CEH (Certified Ethical Hacker)

Published in Arna, 2020

Information Book 
Book NameCEH(Certified Ethical Hacker)
AuthorsM.H.Mohammadi, S.Y.Moradi, M.Siampour
languagePersian
Printed in theIRAN
PublisherArna
First Printing EditionJun 2021
Print Length271
ISBN‫‬‭‬‭978-622-291-040-2‬‬‬‬

Introduction:

One of the most famous and practical security documents is the CEH certificate or the specialized certificate of legal hackers. The CEH certification is a security certification to assess individuals’ skills in securing enterprise systems and networks and help them counter hacker attacks and intrusions. In this course, people will become familiar with hacking techniques and methods and security checklists. They will be able to check systems and networks’ security status to identify and eliminate their weaknesses.
The book in front of you is a translation of the official CEH book and educational slides related to this degree and some personal experiences of the authors. Efforts have been made to make the text of the book as fluent as possible so that its primary purpose, which is to convey the message, is adequately fulfilled.

Contents

  • Chapter 1: Introduction to Legal Hacking
  • Chapter 2: Information gathering and social engineering
  • Chapter 3: Scanning and enumeration
  • Chapter 4: Hack system
  • Chapter 5: Worm, Virus, Backdoor, Trojan
  • Chapter 6: Sniffers
  • Chapter 7: Denial of Service and Session hijacking
  • Chapter 8: Hacking web servers, vulnerabilities in web applications, web-based password cracking techniques
  • Chapter 9: SQL Injection and Buffer Overflo
  • Chapter 10: Hack wireless networks
  • Chapter 11: Physical security
  • Chapter 12: Hack Linux
  • Chapter 13: Avoiding IDSs, Honeypots and Firewalls
  • Chapter 14: Cryptography
  • Chapter 15: Penetration testing methods

Chapter 1

  • Most people think that hackers have high skills and knowledge that can hack computer systems and find vulnerabilities. A good hacker only needs to know how a computer system works and what tools are used to find security vulnerabilities.
    This chapter introduces the world of legitimate hackers. Legal hacking is a type of hacking that is done with an organizational license and to increase security.

🔹 Topics in this chapter include

Chapter 1  
1-1 Introduction1-7 Who are the legitimate hackers and crackers?1-13 Types of lawful attacks
1-2 Technical vocabulary1-8 Attacker targets1-14 Types of tests
1-3 Different types of hacking technologies1-9 Triangle of safety, performance and ease of use1-15 Test without knowledge (Black box)
1-4 Five different stages of legal hacking1-10 What is vulnerability research?1-16 Test with full knowledge (White box)
1-5 What is Hacktivism?1-11 Legitimate hacking methods1-17 Test with partial knowledge (Gray box)
1-6 Types of hackers1-12 Security Assessment Program1-18 Report a legitimate hack

Chapter 2

  • Information gathering and social engineering

    This chapter discusses the first part of the hacking process, which is footprinting. Footprinting is the process of gathering all the information available about an organization. This information can be used for the hacking process. Sometimes, this information is also used for social engineering.
    In this chapter, we will explain both hacking methods in detail.

🔹 Topics in this chapter include

Chapter 2  
2-1 Introduction2-9 Find the network address range2-17 What are the common types of attacks?
2-2 Footprinting2-10 Identify types of DNS records2-18 Human-based social engineering
2-3 Definition of Footprinting2-11 How traceroute works in footprinting2-19 Computer-based social engineering
2-4 Data collection methodologies2-12 Use Email Tracking2-20 Internal attacks
2-5 DNS Enumeration2-13 How Web Spiders work2-21 Phishing attacks
2-6 DNSstuff and Nslookup2-14 Steps to do Footprinting2-22 URL obfuscation
2-7 The concept of ARIN Lookup and Whois2-15 Social Engineering2-23 Prevention of social engineering
2-8 Whois output analysis2-16 What is social engineering? 

Chapter 3

  • Scanning and enumeration

    Scanning and enumeration are the first steps in hacking. After the scan, the enumeration phase begins, which involves identifying computers, user accounts, and shared resources.
    Scanning and enumeration are discussed together because many hacking tools do both.

