Anda di halaman 1dari 19

This Book Is Distributed By http://pdfstore.

tk/ Please
Make Sure That This E-Book Dont Have Any Or Damage This will cause you
Missing Pages And Missing Tutorials.www.pdfstore.tk
will automaticly `check . is this book is ready for read
Attention :- Before You read this Book Please Visit www.pdfstore.tk and check
you can Free Download any kind of Free matirials from www.pdfstore.tk
web site

1 EC-Council
Ethical Hacking
The explosive growth of the Internet has brought This complimentary description was often extended
many good things: electronic commerce, easy access to the verb form “hacking,” which was used to describe
to vast stores of reference material, collaborative the rapid crafting of a new program or the making of
computing, e-mail, and new avenues for advertising changes to existing, usually complicated software.
and information distribution, to name a few. As with
most technological advances, there is also a dark Occasionally the less talented, or less careful,
side: criminal hackers. Governments, companies, intruders would accidentally bring down a system
and private citizens around the world are anxious or damage its files, and the system administrators
to be a part of this revolution, but they are afraid would have to restart it or make repairs. Other
that some hacker will break into their Web server times, when these intruders were again denied
and replace their logo with pornography, read access once their activities were discovered, they
their e-mail, steal their credit card number from would react with purposefully destructive actions.
an on-line shopping site, or implant software When the number of these destructive computer
that will secretly transmit their organization’s intrusions became noticeable, due to the visibility
secrets to the open Internet. With these of the system or the extent of the damage inflicted,
concerns and others, the ethical hacker can help. it became “news” and the news media picked up
on the story. Instead of using the more accurate
The term “hacker” has a dual usage in the computer term of “computer criminal,” the media began
industry today. Originally, the term was defined as: using the term “hacker” to describe individuals
who break into computers for fun, revenge, or
HACKER noun. 1. A person who enjoys learning profit. Since calling someone a “hacker” was
the details of computer systems and how to originally meant as a compliment, computer
stretch their capabilities—as opposed to most security professionals prefer to use the term
users of computers, who prefer to learn only the “cracker” or “intruder” for those hackers who turn
minimum amount necessary. 2. One who programs to the dark side of hacking. There are two types
enthusiastically or who enjoys programming of hackers “ethical hacker” and “criminal hacker”.
rather than just theorizing about programming.

2 EC-Council
What is Ethical Hacking?
With the growth of the Internet, computer secu- “One of the best ways to evaluate
rity has become a major concern for businesses
and governments. They want to be able to take the intruder threat is to have an
advantage of the Internet for electronic com- independent computer security
merce, advertising, information distribution and
access, and other pursuits, but they are worried
professionals attempt to break
about the possibility of being “hacked.” At the same their computer systems”
time, the potential customers of these services are
worried about maintaining control of personal
Successful ethical hackers possess a variety of skills.
information that varies from credit card numbers
First and foremost, they must be completely trust-
to social security numbers and home addresses.
worthy. While testing the security of a client’s sys-
tems, the ethical hacker may discover information
In their search for a way to approach the prob-
about the client that should remain secret. In many
lem, organizations came to realize that one of the
cases, this information, if publicized, could lead to
best ways to evaluate the intruder threat to their
real intruders breaking into the systems, possibly
interests would be to have independent computer
leading to financial losses. During an evaluation, the
security professionals attempt to break into their
ethical hacker often holds the “keys to the company,”
computer systems. This scheme is similar to having
and therefore must be trusted to exercise tight con-
independent auditors come into an organization to
trol over any information about a target that could
verify its bookkeeping records. In the case of com-
be misused. The sensitivity of the information gath-
puter security, these “tiger teams” or “ethical hack-
ered during an evaluation requires that strong mea-
ers” would employ the same tools and techniques
sures be taken to ensure the security of the systems
as the intruders, but they would neither damage the
being employed by the ethical hackers themselves:
target systems nor steal information. Instead, they
limited-access labs with physical security protection
would evaluate the target systems’ security and re-
and full ceiling-to-floor walls, multiple secure Inter-
port back to the owners with the vulnerabilities they
net connections, a safe to hold paper documenta-
found and instructions for how to remedy them.
tion from clients, strong cryptography to protect
electronic results, and isolated networks for testing.
Who are Ethical Hackers? Ethical hackers typically have very strong program-
ming and computer networking skills and have
been in the computer and networking business for

