Eligibility

  • Students pursuing engineering program in IT/EC
  • Working Professional
  • Person who have interest in cyber security and have basic Knowledge of it

What is this course about?

This course is specially outlined keeping in mind security officers and professionals, security analysts and those concerned with the probity of information system. The training is delivered by a board of fine professionals and teachers covering latest InfoSec trends.

Toolkits such as backstrack, kismet, burp suite and metasploit are given an extra ounce of weightage to shape the careers of our students in the direction of their dreams. This course is ideally made to meet the standards of highly professional ethical hackers.

FREE COUNSELLING

 
 

What will Course Contain?

  • Introduction to Ethical Hacking
  • Network Basics
  • Ethical Hacking Start Up Basics
  • Information Gathering
  • Basics of Web Development
  • Fake Mail
  • Further practical
  • DNS Spoofing
  • Man In The Middle Attack
  • Cross site scripting attack
  • WIFI Hacking

ethical-hacking

Introduction to Ethical Hacking

  • Network Basics
  • Introduction
  • IP Address
  • NAT
  • IP Subnets
  • DHCP Server
  • Ports
  • DNS
  • Proxy Servers
  • Virtual Private Networks
  • DNS Server
  • OSI Model

Ethical Hacking Start Up Basics

  • Information Gathering
  • Digital Foot Print
  • Information Gathering
  • Who Is Information
  • Web Server Details

Basics of Web Development

  • Web Architecture
  • Server Configuration
  • HTML Basics
  • PHP Basics

Phishing

  • Fake Mail
  • Further practical
  • DNS Spoofing
  • Man In The Middle Attack
  • Cross site scripting attack
  • WIFI Hacking

Network Attacks

  • Introduction to Network Sniffing
  • Packet Sniffing – Wireshark
  • Packet Analysis
  • Display & Capture Filters
  • Network Attacks - Ettercap
  • DNS Poisoning
  • ARP Poisoning
  • Denial of Service

Cryptography

  • Introduction to Crypto Techniques
  • Types of Encryptions & Hashes
  • Crypto Analysis
  • Insecure Cryptographic Storage

Buffer Overflow Attacks

  • Introduction to X86 Architecture
  • Memory Analysis
  • Shell Code Compilation
  • Vanila Exploit
  • Stack Overflow
  • Egg Hunting

Network Vulnerability

  • Scanning
  • Introduction to Network Vulnerability Scanning
  • Vulnerability Assessment using Nessus
  • Scanning Policies
  • Vulnerability Assessment using Open VAS
  • Report Generation
  • Patch Critical Loopholes
  • System Hardening
  • Secure System Configuration

Introduction to Information Security

  • Desktop & Server Security
  • Windows 8 Introduction and Security Linux Security

Web Security

  • Lan Security
  • Firewall Security
  • Internet security

VAPT

  • Introduction
  • Vulnerability Assessment
  • Penetration Testing

Network Security

  • Virtual Private Network Security
  • Wireless LAN
  • Router Security
  • Intrusion Detection and Prevention
  • Access Control

Protection From Intrusions

  • Malwares
  • Network Intrusions
  • Art of Googling

Data Security

  • Introduction
  • Data Backup
  • Cryptography
  • Stagenography
  • Physical Security

Basics of Web Development

  • Web Architecture
  • Server Configuration
  • HTML Basics
  • PHP Basics

Phishing

  • Fake Mail
  • Further practical
  • DNS Spoofing
  • Man In The Middle Attack
  • Cross site scripting attack
  • WIFI Hacking

Network Attacks

  • Introduction to Network Sniffing
  • Packet Sniffing – Wireshark
  • Packet Analysis
  • Display & Capture Filters
  • Network Attacks - Ettercap
  • DNS Poisoning
  • ARP Poisoning
  • Denial of Service
  • Reverse Engineering
  • Introduction to Reverse Engineering
  • Windows Memory Management System
  • Assembly Language Basics
  • Application Debuggers & Dissemblers
  • Application Cracking, Patching & Keygenning

Cryptography

  • Introduction to Crypto Techniques
  • Types of Encryptions & Hashes
  • Crypto Analysis
  • Insecure Cryptographic Storage

Buffer Overflow Attacks

  • Introduction to X86 Architecture
  • Memory Analysis
  • Shell Code Compilation
  • Vanila Exploit
  • Stack Overflow
  • Egg Hunting

Cyber Forensics

  • Cyber Crime
  • Cyber Forensics
  • Catching Criminals
  • Mobile Forensics

Communication Security

  • Mobile Security
  • VOIP
  • Email Security
  • Mobile Forensics

ISMS

  • Security Auditing
  • Lead Auditor: It (La-27001)

Project Building and implementation

  • Designing
  • Coding
  • Development
  • Testing

Introduction to Ethical Hacking

  • Network Basics
  • Introduction
  • IP Address
  • NAT
  • IP Subnets
  • DHCP Server
  • Ports
  • DNS
  • Proxy Servers
  • Virtual Private Networks
  • DNS Server
  • OSI Model

Information Gathering

  • Digital Foot Print
  • Information Gathering
  • Who Is Information
  • Web Server Details

  • Network Vulnerability
  • Scanning
  • Introduction to Network Vulnerability Scanning
  • Vulnerability Assessment usingNessus
  • Scanning Policies
  • Vulnerability Assessment using Open VAS
  • Report Generation
  • Patch Critical Loopholes
  • System Hardening
  • Secure System Configuration

Metasploit Framework

  • OS Detection
  • Open Port & Service Detection
  • Metasploit Framework Architecture
  • Various Interfaces of Metasploit Framework
  • Basic Terminologies
  • Vulnerability Analysis
  • Exploitation on Various Platforms
  • Evade Anti-Virus & Firewalls
  • Metasploit Scripting
  • Create Custom API to test Window Security
  • Configure Nmap with Metasploit Framework
  • SET
  • Ways to deliver Expolits

Introduction

  • Why is Information Security necessary?
  • Information Security Threats
  • Cybercrime
  • Cyber war
  • Future risks
  • Legislation
  • Benefits of an Information Security
  • Management System
  • Introduction of IT ACT 2008
  • Access Control
  • Authentication
  • Auditing
  • Information Security Governance
  • Effective Information Security
  • Governance
  • Information Systems Strategy
  • Policies and Procedures

Footprinting and Reconnaissance

  • Footprinting
  • Information Gathering Methodology
  • Whois
  • Nslookup
  • Traceroute and TTL
  • Open Source Searching
  • Locating the Network Range
  • Email Tracking Programs
  • E-Mail Spiders

Scanning

  • Scanning: Definition
  • Identifying Active Machines
  • Identifying Open Ports and Available
  • Services
  • Banner Grabbing
  • Vulnerability Scanning
  • Network Mapping
  • Detecting and Protecting Network
  • Scanning

Social Engineering

  • What is Social Engineering?
  • Types of Social Engineering
  • Social Engineering Threats and Defenses
  • Phases in a Social Engineering Attack
  • Behaviors Vulnerable to Attacks
  • Impact on the Organization
  • Social Engineering on Social
  • Networking Websites
  • Countermeasures

Proxy Servers: Masking Identity

  • Proxy Servers
  • Use of Proxies for Attack

Google Hacking DataBase

  • Introduction of GHDB
  • GHP (Google Hony Pots)
  • Using Google as a Proxy Server
  • Directory Listings
  • Going Out on a Limb: Traversal Techniques
  • Extension Walking
  • Locating Public Exploit Sites
  • Locating Vulnerable Targets
  • Directory Listings
  • Web Server Software Error Messages
  • Application Software Error Messages

Proxy Servers: Masking Iden tity

  • Proxy Servers
  • Use of Proxies for Attack
  • SocksChain
  • Multiproxy
  • Anonymizers
  • SSL Proxy
  • HTTP Tunneling Techniques
  • Spoofing IP Address
  • Proxy Tools

DOS/DDOS Attacks

  • Introduction of DOS Attack?
  • Symptoms of a DoS Attack
  • DoS Attack Techniques
  • What is DDOS Attacks?
  • How DDOS Attacks Work?
  • DDOS Attack

Viruses and Worms based Attack

  • History of Virus
  • Characteristics of Virus
  • Working of Virus
  • Worms
  • Virus Damage
  • Types of Virus
  • Famous Viruses and Worms
  • Latest Viruses
  • Virus Detection Methods

Bot and Trojan based Attack

  • Botnet
  • Botnet Propagation Technique
  • Botnet Ecosystem
  • Botnet Trojan: Shark
  • Poison Ivy: Botnet Command Control Center
  • Botnet Trojan: PlugBot
  • Trojan
  • Trojan based Attacks
  • Detaction of Trojan and Bot in system

Network Based Attacks

  • Definition: Network Sniffing
  • Types of Sniffing
  • Lawful Intercept
  • Sniffing Tools
  • Linux Sniffing Tools (dsniff package)
  • ARP Poisoning - Man in the Middle Attack
  • MAC Flooding
  • DNS Poisoning Techniques
  • Hardware Protocol Analyzers
  • How to Detect Sniffing

Email Hacking

  • What is Email Hacking?
  • Sending Fake Mails
  • Detecting a Fake Mail
  • Tracing an Original Email
  • Phishing
  • Types of Phishing Attacks
  • Stealing Cookies
  • Securing an Email Account

Keyloggers

  • Introduction to Keyloggers
  • Using a Keylogger
  • Types of Keylogger
  • Local Keylogger
  • Remote Keylogger
  • Detecting a Keylogger
  • Using Anti-Virus
  • Using command prompt

SQL Injection

  • Introduction of SQL Injection
  • SQL Injection is the Most Prevalent Vulnerability in 2010
  • SQL Injection Threats
  • SQL Injection Attacks
  • How Web Applications Work?
  • Server Side Technologies
  • HTTP Post Request
  • SQL Injection Detection
  • SQL Injection Black Box Pen Testing
  • Types of SQL Injection
  • What is Blind SQL Injection?
  • SQL Injection Methodology

Breaking Windows/Linux Authentication

  • Introduction to Windows Authentication
  • Windows User Account Login Password
  • Enumerating Windows User Accounts
  • Countermeasures for the Enumeration
  • Cracking Password from LM/NTLM Hashes
  • Replacing LM/NTLM Hashes
  • Privilege Escalation
  • Creating Backdoors
  • Clearing Tracks
  • Application Password Cracking in Windows
  • Defending Password in Windows

