CEH V6.1 Brochure
CEH V6.1 Brochure
CEH V6.1 Brochure
http://www.eccouncil.org EC-Council
Hackers are here. Where are you?
Page 3
Computers around the world are systematically being victimized by rampant hacking. This hacking
is not only widespread, but is being executed so flawlessly that the attackers compromise a system,
steal everything of value and completely erase their tracks within 20 minutes.
The goal of the ethical hacker is to help the organization take preemptive measures against mali-
cious attacks by attacking the system himself; all the while staying within legal limits. This philos-
ophy stems from the proven practice of trying to catch a thief, by thinking like a thief. As technol-
ogy advances and organization depend on technology increasingly, information assets have evolved
into critical components of survival.
If hacking involves creativity and thinking ‘out-of-the-box’, then vulnerability testing and security
audits will not ensure the security proofing of an organization. To ensure that organizations have
adequately protected their information assets, they must adopt the approach of ‘defense in depth’.
In other words, they must penetrate their networks and assess the security posture for vulnerabili-
ties and exposure.
The definition of an Ethical Hacker is very similar to a Penetration Tester. The Ethical Hacker is an
individual who is usually employed with the organization and who can be trusted to undertake an
attempt to penetrate networks and/or computer systems using the same methods as a Hacker. Hack-
ing is a felony in the United States and most other countries. When it is done by request and under
a contract between an Ethical Hacker and an organization, it is legal. The most important point is
that an Ethical Hacker has authorization to probe the target.
The CEH Program certifies individuals in the specific network security discipline of Ethical Hack-
ing from a vendor-neutral perspective. The Certified Ethical Hacker certification will fortify the
application knowledge of security officers, auditors, security professionals, site administrators,
and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical
Hacker is a skilled professional who understands and knows how to look for the weaknesses and
vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.
http://www.eccouncil.org EC-Council
Page 4
http://www.eccouncil.org EC-Council
Ethical Hacking and Countermeasures Training Program
Course Description
Page 5
This class will immerse the student into an interactive environment where they will be shown how
to scan, test, hack and secure their own systems. The lab intensive environment gives each student
in-depth knowledge and practical experience with the current essential security systems. Students
will begin by understanding how perimeter defenses work and then be lead into scanning and at-
tacking their own networks, no real network is harmed. Students then learn how intruders escalate
privileges and what steps can be taken to secure a system. Students will also learn about Intrusion
Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Crea-
tion. When a student leaves this intensive 5 day class they will have hands on understanding and
experience in Ethical Hacking.
This course prepares you for EC-Council Certified Ethical Hacker exam 312-50
Who Should Attend
This course will significantly benefit security officers, auditors, security professionals, site admin-
istrators, and anyone who is concerned about the integrity of the network infrastructure.
Duration:
5 days (9:00 – 5:00)
Certification
The Certified Ethical Hacker certification exam 312-50 will be conducted on the last day of train-
ing. Students need to pass the online Prometric exam to receive the CEH certification.
Legal Agreement
Ethical Hacking and Countermeasures course mission is to educate, introduce and demonstrate
hacking tools for penetration testing purposes only. Prior to attending this course, you will be
asked to sign an agreement stating that you will not use the newly acquired skills for illegal or
malicious attacks and you will not use such tools in an attempt to compromise any computer
system, and to indemnify EC-Council with respect to the use or misuse of these tools, regardless
of intent.
Not anyone can be a student — the Accredited Training Centers (ATC) will make sure the appli-
cants work for legitimate companies.
http://www.eccouncil.org EC-Council
Course Outline v6.1
Module 1: Introduction to Ethical Hacking
Problem Definition -Why Security?
Essential Terminologies
Elements of Security
The Security, Functionality and Ease of Use Triangle
Effect on Business
Page 6
Case Study
What does a Malicious Hacker do?
o Phase1-Reconnaissaance
• Reconnaissance Types
o Phase2-Scanning
o Phase3-Gaining Access
o Phase4-Maintaining Access
o Phase5-Covering Tracks
Types of Hacker Attacks
o Operating System attacks
o Application-level attacks
o Shrink Wrap code attacks
o Misconfiguration attacks
Hacktivism
Hacker Classes
Security News: Suicide Hacker
Ethical Hacker Classes
What do Ethical Hackers do
Can Hacking be Ethical
How to become an Ethical Hacker
http://www.eccouncil.org EC-Council
Skill Profile of an Ethical Hacker
What is Vulnerability Research
Page 7
o Why Hackers Need Vulnerability Research
o Vulnerability Research Tools
o Vulnerability Research Websites
• National Vulnerability Database (nvd.nist.gov)
• Securitytracker (www.securitytracker.com)
• Securiteam (www.securiteam.com)
• Secunia (www.secunia.com)
• Hackerstorm Vulnerability Database Tool (www.hackerstrom.com)
• HackerWatch (www.hackerwatch.org)
• SecurityFocus (www.securityfocus.com)
• SecurityMagazine (www.securitymagazine.com)
• SC Magazine (www.scmagazine.com)
• MILWORM
How to Conduct Ethical Hacking
How Do They Go About It
Approaches to Ethical Hacking
Ethical Hacking Testing
Ethical Hacking Deliverables
Computer Crimes and Implications
http://www.eccouncil.org EC-Council
• Penalties
o 18 U.S.C. § 1362
o 18 U.S.C. § 2318
o 18 U.S.C. § 2320
o 18 U.S.C. § 1831
o 47 U.S.C. § 605, unauthorized publication or use of communications
o Washington:
• RCW 9A.52.110
Page 8
o Florida:
• § 815.01 to 815.07
o Indiana:
• IC 35-43
United Kingdom’s Cyber Laws
United Kingdom: Police and Justice Act 2006
European Laws
Japan’s Cyber Laws
Australia : The Cybercrime Act 2001
Indian Law: THE INFORMTION TECHNOLOGY ACT
Argentina Laws
Germany’s Cyber Laws
Singapore’s Cyber Laws
Belgium Law
Brazilian Laws
Canadian Laws
France Laws
German Laws
Italian Laws
MALAYSIA: THE COMPUTER CRIMES ACT 1997
http://www.eccouncil.org EC-Council
HONGKONG: TELECOMMUNICATIONS
Korea: ACT ON PROMOTION OF INFORMATION AND COMMUNICATIONS NETWORK
Page 9
UTILIZATION AND INFORMATION PROTECTION, ETC.
Greece Laws
Denmark Laws
Netherlands Laws
Norway
ORDINANCE
Mexico
SWITZERLAND
Module 3: Footprinting
Revisiting Reconnaissance
Defining Footprinting
Why is Footprinting Necessary
Areas and Information which Attackers Seek
Information Gathering Methodology
o Unearthing Initial Information
• Finding Company’s URL
• Internal URL
• Extracting Archive of a Website
www.archive.org
• Google Search for Company’s Info
• People Search
Yahoo People Search
Satellite Picture of a Residence
Best PeopleSearch
People-Search-America.com
http://www.eccouncil.org EC-Council
Switchboard
Anacubis
Google Finance
Yahoo Finance
• Footprinting through Job Sites
• Passive Information Gathering
• Competitive Intelligence Gathering
Page 10
http://www.eccouncil.org EC-Council
o Whois Lookup
o Whois
Page 11
o SmartWhois
o ActiveWhois
o LanWhois
o CountryWhois
o WhereIsIP
o Ip2country
o CallerIP
o Web Data Extractor Tool
o Online Whois Tools
o What is MyIP
o DNS Enumerator
o SpiderFoot
o Nslookup
o Extract DNS Information
• Types of DNS Records
• Necrosoft Advanced DIG
o Expired Domains
o DomainKing
o Domain Name Analyzer
o DomainInspect
o MSR Strider URL Tracer
o Mozzle Domain Name Pro
o Domain Research Tool (DRT)
o Domain Status Reporter
o Reggie
o Locate the Network Range
http://www.eccouncil.org EC-Council
• ARIN
• Traceroute
Traceroute Analysis
• 3D Traceroute
• NeoTrace
• VisualRoute Trace
• Path Analyzer Pro
Page 12
• Maltego
• Layer Four Traceroute
• Prefix WhoIs widget
• Touchgraph
• VisualRoute Mail Tracker
• eMailTrackerPro
• Read Notify
E-Mail Spiders
o 1st E-mail Address Spider
o Power E-mail Collector Tool
o GEOSpider
o Geowhere Footprinting Tool
o Google Earth
o Kartoo Search Engine
o Dogpile (Meta Search Engine)
o Tool: WebFerret
o robots.txt
o WTR - Web The Ripper
o HTTrack Web Site Copier
o Website Watcher
How to Create Fake Website
http://www.eccouncil.org EC-Council
Real and Fake Website
Tool: Reamweaver
Page 13
Mirrored Fake Website
Faking Websites using Man-in-the-Middle Phishing Kit
Benefits to Fraudster
Steps to Perform Footprinting
http://www.eccouncil.org EC-Council
o admin login
–ext:html –ext:htm –ext:shtml –ext:asp –ext:php
inurl:temp | inurl:tmp | inurl:backup | inurl:bak
intranet | help.desk
Locating Public Exploit Sites
o Locating Exploits Via Common Code Strings
• Searching for Exploit Code with Nonstandard Extensions
Page 14
http://www.eccouncil.org EC-Council
o Locating Default Installations of IIS 4.0 on Windows NT 4.0/OP
o Default Pages Query for Web Server
Page 15
o Outlook Web Access Default Portal
Searching for Passwords
o Windows Registry Entries Can Reveal Passwords
o Usernames, Cleartext Passwords, and Hostnames!
