Welcome to EC-Council
برروشور الشهادة ووصفها ،،
https://www.eccouncil.org/ipdf/EthicalHacker.pdf
هذه صفحة وصف الشهادة ،،
https://www.eccouncil.org/EC-Council...se-outline.htm
وهذا ما سوف تدرسه فيها ،،
Course Outline Version 4
Module 1: Ethics and Legality
Why Security?
The Security, functionality and ease of use Triangle
Can Hacking be Ethical?
Essential Terminology.
Elements of Security.
What does a Malicious Hacker do?
Difference between Penetration Testing and Ethical Hacking.
Hacker Classes.
What do Ethical Hackers do?
Skill Profile of an Ethical Hacker.
Modes of Ethical Hacking.
Security Testing.
Deliverables.
Computer Crimes and Implications.
Legal Perspective (US Federal Laws).
Module 2: Footprinting
Defining Footprinting.
Information Gathering Methodology.
Locate the Network Range.
Hacking Tools:
Whois
Nslookup
ARIN
Traceroute
NeoTrace
VisualRoute Trace
SmartWhois
Visual Lookout
VisualRoute Mail Tracker
eMailTrackerPro
Module 3: Scanning
Definition of Scanning.
Types of scanning
Objectives of Scanning
Scanning Methodology
Classification of Scanning
Hacking Tools
Nmap
XMAS Scan
FIN Scan
Null Scan
Windows Scan
Idle Scan
Nessus
Retina
Saint
HPing2
Firewalk
NIKTO
GFI Languard
ISS Security Scanner
Netcraft
IPsec Scan
NetScan Tools pro 2003
Super Scan
Floppyscan
War Dialer
Hacking Tools
THC Scan
Friendly Pinger
Cheops
Security Administrator’s Tool for Analyzing Network (SATAN)
SAFEsuite Internet Scanner
IdentTCPScan
PortScan Plus
Strobe
Blaster Scan
OS Fingerprinting
Active Stack fingerprinting
Tool for Active Stack fingerprinting
XPROBE2
Passive Fingerprinting
Proxy Servers
Hacking Tools
Socks Chain
Anonymizers
HTTP Tunnel
HTTPort
Countermeasures
Module 4: Enumeration
What is Enumeration?
NetBios Null Sessions
Hacking Tools
DumpSec
Winfo
NetBIOS Auditing Tool (NAT)
Null Session Countermeasures
NetBIOS Enumeration
Hacking Tool :NBTScan
Simple Network Management Protocol (SNMP) Enumeration
Hacking Tools
Solarwinds
Enum
SNScan
SNMP Enumeration Countermeasures
Management Information Base (MIB)
Windows 2000 DNS Zone Transfer
Blocking Win 2k DNS Zone Transfer
Enumerating User Accounts
Hacking Tools
User2sid and Sid2user
UserInfo
GetAcct
DumpReg
Trout
Winfingerprint
PsTools (PSFile,PSLoggedOn,PSGetSid,PSInfo,PSService,PSLis t,PSKill,
PSSuspend, PSLogList, PSExec, PSShutdown)
Active Directory Enumeration and Countermeasures
Module 5: System Hacking
Administrator Password Guessing
Manual Password Cracking Algorithm
Automated Password Cracking
Password Types
Types of Password Attacks
Hacking Tool
NTInfoScan (CIS)
Performing Automated Password Guessing
Hacking Tool
Legion
Password Sniffing
Hacking Tools
LOphtcrack
pwdump2 and pwdump3
KerbCrack
NBTdeputy
NetBIOS DoS Attack
Hacking Tools
NBName
John the Ripper
LAN Manager Hash
Password Cracking Countermeasures
Syskey Utility
Cracking NT/2000 Passwords
Hacking Tool
NTFSDOS
SMB Logon
Hacking Tool: SMBRelay
SMBRelay Man-in-the-Middle Scenario
Hacking Tool : SMBRelay2
SMBRelay Weaknesses and Countermeasures
Hacking Tools
SMBGrind
SMBDie
Privilege Escalation
Hacking Tools
GetAdmin
hk.exe
Keystroke Loggers
Hacking Tools
IKS Software Keylogger
Ghost Keylogger
Hardware Key Logger
Spyware Spector
eBlaster
Hiding Files
Creating Alternate Data Streams
ADS creation and detection
Hacking Tools
Makestream
ads_cat
Streams
LADS (List Alternate Data Streams)
NTFS Streams Countermeasures
Stealing Files Using Word Documents
Field Code Countermeasures
Steganography
Spyware Tool - Desktop Spy
Hacking Tools
Steganography tools
DiSi-Steganograph
EZStego
Gif-It-Up v1.0
والكثير الكثير ايضا
وأخيرا هذا رابط المادة كاملة ، بصيغه PDF ،، الرابط مدته باقية الى ظهور المهدي ان شاء الله
https://www.megaupload.com/?d=DVACJ8LU
المفضلات