Breaking Linux Authentication

  • Linux User Account Architecture
  • Cracking Passwords in Linux
  • Replacing User Passwords in Linux
  • Maintaining Access
  • Clearing Tracks
  • Securing Linux
  • Security Tools in Linux

Module: Introduction

Introduction

  • Why is Information Security necessary?
  • Information Security Threats
  • Cybercrime
  • Cyber war
  • Future risks
  • Legislation
  • Benefits of an Information Security
  • Management System
  • Introduction of IT ACT 2008
  • Access Control
  • Authentication
  • Auditing
  • Information Security Governance
  • Effective Information Security
  • Governance
  • Information Systems Strategy
  • Policies and Procedures

Cyber Law

  • Cyber Law in India
  • Amendments in Cyber Law

Operating System

  • Windows 9x Architecture
  • Windows NT Architecture
  • Linux/Unix System
  • Macintosh System

Networking

  • Introduction
  • Servers and Clients
  • What Is Ethernet?
  • Networking Components
  • Networking Protocols
  • How IP Addressing Works?
  • Ports in computer
  • Well-Known TCP and U

File system Streaming

  • NTFS File Streaming
  • FAT/NTFS and MFT
  • Ext. File System DP
  • Ports
  • Naming and Addressing
  • Some Basic TCP/IP Utilities

Servers

  • Windows Based Server
  • Linux Based Server
  • Proxy Servers

Introduction to secured programming

  • Secure programming with Microsoft.net
  • Secure programming with java
  • Secure programming with Andoriad

Introduction to Scripting

  • VB Scripting
  • Java Scripting
  • Shell Scripting
  • Reverse Scripting
  • Batch Scripting

Assembly Language

  • Base 10 System
  • Base 2 System
  • Hexadecimal Number
  • Computer memory
  • CPU
  • Interrupts
  • Assembly Language
  • Machine Language
  • Assembly Vs Hacking

Module: Pre Attack Techniques

Footprinting and Reconnaissance

  • Footprinting
  • Information Gathering Methodology
  • Whois
  • Nslookup
  • Traceroute and TTL
  • Open Source Searching
  • Locating the Network Range
  • Email Tracking Programs
  • E-Mail Spiders

Google Hacking DataBase

  • Introduction of GHDB
  • GHP (Google Hony Pots)
  • Using Google as a Proxy Server
  • Directory Listings
  • Going Out on a Limb: Traversal
  • Techniques
  • Extension Walking
  • Locating Public Exploit Sites
  • Locating Vulnerable Targets
  • Directory Listings
  • Web Server Software Error Messages
  • Application Software Error Messages

Scanning

  • Scanning: Definition
  • Identifying Active Machines
  • Identifying Open Ports and Available Services
  • Banner Grabbing
  • Vulnerability Scanning
  • Network Mapping
  • Detecting and Protecting Network Scanning

Social Engineering

  • What is Social Engineering?
  • Types of Social Engineering
  • Social Engineering Threats and Defense
  • Phases in a Social Engineering Attacks
  • Behaviors Vulnerable to Attacks
  • Impact on the Organization
  • Social Engineering on Social
  • Networking Websites
  • Countermeasures

Proxy Servers: Masking Identity

  • Proxy Servers
  • Use of Proxies for Attack
  • SocksChain
  • Multiproxy
  • Anonymizers
  • SSL Proxy
  • HTTP Tunneling Techniques
  • Spoofing IP Address

Module: Ethical Hacking and Attack Techniques

Denial of Service Attacks

  • Introduction of DOS Attack?
  • Symptoms of a DoS Attack
  • DoS Attack Techniques

Distributed Denial of Service Attacks

  • What is DDOS Attacks?
  • How DDOS Attacks Work?
  • DDOS Attack
  • Detection Techniques
  • DOS/DDOS Countermeasure Strategies
  • DDOS Attack Countermeasures

Viruses and Worms based Attack

  • History of Virus
  • Characteristics of Virus
  • Working of Virus
  • Worms
  • Virus Damage
  • Types of Virus
  • Famous Viruses and Worms
  • Latest Viruses
  • Virus Detection Methods

Bot and Trojan based Attack

  • Botnet
  • Botnet Propagation Technique
  • Botnet Ecosystem
  • Botnet Trojan: Shark
  • Poison Ivy: Botnet Command Control Center
  • Botnet Trojan: PlugBot Trojan
  • Trojan based Attacks
  • Detaction of Trojan and Bot in system

Writing Virus, Worms Codes

  • Introduction of Virus
  • Types of Viruses
  • Symptoms of a Virus Attack
  • Prerequisites for Writing Viruses
  • Required Tools and Utilities
  • Virus Infection Flow Chart
  • Components of Viruses
  • Testing Virus Codes
  • Tips for Better Virus Writing

Network Based Attacks

Attacks on Network
  • Definition: Network Sniffing
  • Types of Sniffing
  • Lawful Intercept
  • Sniffing Tools
  • Linux Sniffing Tools (dsniff package)
  • ARP Poisoning - Man in the Middle
  • Attack
  • MAC Flooding
  • DNS Poisoning Techniques
  • Hardware Protocol Analyzers
Wireless Networking
  • Introduction to Wireless Technology
  • Advantages and Disadvantages of a Wireless Network
  • Types of Wireless Standards
  • Terminology in Wireless Networks
  • Setting up a WLAN
  • Security Options in WLAN
  • Steps for Hacking Wireless Networks
  • Wireless Scanning Techniques
  • WEP Cracking
  • WPA Cracking
  • Rogue Access Point
  • More Attacks on WLAN
  • Wireless Security Tools

Web based Attacks and Security measures

Email Hacking
  • What is Email Hacking?
  • Sending Fake Mails
  • Detecting a Fake Mail
  • Tracing an Original Email Phishing
  • Types of Phishing Attacks
  • Protection from Phishing
  • Stealing Cookies
  • Securing an Email Account

Spamming

  • Introduction
  • Spammer: Statistics
  • Types of Spam Attacks
  • Spamming Tools
  • Anti-Spam Techniques
  • Countermeasures

Web Server Hacking

  • Introduction to Web Server
  • Introduction to Database Server
  • Authentication
  • How are Web Servers Defaced
  • SQL Injection
  • Types of SQL Injection Attacks
  • Remote Code Execution
  • Cross-side Scripting
  • Directory Traversal Attack
  • Alternative way to Attack websites
Keyloggers
  • Introduction to Keyloggers
  • Using a Keylogger
  • Types of Keylogger
  • Local Keylogger
  • Remote Keylogger
  • Detecting a Keylogger
  • Using Anti-Virus
  • Using command prompt
Buffer Overflow Attacks
  • Concept of Buffer
  • Exploiting an Overflow in Buffer
  • Concept of Stacks and Heaps
  • Types of Buffer Overflow Attacks
  • NOPS (No-Operation instructions)
  • Attacking a Real Program
  • Tools Used in Buffer Overflow Attacks
  • Live Demonstrations
  • Exploiting Adobe Reader
  • Protective countermeasures
  • Tools to defend Buffer Overflow
  • Hardware Level Prevention Of Buffer Overflow

SQL Injection

  • Introduction of SQL Injection
  • SQL Injection is the Most Prevalent
  • Vulnerability in 2010
  • SQL Injection Threats
  • SQL Injection Attacks
  • How Web Applications Work?
  • Server Side Technologies
  • HTTP Post Request
  • SQL Injection Detection
  • SQL Injection Black Box Pen Testing
  • Types of SQL Injection
  • What is Blind SQL Injection?
  • SQL Injection Methodology

Enumeration

  • What is Enumeration?
  • Techniques for Enumeration
  • Netbios Enumeration
  • Enumerating User Accounts
  • Enumerate Systems Using Default Passwords
  • SNMP (Simple Network Management Protocol) Enumeration
  • UNIX/Linux Enumeration
  • LDAP Enumeration
  • NTP Enumeration
  • SMTP Enumeration
  • Enumeration Countermeasures

System Based Attacking Techniques

Password Cracking Techniques on Systems
  • What is a Password?
  • Types of Password Attacks
  • Default Password Database
  • Password Cracking using Live OS
  • Password Cracking using Spywares
Breaking Windows Authentication
  • Introduction to Windows Authentication
  • Windows User Account Login Password
  • Enumerating Windows User Accounts
  • Countermeasures for the Enumeration
  • Cracking Password from LM/NTLM Hashes
  • Replacing LM/NTLM Hashes
  • Privilege Escalation
  • Creating Backdoors
  • Clearing Tracks
  • Application Password Cracking in Windows
  • Defending Password in Windows
Breaking Linux Authentication
  • Linux User Account Architecture
  • Cracking Passwords in Linux
  • Replacing User Passwords in Linux
  • Maintaining Access
  • Clearing Tracks
  • Securing Linux
  • Security Tools in Linux
Hacking Web Browsers
  • Introduction
  • Hacking Firefox
  • Firefox Security
  • Hacking Internet Explorer
  • Internet Explorer Security
  • Hacking Opera
  • Security Features of Opera
  • Hacking Safari
  • Securing Safari
  • Hacking Netscape
  • Securing Netscape

Module: Security Concept (Post Attacks)

Firewall

  • What Is a Firewall?
  • Functions of Firewalls
  • Why do you need a Firewall?
  • Types of Firewalls
  • Technologies used in Firewalls
  • Configuring and Security of the Firewall
  • Configuring and Security of the DMZ Server
  • Configuring and Security of Intrusion
  • Detection System
  • Hardware Firewalls (PIX)
  • Software Firewalls (Secure Platform)
  • Windows Firewall
  • Linux Firewall (IPCop)

UTM based Security (Unified Threat Management )

  • Configure UTM & Implementation

Intrusion Detection Systems

  • Introduction to Intrusion Detection Systems
  • Types of IDS
  • Configuring an Intrusion Detection System

Honeypot

  • What is Honeypot?
  • The Honeynet Project
  • Types of Honeypots
  • Advantages and Disadvantages of a Honeypot
  • Tools to Detect Honeypots

Secure Web Application

  • Introduction
  • HTML VS Others
  • Secure Application Life Cycle
  • Advantages and Disadvantages of application
  • Scripting used in application

Module: Security Auditing

Information Security Governance

  • Overview of Information Security Governance
  • Effective Information Security Governance
  • Information Systems Strategy
  • Policies and Procedures

