5
Practice Labs Ethical Hacker

Practice Labs Ethical Hacker€¦ · Practice Labs Ethical Hacker Lab Outline The Ethical Hacker Practice Lab certificate is aimed at those working in Cyber Security, Penetration

  • Upload
    others

  • View
    32

  • Download
    1

Embed Size (px)

Citation preview

Page 1: Practice Labs Ethical Hacker€¦ · Practice Labs Ethical Hacker Lab Outline The Ethical Hacker Practice Lab certificate is aimed at those working in Cyber Security, Penetration

Practice Labs Ethical Hacker

Page 2: Practice Labs Ethical Hacker€¦ · Practice Labs Ethical Hacker Lab Outline The Ethical Hacker Practice Lab certificate is aimed at those working in Cyber Security, Penetration

The Ethical Hacker Practice Lab will provide you with the necessary platform to gain hands on skills in security. By completing the lab tasks you will improve your practical skills in Footprinting & Reconnaissance, Scanning Networks, Device & Device Enumeration, Social Engineering, System Hacking Concepts and Port & Process Monitoring.

Prerequisites

© 2007 - 2017 I-Qubed Solutions Ltd. T/A Practice Labs Company registered in England Company No. 05939037 VAT No. 900079851

Support 9am-5pm(GMT) : +44 (0) 203 588750E-mail: [email protected]

Course Code

Released Duration

Skill LevelPLAB-EH02

Jan 2018 24 hours

Intermediate

Practice Labs Ethical Hacker

Lab Outline

The Ethical Hacker Practice Lab certificate is aimed at those working in Cyber Security, Penetration Testing, Security Consultants or IT professionals seeking to advance their hands-on skills in Ethical Hacking.

Who is it For?

• Identify live systems and work with network diagrams

• Identify Open Ports, track port usage and perform port redirection

• Scan Networks using Nmap and hping• Perform OS fingerprinting• Perform banner grabbing• Create a simple virus, plant a Backdoor and use

malware and Trojan analysis tools• View cookie information from unencrypted sites• Working with Burp Suite and Firefox• Perform cross-site scripting (XSS) attacks• Crack passwords for web applications and

websites• Install and configure ManageEngine OpManager• Work with IPSec• Use Enumeration Tools• Perform a Man-in-the-Middle (MITM) attack• Perform offline attacks• Use the Social Engineering Toolkit (SET) in Kali

Linux• Monitor Ports and Processes• Protect files and folders• Perform packet Sniffing• Use the vulnerability scanner MBSA• Perform encryption and hashing• Configuring IDS and honeypots• Reset windows passwords and crack Kerberos

credentials

No prior hands-on experience is required to use or complete this Practice Lab, however it would be beneficial to be familiar with basic networking and security concepts.

OutcomesAfter completing this Practice Lab, students will be able to:

Page 3: Practice Labs Ethical Hacker€¦ · Practice Labs Ethical Hacker Lab Outline The Ethical Hacker Practice Lab certificate is aimed at those working in Cyber Security, Penetration

© 2007 - 2017 I-Qubed Solutions Ltd. T/A Practice Labs Company registered in England Company No. 05939037 VAT No. 900079851

Lab TopologiesYou will also have access to the following topologies:

Practice Labs Ethical Hacker

PLABDC01192.168.0.1/24

PLABDM01192.168.0.2/24

PLABWIN801192.168.0.5

PLABWIN10192.168.0.4

PLABKALI01 192.168.0.3

PLABSA01192.168.0.1

PLABWIN10192.168.0.4

PLABKALI01192.168.0.3

Page 4: Practice Labs Ethical Hacker€¦ · Practice Labs Ethical Hacker Lab Outline The Ethical Hacker Practice Lab certificate is aimed at those working in Cyber Security, Penetration

Performing a Check for Live Systems

IntroductionExercise 1 - Identifying Live SystemsSummary

Performing a Check for Open Ports

IntroductionExercise 1 - Identifying Open PortsSummary

Implementing Scanning Techniques

IntroductionExercise 1 - Scanning Networks using NmapExercise 2 - Scanning Networks using Hping3Summary

