Ethical Hacking Syllabus overview



Certified Ethical Hacking Syllabus


Certified Ethical Hacker (312-50) CEH
1.CEH Ethics and Legal Issues12.CEH Web Application Vulnerabilities
2.CEH Footprinting 13.CEH Web Based Password Cracking Techniques
3.CEH Scanning 14.CEH SQL Injection
4.CEH Enumeration 15.CEH Hacking Wireless Networks
5.CEH System Hacking 16.CEH Virus and Worms
6.CEH Trojans and Backdoors 17.CEH Hacking Novell
7.CEH Sniffers 18.CEH Hacking Linux
8.CEH Denial of Service 19.CEH IDS, Firewalls and Honeypots
9.CEH Social Engineering 20.CEH Buffer Overflows
10.CEH Session Hijacking21.CEH Cryptography
11.CEH Hacking Web Servers22.CEH Penetration Testing Methodologies

Certified Ethical Hacker (CEH) Module 1: Ethics and Legality
  • What is an Exploit?
  • The security functionality triangle
  • The attacker's process
  • Passive reconnaissance
  • Active reconnaissance
  • Types of attacks
  • Categories of exploits
  • Goals attackers try to achieve
  • Ethical hackers and crackers - who are they
  • Self proclaimed ethical hacking
  • Hacking for a cause (Hacktivism)
  • Skills required for ethical hacking
  •   Categories of Ethical Hackers
  •   What do Ethical Hackers do?
  •   Security evaluation plan
  •   Types of Ethical Hacks
  •   Testing Types
  •   Ethical Hacking Report
  •   Cyber Security Enhancement Act of 2002
  •   Computer Crimes
  •   Overview of US Federal Laws
  •   Section 1029
  •   Section 1030
  •   Hacking Punishment

Certified Ethical Hacker (CEH) Module 2: Footprinting
  • What is Footprinting
  • Steps for gathering information
  • Whois
  • http://tucows.com
  • Hacking Tool: Sam Spade
  • Analyzing Whois output
  • NSLookup
  • Finding the address range of the network
  •   ARIN
  •   Traceroute
  •   Hacking Tool: NeoTrace
  •   Visual Route
  •   Visual Lookout
  •   Hacking Tool: Smart Whois
  •   Hacking Tool: eMailTracking Pro
  •   Hacking Tool: MailTracking.com

Certified Ethical Hacker (CEH) Module 3: Scanning
  • Determining if the system is alive?
  • Active stack fingerprinting
  • Passive stack fingerprinting
  • Hacking Tool: Pinger
  • Hacking Tool: Friendly Pinger
  • Hacking Tool: WS_Ping_Pro
  • Hacking Tool: Netscan Tools Pro 2000
  • Hacking Tool: Hping2
  • Hacking Tool: KingPing
  • Hacking Tool: icmpenum
  • Hacking Tool: SNMP Scanner
  • Detecting Ping sweeps
  • ICMP Queries
  • Hacking Tool: netcraft.com
  • Port Scanning
  • TCPs 3-way handshake
  • TCP Scan types
  • Hacking Tool: IPEye
  • Hacking Tool: IPSECSCAN
  •   Hacking Tool: nmap
  •   Port Scan countermeasures
  •   Hacking Tool: HTTrack Web Copier
  •   Network Management Tools
  •   SolarWinds Toolset
  •   NeoWatch
  •  War Dialing
  •   Hacking Tool: THC-Scan
  •   Hacking Tool: PhoneSweep War Dialer
  •   Hacking Tool: Telesweep
  •   Hacking Tool: Queso
  •   Hacking Tool: Cheops
  •   Proxy Servers
  •   Hacking Tool: SocksChain
  •   Surf the web anonymously
  •   TCP/IP through HTTP Tunneling
  •   Hacking Tool: HTTPort
  •   Hacking Tool: Tunneld
  •   Hacking Tool: BackStealth

