Ethical Hacking and Countermeasures v6 Lab Manual EC-Council Module 42 Hacking Database Servers Page | 762 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved Reproduction Strictly Prohibited Ethical Hacking and Countermeasures v6 Lab Manual EC-Council Lab 42-01 In the CEHv6 Labs CD-ROM, navigate to Module 42 Open the Hacking SQL Server.pdf file and read the content Page | 763 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved Reproduction Strictly Prohibited Ethical Hacking and Countermeasures v6 Lab Manual EC-Council Lab 42-02 In the CEHv6 Labs CD-ROM, navigate to Module 42 Open the HackingProject.pdf file and read the content Page | 764 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved Reproduction Strictly Prohibited Ethical Hacking and Countermeasures v6 Lab Manual EC-Council Lab 42-03 In the CEHv6 Labs CD-ROM, navigate to Module 42 Open the An Introduction to SQL Injection Attacks for Oracle Developers.pdf file and read the content Page | 765 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved Reproduction Strictly Prohibited Ethical Hacking and Countermeasures v6 Lab Manual EC-Council Lab 42-04 In the CEHv6 Labs CD-ROM, navigate to Module 42 Open the sql.pdf file and read the content Page | 766 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved Reproduction Strictly Prohibited Ethical Hacking and Countermeasures v6 Lab Manual EC-Council Lab 42-05 In the CEHv6 Labs CD-ROM, navigate to Module 42 Open the AppRadar_Datasheet.pdf and read the content Page | 767 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved Reproduction Strictly Prohibited Ethical Hacking and Countermeasures v6 Lab Manual EC-Council Module 43 Cyber Warfare- Hacking, Al-Qaida, and Terrorism Page | 768 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved Reproduction Strictly Prohibited Ethical Hacking and Countermeasures v6 Lab Manual EC-Council Lab 43-01 In the CEHv6 Labs CD-ROM, navigate to Module 43 Open the Computer Attack and Cyber Terrorism.pdf and read the content Page | 769 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved Reproduction Strictly Prohibited Ethical Hacking and Countermeasures v6 Lab Manual EC-Council Lab 43-02 In the CEHv6 Labs CD-ROM, navigate to Module 43 Open the Cyber Operations and Cyber Terrorism.pdf and read the content Page | 770 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved Reproduction Strictly Prohibited Ethical Hacking and Countermeasures v6 Lab Manual EC-Council Lab 43-03 In the CEHv6 Labs CD-ROM, navigate to Module 43 Open the Terror's Digital Jihad.pdf and read the content Page | 771 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved Reproduction Strictly Prohibited Ethical Hacking and Countermeasures v6 Lab Manual EC-Council Lab 46-11 In the CEHv6 Labs CD-ROM navigate to Module 46 Open the laptop security.pdf and read the content Page | 946 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved Reproduction Strictly Prohibited Ethical Hacking and Countermeasures v6 Lab Manual EC-Council Lab 46-12 In the CEHv6 Labs CD-ROM navigate to Module 46 Open the laptop_computer_security.pdf and read the content Page | 947 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved Reproduction Strictly Prohibited EC-Council Ethical Hacking and Countermeasures v6 Lab Manual Lab 46-13 In the CEHv6 Labs CD-ROM navigate to Module 46 Open the securing_your_laptop.pdf and read the content Page | 948 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved Reproduction Strictly Prohibited Ethical Hacking and Countermeasures v6 Lab Manual EC-Council Module 47 Spying Technologies Page | 949 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved Reproduction Strictly Prohibited Ethical Hacking and Countermeasures v6 Lab Manual EC-Council Lab 47-01 Objective: Use SpyBoss to monitor everything which is doing on a Computer In the CEHv6 Labs CD-ROM navigate to Module 47 Install and launch “SpyBoss Pro” program Explore various options of the tools and click on Start Capture button to start capturing Give a Capture Name and click on OK Page | 950 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved Reproduction Strictly Prohibited Ethical Hacking and Countermeasures v6 Lab Manual EC-Council Click on Keystrokes button to check the keystroke captured Page | 951 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved Reproduction Strictly Prohibited Ethical Hacking and Countermeasures v6 Lab Manual EC-Council Click on Screenshots button to check the captured screenshots Page | 952 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved Reproduction Strictly Prohibited Ethical Hacking and Countermeasures v6 Lab Manual EC-Council Lab 47-02 In the CEHv6 Labs CD-ROM navigate to Module 47 Open the Who’s Spying on Your Computer.pdf and read the content Page | 953 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved Reproduction Strictly Prohibited Ethical Hacking and Countermeasures v6 Lab Manual EC-Council Lab 47-03 In the CEHv6 Labs CD-ROM navigate to Module 47 Open the The Science of Spying.pdf and read the content Page | 954 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved Reproduction Strictly Prohibited Ethical Hacking and Countermeasures v6 Lab Manual EC-Council Lab 47-04 In the CEHv6 Labs CD-ROM navigate to Module 47 Open the Stop the Corporate Spying.pdf and read the content Page | 955 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved Reproduction Strictly Prohibited Ethical Hacking and Countermeasures v6 Lab Manual EC-Council Module 48 Corporate Espionage- Hacking Using Insiders Page | 956 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved Reproduction Strictly Prohibited Ethical Hacking and Countermeasures v6 Lab Manual EC-Council Lab 48-01 In the CEHv6 Labs CD-ROM navigate to Module 48 Open the Comparing Insider IT Sabotage and Espionage.pdf and read the content Page | 957 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved Reproduction Strictly Prohibited Ethical Hacking and Countermeasures v6 Lab Manual EC-Council Lab 48-02 In the CEHv6 Labs CD-ROM navigate to Module 48 Open the The Insider Threat.pdf and read the content Page | 958 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved Reproduction Strictly Prohibited Ethical Hacking and Countermeasures v6 Lab Manual EC-Council Lab 48-03 In the CEHv6 Labs CD-ROM navigate to Module 48 Open the Insider Threat-Protecting The Enterprise From Sabotage.pdf and read the content Page | 959 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved Reproduction Strictly Prohibited EC-Council Ethical Hacking and Countermeasures v6 Lab Manual Lab 48-04 In the CEHv6 Labs CD-ROM navigate to Module 48 Open the Corporate Espionage.pdf and read the content Page | 960 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved Reproduction Strictly Prohibited [...]... Ethical Hacking and Countermeasures v6 Lab Manual Click on the Settings Page | 784 EC-Council button General settings are displayed by default Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved Reproduction Strictly Prohibited Ethical Hacking and Countermeasures v6 Lab Manual EC-Council Click Advanced link to configure advanced settings Page | 785 Ethical Hacking and... Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved Reproduction Strictly Prohibited Ethical Hacking and Countermeasures v6 Lab Manual EC-Council Go to Ad server Name tab and click on No ads have been blocked ‘Ad Server’ Name Yet link Page | 788 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved Reproduction Strictly Prohibited Ethical Hacking. .. Ethical Hacking and Countermeasures v6 Lab Manual EC-Council To set themes, Click Themes To view statistics, Click Stats Page | 795 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved Reproduction Strictly Prohibited EC-Council Ethical Hacking and Countermeasures v6 Lab Manual To bypass a website, Click Block Bypass Add Enter the site address, Click Add Page | 796 Ethical Hacking. .. the Threat.pdf and read the content Page | 776 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved Reproduction Strictly Prohibited Ethical Hacking and Countermeasures v6 Lab Manual EC-Council Lab 43-09 In the CEHv6 Labs CD-ROM, navigate to Module 43 Open the 1yberterrorism 1.pdf and read the content Page | 777 Ethical Hacking and Countermeasures v6 Copyright © EC-Council... Copyright © EC-Council All Rights Reserved Reproduction Strictly Prohibited Ethical Hacking and Countermeasures v6 Lab Manual EC-Council Module 44 Internet Content Filtering Techniques Page | 778 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved Reproduction Strictly Prohibited Ethical Hacking and Countermeasures v6 Lab Manual EC-Council Lab 44-01 Objective: Use Ad Cleaner... program Page | 779 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved Reproduction Strictly Prohibited Ethical Hacking and Countermeasures v6 Lab Manual EC-Council Go to Settings tab Set the required IE settings and Options by enabling the check boxes Go to Popup Ads tab and check the required options to block popup ads Page | 780 Ethical Hacking and Countermeasures... Ethical Hacking and Countermeasures v6 Lab Manual EC-Council Go to White List tab and click Add button to add websites for which you want the popups to be allowed Go to New form Ads tab to block the new form of ads Check the required options and click OK Page | 781 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved Reproduction Strictly Prohibited Ethical Hacking and... 782 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved Reproduction Strictly Prohibited Ethical Hacking and Countermeasures v6 Lab Manual EC-Council Lab 44-02 Objective: Use AdsGone Popup Killer to avoid hazardous popup and banner advertisements In the CEHv6 Labs CD-ROM, navigate to Module 44 Install and launch AdsGone Popup Killer program Page | 783 Ethical Hacking and...Ethical Hacking and Countermeasures v6 Lab Manual EC-Council Lab 43-04 In the CEHv6 Labs CD-ROM, navigate to Module 43 Open the Computer Attack and Cyberterrorism 1.pdf and read the content Page | 772 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved Reproduction Strictly Prohibited Ethical Hacking and Countermeasures v6 Lab Manual... All Rights Reserved Reproduction Strictly Prohibited Ethical Hacking and Countermeasures v6 Lab Manual EC-Council Click on Admin Settings link to configure administrative settings and explore various options Page | 786 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved Reproduction Strictly Prohibited Ethical Hacking and Countermeasures v6 Lab Manual Click Popup Killer ...Ethical Hacking and Countermeasures v6 Lab Manual EC-Council Lab 42-01 In the CEHv6 Labs CD-ROM, navigate to Module 42 Open the Hacking SQL Server.pdf file and read the content Page | 763 Ethical Hacking. .. Ethical Hacking and Countermeasures v6 Lab Manual EC-Council Lab 42-02 In the CEHv6 Labs CD-ROM, navigate to Module 42 Open the HackingProject.pdf file and read the content Page | 764 Ethical Hacking. .. Cyber Warfare- Hacking, Al-Qaida, and Terrorism Page | 768 Ethical Hacking and Countermeasures v6 Copyright © EC-Council All Rights Reserved Reproduction Strictly Prohibited Ethical Hacking and