Acking Training Course HAcking Training Course
Package Includes:
Featuring live instructor-led classroom sessions with full audio, video and demonstration components
Printable courseware
300+ Penetration Testing Review Questions
eWorkbook - 725 pages Student eWorkbook by Logical Security
Module 1
* Ethical Hacking and Penetration Testing
* Security 101
* Hacking Hall of Fame
* What are Today's hackers Like?
* Today's Hackers
* Risk Management
* Evolution of Threats
* Typical Vulnerability Life Cycle
* What is Ethical Hacking?
* Rise of the Ethical Hacker
* Types of Security Test
* Penetration Test (Pen-test)
* Red Teams
* Testing Methodology
* VMWare Workstation
* Windows and Linux Running VMWare
* Linux Is a Must
* Linux Survival Skills
* Useful vi Editor Commands
* Module 1 Review
Module 2
* Footprinting and Reconnaissance
* Desired Information
* Find Information by the Target (Edgar)
* terraserver.microsoft.com
* Network Reconnaissance & DNS Search
* Query Whois Databases
* Command-Line Whois Searches
* ARIN whois: Search IP Address Blocks
* SamSpade Tool and Website
* Internet Presence
* Look Through Source Code
* Mirror Website
* Find Specific Types of Systems
* Big Brother
* AltaVista
* Specific Data Being Available?
* Anonymizers
* Countermeasures to Information Leakage
* Social Engineering
* DNS Zone Transfer
* Nslookup command-line utility
* Zone Transfer from Linux
* Automated Zone Transfers
* Zone Transfer Countermeasures
* www.CheckDNS.net
* Tracing Out a Network Path
* tracert Output
* Free Tools
* Paratrace
* War Dialing for Hanging Modems
* Manual and Automated War Dialing
* Case Study
* Guide Dogs for the Blind: Pairing blind people with Guide Dogs since 1942
* Footprinting Countermeasures
* Demo - Footprinting & Info Gathering
* Module 2 Review
Module 3
* TCP/IP Basics and Scanning
* The OSI Model
* TCP/IP Protocol Suite Layers
* Encapsulation
* Data-Link Protocols
* IP - Internet Protocol, Datagram (Packet)
* ICMP Packets
* UDP – User Datagram Protocol
* UDP Datagram
* TCP – Transmission Control Protocol
* TCP Segment
* TCP/IP 3-Way Handshake and Flags
* TCP and UDP Ports
* Ping Sweeps
* Good Old Ping, Nmap, TCP Ping Sweep
* TCP Sweep Traffic Captured
* Unix Pinging Utilities
* Default TTLs
* Pinging Countermeasures
* Port Scanning
* Nmap
* Advanced Probing Techniques
* Scanrand
* Port Probing Countermeasures
* Watch Your Own Ports
* Demo - Scanning Tools
* Module 3 Review
Module 4
* Enumeration and Verification
* Operating System Identification
* Differences Between OS TCP/IP Stack
* Nmap -O
* Active vs Passive Fingerprinting
* Xprobe/Xprobe2
* Countermeasures
* SNMP Overview
* SNMP Enumeration
* SMTP, Finger, and E-mail Aliases
* Gleaning Information from SMTP
* SMTP E-mail Alias Enumeration
* SMTP Enumeration Countermeasures
* CIFS/SMB
* Attack Methodology
* Find Domains and Computers
* NetBIOS Data
* NBTscan
* NULL Session
* Local and Domain Users
* Find Shares with net view
* enum: the All-in-one
* Winfo and NTInfoScan (ntis.exe)
* Digging in the Registry
* NetBIOS Attack Summary
* NetBIOS Countermeasures
* What’s this SID Thing Anyway?
