 5 of 21 in the series [ Certified Ethical Hacker Training ]

Module 3: Scanning and Enumeration continued Windows Enumeration NetBIOS: services, names and details nbtstat # nbtstat enumerates your current sessions. # It requires at least one switch. Remember -s or -S. nbtstat -s # Make nbtstat list addresses from a remote system: nbtstat -a <NetBIOS name or IP address> # Look into your own NetBIOS …

[ Certified Ethical Hacker v10 ] :: [ Module 3 ]

School for Hackers :: Red Glasses Girl
This entry is part 4 of 21 in the series [ Certified Ethical Hacker Training ]

Module 3: Scanning and Enumeration Stage 2 of a Hack: Scanning Pings and ping sweeps Port scanning traceroute Port scans Network scans Vulnerability scans TCP and UDP scans nmap nmap – https://nmap.org/, http://scanme.nmap.org/ nmap vs. scapy – https://blog.stalkr.net/2010/05/udp-scan-with-icmp-port-unreachable-and.html Videos on Nmap “Nmap Tutorial for Beginners – 1” https://www.youtube.com/watch?v=5MTZdN9TEO4 Note the switches: -A, -v –> Perform …

[ Certified Ethical Hacker v10 ] :: [ Modules 1 & 2 ]

School for Hackers :: Red Glasses Girl
This entry is part 3 of 21 in the series [ Certified Ethical Hacker Training ]

Introductions Short bios and description of experience Assessment test: https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/ceh-assessment/ Study Guide: Modules 1 and 2 Module 1: Introduction to Ethical Hacking Module 2: Stage 1 of a Hack: Footprinting / Reconnaisance “Phone book” information Employee names and info Company/facility info IP address ranges Job information Tools: Google: Advanced Search Operators https://duckduckgo.com/?q=google+advanced+search+operators&t=ffsb&ia=web http://www.googleguide.com/advanced_operators_reference.html The Google …

[ Certified Ethical Hacker v10 ] :: [ Syllabus ]

School for Hackers :: Red Glasses Girl
This entry is part 2 of 21 in the series [ Certified Ethical Hacker Training ]

 SYLLABUS Text: CEHv10 Study Guide, by Sean-Philip Oriyano (provided by UNM) The Hacker Playbook 3, by Peter Kim (optional and student-bought, but encouraged) Past texts: # Certified Ethical Hacker Exam Guide, Third Edition, by Matt Walker # CEH v9: Certified Ethical Hacker Version 9 Study Guide 3rd Edition, by Sean-Philip Oriyano Learning Objectives Gaining a …