JUAL : DVD/CD Certified Ethical Hacker (CEH)


cehAlhamdulillah akhirnya ciebal bisa produksi DVD CEH Lagi dengan konsep baru dan tentunya dengan harga baru. :)

Dulu ciebal jual DVD CEH disertai DVD Hacking lainnya, karena ciebal terkena musibah jadi ciebal berhenti sementara berjualan DVD CEH dan Hacking ini. Tapi akhirnya ciebal sudah mendapatkan resource baru dan siap untuk menjualnya lagi. :)

Yang ciebal jual adalah DVD CEH v6 dari Career Academy (Total 6 DVD) dan ciebal juga akan kasih Bonus CD Counter Hack Training Cource (2CD).


Info UPDATE silahkan kunjungi: http://www.kaskus.us/showthread.php?t=4165927

Harga Cuma Rp. 130.000,- (Belum Ongkir)

Harga Asli : http://www.careeracademy.com/index.asp?PageAction=VIEWPROD&ProdID=74


Official Thread : http://www.kaskus.us/showthread.php?t=4165927

Didalamnya terdapat 50 Modul+latihan, disertai video, dan tool pendukung CEH v6. (Pokoknya Lengkap, dan bisa diliat di website Career Academy dan Ec-Council)

Berikut adalah daftar isi DVD CEH v6 :

Module 1 – Penetration Testing 101
Penetration Testing 101
To Know more about Penetration Testing, Attend EC-Council’s LPT Program
Introduction to PT
Categories of Security Assessments
Vulnerability Assessment
Limitations of Vulnerability Assessment
Penetration Testing
Types of Penetration Testing
Risk Management
Do-it-Yourself Testing
Outsourcing Penetration Testing Services
Terms of Engagement
Project Scope
Pentest Service Level Agreements
Testing Points
Testing Locations
Automated Testing
Manual Testing
Using DNS Domain Name and IP Address Information
Enumerating Information about Hosts on Publicly-Available Networks
Testing Network-Filtering Devices
Enumerating Devices
Denial of Service Emulation
Penetration Testing Tools
Evaluating Different Types of Pentest Tools
Asset Audit
Fault Trees and Attack Trees
GAP Analysis
Business Impact of Threat
Internal Metrics Threat
External Metrics Threat
Calculating Relative Criticality
Test Dependencies
Other Tools Useful in Pen-Test
Phases of Penetration Testing
Pre-Attack Phase
Best Practices
Results that can be Expected
Passive Reconnaissance
Active Reconnaissance
Attack Phase
Activity: Perimeter Testing
Activity: Web Application Testing – I
Activity: Web Application Testing – II
Activity: Web Application Testing – III
Activity: Wireless Testing
Activity: Acquiring Target
Activity: Escalating Privileges
Activity: Execute, Implant, and Retract
Post-Attack Phase and Activities
Penetration Testing Deliverables Templates
Module 1 Review

Module 2 – Introduction to Ethical Hacking
Introduction to Ethical Hacking
Module Objective
Module Flow
Problem Definition – Why Security?
Essential Terminologies
Elements of Security
The Security, Functionality, and Ease of Use Triangle
Case Study
What Does a Malicious Hacker Do
Effect on Business
Phase 1 – Reconnaissance
Reconnaissance Types
Phase 2 – Scanning
Phase 3 – Gaining Access
Phase 4 – Maintaining Access
Phase 5 – Covering Tracks
Types of Hacker Attacks
1. Operating System Attacks
Security News: Default Installation
2. Application Level Attacks
3. Shrink Wrap Code Attacks
4. Misconfiguration Attacks
Remember This Rule!
Hacker Classes
Ethical Hacker Classes
What Do Ethical Hackers Do
Can Hacking be Ethical
How to Become an Ethical Hacker
Skill Profile of an Ethical Hacker
What is Vulnerability Research
Why Hackers Need Vulnerability Research
Vulnerability Research Tools
How to Conduct Ethical Hacking
How Do They Go About It
Approaches to Ethical Hacking
Ethical Hacking Testing
Ethical Hacking Deliverables
Computer Crimes and Implications
What Happened Next
Module 2 Review
Module 3 – Footprinting