Information Security (IS) Audit Process

  • Introduction to IS Audit
  • ISACA IS Auditing Standards and Guidelines
  • Risk Analysis
  • Internal Controls
  • Performing an IS Audit
  • Emerging Changes in IS Audit Process

Information Security Risk Management

  • Introduction to Risk Management
  • Information Security Risk Management Standards
  • ISO/IEC 13335
  • ISO/IEC 17799 (ISO/IEC 27002:2005)
  • ISO/IEC 27000 SERIES
  • Developing a Risk Management Program

Module: Miscellaneous Techniques used in the Information Security

Physical Security

  • Understanding Physical Security
  • Security Facts
  • Physical Security Checklist -Company surroundings
  • EPS (Electronic Physical Security)
  • Wireless Security
  • Stop’s Unique, Tamper-proof Patented Plate
  • Blocking the Use of USB Storage Devices
  • Track Stick GPS Tracking Device

Reverse Engineering

  • Introduction to the Reverse Engineering
  • Ethical Reverse Engineering
  • What is a Software
  • What is a Disassembler
  • What is a Decompiler
  • What is a Debugger
  • Working of OllyDBG
  • Difference between Disassembler & Debugger
  • Serial Key Phishing
  • Manipulating the Software
  • Software Patching
  • Counter-measures

Cryptography & Steganography

  • Introduction to Symmetric Key
  • Cryptography
  • Symmetric Key Encipherment
  • Symmetric Key Cryptography
  • Characteristics
  • Public Key Cryptosystems
  • Public Key Algorithms
  • Summaries of Public Key Cryptosystem
  • Approaches
  • Digital Signatures
  • Public Key Certificates
  • Digital Certificates
  • Steganography Algoritham
  • Public Key Infrastructure (PKI)
  • Cryptography Tools development Life cycle
  • Steganography tools development Life cycle

Cyber Forensics and Investigation

  • Introduction
  • The Objectives of Computer Forensics
  • Reasons for Cyber Attacks
  • Computer Forensics
  • Digital Forensics
  • Investigating Computer Crime
  • Acquiring Data, Duplicating Data, and Recovering Deleted Files

Module 01: Introduction to Ethical Hacking

Information Security Overview

  • Internet Crime Current Report: IC3
  • Data Breach Investigations Report
  • Essential Terminology
  • Elements of Information Security
  • The Security, Functionality, and Usability Triangle

Information Security Threats and Attack Vectors

  • Top Information Security Attack Vectors
  • Motives, Goals, and Objectives of Information Security Attacks
  • Information Security Threats
  • Information Warfare
  • IPv6 Security Threats

Hacking Concepts

  • Hacking vs. Ethical Hacking
  • Effects of Hacking on Business
  • Who Is a Hacker?
  • Hacker Classes
  • Hacktivism

Hacking Phases

Types of Attacks

  • Types of Attacks on a System
  • Operating System Attacks
  • Misconfiguration Attacks
  • Application-Level Attacks
  • Examples of Application-Level Attacks
  • Shrink Wrap Code Attacks

Information Security Controls

  • Why Ethical Hacking is Necessary
  • Scope and Limitations of Ethical Hacking
  • Skills of an Ethical Hacker
  • Defense in Depth
  • Incident Management Process
  • Information Security Policies
  • Classification of Security Policies
  • Structure and Contents of Security Policies
  • Types of Security Policies
  • Steps to Create and Implement Security Policies
  • Examples of Security Policies
  • Vulnerability Research
  • Vulnerability Research Websites
  • What Is Penetration Testing?
  • Why Penetration Testing
  • Penetration Testing Methodology

Module 02: Footprinting and Reconnaissance

Footprinting Concepts

  • Footprinting Terminology
  • What is Footprinting?
  • Why Footprinting?
  • Objectives of Footprinting

Footprinting Threats

  • Footprinting Threats

Footprinting Methodology

  • Footprinting through Search Engines
    • Finding Company’s External and Internal URLs
    • Public and Restricted Websites
    • Collect Location Information
    • People Search
    • People Search Online Services
    • People Search on Social Networking Services
    • Gather Information from Financial Services
    • Footprinting through Job Sites
    • Monitoring Target Using Alerts
  • Website Footprinting
    • Mirroring Entire Website
    • Website Mirroring Tools
    • Extract Website Information from http://www.archive.org
    • Monitoring Web Updates Using Website Watcher
  • Email Footprinting
    • Tracking Email Communications
    • Collecting Information from Email Header
    • Email Tracking Tools
  • Competitive Intelligence
    • Competitive Intelligence Gathering
    • Competitive Intelligence - When Did this Company Begin? How did it develop?
    • Competitive Intelligence - What Are the Company's Plans?
    • Competitive Intelligence - What Expert Opinions Say About the Company
  • Footprinting using Google
    • Footprint Using Google Hacking Techniques
    • What a Hacker can do with Google Hacking?
    • Google Advance Search Operators
    • Finding Resources Using Google Advance Operator
    • Google Hacking Tool: Google Hacking Database (GHDB)
    • Google Hacking Tools
  • WHOIS Footprinting
    • WHOIS Lookup
    • WHOIS Lookup Result Analysis
    • WHOIS Lookup Tool: SmartWhois
    • WHOIS Lookup Tools
    • WHOIS Lookup Online Tools
  • DNS Footprinting
    • Extracting DNS Information
    • DNS Interrogation Tools
  • Network Footprinting
    • Locate the Network Range
    • Determine the Operating System
    • Traceroute
    • Traceroute Analysis
    • Traceroute Tools
  • Footprinting through Social Engineering
    • Footprinting through Social Engineering
    • Collect Information Using Eavesdropping, Shoulder Surfing, and Dumpster Diving
  • Footprinting through
    • Collect Information through Social Engineering on Social Networking Sites
    • Information Available on Social Networking Sites
    • Collecting Facebook Information
    • Collecting Twitter Information
    • Collecting Linkedin Information
    • Collecting Youtube Information
    • Tracking Users on Social Networking Sites

Footprinting Tools

  • Footprinting Tool: Maltego
  • Footprinting Tool: Domain Name Analyzer Pro
  • Footprinting Tool: Web Data Extractor
  • Additional Footprinting Tools

Footprinting Countermeasures

Footprinting Penetration Testing

  • Footprinting Pen Testing
  • Footprinting Pen Testing Report Templates

Module 03: Scanning Networks

Overview of Network Scanning

CEH Scanning Methodology

  • Check for Live Systems
    • Checking for Live Systems - ICMP Scanning
    • Ping Sweep
    • Ping Sweep Tools
  • Check for Open Ports
    • Three-Way Handshake
    • TCP Communication Flags
    • Create Custom Packet Using TCP Flags
    • Create Custom Packet Using TCP Flags
    • Scanning IPv6 Network
    • Scanning Tool: Nmap
    • Hping2 / Hping3
    • Hping Commands
    • Scanning Techniques
    • TCP Connect / Full Open Scan
    • Stealth Scan (Half-open Scan)
    • Stealth Scan (Half-open Scan)
    • Xmas Scan
    • FIN Scan
    • NULL Scan
    • IDLE Scan
    • IDLE Scan: Step 1
    • IDLE Scan: Step 2 and 3
    • ICMP Echo Scanning/List Scan
    • UDP Scanning
    • Inverse TCP Flag Scanning
    • ACK Flag Scanning
    • Scanning Tool: NetScan Tools Pro
  • Scanning Tools
  • Do Not Scan These IP Addresses (Unless you want to get into trouble)
  • Port Scanning Countermeasures
  • Scanning Beyond IDS
    • IDS Evasion Techniques
    • SYN/FIN Scanning Using IP Fragments
  • Banner Grabbing
    • Banner Grabbing Tools
    • Banner Grabbing Countermeasures: Disabling or Changing Banner
    • Hiding File Extensions from Web Pages
  • Scan for Vulnerability
    • Vulnerability Scanning
    • Vulnerability Scanning Tool: Nessus
    • Vulnerability Scanning Tool: GAFI LanGuard
    • Vulnerability Scanning Tool: SAINT
    • Network Vulnerability Scanners
  • Draw Network Diagrams
    • Drawing Network Diagrams
    • Network Discovery Tool: LANsurveyor
    • Network Discovery Tool: OpManager
    • Network Discovery Tool: NetworkView
    • Network Discovery Tool: The Dude
    • Network Discovery and Mapping Tools
  • Prepare Proxies
    • Proxy Servers
    • Why Attackers Use Proxy Servers?
    • Use of Proxies for Attack
    • Proxy Chaining
    • Proxy Tool: Proxy Workbench
    • Proxy Tool: Proxifier
    • Proxy Tool: Proxy Switcher
    • Proxy Tool: SocksChain
    • Proxy Tool: TOR (The Onion Routing)
    • Proxy Tools
    • Free Proxy Servers
    • HTTP Tunneling Techniques
    • Why do I Need HTTP Tunneling
    • HTTP Tunneling Tool: Super Network Tunnel
    • HTTP Tunneling Tool: HTTP-Tunnel
    • SSH Tunneling
    • SSH Tunneling Tool: Bitvise Anonymizers
    • Case: Bloggers Write Text Backwards to Bypass Web Filters in China
    • Censorship Circumvention Tool: Psiphon
    • Censorship Circumvention Tool: Your-Freedom
    • How to Check if Your Website is Blocked in China or Not?
    • G-Zapper
    • Anonymizers
    • Spoofing IP Address
    • IP Spoofing Detection Techniques: Direct TTL Probes
    • IP Spoofing Detection Techniques: Direct TTL Probes
    • IP Spoofing Detection Techniques: IP Identification Number
    • IP Spoofing Detection Techniques: TCP Flow Control Method
    • IP Spoofing Countermeasures
  • Scanning Pen Testing

Module 04: Enumeration

Enumeration Concepts

  • What is Enumeration?
  • Techniques for Enumeration
  • Services and Ports to Enumerate

NetBIOS Enumeration

  • NetBIOS Enumeration
  • NetBIOS Enumeration Tool: SuperScan
  • NetBIOS Enumeration Tool: Hyena
  • NetBIOS Enumeration Tool: Winfingerprint
  • NetBIOS Enumeration Tool: NetBIOS Enumerator
  • Enumerating User Accounts
  • Enumerate Systems Using Default Passwords

SNMP Enumeration

  • SNMP (Simple Network Management Protocol) Enumeration
  • Working of SNMP
  • Management Information Base (MIB)
  • SNMP Enumeration Tool: OpUtils
  • SNMP Enumeration Tool: SolarWind’s IP Network Browser
  • SNMP Enumeration Tools