🔹 Topics in this chapter include

Chapter 3  
3-1 Introduction3-11 Scans FIN, IDLE, NULL, XMAS, Stealth, SYN3-21 IP Spoofing Techniques
3-2 Scan3-12 Types of TCP communication flags3-22 Enumeration
3-3 Port scan, network scan, vulnerability scan3-13 Floppy Scan3-23 Null Session
3-4 Scan methodology3-14 War-Dialing Techniques3-24 Counter Null Session
3-5 Ping Sweep Techniques3-15 Banner Grabbing and OS Identification Techniques3-25 What is SNMP Enumeration?
3-6 Detect Ping Sweeps3-16 Draw a network diagram of vulnerable devices3-26 Dealing with SNMP enumeration
3-7 Scan ports and identify services3-17 How are proxy servers used in an attack?3-27 DNS Zone Transfer in Windows 2000
3-8 Deal with port scanning3-18 How do anonymizers work?3-28 What are the steps in enumeration?
3-9 Nmap command switch3-19 HTTP Tunneling Techniques 
3-10 HPING23-20 Httptunnel tool for Windows 

Chapter 4

  • Hack system

    In this chapter, we will discuss the various aspects of system hacking. Recall that the hacking cycle consists of six stages. This chapter will discuss the other five steps of the hacking wheel, which include breaking the password, increasing the access level, running programs, hiding files, and clearing traces.

🔹 Topics in this chapter include

Chapter 4  
4-1 Introduction4-12 Types of passwords4-23 Buffer Overflows
4-2 Password breaking techniques4-13 Passive Online Attacks4-24 Rootkits
4-3 LanManager Hash4-14 Active Online Attacks4-25 Install Rootkit on Windows 2000 and xp
4-4 LanManager Hash4-15 Guess the password automatically4-26 Dealing with Rootkits
4-5 Comparison of LM, NTLM v1 & NTLM v2 LM protocols4-16 Deal with password guessing4-27 Hide files
4-6 Break Windows 2000 passwords4-17 Offline attacks4-28 NTFS File Streaming
4-7 Navigate the SMB Logon to the attacker4-18 Pre-Computed Hashes4-29 Counter NTFS Stream
4-8 SMB Relay MITM attacks and counter4-19 Nonelectronic attacks4-30 Steganography technologies
4-9 Dealing with password breaking4-20 Spyware & keyloggers techniques4-31 Clear footprints and documents
4-10 Password change interval4-21 Necessary accesses4-32 Disable Auditing
4-11 Check Event Viewer Logs4-22 Performances4-33 Clear Event Log

Chapter 5

  • Worm, Virus, Backdoor, Trojan

    Trojans and backdoors are two ways hackers can enter a system, and there are many different types, but they all have one thing in common. Another program must install them, or the user must intervene to install them on the system. Trojans and backdoors are dangerous tools in a legitimate hacker toolkit that should be used to test the security of a networked system.
    Viruses and worms can be as dangerous as trojans and backdoors. Many viruses trigger trojans and can damage the system and then open a backdoor for the hacker. This chapter discusses the similarities and differences between Trojans, backdoors, viruses, and worms. These malicious tools and codes are essential to legitimate hackers because hackers use these tools to attack systems.

🔹 Topics in this chapter include

Chapter 5  
5-1 Introduction5-8 What are the signs of a trojan attack?5-15 The difference between a virus and a worm
5-2 Trojans and backdoors5-9 What is Wrapping?5-16 Types of viruses
5-3 What is a Trojan?5-10 Trojan build tools5-17 How the virus spreads and infects the system
5-4 What are overt and covert channels?5-11 What are the anti-malware techniques?5-18 An example of a simple virus
5-5 Types of Trojans5-12 Trojan escape techniques5-19 Trojan build tools
5-6 How do Reverse-connecting Trojans work?5-13 Check the file system to deal with malware5-20 Antivirus Bypass Techniques
5-7 How Netcat Trojans Work5-14 Viruses and worms5-21 Virus detection methods

Chapter 6

  • Sniffers

    A sniffer is a tool for obtaining packages or frames. It eavesdrops on network traffic and shows them to the hacker as a command line with graphics. Some advanced sniffer eavesdrops on packets and can put them back together to form the original text or email.
    Sniffer is used to capturing traffic sent between two systems. Depending on how the sniffer is used and security measures, the hacker can use the sniffer to detect usernames, passwords, and other confidential information posted on the network. Many hacking attacks and hacking tools require a sniffer to obtain important information from the target system. In this chapter, we will explain how sniffer works and some standard sniffer tools.

