Monday, May 9, 2022

CEH Resources

CEH Practical Question Help
1. Veracryt
2. RDP to a given PC, take file from desktop
3. .hex question – use tool Cryptool
a. – des (no key)
b. Rc4 – key length
c. test
4. nmap
a. OS detection – mysql host kun device
b. ftp host – username
i. password chain
5. wireshark
a. look at pcap, which machine is dosing which
b. look at pcap, ddos kati ota ddos
6. steganography
a. use snow. ftp ip ra password (refer 4b)
7. sqlmap
a. phone number
8. user has hidden confidential information in mobile sdcard, find the file.
9. A server has a RAT installed, use it to compromise.
10. Wpscan username: password
11. Compare hash to find which file is changed
12. Sql injection vuln, which method will be most harmful. -trace
13. FTP:
a. Use hydra to brute force
b. You will get username password from some other question, use that to get the other file. (answer sam:test)
14
============================================================================



Skip to end of metadata
Go to start of metadata

The list of resources for CEH certification exam compiled by Roshan Guragain

Resources

This has more than enough resources required to pass the exam.

However, to be precise, here are some resources Roshan Guragain recommends at minimum.

Web Security

Resource: https://portswigger.net/

Tools

Labs :

System Hacking

  • Basic windows command line and system enumeration.
  • Alternate data streams, hidden files on windows

Tools:

  • Remote Desktop Connection
  • psexec.py, smbexec.py, winexe: Windows shell from linux machine (in case rdp is off and smb is enabled)
  • enum4linux: windows enumeration
  • crackmapexec: bruteforce windows password
  • hydra : bruteforce credentials
  • lab: https://tryhackme.com/room/hydra

Sometimes one credential might not have enough permission so try to access the system using all the found credentials

  • Android adb: ( port 5555 ), [ Explore hackthebox writeup ], adb shell
  • Use this to access android filesystem files.

Stegnography

Most of the tools are present in the system itself, you just need to know which tools to use.

The passphrase required for decryption is provided in the question itself so just learn how to encrypt and decrypt using the tools.

Tools:

  • snow, steghide, openstegno: windows
  • steghide: windows

Here are more resources (these are overkill resources )

Cryptography

Need to understand the hashing algorithms, find the modified files using checksum, decrypt texts using the below mentioned tools (cryptotool), decrypt encrypted files (veracrypt).

Tools:

If you want to learn in depth : https://cryptopals.com/ (not needed to pass CEH).

Hash Cracking labs:

Network Enumeration

PCAP Analysis

Learn the filters to be used https://medium.com/hacker-toolbelt/wireshark-filters-cheat-sheet-eacdc438969c

Learn how to extract specific protocol traffic.

One question was to extract username and password from the http request.

Filter User:
http.request.post

Three questions were from the following topics
1. DoS detection
2. DDoS detection
3. Extracting credentials from http traffic

If you have completed the above and want to get confident try some boot2root machines on hackthebox and tryhackme. [ johnhammond , ippsec on youtube has good content for these boxes ]

Roshan Guragain 's Experience:

You join the session and connect to proctor. You need to install ( GoMeetings ) application on your machine. The proctor provides all the rules and instructions to start the exam. A single break of 15 minutes was provided to me ( which is preinformed ). After all the configuration is done, the proctor enter’s his credentials and the exam starts.

I was provided with two machines one windows and one Parrot OS. There are two tabs instructions(questions) and resources(machines).

All the tools required are present in the machine. On parrotOS root user’s home directory had most of the tools and there was a drive(CEH) for tools on the windows machines. Most of the questions are based on usage of tools. Some bruteforcing of credentials are needed to get access to some of the services. In case you are not able to answer some of the questions just skip it and come back later as you might find the

credentials of those machines on the later questions. Most of the questions are easily solvable and there are not rabbit holes at all in all of those questions. Since googling was allowed, I was able to search for most of the things. In case you are not able to answer any questions ( stegno ) google for the tools available on the system which might help you solve it. The wordlists ( username and passwords ) are also present on the system so it will not take much time.

For hash cracking in case you dont have better GPU you could use google colab instances.

In case you have any queries feel free to reachout to me at rgn@logpoint.com

Thursday, July 30, 2020

How to download Win10 ISO from the Microsoft Official Page?

Hello...
https://www.howtogeek.com/427223/how-to-download-a-windows-10-iso-without-the-media-creation-tool/

Youtube link: https://www.youtube.com/watch?v=E9RCZjXImFA&feature=youtu.be 

Subnetting

Here, I will be going through subnetting shortcuts.

Cisco stepwise ...video record

Switch Commands
Router Commands
VLAN configurations