Thursday, 24 May 2012

CEHv7 Introduction To Ethical Hacking

This is the introduction To Ethical Hacking You Must Need To Know. Befamiliar with everything which is listed here .


Understand The essential hacker terminology.  
Make sure you’re familiar with and can define the terms  :
Threat, 
Exploit, 
Vulnerability, 
target of evaluation (TOE), 
and attack.


Understand the difference between ethical hackers and crackers.
 Ethical hackers are security professionals who act defensively. Crackers are malicious hackers who choose to inflict damage on a target system.


Know the classes of hackers. It’s critical to know the differences among black-hat, whitehat, and gray-hat hackers for the exam. Know who the good guys are and who the bad guys are in the world of hacking.
White hats are the good guys, the ethical hackers who use their hacking skills for defensive
purposes.
Black hats are the bad guys: the malicious hackers or crackers who use their skills for illegal
or malicious purposes
Gray hats are hackers who may work offensively or defensively, depending on the situation.
This is the dividing line between hacker and cracker.

Know the phases of hacking. 
  1. Passive and active reconnaissance, footprinting [the first step of ethcial hacking ] 

Wednesday, 23 May 2012

--- | Certified Ethical Hacker Series |--- CEHv7 Course Outline

CEHv7 Course Overview 

Objective Behind  Starting These Series is to Make The Basic Concept Easy To Understand 
Ethical Hacking Cehv7 Course Overview Presentation
View more PowerPoint from Prabh Jeet


This is My First Video .Totaly Unexperienced .Now No More Oral Presentation . Next There will be  only Demo  huhhhhh

Hope you May Like This Video :)                                                      


----------------------------------------------

      

CEHv7 Course Outline --- | Certified Ethical Hacker Series |--- from pabhjeet on Vimeo.
Objective Behind Starting These Series is to Make The Basic Concept Easy To Understand


Module 01: Introduction to Ethical        Hacking
Module 02: Footprinting and Reconnaissance
Module 03: Scanning Networks
Module 04: Enumeration
Module 05: System Hacking
 Module 06: Trojans and Backdoors
Module 07: Viruses and Worms
Module 08: Sniffers
Module 09: Social Engineering
Module 10: Denial of Service
 Module 11: Session Hijacking
Module 12: Hijacking Webservers
Module 13: Hacking Web Applications
Module 14: SQL Injection
Module 15: Hacking Wireless Networks
Module 16: Evading IDS, Firewalls, and Honeypots
Module 17: Buffer Overflow
Module 18: Cryptography
Module 19: Penetration Testing
___________________________________

Download These Some Resource :
CEH-Official-Certified-ReviewGuide-Sybex.pdf  By Kimberly Graves

Cyber Warfare- Hacking Al-Qaida and Terrorism.pdf
Cehv6 Course Material
All Slides Of CEHv7 
Hacking Tool Tutorials,  There is one ebook that should be used as a reference.
Pass of Hacking Tool Tutorials is : www.free-7.net 

Build Your Own Security Lab 

Build Your Own Security Lab: A Field Guide for Network Testing

Devices for lab  
-------------------------------------------------------------------------------------
Note : Try to read More And More Bcoz Cehv7 is Expensive Exam So Be Prepare yourself Completely and Make Basic Concept clear Before Taking this Exam

Tuesday, 22 May 2012

--- | Certified Ethical Hacker Series |---



--- | Certified Ethical Hacker Series |---
______________________________________

Hello Guys This Is Prabh jeet Now Today My Exam Is Over
Let Us Start this Task To which we have initiate in Our Page

Fisrt of All to be a professional ethical Hackers we require
  1. Motivation
  2. Dedication 
  3. Initiative 
  4. smartness 




No Hard work if u r doing hard work u r wrong .

Goal Of Ethical Hacker
There's been an increasing demand for ethical hackers (also known as white hat hackers) as they protect the computer systems from dangerous intrusions. The goal of the ethical hacker work is to
test a corporation’s network and systems defense under a contract and identify weaknesses in security configurations and operation procedures.
Ethical hackers are technically skilled IT pros with a strong desire to solve problems and prevent malicious hackers from causing damage to network systems.