🔹 Topics in this chapter include

Chapter 6  
6-1 Introduction6-6 Capture by Ethereal and display filters6-11 Proxy Server DNS Poisoning
6-2 Protocols prone to eavesdropping6-7 MAC Flooding6-12 DNS Cache Poisoning
6-3 Active and passive eavesdropping6-8 DNS Poisoning6-13 Dealing with eavesdropping
6-4 ARP Poisoning6-9 Intranet DNS Spoofing 
6-5 MAC Duplicating6-10 Internet DNS Spoofing 

Chapter 7

  • Denial of Service and Session hijacking

    A hacker tries to quickly slow down the system in a DoS attack and prevent users from using its resources. Hackers can target only one method or one network, and they usually succeed.
    Session hijacking is one of the methods of hacking. Once the hacker has taken the session, it creates a temporary DoS for the end-user. After a user makes a regular session, the hacker uses session hijacking to capture the session. It can also use session hijacking to carry out a man-in-the-middle attack when the hacker is between the receiver and the client and eavesdrops on all traffic.

🔹 Topics in this chapter include

Chapter 7  
7-1 Introduction7-8 Deal with DOS & DDOS7-15 RST Hijacking
7-2 Denial of Service7-9 Session Hijacking7-16 Blind Hijacking
7-3 Types of DOS attacks7-10 Hijacking & Spoofing7-17 Risks of Session Hijacking
7-4 How DDOS attacks work7-11 Types of Session Hijacking7-18 How to prevent Session Hijacking
7-5 How BOTs & BOTNET work7-12 Sequence prediction 
7-6 What is a smurf attack?7-13 What are the steps in Session Hijacking? 
7-7 What is SYN flooding?7-14 TCP / IP Hijacking 

Chapter 8

  • Hacking web servers, vulnerabilities in web applications, web-based password cracking techniques

    Web servers and web applications are highly susceptible to attack. The first reason is that web servers must be accessible via the Internet. When a web server is attacked, it provides a way for a hacker to enter the network. Not only web server software but also programs running on the webserver can be used for the attack. Because of their functionality, web servers are more accessible and less protected than other systems, so it is much easier to attack web servers.

🔹 Topics in this chapter include

Chapter 8  
8-1 Introduction8-9 Web Server Protection Checklist8-17 Authentication
8-2 Hack web servers8-10 Vulnerabilities of web applications8-18 Types of authentication
8-3 Types of web server vulnerabilities8-11 How web applications work8-19 Password
8-4 Attacks on web servers8-12 The purpose of hacking web applications8-20 What is a cracker password?
8-5 IIS Unicode Exploit8-13 Attack Anatomy8-21 How does a cracker password work?
8-6 Patch management techniques8-14 Web application threats8-22 Attack to break the password: Category
8-7 Vulnerability scanners8-15 Google Hacking 
8-8 Web server security methods8-16 Web-based password cracking techniques 

Chapter 9

  • SQL Injection and Buffer Overflow

    SQL injection and Buffer Overflow attacks are similar in that they both take place through the user’s input box. A user input box is where a user may enter their username and password on a website, add data to a URL, and search for a word in an application.
    SQL injection and Buffer Overflow vulnerabilities are both caused by one problem: Invalid parameters. If developers do not spend enough time examining the variables that the user can enter, the results will be severe and unpredictable. Professional hackers can take advantage of these vulnerabilities and shut down the system or program or take a shell to execute their commands.

🔹 Topics in this chapter include

Chapter 9  
9-1 Introduction9-5 Blind SQL Injection9-9 Heap-based overflow buffer overflow (heap)
9-2 What is SQL Injection?9-6 Blind SQL Injection9-10 How to detect buffer overflow in the program
9-3 Steps to perform SQL Injection9-7 Buffer Overflow types and detection methods9-11 Buffer overflow change techniques
9-4 SQL Server vulnerabilities9-8 Stack-based buffer overflow9-12 Buffer overflow prevention methods

Chapter 10

  • Hack wireless networks

    One of the entry points of hackers into the network is the use of wireless networks. They have many vulnerabilities due to the radio frequency nature of wireless networks and the rapid adaptation of wireless technologies for home and commercial networks.
    Many wireless LANs (WLANs) are based on the IEEE 802.11 standard and its extensions such as 802.11a, 802.11b & 802.11n. The 802.11 standard has only basic security features and many weaknesses. The 802.11i extension is the latest security solution that covers 802.11 vulnerabilities. The Wi-Fi Association has introduced additional security certificates called WPA and WPA2 to bridge the gap between the original 802.11 standard and the latest 802.11i extension. In this chapter, we will discuss vulnerabilities and security solutions based on IEEE and Wi-Fi standards.

