NISGTC LOGO CCBY

This work by the National Information Security and Geospatial Technologies Consortium (NISGTC), and except where otherwise noted, is licensed under the Creative Commons Attribution 3.0 Unported License.

Development was funded by the Department of Labor (DOL) Trade Adjustment Assistance Community College and Career Training (TAACCCT) Grant No. TC-22525-11-60-A-48; The National Information Security, Geospatial Technologies Consortium (NISGTC) is an entity of Collin College of Texas, Bellevue College of Washington, Bunker Hill Community College of Massachusetts, Del Mar College of Texas, Moraine Valley Community College of Illinois, Rio Salado College of Arizona, and Salt Lake Community College of Utah.

This workforce solution was funded by a grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties or assurances of any kind, express or implied, with respect to such information, including any information on linked sites, and including, but not limited to accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership.

Ethical Hacking labs are supported in NETLAB+ using the Ethical Hacking (EH) Pod.

Enabling the Labs

To enable the Ethical Hacking labs, check the box for "NISGTC Ethical Hacking" in the class settings. This must be done for each class requiring access to the labs.

EH

Using the Labs

Always select the correct lab exercise for the lab being performed. Students or teams should schedule the correct lab exercise from the catalog. NETLAB+ will only show those labs for which the required pod type is available. A lab that works on different pod types may appear more than once if your system is so equipped. Instructors should select the correct lab from the Exercise tab during instructor-led lab reservations. This can be done as many times as needed during the reservation.

Importance of Choosing the Correct Lab Exercise

Several of the labs may differ from the standard pod topologies. This is handled by NETLAB+ Dynamic VLAN Mapping technology. Always select the correct lab exercise for the actual lab. This insures that NETLAB+ will set up VLANs on the control switch such that lab devices and PCs are placed in the correct LAN segment for the exercise being performed. Selecting the correct exercise will also make the completed lab output easier to find in the archive.

Ethical Hacking Supported Labs

Lab Title Certified Ethical Hacking (CEH) Domain
1 Using Active and Passive Techniques to Enumerate Network Hosts
  • Introduction to Ethical Hacking
  • Scanning Networks
  • Enumeration
  • Sniffers
2 Conducting Active and Passive Reconnaissance Against a Target
  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Social Engineering
3 Using the SYSTEM account
  • System Hacking
4 Poison Ivy – Remote Access Trojan
  • System Hacking
  • Trojans and Backdoors
  • Viruses and Worms
5 Using the SHARK Remote Administration Tool
  • System Hacking
  • Trojans and Backdoors
  • Viruses and Worms
6 Utilizing Malware - Dark Comet
  • System Hacking
  • Trojans and Backdoors
  • Viruses and Worms
7 Breaking Windows Passwords
  • System Hacking
8 Using John the Ripper to Crack Linux Passwords
  • System Hacking
9 Using Spear Phishing to Target an Organization
  • System Hacking
  • Social Engineering
  • Session Hijacking
10 Breaking WEP and WPA Encryption
  • Hacking Wireless Networks
11 Using Metasploit to Attack a Remote System
  • Scanning Networks
  • Enumeration
  • Sniffers
  • Evading IDS, Firewalls, and Honeypots
12 Using Armitage to Attack the Network
  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • System Hacking
  • Penetration Testing
13 Exploitation with IPv6
  • System Hacking
14 Creating MSFPAYLOADS
  • System Hacking
  • Trojans and Backdoors
  • Viruses and Worms
  • Penetration Testing
15 Abusing SYSTEMS
  • Denial of Service
16 SQL Injection
  • Hacking Webservers
  • Hacking Web Applications
  • SQL Injection
17 Launching a Buffer Overflow
  • System Hacking
  • Buffer Overflow
18 Intrusion Detection
  • Evading IDS, Firewalls, and Honeypots
19 Using Certificates to Encrypt Email
  • Cryptography