Welcome to EC-Council





برروشور الشهادة ووصفها ،،

https://www.eccouncil.org/ipdf/EthicalHacker.pdf








هذه صفحة وصف الشهادة ،،

https://www.eccouncil.org/EC-Council...se-outline.htm



وهذا ما سوف تدرسه فيها ،،

Course Outline Version 4

Module 1: Ethics and Legality

Why Security?

The Security, functionality and ease of use Triangle

Can Hacking be Ethical?

Essential Terminology.

Elements of Security.

What does a Malicious Hacker do?

Difference between Penetration Testing and Ethical Hacking.

Hacker Classes.

What do Ethical Hackers do?

Skill Profile of an Ethical Hacker.

Modes of Ethical Hacking.

Security Testing.

Deliverables.

Computer Crimes and Implications.

Legal Perspective (US Federal Laws).

Module 2: Footprinting

Defining Footprinting.

Information Gathering Methodology.

Locate the Network Range.

Hacking Tools:

Whois

Nslookup

ARIN

Traceroute

NeoTrace

VisualRoute Trace

SmartWhois

Visual Lookout

VisualRoute Mail Tracker

eMailTrackerPro

Module 3: Scanning

Definition of Scanning.

Types of scanning

Objectives of Scanning

Scanning Methodology

Classification of Scanning

Hacking Tools

Nmap

XMAS Scan

FIN Scan

Null Scan

Windows Scan

Idle Scan

Nessus

Retina

Saint

HPing2

Firewalk

NIKTO

GFI Languard

ISS Security Scanner

Netcraft

IPsec Scan

NetScan Tools pro 2003

Super Scan

Floppyscan

War Dialer

Hacking Tools

THC Scan

Friendly Pinger

Cheops

Security Administrator’s Tool for Analyzing Network (SATAN)

SAFEsuite Internet Scanner

IdentTCPScan

PortScan Plus

Strobe

Blaster Scan

OS Fingerprinting

Active Stack fingerprinting

Tool for Active Stack fingerprinting

XPROBE2

Passive Fingerprinting

Proxy Servers

Hacking Tools

Socks Chain

Anonymizers

HTTP Tunnel

HTTPort

Countermeasures

Module 4: Enumeration

What is Enumeration?

NetBios Null Sessions

Hacking Tools

DumpSec

Winfo

NetBIOS Auditing Tool (NAT)

Null Session Countermeasures

NetBIOS Enumeration

Hacking Tool :NBTScan

Simple Network Management Protocol (SNMP) Enumeration

Hacking Tools

Solarwinds

Enum

SNScan

SNMP Enumeration Countermeasures

Management Information Base (MIB)

Windows 2000 DNS Zone Transfer

Blocking Win 2k DNS Zone Transfer

Enumerating User Accounts

Hacking Tools

User2sid and Sid2user

UserInfo

GetAcct

DumpReg

Trout

Winfingerprint

PsTools (PSFile,PSLoggedOn,PSGetSid,PSInfo,PSService,PSLis t,PSKill,

PSSuspend, PSLogList, PSExec, PSShutdown)

Active Directory Enumeration and Countermeasures

Module 5: System Hacking

Administrator Password Guessing

Manual Password Cracking Algorithm

Automated Password Cracking

Password Types

Types of Password Attacks

Hacking Tool

NTInfoScan (CIS)

Performing Automated Password Guessing

Hacking Tool

Legion
Password Sniffing

Hacking Tools
LOphtcrack

pwdump2 and pwdump3

KerbCrack

NBTdeputy

NetBIOS DoS Attack

Hacking Tools

NBName

John the Ripper

LAN Manager Hash

Password Cracking Countermeasures

Syskey Utility

Cracking NT/2000 Passwords

Hacking Tool

NTFSDOS

SMB Logon

Hacking Tool: SMBRelay

SMBRelay Man-in-the-Middle Scenario

Hacking Tool : SMBRelay2

SMBRelay Weaknesses and Countermeasures

Hacking Tools

SMBGrind

SMBDie

Privilege Escalation

Hacking Tools

GetAdmin

hk.exe

Keystroke Loggers

Hacking Tools

IKS Software Keylogger

Ghost Keylogger

Hardware Key Logger

Spyware Spector

eBlaster

Hiding Files

Creating Alternate Data Streams

ADS creation and detection

Hacking Tools

Makestream

ads_cat

Streams

LADS (List Alternate Data Streams)

NTFS Streams Countermeasures

Stealing Files Using Word Documents

Field Code Countermeasures

Steganography

Spyware Tool - Desktop Spy

Hacking Tools

Steganography tools

DiSi-Steganograph

EZStego

Gif-It-Up v1.0


والكثير الكثير ايضا



وأخيرا هذا رابط المادة كاملة ، بصيغه PDF ،، الرابط مدته باقية الى ظهور المهدي ان شاء الله

https://www.megaupload.com/?d=DVACJ8LU