Certified Ethical Hacker (CEH) Module 4: Enumeration
  • Determining if the system is alive?
  • What is Enumeration
  • NetBios Null Sessions
  • Null Session Countermeasures
  • NetBIOS Enumeration
  • Hacking Tool: DumpSec
  • Hacking Tool: Hyena
  • Hacking Tool: NAT
  • SNMP Enumertion
  • SNMPUtil
  • Hacking Tool: IP Network Browser
  • SNMP Enumeration Countermeasures
  • Windows 2000 DNS Zone transfer
  •  Identifying Win2000 Accounts
  •  Hacking Tool: User2SID
  •  Hacking Tool: SID2User
  •  Hacking Tool: Enum
  •  Hacking Tool: UserInfo
  •  Hacking Tool: GetAcct
  •  Hacking Tool: smbbf
  •  SMB Auditing Tools
  •  Active Directory Enumeration
  •  W2K Active Directory attack


Certified Ethical Hacker (CEH) Module 5: System Hacking
  • Administrator Password Guessing
  • Performing Automated Password Guessing
  • Legion
  • NTInfoScan
  • Defending Against Password Guessing
  • Monitoring Event Viewer Logs
  • VisualLast
  • Eavesdroppin on Network Password Exchange
  • Hacking Tool: L0phtCrack
  • Hacking Tool: KerbCrack
  • Privilege Escalation
  • Hacking Tool: GetAdmin
  • Hacking Tool: hk
  • Manual Password Cracking Algorithm
  • Automatic Password Cracking Algorithm
  • Password Types
  • Types of Password Attacks
  • Dictionary Attack
  • Brute Force Attack
  • Distributed Brute Force Attack
  • Password Change Interval
  • Hybrid Attack
  • Cracking Windows 2000 Passwords
  • Retrieving the SAM file
  • Redirecting SMB Logon to the Attacker
  • SMB Redirection
  • Hacking Tool: SMBRelay
  • Hacking Tool: SMBRelay2
  • Hacking Tool: pwdump2
  • Hacking Tool: SAMdump
  • Hacking Tool: C2MYAZZ
  • Win32 Create Local Admin User
  • Offline NT Password Resetter
  • Hacking Tool: psexec
  • Hacking Tool: remoxec
  • SMBRelay Man-in-the-Middle (MITM)
  • SMBRelay MITM Countermeasures
  • Hacking Tool: SMBGrinder
  • Hacking Tool: SMBDie
  • Hacking Tool: NBTDeputy
  • NetBIOS DoS Attack
  • Hacking Tool: nbname
  • Hacking Tool: John the Ripper
  • LanManager Hash

Certified Ethical Hacker (CEH) Module 6: Trojans and Backdoors
  • What is a Trojan Horse?
  • Overt and Covert
  • Hacking Tool: QAZ
  • Hacking Tool: Tini
  • Hacking Tool: Netcat
  • Hacking Tool: Donald Dick
  • Hacking Tool: SubSeven
  • Hacking Tool: BackOrifice 2000
  • Back Oriffice Plug-ins
  • BoSniffer
  • Hacking Tool: NetBus
  • ComputerSpy Key Logger
  • Hacking Tool: Beast Trojan
  • Hacking Tool: CyberSpy Telnet Trojan
  • Hacking Tool: SubRoot Telnet Trojan
  • Hacking Tool: LetMeRule
  • Wrappers
  • Hacking Tool: Graffiti
  • Hacking Tool: Silk Rope 2000
  • Hacking Tool: EliteWrap
  • Hacking Tool: IconPlus
  • Packaging Tool: Microsoft WordPad

  • Hacking Tool: Whack a Mole Trojan Construction Kit
  • Writing Trojans in Java
  • Hacking Tool: FireKiller 2000
  • Covert Channels
  • ICMP Tunneling
  • Hacking Tool: Loki
  • Reverse WWW Shell
  • Backdoor Countermeasures
  • BO Startup and Registry Entries
  • NetBus Startup and Registry Keys
  • Port Monitoring Tools
  • fPort
  • TCPView
  • Process Viewer
  • Inzider - Tracks Processes and Ports
  • Trojan Maker
  • Hacking Tool: Hard Disk Killer
  • Man-in-the-Middle Attack
  • Hacking Tool: dsniff
  • System File Verification
  • TripWire
Certified Ethical Hacker (CEH) Module 7: Sniffers
  • What is a Sniffer?
  • Hacking Tool: Ethereal
  • Hacking Tool: Snort
  • Hacking Tool: WinDump
  • Hacking Tool: EtherPeek
  • Passive Sniffing
  • Active Sniffing
  • Hacking Tool: EtherFlood
  • How ARP Works?
  • Hacking Tool: ArpSpoof
  • Hacking Tool: DSniff
  • Hacking Tool: Macof
  • Hacking Tool: mailsnarf
  • Hacking Tool: URLsnarf
  • Hacking Tool: Webspy
  • Hacking Tool: Ettercap