UNIX/Linux Enumeration

  • UNIX/Linux Enumeration Commands
  • Linux Enumeration Tool: Enum4linux

LDAP Enumeration

  • LDAP Enumeration
  • LDAP Enumeration Tool: Softerra LDAP Administrator
  • LDAP Enumeration Tools

NTP Enumeration

  • NTP Enumeration
  • NTP Enumeration Commands

SMTP Enumeration

  • SMTP Enumeration
  • SMTP Enumeration Tool: NetScanTools Pro

DNS Enumeration

  • DNS Zone Transfer Enumeration Using NSLookup

Enumeration Countermeasures

SMB Enumeration Countermeasures

Enumeration Pen Testing

Module 05: System Hacking

Information at Hand Before System Hacking Stage

System Hacking: Goals

CEH Hacking Methodology (CHM)

CEH System Hacking Steps

  • Cracking Passwords
    • Password Cracking
    • Password Complexity
    • Password Cracking Techniques
    • Types of Password Attacks
    • Passive Online Attack: Wire Sniffing
    • Passive Online Attack: Eavesdropping
    • Passive Online Attacks: Man-in-the-Middle and Replay Attack
    • Active Online Attack: Password Guessing
    • Active Online Attack: Trojan/Spyware/Keylogger
    • Active Online Attack: Hash Injection Attack
    • Offline Attack: Rainbow Attacks
    • Tools to Create Rainbow Tables: Winrtgen and rtgen
    • Distributed Network Attack
    • Elcomsoft Distributed Password Recovery
    • Non-Electronic Attacks
    • Default Passwords
    • Manual Password Cracking (Guessing)
    • Automatic Password Cracking Algorithm
    • Stealing Passwords Using USB Drive
    • Stealing Passwords Using Keyloggers
    • Microsoft Authentication
    • How Hash Passwords Are Stored in Windows SAM?
    • What Is LAN Manager Hash?
    • LM “Hash” Generation
    • LM, NTLMv1, and NTLMv2
    • NTLM Authentication Process
    • Kerberos Authentication
    • Salting
    • PWdump7 and Fgdump
    • L0phtCrack
    • Ophcrack
    • Cain & Abel
    • RainbowCrack
    • Password Cracking Tools
    • LM Hash Backward Compatibility
    • How to Disable LM HASH
    • How to Defend against Password Cracking
    • Implement and Enforce Strong Security Policy
    • CEH System Hacking Steps
  • Escalating Privileges
    • Privilege Escalation
    • Privilege Escalation Tool: Active @ Password Changer
    • Privilege Escalation Tools
    • How to Defend Against Privilege Escalation
  • Executing Applications
    • Executing Applications
    • Executing Applications: RemoteExec
    • Executing Applications: PDQ Deploy
    • Executing Applications: DameWare NT Utilities
    • Keylogger
    • Types of Keystroke Loggers
    • Methodology of Attacker in Using Remote Keylogger
    • Acoustic/CAM Keylogger
    • Keyloggers
    • Keylogger: Spytech SpyAgent
    • Keylogger: All In One Keylogger
    • Keyloggers for Windows
    • Keylogger for Mac: Amac Keylogger for Mac
    • Keyloggers for MAC
    • Hardware Keyloggers
    • Spyware
    • What Does the Spyware Do?
    • Types of Spywares
    • Desktop Spyware
    • Desktop Spyware: Activity Monitor
    • Desktop Spyware
    • Email and Internet Spyware
    • Email and Internet Spyware: Power Spy
    • Internet and Email Spyware
    • Child Monitoring Spyware
    • Child Monitoring Spyware: Net Nanny Home Suite
    • Child Monitoring Spyware
    • Screen Capturing Spyware
    • Screen Capturing Spyware: SoftActivity TS Monitor
    • Screen Capturing Spyware
    • USB Spyware
    • USB Spyware: USBSpy
    • USB Spyware
    • Audio Spyware
    • Audio Spyware: Spy Voice Recorder and Sound Snooper
    • Video Spyware
    • Video Spyware: WebCam Recorder
    • Video Spyware
    • Print Spyware
    • Print Spyware: Printer Activity Monitor
    • Print Spyware
    • Telephone/Cellphone Spyware
    • Cellphone Spyware: Mobile Spy
    • Telephone/Cellphone Spyware
    • GPS Spyware
    • GPS Spyware: SPYPhone
    • GPS Spyware
    • How to Defend Against Keyloggers
    • Anti-Keylogger
    • Anti-Keylogger: Zemana AntiLogger
    • Anti-Keylogger
    • How to Defend Against Spyware
    • Anti-Spyware: PC Tools Spyware Doctor
    • Anti-Spywares
  • Hiding Files
    • Rootkits
    • Types of Rootkits
    • How Rootkit Works
    • Rootkit: Fu
    • Rootkit: KBeast
    • Rootkit: Hacker Defender HxDef Rootkit
    • Detecting Rootkits
    • Steps for Detecting Rootkits
    • How to Defend against Rootkits
    • Anti-Rootkit: Stinger
    • Anti-Rootkit: UnHackMe
    • Anti-Rootkits
    • NTFS Data Stream
    • How to Create NTFS Streams
    • NTFS Stream Manipulation
    • How to Defend against NTFS Streams
    • NTFS Stream Detector: StreamArmor
    • NTFS Stream Detectors
    • What Is Steganography?
    • Application of Steganography
    • Classification of Steganography
    • Technical Steganography
    • Linguistic Steganography
    • Steganography Techniques
    • How Steganography Works
    • Types of Steganography
    • Whitespace Steganography Tool: SNOW
    • Image Steganography
    • Least Significant Bit Insertion
    • Masking and Filtering
    • Algorithms and Transformation
    • Image Steganography: QuickStego
    • Image Steganography Tools
    • Document Steganography: wbStego
    • Document Steganography Tools
    • Video Steganography
    • Video Steganography: OmniHide PRO
    • Video Steganography Tools
    • Audio Steganography
    • Audio Steganography Methods
    • Audio Steganography: DeepSound
    • Audio Steganography Tools
    • Folder Steganography: Invisible Secrets 4
    • Folder Steganography Tools
    • Spam/Email Steganography: Spam Mimic
    • Natural Text Steganography: Sams Big G Play Maker
    • Issues in Information Hiding
    • Steganalysis
    • Steganalysis Methods/Attacks on Steganography
    • Detecting Text and Image Steganography
    • Detecting Audio and Video Steganography
    • Steganography Detection Tool: Gargoyle Investigator™ Forensic Pro
    • Steganography Detection Tools
  • Covering Tracks
    • Why Cover Tracks?
    • Covering Tracks
    • Ways to Clear Online Tracks
    • Disabling Auditing: Auditpol
    • Covering Tracks Tool: CCleaner
    • Covering Tracks Tool: MRU-Blaster
    • Track Covering Tools
  • Penetration Testing
    • Password Cracking
    • Privilege Escalation
    • Executing Applications
    • Hiding Files
    • Covering Tracks

Module 06: Trojans and Backdoors

Trojan Concepts

  • What is a Trojan?
  • Communication Paths: Overt and Covert Channels
  • Purpose of Trojans
  • What Do Trojan Creators Look For
  • Indications of a Trojan Attack
  • Common Ports used by Trojans

Trojan Infection

  • How to Infect Systems Using a Trojan
  • Wrappers
  • Wrapper Covert Programs
  • Different Ways a Trojan can Get into a System
  • How to Deploy a Trojan
  • Evading Anti-Virus Techniques

Types of Trojans

  • Command Shell Trojans
  • Command Shell Trojan: Netcat
  • GUI Trojan: MoSucker
  • GUI Trojan: Jumper and Biodox
  • Document Trojans
  • E-mail Trojans
  • E-mail Trojans: RemoteByMail
  • Defacement Trojans
  • Defacement Trojans: Restorator
  • Botnet Trojans
  • Botnet Trojan: Illusion Bot and NetBot Attacker
  • Proxy Server Trojans
  • Proxy Server Trojan: W3bPrOxy Tr0j4nCr34t0r (Funny Name)
  • FTP Trojans
  • VNC Trojans
  • VNC Trojans: WinVNC and VNC Stealer
  • HTTP/HTTPS Trojans
  • HTTP Trojan: HTTP RAT
  • Shttpd Trojan - HTTPS (SSL)
  • ICMP Tunneling
  • Remote Access Trojans
  • Remote Access Trojan: RAT DarkComet and Apocalypse
  • Covert Channel Trojan: CCTT
  • E-banking Trojans
  • Banking Trojan Analysis
  • E-banking Trojan: ZeuS and SpyEye
  • Destructive Trojans: M4sT3r Trojan
  • Notification Trojans
  • Credit Card Trojans
  • Data Hiding Trojans (Encrypted Trojans)
  • OS X Trojan: Crisis
  • MAC OS X Trojan: DNSChanger
  • Mac OS X Trojan: Hell Raiser
  • Trojan Analysis: Flame
  • Flame C&C Server Analysis
  • Trojan Analysis: SpyEye
  • Trojan Analysis: ZeroAccess
  • Trojan Analysis: Duqu
  • Trojan Analysis: Duqu Framework
  • Trojan Analysis: Event Driven Framework

Trojan Detection

  • How to Detect Trojans
  • Scanning for Suspicious Ports
  • Port Monitoring Tools: TCPView and CurrPorts
  • Scanning for Suspicious Processes
  • Port Monitoring Tools: TCPView and CurrPorts
  • Scanning for Suspicious Processes
  • Process Monitoring Tool: What's Running
  • Process Monitoring Tools
  • Scanning for Suspicious Registry Entries
  • Registry Entry Monitoring Tool: PC Tools Registry Mechanic
  • Registry Entry Monitoring Tools
  • Scanning for Suspicious Device Drivers
  • Device Drivers Monitoring Tool: DriverView
  • Device Drivers Monitoring Tools
  • Scanning for Suspicious Windows Services
  • Windows Services Monitoring Tool: Windows Service Manager (SrvMan)
  • Windows Services Monitoring Tools
  • Scanning for Suspicious Startup Programs
  • Windows8 Startup Registry Entries
  • Startup Programs Monitoring Tool: Starter
  • Startup Programs Monitoring Tool: Security AutoRun
  • Startup Programs Monitoring Tools
  • Scanning for Suspicious Files and Folders
  • Files and Folder Integrity Checker: FastSum and WinMD5
  • Files and Folder Integrity Checker
  • Scanning for Suspicious Network Activities
  • Detecting Trojans and Worms with Capsa Network Analyzer

