Student Shelter In Computers , EC-Council ATC Partner
EC-Council Partner Pakistan Offer’s Low Cost Certification & Coaching / Training for Students & Professionals
Certified Ethical Hacker CEHv8 Course Outline
Ø      Module 01: Introduction to Ethical Hacking
Ø      Module 02: Footprinting and Reconnaissance
Ø      Module 03: Scanning Networks
Ø      Module 04: Enumeration
Ø      Module 05: System Hacking
Ø      Module 06: Trojans and Backdoors
Ø      Module 07: Viruses and Worms
Ø      Module 08: Sniffers
Ø      Module 09: Social Engineering
Ø      Module 10: Denial of Service
Ø      Module 11: Session Hijacking
Ø      Module 12: Hijacking Webservers
Ø      Module 13: Hacking Web Applications
Ø      Module 14: SQL Injection
Ø      Module 15: Hacking Wireless Networks
Ø      Module 16: Evading IDS, Firewalls, and Honeypots
Ø      Module 17: Buffer Overflow
Ø      Module 18: Cryptography
Ø      Module 19: Penetration Testing
Ø      Module 20: Hacking Mobiles Platform

 
| 
Course Description 
 This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50Who Should Attend
 This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
 Certification
 
 The Certified Ethical Hacker exam 312-50 may be taken on the last day of the training (optional). Students need to pass the online Prometric exam to receive CEH certification.Legal Agreement
 
 Ethical Hacking and Countermeasures course mission is to educate, introduce and demonstrate hacking tools for penetration testing purposes only. Prior to attending this course, you will be asked to sign an agreement stating that you will not use the newly acquired skills for illegal or malicious attacks and you will not use such tools in an attempt to compromise any computer system, and to indemnify EC-Council with respect to the use or misuse of these tools, regardless of intent.
 
 Not anyone can be a student — the Accredited Training Centers (ATC) will make sure the applicants work for legitimate companies.
 
  
Course Outline Version 8 
 
CEHv8 Curriculum consists of instructor-led training and self-study. The Instructor will provide the details of self-study modules to the students beginning of the class.
 
Module 01: Introduction to Ethical Hacking 
Internet Crime Current Report: IC3Data Breach Investigations ReportTypes of Data Stolen From the OrganizationsEssential TerminologiesElements of Information SecurityAuthenticity and Non-RepudiationThe Security, Functionality, and Usability TriangleSecurity ChallengesEffects of Hacking 
Effects of Hacking on Business Who is a Hacker?Hacker ClassesHacktivismWhat Does a Hacker Do?Phase 1 - Reconnaissance
Phase 2 - ScanningPhase 3 – Gaining AccessPhase 4 – Maintaining AccessPhase 5 – Covering TracksTypes of Attacks on a System
Operating System AttacksApplication-Level AttacksShrink Wrap Code AttacksMisconfiguration AttacksWhy Ethical Hacking is Necessary?Defense in DepthScope and Limitations of Ethical HackingWhat Do Ethical Hackers Do?Skills of an Ethical HackerVulnerability ResearchVulnerability Research WebsitesWhat is Penetration Testing?Why Penetration Testing?Penetration Testing Methodology
 
Module 02: Footprinting and Reconnaissance 
Footprinting TerminologiesWhat is Footprinting?Objectives of FootprintingFootprinting ThreatsFinding a Company’s URLLocate Internal URLsPublic and Restricted WebsitesSearch for Company’s Information 
Tools to Extract Company’s Data Footprinting Through Search EnginesCollect Location Information
Satellite Picture of a ResidencePeople Search
People Search Using http://pipl.comPeople Search Online ServicesPeople Search on Social Networking ServicesGather Information from Financial ServicesFootprinting Through Job SitesMonitoring Target Using AlertsCompetitive Intelligence Gathering
Competitive Intelligence-When Did this Company Begin?  How Did it Develop?Competitive Intelligence-What are the Company's Plans?Competitive Intelligence-What Expert Opinion Say About the Company?Competitive Intelligence ToolsCompetitive Intelligence Consulting CompaniesWHOIS Lookup
WHOIS Lookup Result AnalysisWHOIS Lookup Tools: SmartWhoisWHOIS Lookup ToolsWHOIS Lookup Online ToolsExtracting DNS Information
DNS Interrogation ToolsDNS Interrogation Online ToolsLocate the Network RangeTraceroute
Traceroute AnalysisTraceroute Tool: 3D TracerouteTraceroute Tool: LoriotProTraceroute Tool: Path Analyzer ProTraceroute ToolsMirroring Entire Website
Website Mirroring ToolsMirroring Entire Website ToolsExtract Website Information from http://www.archive.orgMonitoring Web Updates Using Website WatcherTracking Email Communications
Footprint Using Google Hacking TechniquesWhat a Hacker Can Do With Google Hacking?Google Advance Search Operators
Finding Resources using Google Advance OperatorGoogle Hacking Tool: Google Hacking Database (GHDB)Google Hacking ToolsAdditional Footprinting ToolsFootprinting CountermeasuresFootprinting Pen Testing
 
