Monthly Archives: July 2023

EC Council CEH 312-50 – Malware – Software Goes Undercover Part 4
July 16, 2023

12. Executable Wrappers So the next thing we want to talk about are the various ways of getting somebody infected by a Trojan component. So I’m just going to create a little scenario here. The scenario I’m going to create is that the Remote Access Trojan comes naturally as a server. That’s the malicious code […]

EC Council CEH 312-50 – Malware – Software Goes Undercover Part 3
July 15, 2023

8. Malware Capabilities Now, the next thing we want to talk about is malware capabilities and some of the things that malware might do. If it’s installed on your system, whether it’s known to you or perhaps not known to you, naturally it can give remote access to someone that you don’t even know that […]

EC Council CEH 312-50 – Malware – Software Goes Undercover Part 2
July 15, 2023

5. Defining Malware: Spyware Now we get into more of a controversial type of malware known as spyware. And spyware actually appeared back in the late 1990s when several researchers, one that I can recall is Steve Gibson that actually looked at information being passed back to vendors. And he got to looking into it […]

EC Council CEH 312-50 – Malware – Software Goes Undercover Part 1
July 14, 2023

1. Introduction to Malware and How The Internet Makes Money In this section we’ll talk about malware. We’ll start off by how the actual internet makes its money. We’ll define malware, Trojans and backdoors. We’ll define things like viruses and worms as well as spyware, loss prevention and other types of creepy things. We’ll discuss […]

EC Council CEH 312-50 – System Hacking Part 8
July 14, 2023

23. RootKits – Frightening Demo Okay, so here we are back at our XP Attacker Machine. And the reason I’m using XP is because the root kit that I want to demonstrate for you, which is one of the very few GUI based rootkits only works with XP Service Pack One and below. And so, […]

EC Council CEH 312-50 – System Hacking Part 7
July 13, 2023

21. Virtually Complete Secrecy, TOR Okay, we finished up talking about something referred to as anonymity. Now we’re going to talk about something referred to as anonymous and secure. And the utility I’m talking about is called Tor. Now, Tor stands for the onion router because it has many different layers. As a matter of […]

EC Council CEH 312-50 – System Hacking Part 6
July 13, 2023

19. Anonymizers – JAP Okay guys, the next thing we’re going to talk about is a free tool called Jap that gives us Internet anonymity. It does not offer any encryption and I’m going to go ahead and move right into the demo on this. Now while we’re right here and available, I want to […]

EC Council CEH 312-50 – System Hacking Part 5
July 12, 2023

17. Alternate Data Streams Demonstration – B Let’s try how about notepad? And I’m going to start this with a colon, and I’m just saying U-D-E-M-Y um txt. Okay. And I’m going to put in a whole bunch of junk in here, all right? And I’m going to go ahead and save it, get out […]

EC Council CEH 312-50 – System Hacking Part 4
July 12, 2023

13. Demonstration MimiKatz Now guys, if nothing I have shown you has scared you yet, this will definitely scare you if you’re not familiar with it. Microsoft in Vista and above attempted to create a single sign on in its Windows Seven and above operating system. We know that the LSAS, the Local System Authority, […]

EC Council CEH 312-50 – System Hacking Part 3
July 11, 2023

9. Countermeasures: Stealing the Passwords, Syskey, Salting Now there are just a couple more things that I wanted to reiterate before we moved on out of the password cracking. And I probably should mention the password cracking that is offline in nature. I’m hoping you put two and two together at this point where the […]

How It Works

img
Step 1. Choose Exam
on ExamLabs
Download IT Exams Questions & Answers
img
Step 2. Open Exam with
Avanset Exam Simulator
Press here to download VCE Exam Simulator that simulates real exam environment
img
Step 3. Study
& Pass
IT Exams Anywhere, Anytime!