CEHv10 M1 Introduction to Ethical Hacking CEHv10 M2 Footprinting CEHv10 M3 Scanning Network CEHv10 M4 Enumeration CEHv10 M20 Cryptography CEHv10 M7 Malware Threats CEHv10 M9 Social Engineering CEHv10 M6 System Hacking CEHv10 M10 Denial-of-Service CEHv10 M7 Sniffing CEHv10 M11session Hijacking CEHv10 M12 Hacking Webservers CEHv10 M13 Hacking Web Applications CEHv10 M14 SQL Injection CEHv10 M16 Evading IDS, Firewalls and Honeypots CEHv10 M14 Wireless CEHv10 M17 Cloud CEHv10 M15 Hacking Mobile Platforms nmap Wireshark Metasploit NetCat OS Cli Introduction To Cisco IOS TCP-IP/OSI/ Virtualization / kail Introduction to MYSQL
https://ilabs.eccouncil.org/store/
Win 8.1 vm Win Server 2012 R2 VM AD DS/DNS Kali 2.0 VM Vmnet8 Switch Metasploitable VM Cisco R&S GNS3/EVE Cloud Internet Host Machine XMAPP DVWA v1.8 Fire Fox sqlitestudio Android VM bare metal VM used for: Turnkey Linux word press Kali 1 bee-boxv1.6 Pen Testing & Ethical Hacking Training Lab
Kali 2.0 VM Vmnet8 Switch Metasploitable VM Cisco R&S GNS3/EVE/VIRL Cloud Internet External Targets www.cbtme.com www.certifiedhacker.com www.eccouncil.org hackthissite.org Yasser Ramzy Auda
Windows server 2012 VM IP address 192.168. 3 .12/24 DG 192.168. 3 .2/24 DNS: 127.0.0.1 & 8.8.8.8 Username Full name Password administrator p@ssw0rd Jack Jack Reacher wolf Pierce Pierce Brosnan apple Jennifer Jennifer Joanna Aniston cat Username Full name Password simon Simon Templar cisco Jack Jack Daniel's great Computer name Domain name DC1 IJWT.local Windows 8 VM IP address192.168. 3 .8/24 DG 192.168. 3 .2/24 DNS: 192.168. 3 .12 & 8.8.8.8 Computer name Domain name DC1 IJWT.local
Kali 2 VM Dynamically getting IP address from vmnet8 DHCP from subnet 192.168. 3 .0/24 starting with .128 Metasploitable VM Dynamically getting IP address from vmnet8 DHCP from subnet 192.168. 3 .0/24 starting with .128 Android VM Dynamically getting IP address from vmnet8 DHCP from subnet 192.168. 3 .0/24 starting with .128 Username Full name Password root toor yasser Yasser Auda moon Username Full name Password msfadmin msfadmin Computer name kali Computer name metasploitable
Windows server 2012 VM Pre-Configuration Firewall disabled Automatic update disabled Internet Explorer Enhanced Security disabled Telnet client , Telnet server , TFTP client , SNMP service installed Domain Default GPO tuned to accept passwords as the following: Minimum password length: set to 3 characters Password must meet complexity requirements: Disabled Windows 8 VM Pre-Configuration Firewall disabled Automatic update disabled VMware Tools installed Windows Defender disabled VMware Tools installed
Win 8.1 vm Win Server 2012 R2 VM AD DS/DNS Kali 2.0 VM Vmnet8 Switch Metasploitable VM Cisco R&S GNS3/EVE Cloud Internet Host Machine XMAPP DVWA v1.8 Fire Fox sqlitestudio Android VM bare metal VM used for: Turnkey Linux word press Kali 1 bee-boxv1.6 CEH/CHFI/CND Training Lab CHFI VM AlienVault ® OSSIM CND VM
Time to answer some questions & build the basics
Are you Familiar with Virtualization ? Virtualization commonly used & consider one of the main components in : Cloud Data Centers
Virtualization Virtual Machines
A hypervisor or virtual machine monitor ( VMM ) is a piece of computer software, firmware or hardware that creates and runs virtual machines . emulate resources so VM OS believe he had physical Hardware Type 1 bare-metal hypervisor communicate VM OS to host HW host has no OS Ex: VMware ESXI , Hyper-v standalone Type 2 hypervisor host has OS and stand as layer between hypervisor and real hardware Ex: VMware workstation ,Hyper-v in win8,10,2012,2016
Are you Familiar with Linux OS ?
