Textbook

CNIT 124
Advanced Ethical Hacking

Spring 2011 Sam Bowne

Final Grades 6-1-2011

Schedule · Lecture Notes · Projects · Links · Forum · CEH Flashcards · Home Page


CRN 39727 Weds 6:30-9:30 SCIE 200

Catalog Description

Advanced techniques of defeating computer security, and countermeasures to protect Windows and Unix/Linux systems. Hands-on labs include Google hacking, automated footprinting, sophisticated ping and port scans, privilege escalation, attacks against telephone and Voice over Internet Protocol (VoIP) systems, routers, firewalls, wireless devices, Web servers, and Denial of Service attacks.

Prerequisites: CNIT 123.

Upon successful completion of this course, the student will be able to:
  1. Use Google and automated footprinting tools to locate vulnerable Web servers, passwords, open VNC servers, database passwords, and Nessus reports
  2. Perform sophisticated ping and port scans with several tools, and protect servers from the scans
  3. Enumerate resources on systems using banner-grabbing and specific attacks against common Windows and Unix/Linux services including FTP, Telnet, HTTP, DNS, and many others, and protect those services
  4. Use authenticated and unauthenticated attacks to compromise Windows and Unix/Linux systems and install backdoors and remote-control agents on them, and protect the systems from such attacks
  5. Enter networks through analog phone systems, defeating many authentication techniques, and defend networks from such attacks
  6. Penetrate PBX, voicemail, Virtual Private Network (VPN), and Voice over Internet Protocol (VoIP) systems, and defend them
  7. Perform new wireless attacks, including denial-of-service and cracking networks using Wi-Fi Protected Access (WPA) and WPA-2
  8. Identify firewalls and scan through them
  9. Perform classical and modern Denial of Service (DoS) attacks, and defend networks from them
  10. Locate Web server vulnerabilities, exploit them, and cure them
  11. Describe many ways Internet users are attacked through their browsers and other Internet clients, and the protective measures that can help them

Textbooks

Hacking Exposed, Sixth Edition by Stuart McClure, Joel Scambray, and George Kurtz -- ISBN-10: 0071613749 Buy from Amazon

CNIT 124: Advanced Ethical Hacking -- Lecture Notes (Spring 2011) by Sam Bowne (buy it at the CCSF Bookstore)



Schedule

DateQuizTopic
Wed 1-19  Ethical Principles & "The DoS Crisis" and "Social-Engineer Toolkit" (not in textbook)
Wed 1-26  Ch 1: Advanced Footprinting
Wed 2-2 Ch 2: Advanced Scanning
Sat 2-5 Last Day to Add Classes on the Web
Wed 2-9Quiz on Ch 1-2  
Proj 1-2 due
Ch 3: Advanced Enumeration
Wed 2-16Quiz on Ch 3 
Proj 3-4 due
Ch 4: Hacking Windows (part 1)
Tue 2-22 Last Day to Request pass/no pass Grading
Wed 2-23No Quiz  
Proj 6 due
Ch 4: Hacking Windows (part 2)
Wed 3-2Quiz on Ch 4 
Proj 7 due
Ch 5: Hacking Unix/Linux (part 1)
Wed 3-9No Quiz 
Proj 8 due
Ch 5: Hacking Unix/Linux (part 2)
Wed 3-16Quiz on Ch 5
Proj 9-10 due
Ch 6: Remote Connectivity and VoIP Hacking
Wed 3-23No Quiz
Proj 11 due
Ch 7: Network Devices
Wed 3-30 Holiday - No Class
Wed 4-6Quiz on Ch 6 & 7 
Proj 5 due
Ch 8: Wireless Hacking
Wed 4-13Quiz on Ch 8 
Proj 12-13 due
Ch 9: Hacking Hardware
Fri 4-17 Last Day to Withdraw
Wed 4-20Quiz on Ch 9 
Proj 14 due
Ch 10: Hacking Code
Wed 4-27Quiz on Ch 10 
Proj 15-16 due
Ch 11: Web Hacking
Wed 5-4No Quiz 
Proj 17 due
Guest Speaker: Adam Ely, Director, Security of TiVo
Wed 5-11Quiz on Ch 11 
Proj 18 due
Ch 12: Hacking the Internet User
Wed 5-18No Quiz Last Class
All Extra Credit Proj due
Last day to submit Proj 5 for 15 pts.
Review for Final
Wed 5-25  Final Exam: 7:00 pm
Back to Top


