Learn What Hackers Know and How Hackers Attack !!! Part 1

Discussion in 'Apple' started by DR Candra, Apr 25, 2007.

  1. DR Candra

    DR Candra Guest

    Module 1 - Introduction to ethical hacking
    - What does a malicious hacker do?
    - Hacker classes
    - Vulnerability research
    - Ethical hacking testing
    - Security websites
    - Review - Module 1

    Module 2 - Footprinting
    - Reconnaissance phase and footprinting
    - Scenario (cont.)
    - Tools - Sam Spade
    - Tools - NeoTrace
    - Tools - The waybackmachine
    - Tools - Smart whois
    - Tools - Read notify
    - Exercise - NeoTrace
    - Review - Module 2

    Module 3 - Scanning
    - Checking for live systems
    - Banner Grabbing
    - Scenario (cont.)
    - Tools - Angry IP
    - Tools - NMap
    - Tools - NetScanToolsPro
    - Banner Grabbing
    - NetCraft - OS Detection Tool
    - SocksChain
    - Review - Module 3

    Module 4 - Enumeration
    - What is Enumeration
    - SNMP Enumeration
    - Example - Connect Using Null Session
    - Tools - DumpSEC
    - SID
    - GetAcct Tool
    - SolarWinds
    - Tools - UserInfo
    - Tools - UserIP
    - Review - Module 4

    Module 5 - System Hacking
    - Cracking Passwords
    - Escalating Privileges
    - Executing Applications
    - Hiding Files
    - Covering Tracks
    - Tool - Legion
    - Tool - Keylogger - Proof of concept
    - Tool - LophtCrack Password Cracking Tool
    - Tool - pwdump Password Cracking Tool
    - Tool - GetAdmin Tool
    - Tool - Create Local Admin User X
    - Tool - Stealth Files
    - Tool - Spam Mimic - Hide Messages Using Normal Text
    - Tool - Snow - Steganography
    - Exercise - Legion
    - Review - Module 5

    Module 6 - Trojans and Backdoors
    - Indications of a Trojan Attack
    - ICMP Tunneling
    - Trojan Horse Construction Kit
    - Anti-Trojan Software
    - Example - Tini Trojan
    - Example - NetBus Trojan
    - Example - Beast Trojan
    - Example - YAB - Wrapper
    - Tool - fPort
    - Tool - TCPView
    - Exercise - YAB - Wrapper
    - Review - Module 6

    Module 7 - Sniffers
    - Types of Sniffing
    - Sniffer Hacking Tools
    - Raw Sniffing Tools
    - Countermeasures
    - Tool - Ethereal
    - Tool - SMAC
    - Tool - DSniff
    - Tool - WebSpy
    - Tool - Etherpeek
    - Review - Module 7

    Module 8 - Denial of Service
    - What are Denial of Service Attacks
    - DOS Attack Tools
    - DDOS Attacks
    - Reflected DOS Attacks
    - Example - Ping of Death
    - Example - Freak88
    - Exercise - Freak88
    - Review - Module 8

    Module 9 - Social Engineering
    - Review - Module 9

    Module 10 - Session Hijacking
    - Programs That Perform Session Hijacking
    - Demo - Hijacking a Telnet Session
    - Review - Module 10

    Module 11 - Hacking Web Servers
    - Server Vulnerabilities
    - Vulnerability Scanners
    - Example - RPC Hack
    - Example - Metasploit Framework
    - Example - Internet Printing Exploit
    - Example - LSA Exploit
    - Example - Unicode
    - Example - Shadow Security Scanner
    - Exercise - Shadow Security Scanner
    - Review - Module 11

    Module 12 - Web Application Vulnerabilities
    - Web Application Setup & Hacking
    - Web Application Threats
    - Web Application Hacking Tools
    - Tool Example - Blackwidow
    - Tool Example - Google
    - Tool Example - IE Cache Extractor
    - Tool Example - Generate Unicode Strings
    - IE Vulnerabilities
    - Review - Module 12

    Module 13 - Web Based Password Cracking Techniques
    - Authentication
    - What is a Password Craker
    - Countermeasures
    - Tool Example - Obiwan
    - Using Wordlists
    - Tool Example - SnadBoy
    - Using IE to View Passwords
    - Review - Module 13

    Module 14 - SQL Injection
    - SQL Injection Techniques
    - SQL Injection Automated Tools
    - Countermeasures
    - Example - SQL Injection
    - Example - SQL Injection Techniques
    - Example - SQL Scanner
    - Review - Module 14

    Module 15 - Hacking Wireless Networks
    - Introduction to wireless Networking
    - Wired Equivalent Privacy
    - Scanning Tools
    - Sniffing Tools
    - Securing Wireless Networks
    - Tool Example - AiroPeek
    - Review - Module 15

    Module 16 - Virus
    - Virus History
    - Virus Classification
    - Virus Construction and Detection
    - Example - Virus Tools
    - Example - Create a Virus
    - Example - Virus Construction Kit
    - Exercise - Virus Construction Kit
    - Review - Module 16

    Module 17 - Physical Security
    - Security Statistics & Incidents
    - Physical Security Checklist
    - Locks
    - Review - Module 17

    Module 18 - Linux Hacking
    - Why Linux?
    - Scanning in Linux
    - Hacking Tools
    - Rootkits
    - Linux Intrusion Detection System (LIDS)
    - Linux Tools
    - Example - Whois
    - Example - Root Access
    - Example - Compile in Linux
    - Tool - Ethereal
    - Tool - IP Sorcery
    - Tool - NMap
    - Tool - Snort
    - Review - Module 18

    Module 19 - Evading IDS, Firewalls and Detecting Honey Pots
    - Intrusion Detection Tools
    - IDS Evasion
    - Firewalls
    - HoneyPot
    - Example - ICMP Shell
    - Example - www Reverse Shell
    - Review - Module 19

    Module 20 - Buffer Overflows
    - Reasons for Attacks
    - NOPS
    - Defense Against Buffer Overflows
    - Example - Buffer Overflow
    - Review - Module 20

    Module 21 - Cryptography
    - PKIs
    - RSA Attacks and Algorithms
    - Code Breaking Methodologies
    - Review - Module 21

    Module 22 - Penetration Testing
    - Vulnerability Assessment
    - Term of Engagement
    - Filtering Devices
    - Impact of Threat
    - Phases of Penetration Testing
    - Review - Module 22


    For more information, you can visit our website at : http://www.ilmuhacker.com

    Best regards,

    ilmuhacker.com
     
    DR Candra, Apr 25, 2007
    #1
    1. Advertisements

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments (here). After that, you can post your question and our members will help you out.