* Common SIDs and RIDs
* whoami
* RestrictAnonymous
* USER2SID/SID2USER
* psgetsid.exe and UserDump Tool
* LDAP and Active Directory
* GUI Tools to Perform the Same Actions
* Demo - Enumeration
* Module 4 Review
Module 5
* Hacking & Defending Wireless/Modems
* Phone Numbers & Modem Background
* Phone Reconnaissance
* Modem Attacks
* Wireless Reconnaissance
* Wireless Background
* Wireless Reconnaissance Continued
* Wireless Sniffing
* Cracking WEP Keys
* Defending Wireless
* Module 5 Review
Module 6
* Hacking & Defending Web Servers
* Web Servers in General: HTTP
* Uniform Resource Locator: URL
* Apache Web Server Functionality
* Apache: Attacking Mis-configurations
* Apache: Attacking Known Vulnerabilities
* Defending Apache Web Server
* Microsoft Internet Information Server (IIS)
* IIS: Security Features
* IIS: Attacking General Problems
* IIS: IUSER or IWAM Level Access
* IIS: Administrator or Sys Level Access
* IIS: Clearing IIS Logs
* IIS: Defending and Countermeasures
* Web Server Vulnerability Scanners
* Demo - Hacking Web Servers
* Module 6 Review
Module 7
* Hacking & Defending Web Applications
* Background on Web Threat & Design
* Basic Infrastructure Information
* Information Leaks on Web Pages
* Hacking over SSL
* Use the Source, Luke…
* Functional/Logic Testing
* Attacking Authentication
* Attacking Authorization
* Debug Proxies: @stake webproxy
* Input Validation Attacks
* Attacking Session State
* Attacking Web Clients
* Cross-Site Scripting (XSS) Threats
* Defending Web Applications
* Module 7 Review
Module 8
* Sniffers and Session Hijacking
* Sniffers
* Why Are Sniffers so Dangerous?
* Collision & Broadcast Domains
* VLANs and Layer-3 Segmentation
* tcpdump & WinDump
* Berkley Packet Filter (BPF)
* Libpcap & WinPcap
* BUTTSniffing Tool and dSniff
* Ethereal
* Mitigation of Sniffer Attacks
* Antisniff
* ARP Poisoning
* MAC Flooding
* DNS and IP Spoofing
* Session Hijacking
* Sequence Numbers
* Hunt
* Ettercap
* Source Routing
* Hijack Countermeasures
* Demo - Sniffers
* Module 8 Review
Module 9
* Hacking & Defending Windows Systems
* Physical Attacks
* LANMan Hashes and Weaknesses
* WinNT Hash and Weaknesses
* Look for Guest, Temp, Joe Accounts
* Direct Password Attacks
* Before You Crack: Enum Tool
* Finding More Account Information
* Cracking Passwords
* Grabbing the SAM
* Crack the Obtained SAM
* LSA Secrets and Trusts
* Using the Newly Guessed Password
* Bruteforcing Other Services
* Operating System Attacks
* Hiding Tracks: Clearing Logs
* Hardening Windows Systems
* Strong 3-Factor Authentication
* Creating Strong Passwords
* Authentication
* Windows Account Lockouts
* Auditing Passwords
* File Permissions
* Demo - Attacking Windows Systems
* Module 9 Review
Module 10
* Hacking & Defending Unix Systems
* Physical Attacks on Linux
* Password Cracking
* Brute Force Password Attacks
* Stack Operation
* Race Condition Errors
* Format String Errors
* File System Attacks
* Hiding Tracks
* Single User Countermeasure
* Strong Authentication
* Single Sign-On Technologies
* Account Lockouts
* Shadow Password Files
* Buffer Overflow Countermeasures
* LPRng Countermeasures
* Tight File Permissions
* Hiding Tracks Countermeasures
* Removing Unnecessary Applications
* DoS Countermeasures
* Hardening Scripts
* Using SSH & VPNs to Prevent Sniffing
* Demo - Attacking Unix Systems
* Module 10 Review
Module 11
* Rootkits, Backdoors, Trojans & Tunnels
* Types Of Rootkits
* A Look at LRK
* Examples of Trojaned Files
* Windows NT Rootkits
* NT Rootkit
* AFX Windows Rootkit 2003
* Rootkit Prevention Unix
* Rootkit Prevention Windows
* netcat
* netcat: Useful Unix Commands
* netcat: What it Looks Like
* VNC-Virtual Network Computing
* Backdoor Defenses
* Trojans
* Back Orifice 2000
* NetBus
* SubSeven
* Defenses to Trojans
* Tunneling
* Loki
* Other Tunnels
* Q-2.4 by Mixter
* Starting Up Malicious Code
* Defenses Against Tunnels
* Manually Deleting Logs
* Tools to Modify Logs
* Demo - Trojans
* Module 11 Review
Module 12
* Denial of Service and Botnets
* Denial-of-Service Attacks
* CPUHog
* Ping of Death
* Teardrop Attacks
* Jolt2
* Smurf Attacks
* SYN Attacks
* UDP Floods
* Distributed DoS
* DDoS Tool: Trin00
* Other DDoS Variation
* History of Botnets
* Anatomy of a Botnet
* Some Common Bots
* Demo - Denial of Service
* Module 12 Review
Module 13
* Automated Pen Testing Tools
* General: Definitions
* General:What?
