Module 00 - Student Introduction
- Student Introduction
- Course Materials
- CEHv8 Course Outline
- EC-Council Certification Program
- Certified Ethical Hacker Track
- CEHv8 Exam Information
- Lab Sessions
- What Does CEH Teach You?
- What CEH is NOT?
- Remember This!
- CEH Class Speed
- Live Hacking Website
- Advanced Lab Environment
- Student Computer Checklist
- Launching Command Shell
- Snapshots of Virtual Machines
- AirPcap
- Live Hack Website
- Lets Start Hacking!!!!!
Module 01 - Introduction to Ethical Hacking
- Module Flow: Info Security Overview
- Security News
- Internet Crime Current Report: IC3
- Data Breach Investigations Report
- Essential Terminology
- Elements of Information Security
- The Security, Functionality, and Usability Triangle
- Module Flow: Information Security Threats and Attack Vectors
- Top Information Security Attack Vectors
- Motives, Goals, and Objectives of Information Security Attacks
- Information Security Threats
- Information Warfare
- IPv6 Security Threats
- Module Flow: Hacking Concepts
- Hacking vs. Ethical Hacking
- Effects of Hacking on Business
- Who Is a Hacker?
- Hacker Classes
- Hacktivism
- Module Flow: Hacking Phases
- Hacking Phases
- Module Flow: Types of Attacks
- Types of Attacks on a System
- Operating System Attacks
- Misconfiguration Attacks
- Application-Level Attacks
- Examples of Application-Level Attacks
- Shrink Wrap Code Attacks
- Module Flow: Information Security Controls
- Why Ethical Hacking is Necessary
- Scope and Limitations of Ethical Hacking
- Skills of an Ethical Hacker
- Defense in Depth
- Incident Management Process
- Information Security Policies
- Classification of Security Policies
- Structure and Contents of Security Policies
- Types of Security Policies
- Steps to Create and Implement Security Policies
- Examples of Security Policies
- Vulnerability Research
- Vulnerability Research Websites
- Demo - Vulnerability Research Website
- What is Penetration Testing?
- Why Penetration Testing
- Penetration Testing Methodology
Module 02 - Footprinting and Reconnaissance
- Module Flow: Footprinting Concepts
- Security News
- Footprinting Terminology
- What is Footprinting?
- Why Footprinting?
- Objectives of Footprinting
- Module Flow: Footprinting Threats
- Footprinting Threats
- Module Flow: Footprinting Methodology
- Footprinting Methodology: Footprinting through Search Engines
- Footprinting through Search Engines
- Demo - Footprinting Through Search Engines
- Finding Company's External and Internal URLs
- Public and Restricted Websites
- Collect Location Information
- People Search
- People Search Online Services
- Demo - People Search Using Online Services
- Why Footprinting?
- Objectives of Footprinting
- Module Flow: Footprinting Threats
- Footprinting Threats
- Module Flow: Footprinting Methodology
- Footprinting Methodology: Footprinting through Search Engines
- Footprinting through Search Engines
- Demo - Footprinting Through Search Engines
- Finding Company's External and Internal URLs
- Public and Restricted Websites
- Collect Location Information
- People Search
- People Search Online Services
- Demo - People Search Using Online Services
- People Search on Social Networking Services
- Gather Information from Financial Services
- Footprinting through Job Sites
- Monitoring Target Using Alerts
- Footprinting Methodology: Website Footprinting
- Website Footprinting
- Mirroring Entire Website
- Website Mirroring Tools
- Extract Website Information from http://www.archive.org
- Monitoring Web Updates Using Website Watcher
- Footprinting Methodology:
- Gather Information from Financial Services
- Footprinting through Job Sites
- Monitoring Target Using Alerts
- Footprinting Methodology: Website Footprinting
- Website Footprinting
- Mirroring Entire Website
- Website Mirroring Tools
- Extract Website Information from http://www.archive.org
- Monitoring Web Updates Using Website Watcher
- Footprinting Methodology:
- E-mail Footprinting
- Tracking Email Communications
- Collecting Information from Email Header
- Email Tracking Tools
- Demo - Tracking Emails with ReadNotify
- Footprinting Methodology: Competitive Intelligence
- Competitive Intelligence Gathering
- Competitive Intelligence - When Did this Company Begin? How Did it Develop?
- Competitive Intelligence - What Are the Company's Plans?
- Competitive Intelligence - What Expert Opinions Say About the Company
- Footprinting Methodology: Footprinting using Google
- Footprint Using Google Hacking Techniques
- What a Hacker can do with Google Hacking?