Google Hacking Database (GHDB)
SiteDigger Tool
Gooscan
Goolink Scanner
Goolag Scanner
Tool: Google Hacks
Google Hack Honeypot
Google Protocol
Google Cartography
Module 5: Scanning
Scanning: Definition
Types of Scanning
Objectives of Scanning
CEH Scanning Methodology
o Checking for live systems - ICMP Scanning
• Angry IP
• Ping Sweep
• Firewalk Tool
• Firewalk Commands
• Firewalk Output
http://www.eccouncil.org EC-Council
• Three Way Handshake
• TCP Communication Flags
• Nmap
• Nmap: Scan Methods
• NMAP Scan Options
• NMAP Output Format
• HPing2
Page 16
http://www.eccouncil.org EC-Council
• Floppy Scan
• FloppyScan Steps
Page 17
• E-mail Results of FloppyScan
• Atelier Web Ports Traffic Analyzer (AWPTA)
• Atelier Web Security Port Scanner (AWSPS)
• IPEye
• ike-scan
• Infiltrator Network Security Scanner
• YAPS: Yet Another Port Scanner
• Advanced Port Scanner
• NetworkActiv Scanner
• NetGadgets
• P-Ping Tools
• MegaPing
• LanSpy
• HoverIP
• LANView
• NetBruteScanner
• SolarWinds Engineer’s Toolset
• AUTAPF
• OstroSoft Internet Tools
• Advanced IP Scanner
• Active Network Monitor
• Advanced Serial Data Logger
• Advanced Serial Port Monitor
• WotWeb
• Antiy Ports
• Port Detective
http://www.eccouncil.org EC-Council
• Roadkil’s Detector
• Portable Storage Explorer
War Dialer Technique
o Why War Dialing
o Wardialing
o Phonesweep – War Dialing Tool
o THC Scan
Page 18
o ToneLoc
o ModemScan
o War Dialing Countermeasures: Sandtrap Tool
Banner Grabbing
o OS Fingerprinting
• Active Stack Fingerprinting
• Passive Fingerprinting
o Active Banner Grabbing Using Telnet
o GET REQUESTS
o P0f – Banner Grabbing Tool
o p0f for Windows
o Httprint Banner Grabbing Tool
o Tool: Miart HTTP Header
o Tools for Active Stack Fingerprinting
• Xprobe2
• Ringv2
• Netcraft
o Disabling or Changing Banner
o IIS Lockdown Tool
o Tool: ServerMask
o Hiding File Extensions
http://www.eccouncil.org EC-Council
o Tool: PageXchanger
Vulnerability Scanning
Page 19
o Bidiblah Automated Scanner
o Qualys Web Based Scanner
o SAINT
o ISS Security Scanner
o Nessus
o GFI Languard
o Security Administrator’s Tool for Analyzing Networks (SATAN)
o Retina
o Nagios
o PacketTrap’s pt360 Tool Suite
o NIKTO
o SAFEsuite Internet Scanner, IdentTCPScan
Draw Network Diagrams of Vulnerable Hosts
o Friendly Pinger
o LANsurveyor
o Ipsonar
o LANState
o Insightix Visibility
o IPCheck Server Monitor
o PRTG Traffic Grapher
Preparing Proxies
o Proxy Servers
o Use of Proxies for Attack
o Free Proxy Servers
o SocksChain
o Proxy Workbench
http://www.eccouncil.org EC-Council
o Proxymanager Tool
o Super Proxy Helper Tool
o Happy Browser Tool (Proxy Based)
o Multiproxy
o Tor Proxy Chaining Software
o Additional Proxy Tools
o Anonymizers
Page 20
• Surfing Anonymously
• Primedius Anonymizer
• StealthSurfer
• Anonymous Surfing: Browzar
• Torpark Browser
• GetAnonymous
• IP Privacy
• Anonymity 4 Proxy (A4Proxy)
• Psiphon
• Connectivity Using Psiphon
• Bloggers Write Text Backwards to Bypass Web Filters in China
• Vertical Text Converter
• How to Check If Your Website Is Blocked In China or Not
• Mowser and Phonifier
• AnalogX Proxy
• NetProxy
• Proxy+
• ProxySwitcher Lite
• JAP
• Proxomitron
o Google Cookies
http://www.eccouncil.org EC-Council
• G-Zapper
o SSL Proxy Tool
Page 21
o How to Run SSL Proxy
o HTTP Tunneling Techniques
• Why Do I Need HTTP Tunneling
• Httptunnel for Windows
• How to Run Httptunnel
• HTTP-Tunnel
• HTTPort
o Spoofing IP Address
• Spoofing IP Address Using Source Routing
• Detection of IP Spoofing
• Despoof Tool
Scanning Countermeasures
Tool: SentryPC
Module 6: Enumeration
Overview of System Hacking Cycle
What is Enumeration?
Techniques for Enumeration
NetBIOS Null Sessions
o So What’s the Big Deal
o DumpSec Tool
o NetBIOS Enumeration Using Netview
• Nbtstat Enumeration Tool
• SuperScan
• Enum Tool
o Enumerating User Accounts
http://www.eccouncil.org EC-Council
• GetAcct
o Null Session Countermeasure
PS Tools
o PsExec
o PsFile
o PsGetSid
o PsKill
Page 22
o PsInfo
o PsList
o PsLogged On
o PsLogList
o PsPasswd
o PsService
o PsShutdown
o PsSuspend
Simple Network Management Protocol (SNMP) Enumeration
o Management Information Base (MIB)
o SNMPutil Example
o SolarWinds
o SNScan
o Getif SNMP MIB Browser
o UNIX Enumeration
o SNMP UNIX Enumeration
o SNMP Enumeration Countermeasures
LDAP enumeration
o JXplorer
o LdapMiner
o Softerra LDAP Browser
http://www.eccouncil.org EC-Council
NTP enumeration
SMTP enumeration
Page 23
o Smtpscan
Web enumeration
o Asnumber
o Lynx
Winfingerprint
o Windows Active Directory Attack Tool
How To Enumerate Web Application Directories in IIS Using DirectoryServices
IP Tools Scanner
Enumerate Systems Using Default Password
Tools:
o NBTScan
o NetViewX
o FREENETENUMERATOR
o Terminal Service Agent
o TXNDS
o Unicornscan
o Amap
o Netenum
Steps to Perform Enumeration
http://www.eccouncil.org EC-Council
• Passive Online Attack: Man-in-the-middle and replay attacks
• Active Online Attack: Password Guessing
• Offline Attacks
Brute force Attack
Pre-computed Hashes
Syllable Attack/Rule-based Attack/ Hybrid attacks
Distributed network Attack
Page 24
Rainbow Attack
• Non-Technical Attacks
o Default Password Database
• http://www.defaultpassword.com/
• http://www.cirt.net/cgi-bin/passwd.pl
• http://www.virus.org/index.php?
o PDF Password Cracker
o Abcom PDF Password Cracker
o Password Mitigation
o Permanent Account Lockout-Employee Privilege Abuse
o Administrator Password Guessing
• Manual Password cracking Algorithm
• Automatic Password Cracking Algorithm
o Performing Automated Password Guessing
• Tool: NAT
• Smbbf (SMB Passive Brute Force Tool)
• SmbCrack Tool: Legion
• Hacking Tool: LOphtcrack
o Microsoft Authentication
• LM, NTLMv1, and NTLMv2
• NTLM And LM Authentication On The Wire
http://www.eccouncil.org EC-Council
• Kerberos Authentication
• What is LAN Manager Hash?
Page 25
LM “Hash” Generation
LM Hash
• Salting
• PWdump2 and Pwdump3
• Tool: Rainbowcrack
• Hacking Tool: KerbCrack
• Hacking Tool: John the Ripper
o Password Sniffing
o How to Sniff SMB Credentials?
o SMB Signing
o Tool: LCP
o Tool: SID&User
o Tool: Ophcrack 2
o Tool: Crack
o Tool: Access PassView
o Tool: Asterisk Logger
o Tool: CHAOS Generator
o Tool: Asterisk Key
o Password Recovery Tool: MS Access Database Password Decoder
o Password Cracking Countermeasures
o Do Not Store LAN Manager Hash in SAM Database
o LM Hash Backward Compatibility
o How to Disable LM HASH
o Password Brute-Force Estimate Tool
o Syskey Utility
o AccountAudit
http://www.eccouncil.org EC-Council
Part2-Escalating Privileges
o CEH Hacking Cycle
o Privilege Escalation
o Cracking NT/2000 passwords
o Active@ Password Changer
o Change Recovery Console Password - Method 1
o Change Recovery Console Password - Method 2
Page 26
http://www.eccouncil.org EC-Council
o IKS Software Keylogger
o Ghost Keylogger
Page 27
o Hacking Tool: Hardware Key Logger
o What is Spyware?
o Spyware: Spector
o Remote Spy
o Spy Tech Spy Agent
o 007 Spy Software
o Spy Buddy
o Ace Spy
o Keystroke Spy
o Activity Monitor
o Hacking Tool: eBlaster
o Stealth Voice Recorder
o Stealth Keylogger
o Stealth Website Logger
o Digi Watcher Video Surveillance
o Desktop Spy Screen Capture Program
o Telephone Spy
o Print Monitor Spy Tool
o Stealth E-Mail Redirector
o Spy Software: Wiretap Professional
o Spy Software: FlexiSpy
o PC PhoneHome
o Keylogger Countermeasures
o Anti Keylogger
o Advanced Anti Keylogger
o Privacy Keyboard
http://www.eccouncil.org EC-Council
o Spy Hunter - Spyware Remover
o Spy Sweeper
o Spyware Terminator
o WinCleaner AntiSpyware
Part4-Hiding files
o CEH Hacking Cycle
o Hiding Files
Page 28
o RootKits
• Why rootkits
• Hacking Tool: NT/2000 Rootkit
• Planting the NT/2000 Rootkit
• Rootkits in Linux
• Detecting Rootkits
• Steps for Detecting Rootkits
• Rootkit Detection Tools
• Sony Rootkit Case Study
• Rootkit: Fu
• AFX Rootkit
• Rootkit: Nuclear
• Rootkit: Vanquish
• Rootkit Countermeasures
• Patchfinder
• RootkitRevealer
o Creating Alternate Data Streams
o How to Create NTFS Streams?
