CEHv12 Course Outline
CEHv12 Course Outline
CEHv12 Course Outline
Course Outline
Whois Footprinting
▪ Whois Lookup
▪ Finding IP Geolocation Information
DNS Footprinting
▪ Extracting DNS Information
▪ Reverse DNS Lookup
Network Footprinting
▪ Locate the Network Range
▪ Traceroute
▪ Traceroute Analysis
▪ Traceroute Tools
Footprinting through Social Engineering
▪ Footprinting through Social Engineering
▪ Collect Information Using Eavesdropping, Shoulder Surfing, Dumpster Diving, and
Impersonation
Footprinting Tools
▪ Footprinting Tools: Maltego and Recon-ng
▪ Footprinting Tools: FOCA and OSRFramework
▪ Footprinting Tools: OSINT Framework
▪ Footprinting Tools: Recon-Dog and BillCipher
▪ Footprinting Tools: Spyse
Footprinting Countermeasures
▪ Footprinting Countermeasures
o Examples of Vulnerabilities
▪ Vulnerability Research
▪ Resources for Vulnerability Research
▪ What is Vulnerability Assessment?
▪ Vulnerability Scoring Systems and Databases
▪ Vulnerability-Management Life Cycle
o Pre-Assessment Phase
o Vulnerability Assessment Phase
o Post Assessment Phase
Vulnerability Classification and Assessment Types
▪ Vulnerability Classification
o Misconfigurations/Weak Configurations
o Application Flaws
o Poor Patch Management
o Design Flaws
o Third-Party Risks
o Default Installations/Default Configurations
o Operating System Flaws
o Default Passwords
o Zero-Day Vulnerabilities
o Legacy Platform Vulnerabilities
o System Sprawl/Undocumented Assets
o Improper Certificate and Key Management
▪ Types of Vulnerability Assessment
Vulnerability Assessment Tools
▪ Comparing Approaches to Vulnerability Assessment
▪ Characteristics of a Good Vulnerability Assessment Solution
▪ Working of Vulnerability Scanning Solutions
▪ Types of Vulnerability Assessment Tools
▪ Choosing a Vulnerability Assessment Tool
▪ Criteria for Choosing a Vulnerability Assessment Tool
Escalating Privileges
▪ Privilege Escalation
▪ Privilege Escalation Using DLL Hijacking
▪ Privilege Escalation by Exploiting Vulnerabilities
▪ Privilege Escalation Using Dylib Hijacking
▪ Privilege Escalation Using Spectre and Meltdown Vulnerabilities
▪ Privilege Escalation Using Named Pipe Impersonation
▪ Privilege Escalation by Exploiting Misconfigured Services
▪ Pivoting and Relaying to Hack External Machines
▪ Privilege Escalation Using Misconfigured NFS
▪ Privilege Escalation Using Windows Sticky Keys
▪ Privilege Escalation by Bypassing User Account Control (UAC)
▪ Privilege Escalation by Abusing Boot or Logon Initialization Scripts
▪ Privilege Escalation by Modifying Domain Policy
▪ Retrieving Password Hashes of Other Domain Controllers Using DCSync Attack
▪ Other Privilege Escalation Techniques
o Access Token Manipulation
o Parent PID Spoofing
o Application Shimming
o Filesystem Permission Weakness
o Path Interception
o Abusing Accessibility Features
o SID-History Injection
o COM Hijacking
o Scheduled Tasks in Windows
o Scheduled Tasks in Linux
o Launch Daemon
o Plist Modification
o Setuid and Setgid
o Web Shell
o Abusing Sudo Rights
• Abusing DPAPI
• Malicious Replication
• Skeleton Key Attack
• Golden Ticket Attack
• Silver Ticket Attack
o Maintain Domain Persistence Through AdminSDHolder
o Maintaining Persistence Through WMI Event Subscription
o Overpass-the-Hash Attack
o Linux Post Exploitation
o Windows Post Exploitation
o How to Defend against Persistence Attacks
Clearing Logs
▪ Covering Tracks
▪ Disabling Auditing: Auditpol
▪ Clearing Logs
▪ Manually Clearing Event Logs
▪ Ways to Clear Online Tracks
▪ Covering BASH Shell Tracks
▪ Covering Tracks on a Network
▪ Covering Tracks on an OS
▪ Delete Files using Cipher.exe
▪ Disable Windows Functionality
▪ Hiding Artifacts in Windows, Linux, and macOS
▪ Track-Covering Tools
▪ Defending against Covering Tracks
▪ Components of Malware
▪ Potentially Unwanted Application or Applications (PUAs)
o Adware
APT Concepts
▪ What are Advanced Persistent Threats?