OS Fingerprinting

IntroductionExercise 1 - OS FingerprintingSummary

Banner Grabbing

IntroductionExercise 1 - Performing Banner GrabbingSummary

Performing Malware Attacks

IntroductionExercise 1 - Creating a Simple VirusExercise 2 - Determining Open PortsExercise 3 - Tracking Port UsageExercise 4 - Performing Port RedirectionSummary

Implementing Application-level Session Hijacking IntroductionExercise 1 - Viewing Cookie Information from Unencrypted SitesSummary

Hacking Web Applications

IntroductionExercise 1 - Working with Burp Suite and FirefoxExercise 2 - Performing Cross-site Scripting (XSS) AttacksExercise 3 - Cracking Passwords for Web Applications and WebsitesSummary

Modules and Exercises

© 2007 - 2017 I-Qubed Solutions Ltd. T/A Practice Labs Company registered in England Company No. 05939037 VAT No. 900079851

Mapping Networks

IntroductionExercise 1 - Working with Network Diagrams Exercise 2 – Install and Configure ManageEngine OpManagerSummary

Planting a Backdoor

IntroductionExercise 1 - Working with BackdoorSummary

Working with IPSec

IntroductionExercise 1 - Managing IPSec Negotiation PoliciesExercise 2 - Working with Security Association Rules in Windows Firewall with Advanced SecuritySummary

Using Enumeration Tools

IntroductionExercise 1 - Performing Zone TransfersExercise 2 - Working with Remote TargetsExercise 3 - Working with Finger CommandSummary

Implementing Network-level Session Hijacking

IntroductionExercise 1 - Performing Man-in-the-Middle (MITM) AttackSummary

Performing Offline Attacks

IntroductionExercise 1 - Extracting Hashes from a SystemExercise 2 - Cracking Extracted Hashes Exercise 3 - Cracking PasswordsSummary

Conduct Social Engineering Attack

IntroductionExercise 1 - Use the Social Engineering Toolkit (SET) in Kali LinuxSummary

Trojan Protection

Introduction Exercise 1 - Use Malware and Trojan Analysis ToolsExercise 2 - Monitor Ports and ProcessesExercise 3 - Monitor and Protect Files and FoldersSummary

Practice Labs Ethical Hacker

Page 5: Practice Labs Ethical Hacker€¦ · Practice Labs Ethical Hacker Lab Outline The Ethical Hacker Practice Lab certificate is aimed at those working in Cyber Security, Penetration

© 2007 - 2017 I-Qubed Solutions Ltd. T/A Practice Labs Company registered in England Company No. 05939037 VAT No. 900079851

Social Engineering Reconnaissance

IntroductionExercise 1 - Social Engineering ReconnaissanceSummary

Packet Sniffing

IntroductionExercise 1 - Packet Sniffing for PasswordsExercise 2 - Packet Sniffing for Image Capture and ExtractionSummary

Vulnerability Scanner MBSAIntroduction

Exercise 1 - Introduction to Microsoft Baseline Security AnalyserExercise 2 - Implementing RecommendationsExercise 3 - Saving Microsoft Security Baseline Analyzer ReportsExercise 4 - Reviewing Configuration ChangesSummary

Encryption and Hashing

Introduction Exercise 1 - Cryptographic BasicsExercise 2 - Comparing Hashing AlgorithmsExercise 3 - Comparing Hash ValuesSummary

Analyzing Captured Traffic

IntroductionExercise 1 - GeoIP MappingExercise 2 - Packet JumpingExercise 3 - Statistics MenuExercise 4 - Firewall ACL Rule CreationSummary

Configuring IDS and Honeypots

IntroductionExercise 1 - Snort InstallationExercise 2 - Test SnortExercise 3 - Configure and Re-Test SnortSummary

Resetting Windows Passwords

IntroductionExercise 1 - Working with Trinity Rescue Kit (TRK)Summary

Cracking Kerberos

Practice Labs Ethical Hacker