Module Objective
Module Flow
Revisiting Reconnaissance
Defining Footprinting
Why is Footprinting Necessary
Areas and Information which Attackers Seek
Information Gathering
Information Gathering Methodology
Unearthing Initial Information
Finding a Company’s URL
Internal URL
Extracting Archive of a Website
Google Search for Company’s Info.
People Search
Satellite Picture of a Residence
Footprinting Through Job Sites
Passive Information Gathering
Competitive Intelligence Gathering
Why Do You Need Competitive Intelligence
Competitive Intelligence Resource
Competitive Intelligence Tool: Web Investigator
Reputica Dashboard
Public and Private Websites
Footprinting Tools
Whois Tools
DNS Information Extraction Tools
Tool: DNS Enumerator
Locating Network Range
Trace Route Analysis
Tool: Maltego
Layer Four Traceroute
E-mail Spiders
Tool: 1st E-mail Address Spider
Locating Network Activity
Tool: GEOSpider
Tool: Geowhere
Search Engines
Kartoo Search Engine
Dogpile (Meta Search Engine)
How to Fake Websites
Faking Websites using Man-in-the-Middle Phishing Kit
Steps to Perform Footprinting
What Happened Next
Module 3 Review

Module 4 – Google Hacking

Google Hacking
Module Flow
What is Google Hacking
What a Hacker Can do With Vulnerable Site
Anonymity with Caches
Using Google as a Proxy Server
Directory Listings
Locating Directory Listings
Server Versioning
Going Out on a Limb: Traversal Techniques
Directory Traversal
Incremental Substitution
Extension Walking
Google Advanced Operators
intranet | help.desk
Locating Exploits and Finding Targets
Locating Public Exploit Sites
Locating Vulnerable Targets
“Powered by” Tags Are Common Query Fodder for Finding Web Applications
Vulnerable Web Application Examples
Locating Targets via CGI Scanning
Web Server Software Error Messages
Google Hacking Tools
Google Hacking Database (GHDB)
SiteDigger Tool
Goolink Scanner
Google Hack Honeypot
Module 4 Review

Module 5 – Scanning

Module Objective
Scanning – Definition
Types of Scanning
Objectives of Scanning
CEH Scanning Methodology
Checking for Live Systems
Checking for Live Systems – ICMP Scanning
Firewalk Tool
Checking for Open Ports
Three Way Handshake
TCP Communication Flags
Nmap: Scan Methods
NMAP Output Format
ICMP Echo Scanning/List Scan
TCP Connect / Full Open Scan
SYN/FIN Scanning Using IP Fragments
UDP Scanning
Colasoft MAC Scanner
War Dialer Technique
Why War Dialing?
War Dialing Countermeasures SandTrap Tool
Banner Grabbing
OS Fingerprinting
Active Stack Fingerprinting
Passive Fingerprinting
Active Banner Grabbing Using Telnet
Tools for Active Stack Fingerprinting
Disabling or Changing Banner
IIS Lockdown Tool
Vulnerability Scanning
Qualys Web-based Scanner
Draw Network Diagrams of Vulnerable Hosts
Preparing Proxies
Proxy Servers
Use of Proxies for Attack
How Does MultiProxy Work
TOR Proxy Chaining Software
Surfing Anonymously
Bloggers Write Text Backwards to Bypass Web Filters in China
Google Cookies
Spoofing IP Address
Detecting IP Spoofing
Despoof Tool
Scanning Countermeasures
What Happened Next?
Scanning Review
Module 5 Review