🔹 Topics in this chapter include

Chapter 10  
10-1 Introduction10-5 Wireless Network Hacking Terms10-9 Steps of hacking wireless networks
10-2 Wireless standards10-6 Wireless eavesdropping and inserting SSIDs and MAC spoofing10-10 Methods of identifying wireless networks
10-3 Wireless concepts10-7 Rogue Access Point (fake)10-11 Ways to secure wireless networks
10-4 WEP and WPA authentication mechanisms and breaking techniques10-8 Wireless Network Hacking Techniques 

Chapter 11

  • Physical security

    Physical security is one of the most critical parts of IT security to prevent the loss or theft of confidential and sensitive data. If an organization fails to provide adequate physical security, other technical security measures such as firewalls and IDSs can be circumvented.
    There is a sentence that says, “When you log in, your network is yours.” By physically securing your network and organization, you prevent theft of equipment such as laptops or tape drives, embedding keyloggers on systems, and placing access points on the web. Physical security depends on individuals. Therefore, it is prone to social engineering attacks, such as entering a building behind an employee and not providing an ID card or key (thus, bypassing the problem of physical security).

🔹 Topics in this chapter include

Chapter 11  
11-1 Introduction11-4 What is the need for physical security?11-7 Physical Security Checklist
11-2 Physical security breach events11-5 Who is responsible for physical security?11-8 Some physical security tools
11-3 Physical security breach events11-6 Factors that affect physical security 

Chapter 12

  • Hack Linux

    Linux is a popular operating system for system administrators because it is a source and allows change. Because Linux is open-source, there are several versions of it called distribution. Some of these distributions serve as a commercial operating system for clients and servers. Some of its standard distributions are Mandrake, RedHat Debian, and SUSE; some of the free versions are Gentoo and Knoppix.
    The flexibility and cost of Linux, as well as the increase in the number of Linux applications, has led to the choice of Linux as the operating system of many systems. Although Linux is more secure than Windows, it has vulnerabilities that can be exploited. This chapter describes how to use Linux as an operating system and secure it to prevent an attack.

🔹 Topics in this chapter include

Chapter 12  
12-1 Introduction12-5 How to compile a Linux kernel12-9 Linux security methods
12-2 Linux basis12-6 GCC compilation commands12-10 Linux Firewall (IPTable)
12-3 Basic Linux Commands12-7 How to install Linux kernel modules 
12-4 Linux directories12-8 Linux vulnerabilities 

Chapter 13

  • Avoiding IDSs, Honeypots and Firewalls

    Intrusion detection systems (IDS), firewalls, and honeypots are security measures that assure you that a hacker cannot access your network or system. Intrusion detection systems (IDS) and firewalls are closed filtering devices and monitor traffic according to pre-written rules. Honeypot is a fake target system used as bait for a hacker to keep him from achieving valuable targets. As a security expert, you need to be familiar with how they work and how they create security.

🔹 Topics in this chapter include

Chapter 13  
13-1 Introduction13-4 Firewall13-7 Different types of Honeypot
13-2 Types of intrusion detection systems and escape techniques13-5 Types of firewalls13-8 Honeypot location on the network
13-3 Escape from IDS13-6 Honeypot13-9 Physical and virtual honeypot

Chapter 14

  • Cryptography

    Cryptography is the study of encryption and encryption algorithms. Encryption is the conversion of a message from exact text to ciphertext and vice versa. The purpose of encryption is to convert the data so that the eavesdropper can not read the data with someone who does not have the password—encryption to secure communications. Cryptography defines the techniques used in encryption. This chapter will explain cryptography and encryption algorithms.

🔹 Topics in this chapter include

Chapter 14  
14-1 Introduction14-3 How to generate public and private keys14-5 SSH
14-2 Encryption and encryption techniques14-4 A look at the RC5 & RC4 & SHA & MD5 Blowfish & algorithms 

Chapter 15

  • Penetration testing methods

    Penetration testing simulates a hacker attack to gain access to a network with an organization’s systems. The purpose of penetration testing is to examine an organization’s implementation and security policy: Basically, to see if the organization has adequately implemented the security criteria set out in its security policy.
    A hacker who intends to gain access to an organization’s network is different from a person who performs as a pen tester and uses his knowledge to increase an organization’s network’s security without risk.

🔹 Topics in this chapter include

Chapter 15  
15-1 Introduction15-4 Penetration testing steps15-7 Items to be presented in the penetration test
15-2 Security assessments15-5 Legal framework for penetration testing 
15-3 Penetration testing methods15-6 Automated penetration testing tools 

Authors

OrderPicNameInformation
The FirstMohammad Hossein Mohammadi1. Personal Website
2. LinkedIn
3. M.H.Mohammadimir2017@gmail.com
The SecondSeyed Yahya Moradi1. Personal Website
2. LinkedIn
3. S.YahyaMoradi@yahoo.com
ThirdMilad Siampour1. LinkedIn
2. Miladit90@gmail.com