The Certified Ethical Hacker (CEH) program is the most comprehensive ethical hacking course on the globe to help information security professionals grasp the fundamentals of ethical hacking.
To master the hacking technologies, you will need to become one, but an ethical one! The accredited hacking course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”.
Defense in Depth – Security strategy in which several protection layers are placed throughout an information system
Enumeration – The attacker establishes an active connection with the victim and try to discover as much attack vectors as possible, which can be used to exploit the systems further.
Enumeration can be used to gain information on −
- Network shares
- SNMP data, if they are not secured properly
- IP tables
- Usernames of different systems
- Passwords policies lists
Enumerations depend on the services that the systems offer. They can be −
- DNS enumeration
- NTP enumeration
- SNMP enumeration
- Linux/Windows enumeration
- SMB enumeration
5 phases of Hacking
- Reconnaissance – Preparatory phase where an attacker seeks to gather information about a target prior to launching an attack.
- Scanning – Scans the network based on information gathered during reconnaissance.
- Gaining Access – Hacker obtains access to the operating system or applications on the computer or network
- Maintaining Access – Hacker tries to retain his or her ownership of the system.
- Clearing Tracks – Hackers always cover their tracks to hide their identity.
Risk – Degree of uncertainty or expectation that an adverse event may cause damage to the system.
Vulnerability – Existence of a weakness, design or implementation error that can lead to an unexpected event compromising the security of the system.