Search This Blog

Certified Ethical Hacker V7 Prep Kit




uCertify is a preparation kit software provider for IT certification exams. This perpkit is for those who are looking for Certified Ethical Hacker version 7 examination. V7 is the latest version of CEH certification from EC-Council. I was asked by uCertify to test one of their PrepKits, and I chose their prep kit for EC-Council's Certified Ethical Hacker certification exam: E312-50.
The PrepKit is very good and covers each and every objective as defined by main EC-Council vendor. As soon as you open the PrepKit you will get a very good user interface which defines each and every topic in a very specified manner. You can also try it online or use the full version online.



Major Topics covered in this PrepKit :

1. Introduction to Ethical Hacking
  • Gain knowledge on various hacking terminologies, learn the basic elements of information security, Understand the security, functionality and ease of use triangle, know the 5 stages of ethical hacking
  • Understand the different types and implications of hacker attacks, understand hactivism and understand the classification of hackers, learn the different ways an ethical hacker tests a target network, Understand penetration testing and the various methodologies used.
2. Footprinting and Reconnaissance
  • Understand the term Footprinting
  • Understand how traceroute is used in footprinting
  • Google Hacking, website mirroring, email tracking
3. Scanning Networks
  • Understand the term port scanning, network scanning andvulnerability scanning
  • Understand Ping sweeping, firewalk tool, nmap command switches
  • Understand the following Scans: SYN, Stealth, XMAS, NULL, IDLE, FIN, ICMP Echo, List, TCP Connect, Full Open, FTP Bounce, UDP, Reverse Ident, RPC, Window
  • Learn TCP communication flag types, Gain knowledge on War dialing techniques
  • Understand banner grabbing using OS fingerprinting, active stack fingerprinting, passive fingerprinting and other techniques and tools
  • Learn vulnerability scanning using BidiBlah and other hackingtools
  • Understand Proxy servers, anonymizers, HTTP tunneling techniques, identify IP spoofing techniques
4. Enumeration
  • Learn the system hacking cycle, understand enumeration andits techniques
  • Understand null sessions and its countermeasures
  • Understand SNMP enumeration and its countermeasures, describe the steps involved in performing enumeration
5. System Hacking
  • Understand the different types of passwords, password attacks, and password cracking techniques
  • Authentication mechanism, password sniffing, various password cracking tools, and countermeasures
  • Understand privilege escalation, gain insights on key loggersand other spyware technologies, learn how to defend against spyware
  • Identify different ways to hide files, understanding rootkits, learn how to identify rootkits and steps involved, understand alternate data streams
  • Understand Steganography technologies and tools used
  • Understand covering tracks, tools used and erase evidences
When you open the Prepkit it will show you this screen.



You can click between any of the 5 links to Learn, Practice, Do Assignments, Track analytics or discuss it. On clicking the Learn tab, you will get notes for all the topics are sorted in very good manner.



On clicking the Practice tab, you can get 5 Practice Tests containing a total of 893 questions. You can check your performance by practicing it. You can also easily track your performance:



You will get these types of questions in Practice Tests:



All this is backed by their 100% money back guarantee, which says that if you fail in the exams, they are going to refund your money without any questions. This is remarkable as you have no risk in trying it.

You can visit www.ucertify.com to see the full list of their PrepKits. My blog readers will get a 10% discount by using their coupon code 'RHA'.

Note: This is a Sponsored review, If you would like us to do a sponsored review for your product, Please email us atrafayhackingarticles@gmail.com
      
Posted: 10 Mar 2012 01:54 AM PST
Mikko Hyppönen is a famous cyber security expert andcolumnist.He is currently working at F-Secure as Chief Research Officer .Hypponen has delivered several high profile talks on various platforms including TED .In one of his TEDx talks he pointed out three types online attacks and why we should worry about them.


 According to Mike Hypponen,the volume of online crime is increasing day by day ,and in future, majority of crime will be in cyber world rather than real world.Online crime is carried out by computer geniuses not dumb thieves of real world.These attacks are organized and planned by smartest people.Security institutions are far behind in this race.


He pointed out three types of online attacks :


1)Online criminals


The first category is online criminals .These are the guys operating with a very clear objective of making money.They use trojans and keyloggers to steal money from banks ,credit cardsand websites.

Their presence is grossly underestimated ,no one can estimate how many of them are operating these days.But one thing is for sure,they make millions out of  internet.Few months ago,US intelligence agencies froze a bank account of such criminal name Sam Jain.The authorities found out that his account in Switzerland had $14.9 m already and money  was added to it time to time.The account is freezed now ,but Mr. Sam Jain himself is on the loose.

2)Hackivists -Hacking Activists

This term sprang on blogging  and IRC networks after the rise of groups like Anonymous and LulzSec .These groups are not motivated by money ,they are driven by an opinion or protest.They usually attack state owned properties and institutions and get their protests visibility in the press.

3)Nation States-Governments


Last category is quite unanticipated .Today Governments are involved in launching attacks against other Governments.Most surprisingly they are also using technology against their own people. Hypponen described how a laser printer can be used to track what content citizens are printing .

Apparently printer is not connected to any sort of network ,andit seems that when you buy one,there is no connection between you and company.But the truth is ,every printer is unique andhence identifiable

Whenever a printer prints a page,it leaves an exclusive pattern of tiny yellow dots which are specific for that printer.These dots are barely visible by naked eye.This pattern can be used by experts to tell  from which printer a paper is printed.Hence a printer can tracked ,so can be the user.

0 comments:

Post a Comment