Banner 468

pardon hackers
Facebook
RSS

back orifice trojan horse



 Back Orifice 2000 

BO2K or Back Orifice 2000 is one of the most POWERFULL trojans/admin tools out there well for the microsoft environment its not just a trojan , its also a remote network administration tool
so you can use it to hack and if ur an admin
it can make your life a bit eisier i belive if you can master this trojanyou can master any trojan this is realy only foradvanced users (as it was first made for linux) its default TCP port is18006 if its UDPIO the port will be 54320.

Make your server

Like SubSeven there is an edit server this is called bo2kcfg open it it willask you for ports and passwords just use thedefault port 18006 for TCP networking then it will go onto BO2K serverconfiguration select your server (BO2K) and insertthe BO_PEEP plugin this comes in the zip file adding this plugin will addthe vid streem option and hijack option BO_PEEPalso lets the server communicate better with the client then go to thestealth sub folder and enable the server to start upon the victims startup and you can change some default ports if you want butits not a good idia another good plugin to haveis Rattler v10 this send an email when the user is online but you need toconfigure this from the client. again re-namethe server and then get the IP from netstat -n now heres some thingdiffernet open bo2kgui this is the client then click thelittle computer in the bottom left it will come up with edit server settingsname of server well say you named the servermy pic put my pic in there the server address if there ip is http://www.facebook.com/l/165e3O03koA-Kq_cybr5mBOftCg/123.456.78.910and ur port is 18006 put in there http://www.facebook.com/l/165e3O03koA-Kq_cybr5mBOftCg/123.456.78.910:18006 then click ok then connect...it will say something like <BO2K BACK ORIFICE 1.0> in the server responcesection now this is pritty hard to master lets sayyou wanna log the victims key strokes you go to keylogging log keystrokesthen it will say diskfile this is where you wannalog the key strokes to type in a path likeC:\windows\system\catroot\{127D0A1D-4EF2-11D1-8608-00C04FC295EE} some wheretheywill never look then wait for around 20mins then go to stop keylogging andsend the command then to view keystroke logsC:\windows\system\catroot\{127D0A1D-4EF2-11D1-8608-00C04FC295EE} then sendcommand it will the let you view the logs in theserver responce section just mess around with it you will get it its one ofthose trojan that you need to work out your selftheres just so many commands for me to go frew them all but heres someoptionsKeyloggingM$ networkingTCP\IPnetwork mappingfile managerREGEIDTand more and belive me there is loads more also you can infect networks withthis trojan but its not a good idia becausean admin will spot it right away unless your an admin your self and want touse it to well admin things....:-)

[ Read More ]

trojan horse Guptachari

What is Guptachar ?
Guptachar is a remote administration tool ( trojan ) . This means that once you install Guptachar on computer A, you can control computer A from any computer B provided that both computer A and computer B are on the same IP based network like the Internet.
Guptachar also differs from most remote administration tools in one respect. It does not require its own client. This is because Guptachar runs as a web server. So once you've installed Guptachar on Computer A, all you need on Computer B is a web browser.
Guptachar has various features which allow you to administer the remote computer (aka Computer A) like browsing files, uploading files, executing programs, logging keys, shutting down and restarting, etc.

I've got Guptachar installed, how do I do the controlling ?
Say you've got Guptachar installed on Computer A whose IP address is 10.7.1.5, just point your web browser to http://10.7.1.5/ and enjoy.
If you've chosen to install Guptachar on a port other than 80 (discussed in the section on installation), say 8081, simply point your browser to http://10.7.1.5:8081/ instead.

How do I get to know the remote computer's IP Address ?
That's a good question. If computer A accesses the internet through dialup, it is likely to have a different IP address every time it logs on. This is why Guptachar has the facility of an IRCBOT.
Basically, if the IRCBOT feature is activated,whenever the remote computer (Computer A) goes online, Guptachar will connect to an IRC server with a predefined nickname, providing its IP address as its real name. So, whenever you want to know Computer A's IP address, you also connect to the same IRC server (use an IRC client like mIRC) and type /whois nickname.
While installing Guptachar (or by changing its server options), you can specify which IRC server and with what nick to logon. In case, the nickname you specify is already occupied, it'll try to logon with variations of the nick. Say, the nick you specified was gupt, it'll try to login as gupt, then gupt1, then gupt2, etc.
You can also ask Guptachar to connect to IRC via an HTTP proxy. Beware though, some IRC servers do not allow you to connect through a proxy (especially an open one).