  
Module 03: Scanning Networks 
Network ScanningTypes of ScanningChecking for Live Systems - ICMP ScanningPing Sweep 
Three-Way HandshakeTCP Communication Flags
Create Custom Packet using TCP FlagsHping2 / Hping3Hping CommandsScanning Techniques
TCP Connect / Full Open ScanStealth Scan (Half-open Scan)Xmas ScanFIN ScanNULL ScanIDLE Scan 
IDLE Scan: Step 1IDLE Scan: Step 2.1 (Open Port)IDLE Scan: Step 2.2  (Closed Port)IDLE Scan: Step 3 ICMP Echo Scanning/List ScanSYN/FIN Scanning Using IP FragmentsUDP ScanningInverse TCP Flag ScanningACK Flag Scanning
 Scanning: IDS Evasion TechniquesIP Fragmentation ToolsScanning Tool: NmapScanning Tool: NetScan Tools ProScanning ToolsDo Not Scan These IP Addresses (Unless you want to get into trouble)Scanning CountermeasuresWar DialingWhy War Dialing?War Dialing ToolsWar Dialing Countermeasures
War Dialing Countermeasures: SandTrap ToolOS Fingerprinting
Active Banner Grabbing Using TelnetBanner Grabbing Tool: ID ServeGET REQUESTSBanner Grabbing Tool: NetcraftBanner Grabbing ToolsBanner Grabbing Countermeasures: Disabling or Changing BannerHiding File ExtensionsHiding File Extensions from WebpagesVulnerability Scanning
Vulnerability Scanning Tool: NessusVulnerability Scanning Tool: SAINTVulnerability Scanning Tool: GFI LANGuardNetwork Vulnerability ScannersLANsurveyorNetwork MappersProxy ServersWhy Attackers Use Proxy Servers?Use of Proxies for AttackHow Does MultiProxy Work?Free Proxy ServersProxy WorkbenchProxifier Tool: Create Chain of Proxy ServersSocksChainTOR (The Onion Routing)TOR Proxy Chaining SoftwareHTTP Tunneling TechniquesWhy do I Need HTTP Tunneling?Super Network Tunnel ToolHttptunnel for WindowsAdditional HTTP  Tunneling ToolsSSH TunnelingSSL Proxy ToolHow to Run SSL Proxy?Proxy ToolsAnonymizersTypes of AnonymizersCase: Bloggers Write Text Backwards to Bypass Web Filters in ChinaText Conversion to Avoid FiltersCensorship Circumvention Tool:  PsiphonHow Psiphon Works?How to Check if  Your Website is Blocked in China or Not?G-ZapperAnonymizer ToolsSpoofing IP AddressIP Spoofing Detection Techniques: Direct TTL ProbesIP Spoofing Detection Techniques: IP Identification NumberIP Spoofing Detection Techniques: TCP Flow Control MethodIP Spoofing CountermeasuresScanning Pen Testing
 
  
Module 04: Enumeration 
What is Enumeration?Techniques for EnumerationNetbios Enumeration 
NetBIOS Enumeration Tool: SuperScanNetBIOS Enumeration Tool: NetBIOS Enumerator Enumerating User AccountsEnumerate Systems Using Default PasswordsSNMP (Simple Network Management Protocol) Enumeration
Management Information Base (MIB)SNMP Enumeration Tool: OpUtils Network Monitoring ToolsetSNMP Enumeration Tool: SolarWindsSNMP Enumeration ToolsUNIX/Linux Enumeration
Linux Enumeration Tool: Enum4linuxLDAP Enumeration
LDAP Enumeration Tool: JXplorerLDAP Enumeration ToolNTP Enumeration
NTP Server Discovery Tool: NTP Server ScannerNTP Server: PresenTense Time ServerNTP Enumeration ToolsSMTP Enumeration
SMTP Enumeration Tool: NetScanTools ProDNS Zone Transfer Enumeration Using nslookup
DNS Analyzing and Enumeration Tool:  The Men & Mice SuiteEnumeration Countermeasures
SMB Enumeration CountermeasuresEnumeration Pen Testing
 
Module 05: System Hacking 
Information at Hand Before System Hacking StageSystem Hacking: GoalsCEH Hacking Methodology (CHM)Password Cracking 
Password ComplexityPassword Cracking TechniquesTypes of Password Attacks 
Passive Online Attacks: Wire SniffingPassword SniffingPassive Online Attack:  Man-in-the-Middle and Replay AttackActive Online Attack: Password Guessing
 