3 EC-Council
several years. They are also adept at installing and termined, a security evaluation plan is drawn up
maintaining systems that use the more popular op- that identifies the systems to be tested, how they
erating systems (e.g., Linux or Windows 2000) used should be tested, and any limitations on that testing.
on target systems. These base skills are augmented
with detailed knowledge of the hardware and soft-
ware provided by the more popular computer and “What can be the best way to help
networking hardware vendors. It should be noted
that an additional specialization in security is not organizations or even individuals
always necessary, as strong skills in the other areas tackle hackers? The solution is
imply a very good understanding of how the security students trained in the art of
on various systems is maintained. These systems
management skills are necessary for the actual vul- ethical hacking”
nerability testing, but are equally important when
preparing the report for the client after the test.
A Career in Ethical Hacking
Given these qualifications, how does one In a society so dependent on computers, breaking
go about finding such individuals? The best through anybody’s system is obviously considered
ethical hacker candidates will have success- anti-social. What can organizations do when in spite
fully mastered hacking tools and their exploits. of having the best security policy in place, a break-in
still occurs! While the “best of security” continues
to get broken into by determined hackers, what
What do Ethical Hackers do? options can a helpless organization look forward to?
An ethical hacker’s evaluation of a system’s se- The answer could lie in the form of ethical hackers,
curity seeks answers to these basic questions: who unlike their more notorious cousins (the black
hats), get paid to hack into supposedly secure
• What can an intruder see on the target systems? networks and expose flaws. And, unlike mock drills
• What can an intruder do with that information? where security consultants carry out specific tests
• Does anyone at the target notice the intruder’s at to check out vulnerabilities a hacking done by an
tempts or successes? ethical hacker is as close as you can get to the real
• What are you trying to protect? one. Also, no matter how extensive and layered the
• What are you trying to protect against? security architecture is constructed, the organization
• How much time, effort, and money are you willing does not know the real potential for external
to expend to obtain adequate protection? intrusion until its defenses are realistically tested.

Once answers to these questions have been de- Though companies hire specialist security firms

4 EC-Council
to protect their domains, the fact remains that
security breaches happen due to a company’s lack
of knowledge about its system. What can be the
best way to help organizations or even individuals
tackle hackers? The solution is students trained in
the art of ethical hacking, which simply means a
way of crippling the hacker’s plans by knowing the
ways one can hack or break into a system. But a key
impediment is the shortage of skill sets. Though you
would find thousands of security consultants from
various companies, very few of them are actually
aware of measures to counter hacker threats.

How much do Ethical Hackers get Paid?


Globally, the hiring of ethical hackers is on the rise
with most of them working with top consulting
firms. In the United States, an ethical hacker can
make upwards of $120,000 per annum. Freelance
ethical hackers can expect to make $10,000 per
assignment. For example, the contract amount for
IBM’s Ethical Hacking typically ranges from $15,000
to $45,000 for a standalone ethical hack. Taxes and
applicable travel and living expenses are extra.

Note: Excerpts taken from Ethical Hacking by C.C Palmer.

5 EC-Council
Certified Ethical Hacker Prior to attending this course, you will be asked
to sign an agreement stating that you will not use
Certification the newly acquired skills for illegal or malicious
attacks and you will not use such tools in an
If you want to stop hackers from invading attempt to compromise any computer system, and
your network, first you’ve got to invade to indemnify EC-Council with respect to the use or
their minds. misuse of these tools, regardless of intent.