Module 6 – Enumeration

Module Flow
Overview of System Hacking Cycle
What is Enumeration
Techniques for Enumeration
Netbios Null Sessions
So What’s the Big Deal
Tool: DumpSec
NetBIOS Enumeration Using Netview
Null Session Countermeasures
PS Tools
SNMP Enumeration
Management Information Base
SNMPutil Example
Tool: Solarwinds
UNIX Enumeration
SNMP UNIX Enumeration
SNMP Enumeration Countermeasures
LDAP Enumeration
NTP Enumeration
SMTP Enumeration
Web Enumeration
Windows Active Directory Attack Tool
How To Enumerate Web Application Directories in IIS Using Directory Services
Enumerate Systems Using Default Passwords
Terminal Service Agent
What Happened Next
Enumeration Review
Module 6 Review

Module 7 – System Hacking

System Hacking
Module Flow
CEH Hacking Cycle 01
Password Types
Types of Password Attacks
Passive Online Attack: Wire Sniffing
Passive Online Attack: Man-in-the-Middle and Replay Attacks
Active Online Attack: Password Guessing
Offline Attacks
Offline Attack: Brute-force Attack
Offline Attack: Pre-Computed Hashes
Syllable Attack/Rule-based Attack/Hybrid Attack
Distributed Network Attack
Non-Technical Attacks
PDF Password Cracker
Password Mitigation
Permanent Account Lockout – Employee Privilege Abuse
Administrator Password Guessing
Manual Password Cracking Algorithm
Automatic Password Cracking Algorithm
Microsoft Authentication
LM, NTLMv1, and NTLMv2
NTLM and LM Authentication on the Wire
Kerberos Authentication
What is LAN Manager Hash
Password Cracking Countermeasures
Do Not Store LAN Manager Hash in SAM Database
LM Hash Backward Compatibility
Escalating Privileges
Privilege Escalation
Executing Applications
Actual Spy
Wiretap Professional
Keylogger Countermeasures
Hiding Files 01
CEH Hacking Cycle 02
Hiding Files 02
Why Rootkits
Rootkits in Linux
Detecting Rootkits
Steps for Detecting Rootkits
Sony Rootkit Case Study
Rootkit Countermeasures
Creating Alternate Data Streams
NTFS Streams Countermeasures
Hacking Tool: USB Dumper
Least Significant Bit Insertion in Image Files
Steganography Tools
Steganography Detection
Steganalysis Methods/Attacks on Steganography
Steganalysis Tools
Covering Tracks
Disabling Auditing
Clearing the Event Log
What Happened Next
Module 7 Review

Module 8 – Trojans and Backdoors

Trojans and Backdoors
What is a Trojan
Overt and Covert Channels
Working of Trojans
Different Types of Trojans
What Do Trojan Creators Look For
Different Ways a Trojan Can Get into a System
Indications of a Trojan Attack
Ports Used by Trojans
How to Determine which Ports are “Listening”
HTTP Trojans
ICMP Tunneling
Trojan: Netcat
Hacking Tools
Trojan Detecting Tools
How to Detect Trojans
Delete Suspicious Device Drivers
Check for Running Processes: What’s on My Computer
Super System Helper Tool
Tool: MSConfig
Anti-Trojan Software
Backdoor Countermeasures
Tool: Tripwire
System File Verification
How to Avoid a Trojan Infection
What happened next
Module 8 Review

Module 9 – Viruses and Worms

Viruses and Worms
Introduction to Virus
Virus History
Characteristics of a Virus
Working of Virus
Why People Create Computer Viruses
Symptoms of Virus-Like Attack
Virus Hoaxes
How is a Worm different from a Virus
Indications of a Virus Attack
Hardware Threats
Software Threats
Stages of Virus Life
Types of Viruses
Virus Classification
How does a Virus Infect
Storage Patterns of a Virus
System Sector Viruses
Stealth Virus
Bootable CD-ROM Virus
Encryption with a Variable Key
Polymorphic Code
Metamorphic Virus
Cavity Virus
Sparse Infector Virus
Companion Virus
File Extension Virus
Famous Viruses and Worms
Famous Viruses/Worms: I Love You Virus
Zombies and DoS
Spread of Slammer Worm – 30 min
Latest Viruses
Disk Killer
Writing Virus Programs
Writing a Simple Virus Program
Virus Construction Kits
Examples of Virus Construction Kits
Virus Detection Methods
Virus Incident Response
What is Sheep Dip
Virus Analysis – IDA Pro Tool
Prevention is Better than Cure
Anti-Virus Software
Module 9 Review