Active Online Attack: Trojan/Spyware/KeyloggerActive Online Attack: Hash Injection Attack Rainbow Attacks: Pre-Computed HashDistributed Network Attack
Elcomsoft Distributed Password RecoveryNon-Electronic Attacks
Manual Password Cracking (Guessing)Automatic Password Cracking AlgorithmStealing Passwords Using USB Drive
 Microsoft AuthenticationHow Hash Passwords are Stored in Windows SAM?What is LAN Manager Hash?
LM “Hash” GenerationLM, NTLMv1, and NTLMv2NTLM Authentication ProcessKerberos AuthenticationSaltingPWdump7 and FgdumpL0phtCrackOphcrackCain & AbelRainbowCrackPassword Cracking ToolsLM Hash Backward Compatibility
How to Defend against Password Cracking?
Implement and Enforce Strong Security PolicyPrivilege Escalation
Active@ Password ChangerPrivilege Escalation ToolsHow to Defend against Privilege Escalation?Executing ApplicationsAlchemy Remote ExecutorRemoteExecExecute This!KeyloggerTypes of Keystroke LoggersAcoustic/CAM Keylogger
Keylogger: Advanced KeyloggerKeylogger: Spytech SpyAgentKeylogger: Perfect KeyloggerKeylogger: Powered KeyloggerKeylogger for Mac: Aobo Mac OS X KeyLoggerKeylogger for Mac: Perfect Keylogger for MacHardware Keylogger: KeyGhostKeyloggersSpyware
What Does the Spyware Do?Types of Spywares
Desktop Spyware
Desktop Spyware: Activity MonitorEmail and Internet Spyware
Email and Internet Spyware: eBLASTERInternet and E-mail SpywareChild Monitoring Spyware
Child Monitoring Spyware: Advanced Parental ControlScreen Capturing Spyware
Screen Capturing Spyware: Spector ProUSB Spyware
Audio Spyware
Audio Spyware: RoboNanny, Stealth Recorder Pro and Spy Voice RecorderVideo Spyware
Video Spyware: Net Video SpyPrint Spyware
Print Spyware: Printer Activity MonitorTelephone/Cellphone SpywareCellphone Spyware: Mobile SpyGPS Spyware
GPS Spyware: GPS TrackMakerHow to Defend against Keyloggers?
Anti-KeyloggerAnti-Keylogger: Zemana AntiLoggerAnti-KeyloggersHow to Defend against Spyware?
Anti-Spyware: Spyware DoctorRootkitsTypes of RootkitsHow Rootkit Works?Rootkit: FuDetecting Rootkits
Steps for Detecting RootkitsHow to Defend against Rootkits?Anti-Rootkit: RootkitRevealer and McAfee Rootkit DetectiveNTFS Data Stream
How to Create NTFS Streams?NTFS Stream ManipulationHow to Defend against NTFS Streams?NTFS Stream Detector: ADS Scan EngineNTFS Stream DetectorsWhat is Steganography?
Steganography TechniquesHow Steganography Works?Types of Steganography
Whitespace Steganography Tool: SNOWImage Steganography
Image Steganography: Hermetic StegoImage Steganography ToolsDocument Steganography: wbStego
Document Steganography ToolsVideo Steganography: Our Secret
Video Steganography ToolsAudio Steganography: Mp3stegz
Audio Steganography ToolsFolder Steganography: Invisible Secrets 4
Folder Steganography ToolsSpam/Email Steganography: Spam MimicNatural Text Steganography: Sams Big G Play MakerSteganalysis
Steganalysis Methods/Attacks on SteganographySteganography Detection Tool: Stegdetect
Steganography Detection ToolsWhy Cover Tracks?
Ways to Clear Online TracksDisabling Auditing: AuditpolCovering Tracks Tool: Window WasherCovering Tracks Tool: Tracks Eraser Pro
System Hacking Penetration Testing
 
  
Module 06: Trojans and Backdoors 
What is a Trojan?Overt and Covert ChannelsPurpose of TrojansWhat Do Trojan Creators Look For?Indications of a Trojan AttackCommon Ports used by TrojansHow to Infect Systems Using a Trojan?Wrappers 
Different Ways a Trojan can Get into a SystemHow to Deploy a Trojan?Evading Anti-Virus TechniquesTypes of Trojans
 
Command Shell Trojan: Netcat GUI Trojan: MoSucker
GUI Trojan: Jumper and BiodoxDocument TrojansE-mail Trojans
E-mail Trojans: RemoteByMailDefacement Trojans
Defacement Trojans: RestoratorBotnet Trojans
Botnet Trojan: Illusion BotBotnet Trojan: NetBot AttackerProxy Server Trojans
Proxy Server Trojan: W3bPrOxy Tr0j4nCr34t0r (Funny Name)FTP Trojans
VNC TrojansHTTP/HTTPS Trojans
Shttpd Trojan - HTTPS (SSL)ICMP Tunneling
Remote Access Trojans
Remote Access Trojan: RAT DarkCometRemote Access Trojan: ApocalypseCovert Channel Trojan: CCTTE-banking TrojansBanking Trojan Analysis
 Destructive TrojansNotification TrojansCredit Card TrojansData Hiding Trojans (Encrypted Trojans)BlackBerry Trojan: PhoneSnoopMAC OS X Trojan: DNSChangerMAC OS X Trojan: DNSChangerMac OS X Trojan: Hell RaiserHow to Detect Trojans?
Scanning for Suspicious PortsPort Monitoring Tool: IceSwordPort Monitoring Tools: CurrPorts and TCPViewScanning for Suspicious ProcessesProcess Monitoring Tool: What's Running
Scanning for Suspicious Registry EntriesRegistry Entry Monitoring ToolsScanning for Suspicious Device Drivers
Device Drivers Monitoring Tools: DriverViewDevice Drivers Monitoring ToolsScanning for Suspicious Windows Services
Windows Services Monitoring Tools: Windows Service Manager (SrvMan)Windows Services Monitoring ToolsScanning for Suspicious Startup Programs
Windows7 Startup Registry EntriesStartup Programs Monitoring Tools: StarterStartup Programs Monitoring Tools: Security AutoRunStartup Programs Monitoring ToolsScanning for Suspicious Files and Folders
Files and Folder Integrity Checker: FastSum and WinMD5Files and Folder Integrity CheckerScanning for Suspicious Network Activities
Detecting Trojans and Worms with Capsa Network AnalyzerTrojan CountermeasuresBackdoor CountermeasuresTrojan Horse Construction KitAnti-Trojan Software: TrojanHunterAnti-Trojan Software: Emsisoft Anti-MalwareAnti-Trojan SoftwaresPen Testing for Trojans and Backdoors
 