Countermeasures

  • Trojan Countermeasures
  • Backdoor Countermeasures
  • Trojan Horse Construction Kit

Anti-Trojan Software

  • Anti-Trojan Software: TrojanHunter
  • Anti-Trojan Software: Emsisoft Anti-Malware
  • Anti-Trojan Softwares

Pen Testing for Trojans and Backdoors

Module 07: Viruses and Worms

Virus and Worms Concepts

  • Introduction to Viruses
  • Virus and Worm Statistics
  • Stages of Virus Life
  • Working of Viruses: Infection Phase
  • Working of Viruses: Attack Phase
  • Why Do People Create Computer Viruses
  • Indications of Virus Attack
  • How does a Computer Get Infected by Viruses
  • Common Techniques Used to Distribute Malware on the Web
  • Virus Hoaxes and Fake Antiviruses
  • Virus Analysis: DNSChanger

Types of Viruses

  • System or Boot Sector Viruses
  • File and Multipartite Viruses
  • Macro Viruses
  • Cluster Viruses
  • Stealth/Tunneling Viruses
  • Encryption Viruses
  • Polymorphic Code
  • Metamorphic Viruses
  • File Overwriting or Cavity Viruses
  • Sparse Infector Viruses
  • Companion/Camouflage Viruses
  • Shell Viruses
  • File Extension Viruses
  • Add-on and Intrusive Viruses
  • Transient and Terminate and Stay Resident Viruses
  • Writing a Simple Virus Program
  • Terabit Virus Maker
  • JPS Virus Maker and DELmE's Batch Virus Maker

Computer Worms

  • How Is a Worm Different from a Virus?
  • Worm Analysis: Stuxnet
  • Worm Maker: Internet Worm Maker Thing

Malware Analysis

  • What is Sheep Dip Computer?
  • Anti-Virus Sensors Systems
  • Malware Analysis Procedure: Preparing Testbed
  • Malware Analysis Procedure
  • Virus Analysis Tool: IDA Pro
  • Online Malware Testing: VirusTotal
  • Online Malware Analysis Services

Counter-measures

  • Virus Detection Methods
  • Virus and Worms Countermeasures
  • Companion Antivirus: Immunet
  • Anti-virus Tools

Penetration Testing for Virus

Module 08: Sniffers

Sniffing Concepts

  • Wiretapping
  • Lawful Interception
  • Packet Sniffing
  • Sniffing Threats
  • How a Sniffer Works
  • Types of Sniffing Attacks
  • Types of Sniffing: Passive Sniffing
  • Types of Sniffing: Active Sniffing
  • Protocols Vulnerable to Sniffing
  • Tie to Data Link Layer in OSI Model
  • IPv6 Addresses
  • IPv4 and IPv6 Header Comparison
  • Hardware Protocol Analyzers
  • SPAN Port

MAC Attacks

  • MAC Flooding
  • MAC Address/CAM Table
  • How CAM Works
  • What Happens When CAM Table Is Full?
  • Mac Flooding Switches with macof
  • MAC Flooding Tool: Yersinia
  • How to Defend against MAC Attacks

DHCP Attacks

  • How DHCP Works
  • DHCP Request/Reply Messages
  • IPv4 DHCP Packet Format
  • DHCP Starvation Attack
  • DHCP Starvation Attack Tools
  • Rogue DHCP Server Attack
  • How to Defend Against DHCP Starvation and Rogue Server Attack

ARP Poisoning

  • What Is Address Resolution Protocol (ARP)?
  • ARP Spoofing Techniques
  • ARP Spoofing Attack
  • How Does ARP Spoofing Work
  • Threats of ARP Poisoning
  • ARP Poisoning Tool: Cain & Abel
  • ARP Poisoning Tool: WinArpAttacker
  • ARP Poisoning Tool: Ufasoft Snif
  • How to Defend Against ARP Poisoning
  • Configuring DHCP Snooping and Dynamic ARP Inspection on Cisco Switches
  • ARP Spoofing Detection: XArp

Spoofing Attack

  • Spoofing Attack Threats
  • MAC Spoofing/Duplicating
  • MAC Spoofing Technique: Windows
  • MAC Spoofing Tool: SMAC
  • IRDP Spoofing
  • How to Defend Against MAC Spoofing

DNS Poisoning

  • DNS Poisoning Techniques
  • Intranet DNS Spoofing
  • Internet DNS Spoofing
  • Proxy Server DNS Poisoning
  • DNS Cache Poisoning
  • How to Defend Against DNS Spoofing

Sniffing Tools

  • Sniffing Tool: Wireshark
  • Follow TCP Stream in Wireshark
  • Display Filters in Wireshark
  • Additional Wireshark Filters
  • Sniffing Tool: Cascade Pilot
  • Sniffing Tool: Tcpdump/Windump
  • Packet Sniffing Tool: Capsa Network Analyzer
  • Network Packet Analyzer: OmniPeek Network Analyzer
  • Network Packet Analyzer: Observer
  • Network Packet Analyzer: Sniff-O-Matic
  • Network Packet Analyzer: JitBit Network Sniffer
  • Chat Message Sniffer: MSN Sniffer 2
  • TCP/IP Packet Crafter: Colasoft Packet Builder
  • Additional Sniffing Tools
  • How an Attacker Hacks the Network Using Sniffers

Counter measures

  • How to Defend Against Sniffing
  • How to Detect Sniffing
  • Sniffer Detection Technique: Ping Method
  • Sniffer Detection Technique: ARP Method
  • Sniffer Detection Technique: DNS Method
  • Promiscuous Detection Tool: PromqryUI

Sniffing Pen Testing

Module 09: Social Engineering

Social Engineering Concepts

  • What is Social Engineering?
  • Behaviors Vulnerable to Attacks
  • Factors that Make Companies Vulnerable to Attacks
  • Why Is Social Engineering Effective?
  • Warning Signs of an Attack
  • Phases in a Social Engineering Attack
  • Impact on the Organization
  • “Rebecca” and “Jessica”
  • Common Targets of Social Engineering
  • Common Targets of Social Engineering: Office Workers

Social Engineering Techniques

  • Types of Social Engineering
  • Human-based Social Engineering
  • Technical Support Example
  • Authority Support Example
  • Human-based Social Engineering: Eavesdropping and Shoulder Surfing
  • Human-based Social Engineering: Dumpster Diving
  • Human-based Social Engineering
  • Watch these Movies
  • Watch this Movie
  • Computer-based Social Engineering
  • Computer-based Social Engineering: Pop-Ups
  • Computer-based Social Engineering: Phishing
  • Computer-based Social Engineering: Spear Phishing
  • Mobile-based Social Engineering: Publishing Malicious Apps
  • Mobile-based Social Engineering: Repackaging Legitimate Apps
  • Mobile-based Social Engineering: Fake Security Applications
  • Mobile-based Social Engineering: Using SMS
  • Insider Attack
  • Disgruntled Employee
  • Preventing Insider Threats
  • Common Social Engineering Targets and Defense Strategies

Imperso-nation on Social Networking Sites

  • Social Engineering Through Impersonation on Social Networking Sites
  • Social Engineering on Facebook
  • Social Engineering Example: LinkedIn Profile
  • Social Engineering on Twitter
  • Risks of Social Networking to Corporate Networks

Identity Theft

  • Identity Theft Statistics 2011
  • Identify Theft
  • How to Steal an Identity
    • STEP 1
    • STEP 2
    • Comparison
    • STEP 3
  • Real Steven Gets Huge Credit Card Statement
  • Identity Theft - Serious Problem

Social Engineering Countermeasures

  • How to Detect Phishing Emails
  • Anti-Phishing Toolbar: Netcraft
  • Anti-Phishing Toolbar: PhishTank
  • Identity Theft Countermeasures

Social Engineering Pen Testing

  • Social Engineering Pen Testing: Using Emails
  • Social Engineering Pen Testing: Using Phone
  • Social Engineering Pen Testing: In Person
  • Social Engineering Pen Testing: Social Engineering Toolkit (SET)

Module 10: Denial of Service

DoS/DDoS Concepts

  • What is a Denial of Service Attack?
  • What Are Distributed Denial of Service Attacks?
  • How Distributed Denial of Service Attacks Work
  • Symptoms of a DoS Attack
  • Cyber Criminals
  • Organized Cyber Crime: Organizational Chart

DoS Attack Techniques

  • Bandwidth Attacks
  • Service Request Floods
  • SYN Attack
  • SYN Flooding
  • ICMP Flood Attack
  • Peer-to-Peer Attacks
  • Permanent Denial-of-Service Attack
  • Application Level Flood Attacks

Botnet

  • Botnet Propagation Technique
  • Botnet Ecosystem
  • Botnet Trojan: Shark
  • Poison Ivy: Botnet Command Control Center
  • Botnet Trojan: PlugBot
  • Botnet Trojans: Illusion Bot and NetBot Attacker

DDoS Case Study

  • DDoS Attack
  • DDoS Attack Tool: LOIC
  • Hackers Advertise Links to Download Botnet

DoS Attack Tools

Counter-measures

  • Detection Techniques
  • Activity Profiling
  • Wavelet Analysis
  • Sequential Change-Point Detection
  • DoS/DDoS Countermeasure Strategies
  • DDoS Attack Countermeasures
  • DoS/DDoS Countermeasures: Protect Secondary Victims
  • DoS/DDoS Countermeasures: Detect and Neutralize Handlers
  • DoS/DDoS Countermeasures: Detect Potential Attacks
  • DoS/DDoS Countermeasures: Deflect Attacks
  • DoS/DDoS Countermeasures: Mitigate Attacks
  • Post-Attack Forensics
  • Techniques to Defend against Botnets
  • DoS/DDoS Countermeasures
  • DoS/DDoS Protection at ISP Level
  • Enabling TCP Intercept on Cisco IOS Software
  • Advanced DDoS Protection Appliances

DoS/DDoS Protection Tools

  • DoS/DDoS Protection Tool: D-Guard Anti-DDoS Firewall
  • DoS/DDoS Protection Tools