* General: Why?
* Core Impact™ Framework
* Core Impact™ Operation
* Canvas™ Framework
* Canvas™ Operation
* Metasploit Framework
* Metasploit Operation
* Demo - Automated Pen Testing
* Module 13 Review
Module 14
* Intrusion Detection Systems
* Types of IDSs
* Network IDSs
* Distributed IDSs (DIDSs)
* Anomaly Detection
* Signature Detection
* Common IDS Software Products
* Introduction to Snort
* Attacking an IDS
* Eluding Techniques
* Testing an IDS
* Hacking Tool - NIDSbench
* Hacking Tool - Fragroute
* Hacking Tool - SideStep
* Hacking Tool - ADMmutate
* Other IDS Evasion Tools
* Demo - IDS and Snort
* Module 14 Review
Module 15
* Firewalls
* Firewall Types
* Application Layer Gateways
* ALGs (Proxies)
* Stateful Inspection Engine
* Hybrid Firewall
* Host-Based Firewall
* Network-Based Firewall
* DMZ (Demilitarized Zone)
* Back-to-Back Firewalls
* Bastion Hosts
* Control Traffic Flow
* Multiple DMZs
* Controlling Traffic Flow
* Why Do I Need a Firewall?
* What Should I Filter?
* Egress Filtering
* Network Address Translation (NAT)
* Firewall Vulnerabilities
* IPTables/NetFilter
* Default Tables and Chains
* iptables Syntax 1
* iptables Syntax 2
* Sample IPTables Script 1
* Sample IPTables Script 2
* Persistent Firewalls
* Firewall Identification
* Firewalk
* Tunneling with Loki
* Tunneling with NetCat/CryptCat
* Port Redirection with Fpipe
* Denial-of-Service Attacks Risk?
* Demo - Firewalls and IP Tables
* Module 15 Review
Module 16
* Honeypots and Honeynets
* What Is a Honeypot?
* Advantages and Disadvantages
* Types and Categories of Honeypots
* Honeypot: Tarpits
* Honeypot: Kfsensor
* Honeypot: Honeyd
* Sample Honeyd Configuration
* High-Interaction Honeypot
* Project HoneyNet
* Types of Honeynets
* The Main Difference is Data Control
* GEN II Data Control: Honeywall CD
* Gen II Data Capture: Sebek & Sebek II
* Automated Alerting
* Testing
* Legal Issues
* Demo - Setting up a Honeypot
* Module 16 Review
Module 17
* Ethics and Legal Issues
* The Costs
* Relation to Ethical Hacking?
* The Dual Nature of Tools
* Good Instead of Evil?
* Recognizing Trouble When It Happens
* Emulating the Attack
* Security Does Not Like Complexity
* Proper and Ethical Disclosure
* CERT’s Current Process
* Full Disclosure Policy
* Organization for Internet Safety (OIS)
* What Should We Do from Here?
* Legal Meets Information Systems
* Addressing Individual Laws
* 18 USC SECTION 1029
* 18 USC SECTION 1030
* 1030: Worms and Viruses
* Blaster Worm Attacks
* Civil vs. Criminal
* 18 USC SECTIONS 2510 and 2701
* Digital Millennium Copyright Act
* Cyber Security Enhancement Act
* Module 17 Review
* Course Closure
* Enjoy M8's
http://www.ziddu.com/download/3269041/NewTextDocument2.txt.html
Thursday, January 22, 2009
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment