CEHv7 provides a comprehensive ethical hacking and network security-training program to meet the standards of highly skilled security professionals. Hundreds of SMEs and authors have contributed towards the content presented in the CEHv7 courseware. Latest tools and exploits uncovered from the underground community are featured in the new package.
These DVD-ROMs is for Research and Educational Purposes only. The primary intent of these DVD-ROMs is to provide the user with hard to find content for Research or Self Education relevant to network security and various protection methods and their intrinsic flaws by demonstrating exploit methods and techniques used to circumvent them. We hope that you are better aware of the danger that lurk out in society today and learn how to protect yourself with the knowledge you are about to learn. In continuing you must accept that you are going to use this information only for Educational and Research purposes.
While possession of information or programs included violates no laws, actually using or implementing some of the programs or content on this release may violate Federal Law. For this reason the user is instructed not to use any of the programs or content in here which may violate any Laws or infringe on the Copyright protection of others. We provide them for educational purposes only.
Tools included are for:
Footprinting and Reconnaissance
Trojans and Backdoors
Viruses and Worms
Hacking Web Applications
Hacking Wireless Networks
Evading IDS, Firewalls and Honeypots
For each tool you'll find a howto video to get you started on.
The tools are divided by module in ISO files (so your AV don't go nuts).
EC-Council Frankentein is not available anymore.
The course slides are included, but still encrypted with a verisign signature.
A CEH version of Linux built from the SuSe distribution being used for testing purposes is enclosed.
I didn't add BackTrack 4 R2 used in the labs, because you can download BackTrack 5 at http://www.backtrack-linux.org/downloads/
Included a virus scan report of all the threats. It seems as the files are what they said they are by checking the infection names associated with them.
USE THE CONTENT AT YOUR OWN RISK.