How do I install Guptachar ?
Normal Installation
Just run the install.exe file. It'll ask you a series of questions and then install Guptachar on your machine.
Firstly, it'll ask you which port you want Guptachar to work on. Now webservers usually work on port 80. But it might not be such a good idea to operate on that port. Also, if you are installing it on an account with insufficient priveleges, you may be forced to use a higher port no. Remember this though, if you use a port other than 80, say 8081, you'll need to point your browser at http://ipaddress:8081/ instead of http://ipaddress/ or just ipaddress.
Then, it'll ask you whether you want access to the machine to be restricted and if so, it'll ask you for a username password pair.
Then it'll ask you whether you want Keylogging to be enabled. Following this, it'll ask you details about the IRCBOT feature.
Most of these options can be changed later through Guptachar, mostly using Server Options.
Making a Quick Installer
A quick installer is a stand alone .exe file, which has both the guptachar binaries as well as your inputted options stored within itself. Just running the .exe file will install Guptachar on the system without any user interaction. This quick installer will be considered as a virus by most of the antivirus to avoid detection use techinques like binding
To make a quick installer, just run makeqinst.exe. It'll first ask you for the filename of the quickinstaller (ie. the name of the .exe file) and then the same questions that it asks during normal installation.
Running makeqinst.exe does not install Guptachar on your system.
You'll need to run the generated .exe file to actually install Guptachar.

click here to download

[ Read More ]

send free anonymous email using online fake mailer


Email spoofing is email activity in which the sender address and other parts of the email header are altered to appear as though the email originated from a different source. Because core SMTP doesn't provide any authentication, it is easy to impersonate and forge emails.
Although there are legitimate uses, these techniques are also commonly used in spam and phishing emails to hide the origin of the email message.
By altering an email's identifying fields, such as the FromReturn-Path and Reply-To (which can be found in the message header), email can be made to appear to be from someone other than the actual sender.[2]
Occasionally (especially if the spam requires a reply from the recipient, as in advance-fee frauds), the source of the spam email is indicated in the Reply-To field (or at least a way of identifying the spammer); if this is the case and the initial email is replied to, the delivery will be sent to the address specified in the Reply-To field, which could be the spammer's address. However, most spam emails (especially malicious ones with a trojan/virus payload, or those advertising a web site) forge this address too, and replying to it will annoy an innocent third party.
Prior to the advent of unsolicited commercial email (spam) as a viable business model, "legitimately spoofed" email was common. For example, a visiting user might use the local organization's SMTP server to send email from the user's foreign address. Since most servers were configured as open relays, this was a common practice. As spam email became an annoying problem, most of these "legitimate" uses fell victim to antispam techniques.
It is much more difficult to spoof or hide the IP or Internet Protocol address. The IP address is a 32 or 128 bit numerical label assigned to each device participating in a network and originates through the network provider making it more difficult to spoof or hide. Although this kind of verification is difficult for individual users, companies can use this technology as well as others such as cryptographic signatures (e.g., PGP "Pretty Good Privacy" or other encryption technologies) to exchange authenticated email messages. Authenticated email provides a mechanism for ensuring that messages are from whom they appear to be, as well as ensuring that the message has not been altered in transit. Similarly, sites may wish to consider enabling SSL/TLS in their mail transfer software. Using certificates in this manner increases the amount of authentication performed when sending mail.

