SlideShare a Scribd company logo
1 of 4
Download to read offline
Ethical Hacking and
Countermeasures
Lab Manual
Ethical Hacking and Countermeasures

Exam 312-50 Certified Ethical Hacker

EC-Council
C o p y rig h t © 2 0 1 3 b y E C - C o u 11cil. A ll rights reserved. E x c e p t as p e rm itte d u n d e r th e C o p y rig h t A c t
o f 1976, n o p a rt o f this p u b lic a tio n m a y be re p ro d u c e d o r d is trib u te d
o r stored

111

111

a n y fo r m o r b y a n y m eans,

a database o r re trie v a l system , w ith o u t th e p r io r w r itte n p e rm is s io n o f th e p u b lis h e r,

w ith th e e x c e p tio n th a t th e p ro g ra m listings m a y be e n te re d , sto red , an d execu ted

111

a c o m p u te r

system , b u t th e y m a y n o t be re p ro d u c e d fo r p u b lic a tio n .
In fo r m a tio n has b een o b ta in e d b y E C - C o u n c il fr o m sources b e lie v e d to be reliab le. E C -C o u n c il
uses reasonable en deavo rs to ensure th a t th e c o n te n t is c u rre n t an d accurate, h o w e v e r, because o f
th e p o ss ib ility o t h u m a n o r m e c h a n ic a l e rro r w e d o n o t g uarantee th e accuracy, adequacy, o r
co m p leten ess o t an y in fo rm a tio n and are n o t resp o nsib le fo r an y e rrors o r om issions o r the accuracy
o f th e results o b ta in e d fr o m use o f such in fo rm a tio n .
T h e co ursew are is a resu lt o f extensive research an d c o n trib u tio n s fr o m subject m a tte r experts fr o m
th e fie ld fr o m all o v e r the w o rld . D u e credits fo r all such c o n trib u tio n s and references are g iv e n in
th e

co ursew are

in

th e

research

en d n o tes. W e

are

c o m m itte d

to w a rd s

p ro te c tin g

in te lle c m a l

p ro p e rty . I t y o u are a c o p y rig h t o w n e r (an exclusive licensee o r th e ir a g ent), an d i f y o u believe
th a t an y p a rt o f the co ursew are co nstitu tes an in frin g e m e n t o f c o p y rig h t, o r a b reach o f an agreed
licence o r c o n tra c t, y o u m a y n o tiiy us at le g a l@ e c c o u n c il.o rg .
E C -C o u n c il w ill re m o v e th e m a te ria l

111

111

th e e v e n t o f a ju s tifie d c o m p la in t,

q u e s tio n an d m a k e necessary re c tific a tio n s .

T h e co ursew are m a y c o n ta in referen ces to o th e r in fo rm a tio n resources an d security so lu tion s, b u t
such referen ces sh ould n o t be co n sid ered as an e n d o rs e m e n t o f

01‫ ־‬re c o m m e n d a tio n

b y E C -C o u n c il.

R eaders

an d

to

are

en cou rag ed

to

re p o rt

errors,

om issions

inaccuracies

at le g a l@ e c c o u n c il.o rg .
I f y o u h ave an y issues, please co n ta c t s u p p o rt@ e c c o u n c il.o rg .

Ethical Hacking and Countermeasures
All Rights Reserved. Reproduc

E C -C o u n c il
Ethical Hacking and Countermeasures

Exam 312-50 Certified Ethical Hacker

T a b l e of C o n t e n t s
M odule N tim b er

M odule N am e

Page N o .