The CEH Program certifies individuals in the Not anyone can be a student — the Accredited
specific network security discipline of Ethical Training Centers (ATC) will make sure the
Hacking from a vendor-neutral perspective. applicants work for legitimate companies.
The Certified Ethical Hacker certification will
significantly benefit security officers, auditors,
security professionals, site administrators, and
anyone who is concerned about the integrity of the
network infrastructure.

To achieve CEH certification, you must pass exam


312-50 that covers the standards and language
involved in common exploits, vulnerabilities and
countermeasures. You must also show knowledge
of the tools used by hackers in exposing common
vulnerabilities as well as the tools used by security
professionals for implementing countermeasures.

To achieve the Certified Ethical Hacker


Certification, you must pass the following exam:

Ethical Hacking and Countermeasures (312-50)

Legal Agreement
Ethical Hacking and Countermeasures course
mission is to educate, introduce and demonstrate
hacking tools for penetration testing purposes only.

6 EC-Council
Course Objectives Duration
This class will immerse the student into an interac- 5 Days
tive environment where they will be shown how
to scan, test, hack and secure their own systems.
The lab intensive environment gives each student
in-depth knowledge and practical experience with
the current essential security systems. Students will
begin by understanding how perimeter defenses
work and then be lead into scanning and attacking
their own networks, no real network is harmed.
Students then learn how intruders escalate privileg-
es and what steps can be taken to secure a system.
Students will also learn about Intrusion Detection,
Policy Creation, Social Engineering, Open Source
Intelligence, Incident Handling and Log Interpre-
tation. When a student leaves this intensive 5 day
class they will have hands on understanding and
experience in internet security.

Who should attend?


This class is a must for networking professionals,
IT managers and decision-makers that need to
understand the security solutions that exist today.
Companies and organizations interested in devel-
oping greater e-commerce capability need people
that know information security. This class provides
a solid foundation in the security technologies that
will pave the way for organizations that are truly
interested in reaping the benefits and tapping into
the potential of the Internet.

Prerequisites
Working knowledge of TCP/IP, Linux and Windows
2000.

7 EC-Council
Course Outline Hackers § http://tucows.com

v2.3 § What do Ethical Hackers § Hacking Tool: Sam


do? Spade
Module 1: Ethics and
Legality § Security evaluation plan § Analyzing Whois output
§ What is an Exploit? § Types of Ethical Hacks § NSLookup
§ The security functionality § Testing Types § Finding the address
triangle range of the network
§ Ethical Hacking Report
§ The attacker’s process § ARIN
§ Cyber Security
§ Passive reconnaissance Enhancement Act of § Traceroute
2002
§ Active reconnaissance § Hacking Tool: NeoTrace
§ Computer Crimes
§ Types of attacks § Visual Route
§ Overview of US Federal
§ Categories of exploits § Visual Lookout
Laws
§ Goals attackers try to § Hacking Tool: Smart
§ Section 1029
achieve Whois
§ Section 1030
§ Ethical hackers and § Hacking Tool:
crackers - who are they § Hacking Punishment eMailTracking Pro
§ Self proclaimed ethical § Hacking Tool:
hacking Module 2: Footprinting MailTracking.com
§ Hacking for a cause § What is Footprinting Module 3: Scanning
(Hacktivism)
§ Steps for gathering § Determining if the
§ Skills required for ethical information system is alive?
hacking
§ Whois § Active stack
§ Categories of Ethical fingerprinting