CLICK HERE to go to online fake mailer tool

[ Read More ]

cehv7 ethical hacking course download


To penetrate delicate information and confidential information, hackers are needed to have some large finish competencies and in-depth knowledge of penetrating computer systems and network. When we think with the expression hacker, we envisage a gloomy picture of a youthful tech-freak who insert few codes and instructions at the laptop display and in turn get some good hugely confidential information and some account quantities. Even so, reality is not that dramatic!...Right here, an ethical hacker is a person who understands and features a operating knowledge of pc systems and also provides the understanding of particular tools which can be integrated to locate the vulnerabilities within the operating of the computer system method and community.
What is CEHv7 education about?
The Certified Ethical HackerCEHv7 is proven and offered from the Global Council of E-Commerce Consultants (EC-Council). CEHv7 coaching and certification program validates and certifies the skills than me professionals with all the abilities and skills to perform specific responsibilities within a distinct task role.
CEHv7 coaching and certification is one of the high-in-demand IT certifications, the strain of IT professionals using this credential is soaring large in history. This really is a single of the greatest resorts for organizations, in these susceptible times, to guard their IT infrastructure. Each and every generally, IT experts are required within the firm to audit security policies and safe the delicate information and conserve their company in the security wreckage.
Hired by the employers, moral hacker's works include acknowledging the loopholes in the community or even the program and reporting the implications towards the owner in the method or the network. The recommended measures also are intended to become talked about and the best way to tackle the vulnerabilities is also recognized and labored upon. The entire process revolves about acquiring gaps inside the method set up and actions to rectify the security difficulties. This complete course of action is worked upon from the IT specialists that have pursued CEHv7 certification.
What would be the importance of CEHv7 education and certification system?
Malicious hacking crimes are inescapable as of late, together with the developing technologies, the security threats will also be increasing. Malicious hackers try to acquire unauthorized entry towards the corporate community, simply to fetch some sensitive information and make difficulty or steal delicate data from the systems.
Mainly, CEHv7 training
Finding the correct expert or possibly a applicant for such career profile is incredibly critical and 1 with the toughest decisions. Factors which can be meant to become taken care of when picking a applicant are lots of, like acquiring out whether or not the professional is equipped with most current understanding of the technologies, the certifications are genuine and to locate out the qualified truly understands what's claimed.
What right after CEHv7 training and certification?
• Security experts• ITDirector / Manager• IT Security Auditors• Method tray network administrators
Surpass IT Safety Difficulties With CEHv7 Instruction and Certification Program
To penetrate delicate data and confidential info, hackers are essential to have some high finish capabilities and in-depth understanding of penetrating laptop or computer techniques and community. When we believe from the expression hacker, we envisage a gloomy image of a youthful tech-freak who insert couple of codes and commands at the laptop or computer screen and consequently have some very confidential information and a few account numbers. Nonetheless, actuality will not be that remarkable!...Right here, an ethical hacker is actually a person who understands and has a working information of laptop systems and also gets the information of certain equipment that is incorporated to locate the vulnerabilities
I got numerous Information Technology Certification. I have written many articles in different ITcertification as well as he has a vast experience in IT industry. In this article I guide the students that how they can pass the exams and how can they get the certification for the latest knowledge this certification exam students click at Microsoft Windows Embedded  or visit its Windows Embedded Certification  its better for your bright future and will helpful to attain the IT certification for more information touch with me.

Course details:

Certified Ethical Hacker

Certified Ethical Hacker (312-50) CEH
Prepare for the Certified Ethical Hacker CEH certification in InfoSec Insitute's Ethical Hackingcourse.


Exam Details

Number of Questions:250
Passing Score:70%
Test Duration:4 Hours
Test Format:Multiple Choice
Test Delivery:Onsite at every InfoSec Institute Ethical Hacking class
Skills Measured
The Exam 312-50 tests Certified Ethical Hacker, CEH certification, candidates on the following 22 domains.
1.CEH Ethics and Legal Issues12.CEH Web Application Vulnerabilities
2.CEH Footprinting 13.CEH Web Based Password Cracking Techniques
3.CEH Scanning 14.CEH SQL Injection
4.CEH Enumeration 15.CEH Hacking Wireless Networks
5.CEH System Hacking 16.CEH Virus and Worms
6.CEH Trojans and Backdoors 17.CEH Hacking Novell
7.CEH Sniffers 18.CEH Hacking Linux
8.CEH Denial of Service 19.CEH IDS, Firewalls and Honeypots
9.CEH Social Engineering 20.CEH Buffer Overflows
10.CEH Session Hijacking21.CEH Cryptography
11.CEH Hacking Web Servers22.CEH Penetration Testing Methodologies