▪ Characteristics of Advanced Persistent Threats
▪ Advanced Persistent Threat Lifecycle
Trojan Concepts
▪ What is a Trojan?
▪ How Hackers Use Trojans
▪ Common Ports used by Trojans
▪ Types of Trojans
o Remote Access Trojans
o Backdoor Trojans
o Botnet Trojans
o Rootkit Trojans
o E-banking Trojans
• Working of E-banking Trojans
• E-banking Trojan: Dreambot
o Point-of-Sale Trojans
o Defacement Trojans
o Service Protocol Trojans
o Mobile Trojans
o IoT Trojans
o Security Software Disabler Trojans
o Destructive Trojans
o DDoS Trojans
o Command Shell Trojans
▪ How to Infect Systems Using a Trojan
o Creating a Trojan
o Employing a Dropper or Downloader
o Employing a Wrapper
o Employing a Crypter
o Propagating and Deploying a Trojan
o Exploit Kits
Virus and Worm Concepts
▪ Introduction to Viruses
▪ Stages of Virus Lifecycle
▪ Working of Viruses
o How does a Computer Get Infected by Viruses?
▪ Types of Viruses
o System or Boot Sector Viruses
o File Viruses
o Multipartite Viruses
o Macro Viruses
o Cluster Viruses
o Stealth Viruses/Tunneling Viruses
o Encryption Viruses
o Sparse Infector Viruses
o Polymorphic Viruses
o Metamorphic Viruses
o Overwriting File or Cavity Viruses
o Companion/Camouflage Viruses
o Shell Viruses
o File Extension Viruses
o FAT Viruses
o Logic Bomb Viruses
o Web Scripting Virus
o E-mail Viruses
o Armored Viruses
o Add-on Viruses
o Intrusive Viruses
• Maintaining Persistence
▪ Virus Analysis: REvil Ransomware
o REvil Ransomware Attack Stages
• Initial Access
• Download and Execution
• Exploitation
• Lateral Movement / Defense Evasion and Discovery
• Credential Access and Exfiltration / Command and Control
▪ Fileless Malware Analysis: SockDetour
o SockDetour Fileless Malware Attack Stages
• Pre-exploitation
• Initial infection
• Exploitation
• Post-exploitation
✓ Client Authentication and C2 Communication After Exploitation
✓ Plugin Loading Feature
Malware Countermeasures
▪ Trojan Countermeasures
▪ Backdoor Countermeasures
▪ Virus and Worm Countermeasures
▪ Fileless Malware Countermeasures
Anti-Malware Software
▪ Anti-Trojan Software
▪ Antivirus Software
▪ Fileless Malware Detection Tools
▪ Fileless Malware Protection Tools
o Ping Method
o DNS Method
o ARP Method
▪ Promiscuous Detection Tools
✓ Pharming
✓ Spimming
✓ Angler Phishing
✓ Catfishing Attack
✓ Deepfake Attacks
• Phishing Tools
▪ Mobile-based Social Engineering
o Publishing Malicious Apps
o Repackaging Legitimate Apps
o Fake Security Applications
o SMiShing (SMS Phishing)
Insider Threats
▪ Insider Threats/Insider Attacks
▪ Types of Insider Threats
▪ Behavioral Indications of an Insider Threat
Impersonation on Social Networking Sites
▪ Social Engineering through Impersonation on Social Networking Sites
▪ Impersonation on Facebook
▪ Social Networking Threats to Corporate Networks
Identity Theft
▪ Identity Theft
Social Engineering Countermeasures
▪ Social Engineering Countermeasures
▪ How to Defend against Phishing Attacks?
▪ Detecting Insider Threats
▪ Insider Threats Countermeasures
▪ Identity Theft Countermeasures
▪ How to Detect Phishing Emails?
