Blog

Information Security

ECSA v10 Review

ECSA ( EC-Council Security Analyst) v10 Review:

 

Hi there,

Today I will write about ECSA it’s an advanced penetration testing course (EC-Council Security Analyst),

You can find official website of this course here:

www.eccouncil.org/programs/certified-security-analyst-ecsa/

 

This write-up describes my experience and not necessarily be the all parts. Let’s move to the pre-request of this course:

You need CEH (course and practical course) in the new version 10,
I had CEHv9 on Dec/2017,

The Course:
This course extends your knowledge from just knowing the information and tools to use the information that you learnt in CEH and reuse the tool with some advanced technique.

When you look to the syllabus of ECSA you will see the interesting topics such as cloud hacking, IOT hacking and Database Hacking, Internal and external penetration testing but the truth is different.

The Benefits:

To be honest the gold key in this course is to teach you how to get engaged with security industry and how to apply for Pen Test project and complete all business papers pre and post proposal.

As EC-Council always does, their courses contain a lot of theoretical knowledge comparing to the practical phase and that’s what makes them not good enough to take their courses.

ECSA v10 has 16 modules + 10 of self-study, all of them is just slide show.
If you are looking for just deep information you can enroll it.

The practical section contains a website named iLab,
iLab is a virtual environment has windows (server / 8 / 10) and kaliubuntu – backtrack divided as company departments to apply all the labs.

My Experience:
Ok, for now we learnt all the outline of the course, but we didn’t get my experience and recommendations of ECSA as well,

I am planning to take OSCP but I didn’t feel my PenTest skills as advanced enough after CEH to go for OSCP and that’s why I took ECSA to improve my current Penetration Test experience.

The course, as I mentioned, contains a lot of theoretical information regard to practical,So, if you are looking for Penetration testing practical course you shouldn’t be here.

The course repeats many labs from CEH which is bad for me. I expected more advanced techniques rather than just use old and expired tools and repeat exactly CEH labs and hacking with Metasploit.

To mention some detailed example the Nmap has one more bash script to scan which is new for me and one exploit editing.

The module contains some repeated labs if we investigate cloud you will apply XSS attack than was in web module.
If you look for Database lab you will re-use sql injection but here just to retrieve database table.

I faced a lot of issues in sql labs that does not working. In addition, when I contact lab-support they delayed replying and finally the answer is to forward the issue to the related department and that’s it.

The screenshots and results showing while I’m applying are very different,
In Wi-Fi hacking as we all now, the known scenario to break Access Point or even to penetrate router from outside to get into local network,

But the truth is, making virus for old android devices and then break 4-way hand-shaking but the truth is too far from just WIFI hacking!

In version 10 they removed Report writing and hacking challenges and separated to other course they call it ECSA Practical for commercial reason.

After all I finished the lab and for my first time I am not satisfying with this course, so I don’t recommend any one who need advanced penetration testing course to enroll it.

I only recommend it for the manager or who need just knowledge to work with pen tester not to work penetrate.

When I evaluate the training course they forward all the notes to training center instead to read it and investigate the reason and try to fix it.

 

Uncategorized

Certified Ethical Hacker Review (CEHv9)

 

This is my first review of an international course and exam,

I will write about preparation to this course,

صورة ذات صلة

Beginning:

First of all you need to be in the IT environment such as student or employee other that you have to take external courses such Data Base and web programming language,  Operating Systems, finally and the must is computer networks.

  • The above courses are mentioned for non IT people or if you are you have been familiar with SQL, Computer Network,
  • You can take it from (CCNA, Network+), basic web programming language so that you can edit HTML code or PHP in advanced.
  • Basic Linux Command that will help you in Kali-Linux Labs, don’t worry 80% of the course applied on windows server 😉

 

The Course:

CEH have 18 module talks about technology and how you can secure it from several attacks,

That include:

  1. Information Gathering.
  2. Network Scanning.
  3. Enumeration.
  4. System Hacking.
  5. Web Hacking.
  6. SQL Injection.
  7. Wireless Hacking.
  8. Cloud Computing.
  9. IOT Hacking (New).
  10. Vulnerability (Assessment).
  11. WIFI Hacking.
  12. Sniffing.
  13. Malware Threats.
  14. Mobile Hacking
  15. Evading Firewall, IDS, IPS.
  16. Cover Tracking.