  • Hacking Tool: WebMiTM
  • IP Restrictions Scanner
  • Hacking Tool: sTerm
  • Hacking Tool: Cain and Abel
  • Hacking Tool: Packet Crafter
  • Hacking Tool: SMAC
  • MAC Changer
  • ARP Spoofing Countermeasures
  • Hacking Tool: WinDNSSpoof
  • Hacking Tool: Distributed DNS Flooder
  • Hacking Tool: WinSniffer
  • Network Tool: IRIS
  • Network Tool: NetInterceptor
  • SniffDet
  • Hacking Tool: WinTCPKill
Certified Ethical Hacker (CEH) Module 8: Denial of Service
  • What is Denial of Service Attack?             
  • Types of DoS Attacks
  • How DoS Work?
  • What is DDoS?
  • Hacking Tool: Ping of Death
  • Hacking Tool: SSPing
  • Hacking Tool: Land
  • Hacking Tool: Smurf
  • Hacking Tool: SYN Flood
  • Hacking Tool: CPU Hog
  • Hacking Tool: Win Nuke
  • Hacking Tool: RPC Locator
  • Hacking Tool: Jolt2
  • Hacking Tool: Bubonic
  • Hacking Tool: Targa
  • Tools for Running DDoS Attacks

  • Hacking Tool: Trinoo
  • Hacking Tool: WinTrinoo
  • Hacking Tool: TFN
  • Hacking Tool: TFN2K
  • Hacking Tool: Stacheldraht
  • Hacking Tool: Shaft
  • Hacking Tool: mstream
  • DDoS Attack Sequence
  • Preventing DoS Attack
  • DoS Scanning Tools
  • Find_ddos
  • SARA
  • DDoSPing
  • RID
  • Zombie Zapper
Certified Ethical Hacker (CEH) Module 9: Social Engineering
  • What is Social Engineering?
  • Art of Manipulation
  • Human Weakness
  • Common Types of Social Engineering
  • Human Based Impersonation
  • Important User
  • Tech Support
  • Third Party Authorization
  • In Person
  • Dumpster Diving

  • Shoulder Surfing
  • Computer Impersonation
  • Mail Attachments
  • Popup Windows
  • Website Faking
  • Reverse Social Engineering
  • Policies and Procedures
  • Social Engineering Security Policies
  • The Importance of Employee Education
Certified Ethical Hacker (CEH) Module 10: Session Hijacking
  • What is Session Hijacking?   
  • Session Hijacking Steps
  • Spoofing Vs Hijacking
  • Active Session Hijacking
  • Passive Session Hijacking
  • TCP Concepts - 3 way Handshake
  • Sequence Numbers
  • Sequence Number Example
  • Guessing the Sequence Numbers

  •   Hacking Tool: Juggernaut
  •   Hacking Tool: Hunt
  •   Hacking Tool: TTYWatcher
  •   Hacking Tool: IP Watcher
  •   Hacking Tool: T-Sight
  •   Remote TCP Session Reset Utility
  •   Dangers Posed by Session Hijacking
  •   Protection against Session Hijacking
Certified Ethical Hacker (CEH) Module 11: Hacking Web Servers
  • Apache Vulnerability
  • Attacks against IIS
  • IIS Components
  • ISAPI DLL Buffer Overflows
  • IPP Printer Overflow
  • msw3prt.dll
  • Oversized Print Requests
  • Hacking Tool: Jill32
  • Hacking Tool: IIS5-Koei
  • Hacking Tool: IIS5Hack
  • IPP Buffer Overflow Countermeasures
  • ISAPI DLL Source Disclosure
  • ISAPI.DLL Exploit
  • Defacing Web Pages
  • IIS Directory Traversal
  • Unicode
  • Directory Listing
  • Clearing IIS Logs
  • Network Tool: LogAnalyzer
  • Attack Signature
  • Creating Internet Explorer (IE) Trojan
  • Hacking Tool: IISExploit