▪ Anti-Phishing Toolbar
▪ Common Social Engineering Targets and Defense Strategies
▪ Social Engineering Tools
o Types of Firewalls
o Firewall Technologies
• Packet Filtering Firewall
• Circuit-Level Gateway Firewall
• Application-Level Firewall
• Stateful Multilayer Inspection Firewall
• Application Proxy
• Network Address Translation (NAT)
• Virtual Private Network
o Firewall Limitations
▪ Honeypot
o Types of Honeypots
IDS, IPS, Firewall, and Honeypot Solutions
▪ Intrusion Detection using YARA Rules
▪ Intrusion Detection Tools
o Snort
• Snort Rules
• Snort Rules: Rule Actions and IP Protocols
• Snort Rules: The Direction Operator and IP Addresses
• Snort Rules: Port Numbers
• Intrusion Detection Tools
o Intrusion Detection Tools for Mobile Devices
▪ Intrusion Prevention Tools
▪ Firewalls
o Firewalls for Mobile Devices
▪ Honeypot Tools
Evading IDS
▪ IDS Evasion Techniques
o Insertion Attack
o Evasion
o Denial-of-Service Attack (DoS)
o Obfuscating
o False Positive Generation
o Session Splicing
o Unicode Evasion Technique
o Fragmentation Attack
o Overlapping Fragments
o Time-To-Live Attacks
o Invalid RST Packets
o Urgency Flag
o Polymorphic Shellcode
o ASCII Shellcode
o Application-Layer Attacks
o Desynchronization
o Other Types of Evasion
Evading Firewalls
▪ Firewall Evasion Techniques
o Firewall Identification
o IP Address Spoofing
o Source Routing
o Tiny Fragments
o Bypass Blocked Sites Using an IP Address in Place of a URL
o Bypass Blocked Sites Using Anonymous Website Surfing Sites
o Bypass a Firewall Using a Proxy Server
o Bypassing Firewalls through the ICMP Tunneling Method
o Bypassing Firewalls through the ACK Tunneling Method
o Bypassing Firewalls through the HTTP Tunneling Method
• Why do I Need HTTP Tunneling?
• HTTP Tunneling Tools
o Bypassing Firewalls through the SSH Tunneling Method
• SSH Tunneling Tools: Bitvise and Secure Pipes
o Bypassing Firewalls through the DNS Tunneling Method
Detecting Honeypots
▪ Detecting Honeypots
o Detecting and Defeating Honeypots
▪ Honeypot Detection Tools: Send-Safe Honeypot Hunter
IDS/Firewall Evasion Countermeasures
▪ How to Defend Against IDS Evasion
▪ How to Defend Against Firewall Evasion
o Misconfigured AP Attack
o Unauthorized Association
o Ad-Hoc Connection Attack
o Honeypot AP Attack
o AP MAC Spoofing
o Denial-of-Service Attack
o Key Reinstallation Attack (KRACK)
o Jamming Signal Attack
• Wi-Fi Jamming Devices
o aLTEr Attack
o Wormhole and Sinkhole Attacks
o Inter-Chip Privilege Escalation/Wireless Co-Existence Attack
o GNSS Spoofing
Wireless Hacking Methodology
▪ Wireless Hacking Methodology
▪ Wi-Fi Discovery
o Wireless Network Footprinting
o Finding Wi-Fi Networks in Range to Attack
o Finding WPS-Enabled APs
o Wi-Fi Discovery Tools
o Mobile-based Wi-Fi Discovery Tools
▪ GPS Mapping
o GPS Mapping Tools
o Wi-Fi Hotspot Finder Tools
o Wi-Fi Network Discovery Through WarDriving
▪ Wireless Traffic Analysis
o Choosing the Optimal Wi-Fi Card
o Sniffing Wireless Traffic
o Perform Spectrum Analysis
▪ Launch of Wireless Attacks
o Aircrack-ng Suite
Bluetooth Hacking
▪ Bluetooth Stack
▪ Bluetooth Hacking
▪ Bluetooth Threats
▪ Bluejacking
▪ Bluetooth Reconnaissance Using Bluez
▪ Btlejacking Using BtleJack
▪ Cracking BLE Encryption Using crackle
▪ Bluetooth Hacking Tools
Wireless Attack Countermeasures
▪ Wireless Security Layers
▪ Defense Against WPA/WPA2/WPA3 Cracking
▪ Defense Against KRACK and aLTEr Attacks
▪ Detection and Blocking of Rogue APs
▪ Defense Against Wireless Attacks
▪ Defense Against Bluetooth Hacking
Wireless Security Tools
▪ Wireless Intrusion Prevention Systems
▪ WIPS Deployment
▪ Wi-Fi Security Auditing Tools
▪ Wi-Fi IPSs
▪ Wi-Fi Predictive Planning Tools
▪ Wi-Fi Vulnerability Scanning Tools
▪ Bluetooth Security Tools
▪ Wi-Fi Security Tools for Mobile
▪ How a Hacker can Profit from Mobile Devices that are Successfully Compromised
▪ Mobile Attack Vectors and Mobile Platform Vulnerabilities
▪ Security Issues Arising from App Stores
▪ App Sandboxing Issues
▪ Mobile Spam
▪ SMS Phishing Attack (SMiShing) (Targeted Attack Scan)
o SMS Phishing Attack Examples
▪ Pairing Mobile Devices on Open Bluetooth and Wi-Fi Connections
▪ Agent Smith Attack
▪ Exploiting SS7 Vulnerability
▪ Simjacker: SIM Card Attack
▪ OTP Hijacking/Two-Factor Authentication Hijacking
▪ Camera/Microphone Capture Attacks
o Camfecting Attack
o Android Camera Hijack Attack
Hacking Android OS
▪ Android OS
o Android Device Administration API
▪ Android Rooting
o Rooting Android Using KingoRoot
o Android Rooting Tools
▪ Hacking Android Devices
o Blocking Wi-Fi Access Using NetCut
o Identifying Attack Surfaces Using drozer
o Hacking with zANTI and Network Spoofer
o Launch DoS Attack using Low Orbit Ion Cannon (LOIC)
o Session Hijacking Using DroidSheep
o Hacking with Orbot Proxy
o Exploiting Android Device through ADB Using PhoneSploit
o Android-based Sniffers
o Launching Man-in-the-Disk Attack
OT Hacking
OT Concepts
▪ What is OT?
