SlideShare a Scribd company logo
1 of 4
Download to read offline
Ethical Hacking and
Countermeasures
Lab Manual
Ethical Hacking and Countermeasures

Exam 312-50 Certified Ethical Hacker

EC-Council
C o p y rig h t © 2 0 1 3 b y E C - C o u 11cil. A ll rights reserved. E x c e p t as p e rm itte d u n d e r th e C o p y rig h t A c t
o f 1976, n o p a rt o f this p u b lic a tio n m a y be re p ro d u c e d o r d is trib u te d
o r stored

111

111

a n y fo r m o r b y a n y m eans,

a database o r re trie v a l system , w ith o u t th e p r io r w r itte n p e rm is s io n o f th e p u b lis h e r,

w ith th e e x c e p tio n th a t th e p ro g ra m listings m a y be e n te re d , sto red , an d execu ted

111

a c o m p u te r

system , b u t th e y m a y n o t be re p ro d u c e d fo r p u b lic a tio n .
In fo r m a tio n has b een o b ta in e d b y E C - C o u n c il fr o m sources b e lie v e d to be reliab le. E C -C o u n c il
uses reasonable en deavo rs to ensure th a t th e c o n te n t is c u rre n t an d accurate, h o w e v e r, because o f
th e p o ss ib ility o t h u m a n o r m e c h a n ic a l e rro r w e d o n o t g uarantee th e accuracy, adequacy, o r
co m p leten ess o t an y in fo rm a tio n and are n o t resp o nsib le fo r an y e rrors o r om issions o r the accuracy
o f th e results o b ta in e d fr o m use o f such in fo rm a tio n .
T h e co ursew are is a resu lt o f extensive research an d c o n trib u tio n s fr o m subject m a tte r experts fr o m
th e fie ld fr o m all o v e r the w o rld . D u e credits fo r all such c o n trib u tio n s and references are g iv e n in
th e

co ursew are

in

th e

research

en d n o tes. W e

are

c o m m itte d

to w a rd s

p ro te c tin g

in te lle c m a l

p ro p e rty . I t y o u are a c o p y rig h t o w n e r (an exclusive licensee o r th e ir a g ent), an d i f y o u believe
th a t an y p a rt o f the co ursew are co nstitu tes an in frin g e m e n t o f c o p y rig h t, o r a b reach o f an agreed
licence o r c o n tra c t, y o u m a y n o tiiy us at le g a l@ e c c o u n c il.o rg .
E C -C o u n c il w ill re m o v e th e m a te ria l

111

111

th e e v e n t o f a ju s tifie d c o m p la in t,

q u e s tio n an d m a k e necessary re c tific a tio n s .

T h e co ursew are m a y c o n ta in referen ces to o th e r in fo rm a tio n resources an d security so lu tion s, b u t
such referen ces sh ould n o t be co n sid ered as an e n d o rs e m e n t o f

01‫ ־‬re c o m m e n d a tio n

b y E C -C o u n c il.

R eaders

an d

to

are

en cou rag ed

to

re p o rt

errors,

om issions

inaccuracies

at le g a l@ e c c o u n c il.o rg .
I f y o u h ave an y issues, please co n ta c t s u p p o rt@ e c c o u n c il.o rg .

Ethical Hacking and Countermeasures
All Rights Reserved. Reproduc

E C -C o u n c il
Ethical Hacking and Countermeasures

Exam 312-50 Certified Ethical Hacker

T a b l e of C o n t e n t s
M odule N tim b er

M odule N am e

Page N o .

