14.11.2012 Views

CEHv6 Resource Guide.indd - Algebra

CEHv6 Resource Guide.indd - Algebra

CEHv6 Resource Guide.indd - Algebra

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Page 90<br />

� What is Covert Channel?<br />

� Security Breach<br />

� Why Do You Want to Use Covert Channel?<br />

� Motivation of a Firewall Bypass<br />

� Covert Channels Scope<br />

� Covert Channel: Attack Techniques<br />

� Simple Covert Attacks<br />

� Advanced Covert Attacks<br />

� Standard Direct Connection<br />

� Reverse Shell (Reverse Telnet)<br />

� Direct Attack Example<br />

� In-Direct Attack Example<br />

� Reverse Connecting Agents<br />

� Covert Channel Attack Tools<br />

o Netcat<br />

o DNS Tunneling<br />

o Covert Channel Using DNS Tunneling<br />

o DNS Tunnel Client<br />

o DNS Tunneling Countermeasures<br />

o Covert Channel Using SSH<br />

o Covert Channel using SSH (Advanced)<br />

o HTTP/S Tunneling Attack<br />

� Covert Channel Hacking Tool: Active Port Forwarder<br />

� Covert Channel Hacking Tool: CCTT<br />

� Covert Channel Hacking Tool: Firepass<br />

� Covert Channel Hacking Tool: MsnShell<br />

� Covert Channel Hacking Tool: Web Shell<br />

� Covert Channel Hacking Tool: NCovert<br />

o Ncovert - How it works<br />

http://www.eccouncil.org<br />

EC-Council

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!