- Google Advance Search Operators
- Finding Resources using Google Advance Operator
- Google Hacking Tool: Google Hacking Database (GHDB)
- Google Hacking Tools
- Demo - Google Hacking
- Footprinting Methodology: WHOIS Footprinting
- WHOIS Lookup
- WHOIS Lookup Result Analysis
- WHOIS Lookup Tool: SmartWhois
- WHOIS Lookup Tools
- WHOIS Lookup Online Tools
- Demo - SmartWhois
- Footprinting Methodology: DNS Footprinting
- Extracting DNS Information
- Demo - DNS Overview
- DNS Interrogation Tools
- Footprinting Methodology: Network Footprinting
- Locate the Network Range
- Determine the Operating System
- Traceroute
- Traceroute Analysis
- Traceroute Tools
- Footprinting Methodology: Footprinting through Social Engineering
- Footprinting through Social Engineering
- Collect Information Using Eavesdropping Shoulder Surfing, and Dumpster Diving
- Footprinting Methodology: Footprinting through Social Networking Sites
- Collect Information through Social Engineering on Social Networking Sites
- Information Available on Social Networking Sites
- Collecting Facebook Information
- Collecting Twitter Information
- Collecting Linkedin Information
- Collecting Youtube Information
- Tracking Users on Social Networking Sites
- Module Flow: Footprinting Tools
- Footprinting Tool: Maltego
- Footprinting Tool: Domain Name Analyzer Pro
- Footprinting Tool: Web Data Extractor
- Additional Footprinting Tools
- Module Flow: Footprinting Countermeasures
- Footprinting Countermeasures
- Module Flow: Footprinting Penetration Testing
- Footprinting Pen Testing
- Footprinting Pen Testing Report Templates
- Demo - HTTrack and Website Watcher
Module 03 - Scanning Networks
- Scanning Networks
- Security News
- Overview of Network Scanning
- CEH Scanning Methodology: Check for Live Systems
- Checking for Live Systems - ICMP Scanning
- Ping Sweep
- Ping Sweep Tools
- Demo - Angry IP
- CEH Scanning Methodology: Check for Open Ports
- Three-Way Handshake
- TPC Communication Flags
- Create Custom Packet Using TCP Flags
- Scanning IPv6 Network
- Scanning Tool: Nmap
- Demo - Nmap
- Hping2 / Hping3
- Hping Commands
- Scanning Techniques
- TCP Connect/Full Open Scan
- Stealth Scan (Half-open Scan)
- Xmas Scan
- FIN Scan
- NULL Scan
- IDLE Scan
- IDLE Scan: Step 1
- IDLE Scan: Step 2 and 3
- ICMP Echo Scanning/List Scan
- UDP Scanning
- Inverse TCP Flag Scanning
- ACK Flag Scanning
- Scanning Tool: NetScan Tools Pro
- Scanning Tools
- Do Not Scan These IP Addresses
- Port Scanning Countermeasures
- CEH Scanning Methodology: Scanning Beyond IDS
- IDS Evasion Techniques
- SYN/FIN Scanning Using IP Fragments
- CEH Scanning Methodology: Banner Grabbing
- Banner Grabbing
- Banner Grabbing Tools
- Demo - Banner Grabbing Using Telnet
- Demo - Footprinting Webservers Using Netcraft
- Banner Grabbing Countermeasures: Disabling or Changing Banner
- Hiding File Extensions from Webpages
- CEH Scanning Methodology: Scan for Vulnerability
- Vulnerability Scanning
- Vulnerability Scanning Tool: Nessus
- Demo - Vulnerability Scanning with Nessus
- Tracking Email Communications
- Collecting Information from Email Header
- Email Tracking Tools
- Demo - Tracking Emails with ReadNotify
- Footprinting Methodology: Competitive Intelligence
- Competitive Intelligence Gathering
- Competitive Intelligence - When Did this Company Begin? How Did it Develop?
- Competitive Intelligence - What Are the Company's Plans?
- Competitive Intelligence - What Expert Opinions Say About the Company
- Footprinting Methodology: Footprinting using Google
- Footprint Using Google Hacking Techniques
- What a Hacker can do with Google Hacking?
- Google Advance Search Operators
- Finding Resources using Google Advance Operator
- Google Hacking Tool: Google Hacking Database (GHDB)
- Google Hacking Tools
- Demo - Google Hacking
- Footprinting Methodology: WHOIS Footprinting
- WHOIS Lookup
- WHOIS Lookup Result Analysis
- WHOIS Lookup Tool: SmartWhois
- WHOIS Lookup Tools
- WHOIS Lookup Online Tools
- Demo - SmartWhois
- Footprinting Methodology: DNS Footprinting
- Extracting DNS Information
- Demo - DNS Overview
- DNS Interrogation Tools
- Footprinting Methodology: Network Footprinting
- Locate the Network Range
- Determine the Operating System
- Traceroute
- Traceroute Analysis
- Traceroute Tools
- Footprinting Methodology: Footprinting through Social Engineering
- Footprinting through Social Engineering
- Collect Information Using Eavesdropping Shoulder Surfing, and Dumpster Diving
- Footprinting Methodology: Footprinting through Social Networking Sites
- Collect Information through Social Engineering on Social Networking Sites
- Information Available on Social Networking Sites
- Collecting Facebook Information
- Collecting Twitter Information
- Collecting Linkedin Information
- Collecting Youtube Information
- Tracking Users on Social Networking Sites
- Module Flow: Footprinting Tools
- Footprinting Tool: Maltego
- Footprinting Tool: Domain Name Analyzer Pro
- Footprinting Tool: Web Data Extractor
- Additional Footprinting Tools
- Module Flow: Footprinting Countermeasures
- Footprinting Countermeasures
- Module Flow: Footprinting Penetration Testing
- Footprinting Pen Testing
- Footprinting Pen Testing Report Templates
- Demo - HTTrack and Website Watcher
Module 03 - Scanning Networks
- Scanning Networks
- Security News
- Overview of Network Scanning
- CEH Scanning Methodology: Check for Live Systems
- Checking for Live Systems - ICMP Scanning
- Ping Sweep
- Ping Sweep Tools
- Demo - Angry IP
- CEH Scanning Methodology: Check for Open Ports
- Three-Way Handshake
- TPC Communication Flags
- Create Custom Packet Using TCP Flags
- Scanning IPv6 Network
- Scanning Tool: Nmap
- Demo - Nmap
- Hping2 / Hping3
- Hping Commands
- Scanning Techniques
- TCP Connect/Full Open Scan
- Stealth Scan (Half-open Scan)
- Xmas Scan
- FIN Scan
- NULL Scan
- IDLE Scan
- IDLE Scan: Step 1
- IDLE Scan: Step 2 and 3
- ICMP Echo Scanning/List Scan
- UDP Scanning
- Inverse TCP Flag Scanning
- ACK Flag Scanning
- Scanning Tool: NetScan Tools Pro
- Scanning Tools
- Do Not Scan These IP Addresses
- Port Scanning Countermeasures
- CEH Scanning Methodology: Scanning Beyond IDS
- IDS Evasion Techniques
- SYN/FIN Scanning Using IP Fragments
- CEH Scanning Methodology: Banner Grabbing
- Banner Grabbing
- Banner Grabbing Tools
- Demo - Banner Grabbing Using Telnet
- Demo - Footprinting Webservers Using Netcraft
- Banner Grabbing Countermeasures: Disabling or Changing Banner
- Hiding File Extensions from Webpages
- CEH Scanning Methodology: Scan for Vulnerability
- Vulnerability Scanning
- Vulnerability Scanning Tool: Nessus
- Demo - Vulnerability Scanning with Nessus
- Vulnerability Scanning Tool: GFI LanGuard
- Vulnerability Scanning Tool: SAINT
- Network Vulnerability Scanners
- CEH Scanning Methodology: Draw Network Diagrams
- Drawing Network Diagrams
- Network Discovery Tool: LANsurveyor
- Network Discovery Tool: OpManager
- Network Discovery Tool: NetworkView
- Network Discovery Tool: The Dude
- Network Discovery and Mapping Tools
- CEH Scanning Methodology: Prepare Proxies
- Proxy Servers
- Why Attackers Use Proxy Servers?
