This CEHV9 Boot Camp is a 5 day, 40 hour course. It examines the five EC-Council fundamental concepts and techniques of ethical hacking. An effective ethical hacker must understand several aspects of passive and active hacking tools. This includes the five fundamental EC-Council ethical hacking phases (Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and Covering Your Tracks), the use of hacking software, the role of the ethical hacker in deploying penetrating testing tools on an organization and the consequences of an ethical hacker's actions. In addition, the Boot Camp examines the interaction between the students using these ethical hacking tools and the internal lab environment.
Learning Objectives
- Lab 1: Using Active and Passive Techniques to Enumerate Network Hosts
- Lab 2: Conducting Active and Passive Reconnaissance against a Target
- Lab 3: Using the SYSTEM Account
- Lab 4: Poison Ivy - Remote Access Trojan
- Lab 5: Using the SHARK Remote Administration Tool
- Lab 6: Utilizing Malware - DarkComet
- Lab 7: Breaking Windows Passwords
- Lab 8: Using John the Ripper to Crack Linux Passwords
- Lab 9: Using Spear Phishing to Target an Organization
- Lab 10: Breaking WEP and WPA Encryption
- Lab 11: Using Metasploit to Attack a Remote System
- Lab 12: Using Armitage to Attack the Network
- Lab 13: Exploitation with IPv6
- Lab 14: Creating MSFPAYLOADS
- Lab 15: Abusing SYSTEMS
- Lab 16: SQL Injection
- Lab 17: Launching a Buffer Overflow