Module 10 – Sniffers

Definition: Sniffing
Protocols Vulnerable to Sniffing
Types of Sniffing
Passive Sniffing
Active Sniffing
What is Address Resolution Protocol (ARP)
Tool: Network View – Scans the Network for Devices
RF Transmitter Wiretaps
Infinity Transmitter
Slave Parallel Wiretaps
Switched Port Analyzer (SPAN)
Lawful Intercept
Benefits of Lawful Intercept
Network Components Used for Lawful Intercept
ARP Spoofing Attack
How Does ARP Spoofing Work
Mac Duplicating
Mac Duplicating Attack
ARP Spoofing Tools
MAC Flooding Tools
Threats of ARP Poisoning
IP-based Sniffing
Linux Sniffing Tools
DNS Poisoning Techniques
1. Intranet DNS Spoofing (Local Network)
2. Internet DNS Spoofing (Remote Network)
3. Proxy Server DNS Poisoning
4. DNS Cache Poisoning
Interactive TCP Relay
Raw Sniffing Tools
Features of Raw Sniffing Tools
Detecting Sniffing
How to Detect Sniffing
Module 10 Review

Module 11 – Social Engineering

Social Engineering
There is No Patch to Human Stupidity
What is Social Engineering
Human Weakness
“Rebecca” and “Jessica”
Office Workers
Types of Social Engineering
Human-Based Social Engineering
Human-Based Social Engineering: Eavesdropping
Human-Based Social Engineering: Shoulder Surfing
Human-Based Social Engineering: Dumpster Diving
Dumpster Diving Example
Human-Based Social Engineering (cont’d)
Movies to Watch for Reverse Engineering Examples: The Italian Job and Catch Me If You Can
Computer-Based Social Engineering
Insider Attack
Disgruntled Employee
Preventing Insider Threat
Common Targets of Social Engineering
Social Engineering Threats and Defenses
Online Threats
Telephone-Based Threats
Personal Approaches
Defenses Against Social Engineering Threats
Factors that make Companies Vulnerable to Attacks
Why is Social Engineering Effective
Warning Signs of an Attack
Tool: Netcraft Anti-Phishing Toolbar
Phases in a Social Engineering Attack
Behavoirs Vulnerable to Attacks
Impact on the Organization
Policies and Procedures
Impersonating on Facebook
Identity Theft
Module 11 Review

Module 12 – Phishing

Reasons for Successful Phishing
Phishing Methods
Process of Phishing
Types of Phishing Attacks
Man-in-the-Middle Attacks
URL Obfuscation Attacks
Cross-site Scripting Attacks
Hidden Attacks
Client-side Vulnerabilities
Deceptive Phishing
Malware-Based Phishing
DNS-Based Phishing
Content-Injection Phishing
Search Engine Phishing
Module 12 Review

Module 13 – Hacking Email Accounts

Hacking Email Accounts
Ways for Getting Email Account Information
Stealing Cookies
Social Engineering
Password Phishing
Fraudulent e-mail Messages
Vulnerabilities: Web Email
Email Hacking Tools
Securing Email Accounts
Creating Strong Passwords
Seal
Alternate Email Address
Keep Me Signed In/Remember Me
Module 13 Review