- Use of Proxies for Attack
- Proxy Chaining
- Proxy Tool: Proxy Workbench
- Proxy Tool: Proxifier
- Proxy Tool: Proxy Switcher
- Proxy Tool: SocksChain
- Proxy Tool: TOR (The Onion Routing)
- Proxy Tools
- Free Proxy Servers
- HTTP Tunneling Techniques
- Why do I Need HTTP Tunneling
- HTTP Tunneling Tool: Super Network Tunnel
- HTTP Tunneling Tool: HTTP-Tunnel
- SSH Tunneling
- SSH Tunneling Tool: Bitvise
- Anonymizers
- Case: Bloggers Write Text Backwards to Bypass Web Filters in China
- Censorship Circumvention Tool: Psiphon
- Censorship Circumvention Tool: Your-Freedom
- How to Check if Your Website is Blocked in China or Not?
- G-Zapper
- Anonymizers (Cont.)
- Spoofing IP Address
- IP Spoofing Detection Techniques: Direct TTL Probes
- IP Spoofing Detection Techniques: IP Identification Number
- IP Spoofing Detection Techniques: TCP Flow Control Method
- IP Spoofing Countermeasures
- CEH Scanning Methodology: Scanning Pen Testing
- Scanning Pen Testing
- Vulnerability Scanning Tool: SAINT
- Network Vulnerability Scanners
- CEH Scanning Methodology: Draw Network Diagrams
- Drawing Network Diagrams
- Network Discovery Tool: LANsurveyor
- Network Discovery Tool: OpManager
- Network Discovery Tool: NetworkView
- Network Discovery Tool: The Dude
- Network Discovery and Mapping Tools
- CEH Scanning Methodology: Prepare Proxies
- Proxy Servers
- Why Attackers Use Proxy Servers?
- Use of Proxies for Attack
- Proxy Chaining
- Proxy Tool: Proxy Workbench
- Proxy Tool: Proxifier
- Proxy Tool: Proxy Switcher
- Proxy Tool: SocksChain
- Proxy Tool: TOR (The Onion Routing)
- Proxy Tools
- Free Proxy Servers
- HTTP Tunneling Techniques
- Why do I Need HTTP Tunneling
- HTTP Tunneling Tool: Super Network Tunnel
- HTTP Tunneling Tool: HTTP-Tunnel
- SSH Tunneling
- SSH Tunneling Tool: Bitvise
- Anonymizers
- Case: Bloggers Write Text Backwards to Bypass Web Filters in China
- Censorship Circumvention Tool: Psiphon
- Censorship Circumvention Tool: Your-Freedom
- How to Check if Your Website is Blocked in China or Not?
- G-Zapper
- Anonymizers (Cont.)
- Spoofing IP Address
- IP Spoofing Detection Techniques: Direct TTL Probes
- IP Spoofing Detection Techniques: IP Identification Number
- IP Spoofing Detection Techniques: TCP Flow Control Method
- IP Spoofing Countermeasures
- CEH Scanning Methodology: Scanning Pen Testing
- Scanning Pen Testing
Module 04 - Enumeration
- Module Flow: Enumeration Concepts
- Security News
- What is Enumeration?
- Techniques for Enumeration
- Services and Ports to Enumerate
- Module Flow: NetBIOS Enumeration
- Netbios Enumeration
- NetBIOS Enumeration Tool: SuperScan
- Demo - Enumerating Users Using Null Sessions
- NetBIOS Enumeration Tool: Hyena
- NetBIOS Enumeration Tool: Winfingerprint
- NetBIOS Enumeration Tool: NetBIOS Enumerator
- Enumerating User Accounts
- Enumerate Systems Using Default Passwords
- Module Flow: SNMP Enumeration
- SNMP (Simple Network Management Protocol) Enumeration
- Working of SNMP
- Management Information Base (MIB)
- SNMP Enumeration Tool: OpUtils
- SNMP Enumeration Tool: SolarWind's IP Network Browser
- Demo - SNMP Enumeration with Solar Winds
- SNMP Enumeration Tools
- Module Flow: UNIX/Linux Enumeration
- UNIX/Linux Enumeration Commands
- Linux Enumeration Tool: Enum4linux
- Module Flow: LDAP Enumeration
- LDAP Enumeration
- LDAP Enumeration Tool: Softerra LDAP Administrator
- LDAP Enumeration Tools
- Module Flow: NTP Enumeration
- NTP Enumeration
- NTP Enumeration Commands
- Module Flow: SMTP Enumeration
- SMTP Enumeration
- SMTP Enumeration Tool: NetScanTools Pro
- Module Flow: DNS Enumeration
- DNS Zone Transfer Enumeration Using NSLookup
- Demo - Enumerating DNS Using nslookup
- Module Flow: Enumeration Countermeasures
- Enumeration Countermeasures
- SMB Enumeration Countermeasures
- Module Flow: Enumeration Pen Testing
- Enumeration Pen Testing
Module 05 - System Hacking
- System Hacking
- Security News
- Information at Hand Before System Hacking Stage
- System Hacking: Goals
- CEH Hacking Methodology (CHM)
- CEH System Hacking Steps: Cracking Passwords
- Password Cracking
- Password Complexity
- Password Cracking Techniques
- Demo - Password Cracking with Cain
- Types of Password Attacks
- Passive Online Attack: Wire Sniffing
- Passive Online Attacks: Man-in-the-Middle and Replay Attack
- Active Online Attack: Password Guessing
- Active Online Attack: Trojan/Spyware/Keylogger
- Active Online Attack: Hash Injection Attack
- Offline Attack: Rainbow Attacks
- Tools to Create Rainbow Tables: Winrtgen and rtgen
-Demo - Making Rainbow Tables
- Demo - Using Rainbow Tables
- Distributed Network Attack
- Elcomsoft Distributed Password Recovery
- Demo - Distributed Password Cracking with Elcomsoft
- Non-Electronic Attacks
- Demo - Spytector
- Default Passwords
- Manual Password Cracking (Guessing)
- Automatic Password Cracking Algorithm
- Stealing Passwords Using USB Drive
- Stealing Passwords Using Keyloggers
- Microsoft Authentication
- How Hash Passwords are Stored in Windows SAM?