8 EC-Council
§ Passive stack § Hacking Tool: HTTrack § NetBios Null Sessions
fingerprinting Web Copier
§ Null Session
§ Hacking Tool: Pinger § Network Management Countermeasures
Tools
§ Hacking Tool: WS_Ping_ § NetBIOS Enumeration
Pro § SolarWinds Toolset
§ Hacking Tool: DumpSec
§ Hacking Tool: Netscan § NeoWatch
Tools Pro 2000 § Hacking Tool: NAT
§ War Dialing
§ Hacking Tool: Hping2 § SNMP Enumertion
§ Hacking Tool: THC-Scan
§ Hacking Tool: icmpenum § SNMPUtil
§ Hacking Tool:
§ Detecting Ping sweeps PhoneSweep War Dialer § Hacking Tool: IP
Network Browser
§ ICMP Queries § Hacking Tool: Queso
§ SNMP Enumeration
§ Hacking Tool: § Hacking Tool: Cheops Countermeasures
netcraft.com
§ Proxy Servers § Windows 2000 DNS
§ Port Scanning Zone transfer
§ Hacking Tool:
§ TCPs 3-way handshake SocksChain § Identifying Win2000
Accounts
§ TCP Scan types § Surf the web
anonymously § Hacking Tool: User2SID
§ Hacking Tool: IPEye
§ TCP/IP through HTTP § Hacking Tool: SID2User
§ Hacking Tool: Tunneling
IPSECSCAN § Hacking Tool: Enum
§ Hacking Tool: HTTPort
§ Hacking Tool: nmap § Hacking Tool: UserInfo
Module 4: Enumeration
§ Port Scan § Hacking Tool: GetAcct
countermeasures § What is Enumeration
§ Active Directory

9 EC-Council
Enumeration § Manual Password § SMBRelay Man-in-the-
Cracking Algorithm Middle (MITM)
Module 5: System
Hacking § Automatic Password § SMBRelay MITM
Cracking Algorithm Countermeasures
§ Administrator Password
Guessing § Password Types § Hacking Tool:
SMBGrinder
§ Performing Automated § Types of Password
Password Guessing Attacks § Hacking Tool: SMBDie

§ Legion § Dictionary Attack § Hacking Tool:


NBTDeputy
§ NTInfoScan § Brute Force Attack
§ NetBIOS DoS Attack
§ Defending Against § Distributed Brute Force
Password Guessing Attack § Hacking Tool: nbname

§ Monitoring Event Viewer § Password Change § Hacking Tool: John the


Logs Interval Ripper

§ VisualLast § Hybrid Attack § LanManager Hash

§ Eavesdroppin on § Cracking Windows 2000 § Password Cracking


Network Password Passwords Countermeasures
Exchange
§ Retrieving the SAM file § Keystroke Logger
§ Hacking Tool:
L0phtCrack § Redirecting SMB Logon § Hacking Tool: Spector
to the Attacker
§ Hacking Tool: KerbCrack § AntiSpector
§ SMB Redirection
§ Privilege Escalation § Hacking Tool: eBlaster
§ Hacking Tool: SMBRelay
§ Hacking Tool: GetAdmin § Hacking Tool:
§ Hacking Tool: SpyAnywhere
§ Hacking Tool: hk SMBRelay2
§ Hacking Tool: IKS

10 EC-Council
Software Logger § Hacking Tool: makestrm Module 6: Trojans and
Backdoors
§ Hardware Tool: § NTFS Streams
Hardware Key Logger Countermeasures § What is a Trojan Horse?

§ Hacking Tool: Rootkit § LNS § Overt and Covert

§ Planting Rootkit on § Steganography § Hacking Tool: QAZ


Windows 2000 Machine
§ Hacking Tool: § Hacking Tool: Tini
§ _rootkit_ embedded ImageHide
TCP/IP Stack § Hacking Tool: Netcat
§ Hacking Tool: MP3Stego
§ Rootkit Countermeasures § Hacking Tool: Donald
§ Hacking Tool: Snow Dick
§ MD5 Checksum utility
§ Hacking Tool: Camera/ § Hacking Tool: SubSeven
§ Tripwire Shy
§ Hacking Tool:
§ Covering Tracks § Steganography Detection BackOrifice 2000

