Ec Council – Certified Ehical Hacker – CEH v10 – ilabs Complete


Module 02 – Footprinting and Reconnaissance

The objective of the lab is to extract information about the target organization that includes, but is not limited to:

  • Internet Protocol (IP) address and IP range associated with the target
  • Purpose of organization and why it exists
  • Size of the organization
  • Class of its IP block
  • People and contacts at the target
  • Types of operating systems (OS) and network topology in use
  • Type of firewall implemented, either hardware or software or combination
  • Type of remote access used, either SSH or VPN

Module 03 – Scanning Networks

The objective of this lab is to help students in conducting network scanning, port scanning, analyzing the network vulnerabilities, and so on.
You need to perform a network scan to:

  • Check live systems and open ports
  • Perform banner grabbing and OS fingerprinting
  • Identify network vulnerabilities
  • Draw network diagrams of vulnerable hosts

Module 04 – Enumeration

The objective of this lab is to provide expert knowledge on network enumeration and other responsibilities that include:

  • User name and user groups
  • Lists of computers, their operating systems, and ports
  • Machine names, network resources, and services
  • Lists of shares on individual hosts on the network
  • Policies and passwords

Module 05 – Vulnerability Analysis

The objective of this lab is to help students in conducting vulnerability scanning, analyzing the network vulnerabilities, and so on.
You need to perform a network scan to:

  • Check live systems and open ports
  • Perform banner grabbing and OS fingerprinting
  • Identify network vulnerabilities
  • Draw network diagrams of vulnerable hosts

Module 06 – System Hacking

The goal of system hacking is to gain access, escalate privileges, execute applications, and hide files.
The objective of this lab is to help students learn to monitor a system remotely and to extract hidden files and other tasks that include:

  • Extracting administrative passwords
  • Hiding files and extracting hidden files
  • Recovering passwords
  • Monitoring a system remotely

Module 07 – Malware Threats

The objective of this lab includes:

  • Creating and using different types of malware, such as Trojans, Viruses, and Worms, and exploiting a target machine as proof of concept
  • Detecting malware

Module 08 – Sniffing

The objective of this lab is to make students learn to sniff a network and analyze packets for any attacks on the network.
The primary objectives of this lab are to:

  • Sniff the network
  • Analyze incoming and outgoing packets
  • Troubleshoot the network for performance
  • Secure the network from attacks

Module 09 – Social Engineering

The objective of this lab is to:

  • Perform Credential Harvesting

Module 10 – Denial-of-Service

The objective of this lab is to help students learn to perform Denial of Service attacks and test a network for DoS flaws.
In this lab, you will:

  • Perform a DoS attack by sending a large number of SYN packets continuously
  • Perform a HTTP flooding attack
  • Perform a DDoS attack
  • Detect and analyze DoS attack traffic

Module 11 – Session Hijacking

The objective of this lab is to help students learn session hijacking and take over a user account.
In this lab, you will:

  • Intercept the Traffic between server and client
  • Attain a user session by intercepting the traffic
  • Perform ARP Poisoning using Cain & Abel
  • Modify Cookies and Hijack a session using Firebug

Module 12 – Evading IDS Firewalls and Honeypots

The objective of this lab is to help students learn and detect intrusions in a network, log, and view all log files.
In this lab, you will learn how to:

  • Install and configure Snort IDS
  • Detect Intruders using HoneyBot
  • Bypassing Windows Firewall Using Nmap
  • Bypassing Firewall Rules Using HTTP/FTP Tunneling
  • Bypassing Windows Firewall using Metasploit

Module 13 – Hacking Web Servers

The objective of this lab is to help students learn to detect unpatched security flaws, verbose error messages, and much more.
The objective of this lab is to:

  • Perform Web Server Security Reconnaissance
  • Detect unpatched security flaws like Shellshock bug
  • Crack remote passwords

Module 14 – Hacking Web Applications

The objective of this lab is to provide expert knowledge of web application vulnerabilities and attacks, such as:

  • Parameter tampering
  • Cross-Site Scripting (XSS)
  • Stored XSS
  • Username and Password Enumeration
  • Exploiting WordPress Plugin Vulnerabilities
  • Exploiting Remote Command Execution Vulnerability
  • Web Application Auditing Framework
  • Website Vulnerability Scanning

Module 15 – SQL Injection

The objective of this lab is to provide expert knowledge on SQL Injection attacks and other responsibilities that include:

  • Understanding when and how web application connects to a database server in order to access data
  • Extracting basic SQL Injection flaws and vulnerabilities
  • Testing web applications for Blind SQL Injection vulnerabilities
  • Scanning web servers and analyzing the reports
  • Securing information in web applications and web servers

Module 16 – Hacking Wireless Networks

The objective of this lab is to protect the wireless network from attackers.
In this lab, you will learn how to:

  • Analyze Wireless Network Traffic using Wireshark
  • Crack WEP using aircrack-ng
  • Crack WPA using aircrack-ng

Module 17 – Hacking Mobile Platforms

The objective of this lab is to help students learn to detect unpatched security flaws in mobile devices, and use them for performing penetration testing.
The objective of this lab is to:

  • Exploit the vulnerabilities in an Android device
  • Crack websites passwords
  • Use Android device to perform a DoS attack on a machine
  • Perform Security Assessment on an Android Device

Module 19 – Cloud Computing

The objective of this lab is to help students to build a cloud server, secure it with OpenSSL Encryption, and exploit java vulnerability to harvest user credentials.
In this lab, you will:

  • Create User Accounts and assign user rights
  • Securing ownCloud from malicious file uploads using ClamAV
  • Bypassing ownCloud Antivirus and hacking the host using Kali Linux

Module 20 – Cryptography

This lab will show you how to use encryption tools to encrypt data. It will teach you how to:

  • Use encrypting/decrypting techniques
  • Generate Hashes and checksum files

Tags : Footprinting and Reconnaissance, Scanning Networks, Enumeration, Vulnerability Analysis , System Hacking, Malware Threats, Sniffing, Social Engineering, Denial-of-Service, Session Hijacking, Evading IDS Firewalls and Honeypots, Hacking Web Servers, Hacking Web Applications, SQL Injection, Hacking Wireless Networks, Hacking Mobile Platforms, Cloud Computing, Cryptography

Publicités

Répondre

Choisissez une méthode de connexion pour poster votre commentaire:

Logo WordPress.com

Vous commentez à l'aide de votre compte WordPress.com. Déconnexion /  Changer )

Photo Google

Vous commentez à l'aide de votre compte Google. Déconnexion /  Changer )

Image Twitter

Vous commentez à l'aide de votre compte Twitter. Déconnexion /  Changer )

Photo Facebook

Vous commentez à l'aide de votre compte Facebook. Déconnexion /  Changer )

Connexion à %s

%d blogueurs aiment cette page :