Certified Ethical Hacker (CEH) Module 1: Ethics and Legality
  • What is an Exploit?
  • The security functionality triangle
  • The attacker's process
  • Passive reconnaissance
  • Active reconnaissance
  • Types of attacks
  • Categories of exploits
  • Goals attackers try to achieve
  • Ethical hackers and crackers - who are they
  • Self proclaimed ethical hacking
  • Hacking for a cause (Hacktivism)
  • Skills required for ethical hacking
  • Categories of Ethical Hackers
  • What do Ethical Hackers do?
  • Security evaluation plan
  • Types of Ethical Hacks
  • Testing Types
  • Ethical Hacking Report
  • Cyber Security Enhancement Act of 2002
  • Computer Crimes
  • Overview of US Federal Laws
  • Section 1029
  • Section 1030
  • Hacking Punishment

Certified Ethical Hacker (CEH) Module 2: Footprinting
  • What is Footprinting
  • Steps for gathering information
  • Whois
  • http://tucows.com
  • Hacking Tool: Sam Spade
  • Analyzing Whois output
  • NSLookup
  • Finding the address range of the network
  • ARIN
  • Traceroute
  • Hacking Tool: NeoTrace
  • Visual Route
  • Visual Lookout
  • Hacking Tool: Smart Whois
  • Hacking Tool: eMailTracking Pro
  • Hacking Tool: MailTracking.com

Certified Ethical Hacker (CEH) Module 3: Scanning
  • Determining if the system is alive?
  • Active stack fingerprinting
  • Passive stack fingerprinting
  • Hacking Tool: Pinger
  • Hacking Tool: Friendly Pinger
  • Hacking Tool: WS_Ping_Pro
  • Hacking Tool: Netscan Tools Pro 2000
  • Hacking Tool: Hping2
  • Hacking Tool: KingPing
  • Hacking Tool: icmpenum
  • Hacking Tool: SNMP Scanner
  • Detecting Ping sweeps
  • ICMP Queries
  • Hacking Tool: netcraft.com
  • Port Scanning
  • TCPs 3-way handshake
  • TCP Scan types
  • Hacking Tool: IPEye
  • Hacking Tool: IPSECSCAN
  • Hacking Tool: nmap
  • Port Scan countermeasures
  • Hacking Tool: HTTrack Web Copier
  • Network Management Tools
  • SolarWinds Toolset
  • NeoWatch
  • War Dialing
  • Hacking Tool: THC-Scan
  • Hacking Tool: PhoneSweep War Dialer
  • Hacking Tool: Telesweep
  • Hacking Tool: Queso
  • Hacking Tool: Cheops
  • Proxy Servers
  • Hacking Tool: SocksChain
  • Surf the web anonymously
  • TCP/IP through HTTP Tunneling
  • Hacking Tool: HTTPort
  • Hacking Tool: Tunneld
  • Hacking Tool: BackStealth

Certified Ethical Hacker (CEH) Module 4: Enumeration
  • Determining if the system is alive?
  • What is Enumeration
  • NetBios Null Sessions
  • Null Session Countermeasures
  • NetBIOS Enumeration
  • Hacking Tool: DumpSec
  • Hacking Tool: Hyena
  • Hacking Tool: NAT
  • SNMP Enumertion
  • SNMPUtil
  • Hacking Tool: IP Network Browser
  • SNMP Enumeration Countermeasures
  • Windows 2000 DNS Zone transfer
  • Identifying Win2000 Accounts
  • Hacking Tool: User2SID
  • Hacking Tool: SID2User
  • Hacking Tool: Enum
  • Hacking Tool: UserInfo
  • Hacking Tool: GetAcct
  • Hacking Tool: smbbf
  • SMB Auditing Tools
  • Active Directory Enumeration
  • W2K Active Directory attack