01

In tro d u ctio n to E th ic a l H a ck in g

—

02

Fo o tp rin tin g and Reconnaissance

01

03

Scann ing N etw orks

84

04

En u m eratio n

266

05

System H ack in g

307

06

T ro jan s and Backdoors

424

07

V iruses and W orm s

529

08

Sn iffin g

584

09

So cial En g in e e rin g

674

10

D e n ia l o f Service

702

11

Session H ija ck in g

715

12

H a ck in g W ebservers

730

13

H ack in g W eb A p p licatio n s

761

14

S Q L In je ctio n

781

15

H a ck in g W ireless N etw orks

818

16

H a ck in g M o b ile Platform s

—

17

E va d in g ID S , Fire w a lls, and H oneypots

846

18

B u ffe r O verflow

901

19

C ryptography

914

20

Pen etratio n T estin g

—

Ethical Hacking and Countermeasures Copyright © by EC-COUIICil
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures

Exam 312-50 Certified Ethical Hacker

L a b s D V D

DVD

C o n t e n t s

C o n te n ts

01

Lab Prerequisites, Module 02 - Module 04

02

Module 05 - Module 07

03

Module 08 - Module 11

04

Module 12 - Module 14

05

Module 15 - Module 17

06

Module 18 - M odule 20, BackTrack

Ethical Hacking and Countermeasures Copyright © by EC-C0UIICil
All Rights Reserved. Reproduction is Strictly Prohibited.

More Related Content

Viewers also liked

Ceh v8 labs module 14 sql injection
Ceh v8 labs module 14 sql injectionCeh v8 labs module 14 sql injection
Ceh v8 labs module 14 sql injectionMehrdad Jingoism
 
Ceh v8 labs module 02 footprinting and reconnaissance
Ceh v8 labs module 02 footprinting and reconnaissanceCeh v8 labs module 02 footprinting and reconnaissance
Ceh v8 labs module 02 footprinting and reconnaissanceMehrdad Jingoism
 
Ceh v8 labs module 12 hacking webservers
Ceh v8 labs module 12 hacking webserversCeh v8 labs module 12 hacking webservers
Ceh v8 labs module 12 hacking webserversMehrdad Jingoism
 
Ceh v8 labs module 06 trojans and backdoors
Ceh v8 labs module 06 trojans and backdoorsCeh v8 labs module 06 trojans and backdoors
Ceh v8 labs module 06 trojans and backdoorsMehrdad Jingoism
 
Ceh v8 labs module 04 enumeration
Ceh v8 labs module 04 enumerationCeh v8 labs module 04 enumeration
Ceh v8 labs module 04 enumerationMehrdad Jingoism
 
Ceh v8 labs module 18 buffer overflow
Ceh v8 labs module 18 buffer overflowCeh v8 labs module 18 buffer overflow
Ceh v8 labs module 18 buffer overflowMehrdad Jingoism
 
High Speed Parameter Estimation for a Homogenized Energy Model- Doctoral Defe...
High Speed Parameter Estimation for a Homogenized Energy Model- Doctoral Defe...High Speed Parameter Estimation for a Homogenized Energy Model- Doctoral Defe...
High Speed Parameter Estimation for a Homogenized Energy Model- Doctoral Defe...Jon Ernstberger
 
Ceh v8 labs module 17 evading ids, firewalls and honeypots
Ceh v8 labs module 17 evading ids, firewalls and honeypotsCeh v8 labs module 17 evading ids, firewalls and honeypots
Ceh v8 labs module 17 evading ids, firewalls and honeypotsMehrdad Jingoism
 
Ceh v8 labs module 05 system hacking
Ceh v8 labs module 05 system hackingCeh v8 labs module 05 system hacking
Ceh v8 labs module 05 system hackingMehrdad Jingoism
 
Ceh v8 labs module 13 hacking web applications
Ceh v8 labs module 13 hacking web applicationsCeh v8 labs module 13 hacking web applications
Ceh v8 labs module 13 hacking web applicationsMehrdad Jingoism
 
Ceh v8 labs module 07 viruses and worms
Ceh v8 labs module 07 viruses and wormsCeh v8 labs module 07 viruses and worms
Ceh v8 labs module 07 viruses and wormsMehrdad Jingoism
 

Viewers also liked (14)

Ce hv8 module 00
Ce hv8 module 00Ce hv8 module 00
Ce hv8 module 00
 
Ceh v8 labs module 14 sql injection
Ceh v8 labs module 14 sql injectionCeh v8 labs module 14 sql injection
Ceh v8 labs module 14 sql injection
 
Ceh v8 labs module 02 footprinting and reconnaissance
Ceh v8 labs module 02 footprinting and reconnaissanceCeh v8 labs module 02 footprinting and reconnaissance
Ceh v8 labs module 02 footprinting and reconnaissance
 
