"I study for life...!"
- Exam Title: Certified Ethical Hacker - Master (Practical Exam)
- Number of Challenges -> 20
- Duration -> 6 hours
- Availability -> Aspen-iLabs
- Test Format -> iLabs Cyber Range _ Passing Score(14 Questions) -> 70% (I am going for 100%)
- Should have already done test with iLabs
- One Kali linux(No update) & Window Server
- Five machines to compromise on isolated networks
- Open Books(Google, confirm from book)
- No consultation during the Exam
- Vulnerability Analysis: for the following Networks; Organizations, Communication Infrastructure, End Systems, etc
- System Hacking & Steganography
- Reconnaisance; Network scanning to identify vulnerability
- OS Banner Grabbing, Service & User Enumeration
- Cryptography Attacks
- SQL Injection attacks
- Packet Sniffing
- Vulnerability Analysis
Notes:
- Is the process of breaking the system into bits in order to identify and classify the security holes.
Tools:
- [*] - Nmap, ncat, ndiff, nping
- [] - ftp
- [] -
- [] - COPS
- [] - Tiger
Windows Tools
- Wireshirk --> Used to monitor network traffic, can be used to tell whether we have a DDOS attack or not
- Hashcalc --> Used to calculate for the hash value of a file or text
- Veracrypt --> Used to encrypt and decrypt storage volumes/files
- BCText Encoder -> Encodes & decodes given text as long as a password is provided
- Cryptool --> Used to decode a hex file
- Snow --> Used to extract hidden messages in files(password protected)
- Openstego --> Used to extract hidden information in audio, video, images and text file
Linux Tools
- Netdiscover --> Identify the devices connected to your network
- NMAP --> scan network for vulnerability & open ports
- Hydra --> Online password cracker.
- John The Ripper --> Brute force password cracker, can crack linux login passwd, zipped files etc.
- wpscan --> Wordpress sanner, scans the wordpress site for vulnerabilities.
- sqlmap --> traces/enumerates existing databases and dumps data.
- ADB --> used to manage adroid, install uninstall apps, list running services, traverse the file sys, clear cache etc. on the shell
Bonus Tools
Reco
- Sherlock --> for social media accounts
Exam Questions
- How Many machines are active ? (Use netdiscover)
- Which Machine has FTP Server open ? (nmap)
- Find 2 secret files using FTP? (Brute force FTP usernames)
- Find out phone number of web application user? (sqlmap)
- Brute force Wordpress website user's password. (wpscan)
- Decode .hex file (cryptool)
- Which machine started DOS attack? DDOS attack happened on which IP? Find out HTTP credentials from PCAP file? (wireshark)
- Decode the given text using given secret? (BCTextEncoder)
- Calculate SHA1 hash of a text? (Hashcalc)
- Decrypt the hidden volume & find the secret file? (veracrypt)
- Crack the given hash? (hashes.com)
- Find secret hidden in the image/file ? (Openstego/Snow)
- Find a secret file in ADROID ? (adb)
- Send data to another machine(firewall blocked) ? (Covert TCP)
NB:-
- A summary documentation of each tool is in in the markdown file named with the respective name of each tool
- The documentation will be updated from time to time.