  
Module 07: Viruses and Worms 
Introduction to VirusesVirus and Worm Statistics 2010Stages of Virus LifeWorking of  Viruses: Infection PhaseWorking of  Viruses: Attack PhaseWhy Do People Create Computer Viruses?Indications of Virus AttackHow does a Computer get Infected by Viruses?Virus HoaxesVirus Analysis: 
W32/Sality AAW32/Toal-AW32/VirutKlez Types of Viruses
System or Boot Sector VirusesFile and Multipartite VirusesMacro VirusesCluster VirusesStealth/Tunneling VirusesEncryption VirusesPolymorphic CodeMetamorphic VirusesFile Overwriting or Cavity VirusesSparse Infector VirusesCompanion/Camouflage VirusesShell VirusesFile Extension VirusesAdd-on and Intrusive VirusesTransient and Terminate and Stay Resident VirusesWriting a Simple Virus Program
Terabit Virus MakerJPS Virus MakerDELmE's Batch Virus MakerComputer  WormsHow is a Worm Different from a Virus?Example of Worm Infection: Conficker Worm
What does the Conficker Worm do?How does the Conficker Worm Work?Worm Analysis:
Worm Maker: Internet Worm Maker ThingWhat is Sheep Dip Computer?Anti-Virus Sensors SystemsMalware Analysis ProcedureString Extracting Tool: BintextCompression and Decompression Tool: UPXProcess Monitoring Tools: Process MonitorLog Packet Content Monitoring Tools: NetResidentDebugging Tool: OllydbgVirus  Analysis Tool: IDA ProOnline Malware Testing:
Sunbelt CWSandboxVirusTotalOnline Malware Analysis ServicesVirus Detection MethodsVirus and Worms CountermeasuresCompanion Antivirus: Immunet ProtectAnti-virus ToolsPenetration Testing for Virus
 
  
Module 08: Sniffers 
Benefits of Lawful InterceptNetwork Components Used for Lawful Intercept WiretappingSniffing ThreatsHow a Sniffer Works?Hacker Attacking a SwitchTypes of Sniffing: Passive SniffingTypes of Sniffing: Active SniffingProtocols Vulnerable to SniffingTie to Data Link Layer in OSI ModelHardware Protocol AnalyzersSPAN PortMAC Flooding
MAC Address/CAM TableHow CAM Works?What Happens When CAM Table is Full?Mac Flooding Switches with macofMAC Flooding Tool: YersiniaHow to Defend against MAC Attacks?How DHCP Works?
DHCP Request/Reply MessagesIPv4 DHCP Packet FormatDHCP Starvation AttackRogue DHCP Server AttackDHCP Starvation Attack Tool: GobblerHow to Defend Against DHCP Starvation and Rogue Server Attack?What is Address Resolution Protocol (ARP)?
ARP Spoofing AttackHow Does ARP Spoofing Work?Threats of ARP PoisoningARP Poisoning Tool: Cain and AbelARP Poisoning Tool: WinArpAttackerARP Poisoning Tool: Ufasoft SnifHow to Defend Against ARP Poisoning? Use DHCP Snooping Binding Table and Dynamic ARP InspectionConfiguring DHCP Snooping and Dynamic ARP Inspection on Cisco SwitchesMAC Spoofing/Duplicating
Spoofing Attack ThreatsMAC Spoofing Tool: SMACHow to Defend Against MAC Spoofing? Use DHCP Snooping Binding Table, Dynamic ARP Inspection and IP Source GuardDNS Poisoning Techniques
Intranet DNS SpoofingInternet DNS SpoofingProxy Server DNS PoisoningDNS Cache PoisoningHow to Defend Against DNS Spoofing?Sniffing Tool: Wireshark
Follow TCP Stream in WiresharkDisplay Filters in WiresharkAdditional Wireshark FiltersSniffing Tool: CACE PilotSniffing Tool: Tcpdump/WindumpDiscovery Tool: NetworkViewDiscovery Tool: The Dude SnifferPassword Sniffing Tool: AcePacket Sniffing Tool: Capsa Network AnalyzerOmniPeek Network AnalyzerNetwork Packet Analyzer: ObserverSession Capture Sniffer: NetWitnessEmail Message Sniffer: Big-MotherTCP/IP Packet Crafter: Packet BuilderAdditional Sniffing ToolsHow an Attacker Hacks the Network Using Sniffers?How to Defend Against Sniffing?Sniffing Prevention TechniquesHow to Detect Sniffing?Promiscuous Detection Tool: PromqryUIPromiscuous Detection Tool: PromiScan
 
  
Module 09: Social Engineering 
What is Social Engineering?Behaviors Vulnerable to Attacks 
Factors that Make Companies Vulnerable to Attacks Why is Social Engineering Effective?Warning Signs of an AttackPhases in a Social Engineering AttackImpact on the OrganizationCommand Injection AttacksCommon Targets of Social Engineering
Common Targets of Social Engineering: Office WorkersTypes of Social Engineering
Human-Based Social Engineering
 
Technical Support ExampleAuthority Support ExampleHuman-based Social Engineering: Dumpster Diving Computer-Based Social Engineering
Computer-Based Social Engineering: Pop-UpsComputer-Based Social Engineering: PhishingSocial Engineering Using SMSSocial Engineering by a “Fake SMS Spying Tool”
 Insider Attack
Disgruntled EmployeePreventing Insider ThreatsCommon Intrusion Tactics and Strategies for PreventionSocial Engineering Through Impersonation on Social Networking Sites
Social Engineering Example: LinkedIn ProfileSocial Engineering on FacebookSocial Engineering on TwitterSocial Engineering on OrkutSocial Engineering on MySpaceRisks of Social Networking to Corporate NetworksIdentity Theft Statistics 2010
Identify TheftHow to Steal an Identity?STEP 1STEP 2STEP 3Real Steven Gets Huge Credit Card StatementIdentity Theft - Serious ProblemSocial Engineering Countermeasures: Policies
Social Engineering CountermeasuresHow to Detect Phishing Emails?
Anti-Phishing Toolbar: NetcraftAnti-Phishing Toolbar: PhishTankIdentity Theft CountermeasuresSocial Engineering Pen Testing
Social Engineering Pen Testing: Using EmailsSocial Engineering Pen Testing: Using PhoneSocial Engineering Pen Testing: In Person
 