§ Disabling Auditing § StegDetect § Back Oriffice Plug-ins

§ Auditpol § Encrypted File System § Hacking Tool: NetBus

§ Clearing the Event Log § Hacking Tool: dskprobe § Wrappers

§ Hacking Tool: Elslave § Hacking Tool: EFSView § Hacking Tool: Graffiti

§ Hacking Tool: Winzapper § Buffer Overflows § Hacking Tool: Silk Rope


2000
§ Hacking Tool: Evidence § Creating Buffer Overflow
Eliminator Exploit § Hacking Tool: EliteWrap

§ Hidding Files § Outlook Buffer Overflow § Hacking Tool: IconPlus

§ NTFS File Streaming § Hacking Tool: § Packaging Tool:


Outoutlook Microsoft WordPad

11 EC-Council
§ Hacking Tool: Whack a § Trojan Maker § Hacking Tool: mailsnarf
Mole
§ Hacking Tool: Hard Disk § Hacking Tool: URLsnarf
§ Trojan Construction Kit Killer
§ Hacking Tool: Webspy
§ BoSniffer § Man-in-the-Middle
Attack § Hacking Tool: Ettercap
§ Hacking Tool: FireKiller
2000 § Hacking Tool: dsniff § Hacking Tool: SMAC

§ Covert Channels § System File Verification § MAC Changer

§ ICMP Tunneling § TripWire § ARP Spoofing


Countermeasures
§ Hacking Tool: Loki Module 7: Sniffers
§ Hacking Tool:
§ Reverse WWW Shell § What is a Sniffer? WinDNSSpoof

§ Backdoor § Hacking Tool: Etheral § Hacking Tool: WinSniffer


Countermeasures
§ Hacking Tool: Snort § Network Tool: IRIS
§ BO Startup and Registry
Entries § Hacking Tool: WinDump § Network Tool:
NetInterceptor
§ NetBus Startup and § Hacking Tool: EtherPeek
Registry Keys § SniffDet
§ Passive Sniffing
§ Port Monitoring Tools § Hacking Tool:
§ Active Sniffing WinTCPKill
§ fPort
§ Hacking Tool: Module 8: Denial of
§ TCPView EtherFlood Service

§ Process Viewer § How ARP Works? § What is Denial of Service


Attack?
§ Inzider - Tracks § Hacking Tool: DSniff
Processes and Ports § Types of DoS Attacks
§ Hacking Tool: Macof

12 EC-Council
§ How DoS Work? § Hacking Tool: § Important User
Stacheldraht
§ What is DDoS? § Tech Support
§ Hacking Tool: Shaft
§ Hacking Tool: Ping of § Third Party
Death § Hacking Tool: mstream Authorization

§ Hacking Tool: SSPing § DDoS Attack Sequence § In Person

§ Hacking Tool: Land § Preventing DoS Attack § Dumpster Diving

§ Hacking Tool: Smurf § DoS Scanning Tools § Shoulder Surfing

§ Hacking Tool: SYN Flood § Find_ddos § Computer Impersonation

§ Hacking Tool: CPU Hog § SARA § Mail Attachments

§ Hacking Tool: Win Nuke § DDoSPing § Popup Windows

§ Hacking Tool: RPC § RID § Website Faking


Locator
§ Zombie Zapper § Reverse Social
§ Hacking Tool: Jolt2 Engineering
Module 9: Social
§ Hacking Tool: Bubonic Engineering § Policies and Procedures

§ Hacking Tool: Targa § What is Social § Social Engineering


Engineering? Security Policies
§ Tools for Running DDoS
Attacks § Art of Manipulation § The Importance of
Employee Education
§ Hacking Tool: Trinoo § Human Weakness
Module 10: Session
§ Hacking Tool: WinTrinoo § Common Types of Social Hijacking
Engineering
§ Hacking Tool: TFN § What is Session
§ Human Based Hijacking?
§ Hacking Tool: TFN2K Impersonation