- What is LAN Manager Hash?
- LM "Hash" Generation
- LM, NTLMv1, and NTLMv2
- NTLM Authentication Process
- Kerberos Authentication
- Salting
- Pwdump7 and Fgdump
- L0phtCrack
- Ophcrack
- Cain & Abel
- Demo - Introduction to Cain & Abel
- RainbowCrack
- Password Cracking Tools
- LM Hash Backward Compatibility
- How to Disable LM HASH
- How to Defend against Password Cracking
- Implement and Enforce Strong Security Policy
- CEH System Hacking Steps: Escalating Privileges
- Privilege Escalation
- Privilege Escalation Tool: Active@Password Changer
- Privilege Escalation Tools
- How to Defend against Privilege Escalation
- CEH System Hacking Steps: Executing Applications
- Executing Applications
- Executing Applications: RemoteExec
- Executing Applications: PDQ Deploy
- Executing Applications: DameWare NT Utilities
- Keylogger
- Types of Keystroke Loggers
- Methodology of Attacker in Using Remote Keylogger
- Acoustic/CAM Keylogger
- Keyloggers
- Keylogger: Spytech SpyAgent
- Keylogger: All In One Keylogger
- Keyloggers for Windows
- Keylogger for Mac: Amac Keylogger for Mac
- Keyloggers for Mac
- Hardware Keyloggers
- Spyware
- What Does the Spyware Do?
- Types of Spywares
- Desktop Spyware
- Desktop Spyware: Activity Monitor
- Desktop Spyware (Cont.)
- Email and Internet Spyware
- Email and Internet Spyware: Power Spy
- Internet and E-mail Spyware
- Child Monitoring Spyware
- Child Monitoring Spyware: Net Nanny Home Suite
- Child Monitoring Spyware (Cont.)
- Screen Capturing Spyware
- Screen Capturing Spyware: SoftActivity TS Monitor
- Screen Capturing Spyware (Cont.)
- USB Spyware
- USB Spyware: USBSpy
- USB Spyware (Cont.)
- Audio Spyware
- Audio Spyware: Spy Voice Recorder and Sound Snooper
- Video Spyware
- Video Spyware: Webcam Recorder
- Video Spyware (Cont.)
- Print Spyware
- Print Spyware: Printer Activity Monitor
- Print Spyware (Cont.)
- Telephone/Cellphone Spyware
- Cellphone Spyware: Mobile Spy
- Telephone/Cellphone Spyware (Cont.)
- GPS Spyware
- GPS Spyware: SPYPhone
- GPS Spyware (Cont.)
- How to Defend Against Keyloggers
- Anti-Keylogger
- Anti-Keylogger: Zemana AntiLogger
- Anti-Keylogger (Cont.)
- How to Defend Against Spyware
- Anti-Spyware: PC Tools Spyware Doctor
- Anti-Spywares
- CEH System Hacking Steps: Hiding Files
- Rootkits
- Types of Rootkits
- How Rootkit Works
- Rootkit: Fu
- Demo - Fu Rootkit
- Rootkit: Kbeast
- Rootkit: Hacker Defender HxDef Rootkit
- Detecting Rootkits
- Steps for Detecting Rootkits
- How to Defend Against Rootkits
- Anti-Rootkit: Stinger
- Anti-Rootkit: UnHackMe
- Anti-Rootkits
- NTFS Data Stream
- How to Create NTFS Streams
- NTFS Stream Manipulation
- How to Defend against NTFS Streams
- Demo - Creating Alternate Data Streams
- NTFS Stream Detector: StreamArmor
- NTFS Stream Detectors
- What is Steganography?
- Application of Steganography
- Classification of Steganography
- Technical Steganography
- Linguistic Steganography
- Steganography Techniques
- How Steganography Works
- Types of Steganography
- Whitespace Steganography Tool: SNOW
- Image Steganography
- Least Significant Bit Insertion
- Masking and Filtering
- Algorithms and Transformation
- Image Steganography: QuickStego
- Image Steganography Tools
- Document Steganography: wbStego
- Document Steganography Tools
- Video Steganography
- Video Steganography: OmniHide PRO
- Video Steganography Tools
- Audio Steganography
- Audio Steganography Methods
- Audio Steganography: DeepSound
- Audio Steganography Tools
- Folder Steganography: Invisible Secrets 4
- Demo - Steganography
- Folder Steganography Tools
- Spam/Email Steganography: Spam Mimic
- Natural Text Steganography: Sams Big G Play Maker
- Issues in Information Hiding
- Steganalysis
- Steganalysis Methods/Attacks on Steganography
- Detecting Text and Image Steganography
- Detecting Audio and Video Steganography
- Steganography Detection Tool: Gargoyle Investigator Forensic Pro
- Steganography Detection Tools
- CEH System Hacking Steps: Covering Tracks
- Why Cover Tracks?
- Covering Tracks
- Ways to Clear Online Tracks
- Disabling Auditing: Auditpol
- Covering Tracks Tool: CCleaner
- Covering Tracks Tool: MRU-Blaster
- Track Covering Tools
- CEH System Hacking Steps: Penetration Testing
- Password Cracking
- Privilege Escalation
- Executing Applications
- Hiding Files
- Covering Tracks
Module 06 - Trojans and Backdoors
Module Flow: Trojan Concepts
Security News
What is a Trojan?