01

In tro d u ctio n to E th ic a l H a ck in g

—

02

Fo o tp rin tin g and Reconnaissance

01

03

Scann ing N etw orks

84

04

En u m eratio n

266

05

System H ack in g

307

06

T ro jan s and Backdoors

424

07

V iruses and W orm s

529

08

Sn iffin g

584

09

So cial En g in e e rin g

674

10

D e n ia l o f Service

702

11

Session H ija ck in g

715

12

H a ck in g W ebservers

730

13

H ack in g W eb A p p licatio n s

761

14

S Q L In je ctio n

781

15

H a ck in g W ireless N etw orks

818

16

H a ck in g M o b ile Platform s

—

17

E va d in g ID S , Fire w a lls, and H oneypots

846

18

B u ffe r O verflow

901

19

C ryptography

914

20

Pen etratio n T estin g

—

Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures

Exam 312-50 Certified Ethical Hacker

L a b s D V D

DVD

C o n t e n t s

C o n te n ts

01

Lab Prerequisites, Module 02 - Module 04

02

Module 05 - Module 07

03

Module 08 - Module 11

04

Module 12 - Module 14

05

Module 15 - Module 17

06

Module 18 - M odule 20, BackTrack

Ethical Hacking and Countermeasures Copyright © by EC-C0UIICil
All Rights Reserved. Reproduction is Strictly Prohibited.

More Related Content

Viewers also liked

Ceh v8 labs module 14 sql injection
Ceh v8 labs module 14 sql injectionCeh v8 labs module 14 sql injection
Ceh v8 labs module 14 sql injectionMehrdad Jingoism
 
Ceh v8 labs module 02 footprinting and reconnaissance
Ceh v8 labs module 02 footprinting and reconnaissanceCeh v8 labs module 02 footprinting and reconnaissance
Ceh v8 labs module 02 footprinting and reconnaissanceMehrdad Jingoism
 
Ceh v8 labs module 12 hacking webservers
Ceh v8 labs module 12 hacking webserversCeh v8 labs module 12 hacking webservers
Ceh v8 labs module 12 hacking webserversMehrdad Jingoism
 
Ceh v8 labs module 06 trojans and backdoors
Ceh v8 labs module 06 trojans and backdoorsCeh v8 labs module 06 trojans and backdoors
Ceh v8 labs module 06 trojans and backdoorsMehrdad Jingoism
 
Ceh v8 labs module 04 enumeration
Ceh v8 labs module 04 enumerationCeh v8 labs module 04 enumeration
Ceh v8 labs module 04 enumerationMehrdad Jingoism
 
Ceh v8 labs module 18 buffer overflow
Ceh v8 labs module 18 buffer overflowCeh v8 labs module 18 buffer overflow
Ceh v8 labs module 18 buffer overflowMehrdad Jingoism
 
High Speed Parameter Estimation for a Homogenized Energy Model- Doctoral Defe...
High Speed Parameter Estimation for a Homogenized Energy Model- Doctoral Defe...High Speed Parameter Estimation for a Homogenized Energy Model- Doctoral Defe...
High Speed Parameter Estimation for a Homogenized Energy Model- Doctoral Defe...Jon Ernstberger
 
Ceh v8 labs module 17 evading ids, firewalls and honeypots
Ceh v8 labs module 17 evading ids, firewalls and honeypotsCeh v8 labs module 17 evading ids, firewalls and honeypots
Ceh v8 labs module 17 evading ids, firewalls and honeypotsMehrdad Jingoism
 
Ceh v8 labs module 05 system hacking
Ceh v8 labs module 05 system hackingCeh v8 labs module 05 system hacking
Ceh v8 labs module 05 system hackingMehrdad Jingoism
 
Ceh v8 labs module 13 hacking web applications
Ceh v8 labs module 13 hacking web applicationsCeh v8 labs module 13 hacking web applications
Ceh v8 labs module 13 hacking web applicationsMehrdad Jingoism
 
Ceh v8 labs module 07 viruses and worms
Ceh v8 labs module 07 viruses and wormsCeh v8 labs module 07 viruses and worms
Ceh v8 labs module 07 viruses and wormsMehrdad Jingoism
 

Viewers also liked (14)

Ce hv8 module 00
Ce hv8 module 00Ce hv8 module 00
Ce hv8 module 00
 
Ceh v8 labs module 14 sql injection
Ceh v8 labs module 14 sql injectionCeh v8 labs module 14 sql injection
Ceh v8 labs module 14 sql injection
 
Ceh v8 labs module 02 footprinting and reconnaissance
Ceh v8 labs module 02 footprinting and reconnaissanceCeh v8 labs module 02 footprinting and reconnaissance
Ceh v8 labs module 02 footprinting and reconnaissance
 