Certified Ethical Hacker (CEH) Module 5: System Hacking
  • Administrator Password Guessing
  • Performing Automated Password Guessing
  • Legion
  • NTInfoScan
  • Defending Against Password Guessing
  • Monitoring Event Viewer Logs
  • VisualLast
  • Eavesdroppin on Network Password Exchange
  • Hacking Tool: L0phtCrack
  • Hacking Tool: KerbCrack
  • Privilege Escalation
  • Hacking Tool: GetAdmin
  • Hacking Tool: hk
  • Manual Password Cracking Algorithm
  • Automatic Password Cracking Algorithm
  • Password Types
  • Types of Password Attacks
  • Dictionary Attack
  • Brute Force Attack
  • Distributed Brute Force Attack
  • Password Change Interval
  • Hybrid Attack
  • Cracking Windows 2000 Passwords
  • Retrieving the SAM file
  • Redirecting SMB Logon to the Attacker
  • SMB Redirection
  • Hacking Tool: SMBRelay
  • Hacking Tool: SMBRelay2
  • Hacking Tool: pwdump2
  • Hacking Tool: SAMdump
  • Hacking Tool: C2MYAZZ
  • Win32 Create Local Admin User
  • Offline NT Password Resetter
  • Hacking Tool: psexec
  • Hacking Tool: remoxec
  • SMBRelay Man-in-the-Middle (MITM)
  • SMBRelay MITM Countermeasures
  • Hacking Tool: SMBGrinder
  • Hacking Tool: SMBDie
  • Hacking Tool: NBTDeputy
  • NetBIOS DoS Attack
  • Hacking Tool: nbname
  • Hacking Tool: John the Ripper
  • LanManager Hash

Certified Ethical Hacker (CEH) Module 6: Trojans and Backdoors
  • What is a Trojan Horse?
  • Overt and Covert
  • Hacking Tool: QAZ
  • Hacking Tool: Tini
  • Hacking Tool: Netcat
  • Hacking Tool: Donald Dick
  • Hacking Tool: SubSeven
  • Hacking Tool: BackOrifice 2000
  • Back Oriffice Plug-ins
  • BoSniffer
  • Hacking Tool: NetBus
  • ComputerSpy Key Logger
  • Hacking Tool: Beast Trojan
  • Hacking Tool: CyberSpy Telnet Trojan
  • Hacking Tool: SubRoot Telnet Trojan
  • Hacking Tool: LetMeRule
  • Wrappers
  • Hacking Tool: Graffiti
  • Hacking Tool: Silk Rope 2000
  • Hacking Tool: EliteWrap
  • Hacking Tool: IconPlus
  • Packaging Tool: Microsoft WordPad
  • Hacking Tool: Whack a Mole Trojan Construction Kit
  • Writing Trojans in Java
  • Hacking Tool: FireKiller 2000
  • Covert Channels
  • ICMP Tunneling
  • Hacking Tool: Loki
  • Reverse WWW Shell
  • Backdoor Countermeasures
  • BO Startup and Registry Entries
  • NetBus Startup and Registry Keys
  • Port Monitoring Tools
  • fPort
  • TCPView
  • Process Viewer
  • Inzider - Tracks Processes and Ports
  • Trojan Maker
  • Hacking Tool: Hard Disk Killer
  • Man-in-the-Middle Attack
  • Hacking Tool: dsniff
  • System File Verification
  • TripWire