  • Hacking Tool: UnicodeUploader.pl
  • Hacking Tool: cmdasp.asp
  • Escalating Privilages on IIS
  • Hacking Tool: IISCrack.dll
  • Hacking Tool: ispc.exe
  • IIS WebDav Vulnerability
  • Hacking Tool: WB
  • RPC Exploit-GUI
  • Hacking Tool: DComExpl_UnixWin32
  • Hacking Tool: Plonk
  • Unspecified Executable Path Vulnerability
  • Hacking Tool: CleanIISLog
  • File System Traversal Countermeasures
  • Microsoft HotFix Problems
  • UpdateExpert
  • Cacls utility
  • Network Tool: Whisker
  • N-Stealth Scanner
  • Hacking Tool: WebInspect
  • Network Tool: Shadow Security Scanner
Certified Ethical Hacker (CEH) Module 12: Web Application Vulnerabilities
  • Documenting the Application Structure
  • Manually Inspecting Applications
  • Using Google to Inspect Applications
  • Directory Structure
  • Hacking Tool: Instant Source
  • Java Classes and Applets
  • Hacking Tool: Jad
  • HTML Comments and Contents
  • Hacking Tool: Lynx
  •     Hacking Tool: Wget
  •     Hacking Tool: Black Widow
  •     Hacking Tool: WebSleuth
  •     Cross Side Scripting
  •     Session Hijacking using XSS
  •     Cookie Stealing
  •     Hacking Tool: IEEN
  •     Hacking Tool: IEflaw
  •     Exposing Sensitive Data with Google

Certified Ethical Hacker (CEH) Module 13: Web Based Password Cracking Techniques
  • Basic Authentication
  • Message Digest Authentication
  • NTLM Authentication
  • Certificate based Authentication
  • Digital Certificates
  • Microsoft Passport Authentication
  • Forms based Authentication
  • Creating Fake Certificates
  • Hacking Tool: WinSSLMiM
  • Password Guessing
  • Dfault Account Database
  • Hacking Tool: WebCracker
  • Hacking Tool: Brutus
  •        Hacking Tool: ObiWan
  •        Hacking Tool: Munga Bunga
  •        Password dictionary Files
  •        Attack Time
  •        Hacking Tool: Variant
  •        Hacking Tool: PassList
  •        Query Strings
  •        Post data
  •        Hacking Tool: cURL
  •        Stealing Cookies
  •        Hacking Tool: CookieSpy
  •        Hacking Tool: ReadCookies
  •        Hacking Tool: SnadBoy

Certified Ethical Hacker (CEH) Module 14: SQL Injection
  • What is SQL Injection Vulnerability?
  • SQL Insertion Discovery
  • Blank sa Password
  • Simple Input Validation
  • SQL Injection
  • OLE DB Errors
  • 1=1
  • blah' or 1=1
  •  Preventing SQL Injection
  •  Database Specific SQL Injection
  •  Hacking Tool: SQLDict
  •  Hacking Tool: SQLExec
  •  Hacking Tool: SQLbf
  •  Hacking Tool: SQLSmack
  •  Hacking Tool: SQL2.exe
  •  Hacking Tool: Oracle Password Buster

Certified Ethical Hacker (CEH) Module 15: Hacking Wireless Networks
  • 802.11 Standards
  • What is WEP?
  • Finding WLANs
  • Cracking WEP keys
  • Sniffing Trafic
  • Wireless DoS Attacks
  • WLAN Scanners
  • WLAN Sniffers
  • MAC Sniffing
  •   Access Point Spoofing
  •   Securing Wireless Networks
  •   Hacking Tool: NetTumbler
  •   Hacking Tool: AirSnort
  •   Hacking Tool: AiroPeek
  •   Hacking Tool: WEP Cracker
  •   Hacking Tool: Kismet
  •   Hacking Tool: AirSnarf
  •   WIDZ- Wireless IDS

