SephStorm wrote:For all of you who have taken the new V7 CEH, I've seen a few reviews, but I havent really seen anything specifically on the claims to fame for V7, Did you use "Frankenstein" Their tool repository?
Looked at it, but didn't use it, in class, due to time and lack of necessity to do so. Seems like a good tool / repository, though. The quick glance was more to explain that it's a good way to get 'validated' exploits and tools, that haven't been weaponized and posted by malicious hackers / people from the BlackHat realm. As such, it's pretty big, and had a lot of goodies in there.
Was "iLabs" Beneficial to you? I can see this as a major selling point for ECC if they have done it right.
To be honest, again, didn't really look at this, DURING class. Time didn't allow. I can't, in any honest fashion, give you an opinion on this. Was actually thinking about that, just last week, and wondering if I could find it, to see what they had and how they had it setup.
I saw in at least 1 review, a claim that more tools were added, were any significant numbers removed? The v7 page claims that it showcases thousands of tools. Thats really not a good idea for self study, when a beginner has to choose which ones are important....
They had tons of tools added to Frankenstein, but the course, itself, didn't focus on TOO many. My earlier comments, to them having added more, were in relation to when I took my original CEH (nearly 7 years ago. So they've definitely added a LOT, IMHO.) While I STILL think it could've been pared down a bit, for the labs, etc, from what I'm hearing, from those who took v6 and have seen v7, is that they did tone it down from previous, so perhaps it's getting better, to that regard.
I see they also supposedly highlighted countermeasures in this version. I haven't seen the problem with this in v6, (except perhaps in some of my study material...)
They did discuss some countermeasures. Not in GREAT depth, but with regards to how a specific countermeasure might subvert malicious activity from harming a customer / contract, in different modules, and respective to explaining how xyz might prevent someone's tool from exploiting a weakness.
They mention their "Pentesting" section, highlighting methodology and so forth, how well was this delivered?
Better, but not best. While they did give brief explanations at the beginning of each chapter and lab, as to how a given topic fit into pentesting, etc, and the final module, specific to pentesting, covered a lot of the logistics of pentesting, I still think it could've been better, with regards to relation to pentesting, as a whole. Gotta remember, though, the class is "Ethical Hacking and Countermeasures", and covers so much, for folks just beginning, that there honestly wasn't time, in a bootcamp, to get much more detailed. Were it CBT training, self-study, or a full class, where you had more time, I think such info would be of benefit, and in this material, wasn't, yet, developed to the extent to which I'd have expected it to be.
Thanks in advance! Can't wait to hear some replies.