Ceh v8 labs module 12 hacking webservers
Ceh v8 labs module 12 hacking webserversCeh v8 labs module 12 hacking webservers
Ceh v8 labs module 12 hacking webservers
 
Ceh v8 labs module 06 trojans and backdoors
Ceh v8 labs module 06 trojans and backdoorsCeh v8 labs module 06 trojans and backdoors
Ceh v8 labs module 06 trojans and backdoors
 
Ceh v8 labs module 04 enumeration
Ceh v8 labs module 04 enumerationCeh v8 labs module 04 enumeration
Ceh v8 labs module 04 enumeration
 
Ceh v8 labs module 18 buffer overflow
Ceh v8 labs module 18 buffer overflowCeh v8 labs module 18 buffer overflow
Ceh v8 labs module 18 buffer overflow
 
Proyecto manhattan
Proyecto manhattanProyecto manhattan
Proyecto manhattan
 
High Speed Parameter Estimation for a Homogenized Energy Model- Doctoral Defe...
High Speed Parameter Estimation for a Homogenized Energy Model- Doctoral Defe...High Speed Parameter Estimation for a Homogenized Energy Model- Doctoral Defe...
High Speed Parameter Estimation for a Homogenized Energy Model- Doctoral Defe...
 
Ceh v8 labs module 17 evading ids, firewalls and honeypots
Ceh v8 labs module 17 evading ids, firewalls and honeypotsCeh v8 labs module 17 evading ids, firewalls and honeypots
Ceh v8 labs module 17 evading ids, firewalls and honeypots
 
Ceh v8 labs module 05 system hacking
Ceh v8 labs module 05 system hackingCeh v8 labs module 05 system hacking
Ceh v8 labs module 05 system hacking
 
Legacy Project
Legacy ProjectLegacy Project
Legacy Project
 
Ceh v8 labs module 13 hacking web applications
Ceh v8 labs module 13 hacking web applicationsCeh v8 labs module 13 hacking web applications
Ceh v8 labs module 13 hacking web applications
 
Ceh v8 labs module 07 viruses and worms
Ceh v8 labs module 07 viruses and wormsCeh v8 labs module 07 viruses and worms
Ceh v8 labs module 07 viruses and worms
 

Similar to EC-312 Ethical Hacking Lab Manual

4th OpenAIRE Workshop, Nils Dietrich
4th OpenAIRE Workshop, Nils Dietrich4th OpenAIRE Workshop, Nils Dietrich
4th OpenAIRE Workshop, Nils DietrichOpenAIRE
 
Jm future of system verilog verification
Jm future of system verilog verificationJm future of system verilog verification
Jm future of system verilog verificationObsidian Software
 
Congresso Crimes Eletrônicos, 08/03/2009 - Apresentação Ghassan Dreibi
Congresso Crimes Eletrônicos, 08/03/2009 - Apresentação Ghassan DreibiCongresso Crimes Eletrônicos, 08/03/2009 - Apresentação Ghassan Dreibi
Congresso Crimes Eletrônicos, 08/03/2009 - Apresentação Ghassan DreibiFecomercioSP
 
Customer_Testimonial_IFFCO.pdf
Customer_Testimonial_IFFCO.pdfCustomer_Testimonial_IFFCO.pdf
Customer_Testimonial_IFFCO.pdfPRASHANTJUNNARKAR
 
Lodestar Investor Presentation V4.pdf
Lodestar Investor Presentation V4.pdfLodestar Investor Presentation V4.pdf
Lodestar Investor Presentation V4.pdfAdnet Communications
 
Hacking web applications CEHv8 module 13
Hacking web applications CEHv8 module 13Hacking web applications CEHv8 module 13
Hacking web applications CEHv8 module 13Wise Person
 
Ceh v8 labs module 10 denial of service
Ceh v8 labs module 10 denial of serviceCeh v8 labs module 10 denial of service
Ceh v8 labs module 10 denial of serviceMehrdad Jingoism
 