Module 14 – Denial of Service

Denial of Service
Goal of DoS
Impact and the Modes of Attack
Types of Attacks
DoS Attack Classification
Smurf Attack
Buffer Overflow Attack
Ping of Death Attack
Teardrop Attack
SYN Attack
SYN Flooding
DoS Attack Tools
Bot (Derived from the Word RoBOT)
Uses of Botnets
Types of Bots
How Do They Infect? Analysis Of Agabot
DDOS Unstoppable
DDoS Attack Taxonomy
Reflective DNS Attacks
DDoS Tools
How to Conduct a DDoS Attack
Reflection of the Exploit
Countermeasures for Reflected DoS
Taxonomy of DDoS Countermeasures
Preventing Secondary Victims
Detect and Neutralize Handlers
Mitigate or Stop the Effects of DDoS Attacks
Post-attack Forensics
Module 14 Review

Module 15 – Session Hijacking

Session Hijacking
What is Session Hijacking
Understanding Session Hijacking
Spoofing vs. Hijacking
Steps in Session Hijacking
Types of Session Hijacking
Session Hijacking Levels
Network Level Hijacking
The 3-Way Handshake
Sequence Numbers
Sequence Number Prediction
TCP/IP Hijacking
IP Spoofing: Source Routed Packets
RST Hijacking
Blind Hijacking
Man in the Middle: Packet Sniffer
UDP Hijacking
Application Level Hijacking
Session Hijacking Tools
Programs that Perform Session Hijacking
Dangers Posed by Hijacking
Protecting against Session Hijacking
Countermeasure: IP Security
What Happened Next
Module 15 Review

Module 16 – Hacking Web Servers

Hacking Web Servers
How are Web Servers Compromised
Web Server Defacement
How are Web Servers Defaced
Attacks Against IIS
IIS 7 Components
IIS Directory Traversal (Unicode) Attack
ServerMask ip100
Core Impact Professional 101
Core Impact Professional
Networking Attack Vector
Client Side Application Testing
Web Application Testing
Core Impact Professional 101 Review
Patch Management
Hotfixes and Patches
What is Patch Management
Vulnerability Scanners
File System Traversal Countermeasures
Increasing Web Server Security
Module 16 Review

Module 17 – Web Application Vulnerabilities

Web Application Vulnerabilities
Web Application Setup
Web Application Hacking
Anatomy of an Attack
Web Application Threats
Cross-Site Scripting/XSS Flaws
Countermeasures 01
SQL Injection
Command Injection Flaws
Countermeasures 02
Cookie/Session Poisoning
Countermeasures 03
Parameter/Form Tampering
Buffer Overflow
Countermeasures 04
Directory Traversal/Forceful Browsing
Countermeasures 05
Cryptographic Interception
Cookie Snooping
Authentication Hijacking
Countermeasures 06
Log Tampering
Error Message Interception
Attack Obfuscation
Platform Exploits
DMZ Protocol Attacks
Countermeasures 07
Security Management Exploits
Web Services Attacks
Zero-Day Attacks
Network Access Attacks
Module 17 Review

Module 18 – Web-Based Password Cracking Techniques

Web-Based Password Cracking Techniques
Authentication – Definition
Authentication Mechanisms
HTTP Authentication
Basic Authentication
Digest Authentication
Integrated Windows (NTLM) Authentication
Negotiate Authentication
Certificate-based Authentication
Forms-based Authentication
RSA SecurID Token
Biometrics Authentication
Types of Biometrics Authentication
Fingerprint-based Identification
Hand Geometry-based Identification
Retina Scanning
Afghan Woman Recognized After 17 Years
Face Recognition
Face Code: WebCam Based Biometrics Authentication System
Password Cracking
How to Select a Good Password
Things to Avoid in Passwords
Changing Your Password
Windows XP: Remove Saved Passwords
What is a Password Cracker
Modus Operandi of an Attacker Using Password Cracker
How does a Password Cracker Work
Attacks – Classification
Password Guessing
Query String
Dictionary Maker
Password Cracking Tools
Security Tools
Password Administrator
Module 18 Review