Certified Ethical Hacker (CEH) Module 16: Virus and Worms
  • Cherobyl
  • ExploreZip
  • I Love You
  • Melissa
  • Pretty Park
  • Code Red Worm
  • W32/Klez
  • BugBear

  • W32/Opaserv Worm
  • Nimda
  • Code Red
  • SQL Slammer
  • Batch File Virus Creator
  • How to write your own Virus?
  • Worm Construction Kits
Certified Ethical Hacker (CEH) Module 17: Novell Hacking
  • Common accounts and passwords
  • Accessing password files
  • Password crackers
  • Netware Hacking Tools
  • Chknull
  • NOVELBFH
  • NWPCRACK
  • Bindery
  • BinCrack
  •         SETPWD.NLM
  •         Kock
  •         userdump
  •         Burglar
  •         Getit
  •         Spooflog
  •         Gobbler
  •         Novelffs
  •         Pandora

Certified Ethical Hacker (CEH) Module 18: Linux Hacking
  • Why Linux ?
  • Linux Basics
  • Compiling Programs in Linux
  • Scanning Networks
  • Mapping Networks
  • Password Cracking in Linux
  • Linux Vulnerabilities
  • SARA

  •    TARA
  •    Sniffing
  •    A Pinger in Disguise
  •    Session Hijacking
  •    Linux Rootkits
  •    Linux Security Countermeasures
  •    IPChains and IPTables
Certified Ethical Hacker (CEH) Module 19: IDS, Firewalls and Honeypots
  • Intrusion Detection System
  • System Integrity Verifiers
  • How are Intrusions Detected?
  • Anomaly Detection
  • Signature Recognition
  • How does IDS match Signatures with Incoming Traffic?
  • Protocol Stack Verification
  • Application Protocol Verification
  • What Happens after an IDS Detects an Attack?
  • IDS Software Vendors
  • SNORT
  • Evading IDS (Techniques)
  • Complex IDS Evasion
  • Hacking Tool: fragrouter
  • Hacking Tool: TCPReplay
  • Hacking Tool: SideStep
  • Hacking Tool: NIDSbench
  • Hacking Tool: ADMutate
  • IDS Detection
  • Tools to Detect Packet Sniffers
  • Tools to inject strangely formatted packets onto the wire
  • Hacking Through Firewalls
  • Placing Backdoors through Firewalls
  • Hiding behind Covert Channels
  • Hacking Tool: Ncovert
  • What is a Honeypot?
  • Honeypots Evasion
  • Honeypots vendors
  • Hacking Tool: Honeyd

Certified Ethical Hacker (CEH) Module 20: Buffer Overflows
  • What is a Buffer Overflow?
  • Exploitation
  • Assembly Language Basics
  • How to Detect Buffer Overflows in a Program?
  • Skills Required
  • CPU/OS Dependency
  • Understanding Stacks
  • Stack Based Buffer Overflows

  •   Buffer Overflow Technical Implementation
  •   Writing your own Buffer Overflow Exploit in C
  •   Defense against Buffer Overflows
  •   Type Checking Tools for Compiling Programs
  •   StackGuard
  •   Immunix
Certified Ethical Hacker (CEH) Module 21: Cryptography
  • What is PKI?
  • Digital Certificates
  • RSA
  • MD-5
  • RC-5
  • SHA
  • SSL
  • PGP
  • SSH
  • Encryption Cracking Techniques

Certified Ethical Hacker (CEH) Module 22: Penetration Testing Methodologies
  • Physical Security Testing
  • Port Scanning Testing
  • System Identification Testing
  • Services Identification Testing
  • Vulnerability Research and Verification Testing
  • Application Testing and Source Code Review
  • Router Testing
  • Firewall Testing
  • Intrusion Detection System Testing
  • Domain Trusted Systems Testing





  •   Application Password Cracking Testing
  •   Denial of Service Testing
  •   Containment Measures Testing
  •   Information Security
  •   Document Grinding
  •   Gathering Competitive Intelligence
  •   Social Engineering Testing
  •   Wireless Networks Testing
  •   Cordless Communications Testing
  •   Infrared Systems Testing
  •   Modem Testing
  •   Writing Penetration Testing Reports

0 comments: