CEH v9 Useful links
-
Show Host: Mike Rodrick
Show Instructor: Adam Gordan
- Author/Consultant/Instructor
Official (ISC)2 Guide to the CISSP CBK - Third Edition
Official (ISC)2 Guide to the ISSAP CBK - Second Edition
The Official (ISC)2 Guide to the SSCP CBK 3rd Edition
This Post should be considered an add-on or update to the excellent CEH v8 useful links by Michala Liavaag
Before reading look at:
CEH v8 useful linkksMonday
• Introduction and FootprintingQuick sentence for sequence of Reconnaissance, Scanning, Gain Access, Maintain Access, Cover Tracks:
Re-Scan to Gain and Maintain Cover- csid: Data Breaches by Industry
Verizon: Data Breach Investigations Report
Cyber Threat Report Download
ISO: Information security management systems
Cloud Controls Matrix Working Group
HIPAA: Health Information Privacy
Sarbanes-Oxley Act
Official PCI Security Standards Council Site
SANS: Information Security Policy Templates
NIST: Publications Portal
Dark Reading: Connecting the Information Security Community
Hackerstorm Blogspot
OWASP
Open Source Security Testing Methodology Manual (OSSTMM)
Firebug Browser addon:
HTTrack Website Copier
The WAYBACK Machine
Tuesday
• Notes : Thanks to M. Wylie- 10 steps:
Search Engines, Advanced Google Hacking, Social Networks, Website Footprinting, Email Footprinting, Competitive Intel, WHOIS, DNS, Network Footprinting, and Social Engineering
-
you may find this scrip useful when scanning your network. It will do a full TCP scan of 192.168.1.1-255 checking all ports and enumerate the OS, services, etc. It will put each host into its own txt file in whatever directory your pwd is. Feel free to adjust the switches to be more stealth if it's a pentest. for i in {1..255}; do nmap -sT -p- 192.168.1.$i -A 192.168.1.$i.nmap.scan; done
-
for i in {1..10}; do nmap -sT -n -p80 192.168.1.$i -v -o 192.168.1.$i.nmap.scan; done
• Scanning & Enumeration
- Googlge Advanced Search
Netcraft
Google Hacking Databas
Offensive Security: Google Hacking Database
Shodan IOT search engine
Spyfu
Edgar: from sec.gov
IP Tracker
IP Address Location
Angry IP Scanner
Port Scanning Techniques: nmap
Packetyzer: Network Protocol Analyzer for Windows
Proxy Workbench
Nessus Vulnerability Scanner
QUALYS: Vulnerability Scanner
TAILS: Privacy operting system
Common Ports list: from MIT
All Ports list: from IANA
Sysinternals
McAfee Free Tools
Wednesday
• Notes: To know for exam- syn/stealth scan also known as "half open scan" for exam
- EXAM: know the difference between passive and active scanning/sniffing
- Exam: know the three types of scanning. Port, Networking, and Vulnerability
- Exam: know types of scan & differences. Tcp, Xmas, Null, Idle, Ack, Windows, Syn/Stealth/half-open
- Exam: three way handshake. Syn - syn-ack – ack
- Exam: know flags and what each does: syn, ack, psh, urg, fin, rst
- Exam: Know scanning methodology: Check for live systems, check for open ports, service identification, banner grabbing (OS fingerprinting), vulnerability scanning, draw/nap vulnerable host, prepare proxies, attack.
• Chapter 3
- CurrPorts
Magnet Tools
Hyena
Hijackthis
Sectools: Top 125 Network Security Tools
SuperScan: from McAfee
MIB wiki - (Management Information Base)
SnScan: SNMP scanner from McAfee
Spiceworks
• Chapter 4
- List of Rainbow Tables
Default Passwords (US)
Default Passwords: from Big Beartha
Passview
Windows Password Recovery Tools
Rainbow Crack
Online Hash Calculater
Thursday
• Notes :- Sigverif: windows built in signature checker
• System Hacking
- McAfee rootkit remover
Alternate Data Streams: google search
AlternateStreamView
CameraShy: Steganography tool
Steghide: Steganography tool
StegSecret: Steganography tool
Snow - Steganography tool
Spyagent
Friday
• Notes :• Cloud Computing
- The NIST Definition of Cloud Computing
Cloud Computing Synopsis and Recommendations
Cloud Computing – Legal Considerations for Data Controllers
Cloud Computing: Key Legal Issues
Cloud Computing Ireland
Cloud Security Alliance - top threats
Cloud Passage
References
- Author/Consultant/Instructor