Communication Paths: Overt and Covert Channels
Purpose of Trojans
What Do Trojan Creators Look For
Indications of a Trojan Attack
Common Ports used by Trojans
Module Flow: Trojan Infection
How to Infect Systems Using a Trojan
Wrappers
Wrapper Covert Programs
Different Ways a Trojan can Get into a System
How to Deploy a Trojan
Evading Anti-Virus Techniques
Module Flow: Types of Trojans
Types of Trojans
Command Shell Trojans
Command Shell Trojan: Netcat
Demo - Netcat
GUI Trojan: MoSucker
GUI Trojan: Jumper and Biodox
Document Trojans
E-mail Trojans
E-mail Trojans: RemoteByMail
Defacement Trojans
Defacement Trojans: Restorator
Botnet Trojans
Botnet Trojan: Illusion Bot and NetBot Attacker
Proxy Server Trojans
Proxy Server Trojan: W3bPrOxy Tr0j4nCr34t0r (Funny Name)
FTP Trojans
VNC Trojans
VNC Trojans: WinVNC and VNC Stealer
HTTP/HTTPS Trojans
HTTP Trojan: HTTP RAT
Shttpd Trojan - HTTPS (SSL)
ICMP Tunneling
Remote Access Trojans
Demo - Beast
Remote Access Trojan: RAT DarkComet and Apocalypse
Covert Channel Trojan: CCTT
E-banking Trojans
Banking Trojan Analysis
E-banking Trojan: ZeuS and SpyEye
Destructive Trojans: M4sT3r Trojan
Notification Trojans
Credit Card Trojans
Data Hiding Trojans (Encrypted Trojans)
OS X Trojan: Crisis
MAC OS X Trojan: DNSChanger
Mac OS X Trojan: Hell Raiser
Trojan Analysis: Flame
Flame C&C Server Analysis
Trojan Analysis: SpyEye
Trojan Analysis: ZeroAccess
Trojan Analysis: Duqu
Trojan Analysis: Duqu Framework
Trojan Analysis: Event Driven Framework
Module Flow: Trojan Detection
How to Detect Trojans
Scanning for Suspicious Ports
Port Monitoring Tools: TCPView and CurrPorts
Scanning for Suspicious Processes
Process Monitoring Tool: What's Running
Process Monitoring Tools
Scanning for Suspicious Registry Entries
Registry Entry Monitoring Tool: PC Tools Registry Mechanic
Registry Entry Monitoring Tools
Scanning for Suspicious Device Drivers
Device Drivers Monitoring Tool: DriverView
Device Drivers Monitoring Tools
Scanning for Suspicious Windows Services
Windows Services Monitoring Tools: Windows Service Manager (SrvMan)
Windows Services Monitoring Tools
Scanning for Suspicious Startup Programs
Windows8 Startup Registry Entries
Startup Programs Monitoring Tool: Starter
Startup Programs Monitoring Tool: Security AutoRun
Startup Programs Monitoring Tools
Demo - What's Running?
Scanning for Suspicious Files and Folders
Files and Folder Integrity Checker: FastSum and WinMD5
Files and Folder Integrity Checker
Scanning for Suspicious Network Activities
Detecting Trojans and Worms with Capsa Network Analyzer
Module Flow: Countermeasures
Trojan Countermeasures
Backdoor Countermeasures
Trojan Horse Construction Kit
Module Flow: Anti-Trojan Software
Anti-Trojan Software: TrojanHunter
Anti-Trojan Software: Emsisoft Anti-Malware
Anti-Trojan Softwares
Module Flow: Penetration Testing
Module 07 - Viruses and Worms
Module Flow: Virus and Worms Concepts
Security News
Introduction to Viruses
Virus and Worm Statistics
Stages of Virus Life
Working of Viruses: Infection Phase
Working of Viruses: Attack Phase
Why Do People Create Computer Viruses
Indications of Virus Attack
How does a Computer Get Infected by Viruses
Common Techniques Used to Distribute Malware on the Web
Virus Hoaxes and Fake Antiviruses
Virus Analysis: DNSChanger
Module Flow: Types of Viruses
Types of Viruses
System or Boot Sector Viruses
File and Multipartite Viruses
Macro Viruses
Cluster Viruses
Stealth/Tunneling Viruses
Encryption Viruses
Polymorphic Code
Metamorphic Viruses
File Overwriting or Cavity Viruses
Sparse Infector Viruses
Companion/Camouflage Viruses
Shell Viruses
File Extension Viruses
Add-on and Intrusive Viruses
Transient and Terminate and Stay Resident Viruses
Writing a Simple Virus Program
Terabit Virus Maker
JPS Virus Maker and DELmE's Batch Virus Maker
Demo - JPS Virus Maker Tool
Module Flow: Computer Worms
Computer Worms
How Is a Worm Different from a Virus?
Worm Analysis: Stuxnet
Worm Maker: Internet Worm Maker Thing
Module Flow: Malware Analysis
What is Sheep Dip Computer?
Anti-Virus Sensors Systems
Malware Analysis Procedure: Preparing Testbed
Malware Analysis Procedure
Virus Analysis Tool: IDA Pro
Online Malware Testing: VirusTotal
Online Malware Analysis Services
Module Flow: Countermeasures
Virus Detection Methods
Virus and Worms Countermeasures
Companion Antivirus: Immunet
Anti-virus Tools
Module Flow: Penetration Testing
Penetration Testing for Virus
Module 08 - Sniffing
Module Flow: Sniffing Concepts
Security News
Wiretapping
Lawful Interception
Packet Sniffing
Sniffing Threats
How a Sniffer Works
Types of Sniffing Attacks
Types of Sniffing: Passive Sniffing
Types of Sniffing: Active Sniffing
Protocols Vulnerable to Sniffing
Tie to Data Link Layer in OSI Model
IPv6 Addresses
IPv4 and IPv6 Header Comparison
Hardware Protocol Analyzers
SPAN Port
Module Flow: MAC Attacks
MAC Address/CAM Table
How CAM Works
What Happens When CAM Table is Full?