  
Module 10: Denial of Service 
What is a Denial of Service Attack?What is Distributed Denial of Service Attacks? 
How Distributed Denial of Service Attacks Work? Symptoms of a DoS AttackCyber Criminals
Organized Cyber Crime: Organizational ChartInternet Chat Query (ICQ)Internet Relay Chat (IRC)DoS Attack Techniques
Bandwidth AttacksService Request FloodsSYN AttackSYN FloodingICMP Flood AttackPeer-to-Peer AttacksPermanent Denial-of-Service AttackApplication Level Flood AttacksBotnet
Botnet Propagation TechniqueBotnet EcosystemBotnet Trojan: SharkPoison Ivy: Botnet Command Control CenterBotnet Trojan: PlugBotWikiLeak Operation Payback
DDoS AttackDDoS Attack Tool: LOICDenial of Service Attack Against MasterCard, Visa, and Swiss BanksHackers Advertise Links to Download BotnetDoS Attack ToolsDetection Techniques
Activity ProfilingWavelet AnalysisSequential Change-Point DetectionDoS/DDoS Countermeasure StrategiesDDoS Attack Countermeasures
DoS/DDoS Countermeasures: Protect Secondary VictimsDoS/DDoS Countermeasures: Detect and Neutralize HandlersDoS/DDoS Countermeasures: Detect Potential AttacksDoS/DDoS Countermeasures: Deflect AttacksDoS/DDoS Countermeasures: Mitigate AttacksPost-attack ForensicsTechniques to Defend against BotnetsDoS/DDoS CountermeasuresDoS/DDoS Protection at ISP LevelEnabling TCP Intercept on Cisco IOS SoftwareAdvanced DDoS Protection: IntelliGuard DDoS Protection System (DPS)DoS/DDoS Protection ToolDenial of Service (DoS) Attack Penetration Testing
 
  
Module 11: Session Hijacking 
What is Session Hijacking?Dangers Posed by HijackingWhy Session Hijacking is Successful?Key Session Hijacking TechniquesBrute Forcing 
HTTP Referrer AttackSpoofing vs. HijackingSession Hijacking ProcessPacket Analysis of a Local Session HijackTypes of Session Hijacking
Session Hijacking in OSI ModelApplication Level Session HijackingSession SniffingPredictable Session Token
How to Predict a Session Token?Man-in-the-Middle AttackMan-in-the-Browser Attack
Steps to Perform Man-in-the-Browser AttackClient-side AttacksCross-site Script AttackSession Fixation
Network Level Session HijackingThe 3-Way HandshakeSequence Numbers
Sequence Number PredictionTCP/IP HijackingIP Spoofing: Source Routed PacketsRST HijackingBlind HijackingMan-in-the-Middle Attack using Packet SnifferUDP HijackingSession Hijacking Tools
ParosBurp SuiteFiresheepCountermeasuresProtecting against Session HijackingMethods to Prevent Session Hijacking: To be Followed by Web DevelopersMethods to Prevent Session Hijacking: To be Followed by Web UsersDefending against Session Hijack AttacksSession Hijacking RemediationIPSec
Modes of IPSecIPSec ArchitectureIPSec Authentication and ConfidentialityComponents of IPSecIPSec ImplementationSession Hijacking Pen Testing 
  
Module 12: Hijacking Webservers 
Webserver Market SharesOpen Source Webserver ArchitectureIIS Webserver ArchitectureWebsite DefacementCase StudyWhy Web Servers are Compromised?Impact of Webserver AttacksWebserver Misconfiguration 
Directory Traversal AttacksHTTP Response Splitting AttackWeb Cache Poisoning AttackHTTP Response HijackingSSH Bruteforce AttackMan-in-the-Middle AttackWebserver Password Cracking
Webserver Password Cracking TechniquesWeb Application AttacksWebserver Attack Methodology
Information GatheringWebserver Footprinting 
Webserver Footprinting Tools Mirroring a WebsiteVulnerability ScanningSession HijackingHacking Web Passwords
 Webserver Attack Tools
Metasploit
Metasploit ArchitectureMetasploit Exploit ModuleMetasploit Payload ModuleMetasploit Auxiliary ModuleMetasploit NOPS ModuleWfetchWeb Password Cracking Tool
Countermeasures
Patches and UpdatesProtocolsAccountsFiles and DirectoriesHow to Defend Against Web Server Attacks?How to Defend against HTTP Response Splitting and Web Cache Poisoning?Patches and HotfixesWhat is Patch Management?Identifying Appropriate Sources for Updates and PatchesInstallation of a PatchPatch Management Tool: Microsoft Baseline Security Analyzer (MBSA)
Web Application Security Scanner: SandcatWeb Server Security Scanner: WiktoWebserver Malware Infection Monitoring Tool: HackAlertWebserver Security ToolsWeb Server Penetration Testing
 
