Book now with code EOY2025
Jinverar wrote: » I have also purchased an ASUS N66U router to install python on like he describes in module one. I am so excited to get this working. It will be very interesting to program some scripts to run on the router vice the computer.
the_hutch wrote: » Just finished module 3 of 10. Still loving the course. There has not been a single time that I have had difficulting understanding him (and I personally hate dealing with outsourced helpdesks). If anything, it amuses me. I think the part I get the biggest kick out of is that he uses the phrase "curly bracket" (in his indian accent) instead of saying parenthesis. First two modules, you don't do much security stuff. Mostly just python fundamentals. But in module three, things have really taken off. Best thing about module three is integrating scapy into python script. This allows you to build and inject packets into a network based on conditional circumstances. I can now write all kinds of scanning tools, man in the middle arp poisoning tools, syn flood tools, smurf and fraggle tools, TCP session hijacking tools, and many others. All of this, based on what I learned in module 3. However, to be clear...he DOES NOT teach you how to program most of the tools that I just mentioned. He teaches you how to integrate packet injection into script. You are going to need a basic understanding of how most packet based attacks work (I learned everything I needed to know here in CEH...and much of it is covered in Sec+ too). Then you have to know how to apply it.For example, you need to know that to make a MITM attack, you need to spoof ARP reply packets to your two victims. Or for a syn flood, that you need to select an open TCP port and then continually blast that port with SYN requests from different client addresses, recieve the SYN ACK, but then leave the connection half-open without sending the subsequent ACK reply. But once you learn how to inject packets at will, or based on circumstance...the sky is the limit. And once again...I just finished module 3. Can't wait to see what else is in store.
Jeordy wrote: » How much of a security background do you recommend one have before taking the course? I'm fairly new into the IT security / pentesting waters and was thinking that this might be a good/solid intro and foundation. I'm not sure how comprehensive the modules are with regards to explaining the security aspects, but external research would obviously be supplement. Does this sound feasible to you, or would it better to get my feet wet elsewhere (would you recommend having the Sec+ before doing this?)
Jeordy wrote: » Also, you haven't mentioned the "Online Live Labs' that they list as part of it, have you experienced it yet? It sounds like most of the practice you do is with/against a VM that you set up yourself...? Is there any practice, or place to test the tools you've made, that they provide? (Example: How could you be sure the MITM attack you made actually works?)Thanks for all the current and future info you provide!
Use code EOY2025 to receive $250 off your 2025 certification boot camp!