13 EC-Council
§ Session Hijacking Steps § Protection against § Unicode
Session Hijacking
§ Spoofing Vs Hijacking § Directory Listing
Module 11: Hacking
§ Active Session Hijacking Web Servers § Clearing IIS Logs

§ Passive Session § Apache Vulnerability § Network Tool:


Hijacking LogAnalyzer
§ Attacks against IIS
§ TCP Concepts - 3 way § Attack Signature
Handshake § IIS Components
§ Creating Internet
§ Sequence Numbers § ISAPI DLL Buffer Explorer (IE) Trojan
Overflows
§ Sequence Number § Hacking Tool: IISExploit
Example § IPP Printer Overflow
§ Hacking Tool:
§ Guessing the Sequence § msw3prt.dll UnicodeUploader.pl
Numbers
§ Oversized Print Requests § Hacking Tool:
§ Hacking Tool: cmdasp.asp
Juggernaut § Hacking Tool: Jill32
§ Escalating Privilages on
§ Hacking Tool: Hunt § Hacking Tool: IIS5-Koei IIS

§ Hacking Tool: § Hacking Tool: IIS5Hack § Hacking Tool:


TTYWatcher IISCrack.dll
§ IPP Buffer Overflow
§ Hacking Tool: IP Countermeasures § Hacking Tool: ispc.exe
Watcher
§ ISAPI DLL Source § Unspecified Executable
§ Hacking Tool: T-Sight Disclosure Path Vulnerability

§ Remote TCP Session § ISAPI.DLL Exploit § Hacking Tool:


Reset Utility CleanIISLog
§ Defacing Web Pages
§ Dangers Posed by § File System Traversal
Session Hijacking § IIS Directory Traversal Countermeasures

14 EC-Council
§ Microsoft HotFix § HTML Comments and Authentication
Problems Contents
§ Forms based
§ UpdateExpert § Hacking Tool: Lynx Authentication

§ Cacls utility § Hacking Tool: Wget § Creating Fake


Certificates
§ Network Tool: Whisker § Hacking Tool: Black
Widow § Hacking Tool:
§ N-Stealth Scanner WinSSLMiM
§ Hacking Tool: WebSleuth
§ Hacking Tool: § Password Guessing
WebInspect § Cross Side Scripting
§ Hacking Tool:
§ Network Tool: Shadow § Session Hijacking using WebCracker
Security Scanner XSS
§ Hacking Tool: Brutus
Module 12: Web § Cookie Stealing
Application § Hacking Tool: ObiWan
Vulnerabilities § Hacking Tool: IEEN
§ Hacking Tool: Munga
§ Documenting the Module 13: Web Based Bunga
Application Structure Password Cracking
Techniques § Password dictionary Files
§ Manually Inspecting
Applications § Basic Authentication § Attack Time

§ Using Google to Inspect § Message Digest § Hacking Tool: Varient


Applications Authentication
§ Hacking Tool: PassList
§ Directory Structure § NTLM Authentication
§ Query Strings
§ Hacking Tool: Instant § Certificate based
Source Authentication § Post data

§ Java Classes and Applets § Digital Certificates § Hacking Tool: cURL

§ Hacking Tool: Jad § Microsoft Passport § Stealing Cookies

15 EC-Council
§ Hacking Tool: CookieSpy § Hacking Tool: SQLbf § Hacking Tool: AirSnort

§ Hacking Tool: § Hacking Tool: SQLSmack § Hacking Tool: AiroPeek


ReadCookies
§ Hacking Tool: SQL2.exe § Hacking Tool: WEP
§ Hacking Tool: SnadBoy Cracker
§ Hacking Tool: Oracle
Module 14: SQL Password Buster § Hacking Tool: Kismet
Injection
Module 15: Hacking § WIDZ- Wireless IDS
§ What is SQL Injection Wireless Networks
Vulnerability? Module 16: Virus and
§ 802.11 Standards Worms
§ SQL Insertion Discovery
§ What is WEP? § Cherobyl
§ Blank sa Password
§ Finding WLANs § ExploreZip
§ Simple Input Validation
§ Cracking WEP keys § I Love You
§ SQL Injection
§ Sniffing Trafic § Melissa
§ OLE DB Errors
§ Wireless DoS Attacks § Pretty Park
§ 1=1
§ WLAN Scanners § Code Red Worm
§ blah’ or 1=1
§ WLAN Sniffers § W32/Klez
§ Stealing Credit Card
Information § MAC Sniffing § BugBear

§ Preventing SQL Injection § Access Point Spoofing § W32/Opaserv Worm

§ Database Specific SQL § Securing Wireless § Nimda


Injection Networks
§ Code Red
§ Hacking Tool: SQLDict § Hacking Tool:
NetTumbler § SQL Slammer
§ Hacking Tool: SQLExec

16 EC-Council
§ How to write your own § Gobbler Countermeasures
Virus?
§ Novelffs § IPChains and IPTables
§ Worm Construction Kit
§ Pandora Module 19: IDS,
Module 17: Novell Firewalls and
Hacking Module 18: Linux Honeypots
Hacking
§ Common accounts and § Intrusion Detection
passwords § Why Linux ? System

§ Accessing password files § Linux Basics § System Integrity Verifiers

§ Password crackers § Compiling Programs in § How are Intrusions


Linux Detected?
§ Netware Hacking Tools
§ Scanning Networks § Anomaly Detection
§ Chknull
§ Mapping Networks § Signature Recognition
§ NOVELBFH
§ Password Cracking in § How does IDS match
§ NWPCRACK Linux Signatures with
Incoming Traffic?
§ Bindery § Linux Vulnerabilities
§ Protocol Stack
§ BinCrack § SARA Verification
§ SETPWD.NLM § TARA § Application Protocol
Verification
§ Kock § Sniffing
§ What Happens after an
§ userdump § A Pinger in Disguise
IDS Detects an Attack?
§ Burglar § Session Hijacking
§ IDS Software Vendors
§ Getit § Linux Rootkits
§ SNORT
§ Spooflog § Linux Security
§ Evading IDS

17 EC-Council
(Techniques) § Honeypots vendors § StackGuard

§ Complex IDS Evasion Module 20: Buffer § Immunix


Overflows
§ Hacking Tool: fragrouter § Module 21:
§ What is a Buffer Cryptography
§ Hacking Tool: Overflow?
TCPReplay § What is PKI?
§ Exploitation
§ Hacking Tool: SideStep § Digital Certificates
§ Assembly Language
§ Hacking Tool: Basics § RSA
NIDSbench
§ How to Detect Buffer § MD-5
§ Hacking Tool: ADMutate Overflows in a Program?
§ RC-5
§ IDS Detection § Skills Required
§ SHA
§ Tools to Detect Packet § CPU/OS Dependency
Sniffers § SSL
§ Understanding Stacks
§ Tools to inject strangely § PGP
formatted packets onto § Stack Based Buffer
the wire Overflows § SSH

§ Hacking Through § Buffer Overflow § Encryption Cracking


Firewalls Technical Techniques
Implementation
§ Placing Backdoors
through Firewalls § Writing your own Buffer
Overflow Exploit in C
§ Hiding behind Covert
Channels § Defense against Buffer
Overflows
§ What is a Honeypot?
§ Type Checking Tools for
§ Honeypots Evasion Compiling Programs

18 EC-Council
International Council of E-Commerce Consultants
67 Wall Street, 22nd Floor
New York, NY 10005-3198
USA

Phone: 212.709.8253
Fax: 212.943.2300

© 2002 EC-Council. All rights reserved.


This document is for informational purposes only. EC-Council MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS
SUMMARY. EC-Council logo is registered trademarks or trademarks of EC-Council in the United States and/or other countries.

19 EC-Council

Anda mungkin juga menyukai