▪ Essential Terminology
▪ IT/OT Convergence (IIOT)
▪ The Purdue Model
▪ Challenges of OT
▪ Introduction to ICS
▪ Components of an ICS
o Distributed Control System (DCS)
o Supervisory Control and Data Acquisition (SCADA)
o Programmable Logic Controller (PLC)
o Basic Process Control System (BPCS)
o Safety Instrumented Systems (SIS)
▪ OT Technologies and Protocols
OT Attacks
▪ OT Vulnerabilities
▪ MITRE ATT&CK for ICS
▪ OT Threats
▪ OT Attacks
o HMI-based Attacks
o Side-Channel Attacks
o Hacking Programmable Logic Controller (PLC)
o Hacking Industrial Systems through RF Remote Controllers
o OT Malware
▪ OT Malware Analysis: INDUSTROYER.V2
OT Hacking Methodology
▪ What is OT Hacking?
▪ OT Hacking Methodology
o Identifying ICS/SCADA Systems using Shodan
o Gathering Default Passwords using CRITIFENCE
Email Encryption
▪ Digital Signature
▪ Secure Sockets Layer (SSL)
▪ Transport Layer Security (TLS)
▪ Cryptography Toolkits
▪ Pretty Good Privacy (PGP)
▪ GNU Privacy Guard (CPG)
▪ Web of Trust (WOT)
▪ Encrypting Email Messages in Outlook
o S/MIME Encryption
o Microsoft 365 Message Encryption
▪ Signing/Encrypting Email Messages on Mac
▪ Encrypting/Decrypting Email Messages Using OpenPGP
▪ Email Encryption Tools
Disk Encryption
▪ Disk Encryption
▪ Disk Encryption Tools: VeraCrypt and Symantec Drive Encryption
▪ Disk Encryption Tools
▪ Disk Encryption Tools for Linux
▪ Disk Encryption Tools for macOS
Cryptanalysis
▪ Cryptanalysis Methods
o Quantum Cryptanalysis
▪ Code Breaking Methodologies
▪ Cryptography Attacks
o Brute-Force Attack
o Birthday Attack
• Birthday Paradox: Probability
o Meet-in-the-Middle Attack on Digital Signature Schemes
o Side-Channel Attack
o Hash Collision Attack
o DUHK Attack
o Rainbow Table Attack
o Related-Key Attack
o Padding Oracle Attack
o DROWN Attack
▪ Cryptanalysis Tools
▪ Online MD5 Decryption Tools
Cryptography Attack Countermeasures
▪ How to Defend Against Cryptographic Attacks
▪ Key Stretching
o Types of Cables
• Fiber Optic Cable, Coaxial Cable, CAT 3, CAT 4, CAT 5, CAT 5e, CAT 6,
10/100/1000BaseT (UTP Ethernet)
▪ TCP/IP Protocol Suite
• RADIUS
• TACACS+
• Routing Information Protocol (RIP)
o Transport Layer Protocols
• Transmission Control Protocol (TCP)
✓ TCP Header Format
✓ TCP Services
• User Datagram Protocol (UDP)
✓ UDP Operation
• Secure Socket Layer (SSL)
• Transport Layer Security (TLS)
o Internet Layer Protocols
• Internet Protocol (IP)
✓ IP Header: Protocol Field
• What is Internet Protocol v6 (IPv6)?