• NTFS Stream Manipulation
• NTFS Streams Countermeasures
• NTFS Stream Detectors (ADS Spy and ADS Tools)
http://www.eccouncil.org EC-Council
• Hacking Tool: USB Dumper
o What is Steganography?
Page 29
• Steganography Techniques
Least Significant Bit Insertion in Image files
Process of Hiding Information in Image Files
Masking and Filtering in Image files
Algorithms and transformation
• Tool: Merge Streams
• Invisible Folders
• Tool: Invisible Secrets
• Tool : Image Hide
• Tool: Stealth Files
• Tool: Steganography
• Masker Steganography Tool
• Hermetic Stego
• DCPP – Hide an Operating System
• Tool: Camera/Shy
• www.spammimic.com
• Tool: Mp3Stego
• Tool: Snow.exe
• Steganography Tool: Fort Knox
• Steganography Tool: Blindside
• Steganography Tool: S- Tools
• Steganography Tool: Steghide
• Tool: Steganos
• Steganography Tool: Pretty Good Envelop
• Tool: Gifshuffle
• Tool: JPHIDE and JPSEEK
http://www.eccouncil.org EC-Council
• Tool: wbStego
• Tool: OutGuess
• Tool: Data Stash
• Tool: Hydan
• Tool: Cloak
• Tool: StegoNote
• Tool: Stegomagic
Page 30
http://www.eccouncil.org EC-Council
o Tool: elsave.exe
o Hacking Tool: Winzapper
Page 31
o Evidence Eliminator
o Tool: Traceless
o Tool: Tracks Eraser Pro
o Armor Tools
o Tool: ZeroTracks
http://www.eccouncil.org EC-Council
o Trojan: NetBus
o Trojan: Netcat
o Netcat Client/Server
o Trojan: Beast
o MoSucker Trojan
o SARS Trojan Notification
o Proxy Server Trojan
Page 32
http://www.eccouncil.org EC-Council
o ICMP Tunneling
o ICMP Backdoor Trojan
Page 33
Reverse Connecting Trojans
o Reverse Connecting Trojans
o Nuclear RAT Trojan (Reverse Connecting)
o Reverse Tunnel
o Covert Channel Tunneling Tool (cctt)
o Windows Reverse Shell
o perl-reverse-shell
o php-reverse-shell
o XSS Shell Tunnel
o winarp_mim
Miscellaneous Trojans
o Backdoor.Theef (AVP)
o T2W (TrojanToWorm)
o Biorante RAT
o DownTroj
o Turkojan
o Trojan.Satellite-RAT
o Yakoza
o DarkLabel B4
o Trojan.Hav-Rat
o Poison Ivy
o Rapid Hacker
o SharK
o HackerzRat
o TYO
o 1337 Fun Trojan
http://www.eccouncil.org EC-Council
o Criminal Rat Beta
o VicSpy
o Optix PRO
o ProAgent
o OD Client
o AceRat
o Mhacker-PS
Page 34
o RubyRAT Public
o SINner
o ConsoleDevil
o ZombieRat
o Webcam Trojan
o DJI RAT
o Skiddie Rat
o Biohazard RAT
o Troya
o ProRat
o Dark Girl
o DaCryptic
o Net-Devil
o PokerStealer.A
o Hovdy.a
How to Detect Trojans?
o Netstat
o fPort
o TCPView
o CurrPorts Tool
o Process Viewer
http://www.eccouncil.org EC-Council
o Delete Suspicious Device Drivers
o Check for Running Processes: What’s on My Computer
Page 35
o Super System Helper Tool
o Inzider-Tracks Processes and Ports
o Tool: What’s Running
o MS Configuration Utility
o Autoruns
o Hijack This (System Checker)
o Startup List
Anti-Trojan Software
o TrojanHunter
o Comodo BOClean
o Trojan Remover: XoftspySE
o Trojan Remover: Spyware Doctor
o SPYWAREfighter
Evading Anti-Virus Techniques
Sample Code for Trojan Client/Server
Evading Anti-Trojan/Anti-Virus using Stealth Tools
Backdoor Countermeasures
Tripwire
System File Verification
MD5 Checksum.exe
Microsoft Windows Defender
How to Avoid a Trojan Infection
http://www.eccouncil.org EC-Council
Working of Virus
o Infection Phase
o Attack Phase
Why people create Computer Viruses
Symptoms of a Virus-like Attack
Virus Hoaxes
Chain Letters
Page 36
Worms
How is a Worm Different from a Virus
Indications of a Virus Attack
Virus Damage
o Mode of Virus Infection
Stages of Virus Life
Types of Virus
o Virus Classification
o How Does a Virus Infect?
o Storage Patterns of Virus
• System Sector virus
• Stealth Virus
• Bootable CD-Rom Virus
Self -Modification
Encryption with a Variable Key
• Polymorphic Code
• Metamorphic Virus
• Cavity Virus
• Sparse Infector Virus
• Companion Virus
• File Extension Virus
http://www.eccouncil.org EC-Council
Famous Viruses and Worms
o Famous Virus/Worms – I Love You Virus
Page 37
o Famous Virus/Worms – Melissa
o Famous Virus/Worms – JS/Spth
o Klez Virus Analysis
o Slammer Worm
o Spread of Slammer Worm – 30 min
o MyDoom.B
o SCO Against MyDoom Worm
Latest Viruses
o Latest Viruses
o Top 10 Viruses- 2008
• Virus: Win32.AutoRun.ah
• Virus:W32/Virut
• Virus:W32/Divvi
• Worm.SymbOS.Lasco.a
• Disk Killer
• Bad Boy
• HappyBox
• Java.StrangeBrew
• MonteCarlo Family
• PHP.Neworld
• W32/WBoy.a
• ExeBug.d
• W32/Voterai.worm.e
• W32/Lecivio.worm
• W32/Lurka.a
• W32/Vora.worm!p2p
http://www.eccouncil.org EC-Council
Writing Virus Program
o Writing a Simple Virus Program
o Virus Construction Kits
Virus Detection Methods
o Virus Detection Methods
o Virus Incident Response
o What is Sheep Dip?
Page 38
http://www.eccouncil.org EC-Council
Module 10: Sniffers
Page 39
Definition: Sniffing
Types of Sniffing
Protocols Vulnerable to Sniffing
Passive Sniffing
Active Sniffing
Switched Port Analyzer (SPAN)
SPAN Port
Lawful Intercept
Benefits of Lawful Intercept
Network Components Used for Lawful Intercept
Ready to Sniff?
