Become an Ethical Hacker at InfoSec Institute
Our most popular information security and hacker training goes in-depth into the techniques used by malicious, black hat hackers with attention getting lectures and hands-on lab exercises . You leave with the ability to quantitatively assess and measure threats to information assets; and discover where your organization is most vulnerable to hacking in this course.
The Best Defense is a Good Offense:
The goal of this ethical hacker course is to help you master a repeatable, documentable penetration testing methodology that can be used in an ethical penetration testing or hacking situation. This ethical security training course has a significant Return on Investment, you walk out the door with hacking skills that are highly in demand, as well as the Certified Ethical Hacker certification!
Run hacking attacks in our classroom labs, be a hacker for a week:
Some of the hacking concepts you will learn to master during this hands on hacking course...
Some of the instructor-led hands-on hacking lab exercises in this security training experience.
All students receive a fully licensed SEL (Single Engagement License) copy of CORE Security Technologies Impact penetration testing program to take home. Impact has over 250 working exploits for current software (such as Internet Explorer 6.0, Windows XP SP2 and Solaris 10). It also supports memory resident agents that leave no trace on disk and do not disrupt other processes, leaving a minimal footprint on the exploited system.
InfoSec Institute is the only training company that is authorized to distribute fully licensed versions of CORE Imp?ct to students. Impact is available for every student participating in a class.
Dual Certification - Certified Ethical Hacker and Certified Penetration Tester:
In any hands on hacking training course, it is important to have the opportunity to prove to current or potential employers that you have the skills you say you do. This course prepares you for the two top hacking certifications in the industry, the CEH and the CPT. Both exams are given on-site, we have achieved a 93% pass rate for these ethical hacker and penetration testing certifications. Learn more about the requirements for the Certified Ethical Hacker and the Certified Penetration Tester.
We make sure you are fully prepared to pass the CEH. InfoSec Institute goes way beyond the material covered in the CEH to give you a more well-rounded exposure to hacking and penetration testing.
Testimonials from Past Students:
"The class was great! The instructor knew his his information very well. It was nice to have someone who is more than just book knowledge, someone who is just giving you the info for the cert test. His hands on experience in real world pen-testing was invaluable, as it gave a touch-stone to how the methods learned in class can be extended to real pen-testing."
Aaron Bento, IBM Global Services
- "Jack is an excellent instructor. I was very happy with the
course and look forward to taking the advanced course!"
Lena Smart, New York Power Authority
How You Benefit:
- Gain the in-demand career skills of a professional security tester. Learn the methodologies, tools, and manual hacking techniques used by penetration testers.
- Stay ethical! Get hands-on hacking skills in our lab that are difficult to gain in a corporate or government working environment, such as anti-forensics and unauthorized data extraction hacking.
- Move beyond automated vulnerability scans and simple security testing into the world of ethical penetration testing and hacking.
- More than interesting theories and lecture, get your hands dirty in
our dedicated hacking lab in this network security training course.
- 5 Days of Expert Security Training Instruction from a hacking instructor with real-world hacking experience and deep knowledge of course content.
- Guaranteed small class size (less than 10-16 Students), you get an intimate learning setting not offered at any of our competitors.
- InfoSec's Custom Hacking Tools Enterprise Suite, includes every program covered in the course for at home study. (558 Tools). Hacking Tools Enterprise Suite available for individual purchase for only $1,499!
- Core Impact SEL License
- Boot camp style training --- our instructors teach from 8am to 10:30pm every day. Course runs from 8am to 5pm daily with optional ethical capture the flag hacking exercises to 10:30pm.
- All meals, snacks and refreshments included.
- Certified Ethical Hacker exam fees.
- Lecture, Lab Exercise and Text book --- Train your ethical friends
and co-workers hacking!
- Firm understanding of the Windows Operating System
- Exposure to the Linux Operating System or other Unix-based OS
- Grasp of the TCP/IP protocols
- Desire to learn about the hacking and network security profession,
stay ethical, and get great security training!
If you are unsure if you meet the required prerequisites,for a quick network security training skill check.
Current Pricing (Call 866-471-0059 for
up-to-date network security training deals):
(Includes: 5 days of expert ethical network security training, 3 daily meals, text book, course book, lab manual, snacks, certified ethical hacker certification voucher)
Certified Ethical Hacker
Check out the CEH Forum, discuss subjects such as:
Discuss preparation and study for the CEH exam
CEH Test Questions
Submit/Disucss Test Questions
CEH Training/Boot camps
Talk about experiences with varions training providers
Talk about books and self-study websites used to prepare for the exam
Certified Ethical Hacker
This course will introduce you into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.
This course prepares you for EC-Council Certified Ethical Hacker exam 312-50
Who Should Attend
This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
5 days (9:00 5:00)
The Certified Ethical Hacker certification exam 312-50 will be conducted on the last day of training. Students need to pass the online Prometric exam to receive CEH certification.