Module 19 – SQL Injection

SQL Injection
What is SQL Injection
Exploiting Web Applications
SQL Injection Steps
What Should You Look For
What If It Doesn’t Take Input
OLE DB Errors
SQL Injection Techniques
How to Test for SQL Injection Vulnerability
How Does it Work
Executing Operating System Commands
Getting Output of SQL Query
Getting Data from the Database Using ODBC Error Message
SQL Injection in Oracle
SQL Injection in MySql Database
Attack Against SQL Servers
SQL Server Resolution Service (SSRS)
Osql L-Probing
SQL Injection Tools
SQL Injection Automated Tools
Blind SQL Injection
Blind SQL Injection: Countermeasures
SQL Injection Countermeasures
Preventing SQL Injection Attacks
Module 19 Review

Module 20 – Hacking Wireless Networks

Hacking Wireless Networks
Introduction to Wireless Networking
Wired Network vs. Wireless Network
Effects of Wireless Attacks on Business
Types of Wireless Network
Advantages and Disadvantages of a Wireless Network
Wireless Standards
Wireless Standard: 802.11a
Wireless Standard: 802.11b – “WiFi”
Wireless Standard: 802.11g
Wireless Standard: 802.11i
Wireless Standard: 802.11n
Related Technology and Carrier Networks
Wireless Access Points
Beacon Frames
Is the SSID a Secret
Setting up a WLAN
Authentication and Association
Authentication Modes
The 802.1X Authentication Process
Wired Equivalent Privacy (WEP)
WEP Issues
What is WPA
WPA Vulnerabilities
WEP, WPA, and WPA2
WPA2 Wi-Fi Protected Access 2
Attacks and Hacking Tools
Authentication and (Dis)Association Attacks
WEP Attack
Cracking WEP
Weak Keys (a.k.a. Weak IVs)
Problems with WEP’s Key Stream and Reuse
Automated WEP Crackers
Attacking WPA Encrypted Networks
Evil Twin: Attack
Rogue Access Points
Cloaked Access Point
Temporal Key Integrity Protocol (TKIP)
Phone Jammers
Phone Jammer: Mobile Blocker
2.4Ghz Wi-Fi & Wireless Camera Jammer
3 Watt Digital Cell Phone Jammer
3 Watt Quad Band Digital Cellular Mobile Phone Jammer
Detecting a Wireless Network
Scanning Tools
Sniffing Tools
Hacking Wireless Networks 02
Step 1: Find Networks to Attack
Step 2: Choose the Networks to Attack
Step 3: Analyzing the Network
Step 4: Cracking the WEP Key
Step 5: Sniffing the Network
Wireless Security
Radius: Used as Additional Layer in Security
Securing Wireless Networks
WLAN Security: Passphrase
Don’ts in Wireless Security
Wireless Security Tools
Google Secure Access
Module 20 Review

Module 21 – Physical Security

Physical Security
Security Facts
Understanding Physical Security
Physical Security 02
What Is the Need for Physical Security
Who Is Accountable for Physical Security
Factors Affecting Physical Security
Physical Security Checklist 01
Physical Security Checklist: Company Surroundings
Security Guards
Physical Security Checklist: Premises
CCTV Cameras
Physical Security Checklist: Reception
Physical Security Checklist: Server
Physical Security Checklist: Workstation Area
Physical Security Checklist: Wireless Access Points
Physical Security Checklist: Other Equipment
Physical Security Checklist: Access Control
Physical Security Checklist: Biometric Devices
Biometric Identification Techniques
Authentication Mechanisms
Authentication Mechanisms Challenges: Biometrics
Faking Fingerprints
Physical Security Checklist 02
Smart Cards
Security Token
Computer Equipment Maintenance
Remote Access
Lock Picking
Lock Picking Tools
Information Security
EPS (Electronic Physical Security)
Wireless Security
Laptop Theft Statistics for 2007
Statistics for Stolen and Recovered Laptops
Laptop Theft
Laptop Security Tools
Laptop Tracker – Xtool Computer Tracker
Laptop Security Countermeasures
Challenges in Ensuring Physical Security
Spyware Technologies
Physical Security: Lock Down USB Ports
Module 21 Review