Tool: Network View – Scans the Network for Devices
The Dude Sniffer
Look@LAN
Wireshark
Display Filters in Wireshark
Following the TCP Stream in Wireshark
Pilot
Tcpdump
Tcpdump Commands
Features of Sniffing Tools
What is Address Resolution Protocol (ARP)
ARP Spoofing Attack
How Does ARP Spoofing Work
ARP Poisoning
Threats of ARP Poisoning
http://www.eccouncil.org EC-Council
MAC Flooding
Mac Duplicating
Mac Duplicating Attack
Tools for ARP Spoofing
o Ettercap
o ArpSpyX
o Cain and Abel
Page 40
http://www.eccouncil.org EC-Council
o MSN Sniffer
o SmartSniff
Page 41
o Session Capture Sniffer: NetWitness
o Packet Crafter Craft Custom TCP/IP Packets
o Engage Packet Builder
o SMAC
o NetSetMan Tool
o Ntop
o EtherApe
o EtherApe Features
o Network Probe
o Maa Tec Network Analyzer
o Tool: Snort
o Tool: Windump
o Tool: Etherpeek
o NetIntercept
o Colasoft EtherLook
o AW Ports Traffic Analyzer
o Colasoft Capsa Network Analyzer
o CommView
o Sniffem
o NetResident
o IP Sniffer
o Sniphere
o IE HTTP Analyzer
o BillSniff
o URL Snooper
o EtherDetect Packet Sniffer
http://www.eccouncil.org EC-Council
o EffeTech HTTP Sniffer
o AnalogX Packetmon
o Colasoft MSN Monitor
o IPgrab
o EtherScan Analyzer
o InfoWatch Traffic Monitor
Linux Sniffing Tools (dsniff package)
Page 42
http://www.eccouncil.org EC-Council
o ArpWatch Tool
o PromiScan
Page 43
o proDETECT
o Network Packet Analyzer CAPSA
http://www.eccouncil.org EC-Council
o Personal approaches
o Defenses Against Social Engineering Threats
Factors that make Companies Vulnerable to Attacks
Why is Social Engineering Effective
Warning Signs of an Attack
Tool : Netcraft Anti-Phishing Toolbar
Phases in a Social Engineering Attack
Page 44
http://www.eccouncil.org EC-Council
Module 12: Phishing
Phishing
Page 45
Introduction
Reasons for Successful Phishing
Phishing Methods
Process of Phishing
Types of Phishing Attacks
o Man-in-the-Middle Attacks
o URL Obfuscation Attacks
o Cross-site Scripting Attacks
o Hidden Attacks
o Client-side Vulnerabilities
o Deceptive Phishing
o Malware-Based Phishing
o DNS-Based Phishing
o Content-Injection Phishing
o Search Engine Phishing
Phishing Statistics: March 2008
Anti-Phishing
Anti-Phishing Tools
o PhishTank SiteChecker
o NetCraft
o GFI MailEssentials
o SpoofGuard
o Phishing Sweeper Enterprise
o TrustWatch Toolbar
o ThreatFire
o GralicWrap
http://www.eccouncil.org EC-Council
o Spyware Doctor
o Track Zapper Spyware-Adware Remover
o AdwareInspector
o Email-Tag.com
o Introduction
o Ways for Getting Email Account Information
o Stealing Cookies
o Social Engineering
o Password Phishing
o Fraudulent e-mail Messages
Vulnerabilities
o Web Email
o Reaper Exploit
Email Hacking Tools
o Tool: Advanced Stealth Email Redirector
o Tool: Mail PassView
o Tool: Email Password Recovery Master
o Tool: Mail Password
o Email Finder Pro
o Email Spider Easy
o Kernel Hotmail MSN Password Recovery
o Retrieve Forgotten Yahoo Password
o MegaHackerZ
o Hack Passwords
http://www.eccouncil.org EC-Council
Securing Email Accounts
o Creating Strong Passwords
Page 47
o Creating Strong Passwords: Change Password
o Creating Strong Passwords: Trouble Signing In
o Sign-in Seal
o Alternate Email Address
o Keep Me Signed In/ Remember Me
o Tool: Email Protector
o Tool: Email Security
o Tool: EmailSanitizer
o Tool: Email Protector
o Tool: SuperSecret
http://www.eccouncil.org EC-Council
o DoS Tool: Bubonic.c
o DoS Tool: Land and LaTierra
o DoS Tool: Targa
o DoS Tool: Blast
o DoS Tool: Nemesy
o DoS Tool: Panther2
o DoS Tool: Crazy Pinger
Page 48
http://www.eccouncil.org EC-Council
o DDoS Tool: TFN2K
o DDoS Tool: Shaft
Page 49
o DDoS Tool: Trinity
o DDoS Tool: Knight and Kaiten
o DDoS Tool: Mstream
How to Conduct a DDoS Attack
The Reflected DoS Attacks
Reflection of the Exploit
Countermeasures for Reflected DoS
DDoS Countermeasures
Taxonomy of DDoS Countermeasures
Preventing Secondary Victims
Detect and Neutralize Handlers
Detect Potential Attacks
DoSHTTP Tool
Mitigate or Stop the Effects of DDoS Attacks
Deflect Attacks
Post-attack Forensics
Packet Traceback
http://www.eccouncil.org EC-Council
The 3-Way Handshake
TCP Concepts 3-Way Handshake
Sequence Numbers
Sequence Number Prediction
TCP/IP hijacking
IP Spoofing: Source Routed Packets
RST Hijacking
Page 50
http://www.eccouncil.org EC-Council
o How are Servers Defaced
Apache Vulnerability
Page 51
Attacks against IIS
o IIS7 Components
Unicode
o Unicode Directory Traversal Vulnerability
o IIS Directory Traversal (Unicode) Attack
Hacking Tool
o Hacking Tool: IISxploit.exe
o Msw3prt IPP Vulnerability
o RPC DCOM Vulnerability
o ASP Trojan
o IIS Logs
o Network Tool: Log Analyzer
o Hacking Tool: CleanIISLog
o IIS Security Tool: Server Mask
o ServerMask ip100
o Tool: CacheRight
o Tool: CustomError
o Tool: HttpZip
o Tool: LinkDeny
o Tool: ServerDefender AI
o Tool: ZipEnable
o Tool: w3compiler
o Yersinia
Tool: Metasploit Framework
KARMA
o Karmetasploit
http://www.eccouncil.org EC-Council
o Prerequisites for Karmetasploit
o Running Karmetasploit
Tool: Immunity CANVAS Professional
Tool: Core Impact
Tool: MPack
Tool: Neosploit
Patch Management
Page 52
http://www.eccouncil.org EC-Council
Module 17: Web Application Vulnerabilities
Page 53
Web Application
Web application Hacking
Anatomy of an Attack
Web Application Threats
Cross-Site Scripting/XSS Flaws
o An Example of XSS
o Countermeasures
SQL Injection
Command Injection Flaws
o Countermeasures
Cookie/Session Poisoning
o Countermeasures
Parameter/Form Tampering
Hidden Field at
Buffer Overflow
o Countermeasures
Directory Traversal/Forceful Browsing
o Countermeasures
Cryptographic Interception
Cookie Snooping
Authentication Hijacking
o Countermeasures
Log Tampering
Error Message Interception
Attack Obfuscation
Platform Exploits
http://www.eccouncil.org EC-Council
DMZ Protocol Attacks
o Countermeasures
Security Management Exploits
o Web Services Attacks
o Zero-Day Attacks
o Network Access Attacks
TCP Fragmentation
Page 54
Hacking Tools
o Instant Source
o Wget
o WebSleuth
o BlackWidow
o SiteScope Tool
o WSDigger Tool – Web Services Testing Tool
o CookieDigger Tool
o SSLDigger Tool
o SiteDigger Tool
o WindowBomb
o Burp: Positioning Payloads
o Burp: Configuring Payloads and Content Enumeration
o Burp: Password Guessing
o Burp Proxy
o Burpsuite
o Hacking Tool: cURL
o dotDefender
o Acunetix Web Scanner
o AppScan – Web Application Scanner
o AccessDiver
http://www.eccouncil.org EC-Council
o Tool: Falcove Web Vulnerability Scanner
o Tool: NetBrute
Page 55
o Tool: Emsa Web Monitor
o Tool: KeepNI
o Tool: Parosproxy
o Tool: WebScarab
o Tool: Watchfire AppScan
o Tool: WebWatchBot
o Tool: Ratproxy
o Tool: Mapper
http://www.eccouncil.org EC-Council
o Afghan Woman Recognized After 17 Years
o Face Recognition
o Face Code: WebCam Based Biometrics Authentication System
o Bill Gates at the RSA Conference 2006
Password Cracking
o How to Select a Good Password
o Things to Avoid in Passwords
Page 56
http://www.eccouncil.org EC-Council
• Hydra
• Cain & Abel
Page 57
• RAR
• Gammaprog
• WebCracker
• Munga Bunga
• PassList
• SnadBoy
• MessenPass
• Wireless WEP Key Password Spy
• RockXP
• Password Spectator Pro
• Passwordstate
• Atomic Mailbox Password Cracker
• Advanced Mailbox Password Recovery (AMBPR)
• Tool: Network Password Recovery
• Tool: Mail PassView
• Tool: Messenger Key
• Tool: SniffPass
o Security Tools
• WebPassword
• Password Administrator
• Password Safe
• Easy Web Password
• PassReminder
• My Password Manager
Countermeasures
http://www.eccouncil.org EC-Council
Module 19: SQL Injection
SQL Injection: Introduction
o What is SQL Injection
o Exploiting Web Applications
o Steps for performing SQL injection