Module 13: Hacking Web Applications 
Web Application Security StatisticsIntroduction to Web ApplicationsWeb Application ComponentsHow Web Applications Work?Web Application ArchitectureWeb 2.0 ApplicationsVulnerability StackWeb Attack VectorsWeb Application Threats - 1Web Application Threats - 2Unvalidated InputParameter/Form TamperingDirectory TraversalSecurity MisconfigurationInjection Flaws 
SQL Injection AttacksCommand Injection AttacksCommand Injection ExampleFile Injection Attack What is LDAP Injection?How LDAP Injection Works?Hidden Field Manipulation AttackCross-Site Scripting (XSS) Attacks
How XSS Attacks Work?Cross-Site Scripting Attack Scenario: Attack via EmailXSS Example: Attack via EmailXSS Example: Stealing Users' CookiesXSS Example: Sending an Unauthorized RequestXSS Attack in Blog PostingXSS Attack in Comment FieldXSS Cheat SheetCross-Site Request Forgery (CSRF) AttackHow CSRF Attacks Work?Web Application Denial-of-Service (DoS) Attack
Denial of Service (DoS) ExamplesBuffer Overflow AttacksCookie/Session Poisoning
How Cookie Poisoning Works?Session Fixation AttackInsufficient Transport Layer ProtectionImproper Error HandlingInsecure Cryptographic StorageBroken Authentication and Session ManagementUnvalidated Redirects and ForwardsWeb Services Architecture
Web Services AttackWeb Services Footprinting AttackWeb Services XML PoisoningFootprint Web Infrastructure
Footprint Web Infrastructure: Server DiscoveryFootprint Web Infrastructure: Server Identification/Banner GrabbingFootprint Web Infrastructure: Hidden Content DiscoveryWeb Spidering Using Burp SuiteHacking Web Servers
Web Server Hacking Tool: WebInspectAnalyze Web Applications
Analyze Web Applications: Identify Entry Points for User InputAnalyze Web Applications: Identify Server-Side TechnologiesAnalyze Web Applications: Identify Server-Side FunctionalityAnalyze Web Applications: Map the Attack SurfaceAttack Authentication MechanismUsername EnumerationPassword Attacks: Password Functionality ExploitsPassword Attacks: Password GuessingPassword Attacks: Brute-forcingSession Attacks: Session ID Prediction/ Brute-forcingCookie Exploitation: Cookie PoisoningAuthorization Attack
HTTP Request TamperingAuthorization Attack: Cookie Parameter TamperingSession Management Attack
Attacking Session Token Generation MechanismAttacking Session Tokens Handling Mechanism: Session Token SniffingInjection AttacksAttack Data Connectivity
Connection String InjectionConnection String Parameter Pollution (CSPP) AttacksConnection Pool DoSAttack Web App ClientAttack Web ServicesWeb Services Probing Attacks
Web Service Attacks: SOAP InjectionWeb Service Attacks: XML InjectionWeb Services Parsing AttacksWeb Service Attack Tool: soapUIWeb Service Attack Tool: XMLSpyWeb Application Hacking Tool: Burp Suite ProfessionalWeb Application Hacking Tools: CookieDiggerWeb Application Hacking Tools: WebScarab
Web Application Hacking ToolsEncoding Schemes
How to Defend Against SQL Injection Attacks?How to Defend Against Command Injection Flaws?How to Defend Against XSS Attacks?How to Defend Against DoS Attack?How to Defend Against Web Services Attack?Web Application Countermeasures
How to Defend Against Web Application Attacks?Web Application Security Tool: Acunetix Web Vulnerability ScannerWeb Application Security Tool: Falcove Web Vulnerability ScannerWeb Application Security Scanner: NetsparkerWeb Application Security Tool: N-Stalker Web Application Security ScannerWeb Application Security ToolsWeb Application Firewall:  dotDefenderWeb Application Firewall: IBM AppScanWeb Application Firewall: ServerDefender VP
Web Application Pen Testing
Information GatheringConfiguration Management TestingAuthentication TestingSession Management TestingAuthorization TestingData Validation TestingDenial of Service TestingWeb Services TestingAJAX Testing
 
  
Module 14: SQL Injection 
SQL Injection is the Most Prevalent Vulnerability in 2010SQL Injection ThreatsWhat is SQL Injection?SQL Injection AttacksHow Web Applications Work?Server Side TechnologiesHTTP Post Request 
Example 1: Normal SQL QueryExample 1: SQL Injection QueryExample 1: Code AnalysisExample 2: BadProductList.aspxExample 2: Attack AnalysisExample 3: Updating TableExample 4: Adding New RecordsExample 5: Identifying the Table NameExample 6: Deleting a Table SQL Injection Detection
SQL Injection Error MessagesSQL Injection Attack CharactersAdditional Methods to Detect SQL InjectionSQL Injection Black Box Pen Testing
Testing for SQL InjectionTypes of SQL Injection
Simple SQL Injection AttackUnion SQL Injection ExampleSQL Injection Error BasedWhat is Blind SQL Injection?
No Error Messages ReturnedBlind SQL Injection: WAITFOR DELAY YES or NO ResponseBlind SQL Injection – Exploitation (MySQL)Blind SQL Injection - Extract Database UserBlind SQL Injection - Extract Database NameBlind SQL Injection - Extract Column NameBlind SQL Injection - Extract Data from ROWSSQL Injection MethodologyInformation Gathering
Extracting Information through Error MessagesUnderstanding SQL QueryBypass Website Logins Using SQL InjectionDatabase, Table, and Column Enumeration
Features of Different DBMSs
Creating Database AccountsPassword Grabbing
Grabbing SQL Server HashesExtracting SQL Hashes (In a Single Statement)Transfer Database to Attacker’s MachineInteracting with the Operating SystemInteracting with the FileSystemNetwork Reconnaissance Full QuerySQL Injection Tools
SQL Injection Tools: BSQLHackerSQL Injection Tools: Marathon ToolSQL Injection Tools: SQL Power InjectorSQL Injection Tools: HavijEvading IDS
Types of Signature Evasion TechniquesEvasion Technique: Sophisticated MatchesEvasion Technique: Hex EncodingEvasion Technique: Manipulating White SpacesEvasion Technique: In-line CommentEvasion Technique: Char EncodingEvasion Technique: String ConcatenationEvasion Technique: Obfuscated CodesHow to Defend Against SQL Injection Attacks?
How to Defend Against SQL Injection Attacks: Use Type-Safe SQL ParametersSQL Injection Detection Tools
SQL Injection Detection Tool: Microsoft Source Code AnalyzerSQL Injection Detection Tool: Microsoft UrlScanSQL Injection Detection Tool: dotDefenderSQL Injection Detection Tool: IBM AppScanSnort Rule to Detect SQL Injection Attacks
 
