Kategori
CEH Security

System Hacking

5.1 Cracking Passwords Password Cracking Password cracking techniques are used to recover passwords from computer systems. Attackers use password cracking techniques to gain unauthorized access to the vulnerable system. Most of the password cracking techniques are successful due to weak or easily guessable passwords. Types of Password Attacks Non-Electronic Attacks: Attacker need not posses technical knowledge to crack password, hence known as non-technical attack. […]

Kategori
CEH Security

Enumeration

4.1 Enumeration Conecpts What is Enumeration? In the enumeration phase, attacker creates active connections to system and performs directed queries to gain more information about the target. Attackers use extracted information to identify system attack points and perform password attacks to gain unauthorized access to information system resources. Enumeration techniques are conducted in an intranet environment. Information Enumerated by Intruders: Network resources Network shares Routing […]

Kategori
CEH Security

Scanning Networks

Overview of Network Scanning Network scanning refers to a set of procedures for identifying hosts, ports, and services in a network. Network scanning is one of the components of intelligence gathering an attacker uses to create a profile of the target organization. Objectives of Network Scanning: To discover live hosts, IP address, and open ports of live hosts To […]

Kategori
CEH Security

Footprinting and Reconnaissance

2.1 Footprinting Concepts What is Footprinting? Footprinting is the process of collecting as much information as possible about a target network, for identifying various ways to intrude into an organization’s network system. Footprinting is the first step of any attack on information systems; attacker gathers publicly available sensitive information, using which he/she performs social engineering, system and network […]

Kategori
CEH Security

Introduction to Ethical Hacking

1.1 Information Security Overview Malware Trends in 2014 Source code leaks accelerated malware release cycles (malware variants) characteristics、signatures、evasive capabilities anti-virus/anti-malware Old school malware techniques made a comeback anti-virus applications、IDS、firewall cyber-crime techniques (manual) (time consuming) (infection) (propagation) Growth of 64-bit malware increased64-bit Malware researcher evasion became more popular Mobile SMS-forwarding malware are becoming ubiquitous Account takeover moved to the victim’s device Attacks on […]