o What You Should Look For
o What If It Doesn’t Take Input
Page 58
o OLE DB Errors
o Input Validation Attack
o SQL injection Techniques
o How to Test for SQL Injection Vulnerability
o How Does It Work
o BadLogin.aspx.cs
o BadProductList.aspx.cs
o Executing Operating System Commands
o Getting Output of SQL Query
o Getting Data from the Database Using ODBC Error Message
o How to Mine all Column Names of a Table
o How to Retrieve any Data
o How to Update/Insert Data into Database
o SQL Injection in Oracle
o SQL Injection in MySql Database
o Attacking Against SQL Servers
o SQL Server Resolution Service (SSRS)
o Osql -L Probing
SQL Injection Tools
o SQL Injection Automated Tools
o Automated SQL Injection Tool: AutoMagic SQL
http://www.eccouncil.org EC-Council
o Absinthe Automated SQL Injection Tool
• Hacking Tool: SQLDict
Page 59
• Hacking Tool: SQLExec
• SQL Server Password Auditing Tool: sqlbf
• Hacking Tool: SQLSmack
• Hacking Tool: SQL2.exe
• sqlmap
• sqlninja
• SQLIer
• Automagic SQL Injector
• Absinthe
Blind SQL Injection
o Blind SQL Injection: Countermeasure
SQL Injection Countermeasures
o Preventing SQL Injection Attacks
o GoodLogin.aspx.cs
SQL Injection Blocking Tool: SQL Block
Acunetix Web Vulnerability Scanner
http://www.eccouncil.org EC-Council
o Wireless Standard: 802.11b – “WiFi”
o Wireless Standard: 802.11g
o Wireless Standard: 802.11i
o Wireless Standard: 802.11n
o Wireless Standard:802.15 (Bluetooth)
o Wireless Standard:802.16 (WiMax)
• WiMax Featured Companies
Page 60
http://www.eccouncil.org EC-Council
o WEP Issues
o WEP - Authentication Phase
Page 61
o WEP - Shared Key Authentication
o WEP - Association Phase
o WEP Flaws
WPA
o What is WPA
o WPA Vulnerabilities
o WEP, WPA, and WPA2
o Wi-Fi Protected Access 2 (WPA2)
o Attacking WPA Encrypted Networks
o Evil Twin: Attack
TKIP and LEAP
o Temporal Key Integrity Protocol (TKIP)
• Working of TKIP
• Changes from WEP to TKIP
o LEAP: The Lightweight Extensible Authentication Protocol
o LEAP Attacks
o LEAP Attack Tool: ASLEAP
• Working of ASLEAP
Hacking Methods
o Techniques to Detect Open Wireless Networks
o Steps for Hacking Wireless Networks
• Step 1: Find Networks to Attack
• Step 2: Choose the Network to Attack
• Step 3: Analyzing the Network
• Step 4: Cracking the WEP Key
• Step 5: Sniffing the Network
http://www.eccouncil.org EC-Council
o Bluejacking
o Super Bluetooth Hack
o Man-in-the-Middle Attack (MITM)
o Denial-of-Service Attacks
o Hijacking and Modifying a Wireless Network
Cracking WEP
o Cracking WEP
Page 62
http://www.eccouncil.org EC-Council
o Scanning Tool: WaveStumbler
o Scanning Tool: Netchaser for Palm Tops
Page 63
o Scanning Tool: AP Scanner
o Scanning Tool: Wavemon
o Scanning Tool: Wireless Security Auditor (WSA)
o Scanning Tool: AirTraf
o Scanning Tool: WiFi Finder
o Scanning Tool: WifiScanner
o eEye Retina WiFI
o Simple Wireless Scanner
o wlanScanner
Sniffing Tools
o Sniffing Tool: AiroPeek
o Sniffing Tool: NAI Wireless Sniffer
o MAC Sniffing Tool: WireShark
o Sniffing Tool: vxSniffer
o Sniffing Tool: Etherpeg
o Sniffing Tool: Drifnet
o Sniffing Tool: AirMagnet
o Sniffing Tool: WinDump
o Multiuse Tool: THC-RUT
o Microsoft Network Monitor
Wireless Security Tools
o WLAN Diagnostic Tool: CommView for WiFi PPC
o WLAN Diagnostic Tool: AirMagnet Handheld Analyzer
o AirDefense Guard (www.AirDefense.com)
o Google Secure Access
o Tool: RogueScanner
http://www.eccouncil.org EC-Council
Module 21: Physical Security
Security Facts
Understanding Physical Security
Physical Security
What Is the Need for Physical Security
Who Is Accountable for Physical Security
Factors Affecting Physical Security
Page 64
http://www.eccouncil.org EC-Council
• Wiretapping
• Remote Access
Page 65
• Lapse of Physical Security
• Locks
Lock Picking
Lock Picking Tools
Information Security
EPS (Electronic Physical Security)
Wireless Security
Laptop Theft Statistics for 2007
Statistics for Stolen and Recovered Laptops
Laptop Theft
Laptop theft: Data Under Loss
Laptop Security Tools
Laptop Tracker - XTool Computer Tracker
Tools to Locate Stolen Laptops
Stop’s Unique, Tamper-proof Patented Plate
Tool: TrueCrypt
Laptop Security Countermeasures
Mantrap
TEMPEST
Challenges in Ensuring Physical Security
Spyware Technologies
Spying Devices
Physical Security: Lock Down USB Ports
Tool: DeviceLock
Blocking the Use of USB Storage Devices
Track Stick GPS Tracking Device
http://www.eccouncil.org EC-Council
Module 22: Linux Hacking
Why Linux
Linux Distributions
Linux Live CD-ROMs
Basic Commands of Linux: Files & Directories
Linux Basic
o Linux File Structure
Page 66
http://www.eccouncil.org EC-Council
Linux Tool: Netcat
Linux Tool: tcpdump
Page 67
Linux Tool: Snort
Linux Tool: SAINT
Linux Tool: Wireshark
Linux Tool: Abacus Port Sentry
Linux Tool: DSniff Collection
Linux Tool: Hping2
Linux Tool: Sniffit
Linux Tool: Nemesis
Linux Tool: LSOF
Linux Tool: IPTraf
Linux Tool: LIDS
Hacking Tool: Hunt
Tool: TCP Wrappers
Linux Loadable Kernel Modules
Hacking Tool: Linux Rootkits
Rootkits: Knark & Torn
Rootkits: Tuxit, Adore, Ramen
Rootkit: Beastkit
Rootkit Countermeasures
‘chkrootkit’ detects the following Rootkits
Linux Tools: Application Security
Advanced Intrusion Detection Environment (AIDE)
Linux Tools: Security Testing Tools
Linux Tools: Encryption
Linux Tools: Log and Traffic Monitors
Linux Security Auditing Tool (LSAT)
http://www.eccouncil.org EC-Council
Linux Security Countermeasures
Steps for Hardening Linux
o IDS Placement
o Ways to Detect an Intrusion
o Types of Instruction Detection Systems
o System Integrity Verifiers (SIVS)
o Tripwire
o Cisco Security Agent (CSA)
o True/False, Positive/Negative
o Signature Analysis
o General Indications of System Intrusions
o General Indications of File System Intrusions
o General Indication of Network Intrusions
o Intrusion Detection Tools
• Snort
• Running Snort on Windows 2003
• Snort Console
• Testing Snort
• Configuring Snort (snort.conf)
• Snort Rules
• Set up Snort to Log to the Event Logs and to Run as a Service
• Using EventTriggers.exe for Eventlog Notifications
http://www.eccouncil.org EC-Council
• SnortSam
o Steps to Perform after an IDS detects an attack
Page 69
o Evading IDS Systems
• Ways to Evade IDS
• Tools to Evade IDS
IDS Evading Tool: ADMutate
Packet Generators
Intrusion Prevention System
o Intrusion Prevention Strategies
o IPS Deployment Risks
o Types of IPS
o Host Based IPS (HIPS)
o Network Based IPS (NIPS)
• Content Based IPS (CIPS)
• Rate Based IPS (RIPS)
o Information Flow in IDS and IPS
o IDS vs. IPS
o IPS Vendors and Products
What is a Firewall?
o What Does a Firewall Do
o Packet Filtering
o What can’t a firewall do
o How does a Firewall work
o Firewall Operations
o Hardware Firewall
o Software Firewall
o Types of Firewall
• Packet Filtering Firewall
http://www.eccouncil.org EC-Council
• IP Packet Filtering Firewall
• Circuit-Level Gateway
• TCP Packet Filtering Firewall
• Application Level Firewall
• Application Packet Filtering Firewall
• Stateful Multilayer Inspection Firewall
o Packet Filtering Firewall
Page 70
o Firewall Identification
o Firewalking
o Banner Grabbing
o Breaching Firewalls
o Bypassing a Firewall using HTTPTunnel
o Placing Backdoors through Firewalls
o Hiding Behind a Covert Channel: LOKI
o Tool: NCovert
o ACK Tunneling
o Tools to breach firewalls
Common Tool for Testing Firewall and IDS
o IDS Testing Tool: Traffic IQ Professional
o IDS Tool: Next-Generation Intrusion Detection Expert System (NIDES)
o IDS Tool: SecureHost
o IDS Tool: Snare
o IDS Testing Tool: TCPOpera
o IDS testing tool: Firewall Informer
o Atelier Web Firewall Tester
What is Honeypot?
