-
Notifications
You must be signed in to change notification settings - Fork 53
LAB Choices
- Professional setup
- Certification BUY from ECC
- Certification DIY (2 flavors)
Cloud - AWS (This is what we use in O'Reilly class)
Local Virtual - VMware / Oracle Virtual Box
Sign up for lab environments that will complete all of the exam objectives. ECC charges $200 for the most complete 40 hours of continuous lab. https://store.eccouncil.org/product/ilabs-ceh/ There are other labs out there, not as good. The amount of money you spend is directly proportional to the number of labs that you will receive and the completeness of the environment. ECCouncil's vendor support this lab environment much better than all of the others. Completeness, speed of support, and quality are the metrics you care about.
LABS from ECC that you should NOT do:
Most of the time the labs are good at what they do: They teach the ECC way...every once in a while, ah no.
- MOD06- system hacking
- Lab 3 - these tools do not work as you expect
- Task 1: User System Monitoring and Surveillance using Power Spy (cannot get in or out of stealth mode unless you buy)
- Task 2: User System Monitoring and Surveillance using Spytech SpyAgent - (these are end user tools not professional)
- my only argument for using them is: previously installed / living off the land?????
- Task 3: Hide Files using NTFS Streams ( as of 2021-04-29 - wrong instructions)
- Lab 4
- Task 4: Clear Windows Machine Logs using CCleaner
- If you do not know why read this:
- https://www.zdnet.com/article/avast-no-plans-to-discontinue-ccleaner-following-second-hack-in-two-years/
- currently on the front page of site
Metasploit https://vimeo.com/504988333
Scanning https://vimeo.com/504988333
System hacking https://vimeo.com/505905232
OpenVAS Vulnerability scanning https://vimeo.com/506310903
Nmap Scanning https://vimeo.com/506615034
Snort IDS https://vimeo.com/506867367
Cain & Abel Passwords (MItM & Hash dump inspection) https://vimeo.com/507285897
==Spend > 30 min https://tools.kali.org/information-gathering/firewalk
Firewalk
video 3 minutes https://learning.oreilly.com/videos/introduction-to-penetration/9781771375245/9781771375245-video234009
Tool updated last 2004 http://packetfactory.openwall.net/projects/firewalk/
Kali page https://tools.kali.org/information-gathering/firewalk
Original talk as PPT: https://docs.google.com/presentation/d/1vEUnULRsVZmhXbZeeXoNhww7oD3Nvhiz8CyLJ6EO-2M/edit?usp=sharing
Burp Suite https://vimeo.com/507769865
hping
Rick's 4 min. https://learning.oreilly.com/videos/tcp-ip/9781771370790/9781771370790-video167000
kali https://tools.kali.org/information-gathering/hping3
wiki http://wiki.hping.org/33
IDIP Idle scan https://nmap.org/book/idlescan.html
Aircrack-ng https://www.aircrack-ng.org/
https://learning.oreilly.com/videos/professional-guide-to/9781771373555
$50 Tool https://www.amazon.com/Network-AWUS036AC-Long-Range-Wide-Coverage-High-Sensitivity/dp/B01B33WU82
$100 Real tool- not EXAM TOOL https://shop.hak5.org/products/wifi-pineapple
Ettercap /bettercap
https://learning.oreilly.com/library/view/metasploit-penetration-testing/9781788623179/96b846b6-2d98-4117-9063-f3bbdd28260b.xhtml
John the Ripper
https://learning.oreilly.com/library/view/kali-linux-2018/9781789341768/ac73dd9e-cd65-41a3-975b-d1ea91ad9e63.xhtml
Maltego
https://courses.maltego.com/courses/maltego-essentials-v1
Extracting links - programming https://learning.oreilly.com/library/view/python-penetration-testing/9781787128187/ch26s03.html
To gain access you must buy an account from ECC https://store.eccouncil.org/product/ilabs-ceh/
- min.190 #-02 https://eccouncil.learnondemand.net/Lab/38844 Footprinting and Reconnaissance. Video
- min.120 #-03 https://eccouncil.learnondemand.net/Lab/38845 Scanning Networks. Video
- min.135 #-08 https://eccouncil.learnondemand.net/Lab/38846 Sniffing. Video
- min.095 #-04 https://eccouncil.learnondemand.net/Lab/38853 Enumeration. Video
- min.065 #-05 https://eccouncil.learnondemand.net/Lab/38854 Vulnerability Analysis. Video
- min.190 #-06 https://eccouncil.learnondemand.net/Lab/38847 System Hacking (l3t1=FAIL). Video
- min.040 #-11 https://eccouncil.learnondemand.net/Lab/38855 Session Hijacking. Video
- min.080 #-13 https://eccouncil.learnondemand.net/Lab/38851 Hacking Web Servers. Video
- min.190 #-14 https://eccouncil.learnondemand.net/Lab/38858 Hacking Web Applications. Video
- min.050 #-15 https://eccouncil.learnondemand.net/Lab/38857 SQL Injection. Video
Do you have a lab you can sit this in? Can you setup a web server? Do you have virtualization tool that matches image?
https://www.vulnhub.com/entry/damn-vulnerable-web-application-dvwa-107,43/ https://dvwa.co.uk/ http://www.itsecgames.com/ https://google-gruyere.appspot.com/part1
https://www.offensive-security.com/labs/individual/
https://overthewire.org/wargames/
http://certifiedhacker.com/ a real website with no instructions- great for recon stage. ( from eccouncil)
- Rent: from ECC https://store.eccouncil.org/product/ilabs-ceh/ :Fast easy $199 learn for exam
- Local Lab - You have vmware/or virtualbox Download AFTER class time: links are given at end of class day
- AWS lab - You have a credit card and you know this will cost you
You will need to support your virtual infrastructure Set your IP addresses to internal for victims and bounce your Kali between private and public IPs when you need items from internet. Required: Download kali & setup https://www.kali.org/get-kali/#kali-virtual-machines Build your own victims Follow https://github.com/rapid7/metasploitable3 2-6 hours
- https://aws.amazon.com/marketplace/search/results?x=0&y=0&searchTerms=kali
- cost you more & you can get a gui preset for you if you choose Kali GUI Linux with Support by Techlatest.net
- You will need the tools if you choose the first option
- https://www.kali.org/docs/general-use/metapackages/
- Installing tools as you need them slows the lab process down.
- If you do not want to mess around: but realize the cost of storage: kali-linux-everything
- If you want to do your own install GUI
- Setting up RDP with Xfce https://www.kali.org/docs/general-use/xfce-with-rdp/
- Then you must fix your errors or hit cancel every time you login
- http://c-nergy.be/blog/?p=12043
- but then you need to move your victims to the cloud