What is the EC-Council certification all about ?
 EC-Council offers the popular Certified ethical hacker (CEH) and Computer Hacking Forensic   Investigator (CHFI) certifications

What Exams You Must Pass to Become CEH ?
You must pass only one exam: 312-50 (known also as EC0-350).
If you attend the official training then you do not need any requirements.
If you decide to learn by yourself you need to:

Have at least two years of documented experience with IT security
Pay $100.0 (Prometric APTC Eligibility Application Fee or VUE Eligibility Application Fee) and
send an email to EC-Council for approval Submit a completed Exam Eligibility Form
Upon approval, EC-Council will send you an eligibility voucher number, which you can use to register to the exam

How Much Does the CEH Exam Cost

The exam is expensive and costs $500 plus taxes.

What is the criteria to be eligible for CEH ?

CEH is an entry-level InfoSec certification. As such, there are no pre-requisites defined for one to be eligible. However, due to the nature of the content involved and the skills one achieve after completing this cert, EC-Council has to make sure that eligible candidates oblige to a code-of-conduct. For ensuring this,  they have laid out certain must-haves/todos. Anyone willing to take the cert. exam has to have a minimum of 2 years  of work experience or else one has to take the official CEH training at one of the ATCs (EC-Council Accredited Training Centers)

Exam fees for the certification is $500. If you can skip the training part (by showing a proof of min. 2 yrs work experience  from your employer) you can register for the exam at any of the Prometric centres available at your vicinity. Else if you have to  take the training, then you will have to register for it at one of the ATCs and whatever amount apart from $500 you pay to them goes into the their pocket. They charge it for the training and official prep materials cost.

Note: This Course Is also for Those Who have Interest in understanding various aspects how the hackers works and how to protect themself from various types of attacks which are happening on internet. 


HOW MUCH TIME DOES iT Will take To complete the Course 
Time to prepare for this certification will vary depending upon your understanding of the basic concepts and your ability to grasp  new ones.
To cleared this cert with a dedicated preparation We will here take  almost 40 to 45  days. keep reading and updating yourself and you will be ready for it soon enough.

Before Starting You Must Be Some Knowledge About 

1. You Must Be have some understanding of programming knowledge such as C, or Java. and   Understanding of the basics of HTML,PHP,MYSQL . These programming languages
can be learned by taking formal programming courses and reading books. It will help you to read and write code.

2. Learn the UNIX operating system as it is regarded as the original operating system built by hackers.
   Also learn about Windows and Mac OS.

3.You must be the Basic understanding of hardware or software.

4. you must be the understanding of COMPUTER NETWORKS OSI Reference mode TCP/IP    Reference models  ,UNDERSTANDING OF ALL LAYERS ,Wireless Transmission ,Communication Satellites , DSL Technology , Basics of internetworking  ,Ip addressing, Subnetting , Routing

CEH highly focuses on tools and expects you to have a proper understanding of their capabilities. If you have not, then set up a test lab. Use VirtualBox if
you have to. Try various tools included within BT5 on a WinXP SP2 victim. v7 focuses on Nmap, Wireshark, and Hping.


So WE HAVE TAKEN THE TASK TO COMPLETE THIS COURSE IN OUR PAGE  to which we will here complete in few days .we will provide here you tools,pdf,docs,usefull links
and also make a video tutorials where it is required .
Be in touch and Complete the target CEHv7 .

Download The Syllabus To which we cover here
Download This Pdf For Lab Setup 

I am uploading some ebooks and other usefull pdf . After some time i will provide you the link Also Download it .
And i recommended you also chk this link to Remove Your Doubt.

Hope U like This My small initiative for my page on facebook.

Be ready Guys I want next Tutorial By you Under the Topic Name : Ethics and Legality


--| Be a Hacker Not Victim |--