practice labs ethical hacker€¦ · practice labs ethical hacker lab outline the ethical hacker...
TRANSCRIPT
Practice Labs Ethical Hacker
The Ethical Hacker Practice Lab will provide you with the necessary platform to gain hands on skills in security. By completing the lab tasks you will improve your practical skills in Footprinting & Reconnaissance, Scanning Networks, Device & Device Enumeration, Social Engineering, System Hacking Concepts and Port & Process Monitoring.
Prerequisites
© 2007 - 2017 I-Qubed Solutions Ltd. T/A Practice Labs Company registered in England Company No. 05939037 VAT No. 900079851
Support 9am-5pm(GMT) : +44 (0) 203 588750E-mail: [email protected]
Course Code
Released Duration
Skill LevelPLAB-EH02
Jan 2018 24 hours
Intermediate
Practice Labs Ethical Hacker
Lab Outline
The Ethical Hacker Practice Lab certificate is aimed at those working in Cyber Security, Penetration Testing, Security Consultants or IT professionals seeking to advance their hands-on skills in Ethical Hacking.
Who is it For?
• Identify live systems and work with network diagrams
• Identify Open Ports, track port usage and perform port redirection
• Scan Networks using Nmap and hping• Perform OS fingerprinting• Perform banner grabbing• Create a simple virus, plant a Backdoor and use
malware and Trojan analysis tools• View cookie information from unencrypted sites• Working with Burp Suite and Firefox• Perform cross-site scripting (XSS) attacks• Crack passwords for web applications and
websites• Install and configure ManageEngine OpManager• Work with IPSec• Use Enumeration Tools• Perform a Man-in-the-Middle (MITM) attack• Perform offline attacks• Use the Social Engineering Toolkit (SET) in Kali
Linux• Monitor Ports and Processes• Protect files and folders• Perform packet Sniffing• Use the vulnerability scanner MBSA• Perform encryption and hashing• Configuring IDS and honeypots• Reset windows passwords and crack Kerberos
credentials
No prior hands-on experience is required to use or complete this Practice Lab, however it would be beneficial to be familiar with basic networking and security concepts.
OutcomesAfter completing this Practice Lab, students will be able to:
© 2007 - 2017 I-Qubed Solutions Ltd. T/A Practice Labs Company registered in England Company No. 05939037 VAT No. 900079851
Lab TopologiesYou will also have access to the following topologies:
Practice Labs Ethical Hacker
PLABDC01192.168.0.1/24
PLABDM01192.168.0.2/24
PLABWIN801192.168.0.5
PLABWIN10192.168.0.4
PLABKALI01 192.168.0.3
PLABSA01192.168.0.1
PLABWIN10192.168.0.4
PLABKALI01192.168.0.3
Performing a Check for Live Systems
IntroductionExercise 1 - Identifying Live SystemsSummary
Performing a Check for Open Ports
IntroductionExercise 1 - Identifying Open PortsSummary
Implementing Scanning Techniques
IntroductionExercise 1 - Scanning Networks using NmapExercise 2 - Scanning Networks using Hping3Summary
OS Fingerprinting
IntroductionExercise 1 - OS FingerprintingSummary
Banner Grabbing
IntroductionExercise 1 - Performing Banner GrabbingSummary
Performing Malware Attacks
IntroductionExercise 1 - Creating a Simple VirusExercise 2 - Determining Open PortsExercise 3 - Tracking Port UsageExercise 4 - Performing Port RedirectionSummary
Implementing Application-level Session Hijacking IntroductionExercise 1 - Viewing Cookie Information from Unencrypted SitesSummary
Hacking Web Applications
IntroductionExercise 1 - Working with Burp Suite and FirefoxExercise 2 - Performing Cross-site Scripting (XSS) AttacksExercise 3 - Cracking Passwords for Web Applications and WebsitesSummary
Modules and Exercises
© 2007 - 2017 I-Qubed Solutions Ltd. T/A Practice Labs Company registered in England Company No. 05939037 VAT No. 900079851
Mapping Networks
IntroductionExercise 1 - Working with Network Diagrams Exercise 2 – Install and Configure ManageEngine OpManagerSummary
Planting a Backdoor
IntroductionExercise 1 - Working with BackdoorSummary
Working with IPSec
IntroductionExercise 1 - Managing IPSec Negotiation PoliciesExercise 2 - Working with Security Association Rules in Windows Firewall with Advanced SecuritySummary
Using Enumeration Tools
IntroductionExercise 1 - Performing Zone TransfersExercise 2 - Working with Remote TargetsExercise 3 - Working with Finger CommandSummary
Implementing Network-level Session Hijacking
IntroductionExercise 1 - Performing Man-in-the-Middle (MITM) AttackSummary
Performing Offline Attacks
IntroductionExercise 1 - Extracting Hashes from a SystemExercise 2 - Cracking Extracted Hashes Exercise 3 - Cracking PasswordsSummary
Conduct Social Engineering Attack
IntroductionExercise 1 - Use the Social Engineering Toolkit (SET) in Kali LinuxSummary
Trojan Protection
Introduction Exercise 1 - Use Malware and Trojan Analysis ToolsExercise 2 - Monitor Ports and ProcessesExercise 3 - Monitor and Protect Files and FoldersSummary
Practice Labs Ethical Hacker
© 2007 - 2017 I-Qubed Solutions Ltd. T/A Practice Labs Company registered in England Company No. 05939037 VAT No. 900079851
Social Engineering Reconnaissance
IntroductionExercise 1 - Social Engineering ReconnaissanceSummary
Packet Sniffing
IntroductionExercise 1 - Packet Sniffing for PasswordsExercise 2 - Packet Sniffing for Image Capture and ExtractionSummary
Vulnerability Scanner MBSAIntroduction
Exercise 1 - Introduction to Microsoft Baseline Security AnalyserExercise 2 - Implementing RecommendationsExercise 3 - Saving Microsoft Security Baseline Analyzer ReportsExercise 4 - Reviewing Configuration ChangesSummary
Encryption and Hashing
Introduction Exercise 1 - Cryptographic BasicsExercise 2 - Comparing Hashing AlgorithmsExercise 3 - Comparing Hash ValuesSummary
Analyzing Captured Traffic
IntroductionExercise 1 - GeoIP MappingExercise 2 - Packet JumpingExercise 3 - Statistics MenuExercise 4 - Firewall ACL Rule CreationSummary
Configuring IDS and Honeypots
IntroductionExercise 1 - Snort InstallationExercise 2 - Test SnortExercise 3 - Configure and Re-Test SnortSummary
Resetting Windows Passwords
IntroductionExercise 1 - Working with Trinity Rescue Kit (TRK)Summary
Cracking Kerberos
Practice Labs Ethical Hacker