Ethical Hacking And Countermeasures

3y ago
169 Views
30 Downloads
1.26 MB
67 Pages
Last View : 3d ago
Last Download : 3m ago
Upload by : Mya Leung
Transcription

Ethical Hacking and CountermeasuresVersion Change DocumentExam 312-50 Certified Ethical HackerEthical Hacking and CountermeasuresVersion ComparisonCEHv10CEHv112020Total Number of Slides15001640Total Number of Labs140200-923404202285 (Approx.)3500 (Approx.)IoTOT Technology, ServerlessComputing, WPA3 Encryption,APT, Fileless Malware, WebAPI, and Web ShellWindows 10, Windows Server2016, Windows Server 2012,Kali Linux 2017.3, Windows8.1, Android, Ubuntu LinuxWindows 10, Windows Server2019, Windows Server 2016,Parrot Security, Android,Ubuntu Linux125 Questions (MCQ)125 Questions (MCQ)Exam Duration4 Hours4 HoursExam DeliveryVUE / ECCEXAMVUE / ECCEXAMNICE 2.0 Draft FrameworkFinal NICE 2.0 FrameworkTotal Number of ModulesTotal Number of New LabsAttack TechniquesTotal Number of ToolsNew Technology AddedOS Used for LabsExamNICE CompliancePage 1Ethical Hacking and Countermeasures Copyright by EC-CouncilAll Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and CountermeasuresVersion Change DocumentExam 312-50 Certified Ethical HackerCEHv11 Change Summary1. The Module 18: IoT and OT Hacking is a completely modified module in CEHv11 whichinclues OT hacking (OT concepts, attacks, hacking methodology, hacking tools, andcountermeasures)2. The Module 19: Cloud Computing is a completely modified module in CEHv11 whichinclues container technology, serverless computing, and cloud hacking methodology3. The Module 14: Hacking Web Applications module includes web API, webhooks and webshell concepts, web API hacking methodology, and web API security in CEHv114. The Module 06: System Hacking module includes vulnerability exploitation (bufferoverflow) in CEHv115. The Module 07: Malware Threats module includes APT and fileless malware concepts inCEHv116. The Module 04: Enumeration module includes NFS, Telnet, SMB, FTP, TFTP, IPv6, andBGP enumeration techniques in CEHv117. Update information as per the latest developments with a proper flow8. Latest OS covered and a patched testing environment9. All the tool screenshots are replaced with the latest version10. All the tool listing slides are updated with the latest toolsPage 2Ethical Hacking and Countermeasures Copyright by EC-CouncilAll Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and CountermeasuresVersion Change DocumentExam 312-50 Certified Ethical HackerModule ComparisonCEHv10CEHv11Module 01: Introduction to Ethical HackingModule 01: Introduction to Ethical HackingModule 02: Footprinting andReconnaissanceModule 02: Footprinting andReconnaissanceModule 03: Scanning NetworksModule 03: Scanning NetworksModule 04: EnumerationModule 04: EnumerationModule 05: Vulnerability AnalysisModule 05: Vulnerability AnalysisModule 06: System HackingModule 06: System HackingModule 07: Malware ThreatsModule 07: Malware ThreatsModule 08: SniffingModule 08: SniffingModule 09: Social EngineeringModule 09: Social EngineeringModule 10: Denial-of-ServiceModule 10: Denial-of-ServiceModule 11: Session HijackingModule 11: Session HijackingModule 12: Evading IDS, Firewalls, andHoneypotsModule 12: Evading IDS, Firewalls, andHoneypotsModule 13: Hacking Web ServersModule 13: Hacking Web ServersModule 14: Hacking Web ApplicationsModule 14: Hacking Web ApplicationsModule 15: SQL InjectionModule 15: SQL InjectionModule 16: Hacking Wireless NetworksModule 16: Hacking Wireless NetworksModule 17: Hacking Mobile PlatformsModule 17: Hacking Mobile PlatformsModule 18: IoT HackingModule 18: IoT and OT HackingModule 19: Cloud ComputingModule 19: Cloud ComputingModule 20: CryptographyModule 20: CryptographyPage 3Ethical Hacking and Countermeasures Copyright by EC-CouncilAll Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and CountermeasuresVersion Change DocumentExam 312-50 Certified Ethical HackerCourseware Content ComparisonThe notations used:1. Red points are new slides in CEHv112. Blue points are substantially modified in CEHv113. Striked points are removed from CEHv104.Striked points are moved to self study module in CEHv11CEHv10CEHv11Module 01: Introduction to Ethical HackingModule 01: Introduction to Ethical HackingInformation Security OverviewInformation Security Overview Internet is Integral Part of Business and PersonalLife - What Happens Online in 60 Seconds Elements of Information Security Essential Terminology Motives, Goals, and Objectives of InformationSecurity Attacks Elements of Information Security Classification of Attacks The Security, Functionality, and Usability Triangle Information WarfareInformation Security Threats and Attack VectorsCyber Kill Chain Concepts Motives, Goals, and