o The Honeynet Project
o Types of Honeypots
http://www.eccouncil.org EC-Council
• Low-interaction honeypot
• Medium-interaction honeypot
Page 71
• High-interaction honeypot
o Advantages and Disadvantages of a Honeypot
o Where to place Honeypots
o Honeypots
• Honeypot-SPECTER
• Honeypot - honeyd
• Honeypot – KFSensor
• Sebek
o Physical and Virtual Honeypots
Tools to Detect Honeypots
What to do when hacked
http://www.eccouncil.org EC-Council
How to Mutate a Buffer Overflow Exploit
Once the Stack is Smashed
Examples of Buffer Overflow
o Simple Uncontrolled Overflow of the Stack
o Heap Memory Buffer Overflow Bug
o Simple Buffer Overflow in C
• Code Analysis
Page 72
Tools
o Tool to Defend Buffer Overflow: Return Address Defender (RAD)
o Tool to Defend Buffer Overflow: StackGuard
o Insure++
o Comodo Memory Firewall
o DefencePlus
o BufferShield
o Hardware Level Prevention Of Buffer Overflow
How to Detect Buffer Overflows in a Program
Defense Against Buffer Overflows
http://www.eccouncil.org EC-Council
Message Digest Functions
o One-way Bash Functions
Page 73
o MD5
SHA (Secure Hash Algorithm)
SSL (Secure Sockets Layer)
o RC5
What is SSH
Government Access to Keys (GAK)
RSA Challenge
distributed.net
Code Breaking: Methodologies
Cryptography Attacks
Disk Encryption
Magic Lantern
WEPCrack
Cracking S/MIME Encryption Using Idle CPU Time
Cryptography Tools
o Cleversafe Grid Builder
o PGP (Pretty Good Privacy)
o CypherCalc
o Command Line Scriptor
o CryptoHeaven
o Microsoft Cryptography Tools
http://www.eccouncil.org EC-Council
Limitations of Vulnerability Assessment
Testing
o Penetration Testing
o Types of Penetration Testing
o Risk Management
o Do-It-Yourself Testing
o Outsourcing Penetration Testing Services
Page 74
o Terms of Engagement
o Project Scope
o Pentest Service Level Agreements
o Testing points
o Testing Locations
o Automated Testing
o Manual Testing
o Using DNS Domain Name and IP Address Information
o Enumerating Information about Hosts on Publicly Available Networks
o Testing Network-filtering Devices
o Enumerating Devices
o Denial-of-Service Emulation
Penetration Testing Tools
o Pentest using Appscan
o HackerShield
o Pen-Test Using Cerberus Internet Scanner
o Pen-Test Using Cybercop Scanner
o Pen-Test Using FoundScan Hardware Appliances
o Pen-Test Using Nessus
o Pen-Test Using NetRecon
o Pen-Test Using SAINT
http://www.eccouncil.org EC-Council
o Pen-Test Using SecureNet Pro
o Pen-Test Using SecureScan
Page 75
o Pen-Test Using SATAN, SARA and Security Analyzer
o Pen-Test Using STAT Analyzer
o Pentest Using VigilENT
o Pentest Using WebInspect
o Pentest Using CredDigger
o Pentest Using Nsauditor
o Evaluating Different Types of Pen-Test Tools
o Asset Audit
o Fault Tree and Attack Trees
o GAP Analysis
Threat
o Business Impact of Threat
o Internal Metrics Threat
o External Metrics Threat
o Calculating Relative Criticality
o Test Dependencies
Other Tools Useful in Pen-Test
o Defect Tracking Tools: Bug Tracker Server
o Disk Replication Tools
o DNS Zone Transfer Testing Tools
o Network Auditing Tools
o Trace Route Tools and Services
o Network Sniffing Tools
o Denial of Service Emulation Tools
o Traditional Load Testing Tools
o System Software Assessment Tools
http://www.eccouncil.org EC-Council
o Operating System Protection Tools
o Fingerprinting Tools
o Port Scanning Tools
o Directory and File Access Control Tools
o File Share Scanning Tools
o Password Directories
o Password Guessing Tools
Page 76
http://www.eccouncil.org EC-Council
o Activity: Perimeter Testing
o Activity: Web Application Testing
Page 77
o Activity: Wireless Testing
o Activity: Acquiring Target
o Activity: Escalating Privileges
o Activity: Execute, Implant and Retract
Post Attack Phase and Activities
Penetration Testing Deliverables Templates
http://www.eccouncil.org EC-Council
o DNS Tunnel Client
o DNS Tunneling Countermeasures
o Covert Channel Using SSH
o Covert Channel using SSH (Advanced)
o HTTP/S Tunneling Attack
Covert Channel Hacking Tool: Active Port Forwarder
Covert Channel Hacking Tool: CCTT
Page 78
http://www.eccouncil.org EC-Council
o Virus Infection: Step III
• Marking a File for Infection
Page 79
o Virus Infection: Step IV
o Virus Infection: Step V
Components of Viruses
o Functioning of Replicator part
o Writing Replicator
o Writing Concealer
o Dispatcher
o Writing Bomb/Payload
• Trigger Mechanism
• Bombs/Payloads
• Brute Force Logic Bombs
Testing Virus Codes
Tips for Better Virus Writing
http://www.eccouncil.org EC-Council
CPU
Machine Language
Compilers
Clock Cycle
Original Registers
Instruction Pointer
Pentium Processor
Page 80
Interrupts
Interrupt handler
External interrupts and Internal interrupts
Handlers
Machine Language
Assembly Language
Assembler
Assembly Language Vs High-level Language
Assembly Language Compilers
Instruction operands
MOV instruction
ADD instruction
SUB instruction
INC and DEC instructions
Directive
preprocessor
equ directive
%define directive
Data directives
Labels
Input and output
http://www.eccouncil.org EC-Council
C Interface
Call
Page 81
Creating a Program
Why should anyone learn assembly at all?
o First.asm
Assembling the code
Compiling the C code
Linking the object files
Understanding an assembly listing file
Big and Little Endian Representation
Skeleton File
Working with Integers
Signed integers
Signed Magnitude
Two’s Compliment
If statements
Do while loops
Indirect addressing
Subprogram
The Stack
The SS segment
ESP
The Stack Usage
The CALL and RET Instructions
General subprogram form
Local variables on the stack
General subprogram form with local variables
Multi-module program
http://www.eccouncil.org EC-Council
Saving registers
Labels of functions
Calculating addresses of local variables
http://www.eccouncil.org EC-Council
Tools Used for Shellcode Development
o NASM
Page 83
o GDB
o objdump
o ktrace
o strace
o readelf
Steps for Writing a Shellcode
Issues Involved With Shellcode Writing
o Addressing problem
o Null byte problem
o System call implementation
http://www.eccouncil.org EC-Council
Word Size
Stack
Buffer Overflows
Error
Why do we get a segmentation violation?
Segmentation Error
Instruction Jump
Page 84
http://www.eccouncil.org EC-Council
Compiling the code
sp.c
Page 85
vulnerable.c
NOPs
o Using NOPs
o Estimating the Location
http://www.eccouncil.org EC-Council
The payload
ESP
Limited Space
Getting Windows API/function absolute address
Memory Address
Other Addresses
Compile the program
Page 86
Final Code
http://www.eccouncil.org EC-Council
What Boomerang Can Do?
Andromeda Decompiler
Page 87
Tool: REC Decompiler
Tool: EXE To C Decompiler
Delphi Decompilers
Tools for Decompiling .NET Applications
Salamander .NET Decompiler
Tool: LSW DotNet-Reflection-Browser
Tool: Reflector
Tool: Spices NET.Decompiler
Tool: Decompilers.NET
.NET Obfuscator and .NET Obfuscation
Java Bytecode Decompilers
Tool: JODE Java Decompiler
Tool: JREVERSEPRO
Tool: SourceAgain
Tool: ClassCracker
Python Decompilers
Reverse Engineering Tutorial
OllyDbg Debugger
How Does OllyDbg Work?
Debugging a Simple Console Application
http://www.eccouncil.org EC-Council
o DiskManagement BOM Local Privilege Escalation Vulnerability
o HFS+ do_hfs_truncate() Denial of Service Vulnerability
o ATPsndrsp() Heap Buffer Overflow Vulnerability
o UFS ufs_lookup() Denial of Service Vulnerability
o Other Vulnerabilities in MAC
How a Malformed Installer Package Can Crack Mac OS X
Worm and Viruses in MAC
Page 88
o OSX/Leap-A
o Inqtana.A
o Macro Viruses
MAC OS X Trojans
o Termite
o Sub7ME
o WinJack
o Xover
o Hell Raiser 2.5b
Anti-Viruses in MAC
o VirusBarrier
o McAfee Virex for Macintosh
o Sophos Endpoint Security and Control
o Norton Internet Security
Mac Security Tools
o MacScan
o ClamXav
o IPNetsentryx
o FileGuard
Countermeasures
http://www.eccouncil.org EC-Council
Module 35: Hacking Routers, cable Modems and Firewalls
Page 89
Network Devices
Identifying a Router
o SING: Tool for Identifying the Router
HTTP Configuration Arbitrary Administrative Access Vulnerability
ADMsnmp
Solarwinds MIB Browser
Brute-Forcing Login Services
Hydra
Analyzing the Router Config
Cracking the Enable Password
Tool: Cain and Abel
Implications of a Router Attack
Types of Router Attacks
Router Attack Topology
Denial of Service (DoS) Attacks
Packet “Mistreating” Attacks
Routing Table Poisoning
Hit-and-run Attacks vs. Persistent Attacks
Cisco Router
o Finding a Cisco Router
o How to Get into Cisco Router
o Breaking the Password
o Is Anyone Here
o Covering Tracks
o Looking Around
Eigrp-tool
http://www.eccouncil.org EC-Council
Tool: Zebra
Tool: Yersinia for HSRP, CDP, and other layer 2 attacks
Tool: Cisco Torch
Monitoring SMTP(port25) Using SLcheck
Monitoring HTTP(port 80)
Cable Modem Hacking
o OneStep: ZUP
Page 90
www.bypassfirewalls.net
Waldo Beta 0.7 (b)
http://www.eccouncil.org EC-Council
o Countermeasures
PDA
Page 91
o PDA Security Issues
o ActiveSync attacks
o HotSync Attack
o PDA Virus: Brador
o PDA Security Tools: TigerSuite PDA
o Security Policies for PDAs
iPod
o Misuse of iPod
o Jailbreaking
• Tool for Jailbreaking: iDemocracy
• Tool for Jailbreaking: iActivator
• Tool for Jailbreaking: iNdependence
• Tools for jailbreaking: iFuntastic
o Prerequisite for iPhone Hacking
o Step by Step iPhone Hacking using iFuntastic
o Step by step iPhone Hacking
o AppSnapp
• Steps for AppSnapp
o Tool to Unlock iPhone: iPhoneSimFree
o Tool to Unlock iPhone: anySIM
o Steps for Unlocking your iPhone using AnySIM
o Activate the Voicemail Button on your Unlocked iPhone
o Podloso Virus
o Security tool: Icon Lock-iT XP
Mobile: Is It a Breach to Enterprise Security?
