Wednesday, February 11, 2009

Certified Ethical Hacker (CEH) V6

Certified training will describe about the definition and basic concept of hacking activity for confusing, tricking until computer disorder. On this material is based on 5 basic step for a hacker, beginning from Reconnaissance; Scanning; Gaining Access; Maintaining Access and Clearing Tracks.

This knowledge is good for;

  • IT Security Officers
  • IT Security Auditors
  • IT Security Professionals
  • Site Administrators
  • Other practitioner of networking

Material Contents:

  1. Introduction to Ethical Hacking
  2. Hacking Laws
  3. Footprinting
  4. Google Hacking
  5. Scanning
  6. Enumeration
  7. System Hacking
  8. Trojans and Backdoors
  9. Viruses and Worms
  10. Sniffers
  11. Social Engineering
  12. Phishing
  13. Hacking Email Accounts
  14. Denial-of-Service
  15. Session Hijacking
  16. Hacking Web Servers
  17. Web Application Vulnerabilities
  18. Web-Based Password Cracking Techniques
  19. SQL Injection
  20. Hacking Wireless Networks
  21. Physical Security
  22. Linux Hacking
  23. Evading IDS, Firewalls and Detecting Honey Pots
  24. Buffer Overflows
  25. Cryptography
  26. Penetration Testing
  27. Covert Hacking
  28. Writing Virus Codes
  29. Assembly Language Tutorial
  30. Exploit Writing
  31. Smashing the Stack for Fun and Profit
  32. Windows Based Buffer Overflow Exploit Writing
  33. Reverse Engineering
  34. MAC OS X Hacking
  35. Hacking Routers, cable Modems and Firewalls
  36. Hacking Mobile Phones, PDA and Handheld Devices
  37. Bluetooth Hacking
  38. VoIP Hacking
  39. RFID Hacking
  40. Spamming
  41. Hacking USB Devices
  42. Hacking Database Servers
  43. Cyber Warfare- Hacking, Al-Qaida and Terrorism
  44. Internet Content Filtering Techniques
  45. Privacy on the Internet
  46. Securing Laptop Computers
  47. Spying Technologies
  48. Corporate Espionage- Hacking Using Insiders
  49. Creating Security Policies
  50. Software Piracy and Warez
  51. Hacking and Cheating Online Games
  52. Hacking RSS and Atom
  53. Hacking Web Browsers (Firefox, IE)
  54. Proxy Server Technologies
  55. Data Loss Prevention
  56. Hacking Global Positioning System (GPS)
  57. Computer Forensics and Incident Handling
  58. Credit Card Frauds
  59. How to Steal Passwords
  60. Firewall Technologies
  61. Threats and Countermeasures
  62. Case Studies
  63. Botnets
  64. Economic Espionage
  65. Patch Management
  66. Security Convergence
  67. Identifying the Terrorist

Modifying Setup Using Win32.exe

The Winnt32.exe program is used to customize the process for upgrading existing installations. The Winnt32.exe program is used for installing Windows 2000 from a computer that is currently running Windows 95/98 or Windows NT. As with the Winnt.exe program, you can use command-line switches to customize the setup process. The options available for Winnt32.exe are listed in Table below:




Creates an additional folder within the system root folder (where the Windows 2000 system files are located).


Also creates an additional folder within the system root folder, but Setup deletes the files after installation is completed.


Executes a command before the final phase of Setup.


Installs additional files to the hard disk that are necessary to load a command-line interface for repair and recovery purposes.


Creates a debug log at the level specified. By default, it creates C:\Winnt32.log at level 2(the warning level).


Specifies the location of the Windows 2000 installation files. It must contain the full path using the drive letter (e.g., f:\path) or UNC (\\server\shared_folder\path). To simultaneously copy files from multiple paths, use a separate /s switch for each source path.


Copies Setup start files to a hard disk and marks the partition as active. You can then install the hard disk in another computer. When you start that computer, Setup starts at the next phase. Use of this switch requires the /tempdrive switch.


Places temporary files on the specified drive and installs Windows 2000 on that drive.


Performs an unattended installation. The answer file provides the custom specifications to Setup. If you do not specify an answer file, all user settings are taken from the previous installation.


Indicates an identifier (id) that Setup uses to specify how a Uniqueness Database File (UDF) modifies an answer file (see the /u entry). The UDF overrides values in the answer file, and the identifier determines which values in the UDF file are used. For example, /udf:RAS_user,Our_company.udf overrides settings specified for the identifier RAS_user in the Our_company.udf file. If no UDF_file is specified, Setup prompts the user to insert a disk that contains the $Unique$.udf file.

It is important to know the difference between command-line switches for Winnt.exe and Winnt32.exe. Most of the switches have similar functionality with a different syntax. Ensure that you know the different syntaxes for each.

Tuesday, February 3, 2009

Control Panel

The Control Panel in Windows XP functions similarly to the Control Panel in Windows 2000, except that "under the hood" there are now two locations that information is stored, which is modified by the Control Panel applets. The Control Panel in previous operating systems was a graphical interface for editing Registry information. The Windows XP Control Panel provides applets that edit the Registry and modify information stored in the Active Directory. The applets available in the Control Panel may vary, depending on the services you have installed. Figure below shows a typical Windows XP computer's Control Panel.

As you can see, the Control Panel provides a means for configuring and modifying settings for various components, including:
  • Accessibility Options Customizes features designed to provide better accessibility for the disabled
  • Add/Remove Hardware Guides you in the process of installing, removing, and troubleshooting Plug and Play hardware
  • Add/Remove Programs Installs and removes application programs and Windows components.
  • Administrative Tools A collection of utilities for configuration and management of the computer
  • Date/Time Allows you to set the date, time, and time zone.
  • Display Lets you customize the desktop appearance and modify display settings; used to set wallpaper, fonts, colors, screen resolution, etc.
  • Folder Options Allows you to change the appearance of folders, change file associations, and configure offline folders.
  • Fonts Used to install, delete, and manage fonts.
  • Internet Options Lets you configure options for your Web browser.
  • Keyboard and Mouse These applets allow you to set options for your keyboard and pointing device, including customizing cursors.
  • Network and Dial-up Connections Used to configure new network connections and the properties of the protocols, user preferences, and other settings.
  • Printers Allows you to install, delete, configure, and manage both local and network printers.
  • Regional Options Customizes settings for display of time, language, and other region-specific settings.
  • Scheduled Tasks Used to set up tasks to run automatically at specified dates and times.
  • Sounds and Multimedia Lets you set system sounds for specified events and configure sound devices.
  • System Provides system information and allows you to modify environment settings, network identification information, performance options, and startup and recovery information.
  • Users and Passwords Manages local user accounts

Microsoft always recommends that if possible, you use the Control Panel interface to make changes rather than editing the Registry directly. Unfortunately, that's not always possible, which brings us to the next component.