  
Module 15: Hacking Wireless Networks 
Wireless NetworksWi-Fi Usage Statistics in the USWi-Fi Hotspots at Public PlacesWi-Fi Networks at HomeTypes of Wireless NetworksWireless StandardsService Set Identifier (SSID)Wi-Fi Authentication Modes 
Wi-Fi Authentication Process Using a Centralized Authentication ServerWi-Fi Authentication Process Wireless TerminologiesWi-Fi Chalking
Wi-Fi Hotspot Finder: jiwire.comWi-Fi Hotspot Finder: WeFi.comTypes of Wireless AntennaParabolic Grid AntennaTypes of Wireless EncryptionWEP Encryption
What is WPA?
Temporal KeysWhat is WPA2?
WEP vs. WPA vs. WPA2WEP IssuesWeak Initialization Vectors (IV)How to Break WEP Encryption?How to Break WPA/WPA2 Encryption?How to Defend Against WPA Cracking?Wireless Threats: Access Control AttacksWireless Threats: Integrity AttacksWireless Threats: Confidentiality AttacksWireless Threats: Availability AttacksWireless Threats: Authentication AttacksRogue Access Point AttackClient Mis-associationMisconfigured Access Point AttackUnauthorized AssociationAd Hoc Connection AttackHoneySpot Access Point AttackAP MAC SpoofingDenial-of-Service AttackJamming Signal AttackWi-Fi Jamming DevicesWireless Hacking MethodologyFind Wi-Fi Networks to AttackAttackers Scanning for Wi-Fi NetworksFootprint the Wireless NetworkWi-Fi Discovery Tool: inSSIDerWi-Fi Discovery Tool: NetSurveyorWi-Fi Discovery Tool: NetStumblerWi-Fi Discovery Tool: VistumblerWi-Fi Discovery Tool: WirelessMonWi-Fi Discovery ToolsGPS Mapping
GPS Mapping Tool: WIGLEGPS Mapping Tool: SkyhookHow to Discover Wi-Fi Network Using Wardriving?Wireless Traffic AnalysisWireless Cards and ChipsetsWi-Fi USB Dongle: AirPcapWi-Fi Packet Sniffer: Wireshark with AirPcapWi-Fi Packet Sniffer: Wi-Fi PilotWi-Fi Packet Sniffer: OmniPeekWi-Fi Packet Sniffer: CommView for Wi-FiWhat is Spectrum Analysis?Wireless SniffersAircrack-ng SuiteHow to Reveal Hidden SSIDsFragmentation AttackHow to Launch MAC Spoofing Attack?Denial of Service: Deauthentication and Disassociation AttacksMan-in-the-Middle AttackMITM Attack Using Aircrack-ngWireless ARP Poisoning AttackRogue Access PointEvil Twin
How to Set Up a Fake Hotspot (Evil Twin)?How to Crack WEP Using Aircrack?How to Crack WEP Using Aircrack? Screenshot 1/2How to Crack WEP Using Aircrack? Screenshot 2/2How to Crack WPA-PSK Using Aircrack?WPA Cracking Tool: KisMACWEP Cracking Using Cain & AbelWPA Brute Forcing Using Cain & AbelWPA Cracking Tool: Elcomsoft Wireless Security AuditorWEP/WPA Cracking ToolsWi-Fi Sniffer: KismetWardriving ToolsRF Monitoring ToolsWi-Fi Connection Manager ToolsWi-Fi Traffic Analyzer ToolsWi-Fi Raw Packet Capturing ToolsWi-Fi Spectrum Analyzing ToolsBluetooth Hacking
Bluetooth StackBluetooth ThreatsHow to BlueJack a Victim?Bluetooth Hacking Tool: Super Bluetooth HackBluetooth Hacking Tool: PhoneSnoopBluetooth Hacking Tool:  BlueScanner
How to Defend Against Bluetooth Hacking?How to Detect and Block Rogue AP?Wireless Security LayersHow to Defend Against Wireless Attacks?Wireless Intrusion Prevention SystemsWireless IPS DeploymentWi-Fi Security Auditing Tool: AirMagnet WiFi AnalyzerWi-Fi Security Auditing Tool: AirDefenseWi-Fi Security Auditing Tool: Adaptive Wireless IPSWi-Fi Security Auditing Tool: Aruba RFProtect WIPSWi-Fi Intrusion Prevention SystemWi-Fi Predictive Planning ToolsWi-Fi Vulnerability Scanning ToolsWireless Penetration Testing
Wireless Penetration Testing FrameworkWi-Fi Pen Testing FrameworkPen Testing LEAP Encrypted WLANPen Testing WPA/WPA2 Encrypted WLANPen Testing WEP Encrypted WLANPen Testing Unencrypted WLAN
 