Lectures

Policy
Student Agreement
Code of Ethics
The DoS Crisis and Social-Engineer Toolkit (Not in textbook, PPT files)
Ch 1: Footprinting (From 5th Ed.)     Powerpoint
Ch 2: Scanning (6th Ed.)     Powerpoint
Ch 3: Enumeration (6th Ed.)     Powerpoint      Demo notes
Ch 4: Hacking Windows (6th Ed.)     Powerpoint
Ch 5: Unix/Linux (6th Ed.)     Powerpoint
Ch 6: Remote Connectivity and VoIP Hacking (6th Ed.) (revised 3-18)     Powerpoint
Ch 7: Network Devices (6th Ed.) (revised 3-25)     Powerpoint
Ch 8: Wireless Hacking (6th Ed.)     Powerpoint
Ch 9: Hacking Hardware (6th Ed.)     Powerpoint
Ch 10: Hacking Code (6th Ed.)     Powerpoint
Ch 11: Web Hacking (6th Ed.)     Powerpoint     Exploitable Message Board     WebGoat Instructions
Ch 12: Hacking the Internet User (6th Ed.)     Powerpoint
The lectures are in Word and PowerPoint formats.
If you do not have Word or PowerPoint you will need to install the
Free Word Viewer 2003 and/or the Free PowerPoint Viewer 2003.


Back to Top


Projects


How to Read Your CCSF Email
How to Get your Windows XP Activation Code from MSDNAA
Downloading MSDNAA Software
Virtual Machines at Home
Fixing Ubuntu Virtual Machine Problems

Proj 1: HTTP Headers (15 pts)
Proj 2: Tamper Data (20 pts)
Proj 3: Building a Web Server (10 pts)
Proj 4: DoS Attack with the Low Orbit Ion Cannon (15 pts)
      LOIC (7-zip, password sam)
Proj 5: Independent Project (20 pts. or more)
Proj 6: WebGoat Setup (20 pts.)
Proj 7: WebGoat Introduction (15 pts.)
Proj 8: WebGoat: Access Control (15 pts.)
Proj 9: Attacking Apache (20 pts.)
Proj 10: Port Knocking on BackTrack Linux (20 pts.)
Proj 11: Attacking Apache with the OWASP Slow Http Tool (15 pts.)
Proj 12: Attacking IIS with the OWASP Slow Http Tool (15 pts.)
Proj 13: IPv6 Router Advertisements (15 pts.)
Proj 14: Using thc-ipv6 to Scan an IPv6 Network (15 pts.)
Proj 15: Protecting a Web Server with a Load Balancer (20 pts.)
      haproxy-1.4.11.tar.gz
Proj 16: Protecting Apache with mod_security (20 pts.)
Proj 17: Introduction to scapy (15 pts.)
Proj 18: TCP Handshake with scapy (15 pts.)

Extra Credit Projects

Proj 1x: IPv6 Tunnel (10 pts.)
Proj 2x: Attacking nginx (15 pts.)
Proj 3x: Attacking nginx with the OWASP Slow Http Tool (15 pts.)
Proj 4x: Benchmarking Web Server Performance (15 pts.)
Proj 5x: Protecting Apache with iptables (15 pts.)
Proj 6x: Social Engineering Toolkit Java Exploit (15 pts.) (updated 4-15-11)
Proj 7x: IPv6 with scapy (20 pts.)
Proj 8x: Win 7 DoS with Router Advertisements (20 pts.)
Proj 9x: Router Advertisements with scapy (20 pts.)
Proj 10x: Slow Loris Attack with scapy (20 pts.)
Proj 11x: Router Advertisement attack with npg on Windows (10 pts.)
      ra-attack.txt
Proj 12x: Duplicate Address Detection (15 pts.)
Proj 13x: DoS with Secure Neighbor Discovery (SeND) (10 pts.)
Proj 14x: yesman--Scanner Honeypot with scapy (15 pts.)
Proj 15x: ARP Spoofing with scapy (10 pts.)
Proj 16x: Detecting Promiscuous NICs with scapy (10 pts.)
Proj 17x: Introduction to gdb (20 pts.)