Ceh v8 labs module 11 session hijacking
Ceh v8 labs module 11 session hijackingCeh v8 labs module 11 session hijacking
Ceh v8 labs module 11 session hijackingAsep Sopyan
 
Supervising management board culture, by Kroese brands & behaviour
Supervising management board culture, by Kroese brands & behaviourSupervising management board culture, by Kroese brands & behaviour
Supervising management board culture, by Kroese brands & behaviourKroese brands & behaviour
 
ISTE 2012 - Digital Citizenship and MyBigCampus
ISTE 2012 - Digital Citizenship and MyBigCampusISTE 2012 - Digital Citizenship and MyBigCampus
ISTE 2012 - Digital Citizenship and MyBigCampusStaci Trekles
 
Kostogryzov-for china-2013
 Kostogryzov-for china-2013 Kostogryzov-for china-2013
Kostogryzov-for china-2013Mathmodels Net
 
Maurizio_Taffone_Emerging_Security_Threats
Maurizio_Taffone_Emerging_Security_ThreatsMaurizio_Taffone_Emerging_Security_Threats
Maurizio_Taffone_Emerging_Security_ThreatsMaurizio Taffone
 
A Deep Dive into the Socio-Technical Aspects of Delays in Security Patching
A Deep Dive into the Socio-Technical Aspects of Delays in Security PatchingA Deep Dive into the Socio-Technical Aspects of Delays in Security Patching
A Deep Dive into the Socio-Technical Aspects of Delays in Security PatchingCREST @ University of Adelaide
 
Mixing it up: Developing and implementing a tagging system for a content-rich...
Mixing it up: Developing and implementing a tagging system for a content-rich...Mixing it up: Developing and implementing a tagging system for a content-rich...
Mixing it up: Developing and implementing a tagging system for a content-rich...Andrew Lewis
 
Introduction to Energy Efficiency, EMS and Energy Audit
Introduction to Energy Efficiency, EMS and Energy AuditIntroduction to Energy Efficiency, EMS and Energy Audit
Introduction to Energy Efficiency, EMS and Energy Auditeecfncci
 
HOW TO TOKENIZE: PROCESS, POSSIBILITIES AND CHALLENGES
HOW TO TOKENIZE: PROCESS, POSSIBILITIES AND CHALLENGESHOW TO TOKENIZE: PROCESS, POSSIBILITIES AND CHALLENGES
HOW TO TOKENIZE: PROCESS, POSSIBILITIES AND CHALLENGESLiveplex
 
Immigration Compliance: How to keep the Government from knocking on the Door?
Immigration Compliance: How to keep the Government from knocking on the Door?Immigration Compliance: How to keep the Government from knocking on the Door?
Immigration Compliance: How to keep the Government from knocking on the Door?jvelie
 
JADAPIIS0002817778650255
JADAPIIS0002817778650255JADAPIIS0002817778650255
JADAPIIS0002817778650255David Dolkart
 

Similar to EC-312 Ethical Hacking Lab Manual (20)

4th OpenAIRE Workshop, Nils Dietrich
4th OpenAIRE Workshop, Nils Dietrich4th OpenAIRE Workshop, Nils Dietrich
4th OpenAIRE Workshop, Nils Dietrich
 
Jm future of system verilog verification
Jm future of system verilog verificationJm future of system verilog verification
Jm future of system verilog verification
 
Safe To Play Whitepaper
Safe To  Play WhitepaperSafe To  Play Whitepaper
Safe To Play Whitepaper
 
Congresso Crimes Eletrônicos, 08/03/2009 - Apresentação Ghassan Dreibi
Congresso Crimes Eletrônicos, 08/03/2009 - Apresentação Ghassan DreibiCongresso Crimes Eletrônicos, 08/03/2009 - Apresentação Ghassan Dreibi
Congresso Crimes Eletrônicos, 08/03/2009 - Apresentação Ghassan Dreibi
 
Customer_Testimonial_IFFCO.pdf
Customer_Testimonial_IFFCO.pdfCustomer_Testimonial_IFFCO.pdf
Customer_Testimonial_IFFCO.pdf
 