Module 22 – Linux Hacking

Linux Hacking
Why Linux
Linux – Basics
Linux Live CD-ROMs
Basic Commands of Linux: Files & Directories
Linux Networking Commands
Directories in Linux
Installing, Configuring, and Compiling Linux Kernel
How to Install a Kernel Patch
Compiling Programs in Linux
Make Files
Make Install Command
Linux Vulnerabilities
Why is Linux Hacked
How to Apply Patches to Vulnerable Programs
Port Scan Detection Tools
Password Cracking in Linux: Xcrack
Firewall in Linux: IPTables
Basic Linux Operating System Defense
Linux Loadable Kernel Modules
Hacking Tool: Linux Rootkits
Rootkit: Countermeasures
Linux Tools: Application Security
Advanced Intrusion Detection Environment (AIDE)
Linux Tools: Encryption
Steps for Hardening Linux
Module 22 Review

Module 23 – Evading IDS, Firewalls and Honeypots

Evading IDS, Firewalls and Honeypots
Introduction to Intrusion Detection Systems
Intrusion Detection System
Intrusion Detection System (IDS)
IDS Placement
Ways to Detect an Intrusion
Types of Intrusion Detection Systems
System Integrity Verifiers (SIV)
Tripwire (www.tripwire.com)
Cisco Security Agent (CSA)
True/False, Positive/Negative
Signature Analysis
General Indications of Intrusion System Indications
General Indications of Intrusion File System Indications
General Indications of Intrusion Network Indications
Intrusion Detection Tools
Running Snort on Windows 2003
Snort Rules
Steps to Perform After an IDS Detects an Attack
Evading IDS Systems
Ways to Evade IDS
Tools to Evade IDS
What is a Firewall
What does a Firewall do
Packet Filtering
What can’t a Firewall do
How does a Firewall Work
Hardware Firewall
Types of Firewalls
Packet Filtering Firewall
Circuit-Level Gateway
Application-Level Firewall
Stateful Multilayer Inspection Firewall
Firewall Identification
Banner Grabbing
Breaching Firewalls
Placing Backdoors Through Firewalls
What is a Honeypot
The Honeynet Project
Types of Honeypots
Advantages and Disadvantages of a Honeypot
Where to Place a Honeypot
Physical and Virtual Honeypots
Tools to Detect Honeypots
What to do When Hacked
Module 23 Review

Module 24 – Buffer Overflows

Buffer Overflows
Why are Programs/Applications Vulnerable
Buffer Overflows 02
Reasons for Buffer Overflow Attacks
Knowledge Required to Program Buffer Overflow Exploits
Understanding Stacks
Understanding Heaps
Types of Buffer Overflows: Stack-Based Buffer Overflow
Stack Based Buffer Overflows
Types of Buffer Overflows: Heap-Based Buffer Overflow
Heap-Based Buffer Overflow
Understanding Assembly Language
How to Detect Buffer Overflows in a Program
Attacking a Real Program
How to Mutate a Buffer Overflow Exploit
Once the Stack is Smashed…
Defense Against Buffer Overflows
Tool to Defend Buffer Overflow: Return Address Defender (RAD)
Tool to Defend Buffer Overflow: StackGuard
Module 24 Review

Module 25 – Cryptography

Cryptography 02
Classical Cryptographic Techniques
Cryptographic Algorithms
RSA (Rivest Shamir Adleman)
RSA Attacks
RSA Challenge
Data Encryption Standard (DES)
DES Overview
RC4, RC5, RC6, Blowfish
Message Digest Functions
One-way Bash Functions
SHA (Secure Hash Algorithm)
SSL (Secure Sockets Layer)
What is SSH
Algorithms and Security
Disk Encryption
Government Access to Keys (GAK)
Digital Signature
Components of a Digital Signature
Method of Digital Signature Technology
Digital Signature Applications
Digital Signature Standard
Digital Signature Algorithms: ECDSA, ElGamal Signature Scheme
Challenges and Opportunities
Digital Certificates
Encryption Engine
Code Breaking: Methodologies
Cryptography Attacks
Brute-Force Attack
Module 25 Review
Course Closure