Denial-of-Service (DoS) Attack Penetration Testing

Module 11: Session Hijacking

Session Hijacking Concepts

  • What is Session Hijacking?
  • Dangers Posed by Hijacking
  • Why Session Hijacking is Successful?
  • Key Session Hijacking Techniques
  • Brute Forcing Attack
  • Spoofing vs. Hijacking
  • Session Hijacking Process
  • Packet Analysis of a Local Session Hijack
  • Types of Session Hijacking
  • Session Hijacking in OSI Model
  • Application Level Session Hijacking
  • Session Sniffing
  • Predictable Session Token
  • How to Predict a Session Token
  • Man-in-the-Middle Attack
  • Man-in-the-Browser Attack
  • Steps to Perform Man-in-the-Browser Attack
  • Client-side Attacks
  • Cross-site Script Attack
  • Session Fixation
  • Session Fixation Attack

Network-level Session Hijacking

  • The 3-Way Handshake
  • Sequence Numbers
  • Sequence Numbers Prediction
  • TCP/IP Hijacking
  • IP Spoofing: Source Routed Packets
  • RST Hijacking
  • Blind Hijacking
  • Man-in-the-Middle Attack Using Packet Sniffer
  • UDP Hijacking

Session Hijacking Tools

  • Session Hijacking Tool: Zaproxy
  • Session Hijacking Tool: Burp Suite
  • Session Hijacking Tool: JHijack
  • Session Hijacking Tools

Counter-measures

  • Protecting against Session Hijacking
  • Methods to Prevent Session Hijacking: To be Followed by Web Developers
  • Methods to Prevent Session Hijacking: To be Followed by Web Users
  • IPSec
  • Modes of IPsec
  • IPsec Architecture
  • IPsec Authentication and Confidentiality
  • Components of IPsec
  • IPsec Implementation

Webserver Concepts

  • Webserver Market Shares
  • Open Source Webserver Architecture
  • IIS Webserver Architecture
  • Website Defacement
  • Why Web Servers are compromised?
  • Impact of Webserver Attacks

Module 12: Hacking Webservers

Webserver Attacks

  • Webserver Misconfiguration
  • Webserver Misconfiguration Example
  • Directory Traversal Attacks
  • HTTP Response Splitting Attack
  • Web Cache Poisoning Attack
  • HTTP Response Hijacking
  • SSH Bruteforce Attack
  • Man-in-the-Middle Attack
  • Webserver Password Cracking
  • Webserver Password Cracking Techniques
  • Web Application Attacks

Attack Methodology

  • Webserver Attack Methodology
  • Webserver Attack Methodology: Information Gathering
  • Webserver Attack Methodology: Webserver Footprinting
  • Webserver Footprinting Tools
  • Webserver Attack Methodology: Mirroring a Website
  • Webserver Attack Methodology: Vulnerability Scanning
  • Webserver Attack Methodology: Session Hijacking
  • Webserver Attack Methodology: Hacking Web Passwords

Webserver Attack Tools

  • Webserver Attack Tools: Metasploit
  • Metasploit Architecture
  • Metasploit Exploit Module
  • Metasploit Payload Module
  • Metasploit Auxiliary Module
  • Metasploit NOPS Module
  • Webserver Attack Tools: Wfetch
  • Web Password Cracking Tool: Brutus
  • Web Password Cracking Tool: THC-Hydra
  • Web Password Cracking Tool: Internet Password Recovery Toolbox

Counter-measures

  • Countermeasures: Patches and Updates
  • Countermeasures: Protocols
  • Countermeasures: Accounts
  • Countermeasures: Files and Directories
  • How to Defend Against Web Server Attacks
  • How to Defend against HTTP Response Splitting and Web Cache Poisoning

Patch Management

  • Patches and Hotfixes
  • What Is Patch Management?
  • Identifying Appropriate Sources for Updates and Patches
  • Installation of a Patch
  • Implementation and Verification of a Security Patch or Upgrade
  • Patch Management Tool: Microsoft Baseline Security Analyzer (MBSA)
  • Patch Management Tools

Webserver Security Tools

  • Web Application Security Scanner: Syhunt Dynamic
  • Web Application Security Scanner: N-Stalker Web Application Security Scanner
  • Web Server Security Scanner: Wikto
  • Web Server Security Scanner: Acunetix Web Vulnerability Scanner
  • Web Server Malware Infection Monitoring Tool: HackAlert
  • Web Server Malware Infection Monitoring Tool: QualysGuard Malware Detection
  • Webserver Security Tools

Webserver Pen Testing

  • Web Server Pen Testing Tool: CORE Impact® Pro
  • Web Server Pen Testing Tool: Immunity CANVAS
  • Web Server Pen Testing
  • Web Server Penetration Testing

Module 13: Hacking Web Applications

Web App Concepts

  • Web Application Security Statistics
  • Introduction to Web Applications
  • Web Application Components
  • How Web Applications Work?
  • Web Application Architecture
  • Web 2.0 Applications
  • Vulnerability Stack
  • Web Attack Vectors

Web App Threats

  • Web Application Threats - 1
  • Web Application Threats - 2
  • Invalidated Input
  • Parameter/Form Tampering
  • Directory Traversal
  • Security Misconfiguration
  • Injection Flaws
  • SQL Injection Attacks
  • Command Injection Attacks
  • Command Injection Attacks
  • Command Injection Example
  • File Injection Attack
  • What is LDAP Injection?
  • How LDAP Injection Works?
  • Hidden Field Manipulation Attack
  • Cross-Site Scripting (XSS) Attacks
  • How XSS Attacks Work?
  • Cross-Site Scripting Attack Scenario: Attack via Email
  • XSS Example: Attack via Email
  • XSS Example: Stealing Users' Cookies
  • XSS Example: Sending an Unauthorized Request
  • XSS Attack in Blog Posting
  • XSS Attack in Comment Field
  • XSS Cheat Sheet
  • Cross-Site Request Forgery (CSRF) Attack
  • How CSRF Attacks Work?
  • Web Application Denial-of-Service (DoS) Attack
  • Denial of Service (DoS) Examples
  • Buffer Overflow Attacks
  • Cookie/Session Poisoning
  • How Cookie Poisoning Works?
  • Session Fixation Attack
  • Insufficient Transport Layer Protection
  • Improper Error Handling
  • Insecure Cryptographic Storage
  • Broken Authentication and Session Management
  • Invalidated Redirects and Forwards
  • Web Services Architecture
  • Web Services Attack
  • Web Services Footprinting Attack
  • Web Services XML Poisoning

Web App Hacking Methodology

  • Footprint Web Infrastructure
    • Footprint Web Infrastructure: Server Discovery
    • Footprint Web Infrastructure: Service Discovery
    • Footprint Web Infrastructure: Server Identification/Banner Grabbing
    • Footprint Web Infrastructure: Hidden Content Discovery
    • Web Spidering Using Burp Suite
    • Web Spidering Using Mozenda Web Agent Builder
  • Attack Web Servers
    • Hacking Web Servers
    • Web Server Hacking Tool: WebInspect
  • Analyze Web Applications
    • Analyze Web Applications: Identify Entry Points for User Input
    • Analyze Web Applications: Identify Server-Side Technologies
    • Analyze Web Applications: Identify Server-Side Functionality
    • Analyze Web Applications: Map the Attack Surface
  • Attack Authentication Mechanism
    • Username Enumeration
    • Password Attacks: Password Functionality Exploits
    • Password Attacks: Password Guessing
    • Password Attacks: Brute-forcing
    • Session Attacks: Session ID Prediction/ Brute-forcing
    • Cookie Exploitation: Cookie Poisoning
  • Authorization Attack Schemes
    • Authorization Attack
    • HTTP Request Tampering
    • Authorization Attack: Cookie Parameter Tampering
  • Attack Session Management Mechanism
    • Session Management Attack
    • Attacking Session Token Generation Mechanism
    • Attacking Session Tokens Handling Mechanism: Session Token Sniffing
  • Perform Injection Attacks
    • Injection Attacks
  • Attack Data Connectivity
    • Connection String Injection
    • Connection String Parameter Pollution (CSPP) Attacks
    • Connection Pool DoS
  • Attack Web App Client
  • Attack Web Services
    • Web Services Probing Attacks
    • Web Service Attacks: SOAP Injection
    • Web Service Attacks: XML Injection
    • Web Services Parsing Attacks
    • Web Service Attack Tool: soapUI
    • Web Service Attack Tool: XMLSpy

Web Application Hacking Tools

  • Web Application Hacking Tool: Burp Suite Professional
  • Web Application Hacking Tools: CookieDigger
  • Web Application Hacking Tools: WebScarab
  • Web Application Hacking Tools

Countermeasures

  • Encoding Schemes
  • How to Defend Against SQL Injection Attacks?
  • How to Defend Against Command Injection Flaws?
  • How to Defend Against XSS Attacks?
  • How to Defend Against DoS Attack?
  • How to Defend Against Web Services Attack?
  • Web Application Countermeasures
  • How to Defend Against Web Application Attacks?