Ceh v8 labs module 12 hacking webservers
Ceh v8 labs module 12 hacking webserversCeh v8 labs module 12 hacking webservers
Ceh v8 labs module 12 hacking webservers
 
Ceh v8 labs module 06 trojans and backdoors
Ceh v8 labs module 06 trojans and backdoorsCeh v8 labs module 06 trojans and backdoors
Ceh v8 labs module 06 trojans and backdoors
 
Ceh v8 labs module 04 enumeration
Ceh v8 labs module 04 enumerationCeh v8 labs module 04 enumeration
Ceh v8 labs module 04 enumeration
 
Ceh v8 labs module 18 buffer overflow
Ceh v8 labs module 18 buffer overflowCeh v8 labs module 18 buffer overflow
Ceh v8 labs module 18 buffer overflow
 
Proyecto manhattan
Proyecto manhattanProyecto manhattan
Proyecto manhattan
 
High Speed Parameter Estimation for a Homogenized Energy Model- Doctoral Defe...
High Speed Parameter Estimation for a Homogenized Energy Model- Doctoral Defe...High Speed Parameter Estimation for a Homogenized Energy Model- Doctoral Defe...
High Speed Parameter Estimation for a Homogenized Energy Model- Doctoral Defe...
 
Ceh v8 labs module 17 evading ids, firewalls and honeypots
Ceh v8 labs module 17 evading ids, firewalls and honeypotsCeh v8 labs module 17 evading ids, firewalls and honeypots
Ceh v8 labs module 17 evading ids, firewalls and honeypots
 
Ceh v8 labs module 05 system hacking
Ceh v8 labs module 05 system hackingCeh v8 labs module 05 system hacking
Ceh v8 labs module 05 system hacking
 
Legacy Project
Legacy ProjectLegacy Project
Legacy Project
 
Ceh v8 labs module 13 hacking web applications
Ceh v8 labs module 13 hacking web applicationsCeh v8 labs module 13 hacking web applications
Ceh v8 labs module 13 hacking web applications
 
Ceh v8 labs module 07 viruses and worms
Ceh v8 labs module 07 viruses and wormsCeh v8 labs module 07 viruses and worms
Ceh v8 labs module 07 viruses and worms
 

Similar to EC-312 Ethical Hacking Lab Manual

4th OpenAIRE Workshop, Nils Dietrich
4th OpenAIRE Workshop, Nils Dietrich4th OpenAIRE Workshop, Nils Dietrich
4th OpenAIRE Workshop, Nils DietrichOpenAIRE
 
Jm future of system verilog verification
Jm future of system verilog verificationJm future of system verilog verification
Jm future of system verilog verificationObsidian Software
 
Congresso Crimes Eletrônicos, 08/03/2009 - Apresentação Ghassan Dreibi
Congresso Crimes Eletrônicos, 08/03/2009 - Apresentação Ghassan DreibiCongresso Crimes Eletrônicos, 08/03/2009 - Apresentação Ghassan Dreibi
Congresso Crimes Eletrônicos, 08/03/2009 - Apresentação Ghassan DreibiFecomercioSP
 
Customer_Testimonial_IFFCO.pdf
Customer_Testimonial_IFFCO.pdfCustomer_Testimonial_IFFCO.pdf
Customer_Testimonial_IFFCO.pdfPRASHANTJUNNARKAR
 
Lodestar Investor Presentation V4.pdf
Lodestar Investor Presentation V4.pdfLodestar Investor Presentation V4.pdf
Lodestar Investor Presentation V4.pdfAdnet Communications
 
Hacking web applications CEHv8 module 13
Hacking web applications CEHv8 module 13Hacking web applications CEHv8 module 13
Hacking web applications CEHv8 module 13Wise Person
 
Ceh v8 labs module 11 session hijacking
Ceh v8 labs module 11 session hijackingCeh v8 labs module 11 session hijacking
Ceh v8 labs module 11 session hijackingAsep Sopyan
 