There are more projects coming


Back to Top


Links

Links

CEH Certification Resources

CEH Tips
CEH: Certified Ethical Hacker - Taking the Exam
CEH: Practice Exams
CEH: TechExams -- Certified Ethical Hacker (CEH) exam
EC-Council - Certified Ethical Hacker (312-50) Practice Exam - This is the one I used

Links for Chapter Lectures

Ch 4a: Metasploit Module Search Page
Ch 4b: How to get started with writing an exploit for Metasploit
Ch 4c: Msfconsole one-liner example
Ch 4d: Scanner HTTP Auxiliary Modules - Metasploit Unleashed
Ch 4e: Metasploit: The New Metasploit Browser Autopwn:...
Ch 4f: Simple Take Over of Windows Server 2008 via ms09-050

Ch 5a: DNS Request Types
Ch 5b: 10 Linux DIG Command Examples for DNS Lookup
Ch 5c: Open Resolver Project
Ch 5d: Public DNS Server List
Ch 5e: DNS AXFR scan data
Ch 5f: DNS Hacking (Beginner to Advanced) - InfoSec Resources
Ch 5g Wildcard DNS record - Wikipedia
Ch 5h: Network tools for every sys admin
Ch 5i: The Strange History of Port 0

Ch 7a: HowToDecrypt802.11 - The Wireshark Wiki
Ch 7b: security - WEP/WPA/WPA2 and wifi sniffing - Server Fault
Ch 7c: Benefits and Vulnerabilities of Wi-Fi Protected Access 2 (WPA2)
Ch 7d: Details of Key Derivation for WPA

Ch 8a: An Improved Reflective DLL Injection Technique
Ch 8b: DLL injection - Wikipedia
Ch 8c: Windows DLL Injection Basics--Clear Explanation with Good Figures
Ch 8d: stephenfewer/ReflectiveDLLInjection -- Code from 2013
Ch 8e: Using Cadaver as a WebDAV Client
Ch 8f: WebDAV - Wikipedia
Ch 8g: helper: webdav xampp (= 1.7.3 default credentials
Ch 8h: How To Install and Secure phpMyAdmin on Ubuntu 14.04
Ch 8i: Docker Internals - Google Slides
Ch 8j: Docker: Understand the architecture
Ch 8k: Docker vs Virtualization
Ch 8l: UnionFS - Wikipedia
Ch 8m: Docker Hub
Ch 8o: Docker Container Breakout Proof-of-Concept Exploit | Docker Blog
Ch 8p: The Docker exploit and the security of containers | Xen Project Blog
Ch 8q: Docker breakout: brute-forcing a 32-bit number!
Ch 8r: Docker security
Ch 8s: Docker Addresses More Security Issues and Outlines "Pluggable" Approach
Ch 8t: Dump Windows password hashes efficiently
Ch 8u: Recovering Windows 7 Registry Hives/Files
Ch 8v: How To Install Bkhive on Kali 2
Ch 8w: Transferring files from Kali to Windows (post exploitation)

Ch 9a: Yahoo Mail eliminates passwords as part of a major redesign (Oct., 2015)
Ch 9b: Teen says he hacked CIA director\'s AOL account (Oct., 2015)
Ch 9c: Packetstorm Wordlists for password cracking
Ch 9d: Openwall wordlists collection for password recovery, password cracking, and password strength checking
Ch 9e: Why passwords have never been weakerand crackers have never been stronger (2012)
Ch 9f: "thereisnofatebutwhat­wemake"Turbo-charged cracking comes to long passwords (2013)
Ch 9g: Cracking 16 Character Strong passwords in less than an hour (2013)
Ch 9h: How the Bible and YouTube are fueling the next frontier of password cracking (2013)