Certified Ethical Hacker (CEH) Module 7: Sniffers
  • What is a Sniffer?
  • Hacking Tool: Ethereal
  • Hacking Tool: Snort
  • Hacking Tool: WinDump
  • Hacking Tool: EtherPeek
  • Passive Sniffing
  • Active Sniffing
  • Hacking Tool: EtherFlood
  • How ARP Works?
  • Hacking Tool: ArpSpoof
  • Hacking Tool: DSniff
  • Hacking Tool: Macof
  • Hacking Tool: mailsnarf
  • Hacking Tool: URLsnarf
  • Hacking Tool: Webspy
  • Hacking Tool: Ettercap
  • Hacking Tool: WebMiTM
  • IP Restrictions Scanner
  • Hacking Tool: sTerm
  • Hacking Tool: Cain and Abel
  • Hacking Tool: Packet Crafter
  • Hacking Tool: SMAC
  • MAC Changer
  • ARP Spoofing Countermeasures
  • Hacking Tool: WinDNSSpoof
  • Hacking Tool: Distributed DNS Flooder
  • Hacking Tool: WinSniffer
  • Network Tool: IRIS
  • Network Tool: NetInterceptor
  • SniffDet
  • Hacking Tool: WinTCPKill

Certified Ethical Hacker (CEH) Module 8: Denial of Service
  • What is Denial of Service Attack?
  • Types of DoS Attacks
  • How DoS Work?
  • What is DDoS?
  • Hacking Tool: Ping of Death
  • Hacking Tool: SSPing
  • Hacking Tool: Land
  • Hacking Tool: Smurf
  • Hacking Tool: SYN Flood
  • Hacking Tool: CPU Hog
  • Hacking Tool: Win Nuke
  • Hacking Tool: RPC Locator
  • Hacking Tool: Jolt2
  • Hacking Tool: Bubonic
  • Hacking Tool: Targa
  • Tools for Running DDoS Attacks
  • Hacking Tool: Trinoo
  • Hacking Tool: WinTrinoo
  • Hacking Tool: TFN
  • Hacking Tool: TFN2K
  • Hacking Tool: Stacheldraht
  • Hacking Tool: Shaft
  • Hacking Tool: mstream
  • DDoS Attack Sequence
  • Preventing DoS Attack
  • DoS Scanning Tools
  • Find_ddos
  • SARA
  • DDoSPing
  • RID
  • Zombie Zapper

Certified Ethical Hacker (CEH) Module 9: Social Engineering
  • What is Social Engineering?
  • Art of Manipulation
  • Human Weakness
  • Common Types of Social Engineering
  • Human Based Impersonation
  • Important User
  • Tech Support
  • Third Party Authorization
  • In Person
  • Dumpster Diving
  • Shoulder Surfing
  • Computer Impersonation
  • Mail Attachments
  • Popup Windows
  • Website Faking
  • Reverse Social Engineering
  • Policies and Procedures
  • Social Engineering Security Policies
  • The Importance of Employee Education

Certified Ethical Hacker (CEH) Module 10: Session Hijacking
  • What is Session Hijacking?
  • Session Hijacking Steps
  • Spoofing Vs Hijacking
  • Active Session Hijacking
  • Passive Session Hijacking
  • TCP Concepts - 3 way Handshake
  • Sequence Numbers
  • Sequence Number Example
  • Guessing the Sequence Numbers
  • Hacking Tool: Juggernaut
  • Hacking Tool: Hunt
  • Hacking Tool: TTYWatcher
  • Hacking Tool: IP Watcher
  • Hacking Tool: T-Sight
  • Remote TCP Session Reset Utility
  • Dangers Posed by Session Hijacking
  • Protection against Session Hijacking
Certified Ethical Hacker (CEH) Module 11: Hacking Web Servers
  • Apache Vulnerability
  • Attacks against IIS
  • IIS Components
  • ISAPI DLL Buffer Overflows
  • IPP Printer Overflow
  • msw3prt.dll
  • Oversized Print Requests
  • Hacking Tool: Jill32
  • Hacking Tool: IIS5-Koei
  • Hacking Tool: IIS5Hack
  • IPP Buffer Overflow Countermeasures
  • ISAPI DLL Source Disclosure
  • ISAPI.DLL Exploit
  • Defacing Web Pages
  • IIS Directory Traversal
  • Unicode
  • Directory Listing
  • Clearing IIS Logs
  • Network Tool: LogAnalyzer
  • Attack Signature
  • Creating Internet Explorer (IE) Trojan
  • Hacking Tool: IISExploit
  • Hacking Tool: UnicodeUploader.pl
  • Hacking Tool: cmdasp.asp
  • Escalating Privilages on IIS
  • Hacking Tool: IISCrack.dll
  • Hacking Tool: ispc.exe
  • IIS WebDav Vulnerability
  • Hacking Tool: WB
  • RPC Exploit-GUI
  • Hacking Tool: DComExpl_UnixWin32
  • Hacking Tool: Plonk
  • Unspecified Executable Path Vulnerability
  • Hacking Tool: CleanIISLog
  • File System Traversal Countermeasures
  • Microsoft HotFix Problems
  • UpdateExpert
  • Cacls utility
  • Network Tool: Whisker
  • N-Stealth Scanner
  • Hacking Tool: WebInspect
  • Network Tool: Shadow Security Scanner