Security Tools

  • Web Application Security Tool: Acunetix Web Vulnerability Scanner
  • Web Application Security Tool: Watcher Web Security Tool
  • Web Application Security Scanner: Netsparker
  • Web Application Security Tool: N-Stalker Web Application Security Scanner
  • Web Application Security Tool: VampireScan
  • Web Application Security Tools
  • Web Application Firewall: dotDefender
  • Web Application Firewall: ServerDefender VP
  • Web Application Firewall

Web App Pen Testing

  • Web Application Pen Testing
  • Information Gathering
  • Configuration Management Testing
  • Authentication Testing
  • Session Management Testing
  • Authorization Testing
  • Data Validation Testing
  • Denial of Service Testing
  • Web Services Testing
  • AJAX Testing

Module 14: SQL Injection

SQL Injection Concepts

  • SQL Injection
  • Scenario
  • SQL Injection is the Most Prevalent Vulnerability in 2012
  • SQL Injection Threats
  • What is SQL Injection?
  • SQL Injection Attacks
  • How Web Applications Work?
  • Server Side Technologies
  • HTTP Post Request
  • Example 1: Normal SQL Query
  • Example 1: SQL Injection Query
  • Example 1: Code Analysis
  • Example 2: BadProductList.aspx
  • Example 2: Attack Analysis
  • Example 3: Updating Table
  • Example 4: Adding New Records
  • Example 5: Identifying the Table Name
  • Example 6: Deleting a Table

Testing for SQL Injection

  • SQL Injection Detection
  • SQL Injection Error Messages
  • SQL Injection Attack Characters
  • Additional Methods to Detect SQL Injection
  • SQL Injection Black Box Pen Testing
  • Testing for SQL Injection

Types of SQL Injection

  • Simple SQL Injection Attack
  • Union SQL Injection Example
  • SQL Injection Error Based

Blind SQL Injection

  • What is Blind SQL Injection?
  • No Error Messages Returned
  • Blind SQL Injection: WAITFOR DELAY YES or NO Response
  • Blind SQL Injection – Exploitation (MySQL)
  • Blind SQL Injection - Extract Database User
  • Blind SQL Injection - Extract Database Name
  • Blind SQL Injection - Extract Column Name
  • Blind SQL Injection - Extract Data from ROWS

SQL Injection Methodology

Advanced SQL Injection

  • Information Gathering
  • Extracting Information through Error Messages
  • Understanding SQL Query
  • Bypass Website Logins Using SQL Injection
  • Database, Table, and Column Enumeration
  • Advanced Enumeration
  • Features of Different DBMSs
  • Creating Database Accounts
  • Password Grabbing
  • Grabbing SQL Server Hashes
  • Extracting SQL Hashes (In a Single Statement)
  • Transfer Database to Attacker’s Machine
  • Interacting with the Operating System
  • Interacting with the FileSystem
  • Network Reconnaissance Using SQL Injection
  • Network Reconnaissance Full Query

SQL Injection Tools

  • SQL Injection Tools: BSQLHacker
  • SQL Injection Tools: Marathon Tool
  • SQL Injection Tools: SQL Power Injector
  • SQL Injection Tools: Havij
  • SQL Injection Tools

Evasion Techniques

  • Evading IDS
  • Types of Signature Evasion Techniques
  • Evasion Technique: Sophisticated Matches
  • Evasion Technique: Hex Encoding
  • Evasion Technique: Manipulating White Spaces
  • Evasion Technique: In-line Comment
  • Evasion Technique: Char Encoding
  • Evasion Technique: String Concatenation
  • Evasion Technique: Obfuscated Codes

Counter-measures

  • How to Defend Against SQL Injection Attacks?
  • How to Defend Against SQL Injection Attacks: Use Type-Safe SQL Parameters
  • How to Defend Against SQL Injection Attacks
  • SQL Injection Detection Tool: Microsoft Source Code Analyzer
  • SQL Injection Detection Tool: Microsoft UrlScan Filter
  • SQL Injection Detection Tool: dotDefender
  • SQL Injection Detection Tool: IBM Security AppScan
  • SQL Injection Detection Tool: WebCruiser
  • Snort Rule to Detect SQL Injection Attacks
  • SQL Injection Detection Tools

Module 15: Hacking Wireless Networks

Wireless Concepts

  • Wireless Networks
  • 2010 vs. 2011 Wi-Fi Device Type Comparison
  • Wi-Fi Networks at Home and Public Places
  • Types of Wireless Networks
  • Wireless Standards
  • Service Set Identifier (SSID)
  • Wi-Fi Authentication Modes
  • Wi-Fi Authentication Process Using a Centralized Authentication Server
  • Wireless Terminologies
  • Wi-Fi Chalking
  • Wi-Fi Chalking Symbols
  • Types of Wireless Antenna
  • Parabolic Grid Antenna

Wireless Encryption

  • Types of Wireless Encryption
  • WEP Encryption
  • How WEP Works?
  • What is WPA?
  • How WPA Works?
  • Temporal Keys
  • What is WPA2?
  • How WPA2 Works?
  • WEP vs. WPA vs. WPA2
  • WEP Issues
  • Weak Initialization Vectors (IV)
  • How to Break WEP Encryption?
  • How to Break WPA/WPA2 Encryption?
  • How to Defend Against WPA Cracking?

Wireless Threats

  • Wireless Threats: Access Control Attacks
  • Wireless Threats: Integrity Attacks
  • Wireless Threats: Confidentiality Attacks
  • Wireless Threats: Availability Attacks
  • Wireless Threats: Authentication Attacks
  • Rogue Access Point Attack
  • Client Mis-association
  • Misconfigured Access Point Attack
  • Unauthorized Association
  • Ad Hoc Connection Attack
  • HoneySpot Access Point Attack
  • AP MAC Spoofing
  • Denial-of-Service Attack
  • Jamming Signal Attack
  • Wi-Fi Jamming Devices

Wireless Hacking Methodology

  • Wi-Fi Discovery
    • Footprint the Wireless Network
    • Attackers Scanning for Wi-Fi Networks
    • Find Wi-Fi Networks to Attack
    • Wi-Fi Discovery Tool: inSSIDer
    • Wi-Fi Discovery Tool: NetSurveyor
    • Wi-Fi Discovery Tool: NetStumbler
    • Wi-Fi Discovery Tool: Vistumbler
    • Wi-Fi Discovery Tool: WirelessMon
    • Mobile-based Wi-Fi Discovery Tool
    • Wi-Fi Discovery Tools
  • GPS Mapping
    • GPS Mapping Tool: WIGLE
    • GPS Mapping Tool: Skyhook
    • Wi-Fi Hotspot Finder: jiWire
    • Wi-Fi Hotspot Finder: WeFi
    • How to Discover Wi-Fi Network Using Wardriving?
  • Wireless Traffic Analysis
    • Wireless Cards and Chipsets
    • Wi-Fi USB Dongle: AirPcap
    • Wi-Fi Packet Sniffer: Wireshark with AirPcap
    • Wi-Fi Packet Sniffer: Cascade Pilot
    • Wi-Fi Packet Sniffer: OmniPeek
    • Wi-Fi Packet Sniffer: CommView for Wi-Fi
    • What is Spectrum Analysis?
    • Wi-Fi Packet Sniffers
  • Launch Wireless Attacks
    • Aircrack-ng Suite
    • How to Reveal Hidden SSIDs
    • Fragmentation Attack
    • How to Launch MAC Spoofing Attack?
    • Denial of Service: Deauthentication and Disassociation Attacks
    • Man-in-the-Middle Attack
    • MITM Attack Using Aircrack-ng
    • Wireless ARP Poisoning Attack
    • Rogue Access Point
    • Evil Twin
    • How to Set Up a Fake Hotspot (Evil Twin)?
  • Crack Wi-Fi Encryption
    • How to Crack WEP Using Aircrack?
    • How to Crack WEP Using Aircrack? Screenshot 1/2
    • How to Crack WEP Using Aircrack? Screenshot 2/2
    • How to Crack WPA-PSK Using Aircrack?
    • WPA Cracking Tool: KisMAC
    • WEP Cracking Using Cain & Abel
    • WPA Brute Forcing Using Cain & Abel
    • WPA Cracking Tool: Elcomsoft Wireless Security Auditor
    • WEP/WPA Cracking Tools

Wireless Hacking Tools

  • Wi-Fi Sniffer: Kismet
  • Wardriving Tools
  • RF Monitoring Tools
  • Wi-Fi Traffic Analyzer Tools
  • Wi-Fi Raw Packet Capturing and Spectrum Analyzing Tools

Bluetooth Hacking

  • Bluetooth Stack
  • Bluetooth Threats
  • How to BlueJack a Victim?
  • Bluetooth Hacking Tool: Super Bluetooth Hack
  • Bluetooth Hacking Tool: PhoneSnoop
  • Bluetooth Hacking Tool: BlueScanner
  • Bluetooth Hacking Tools

Counter-measures

  • How to Defend Against Bluetooth Hacking?
  • How to Detect and Block Rogue AP?
  • Wireless Security Layers
  • How to Defend Against Wireless Attacks?

Wireless Security Tools

  • Wireless Intrusion Prevention Systems
  • Wireless IPS Deployment
  • Wi-Fi Security Auditing Tool: AirMagnet WiFi Analyzer
  • Wi-Fi Security Auditing Tool: AirDefense
  • Wi-Fi Security Auditing Tool: Adaptive Wireless IPS
  • Wi-Fi Security Auditing Tool: Aruba RFProtect WIPS
  • Wi-Fi Intrusion Prevention System
  • Wi-Fi Predictive Planning Tools
  • Wi-Fi Vulnerability Scanning Tools

Wi-Fi Pen Testing

  • Wireless Penetration Testing
  • Wireless Penetration Testing Framework
  • Wi-Fi Pen Testing Framework
  • Pen Testing LEAP Encrypted WLAN
  • Pen Testing WPA/WPA2 Encrypted WLAN
  • Pen Testing WEP Encrypted WLAN
  • Pen Testing Unencrypted WLAN

Module 16: Hacking Mobile Platforms

Mobile Platform Attack Vectors

  • Mobile Threat Report Q2 2012
  • Terminology
  • Mobile Attack Vectors
  • Mobile Platform Vulnerabilities and Risks
  • Security Issues Arising from App Stores
  • Threats of Mobile Malware
  • App Sandboxing Issues

Hacking Android OS

  • Android OS
  • Android OS Architecture
  • Android Device Administration API
  • Android Vulnerabilities
  • Android Rooting
  • Rooting Android Phones using SuperOneClick
  • Rooting Android Phones Using Superboot
  • Android Rooting Tools
  • Session Hijacking Using DroidSheep
  • Android-based Sniffer: FaceNiff
  • Android Trojan: ZitMo (ZeuS-in-the-Mobile)
  • Android Trojan: GingerBreak
  • Android Trojan: AcnetSteal and Cawitt
  • Android Trojan: Frogonal and Gamex
  • Android Trojan: KabStamper and Mania
  • Android Trojan: PremiumSMS and SmsSpy
  • Android Trojan: DroidLive SMS and UpdtKiller
  • Android Trojan: FakeToken
  • Securing Android Devices
  • Google Apps Device Policy
  • Remote Wipe Service: Remote Wipe
  • Android Security Tool: DroidSheep Guard
  • Android Vulnerability Scanner: X-Ray
  • Android Penetration Testing Tool: Android Network Toolkit - Anti
  • Android Device Tracking Tools

Hacking iOS

  • Security News
  • Apple iOS
  • Jailbreaking iOS
  • Types of Jailbreaking
  • Jailbreaking Techniques
  • App Platform for Jailbroken Devices: Cydia
  • Jailbreaking Tools: Redsn0w and Absinthe
  • Tethered Jailbreaking of iOS 6 Using RedSn0w
  • Jailbreaking Tools: Sn0wbreeze and PwnageTool
  • Jailbreaking Tools: LimeRa1n and Jailbreakme.com
  • Jailbreaking Tools: Blackra1n and Spirit
  • Guidelines for Securing iOS Devices
  • iOS Device Tracking Tools