Objectives of InformationSecurity Attacks Cyber Kill Chain Methodology Top Information Security Attack Vectors Tactics, Techniques, and Procedures (TTPs) Information Security Threat Categories Adversary Behavioral Identification Types of Attacks on a System Indicators of Compromise (IoCs) Information Warfareo Categories of Indicators of CompromiseHacking ConceptsHacking Concepts What is Hacking? What is Hacking? Who is a Hacker? Who is a Hacker? Hacker Classes Hacker Classes Hacking Phases Hacking Phaseso Reconnaissanceo Reconnaissanceo Scanningo Scanningo Gaining Accesso Gaining Accesso Maintaining Accesso Maintaining Accesso Clearing Trackso Clearing TracksEthical Hacking ConceptsEthical Hacking Concepts What is Ethical Hacking? What is Ethical Hacking? Why Ethical Hacking is Necessary Why Ethical Hacking is Necessary Scope and Limitations of Ethical Hacking Scope and Limitations of Ethical HackingPage 4Ethical Hacking and Countermeasures Copyright by EC-CouncilAll Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and CountermeasuresVersion Change Document Skills of an Ethical HackerInformation Security ControlsExam 312-50 Certified Ethical Hacker Skills of an Ethical HackerInformation Security Controls Information Assurance (IA) Information Assurance (IA) Information Security Management Program Defense-in-Depth Enterprise Information Security Architecture(EISA) What is Risk? Network Security Zoningo Risk Management Defense-in-Depth Cyber Threat Intelligence Information Security Policies Threat Modelingo Types of Security Policies Incident Managemento Examples of Security Policieso Incident Handling and Responseo Privacy Policies at Workplace Role of AI and ML in Cyber Securityo Steps to Create and Implement SecurityPolicieso HR/Legal Implications of Security PolicyEnforcement Physical Securityo How Do AI and ML Prevent Cyber Attacks?Information Security Laws and Standards Payment Card Industry Data Security Standard(PCI DSS)o Types of Physical Security Control ISO/IEC 27001:2013o Physical Security Controls Health Insurance Portability and AccountabilityAct (HIPAA) What is Risk? Sarbanes Oxley Act (SOX)o Risk Management The Digital Millennium Copyright Act (DMCA)o Key Roles and Responsibilities in RiskManagement The Federal Information Security Management Act(FISMA) Threat Modeling Cyber Law in Different Countries Incident Managemento Incident Management Processo Responsibilities of an Incident Response Team Security Incident and Event Management (SIEM)o SIEM Architecture User Behavior Analytics (UBA) Network Security Controlso Access Controlo Types of Access Controlo User Identification, Authentication,Authorization and Accounting Identity and Access Management (IAM) Data Leakageo Data Leakage ThreatsPage 5Ethical Hacking and Countermeasures Copyright by EC-CouncilAll Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and CountermeasuresVersion Change DocumentExam 312-50 Certified Ethical Hackero What is Data Loss Prevention (DLP)? Data Backup Data Recovery Role of AI/ML in Cyber SecurityPenetration Testing Concepts Penetration Testing Why Penetration Testing Comparing Security Audit, VulnerabilityAssessment, and Penetration Testing Blue Teaming/Red Teaming Types of Penetration Testing Phases of Penetration Testing Security Testing MethodologyInformation Security Laws and Standards Payment Card Industry Data Security Standard(PCI-DSS) ISO/IEC 27001:2013 Health Insurance Portability and AccountabilityAct (HIPAA) Sarbanes Oxley Act (SOX) The Digital Millennium Copyright Act (DMCA) Federal Information Security Management Act(FISMA) Cyber Law in Different CountriesModule 02: Footprinting and ReconnaissanceModule 02: Footprinting and ReconnaissanceFootprinting ConceptsFootprinting Concepts What is Footprinting? What is Footprinting? Objectives of FootprintingFootprinting through Search EnginesFootprinting through Search Engines Footprinting through Search Engines Footprinting through Search Engines Footprint Using Advanced Google HackingTechniques Footprint Using Advanced Google HackingTechniques Google Hacking Database Information Gathering Using Google AdvancedSearch and Image Search VoIP and VPN Footprinting through GoogleHacking Database Google Hacking Database Other Techniques for Footprinting through SearchEngines VoIP and VPN Footprinting through GoogleHacking Databaseo Gathering Information Using Google AdvancedSearch and Advanced Image SearchFootprinting through Web Serviceso Gathering Information Using Reverse ImagePage 6Ethical Hacking and Countermeasures Copyright by EC-CouncilAll Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and CountermeasuresVersion Change DocumentExam 312-50 Certified Ethical HackerSearch Finding Company’s Top-level Domains (TLDs) andSub-domainso Gathering Information Using Video SearchEngines Finding the Geographical Location of the Targeto Gathering Information Using Meta SearchEngines People Search on Social Networking Sites andPeople Search Serviceso Gathering Information Using FTP SearchEngines Gathering Information from LinkedIno Gathering Information Using IoT SearchEngines Gather Information from Financial ServicesFootprinting through Web Services Footprinting through Job Sites Finding a Company’s Top-Level Domains (TLDs)and Sub-domains Monitoring Target Using Alerts Finding the Geographical Location of the Target Information Gathering Using Groups, Forums, andBlogs People Search on Social Networking Sites andPeople Search Services Determining the Operating System Gathering Information from LinkedIn VoIP and VPN Footprinting through SHODAN Harvesting Email ListsFootprinting through Social Networking Sites Gather Information from Financial Services Collecting Information through Social Engineeringon Social Networking Sites Footprinting through Job SitesWebsite Footprinting Deep and Dark Web Footprinting Website Footprinting Determining the Operating System Website Footprinting using Web Spiders VoIP and VPN Footprinting through SHODAN Mirroring Entire Website Competitive Intelligence Gathering Extracting Website Information fromhttps://archive.orgo Competitive Intelligence - When Did thisCompany Begin? How Did it Develop? Extracting Metadata of Public Documentso Competitive Intelligence - What Are theCompany's Plans? Monitoring Web Pages for Updates and Changeso Competitive Intelligence - What ExpertOpinions Say About the CompanyEmail Footprinting Other Techniques for Footprinting through WebServices Tracking Email Communicationso Information Gathering Using Business ProfileSites Collecting Information from Email Headero Monitoring Target Using Alerts Email Tracking Toolso Tracking Online Reputation of the TargetCompetitive Intelligenceo Information Gathering Using Groups, Forums,and Blogs Competitive Intelligence Gatheringo Information Gathering Using NNTP UsenetNewsgroups Competitive Intelligence - When Did this CompanyBegin? How Did it Develop?Footprinting through Social Networking Sites Competitive Intelligence - What Are the Collecting Information through Social EngineeringPage 7Ethical Hacking and Countermeasures Copyright by EC-CouncilAll Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and CountermeasuresVersion Change DocumentCompany's Plans?Exam 312-50 Certified Ethical Hackeron Social Networking Sites Competitive Intelligence - What Expert OpinionsSay About the Company General Resources for Locating Information fromSocial Media Sites Monitoring Website Traffic of Target Company Conducting Location Search on Social Media Sites Tracking Online Reputation of the Target Tools for Footprinting through Social NetworkingSitesWhois FootprintingWebsite Footprinting Whois Lookup Website Footprinting Whois Lookup Result Analysis Website Footprinting using Web Spiders Whois Lookup Tools Mirroring Entire Website Finding IP Geolocation Information Extracting Website Information fromhttps://archive.orgDNS Footprinting Extracting Website Links Extracting DNS Information Gathering Wordlist from the Target Website DNS Interrogation Tools Extracting Metadata of Public DocumentsNetwork Footprinting Other Techniques for Website Footprinting Locate the Network Rangeo Monitoring Web Pages for Updates andChanges Tracerouteo Searching for Contact Information, EmailAddresses and Telephone Numbers fromCompany Website Traceroute Analysiso Searching for Web Pages Posting Patterns andRevision Numbers Traceroute Toolso Monitoring Website Traffic of Target CompanyFootprinting through Social EngineeringEmail Footprinting Footprinting through Social Engineering Tracking Email Communications Collect Information Using Eavesdropping,Shoulder Surfing, and Dumpster Diving Email Tracking ToolsFootprinting ToolsWhois Footprinting Maltego Whois Lookup Recon-ng Finding IP Geolocation Information FOCADNS Footprinting Recon-Dog Extracting DNS Information OSRFramework Reverse DNS Lookup Additional Footprinting ToolsNetwork FootprintingCountermeasures Locate the Network Range Footprinting Countermeasures TracerouteFootprinting Pen Testing Traceroute Analysis Footprinting Pen Testing Traceroute Tools Footprinting Pen Testing Report TemplatesFootprinting through Social Engineering Footprinting through Social EngineeringPage 8Ethical Hacking and Countermeasures Copyright by EC-CouncilAll Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and CountermeasuresVersion Change DocumentExam 312-50 Certified Ethical Hacker Collect Information Using Eavesdropping,Shoulder Surfing, Dumpster Diving, andImpersonationFootprinting