Certified Ethical Hacker (CEH) Module 12: Web Application Vulnerabilities
  • Documenting the Application Structure
  • Manually Inspecting Applications
  • Using Google to Inspect Applications
  • Directory Structure
  • Hacking Tool: Instant Source
  • Java Classes and Applets
  • Hacking Tool: Jad
  • HTML Comments and Contents
  • Hacking Tool: Lynx
  • Hacking Tool: Wget
  • Hacking Tool: Black Widow
  • Hacking Tool: WebSleuth
  • Cross Side Scripting
  • Session Hijacking using XSS
  • Cookie Stealing
  • Hacking Tool: IEEN
  • Hacking Tool: IEflaw
  • Exposing Sensitive Data with Google

Certified Ethical Hacker (CEH) Module 13: Web Based Password Cracking Techniques
  • Basic Authentication
  • Message Digest Authentication
  • NTLM Authentication
  • Certificate based Authentication
  • Digital Certificates
  • Microsoft Passport Authentication
  • Forms based Authentication
  • Creating Fake Certificates
  • Hacking Tool: WinSSLMiM
  • Password Guessing
  • Dfault Account Database
  • Hacking Tool: WebCracker
  • Hacking Tool: Brutus
  • Hacking Tool: ObiWan
  • Hacking Tool: Munga Bunga
  • Password dictionary Files
  • Attack Time
  • Hacking Tool: Variant
  • Hacking Tool: PassList
  • Query Strings
  • Post data
  • Hacking Tool: cURL
  • Stealing Cookies
  • Hacking Tool: CookieSpy
  • Hacking Tool: ReadCookies
  • Hacking Tool: SnadBoy

Certified Ethical Hacker (CEH) Module 14: SQL Injection
  • What is SQL Injection Vulnerability?
  • SQL Insertion Discovery
  • Blank sa Password
  • Simple Input Validation
  • SQL Injection
  • OLE DB Errors
  • 1=1
  • blah' or 1=1
  • Preventing SQL Injection
  • Database Specific SQL Injection
  • Hacking Tool: SQLDict
  • Hacking Tool: SQLExec
  • Hacking Tool: SQLbf
  • Hacking Tool: SQLSmack
  • Hacking Tool: SQL2.exe
  • Hacking Tool: Oracle Password Buster

Certified Ethical Hacker (CEH) Module 15: Hacking Wireless Networks
  • 802.11 Standards
  • What is WEP?
  • Finding WLANs
  • Cracking WEP keys
  • Sniffing Trafic
  • Wireless DoS Attacks
  • WLAN Scanners
  • WLAN Sniffers
  • MAC Sniffing
  • Access Point Spoofing
  • Securing Wireless Networks
  • Hacking Tool: NetTumbler
  • Hacking Tool: AirSnort
  • Hacking Tool: AiroPeek
  • Hacking Tool: WEP Cracker
  • Hacking Tool: Kismet
  • Hacking Tool: AirSnarf
  • WIDZ- Wireless IDS