  
Module 16: Evading IDS, Firewalls, and Honeypots 
Intrusion Detection Systems (IDS) and its PlacementHow IDS Works?Ways to Detect an IntrusionTypes of Intrusion Detection SystemsSystem Integrity Verifiers (SIV)General Indications of IntrusionsGeneral Indications of System IntrusionsFirewall 
DeMilitarized Zone (DMZ)Types of Firewall
Packet Filtering FirewallCircuit-Level Gateway FirewallApplication-Level FirewallStateful Multilayer Inspection FirewallFirewall Identification
Port ScanningFirewalkingBanner GrabbingHoneypot
How to Set Up a Honeypot?Intrusion Detection Tool
SnortSnort RulesRule Actions and IP ProtocolsThe Direction Operator and IP AddressesPort NumbersIntrusion Detection Systems: Tipping Point
Intrusion Detection ToolsFirewall: Sunbelt Personal Firewall
Honeypot Tools
Insertion AttackEvasionDenial-of-Service Attack (DoS)ObfuscatingFalse Positive GenerationSession SplicingUnicode Evasion TechniqueFragmentation AttackOverlapping FragmentsTime-To-Live AttacksInvalid RST PacketsUrgency FlagPolymorphic ShellcodeASCII ShellcodeApplication-Layer AttacksDesynchronizationPre Connection SYNPost Connection SYNOther Types of Evasion
IP Address SpoofingAttacking Session Token Generation MechanismTiny FragmentsBypass Blocked Sites Using IP Address in Place of URL
Bypass Blocked Sites Using Anonymous Website Surfing SitesBypass a Firewall using Proxy Server
Bypassing Firewall through ICMP Tunneling MethodBypassing Firewall through ACK Tunneling MethodBypassing Firewall through HTTP Tunneling MethodBypassing Firewall through External SystemsBypassing Firewall through MITM AttackDetecting HoneypotsHoneypot Detecting Tool: Send-Safe Honeypot HunterFirewall Evasion Tools
Traffic IQ Professionaltcp-over-dnsFirewall Evasion ToolsPacket Fragment GeneratorsCountermeasuresFirewall/IDS Penetration Testing
Firewall Penetration TestingIDS Penetration Testing 
  
Module 17: Buffer Overflow 
Buffer OverflowsWhy are Programs And Applications Vulnerable?Understanding StacksStack-Based Buffer OverflowUnderstanding Heap 
Heap-Based Buffer Overflow Stack Operations
ShellcodeNo Operations (NOPs)Knowledge Required to Program Buffer Overflow ExploitsBuffer Overflow Steps
Attacking a Real ProgramFormat String ProblemOverflow using Format StringSmashing the StackOnce the Stack is Smashed...Simple Uncontrolled OverflowSimple Buffer Overflow in CCode AnalysisExploiting Semantic Comments in C (Annotations)How to Mutate a Buffer Overflow Exploit?Identifying Buffer OverflowsHow to Detect Buffer Overflows in a Program?BOU (Buffer Overflow Utility)Testing for Heap Overflow Conditions: heap.exeSteps for Testing for Stack Overflow in OllyDbg Debugger
Testing for Stack Overflow in OllyDbg DebuggerTesting for Format String Conditions using IDA ProBoF Detection ToolsDefense Against Buffer Overflows
Preventing BoF AttacksProgramming CountermeasuresData Execution Prevention (DEP)Enhanced Mitigation Experience Toolkit (EMET)
EMET System Configuration SettingsEMET Application Configuration Window/GS http://microsoft.comBoF Security Tools
Buffer Overflow Penetration Testing
 
  
Module 18: Cryptography 
CryptographyTypes of CryptographyGovernment Access to Keys (GAK)CiphersAdvanced Encryption Standard (AES)Data Encryption Standard (DES)RC4, RC5, RC6 AlgorithmsThe DSA and Related Signature SchemesRSA (Rivest Shamir Adleman) 
Example of RSA AlgorithmThe RSA Signature Scheme Message Digest (One-way Bash) Functions
Message Digest Function: MD5Secure Hashing Algorithm (SHA)What is SSH (Secure Shell)?MD5 Hash Calculators: HashCalc, MD5 Calculator and HashMyFilesCryptography Tool: Advanced Encryption PackageCryptography ToolsPublic Key Infrastructure (PKI)Certification AuthoritiesDigital SignatureSSL (Secure Sockets Layer)Transport Layer Security (TLS)Disk Encryption
Disk Encryption Tool: TrueCryptDisk Encryption ToolsCryptography AttacksCode Breaking Methodologies
Meet-in-the-Middle Attack on Digital Signature SchemesCryptanalysis Tool: CrypToolCryptanalysis ToolsOnline MD5 Decryption Tool
 
Module 19: Penetration Testing 
Introduction to Penetration TestingSecurity AssessmentsVulnerability Assessment 
Limitations of  Vulnerability Assessment Penetration TestingWhy Penetration Testing?What Should be Tested?What Makes a Good Penetration Test?ROI on Penetration TestingTesting PointsTesting LocationsTypes of Penetration Testing
External Penetration TestingInternal Security AssessmentBlack-box Penetration TestingGrey-box Penetration TestingWhite-box Penetration TestingAnnounced / Unannounced TestingAutomated TestingManual TestingCommon Penetration Testing TechniquesUsing DNS Domain Name and IP Address InformationEnumerating Information about Hosts on Publicly-Available NetworksPhases of Penetration Testing
Pre-Attack PhaseAttack Phase
 
Activity: Perimeter TestingEnumerating DevicesActivity: Acquiring TargetActivity: Escalating PrivilegesActivity: Execute, Implant, and Retract Post-Attack Phase and Activities
Penetration Testing Deliverable Templates
 Penetration Testing Methodology
Application Security Assessment
Web Application Testing - IWeb Application Testing - IIWeb Application Testing - IIINetwork Security AssessmentWireless/Remote Access Assessment
Telephony Security AssessmentSocial EngineeringTesting Network-Filtering DevicesDenial of Service EmulationOutsourcing Penetration Testing Services
Terms of EngagementProject ScopePentest Service Level AgreementsPenetration Testing ConsultantsEvaluating Different Types of Pentest ToolsApplication Security Assessment Tool
Network Security Assessment Tool
Angry IP scannerGFI LANguardWireless/Remote Access Assessment Tool
Telephony Security Assessment Tool
Testing Network-Filtering Device Tool
 
 | 
 |