Supervising management board culture, by Kroese brands & behaviour
Supervising management board culture, by Kroese brands & behaviourSupervising management board culture, by Kroese brands & behaviour
Supervising management board culture, by Kroese brands & behaviourKroese brands & behaviour
 
ISTE 2012 - Digital Citizenship and MyBigCampus
ISTE 2012 - Digital Citizenship and MyBigCampusISTE 2012 - Digital Citizenship and MyBigCampus
ISTE 2012 - Digital Citizenship and MyBigCampusStaci Trekles
 
Kostogryzov-for china-2013
 Kostogryzov-for china-2013 Kostogryzov-for china-2013
Kostogryzov-for china-2013Mathmodels Net
 
Maurizio_Taffone_Emerging_Security_Threats
Maurizio_Taffone_Emerging_Security_ThreatsMaurizio_Taffone_Emerging_Security_Threats
Maurizio_Taffone_Emerging_Security_ThreatsMaurizio Taffone
 
A Deep Dive into the Socio-Technical Aspects of Delays in Security Patching
A Deep Dive into the Socio-Technical Aspects of Delays in Security PatchingA Deep Dive into the Socio-Technical Aspects of Delays in Security Patching
A Deep Dive into the Socio-Technical Aspects of Delays in Security PatchingCREST @ University of Adelaide
 
Mixing it up: Developing and implementing a tagging system for a content-rich...
Mixing it up: Developing and implementing a tagging system for a content-rich...Mixing it up: Developing and implementing a tagging system for a content-rich...
Mixing it up: Developing and implementing a tagging system for a content-rich...Andrew Lewis
 
Skyals Manifest Your Dreams
Skyals Manifest Your DreamsSkyals Manifest Your Dreams
Skyals Manifest Your DreamsSheenaAhuja
 
Introduction to Energy Efficiency, EMS and Energy Audit
Introduction to Energy Efficiency, EMS and Energy AuditIntroduction to Energy Efficiency, EMS and Energy Audit
Introduction to Energy Efficiency, EMS and Energy Auditeecfncci
 
Patient Diary by Abhinandan Sandhu
Patient Diary by Abhinandan SandhuPatient Diary by Abhinandan Sandhu
Patient Diary by Abhinandan Sandhuabhigill
 
HOW TO TOKENIZE: PROCESS, POSSIBILITIES AND CHALLENGES
HOW TO TOKENIZE: PROCESS, POSSIBILITIES AND CHALLENGESHOW TO TOKENIZE: PROCESS, POSSIBILITIES AND CHALLENGES
HOW TO TOKENIZE: PROCESS, POSSIBILITIES AND CHALLENGESLiveplex
 
Immigration Compliance: How to keep the Government from knocking on the Door?
Immigration Compliance: How to keep the Government from knocking on the Door?Immigration Compliance: How to keep the Government from knocking on the Door?
Immigration Compliance: How to keep the Government from knocking on the Door?jvelie
 

Similar to EC-312 Ethical Hacking Lab Manual (20)

4th OpenAIRE Workshop, Nils Dietrich
4th OpenAIRE Workshop, Nils Dietrich4th OpenAIRE Workshop, Nils Dietrich
4th OpenAIRE Workshop, Nils Dietrich
 
Jm future of system verilog verification
Jm future of system verilog verificationJm future of system verilog verification
Jm future of system verilog verification
 
Safe To Play Whitepaper
Safe To  Play WhitepaperSafe To  Play Whitepaper
Safe To Play Whitepaper
 
Congresso Crimes Eletrônicos, 08/03/2009 - Apresentação Ghassan Dreibi
Congresso Crimes Eletrônicos, 08/03/2009 - Apresentação Ghassan DreibiCongresso Crimes Eletrônicos, 08/03/2009 - Apresentação Ghassan Dreibi
Congresso Crimes Eletrônicos, 08/03/2009 - Apresentação Ghassan Dreibi
 
Customer_Testimonial_IFFCO.pdf
Customer_Testimonial_IFFCO.pdfCustomer_Testimonial_IFFCO.pdf
Customer_Testimonial_IFFCO.pdf
 