Module 26 – Penetration Testing
Module 27 – Convert Hacking
Module 28 – Advanced Virus Writing Techniques
Module 29 – Assembly Language Tutorial
Module 30-32 – Exploit Writing Techniques
Module 33 – Reverse Engineering
Module 34 – MAC OS Hacking
Module 35 – Hacking Routers, Cable Modems and Firewall
Module 36 – Hacking Mobile Phones, PDA and Handheld Devices
Module 37 – Bluetooth Hacking
Module 38 – VoIP Hacking
Module 39 – RFID Hacking
Module 40 – Spamming
Module 41 – Hacking USB Devices
Module 42 – Hacking Database Servers
Module 43 – Cyber Warfare – Hacking Al-Qaida Terrorismg
Module 44 – Internet Content Filtering Techniques
Module 45 – Privacy on Internet-Anonymous
Module 46 – Securing Laptop Computers
Module 47 – Spying Technologies
Module 48 – Corporate Espionage by Insiders
Module 49 – Creating Security Policies
Module 50 – Software Piracy and Warez

BONUS : CD Counter Hack Training Cource (2 CD)


Pemesanan silahkan hubungi gw melalui:
– PM
– Email : ciebal745[at]gmail.com (Subject: Order DVD Ebook)
– SMS (083813066130)
– Facebook : [url=http://facebook-id.server.or.id]http://facebook-id.server.or.id[/url]


[img]http://4.bp.blogspot.com/_Az9ubUL2vw4/SDecsOrWmXI/AAAAAAAAAD0/Fvav_BgsS0M/s320/logo_tikijne.gif[/img] Ongkos Kirim silahkan cek di [url=http://www.jne.co.id/]http://www.jne.co.id/[/url] Isi pada CHECK OUR TARIFF NOW
TO : [Kota tujuan]

Keterangan :
– SS = SPESIAL SERVICE : paket sampai tujuan dihari yang sama.
– YES = YAKIN ESOK SAMPAI : paket sampai tujuan sehari setelah dikirim.
– REG = REGULER SERVICE : paket sampai tujuan 2-3 hari setelah dikirim.
– OKE = ONGKOS KRM EKONOMIS: paket sampai tujuan 3-6 hari setelah dikirim.


[img]http://kumpulblogger.com/bca_logo.jpg[/img] [img]http://kumpulblogger.com/bni_logo.jpg[/img] Norek akan diberikan jika melakukan pemesanan

Untuk yang ada di daerah Bandung bisa COD, gw ada di daerah Dipatiukur.

Terimakasih.. :)

Lapak di Kaskus : http://www.kaskus.us/showthread.php?t=4165927

Daftar Pemesan dan Testimoni : http://www.kaskus.us/showpost.php?p=215402225&postcount=7

Discussion17 Comments

  1. Satus Order

    Kepada : Bapak Tomi
    Alamat : Jl. Mujair 5 ………. Perumnas 1 Tangerang 15116
    Status : Telah dikirim
    Paket Kiriman : Kilat


    • Satus Order

      Kepada : Bapak Imam
      Alamat : Jl. Palur Raya ……… Karanganyar – Jawa tengah
      Status : Telah dikirim
      Paket Kiriman : Kilat


  2. Pingback: JUAL : DVD/CD Certified Ethical hacker (CEH) | Ciebal Site - Just …

  3. Pingback: Download Gratis DVD Video CEH | Ciebal Site

    • wah maap saya gak punya bro.. :)
      Modul CEH ini juga gak saya jual lagi, coz laptop saya ilang jadi file2 ceh jga ilang..
      sya lupa update tulisan ini.. hehe… :)

Leave a Reply