Tools Maltego Recon-ng FOCA OSRFramework OSINT Framework Recon-Dog BillCipherFootprinting Countermeasures Footprinting CountermeasuresModule 03: Scanning NetworksModule 03: Scanning NetworksNetwork Scanning ConceptsNetwork Scanning Concepts Overview of Network Scanning Overview of Network Scanning TCP Communication Flags TCP Communication Flags TCP/IP Communication TCP/IP Communication Creating Custom Packet Using TCP FlagsScanning Tools Scanning in IPv6 Networks NmapScanning Tools Hping2/Hping3 Nmap Hping2 / Hping3o Hping Commandso Hping Commands Scanning Tools Scanning Tools for Mobile Scanning ToolsHost Discovery Scanning Tools for Mobile Host Discovery TechniquesScanning Techniqueso ARP Ping Scan and UDP Ping Scan Scanning Techniqueso ICMP ECHO Ping Scano ICMP Scanning - Checking for Live Systemso Ping Sweep - Checking for Live Systemso ICMP ECHO Ping Sweep Ping Sweep Tools Ping Sweep Tools Ping Sweep Countermeasureso ICMP Echo Scanningo Other Host Discovery Techniqueso TCP Connect / Full Open Scan ICMP Timestamp and Address MaskPing Scano Stealth Scan (Half-open Scan) TCP Ping Scano Inverse TCP Flag Scanning TCP SYN Ping Scano Xmas Scan TCP ACK Ping Scano ACK Flag Probe ScanningPage 9 IP Protocol Ping ScanEthical Hacking and Countermeasures Copyright by EC-CouncilAll Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and CountermeasuresVersion Change DocumentExam 312-50 Certified Ethical Hackero IDLE/IPID Header ScanPort and Service Discoveryo UDP Scanning Port Scanning Techniqueso SSDP and List Scanningo TCP Scanning Port Scanning Countermeasures TCP Connect/Full Open ScanScanning Beyond IDS and Firewall Stealth Scan (Half-open Scan) IDS/Firewall Evasion Techniques Inverse TCP Flag Scano Packet Fragmentation Xmas Scano Source Routing TCP Maimon Scano IP Address Decoy ACK Flag Probe Scano IP Address Spoofing IDLE/IPID Header Scan IP Spoofing Detection Techniques: DirectTTL Probeso UDP Scanning IP Spoofing Detection Techniques: IPIdentification Numbero SCTP Scanning IP Spoofing Detection Techniques: TCP FlowControl Method SCTP INIT Scanning IP Spoofing Countermeasures SCTP COOKIE ECHO Scanningo Proxy Servers Proxy Chainingo SSDP and List Scanningo IPv6 Scanning Proxy Tools Service Version Discovery Proxy Tools for Mobile Nmap Scan Time Reduction Techniqueso Anonymizers Port Scanning Countermeasures Censorship Circumvention Tools: Alkasirand TailsOS Discovery (Banner Grabbing/OS Fingerprinting) Anonymizers OS Discovery/Banner Grabbing Anonymizers for Mobile How to Identify Target System OSBanner Grabbingo OS Discovery using Wireshark Banner Grabbingo OS Discovery using Nmap and Unicornscan How to Identify Target System OSo OS Discovery using Nmap Script Engine Banner Grabbing Countermeasureso OS Discovery using IPv6 FingerprintingDraw Network Diagrams Banner Grabbing Countermeasures Drawing Network DiagramsScanning Beyond IDS and Firewall Network Discovery and Mapping Tools IDS/Firewall Evasion Techniques Network Discovery Tools for Mobileo Packet FragmentationScanning Pen Testingo Source Routing Scanning Pen Testingo Source Port Manipulationo IP Address Decoyo IP Address Spoofing IP Spoofing Detection Techniques: DirectPage 10Ethical Hacking and Countermeasures Copyright by EC-CouncilAll Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and CountermeasuresVersion Change DocumentExam 312-50 Certified Ethical HackerTTL Probes IP Spoofing Detection Techniques: IPIdentification Number IP Spoofing Detection Techniques: TCP FlowControl Method IP Spoofing Countermeasureso Creating Custom Packets Using Packet Crafting Tools Appending Custom Binary Data Appending Custom String Appending Random Datao Randomizing Host Order and Sending BadChecksumso Proxy Servers Proxy Chaining Proxy Tools Proxy Tools for Mobileo Anonymizers Censorship CircumventionTools: Alkasir and Tails Anonymizers Anonymizers for MobileDraw Network Diagrams Drawing Network Diagrams Network Discovery and Mapping Tools Network Discovery Tools for MobileModule 04: EnumerationModule 04: EnumerationEnumeration ConceptsEnumeration Concepts What is Enumeration? What is Enumeration? Techniques for Enumeration Techniques for Enumeration Services and Ports to Enumerate Services and Ports to EnumerateNetBIOS EnumerationNetBIOS Enumeration NetBIOS Enumeration NetBIOS Enumeration NetBIOS Enumeration Tools NetBIOS Enumeration Tools Enumerating User Accounts Enumerating User Accounts Enumerating Shared Resources Using Net View Enumerating Shared Resources Using Net ViewSNMP EnumerationSNMP Enumeration SNMP (Simple Network Management Protocol) SNMP (Simple Network Management Protocol)Page 11Ethical Hacking and Countermeasures Copyright by EC-CouncilAll Rights Reserved. Reproduction is Strictly Prohibited.