Lodestar Investor Presentation V4.pdf
Lodestar Investor Presentation V4.pdfLodestar Investor Presentation V4.pdf
Lodestar Investor Presentation V4.pdf
 
Hacking web applications CEHv8 module 13
Hacking web applications CEHv8 module 13Hacking web applications CEHv8 module 13
Hacking web applications CEHv8 module 13
 
Ceh v8 labs module 11 session hijacking
Ceh v8 labs module 11 session hijackingCeh v8 labs module 11 session hijacking
Ceh v8 labs module 11 session hijacking
 
Supervising management board culture, by Kroese brands & behaviour
Supervising management board culture, by Kroese brands & behaviourSupervising management board culture, by Kroese brands & behaviour
Supervising management board culture, by Kroese brands & behaviour
 
Research and Development in Roof-Top Solar Potentiality Using LiDAR Technology
Research and Development in Roof-Top Solar Potentiality Using LiDAR TechnologyResearch and Development in Roof-Top Solar Potentiality Using LiDAR Technology
Research and Development in Roof-Top Solar Potentiality Using LiDAR Technology
 
ISTE 2012 - Digital Citizenship and MyBigCampus
ISTE 2012 - Digital Citizenship and MyBigCampusISTE 2012 - Digital Citizenship and MyBigCampus
ISTE 2012 - Digital Citizenship and MyBigCampus
 
Kostogryzov-for china-2013
 Kostogryzov-for china-2013 Kostogryzov-for china-2013
Kostogryzov-for china-2013
 
Maurizio_Taffone_Emerging_Security_Threats
Maurizio_Taffone_Emerging_Security_ThreatsMaurizio_Taffone_Emerging_Security_Threats
Maurizio_Taffone_Emerging_Security_Threats
 
A Deep Dive into the Socio-Technical Aspects of Delays in Security Patching
A Deep Dive into the Socio-Technical Aspects of Delays in Security PatchingA Deep Dive into the Socio-Technical Aspects of Delays in Security Patching
A Deep Dive into the Socio-Technical Aspects of Delays in Security Patching
 
Mixing it up: Developing and implementing a tagging system for a content-rich...
Mixing it up: Developing and implementing a tagging system for a content-rich...Mixing it up: Developing and implementing a tagging system for a content-rich...
Mixing it up: Developing and implementing a tagging system for a content-rich...
 
Skyals Manifest Your Dreams
Skyals Manifest Your DreamsSkyals Manifest Your Dreams
Skyals Manifest Your Dreams
 
Introduction to Energy Efficiency, EMS and Energy Audit
Introduction to Energy Efficiency, EMS and Energy AuditIntroduction to Energy Efficiency, EMS and Energy Audit
Introduction to Energy Efficiency, EMS and Energy Audit
 
Patient Diary by Abhinandan Sandhu
Patient Diary by Abhinandan SandhuPatient Diary by Abhinandan Sandhu
Patient Diary by Abhinandan Sandhu
 
HOW TO TOKENIZE: PROCESS, POSSIBILITIES AND CHALLENGES
HOW TO TOKENIZE: PROCESS, POSSIBILITIES AND CHALLENGESHOW TO TOKENIZE: PROCESS, POSSIBILITIES AND CHALLENGES
HOW TO TOKENIZE: PROCESS, POSSIBILITIES AND CHALLENGES
 
Immigration Compliance: How to keep the Government from knocking on the Door?
Immigration Compliance: How to keep the Government from knocking on the Door?Immigration Compliance: How to keep the Government from knocking on the Door?
Immigration Compliance: How to keep the Government from knocking on the Door?
 