Ch 10a: Adobe Reader Metasploit Modules
Ch 10b: CCSF Application Form (pdf)
Ch 10b: CCSF Application (pdf, can be poisoned with Metasploit)

Ch 11a: Update Social Engineering Toolkit on Kali Linux - YouTube

Ch 12a: Notepad Plus Plus Download
Ch 12b: VirusTotal - Free Online Virus, Malware and URL Scanner
Ch 12c: How to Evade AV Detection with Veil-Evasion

Ch 13a: Post-Mortem of a Metasploit Framework Bug
Ch 13b: Post Exploitation Using NetNTLM Downgrade Attacks
Ch 13c: Mount shadow volumes on disk images - ForensicsWiki
Ch 13d Shell is coming ...: Metasploit: Getting outbound filtering rules by tracerouting
Ch 13e: 5 Step To Capture Windows User Login Using Metasploit Keylogger
Ch 13f: Windows Capture Winlogon Lockout Credential Keylogger | Rapid7
Ch 13g: Metasploit: Capturing Windows Logons with Smartlocker
Ch 13h: Windows 8.1 stops pass-the-hash attacks
Ch 13i: Pass-the-Hash is Dead: Long Live Pass-the-Hash
Ch 13j: Using claims-based access control for compliance and information governance (2011)
Ch 13k: Windows Internals - showing token structure
Ch 13l: Access token stealing
Ch 13m: Access Tokens (Windows)
Ch 13n: What's in a Token (Part 2): Impersonation - TechNet Blogs
Ch 13o: Fun with Incognito - Metasploit Unleashed
Ch 13s: PSExec Demystified
Ch 13t: 4 Ways to Capture NTLM Hashes in Network
Ch 13p: Excellent explanation of NTLMv2
Ch 13q: NTLMv2 cracking speed estimates
Ch 13r: Fast Introduction to SOCKS Proxy - EtherealMind
Ch 15a: HowToDecrypt802.11 - The Wireshark Wiki
Ch 15b: WPA 4-way handshake - Wireshark Q&A

Miscellaneous Links

Learn Python the Hard Way
Fuzzing for SQL injection with Burp Suite Intruder - USE FOR PROJECTS
Pythonista on the App Store on iTunes -- INTERESTING FOR PROJECTS
Pythonista: Using pipista to install modules
How to Build a DNS Packet Sniffer with Scapy and Python
Bypassing Antivirus with Shellter 4.0 on Kali Linux -- GOOD 124 PROJECT
Online JavaScript beautifier -- deobfuscates code! -- IMPORTANT FOR MALWARE ANALYSIS
Android Security: Adding Tampering Detection to Your App