MAC Flooding
Demo - Port Security
Mac Flooding Switches with macof
MAC Flooding Tool: Yersinia
How to Defend against MAC Attacks
Module Flow: DHCP Attacks
How DHCP Works
DHCP Request/Reply Messages
IPv4 DHCP Packet Format
DHCP Starvation Attack
DHCP Starvation Attack Tools
Rogue DHCP Server Attack
Demo - Rogue DHCP Server
How to Defend Against DHCP Starvation and Rogue Server Attack
Module Flow: ARP Poisoning
What is Address Resolution Protocol (ARP)?
ARP Spoofing Techniques
ARP Spoofing Attack
How Does ARP Spoofing Work
Threats of ARP Poisoning
ARP Poisoning Tool: Cain & Abel
Demo - Active Sniffing with Cain
Demo - Actively Sniffing a Switched Network with Cain
Demo - MITM
ARP Poisoning Tool: WinArpAttacker
ARP Poisoning Tool: Ufasoft Snif
How to Defend Against ARP Poisoning
Configuring DHCP Snooping and Dynamic ARP Inspection on Cisco Switches
ARP Spoofing Detection: XArp
Module Flow: Spoofing Attack
MAC Spoofing/Duplicating
MAC Spoofing Technique: Windows
MAC Spoofing Tool: SMAC
Demo - Spoofing the MAC Address
IRDP Spoofing
How to Defend Against MAC Spoofing
Module Flow: DNS Poisoning
DNS Poisoning Techniques
Intranet DNS Spoofing
Internet DNS Spoofing
Proxy Server DNS Poisoning
DNS Cache Poisoning
How to Defend Against DNS Spoofing
Module Flow: Sniffing Tools
Sniffing Tool: Wireshark
Demo - Packet Capturing with Wireshark
Follow TCP Stream in Wireshark
Display Filters in Wireshark
Additional Wireshark Filters
Sniffing Tool: Cascade Pilot
Sniffing Tool: Tcpdump/Windump
Packet Sniffing Tool: Capsa Network Analyzer
Network Packet Analyzer: OmniPeek Network Analyzer
Network Packet Analyzer: Observer
Network Packet Analyzer: Sniff-O-Matic
Network Packet Analyzer: JitBit Network Sniffer
Chat Message Sniffer: MSN Sniffer 2
TCP/IP Packet Crafter: Colasoft Packet Builder
Additional Sniffing Tools
How an Attacker Hacks the Network Using Sniffers
Module Flow: Countermeasures
How to Defend Against Sniffing
How to Detect Sniffing
Sniffer Detection Technique: Ping Method
Sniffer Detection Technique: ARP Method
Sniffer Detection Technique: DNS Method
Promiscuous Detection Tool: PromqryUI
Module Flow: Sniffing Pen Testing
Sniffing Pen Testing
Module 09 - Social Engineering
Module Flow: Social Engineering Concepts
Security News
There is No Patch to Human Stupidity
What Is Social Engineering?
Behaviors Vulnerable to Attacks
Factors that Make Companies Vulnerable to Attacks
Why Is Social Engineering Effective?
Warning Signs of an Attack
Phases in a Social Engineering Attack
Impact on the Organization
"Rebecca" and "Jessica"
Common Targets of Social Engineering
Common Targets of Social Engineering: Office Workers
Module Flow: Social Engineering Techniques
Types of Social Engineering
Human-based Social Engineering
Technical Support Example
Authority Support Example
Human-based Social Engineering: Eavesdropping and Shoulder Surfing
Human-based Social Engineering: Dumpster Diving
Human-based Social Engineering (Cont.)
Watch these Movies
Watch this Movie
Computer-based Social Engineering
Computer-based Social Engineering: Pop-Ups
Computer-based Social Engineering: Phishing
Computer-based Social Engineering: Spear Phishing
Mobile-based Social Engineering: Publishing Malicious Apps
Mobile-based Social Engineering: Repackaging Legitimate Apps
Mobile-based Social Engineering: Fake Security Applications
Mobile-based Social Engineering: Using SMS
Insider Attack
Disgruntled Employee
Preventing Insider Threats
Common Social Engineering Targets and Defense Strategies
Module Flow: Impersonation on Social Networking Sites
Social Engineering Through Impersonation on Social Networking Sites
Social Engineering on Facebook
Social Engineering Example: LinkedIn Profile
Social Engineering on Twitter
Risks of Social Networking to Corporate Networks
Module Flow: Identity Theft
Identity Theft Statistics 2011
Identity Theft
How to Steal an Identity
Step 1
Step 2
Comparison
Step 3
Real Steven Gets Huge Credit Card Statement
Identity Theft - Serious Problem
Module Flow: Social Engineering Countermeasures
Social Engineering Countermeasures
How to Detect Phishing Emails
Anti-Phishing Toolbar: Netcraft
Demo - Netcraft Anti-Phishing Toolbar
Anti-Phishing Toolbar: PhishTank
Identity Theft Countermeasures
Module Flow: Penetration Testing
Social Engineering Pen Testing
Social Engineering Pen Testing: Using Emails
Social Engineering Pen Testing: Using Phone
Social Engineering Pen Testing: In Person
Social Engineering Pen Testing: Social Engineering Toolkit (SET)
Module 10 - Denial of Service
Module Flow: DoS/DDoS Concepts
Security Newsv What Is a Denial of Service Attack?
What Are Distributed Denial of Service Attacks?