Hacking Windows Phone OS

  • Windows Phone 8
  • Windows Phone 8 Architecture
  • Secure Boot Process
  • Windows Phone 8 Vulnerabilities
  • Guidelines for Securing Windows OS Devices

Hacking BlackBerry

  • BlackBerry Operating System
  • BlackBerry Enterprise Solution Architecture
  • Blackberry Attack Vectors
  • Malicious Code Signing
  • JAD File Exploits and Memory/ Processes Manipulations
  • Short Message Service (SMS) Exploits
  • Email Exploits
  • PIM Data Attacks and TCP/IP Connections Vulnerabilities
  • Telephony Attacks
  • Blackberry Spyware: FinSpy Mobile
  • BlackBerry Router Protocol
  • Guidelines for Securing BlackBerry Devices

Mobile Device Management (MDM)

  • MDM Logical Architecture
  • MDM Solution: MaaS360 Mobile Device Management (MDM)
  • MDM Solutions

Mobile Security Guidelines and Tools

  • General Guidelines for Mobile Platform Security
  • Mobile Device Security Guidelines for Administrator
  • Mobile Protection Tool: BullGuard Mobile Security
  • Mobile Protection Tool: Lookout
  • Mobile Protection Tool: WISeID
  • Mobile Protection Tools

Mobile Pen Testing

  • Android Phone Pen Testing
  • iPhone Pen Testing
  • Windows Phone Pen Testing
  • BlackBerry Pen Testing

Module 17: Evading IDS, Firewalls, and Honeypots

IDS, Firewall and Honeypot Concepts

  • Intrusion Detection Systems (IDS) and their Placement
  • How IDS Works?
  • Ways to Detect an Intrusion
  • Types of Intrusion Detection Systems
  • System Integrity Verifiers (SIV)
  • General Indications of Intrusions
  • General Indications of System Intrusions
  • Firewall
  • Firewall Architecture
  • DeMilitarized Zone (DMZ)
  • Types of Firewall
  • Packet Filtering Firewall
  • Circuit-Level Gateway Firewall
  • Application-Level Firewall
  • Stateful Multilayer Inspection Firewall
  • Firewall Identification: Port Scanning
  • Firewall Identification: Firewalking
  • Firewall Identification: Banner Grabbing
  • Honeypot
  • Types of Honeypots
  • How to Set Up a Honeypot?

IDS, Firewall and Honeypot System

  • Intrusion Detection Tool: Snort
  • How Snort Works
  • Snort Rules
  • Snort Rules : Rule Actions and IP Protocols
  • Snort Rules : The Direction Operator and IP Addresses
  • Intrusion Detection Tools
  • Firewall: ZoneAlarm PRO Firewall
  • Firewalls
  • Honeypot Tool: KFSensor
  • Honeypot Tool: SPECTER
  • Honeypot Tools

Evading IDS

  • Insertion Attack
  • Evasion
  • Denial-of-Service Attack (DoS)
  • Obfuscating
  • False Positive Generation
  • Session Splicing
  • Unicode Evasion Technique
  • Fragmentation Attack
  • Overlapping Fragments
  • Time-To-Live Attacks
  • Invalid RST Packets
  • Urgency Flag
  • Polymorphic Shellcode
  • ASCII Shellcode
  • Application-Layer Attacks
  • Desynchronization - Pre Connection SYN
  • Desynchronization - Post Connection SYN
  • Other Types of Evasion

Evading Firewalls

  • IP Address Spoofing
  • Source Routing
  • Tiny Fragments
  • Bypass Blocked Sites Using IP Address in Place of URL
  • Bypass Blocked Sites Using Anonymous Website Surfing Sites
  • Bypass a Firewall using Proxy Server
  • Bypassing Firewall through ICMP Tunneling Method
  • Bypassing Firewall through ACK Tunneling Method
  • Bypassing Firewall through HTTP Tunneling Method
  • Bypassing Firewall through External Systems
  • Bypassing Firewall through MITM Attack

Detecting Honeypots

  • Detecting Honeypots
  • Honeypot Detecting Tool: Send-Safe Honeypot Hunter

Firewall Evading Tools

  • Firewall Evasion Tool: Traffic IQ Professional
  • Firewall Evasion Tool: tcp-over-dns
  • Firewall Evasion Tools
  • Packet Fragment Generators

Countermeasures

Penetration Testing

  • Firewall/IDS Penetration Testing
  • Firewall Penetration Testing
  • IDS Penetration Testing

Module 18: Buffer Overflow

Buffer Overflow Concepts

  • Buffer Overflows
  • Why Are Programs and Applications Vulnerable to Buffer Overflows?
  • Understanding Stacks
  • Stack-Based Buffer Overflow
  • Understanding Heap
  • Heap-Based Buffer Overflow
  • Stack Operations
  • Shellcode
  • No Operations (NOPs)

Buffer Overflow Methodology

  • Knowledge Required to Program Buffer Overflow Exploits
  • Buffer Overflow Steps
  • Attacking a Real Program
  • Format String Problem
  • Overflow using Format String
  • Smashing the Stack
  • Once the Stack is smashed...

Buffer Overflow Examples

  • Simple Uncontrolled Overflow
  • Simple Buffer Overflow in C: Code Analysis
  • Exploiting Semantic Comments in C (Annotations)
  • How to Mutate a Buffer Overflow Exploit?

Buffer Overflow Detection

  • Identifying Buffer Overflows
  • How to Detect Buffer Overflows in a Program?
  • Testing for Heap Overflow Conditions: heap.exe
  • Steps for Testing for Stack Overflow in OllyDbg Debugger
  • Testing for Stack Overflow in OllyDbg Debugger
  • Testing for Format String Conditions using IDA Pro
  • BoF Detection Tool: Immunity CANVAS
  • BoF Detection Tools

Buffer Overflow Counter-measures

  • Defense Against Buffer Overflows
  • Preventing BoF Attacks
  • Programming Countermeasures
  • Data Execution Prevention (DEP)
  • Enhanced Mitigation Experience Toolkit (EMET)
  • EMET System Configuration Settings
  • EMET Application Configuration Settings

Buffer Overflow Security Tools

  • /GS http://microsoft.com
  • BoF Security Tool: BufferShield
  • BoF Security Tools

Buffer Overflow Penetration Testing

Module 19: Cryptography

Cryptography Concepts

  • Cryptography
  • Types of Cryptography
  • Government Access to Keys (GAK)

Encryption Algorithms

  • Ciphers
  • Advanced Encryption Standard (AES)
  • Data Encryption Standard (DES)
  • RC4, RC5, RC6 Algorithms
  • The DSA and Related Signature Schemes
  • RSA (Rivest Shamir Adleman)
  • Example of RSA Algorithm
  • The RSA Signature Scheme
  • Message Digest (One-way Hash) Functions
  • Message Digest Function: MD5
  • Secure Hashing Algorithm (SHA)
  • What is SSH (Secure Shell)?

Cryptography Tools

  • MD5 Hash Calculators: HashCalc, MD5 Calculator and HashMyFiles
  • Cryptography Tool: Advanced Encryption Package
  • Cryptography Tool: BCTextEncoder
  • Cryptography Tools

Public Key Infrastructure(PKI)

  • Public Key Infrastructure (PKI)
  • Certification Authorities

Email Encryption

  • Digital Signature
  • SSL (Secure Sockets Layer)
  • Transport Layer Security (TLS)

Disk Encryption

  • Disk Encryption Tool: TrueCrypt
  • Disk Encryption Tool: GiliSoft Full Disk Encryption
  • Disk Encryption Tools

Cryptography Attacks

  • Code Breaking Methodologies
  • Brute-Force Attack
  • Meet-in-the-Middle Attack on Digital Signature Schemes

Cryptanalysis Tools

  • Cryptanalysis Tool: CrypTool
  • Cryptanalysis Tools
  • Online MD5 Decryption Tool

Module 20: Penetration Testing

Pen Testing Concepts

  • Security Assessments
  • Security Audit
  • Vulnerability Assessment
  • Limitations of Vulnerability Assessment
  • Introduction to Penetration Testing
  • Penetration Testing
  • Why Penetration Testing?
  • Comparing Security Audit, Vulnerability Assessment, and Penetration Testing
  • What should be tested?
  • What Makes a Good Penetration Test?
  • ROI on Penetration Testing
  • Testing Points
  • Testing Locations

Types of Pen Testing

  • Types of Penetration Testing
  • External Penetration Testing
  • Internal Security Assessment
  • Black-box Penetration Testing
  • Grey-box Penetration Testing
  • White-box Penetration Testing
  • Announced / Unannounced Testing
  • Automated Testing
  • Manual Testing

Pen Testing Techniques

  • Common Penetration Testing Techniques
  • Using DNS Domain Name and IP Address Information
  • Enumerating Information about Hosts on Publicly-Available Networks

Pen Testing Phases

  • Phases of Penetration Testing
  • Pre-Attack Phase: Define Rules of Engagement (ROE)
  • Pre-Attack Phase: Understand Customer Requirements
  • Pre-Attack Phase: Create a Checklist of the Testing Requirements
  • Pre-Attack Phase: Define the Pen-Testing Scope
  • Pre-Attack Phase: Sign Penetration Testing Contract
  • Pre-Attack Phase: Sign Confidentiality and Non-Disclosure (NDA) Agreements
  • Pre-Attack Phase: Information Gathering
  • Attack Phase
  • Activity: Perimeter Testing
  • Enumerating Devices
  • Activity: Acquiring Target
  • Activity: Escalating Privileges
  • Activity: Execute, Implant, and Retract
  • Post-Attack Phase and Activities
  • Penetration Testing Deliverable Templates

Pen Testing Roadmap

  • Penetration Testing Methodology
  • Application Security Assessment
  • Web Application Testing - I
  • Web Application Testing - II
  • Web Application Testing - III
  • Network Security Assessment
  • Wireless/Remote Access Assessment
  • Wireless Testing
  • Telephony Security Assessment
  • Social Engineering
  • Testing Network-Filtering Devices
  • Denial of Service Emulation

Outsourcing Pen Testing Services

  • Outsourcing Penetration Testing Services
  • Terms of Engagement
  • Project Scope
  • Pentest Service Level Agreements
  • Penetration Testing Consultants