Ethical Hacking and CountermeasuresVersion Change DocumentExam 312-50 Certified Ethical HackerEnumerationEnumeration Working of SNMP Working of SNMP Management Information Base (MIB) Management Information Base (MIB) SNMP Enumeration Tools SNMP Enumeration ToolsLDAP EnumerationLDAP Enumeration LDAP Enumeration LDAP Enumeration LDAP Enumeration Tools LDAP Enumeration ToolsNTP EnumerationNTP and NFS Enumeration NTP Enumeration NTP Enumeration NTP Enumeration Commands NTP Enumeration Commands NTP Enumeration Tools NTP Enumeration ToolsSMTP and DNS Enumeration NFS Enumeration SMTP En

CEHv11 Change Summary 1. The Module 18: IoT and OT Hacking is a completely modified module in CEHv11 which inclues OT hacking (OT concepts, attacks, hacking methodology, hacking tools, and countermeasures) 2. The Module 19: Cloud Computing is a completely modified module in CEHv11 which

Related Documents:

Hacking Concepts 1.10 What is Hacking? 1.11Who is a Hacker? 1.12 Hacker Classes 1.13 Hacking Phases o Reconnaissance o Scanning o Gaining Access o Maintaining Access o Clearing Tracks Ethical Hacking Concepts 1.14 What is Ethical Hacking? 1.15 Why Ethical Hacking is Necessary 1.16 Scope and Limitations of Ethical Hacking

private sectors is ethical hacking. Hacking and Ethical Hacking Ethical hacking can be conceptualized through three disciplinary perspectives: ethical, technical, and management. First, from a broad sociocultural perspective, ethical hacking can be understood on ethical terms, by the intentions of hackers. In a broad brush, ethical

Ethical Hacking and Countermeasures 45,000 for a standalone ethical hack. Taxes and applicable travel and living expenses are extra. Note: Excerpts taken from Ethical Hacking by C.C Palmer. Certified Ethical Hacker Certification If you want to stop hackers from invad

Benefits of Ethical Hacking Topic 1: Ethical Hacking Discuss the main benefits and risks of ethical hacking. Provide examples and/or details to support your ideas. If you have seen examples of ethical hacking, please share thes

what is ethical hacking?-what is hacking and it's intent?-what determines if a person is a hacker? - what is ethical hacking?-in what ways can hackers gain unauthorized access into system?-common tools used by malicious hackers-ethical hacking and how it plays a role in combating unauthorized access by malicious hackers?

to as “ethical hacking”—hacking for an ethical reason—whereby it will be argued that law and policy ought not to be the same here as for those hacking activities that are purely for economic gain or to cause harm or mischief. As will be seen, I have grouped ethical hacking int

Ethical Hacking and Countermeasures Course Outline . Module 01: Introduction to Ethical Hacking Internet is Integral Part of Business and Personal Life - What Happens Online in 60 Seconds Information Security Overview. o Case Study eBay Data Breach Google Play

-Animal Nutrition Report Categories: CSSF Activity Report Approved By: James Johnson, Agricultural Affairs Officer Prepared By: Swe Mon Aung, Agricultural Specialist Report Highlights: In July 2019, FAS sent five Myanmar private feed millers and importers to the United States on a Cochran Fellowship Program to learn more about feed and feed ingredients available in the United States poultry .