o Threats to Organizations Due to Mobile Devices
http://www.eccouncil.org EC-Council
o Security Actions by Organizations
Viruses
o Skulls
o Duts
o Doomboot.A: Trojan
Antivirus
o Kaspersky Antivirus Mobile
Page 92
o Airscanner
o BitDefender Mobile Security
o SMobile VirusGuard
o Symantec AntiVirus
o F-Secure Antivirus for Palm OS
o BullGuard Mobile Antivirus
Security Tools
o Sprite Terminator
o Mobile Security Tools: Virus Scan Mobile
Defending Cell Phones and PDAs Against Attack
Mobile Phone Security Tips
http://www.eccouncil.org EC-Council
o BlueBug Attack
o Short Pairing Code Attacks
Page 93
o Man-In-Middle Attacks
o OnLine PIN Cracking Attack
o BTKeylogging attack
o BTVoiceBugging attack
o Blueprinting
o Bluesmacking - The Ping of Death
o Denial-of-Service Attack
o BlueDump Attack
Bluetooth hacking tools
o BTScanner
o Bluesnarfer
o Bluediving
o Transient Bluetooth Environment Auditor
o BTcrack
o Blooover
o Hidattack
Bluetooth Viruses and Worms
o Cabir
o Mabir
o Lasco
Bluetooth Security tools
o BlueWatch
o BlueSweep
o Bluekey
o BlueFire Mobile Security Enterprise Edition
o BlueAuditor
http://www.eccouncil.org EC-Council
o Bluetooth Network Scanner
Countermeasures
o Information Sources
o Unearthing Information
o Organizational Structure and Corporate Locations
o Help Desk
o Job Listings
o Phone Numbers and Extensions
o VoIP Vendors
o Resumes
o WHOIS and DNS Analysis
o Steps to Perform Footprinting
Scanning
o Host/Device Discovery
o ICMP Ping Sweeps
o ARP Pings
o TCP Ping Scans
o SNMP Sweeps
o Port Scanning and Service Discovery
o TCP SYN Scan
o UDP Scan
o Host/Device Identification
Enumeration
http://www.eccouncil.org EC-Council
o Steps to Perform Enumeration
o Banner Grabbing with Netcat
Page 95
o SIP User/Extension Enumeration
• REGISTER Username Enumeration
• INVITE Username Enumeration
• OPTIONS Username Enumeration
• Automated OPTIONS Scanning with sipsak
• Automated REGISTER, INVITE and OPTIONS Scanning with SIPSCAN against SIP
server
• Automated OPTIONS Scanning Using SIPSCAN against SIP Phones
o Enumerating TFTP Servers
o SNMP Enumeration
o Enumerating VxWorks VoIP Devices
Steps to Exploit the Network
o Denial-of-Service (DoS)
o Distributed Denial-of-Service (DDoS) Attack
o Internal Denial-of-Service Attack
o DoS Attack Scenarios
o Eavesdropping
o Packet Spoofing and Masquerading
o Replay Attack
o Call Redirection and Hijacking
o ARP Spoofing
o ARP Spoofing Attack
o Service Interception
o H.323-Specific Attacks
o SIP Security Vulnerabilities
o SIP Attacks
http://www.eccouncil.org EC-Council
o Flooding Attacks
o DNS Cache Poisoning
o Sniffing TFTP Configuration File Transfers
o Performing Number Harvesting and Call Pattern Tracking
o Call Eavesdropping
o Interception through VoIP Signaling Manipulation
o Man-In-The-Middle (MITM) Attack
Page 96
http://www.eccouncil.org EC-Council
RFID Risks
o Business Process Risk
Page 97
o Business Intelligence Risk
o Privacy Risk
o Externality Risk
• Hazards of Electromagnetic Radiation
• Computer Network Attacks
RFID and Privacy Issues
Countermeasures
RFID Security and Privacy Threats
o Sniffing
o Tracking
o Spoofing
o Replay attacks
o Denial-of-service
Protection Against RFID Attacks
RFID Guardian
RFID Malware
o How to Write an RFID Virus
o How to Write an RFID Worm
o Defending Against RFID Malware
RFID Exploits
Vulnerabilities in RFID-enabled Credit Cards
o Skimming Attack
o Replay Attack
o Eavesdropping Attack
RFID Hacking Tool: RFDump
RFID Security Controls
http://www.eccouncil.org EC-Council
o Management Controls
o Operational Controls
o Technical Controls
RFID Security
http://www.eccouncil.org EC-Council
o SpamWeasel
o Spytech SpamAgent
Page 99
o AntispamSniper
o Spam Reader Spam Assassin Proxy (SA) Proxy
o MailWasher Free
o Spam Bully
Countermeasures
http://www.eccouncil.org EC-Council
o USB Switchblade
o USB Hacksaw
USB Security Tools
o MyUSBonly
o USBDeview
o USB-Blocker
o USB CopyNotify
Page 100
http://www.eccouncil.org EC-Council
o odbcping Utility
o Tool: ASPRunner Professional
Page 101
o Tool: FlexTracer
Security Tools
SQL Server Security Best Practices: Administrator Checklist
SQL Server Security Best Practices: Developer Checklist
http://www.eccouncil.org EC-Council
Table 1: How Websites Support Objectives of terrorist/Extremist Groups
Electronic Jihad
Electronic Jihad’ App Offers Cyber Terrorism for the Masses
Cyber Jihad – Cyber Firesale
http://internet-haganah.com/haganah/
http://www.eccouncil.org EC-Council
o Tool: Adult Photo Blanker
o Tool: LiveMark Family
Page 103
o Tool: KDT Site Blocker
o Internet Safety Guidelines for Children
http://www.eccouncil.org EC-Council
o Invisible IP Map
o NetConceal Anonymity Shield
o Anonymous Guest
o ViewShield
o IP Hider
o Mask Surf Standard
o VIP Anonymity
Page 104
o SmartHide
o Anonymity Gateway
o Hide My IP
o Claros Anonymity
o Max Internet Optimizer
o Hotspot Shield
o Anonymous Browsing Toolbar
o Invisible Browsing
o Real Time Cleaner
o Anonymous Web Surfing
o Anonymous Friend
o Easy Hide IP
Internet Privacy Tools: Firewall Tools
o Agnitum firewall
o Firestarter
o Sunbelt Personal Firewall
o Netdefender
Internet Privacy Tools: Others
o Privacy Eraser
o CookieCop
o Cookiepal
http://www.eccouncil.org EC-Council
o Historykill
o Tracks eraser
Page 105
Best Practices
o Protecting Search Privacy
o Tips for Internet Privacy
Counter measures
http://www.eccouncil.org EC-Council
o Laptop Anti-Theft
o Inspice Trace
o ZTRACE GOLD
o SecureTrieve Pro
o XTool Laptop Tracker
o XTool Encrypted Disk
o XTool Asset Auditor
Page 106
http://www.eccouncil.org EC-Council
o Binoculars Spy
o Toy Spy
Page 107
o Spy Helicopter
o Wireless Spy Camera
o Spy Kit
o Spy Scope: Spy Telescope and Microscope
o Spy Eye Side Telescope
o Audio Spy Devices
o Eavesdropper Listening Device
o GPS Devices
o Spy Detectors
o Spy Detector Devices
Vendors Hosting Spy Devices
o Spy Gadgets
o Spy Tools Directory
o Amazon.com
o Spy Associates
o Paramountzone
o Surveillance Protection
Spying Tools
o Net Spy Pro-Computer Network Monitoring and Protection
o SpyBoss Pro
o CyberSpy
o Spytech SpyAgent
o ID Computer Spy
o e-Surveiller
o KGB Spy Software
o O&K Work Spy
http://www.eccouncil.org EC-Council
o WebCam Spy
o Golden Eye
Anti-Spying Tools
o Internet Spy Filter
o Spybot - S&D
o SpyCop
o Spyware Terminator
Page 108
o XoftSpySE
http://www.eccouncil.org EC-Council
o Privatefirewall w/Pest Patrol
Countermeasures
Page 109
o Best Practices against Insider Threat
o Countermeasures
http://www.eccouncil.org EC-Council
o Other Important Policies
Policy Statements
Basic Document Set of Information Security Policies
E-mail Security Policy
o Best Practices for Creating E-mail Security Policies
o User Identification and Passwords Policy
Software Security Policy
Page 110
http://www.eccouncil.org EC-Council
o Impacts of piracy
o Software Piracy Rate in 2006
Page 111
o Piracy Blocking
Software Copy Protection Backgrounders
o CD Key Numbers
o Dongles
o Media Limited Installations
o Protected Media
o Hidden Serial Numbers
o Digital Right Management (DRM)
o Copy protection for DVD
Warez
o Warez
o Types of Warez
o Warez Distribution
o Distribution Methods
Tool: Crypkey
Tool: EnTrial
EnTrial Tool: Distribution File
EnTrial Tool: Product & Package Initialization Dialog
EnTrial Tool: Add Package GUI
Tool: DF_ProtectionKit
Tool: Crack Killer
Tool: Logic Protect
Tool: Software License Manager
Tool: Quick License Manager
Tool: WTM CD Protect
http://www.eccouncil.org EC-Council
Module 51: Hacking and Cheating Online Games
Online Games
Basics of Game Hacking
Online Gaming Exploits
Types of Exploits
Online Gaming Risks
Threats in Online Gaming
Page 112
http://www.eccouncil.org EC-Council
Monitoring the Server with Feeds
Tracking Changes in Open Source Projects
Page 113
Risks by Zone
o Remote Zone risk
o Local Zone Risk
Reader Specific Risks
Utilizing the Web Feeds Vulnerabilities
Example for Attacker to Attack the Feeds
Tools
o Perseptio FeedAgent
o RssFeedEater