To further your studies, you should check out the Network Security Archive.
Application holes is a general category referring to specific programming errors or oversights that allow hackers to penetrate systems. (Throughout the list we separately cover holes in specific applications that we are able to exploit frequently (such as sendmail).) As part of a penetration test you identify applications running on remote systems. Once identified, you can perform a search for vulnerabilities and exploits that affect the applications at InfoSec Institute. Application identification is often performed by capturing the application's banner, which frequently offers version information. By searching vulnerability databases and the Web for exploits specific to these versions, you can often find exploits or processes that can lead to a system compromise. For example, in one engagement we were initially unable to gain access to any of the systems in the company's demilitarized zone (DMZ), but we did identify several applications and versions that were running on the systems. After performing some research, we discovered a vulnerability in the Compaq Web management service that enabled us to capture the backup SAM file out of the system's repair directory. The system data recovery infosec institute OS was patched and configured correctly. However, the applications running on the system were not.
hacker tool kit is essentially a set of tools placed on a compromised system to help escalate privileges or to attack other systems. The hacker tool kit usually consists of a port scanner (Nmap), Netcat (for creating listeners and back doors), and any other tools you used during your discovery and exploitation phase. Create a directory on the host system disguised by a name that will not alert a general user or system administrator. The file could also be hidden or streamed to further avoid detection. Just remember that when the test is over you will need to remove the tool kit, so remember where it is located.Now that you have administrator access on the compromised host, you can run the tools from the host remotely or just use it as a stepping stone using port redirection. Port redirection involves taking network traffic coming into a host on one port and directing out from the host on another. For example, if we were able to compromise an NT Web server inside of a packet-filtering firewall, we would use a port redirection tool such as Fpipe to accept connections on a specified port and resend them to a specified port on a specified machine. On the compromised Web server we could set up a Netcat listener on port 80. On the compromised system we would execute:
C:\>nc –l 80 –e cmd.exe
On the testing system outside the firewall, we could use Fpipe to make the connection to the Web server using a different source port that is not filtered by the firewall. The following command would establish a listener on port 25 on the test machine and then redirect the connection to port 80 on the target system using the source port of 25.
C:\>fpipe –l 25 –s 25 –r 80 webipaddress
By using telnet to connect to the test system on port 25 we obtain a command prompt on the Web server inside the firewall. The traffic travels to port 80 from port 25 and thereby is able to bypass the filtering on the firewall. Using port redirection such as this, you can bypass filtering rules on packet-filtering firewalls or routers. Also, by remotely using a compromised host as a testing platform you may be able to take advantage of trust relationships.
Buffer overflow attacks, also called data-driven attacks, can be run remotely to gain access and locally to escalate privileges. Buffer overflows in general are designed almost exclusively for UNIX because in order to write a successful buffer overflow, knowledge of the workings of the OS, specifically treatment of the TCP stack, or the target application's memory/buffer-handling processes is necessary. While there are buffer overflows for Windows and Windows-based applications such as the IIS Web server, they are more common on the UNIX environment. UNIX source code is generally available, whereas source code to Microsoft operating systems is generally not. This allows anyone interested to study and gain the knowledge needed to create buffer overflows for UNIX.A buffer overflow attack attempts to force the target host to change the flow of execution and execute code the attacker specifies. This is done by forcing the target to place so much data into the finite-capacity target buffer that it overflows (with data). This generally stalls or crashes the application through which data was loaded. The point is to redirect the kernel's pointer (which points to the next command to be executed) to a portion of that excessive data the hacker wants to have executed. This portion of data is called an egg. A buffer overflow is challenging to write, in part because it is OS and architecture specific.
 For more specific information regarding the creation of a buffer overflow, refer to the landmark paper on this topic by Aleph1, “Smashing the Stack for Fun and Profit” in Phrack 49, available on the Web at http://www.phrack.org/default.htm.
These buffer overflows cisa training generally only need to be downloaded onto the target system, compiled, and executed. You do not necessarily have to have root privileges to successfully run them. The hard part in performing these attacks is to find a buffer overflow that will work against your particular target. As mentioned, these attacks are OS and architecture specific. Further, if you are launching against a particular application or service, the version and patch level must be taken into consideration. The exploit code mentioned earlier that overflows the gethostbyname() buffer of the rlogin service on Solaris 2.5.1 is not likely to work on the HPUX OS or even more current versions of Solaris.
Buffer overflow attacks are dangerous and effective. If you compile and launch a particular buffer overflow attack against a susceptible target (server, service, or application), it may need a bit of tweaking, but it will likely work. Use such exploits only when you are fully aware of what they are doing and all potential consequences. Further, any experimentation should be done only on machines that are under your own control. Buffer overflows can cause systems to crash, leading to a denial-of-service condition. Therefore, buffer overflows generally should not be attempted against production systems without the written permission of the client.
Source: Hack IT: Security Through Penetration Testing