How Distributed Denial of Service Attacks Work
Symptoms of a DoS Attack
Module Flow: DoS/DDoS Attack Techniques
DoS Attack Techniques
Bandwidth Attacks
Service Request Floods
SYN Attack
Demo - SynFlooding with Hping2
SYN Flooding
ICMP Flood Attack
Peer-to-Peer Attacks
Permanent Denial-of-Service Attack
Application Level Flood Attacks
Module Flow: Botnets
Organized Crime Syndicates
Organized Cyber Crime: Organizational Chart
Botnet
Botnet Propagation Technique
Botnet Ecosystem
Botnet Trojan: Shark
Poison Ivy: Botnet Command Control Center
Botnet Trojan: PlugBot
Botnet Trojan: Illusion Bot and NetBot Attacker
Module Flow: DDoS Case Study
DDoS Attack
DDoS Attack Tool: LOIC
Hackers Advertise Links to Download Botnet
Module Flow: DoS/DDoS Attack Tools
DoS Attack Tools
Module Flow: Countermeasures
Detection Techniques
Activity Profiling
Wavelet-based Signal Analysis
Sequential Change-Point Detection
DoS/DDoS Countermeasure Strategies
DDoS Attack Countermeasures
DoS/DDoS Countermeasures: Protect Secondary Victims
DoS/DDoS Countermeasures: Detect and Neutralize Handlers
DoS/DDoS Countermeasures: Detect Potential Attacks
DoS/DDoS Countermeasures: Deflect Attacks
DoS/DDoS Countermeasures: Mitigate Attacks
Post-Attack Forensics
Techniques to Defend against Botnets
DoS/DDoS Countermeasures
DoS/DDoS Protection at ISP Level
Enabling TCP Intercept on Cisco IOS Software
Advanced DDoS Protection Appliances
Module Flow: DoS/DDoS Protection Tools
DoS/DDoS Protection Tool: D-Guard Anti-DDoS Firewall
DoS/DDoS Protection Tools
Module Flow: DoS/DDoS Penetration Testing
Denial-of-Service (DoS) Attack Penetration Testing
Module 11 - Session Hijacking
Module Flow: Session Hijacking Concepts
Security News
What Is Session Hijacking?
Dangers Posed by Hijacking
Why Session Hijacking Is Successful?
Key Session Hijacking Techniques
Brute Forcing Attack
Spoofing vs. Hijacking
Session Hijacking Process
Packet Analysis of a Local Session Hijack
Types of Session Hijacking
Session Hijacking in OSI Model
Module Flow: Application Level Session Hijacking
Application Level Session Hijacking
Session Sniffing
Predictable Session Token
How to Predict a Session Token
Man-in-the-Middle Attack
Man-in-the-Browser Attack
Steps to Perform Man-in-the-Browser Attack
Client-side Attacks
Cross-site Script Attack
Session Fixation
Session Fixation Attack
Module Flow: Network Level Session Hijacking
Network-level Session Hijacking
The 3-Way Handshake
Sequence Numbers
Sequence Numbers Prediction
TCP/IP Hijacking
IP Spoofing: Source Routed Packets
RST Hijacking
Blind Hijacking
Man-in-the-Middle Attack using Packet Sniffer
UDP Hijacking
Module Flow: Session Hijacking Tools
Session Hijacking Tool: Zaproxy
Session Hijacking Tool: Burp Suite
Demo - Session Hijacking with Burp
Session Hijacking Tool: JHijack
Session Hijacking Tools
Module Flow: Countermeasures
Protecting against Session Hijacking
Methods to Prevent Session Hijacking: To be Followed by Web Developers
Methods to Prevent Session Hijacking: To be Followed by Web Users
IPSec
Modes of IPSec
IPsec Architecture
IPsec Authentication and Confidentiality
Components of IPsec
IPsec Implementation
Module Flow: Penetration Testing
Session Hijacking Pen Testing
Module 12 - Hacking Webservers
Module Flow: Webserver Concepts
Security News
Webserver Market Shares
Open Source Webserver Architecture
IIS Web Server Architecture
Website Defacement
Why Web Servers are Compromised
Impact of Webserver Attacks
Module Flow: Webserver Attacks
Web Server Misconfiguration
Web Server Misconfiguration Example
Directory Traversal Attacks
Demo - Performing a Directory Traversal Attack
HTTP Response Splitting Attack
Web Cache Poisoning Attack
HTTP Response Hijacking
SSH Bruteforce Attack
Man-in-the-Middle Attack
Webserver Password Cracking
Webserver Password Cracking Techniques
Web Application Attacks
Module Flow: Attack Methodology
Webserver Attack Methodology
Webserver Attack Methodology: Information Gathering
Demo - Fingerprinting Webserver with HTTPRecon
Webserver Attack Methodology: Webserver Footprinting
Webserver Footprinting Tools
Webserver Attack Methodology: Mirroring a Website
Webserver Attack Methodology: Vulnerability Scanning
Webserver Attack Methodology: Session Hijacking
Webserver Attack Methodology: Hacking Web Passwords
Module Flow: Webserver Attack Tools
Webserver Attack Tools: Metasploit
Metasploit Architecture
Metasploit Exploit Module
Metasploit Payload Module
Metasploit Auxiliary Module
Metasploit NOPS Module
Webserver Attack Tools: Wfetch
Web Password Cracking Tool: Brutus
Web Password Cracking Tool: THC-Hydra
Web Password Cracking Tool: Internet Password Recovery Toolbox
Module Flow: Countermeasures
Countermeasures: Patches and Updates
Countermeasures: Protocols
Demo - Web-based Password Cracking with Brutus
Countermeasures: Accounts
Countermeasures: Files and Directories
How to Defend Against Web Server Attacks
How to Defend against HTTP Response Splitting and Web Cache Poisoning
Module Flow: Patch Management
Patches and Hotfixes
What Is Patch Management?
Identifying Appropriate Sources for Updates and Patches
Installation of a Patch
Implementation and Verification of a Security Patch or Upgrade
Patch Management Tool: Microsoft Baseline Security Analyzer (MBSA)
Patch Management Tools
Module Flow: Webserver Security Tools
Web Application Security Scanner: Syhunt Dynamic
Web Application Security Scanner: N-Stalker Web Application Security Scanner
Web Server Security Scanner: Wikto
Web Server Security Scanner: Acunetix Web Vulnerability Scanner
Web Server Malware Infection Monitoring Tool: HackAlert
Web Server Malware Infection Monitoring Tool: QualysGuard Malware Detection
Webserver Security Tools
Module Flow: Webserver Pen Testing
Web Server Pen Testing Tool: CORE Impact Pro
Web Server Pen Testing Tool: Immunity CANVAS
Web Server Pen Testing
Web Server Penetration Testing
Module 13 - Hacking Web Applications
Module Flow: Web App Concepts
Security News
Web Application Security Statistics
Introduction to Web Applications
Web Application Components
How Web Applications Work
Web Application Architecture
Web 2.0 Applications
Vulnerability Stack
Web Attack Vectors
Module Flow: Web App Threats
Web Application Threats - 1
Web Application Threats - 2
Unvalidated Input
Parameter/Form Tampering
Directory Traversal
Security Misconfiguration
Injection Flaws
SQL Injection Attacks
Command Injection Attacks
Demo - Web Vulnerability Scanning with Acunetix
Command Injection Example
File Injection Attack
What Is LDAP Injection?