o Thingamablog
o RSS Builder
o RSS Submit
o FeedDemon
o FeedForAll
o FeedExpress
o RSS and Atom Security
http://www.eccouncil.org EC-Council
o Concerns With Saving Form Or Login Data
o Cleaning Up Browsing History
o Cookies
o Internet History Viewer: Cookie Viewer
Firefox Security
o Blocking Cookies Options
o Tools For Cleaning Unwanted Cookies
Page 114
o Tool: CookieCuller
o Getting Started
o Privacy Settings
o Security Settings
o Content Settings
o Clear Private Data
o Mozilla Firefox Security Features
Hacking Internet Explorer
o Redirection Information Disclosure Vulnerability
o Window Injection Vulnerability
Internet Explorer Security
o Getting Started
o Security Zones
o Custom Level
o Trusted Sites Zone
o Privacy
o Overwrite Automatic Cookie Handling
o Per Site Privacy Actions
o Specify Default Applications
o Internet Explorer Security Features
Hacking Opera
http://www.eccouncil.org EC-Council
o JavaScript Invalid Pointer Vulnerability
o BitTorrent Header Parsing Vulnerability
Page 115
o Torrent File Handling Buffer Overflow Vulnerability
Security Features of Opera
o Security and Privacy Features
Hacking Safari
o Safari Browser Vulnerability
o iPhone Safari Browser Memory Exhaustion Remote Dos Vulnerability
Securing Safari
o Getting started
o Preferences
o AutoFill
o Security Features
Hacking Netscape
o Netscape Navigator Improperly Validates SSL Sessions
o Netscape Navigator Security Vulnerability
Securing Netscape
o Getting Started
o Privacy Settings
o Security Settings
o Content Settings
o Clear Private Data
http://www.eccouncil.org EC-Council
Free Proxy Servers
Use of Proxies for Attack
Tools
o WinGate
o UserGate Proxy Server
o Advanced FTP Proxy Server
o Trilent FTP Proxy
Page 116
o SafeSquid
o AllegroSurf
o ezProxy
o Proxy Workbench
o ProxyManager Tool
o Super Proxy Helper Tool
o MultiProxy
How Does MultiProxy Work
TOR Proxy Chaining Software
TOR Proxy Chaining Software
AnalogX Proxy
NetProxy
Proxy+
ProxySwitcher Lite
Tool: JAP
Proxomitron
SSL Proxy Tool
How to Run SSL Proxy
http://www.eccouncil.org EC-Council
Module 55: Data Loss Prevention
Introduction: Data Loss
Page 117
Causes of Data Loss
How to Prevent Data Loss
Impact Assessment for Data Loss Prevention
Tools
o Security Platform
o Check Point Software: Pointsec Data Security
o Cisco (IronPort)
o Content Inspection Appliance
o CrossRoads Systems: DBProtector
o Strongbox DBProtector Architecture
o DeviceWall
o Exeros Discovery
o GFi Software: GFiEndPointSecurity
o GuardianEdge Data Protection Platform
o ProCurve Identity Driven Manager (IDM)
o Imperva: SecureSphere
o MailMarshal
o WebMarshal
o Marshal EndPoint
o Novell ZENworks Endpoint Security Management
o Prism EventTracker
o Proofpoint Messaging Security Gateway
o Proofpoint Platform Architecture
o Summary Dashboard
o End-user Safe/Block List
o Defiance Data Protection System
http://www.eccouncil.org EC-Council
o Sentrigo: Hedgehog
o Symantec Database Security
o Varonis: DataPrivilege
o Verdasys: Digital Guardian
o VolumeShield AntiCopy
o Websense Content Protection Suite
Page 118
http://www.eccouncil.org EC-Council
o Tool: GPS Diagnostic
o Tool: RECSIM III
Page 119
o Tool: G7toWin
o Tool: G7toCE
o Tool: GPS Security Guard
o GPS Security Guard Functions
o UberTracker
http://www.eccouncil.org EC-Council
o Procedure for Handling Incident
• Stage 1: Preparation
• Stage 2: Identification
• Stage 3: Containment
• Stage 4: Eradication
• Stage 5: Recovery
• Stage 6: Follow-up
Page 120
Incident Management
Why don’t Organizations Report Computer Crimes
Estimating Cost of an Incident
Whom to Report an Incident
Incident Reporting
Vulnerability Resources
What is CSIRT
o CSIRT: Goals and Strategy
o Why an Organization needs an Incident Response Team
o CSIRT Case Classification
o Types of Incidents and Level of Support
o Incident Specific Procedures-I (Virus and Worm Incidents)
o Incident Specific Procedures-II (Hacker Incidents)
o Incident Specific Procedures-III (Social Incidents, Physical Incidents)
o How CSIRT Handles Case: Steps
o Example of CSIRT
o Best Practices for Creating a CSIRT
• Step 1: Obtain Management Support and Buy-in
• Step 2: Determine the CSIRT Development Strategic Plan
• Step 3: Gather Relevant Information
• Step 4: Design your CSIRT Vision
http://www.eccouncil.org EC-Council
• Step 5: Communicate the CSIRT Vision
• Step 6: Begin CSIRT Implementation
Page 121
• Step 7: Announce the CSIRT
World CERTs http://www.trusted-introducer.nl/teams/country.html
http://www.first.org/about/organization/teams/
IRTs Around the World
http://www.eccouncil.org EC-Council
o Pago Fraud Screening Process
o What to do if you are a Victim of a Fraud
o Facts to be Noted by Consumers
Best Practices: Ways to Protect Your Credit Cards
http://www.eccouncil.org EC-Council
o IE PassView
o Yahoo Messenger Password
Page 123
Recommendations for Improving Password Security
Best Practices
http://www.eccouncil.org EC-Council
o InJoy Firewall
o PC Tools Firewall Plus
o Comodo Personal Firewall
o ZoneAlarm
Linux Firewalls
o KMyFirewall
o Firestarter
Page 124
o Guarddog
o Firewall Builder
Mac OS X Firewalls
o Flying Buttress
o DoorStop X Firewall
o Intego NetBarrier X5
o Little Snitch
http://www.eccouncil.org EC-Council
o Spybot
o Mytob
Page 125
Botnet Detection: Tools and Techniques
o Abuse E-mail
o Network Infrastructure: Tools and Techniques
o Intrusion Detection
o Darknets, Honeypots, and Other Snares
o Forensics Techniques and Tools for Botnet Detection
Tool: Ourmon
o How Ourmon Works
Anomaly Detection
o TCP Anomaly Detection by Ourmon
o UDP Anomaly Detection by Ourmon
o Detecting E-mail Anomalies using Ourmon
IRC Protocol
o Ourmon’s RRDTOOL Statistics and IRC Reports
Detecting an IRC Client Botnet
Detecting an IRC Botnet Server
Automated Packet Capture
Ourmon Event Log
o DNS and C&C Technology
o Tricks for Searching the Ourmon Logs
Sniffing IRC Messages
Sandboxes
CWSandbox
o Operations Revealed by CWSandbox
Automated Analysis Suite (AAS)
Responding to Botnets
http://www.eccouncil.org EC-Council
Module 64: Economic Espionage
Economic Espionage
Who are Behind This?
Motives
Economic Intelligence
Trade Secrets
How Foreign Competitors Get the Information
Page 126
http://www.eccouncil.org EC-Council
o Tool: IBM Tivoli Configuration Manager
o Tool: LANDesk Patch Manager
Page 127
o Tool: ConfigureSoft Enterprise Configuration Manager (ECM)
o Tool: BladeLogic Configuration Manager
o Tool: Microsoft Baseline Security Analyzer (MBSA)
• MBSA: Scanning Updates in GUI Mode
• MBSA: Scanning Updates in Command-line Version
o Tool: QChain
o Tool: BigFix Enterprise Suite (BFS)
o Tool: Shavlik NetChk Protect
o Tool: PatchLink Update
o Tool: SecureCentral PatchQuest
o Tool: Patch Authority Ultimate
o Tool: ZENworks Patch Management
o Tool: Ecora Patch Manager
o Tool: Service Pack Manager
o Tool: Altiris Patch Management Solution
o Tool: BMC Patch Manager
o Tool: Hotfix Reporter
o Tool: Numara Patch Manager
o Tool: TrueUpdate
o Tool: FlashUpdate
o Tool: Microsoft Software Update Services (SUS)
o Tool: Prism Patch Manager
o Tool: Patch-Magic
Patch Management Checklist
Best Practices for Patch Management
http://www.eccouncil.org EC-Council
Module 66: Security Convergence
Security Convergence
Challenges Confronting an Effective Security Convergence Policy
Benefits of Using Risk Management in Planning IT Security Administration
RAMCAP
Open Security Exchange (OSE)
CISO (Chief Information Security Officer)
Page 128
Appendix
Trojan: Phatbot
Trojan: Amitis
Trojan: Senna Spy
Trojan: QAZ
Trojan: Back Orifice
http://www.eccouncil.org EC-Council
Trojan: Back Oriffice 2000
Back Oriffice Plug-ins
Page 129
Trojan: SubSeven
Trojan: CyberSpy Telnet Trojan
Trojan: Subroot Telnet Trojan
Trojan: Let Me Rule! 2.0 BETA 9
Trojan: Donald Dick
Trojan: RECUB
http://www.eccouncil.org EC-Council
For Training Requirements, Please
Contact EC-Council ATC.
Page 130
EC-Council
http://www.eccouncil.org
[email protected]
http://www.eccouncil.org EC-Council