Lodestar Investor Presentation V4.pdf
Lodestar Investor Presentation V4.pdfLodestar Investor Presentation V4.pdf
Lodestar Investor Presentation V4.pdf
 
Hacking web applications CEHv8 module 13
Hacking web applications CEHv8 module 13Hacking web applications CEHv8 module 13
Hacking web applications CEHv8 module 13
 
Ceh v8 labs module 10 denial of service
Ceh v8 labs module 10 denial of serviceCeh v8 labs module 10 denial of service
Ceh v8 labs module 10 denial of service
 
Ceh v8 labs module 11 session hijacking
Ceh v8 labs module 11 session hijackingCeh v8 labs module 11 session hijacking
Ceh v8 labs module 11 session hijacking
 
Supervising management board culture, by Kroese brands & behaviour
Supervising management board culture, by Kroese brands & behaviourSupervising management board culture, by Kroese brands & behaviour
Supervising management board culture, by Kroese brands & behaviour
 
Research and Development in Roof-Top Solar Potentiality Using LiDAR Technology
Research and Development in Roof-Top Solar Potentiality Using LiDAR TechnologyResearch and Development in Roof-Top Solar Potentiality Using LiDAR Technology
Research and Development in Roof-Top Solar Potentiality Using LiDAR Technology
 
ISTE 2012 - Digital Citizenship and MyBigCampus
ISTE 2012 - Digital Citizenship and MyBigCampusISTE 2012 - Digital Citizenship and MyBigCampus
ISTE 2012 - Digital Citizenship and MyBigCampus
 
Kostogryzov-for china-2013
 Kostogryzov-for china-2013 Kostogryzov-for china-2013
Kostogryzov-for china-2013
 
Maurizio_Taffone_Emerging_Security_Threats
Maurizio_Taffone_Emerging_Security_ThreatsMaurizio_Taffone_Emerging_Security_Threats
Maurizio_Taffone_Emerging_Security_Threats
 
A Deep Dive into the Socio-Technical Aspects of Delays in Security Patching
A Deep Dive into the Socio-Technical Aspects of Delays in Security PatchingA Deep Dive into the Socio-Technical Aspects of Delays in Security Patching
A Deep Dive into the Socio-Technical Aspects of Delays in Security Patching
 
Mixing it up: Developing and implementing a tagging system for a content-rich...
Mixing it up: Developing and implementing a tagging system for a content-rich...Mixing it up: Developing and implementing a tagging system for a content-rich...
Mixing it up: Developing and implementing a tagging system for a content-rich...
 
Introduction to Energy Efficiency, EMS and Energy Audit
Introduction to Energy Efficiency, EMS and Energy AuditIntroduction to Energy Efficiency, EMS and Energy Audit
Introduction to Energy Efficiency, EMS and Energy Audit
 
HOW TO TOKENIZE: PROCESS, POSSIBILITIES AND CHALLENGES
HOW TO TOKENIZE: PROCESS, POSSIBILITIES AND CHALLENGESHOW TO TOKENIZE: PROCESS, POSSIBILITIES AND CHALLENGES
HOW TO TOKENIZE: PROCESS, POSSIBILITIES AND CHALLENGES
 
Immigration Compliance: How to keep the Government from knocking on the Door?
Immigration Compliance: How to keep the Government from knocking on the Door?Immigration Compliance: How to keep the Government from knocking on the Door?
Immigration Compliance: How to keep the Government from knocking on the Door?
 
JADAPIIS0002817778650255
JADAPIIS0002817778650255JADAPIIS0002817778650255
JADAPIIS0002817778650255
 

Recently uploaded

Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 

Recently uploaded (20)

Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 

EC-312 Ethical Hacking Lab Manual

  • 2. Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker EC-Council C o p y rig h t © 2 0 1 3 b y E C - C o u 11cil. A ll rights reserved. E x c e p t as p e rm itte d u n d e r th e C o p y rig h t A c t o f 1976, n o p a rt o f this p u b lic a tio n m a y be re p ro d u c e d o r d is trib u te d o r stored 111 111 a n y fo r m o r b y a n y m eans, a database o r re trie v a l system , w ith o u t th e p r io r w r itte n p e rm is s io n o f th e p u b lis h e r, w ith th e e x c e p tio n th a t th e p ro g ra m listings m a y be e n te re d , sto red , an d execu ted 111 a c o m p u te r system , b u t th e y m a y n o t be re p ro d u c e d fo r p u b lic a tio n . In fo r m a tio n has b een o b ta in e d b y E C - C o u n c il fr o m sources b e lie v e d to be reliab le. E C -C o u n c il uses reasonable en deavo rs to ensure th a t th e c o n te n t is c u rre n t an d accurate, h o w e v e r, because o f th e p o ss ib ility o t h u m a n o r m e c h a n ic a l e rro r w e d o n o t g uarantee th e accuracy, adequacy, o r co m p leten ess o t an y in fo rm a tio n and are n o t resp o nsib le fo r an y e rrors o r om issions o r the accuracy o f th e results o b ta in e d fr o m use o f such in fo rm a tio n . T h e co ursew are is a resu lt o f extensive research an d c o n trib u tio n s fr o m subject m a tte r experts fr o m th e fie ld fr o m all o v e r the w o rld . D u e credits fo r all such c o n trib u tio n s and references are g iv e n in th e co ursew are in th e research en d n o tes. W e are c o m m itte d to w a rd s p ro te c tin g in te lle c m a l p ro p e rty . I t y o u are a c o p y rig h t o w n e r (an exclusive licensee o r th e ir a g ent), an d i f y o u believe th a t an y p a rt o f the co ursew are co nstitu tes an in frin g e m e n t o f c o p y rig h t, o r a b reach o f an agreed licence o r c o n tra c t, y o u m a y n o tiiy us at le g a l@ e c c o u n c il.o rg . E C -C o u n c il w ill re m o v e th e m a te ria l 111 111 th e e v e n t o f a ju s tifie d c o m p la in t, q u e s tio n an d m a k e necessary re c tific a tio n s . T h e co ursew are m a y c o n ta in referen ces to o th e r in fo rm a tio n resources an d security so lu tion s, b u t such referen ces sh ould n o t be co n sid ered as an e n d o rs e m e n t o f 01‫ ־‬re c o m m e n d a tio n b y E C -C o u n c il. R eaders an d to are en cou rag ed to re p o rt errors, om issions inaccuracies at le g a l@ e c c o u n c il.o rg . I f y o u h ave an y issues, please co n ta c t s u p p o rt@ e c c o u n c il.o rg . Ethical Hacking and Countermeasures All Rights Reserved. Reproduc E C -C o u n c il
  • 3. Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker T a b l e of C o n t e n t s M odule N tim b er M odule N am e Page N o . 01 In tro d u ctio n to E th ic a l H a ck in g — 02 Fo o tp rin tin g and Reconnaissance 01 03 Scann ing N etw orks 84 04 En u m eratio n 266 05 System H ack in g 307 06 T ro jan s and Backdoors 424 07 V iruses and W orm s 529 08 Sn iffin g 584 09 So cial En g in e e rin g 674 10 D e n ia l o f Service 702 11 Session H ija ck in g 715 12 H a ck in g W ebservers 730 13 H ack in g W eb A p p licatio n s 761 14 S Q L In je ctio n 781 15 H a ck in g W ireless N etw orks 818 16 H a ck in g M o b ile Platform s — 17 E va d in g ID S , Fire w a lls, and H oneypots 846 18 B u ffe r O verflow 901 19 C ryptography 914 20 Pen etratio n T estin g — Ethical Hacking and Countermeasures Copyright © by EC-COUIICil All Rights Reserved. Reproduction is Strictly Prohibited.
  • 4. Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker L a b s D V D DVD C o n t e n t s C o n te n ts 01 Lab Prerequisites, Module 02 - Module 04 02 Module 05 - Module 07 03 Module 08 - Module 11 04 Module 12 - Module 14 05 Module 15 - Module 17 06 Module 18 - M odule 20, BackTrack Ethical Hacking and Countermeasures Copyright © by EC-C0UIICil All Rights Reserved. Reproduction is Strictly Prohibited.