✓ IPv6 Header
✓ IPv4 and IPv6 Transition Mechanisms
✓ IPv4 vs. IPv6
✓ Internet Protocol Security (IPsec)
• Internet Control Message Protocol (ICMP)
✓ Error Reporting and Correction
✓ ICMP Message Delivery
✓ Format of an ICMP Message
• Address Resolution Protocol (ARP)
✓ ARP Packet Format
✓ ARP Packet Encapsulation
• IGRP (Interior Gateway Routing Protocol)
• EIGRP (Enhanced Interior Gateway Routing Protocol)
• OSPF (Open Shortest Path First)
• HSRP (Hot Standby Router Protocol)
• Virtual Router Redundancy Protocol (VRRP)
Page | 64 Ethical Hacking and Countermeasures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking and Countermeasures Exam 312-50 Certified Ethical Hacker
Course Outline
o Routing
o Network Address Translation (NAT)
o Port Address Translation (PAT)
o VLAN
o Shared Media Network
o Switched Media Network
Basic Network Troubleshooting
▪ Unreachable Networks
▪ IP Parameter Problem
▪ ICMP Redirects
▪ Troubleshooting
▪ Characteristics of Virtualization
▪ Benefits of Virtualization
▪ Virtual Firewall
▪ Virtual Databases
▪ Java
▪ .Net
▪ C#
▪ JavaScript
▪ Bash Scripting
▪ PowerShell
▪ C and C++
▪ CGI
▪ J2EE Framework
▪ ColdFusion
▪ Ruby On Rails
▪ AJAX
Web Subcomponents
▪ Web Subcomponents
▪ Applet
▪ Servlet
▪ ActiveX
▪ Flash Application
Database Connectivity
▪ Web Application Connection with Underlying Databases
o SQL Sever
• Data Controls used for SQL Server Connection
o MS ACCESS
o MySQL
o ORACLE
o VPN Concentrators
o Functions of a VPN Concentrator
▪ Secure Router Configuration
o Router Security Measures
o Design, Implement, and Enforce Router Security Policy
Data Leakage
▪ Data Leakage
▪ Data Leakage Threats
▪ What is Data Loss Prevention (DLP)?
Data Backup
▪ Data Backup
▪ RAID (Redundant Array Of Independent Disks) Technology
o Advantages and Disadvantages of RAID Systems
o RAID Level 0: Disk Striping
o RAID Level 1: Disk Mirroring
o RAID Level 3: Disk Striping with Parity
o RAID Level 5: Block Interleaved Distributed Parity
o RAID Level 10: Blocks Striped and Mirrored
o RAID Level 50: Mirroring and Striping Across Multiple RAID Levels
▪ Selecting an Appropriate Backup Method
▪ Choosing the Backup Location
▪ Data Recovery
Risk Management Concepts
▪ Risk Management
▪ Risk Management Framework
o Enterprise Risk Management Framework (ERM)
• Goals of the ERM Framework
o NIST Risk Management Framework
o COSO ERM Framework
o COBIT Framework
▪ Enterprise Network Risk Management Policy
▪ Risk Mitigation
▪ Control the Risks
▪ Risk Calculation Formulas
▪ Quantitative Risk vs. Qualitative Risk
Business Continuity and Disaster Recovery
▪ Business Continuity (BC)
▪ Disaster Recovery (DR)
▪ Business Impact Analysis (BIA)
▪ Recovery Time Objective (RTO)
▪ Recovery Point Objective (RPO)
▪ Business Continuity Plan (BCP)
▪ Disaster Recovery Plan (DRP)
Cyber Threat Intelligence
▪ Threat Intelligence Frameworks
o Collective Intelligence Framework (CIF)
▪ Threat Intelligence Data Collection
▪ Threat Intelligence Sources
o Open-Source Intelligence (OSINT)
o Human Intelligence (HUMINT)
o Signals Intelligence (SIGINT)
o Technical Intelligence (TECHINT)
o Geo-spatial Intelligence (GEOINT)
o Imagery Intelligence (IMINT)
o Measurement and Signature Intelligence (MASINT)
o Covert Human Intelligence Sources (CHIS)
o Financial Intelligence (FININT)
o Social Media Intelligence (SOCMINT)
o Cyber Counterintelligence (CCI)
o Indicators of Compromise (IoCs)
o Industry Association and Vertical Communities
o Commercial Sources