Basically this just a brief of the course outline.

My journey talk around 2 month of course attendants and for preparation for the exam around 3 month to read and apply all   materials covered.

I had CEHv9 and i faced a lot of expired tool and labs, don’t worry just google the command or topic lab and you will find the alternative command,

You will face old attacks such as SSL Strip to sniff the Facebook password because they changed the protocol used to transfare credentials over local network.

The course is really awesome it gives you the full knowledge of hacking in the real word example, But all you need to keep the follow-up with your instructor because you will take a lot of information.

In additions of a lot of information, The applied labs will covet the important topic like system hacking and introduce of technology like cloud computing.

Your book is your friend, The CEH book will cover every basic information also you can ask EC-Council support to help you with any issue.

 

The Exam:

CEH exam has 125 Question all of them is multiple choice, focusing on all material, and important topic such as

  • Nmap parameter around 5 questions.
  • Hacking Ethics.
  • XSS, CRF, SQL.
  • Linux Command.
  • WIFI table and ranges.
  • Scenario Based Question.

The secret key of final exam that you can look for Dump and take an idea for the exam and it my cover around 60% of the exam depends of the dump release date.

You need to apply all labs to make sure you have covered all knowledge in the course.

There is no practical question in the exam.

The exam is web app online not like other offline emulator environment.

Finally:

This course is for beginner and the opening door for penetration testing and  information security career,

you can complete in this next track via ECSA (Security Analyst) , and LPT (Master Penetration Testing).

Happy Hacking!

 

Abdulghani Alkhateeb

CEHv9, CCNA, Network System Student @ A.S.U

Find me on Twitter

Or Contacts

Uncategorized

Jordan InfoSec CTF-01 walkthrough

Jordan InfoSec CTF-01 Walkthrough

JIS-CTF

Hello All,

Today I will write my first walkthrough of easy VM.

Jordan InfoSec.

First to download the vm from VM here:

https://www.vulnhub.com/entry/jis-ctf-vulnupload,228/

This challenge have 5 flags you need to use some inux and

basic hacking techniques to find the flags,

you may need for this command during this challenge

{ls -a :to look for hidden files}

{ls -l :to look for permissions}

{find -name :to look for find files}

{cat  :to open text files}

I wrote it in pdf to minimize the size of uploading 😉

Good Luck!

Jordan InfoSec CTF-01 Walkthrough

Contact

Uncategorized

طريقة استرجاع ايميل جوجل

كتير من الناس بتطلب مني رجع حسابها المخترق أو بتكون ناسية الباس لإيميلها،

وبأغلب الأحيان غير ممكن،

جوجل لا تقبل هويات أو وثائق رسمية لاسترجاع الحساب،

الحل؟

1) تذكر آخر كلمة مرور استخدمتها بالإيميل.

2) تذكر تاريخ إنشاء الإيميل.

3) تذكر أحد الأشخاص يلي أرسلت لهم إيميل مؤخراً

4) الاسترجاع عن طريق الإيميل البديل أو رقم الهاتف وإذا لسا ما عملتهم بتلاقي الرابط بأول كومنت.

بعدين بتم التحقق من المعلومات الواردة عبر موظف بالشركة للمطابقة..

بنصحكم تحتفظوا بهي البيانات وتلزقوها على

1- ظهر جواز سفرك

2- ودفتر العيلة

3- وتحت مخدتك

لأنها أفضل حل سحري برجع إيميلك المفقود (الله يرجعلك ياه بالسلامة).

برعاية #هكرلي_إيميلي

#أمن_المعلومات