Old Links

PwnWiki.io -- USEFUL RED TEAM TIPS
Hacking Secret Ciphers With Python (Free E-Book)
Introduction to Cryptography Video Lessons by Christof Paar - YouTube
Cryptography Textbook Slides
RSA is 100x slower than AES (figures 9-13)
How to Create a Bootable Ubuntu USB Drive, for Mac, in OS X
EDB (Evan's Debugger) Alternatives and Similar Software - AlternativeTo.net
How to install 32 bit software on a 64 bit Kali Linux system
How to Reverse Engineering with Radare2 -- INTERESTING FOR PROJECTS
OSCP study material : Georgia Weidman's book recommended
A book for those interested in PWK/OSCP -- Georgia Weidman's book recommended
Scapy Documents
Metasploitable 2 Exploitability Guide | Rapid7
Metasploitable 2 enumeration - Hacking Tutorials
Metasploitable 2 vulnerability assessment - Hacking Tutorials
Running Metasploitable2 on VirtualBox
The Kali Linux Certified Professional | Kali Linux
Monitor Apache Web Server Using Mod_status -- WORKS ON UBUNTU
Understanding Python's "with" statement
PSExec for Lateral Movement
Unable to Contact IP Driver, error code 5 Windows 2008 Server hosted on Vmware
How to Make a Domain User the Local Administrator for all PCs
Post-Exploitation in Windows: From Local Admin To Domain Admin (efficiently) | pentestmonkey
Pass-the-hash attacks: Tools and Mitigation (2010)
PSExec Pass the Hash - Metasploit Unleashed
How to download a file using windows command line
mouse pointer is offset up and to the left -- VMware Communities -- USEFUL TROUBLESHOOTING
The "SYSTEM" challenge -- Decoder's Blog
Attack Methods for Gaining Domain Admin Rights in Active Directory
Penetration Testing in Active Directory using Metasploit (Part 2)
Attack Simulation: from No Access to Domain Admin
Exploit MS17-010 vulnerability on Windows Server 2012/2016 using Metasploit and TheFatRat - YouTube
HOW TO EXPLOIT ETERNALROMANCE/SYNERGY TO GET A METERPRETER SESSION ON WINDOWS SERVER 2016
Eternalromance: Exploiting Windows Server 2003 - Hacking Tutorials
Network access: Named Pipes that can be accessed anonymously
A Red Teamer's guide to pivoting
Privilege Escalation - Metasploit Unleashed
VMware Fix: Windows cannot find the Microsoft Software License Terms
Meter your Ethernet connection in Windows 10
Metasploit: Module database cache not built yet, using slow search -- HANDY FIX
RDP hijacking — how to hijack RDS and RemoteApp sessions transparently to move through an organisation
Pwning with Responder - USE IN PROJECT
Gladius: Automatic Responder Cracking
Seeing the unseen characters with cat!
How to see hidden characters..... | Unix
Metasploit privilege escalation with udev
virtual machine - Guest OS resolution (text too small) in vmware workstation 12 player
metasploit - How do you send a 64 bit meterpreter stager?
Locating Those Nasty Passwords in Group Policy Preferences Using PowerShell
Ubuntu Apache Default MaxKeepAliveRequests is 100
Enable SSH on Kali Linux Enable SSH on Kali Linux -- Doctor Chaos
The Easiest Metasploit Guide You’ll Ever Read -- MANY GOOD PROJECTS HERE
Transferring files from Kali to Windows (post exploitation)
Top Five Ways I Got Domain Admin on Your Internal Network before Lunch (2018 Edition)--GOOD FOR PROJECTS AND OSCP
My First Go with BloodHound
Windows Password Hashes: LM, NTLM, Net-NTLMv2, oh my!
RPC_ENUM - RID Cycling Attack - TrustedSec -- Recommended by @J0hnnyXm4s
CrackMapExec: post-exploitation for large Active Directory networks -- Recommended by @J0hnnyXm4s
InitString / evil-ssdp Spoof SSDP replies to phish for credentials and NetNTLM challenge/response
Seth: Perform a MitM attack and extract clear text credentials from RDP connections
Multiple Ways to Get root through Writable File
Setup of AD Penetration Lab
ifconfig - How can I display eth0's IP address at the login screen on Precise Server? - Ask Ubuntu
Privilege Escalation & Post-Exploitation Resources -- VERY USEFUL
Multiple Ways to Bypass UAC using Metasploit
Passing OSCP
OSCP Journey: Exam & Lab Prep Tips
ntroducing the Metasploit Vulnerable Service Emulator
Installing Python 3 on Mac OS X -- The Hitchhiker's Guide to Python
Pipenv & Virtual Environments -- The Hitchhiker's Guide to Python
SSH on Kali

New Unsorted Links

Ch 5j: Zone Transfer Test Online | HackerTarget.com
When target machine dont have "nc" installed ? Don't forget there is "Whois"
Malware writing - Python malware

           Linking provided by Blogrolling
Back to Top


Valid XHTML 1.0!      
Last Updated: 6-1-11 6 pm