Recently uploaded

mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 

Recently uploaded (20)

mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 

EC-312 Ethical Hacking Lab Manual

  • 2. Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker EC-Council C o p y rig h t © 2 0 1 3 b y E C - C o u 11cil. A ll rights reserved. E x c e p t as p e rm itte d u n d e r th e C o p y rig h t A c t o f 1976, n o p a rt o f this p u b lic a tio n m a y be re p ro d u c e d o r d is trib u te d o r stored 111 111 a n y fo r m o r b y a n y m eans, a database o r re trie v a l system , w ith o u t th e p r io r w r itte n p e rm is s io n o f th e p u b lis h e r, w ith th e e x c e p tio n th a t th e p ro g ra m listings m a y be e n te re d , sto red , an d execu ted 111 a c o m p u te r system , b u t th e y m a y n o t be re p ro d u c e d fo r p u b lic a tio n . In fo r m a tio n has b een o b ta in e d b y E C - C o u n c il fr o m sources b e lie v e d to be reliab le. E C -C o u n c il uses reasonable en deavo rs to ensure th a t th e c o n te n t is c u rre n t an d accurate, h o w e v e r, because o f th e p o ss ib ility o t h u m a n o r m e c h a n ic a l e rro r w e d o n o t g uarantee th e accuracy, adequacy, o r co m p leten ess o t an y in fo rm a tio n and are n o t resp o nsib le fo r an y e rrors o r om issions o r the accuracy o f th e results o b ta in e d fr o m use o f such in fo rm a tio n . T h e co ursew are is a resu lt o f extensive research an d c o n trib u tio n s fr o m subject m a tte r experts fr o m th e fie ld fr o m all o v e r the w o rld . D u e credits fo r all such c o n trib u tio n s and references are g iv e n in th e co ursew are in th e research en d n o tes. W e are c o m m itte d to w a rd s p ro te c tin g in te lle c m a l p ro p e rty . I t y o u are a c o p y rig h t o w n e r (an exclusive licensee o r th e ir a g ent), an d i f y o u believe th a t an y p a rt o f the co ursew are co nstitu tes an in frin g e m e n t o f c o p y rig h t, o r a b reach o f an agreed licence o r c o n tra c t, y o u m a y n o tiiy us at le g a l@ e c c o u n c il.o rg . E C -C o u n c il w ill re m o v e th e m a te ria l 111 111 th e e v e n t o f a ju s tifie d c o m p la in t, q u e s tio n an d m a k e necessary re c tific a tio n s . T h e co ursew are m a y c o n ta in referen ces to o th e r in fo rm a tio n resources an d security so lu tion s, b u t such referen ces sh ould n o t be co n sid ered as an e n d o rs e m e n t o f 01‫ ־‬re c o m m e n d a tio n b y E C -C o u n c il. R eaders an d to are en cou rag ed to re p o rt errors, om issions inaccuracies at le g a l@ e c c o u n c il.o rg . I f y o u h ave an y issues, please co n ta c t s u p p o rt@ e c c o u n c il.o rg . Ethical Hacking and Countermeasures All Rights Reserved. Reproduc E C -C o u n c il
  • 3. Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker T a b l e of C o n t e n t s M odule N tim b er M odule N am e Page N o . 01 In tro d u ctio n to E th ic a l H a ck in g — 02 Fo o tp rin tin g and Reconnaissance 01 03 Scann ing N etw orks 84 04 En u m eratio n 266 05 System H ack in g 307 06 T ro jan s and Backdoors 424 07 V iruses and W orm s 529 08 Sn iffin g 584 09 So cial En g in e e rin g 674 10 D e n ia l o f Service 702 11 Session H ija ck in g 715 12 H a ck in g W ebservers 730 13 H ack in g W eb A p p licatio n s 761 14 S Q L In je ctio n 781 15 H a ck in g W ireless N etw orks 818 16 H a ck in g M o b ile Platform s — 17 E va d in g ID S , Fire w a lls, and H oneypots 846 18 B u ffe r O verflow 901 19 C ryptography 914 20 Pen etratio n T estin g — Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 4. Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker L a b s D V D DVD C o n t e n t s C o n te n ts 01 Lab Prerequisites, Module 02 - Module 04 02 Module 05 - Module 07 03 Module 08 - Module 11 04 Module 12 - Module 14 05 Module 15 - Module 17 06 Module 18 - M odule 20, BackTrack Ethical Hacking and Countermeasures Copyright © by EC-C0UIICil All Rights Reserved. Reproduction is Strictly Prohibited.