Linux platforms Servers Desktops Embedded (non-computer) devices Popular distros Ubuntu Red Hat Enterprise Fedora SUSE Debian Slackware …many others Distro = Linux Distribution www.distrowatch.com to download any distro I386,x86,i686,x86-32-64 For our Intel machine choose i386
Debian Based on: Independent Origin: Global Architecture: armel, hppa, ia64, i386, mips, mipsel, powerpc, s390, sparc64, x86_64 Desktop: AfterStep, Blackbox, Fluxbox, GNOME, IceWM, KDE, LXDE, Openbox, WMaker, Xfce Category: Desktop, Live Medium, Server
You can use Gparted GUI application to manage hard disks File systems Windows: NTFS, FAT32 Removable media: FAT/VFAT, FAT32 Linux: Ext2 (older rarely used) Ext3 (journaling FS, common used , log changes before writing them to FS) Ext4 (new FS , where volume up to 1 Exabyte and files up to 1 Terabyte ) JFS IBM not common used Reiser (or ReiserFS) openSUSE XFS RedHat Partitions you will need at least two partitions: Root (Store OS,App,Data ) Swap (work like pagefile.sys on windows )
KDE Xfce
Linux File system hierarchy standard
Some folders come with the system like : / root directory , all other directories branch from it . /bin system commands & binaries like cp,ls,mount / sbin similar to /bin but contain programs run by admin like fdisk / boot files related to boot loader like GRUB/LILO ( ntldr , bootmgr in winxp & 7) / dev partition ,devices files like printers (all hw devices act as files on linux , these files are there ) / etc computer configuration / home users files and profiles except root (administrator) profile / root root files and profiles (administrator) profile /lib programming libraries /lib/modules have kernel modules drives / mnt temp mounting points used some time to mount removable media on it / tmp temp folder / var system logs , print spool , mail files / usr come with subdirectories with users names /media like / mnt but come with /media/ floopy /media/ cdrom / proc its virtual filesystem created dynamically to provide access to certin types of hw info example : cat / proc / cpuinfo , all other info about hardware resources.
Generally, the system for labeling drives starts with: hda hdb hdc etc. The letters " hd " stand for h ard d rive, and the following letter is the order with which they are mounted. With newer hard drives (SATA), Linux designates them with: sda sdb sdc etc. The "s" is a legacy from SCSI drives. Partitions within those drives are then designated with numbers after the letters such as sda1, sda2, sda3, etc.
Metasploitable is an intentionally vulnerable Linux virtual machine. This VM can be used to conduct security training, test security tools, and practice common penetration testing techniques. https://sourceforge.net/projects/metasploitable/ Boot-to-Root Virtual Machines Creating a virtual machine hacking challenge , is just means creating Windows or Linux VM with many Vulnerabilities then challenge you to exploit it to hack that system. Such as Metasploitable , pWnOS , Badstore & De-ICE We call this VM "Boot2Root virtual machine" Boot-to-Root Virtual Machines https://www.vulnhub.com/ https://www.turnkeylinux.org/wordpress https://sourceforge.net/projects/bwapp/files/bee-box/
Are you Familiar with OSI Model & TCP-IP ?
What is protocol ? A network protocol is a standard set of rules that determines how systems will communicate across networks.
What is segment? What is packet ? What is frame ? what is Protocol Data Unit PDUs? What is encapsulation ? What is de encapsulation ? What is TCP-IP? What is TCP/UDP header? What is IP header? What is Ethernet header? What is checksum? What is CRC? 7 6 5 4 3 2 1 Open Systems Interconnection Reference Model
The session layer establishes, manages, and terminates sessions between two communicating hosts. The session layer also synchronizes dialog between the presentation layers of the two hosts and manages their data exchange. For example, web servers have many users, so there are many communication processes open at a given time. Therefore, it is important to keep track of which user communicates on which path.
Your web browser is an application that operates at the application layer. After you enter an address in the address bar, the browser passes data (an HTTP “GET” request) to the application layer. When the application layer passes the data to the transport layer, the transport layer may split the data into segments (if the amount of data is deemed large enough). The transport layer adds a TCP header to the segment, encapsulating it in TCP. If there are multiple segments, TCP sequences them so the data stream can be reassembled when it reaches its destination. The segment is then passed to the Internet layer, where it receives an IP header to encapsulate it as an IP packet. The IP header contains source and destination IP addresses, which will enable the data to be properly routed to the destination. The Internet layer may also break a large packet into smaller fragments, then the fragments are reassembled at the Internet layer at the destination system. When the IP packet reaches the link layer, it is encapsulated in an Ethernet frame, which contains the hardware, or MAC, addresses of the source and destination computers. The frame is then transmitted in the form of bits onto the physical network. At the destination, the process is reversed. As information in each header is read, the header is stripped and the remaining data is sent up to the next layer.
IP header
Version: A 4-bit field that identifies the IP version being used. Version is 4 referred to as IPv4. IP Header length: A 4-bit field containing the length of the IP header. The minimum length of an IP header is 20 bytes. Type of service: The 8-bit ToS field traditionally uses 3 bits for IP Precedence. The newer redefinition of the ToS field uses a 6-bit DSCP field and a 2-bit ECN field to identify the level of service a packet receives in the network. Total length: Specifies the length of the IP packet that includes the IP header and the user data. The length field is 2 bytes, so the maximum size of an IP packet is 65,535 bytes. Identifier, flags, and fragment offset: As an IP packet moves through the Internet, it might need to cross a route that cannot handle the size of the packet. The packet will be divided, or fragmented, into smaller packets and reassembled later. These fields are used to fragment and reassemble packets. Time to live: It is possible for an IP packet to roam aimlessly around the Internet. If there is a routing problem or a routing loop, then you don't want packets to be forwarded forever. A routing loop is when a packet is continually routed through the same routers over and over. The TTL field is initially set to a number and decremented by every router that is passed through. When TTL reaches 0, the packet is discarded. Protocol: In the layered protocol model, the layer that determines which application the data is from or which application the data is for is indicated using the Protocol field. This field does not identify the application, but identifies a protocol that sits above the IP layer that is used for application identification. For example, protocol number 1 = ICMP , 6 = TCP, 17 = UDP.