Certified Ethical Hacker (CEH) Module 16: Virus and Worms
  • Cherobyl
  • ExploreZip
  • I Love You
  • Melissa
  • Pretty Park
  • Code Red Worm
  • W32/Klez
  • BugBear
  • W32/Opaserv Worm
  • Nimda
  • Code Red
  • SQL Slammer
  • Batch File Virus Creator
  • How to write your own Virus?
  • Worm Construction Kits

Certified Ethical Hacker (CEH) Module 17: Novell Hacking
  • Common accounts and passwords
  • Accessing password files
  • Password crackers
  • Netware Hacking Tools
  • Chknull
  • NOVELBFH
  • NWPCRACK
  • Bindery
  • BinCrack
  • SETPWD.NLM
  • Kock
  • userdump
  • Burglar
  • Getit
  • Spooflog
  • Gobbler
  • Novelffs
  • Pandora

Certified Ethical Hacker (CEH) Module 18: Linux Hacking
  • Why Linux ?
  • Linux Basics
  • Compiling Programs in Linux
  • Scanning Networks
  • Mapping Networks
  • Password Cracking in Linux
  • Linux Vulnerabilities
  • SARA
  • TARA
  • Sniffing
  • A Pinger in Disguise
  • Session Hijacking
  • Linux Rootkits
  • Linux Security Countermeasures
  • IPChains and IPTables

Certified Ethical Hacker (CEH) Module 19: IDS, Firewalls and Honeypots
  • Intrusion Detection System
  • System Integrity Verifiers
  • How are Intrusions Detected?
  • Anomaly Detection
  • Signature Recognition
  • How does IDS match Signatures with Incoming Traffic?
  • Protocol Stack Verification
  • Application Protocol Verification
  • What Happens after an IDS Detects an Attack?
  • IDS Software Vendors
  • SNORT
  • Evading IDS (Techniques)
  • Complex IDS Evasion
  • Hacking Tool: fragrouter
  • Hacking Tool: TCPReplay
  • Hacking Tool: SideStep
  • Hacking Tool: NIDSbench
  • Hacking Tool: ADMutate
  • IDS Detection
  • Tools to Detect Packet Sniffers
  • Tools to inject strangely formatted packets onto the wire
  • Hacking Through Firewalls
  • Placing Backdoors through Firewalls
  • Hiding behind Covert Channels
  • Hacking Tool: Ncovert
  • What is a Honeypot?
  • Honeypots Evasion
  • Honeypots vendors
  • Hacking Tool: Honeyd
Certified Ethical Hacker (CEH) Module 20: Buffer Overflows
  • What is a Buffer Overflow?
  • Exploitation
  • Assembly Language Basics
  • How to Detect Buffer Overflows in a Program?
  • Skills Required
  • CPU/OS Dependency
  • Understanding Stacks
  • Stack Based Buffer Overflows
  • Buffer Overflow Technical Implementation
  • Writing your own Buffer Overflow Exploit in C
  • Defense against Buffer Overflows
  • Type Checking Tools for Compiling Programs
  • StackGuard
  • Immunix


Certified Ethical Hacker (CEH) Module 21: Cryptography
  • What is PKI?
  • Digital Certificates
  • RSA
  • MD-5
  • RC-5
  • SHA
  • SSL
  • PGP
  • SSH
  • Encryption Cracking Techniques


Certified Ethical Hacker (CEH) Module 22: Penetration Testing Methodologies
  • Physical Security Testing
  • Port Scanning Testing
  • System Identification Testing
  • Services Identification Testing
  • Vulnerability Research and Verification Testing
  • Application Testing and Source Code Review
  • Router Testing
  • Firewall Testing
  • Intrusion Detection System Testing
  • Domain Trusted Systems Testing


Download link:



  • Application Password Cracking Testing
  • Denial of Service Testing
  • Containment Measures Testing
  • Information Security
  • Document Grinding
  • Gathering Competitive Intelligence
  • Social Engineering Testing
  • Wireless Networks Testing
  • Cordless Communications Testing
  • Infrared Systems Testing
  • Modem Testing
  • Writing Penetration Testing Reports
[ Read More ]