How LDAP Injection Works
Hidden Field Manipulation Attack
Cross-Site Scripting (XSS) Attacks
How XSS Attacks Work?
Cross-Site Scripting Attack Scenario: Attack via Email
XSS Example: Attack via Email
XSS Example: Stealing Users' Cookies
XSS Example: Sending as Unauthorized Request
XSS Attack in Blog Posting
XSS Attack in Comment Field
XSS Cheat Sheet
Cross-Site Request Forgery (CSRF) Attack
How CSRF Attacks Work
Web Application Denial-of-Service (DoS) Attack
Denial-of-Service (DoS) Examples
Buffer Overflow Attacks
Cookie/Session Poisoning
How Cookie Poisoning Works
Session Fixation Attack
Insufficient Transport Layer Protection
Improper Error Handling
Insecure Cryptographic Storage
Broken Authentication and Session Management
Unvalidated Redirects and Forwards
Web Services Architecture
Web Services Attack
Web Services Footprinting Attack
Web Services XML Poisoning
Module Flow: Hacking Methodology
Web App Hacking Methodology: Footprint Web Infrastructure
Footprint Web Infrastructure
Footprint Web Infrastructure: Server Discovery
Footprint Web Infrastructure: Service Discovery
Footprint Web Infrastructure: Server Identification/Banner Grabbing
Footprint Web Infrastructure: Hidden Content Discovery
Web Spidering Using Burp Suite
Web Spidering Using Mozenda Web Agent Builder
Web App Hacking Methodology: Attack Web Servers
Hacking Web Servers
Web Server Hacking Tool: WebInspect
Web App Hacking Methodology: Analyze Web Applications
Analyze Web Applications
Analyze Web Applications: Identify Entry Points for User Input
Analyze Web Applications: Identify Server-Side Technologies
Analyze Web Applications: Identify Server-Side Functionality
Analyze Web Applications: Map the Attack Surface
Web App Hacking Methodology: Attack Authentication Mechanism
Attack Authentication Mechanism
User Name Enumeration
Password Attacks: Password Functionality Exploits
Password Attacks: Password Guessing
Password Attacks: Brute-forcing
Session Attacks: Session ID Prediction/Brute-forcing
Cookie Exploitation: Cookie Poisoning
Web App Hacking Methodology: Attack Authorization Schemes
Authorization Attack
HTTP Request Tampering
Authorization Attack: Cookie Parameter Tampering
Web App Hacking Methodology: Attack Session Management Mechanism
Session Management Attack
Attacking Session Token Generation Mechanism
Attacking Session Tokens Handling Mechanism: Session Token Sniffing
Web App Hacking Methodology: Perform Injection Attacks
Injection Attacks
Web App Hacking Methodology: Attack Data Connectivity
Attack Data Connectivity
Connection String Injection
Connection String Parameter Pollution (CSPP) Attacks
Connection Pool DoS
Web App Hacking Methodology: Attack Web Client
Attack Web App Client
Web App Hacking Methodology: Attack Web Services
Attack Web Services
Web Services Probing Attacks
Web Service Attacks: SOAP Injection
Web Service Attacks: XML Injection
Web Services Parsing Attacks
Web Service Attack Tool: soapUI
Web Service Attack Tool: XMLSpy
Module Flow: Web Application Hacking Tools
Web Application Hacking Tool: Burp Suite Professional
Web Application Hacking Tool: CookieDigger
Web Application Hacking Tool: WebScarab
Web Application Hacking Tools
Module Flow: Countermeasures
Encoding Schemes
How to Defend Against SQL Injection Attacks
How to Defend Against Command Injection Flaws
How to Defend Against XSS Attacks
How to Defend Against DoS Attacks
How to Defend Against Web Services Attack
Web Application Countermeasures
How to Defend Against Web Application Attacks
Module Flow: Security Tools
Web Application Security Tool: Acunetix Web Vulnerability Scanner
Web Application Security Tool: Watcher Web Security Tool
Web Application Security Scanner: Netsparker
Web Application Security Tool: N-Stalker Web Application Security Scanner
Web Application Security Tool: VampireScan
Web Application Security Tools
Web Application Firewall: dotDefender
Web Application Firewall: ServerDefenderVP
Web Application Firewall
Module Flow: Web App Pen Testing
Web Application Pen Testing
Information Gathering
Configuration Management Testing
Authentication Testing
Session Management Testing
Authorization Testing
Data Validation Testing
Denial-of-Service Testing
Web Services Testing
AJAX Testing
Module 14 - SQL Injection
Module Flow: SQL Injection Concepts
Security News
SQL Injection
Scenario
SQL Injection Is the Most Prevalent Vulnerability in 2012
SQL Injection Threats
What Is SQL Injection?
SQL Injection Attacks
How Web Applications Work
Server-side Technologies
HTTP Post Request
Example 1: Normal SQL Query
Example 1: SQL Injection Query
Example 1: Code Analysis
Example 2: BadProductList.aspx
Example 2: Attack Analysis
Example 3: Updating Table
Example 4: Adding New Records
Example 5: Identifying the Table Name
Example 6: Deleting a Table
Module Flow: Testing for SQL Injection
SQL Injection Detection
SQL Injection Error Messages
SQL Injection Attack Characters
Additional Methods to Detect SQL Injection
SQL Injection Black Box Pen Testing
Testing for SQL Injection
Module Flow: Types of SQL Injection
Types of SQL Injection
Simple SQL Injection Attack
Union SQL Injection Example
SQL Injection Error Based
Module Flow: Blind SQL Injection
What Is Blind SQL Injection?
No Error Messages Returned
Blind SQL Injection: WAITFOR DELAY YES or NO Response
Blind SQL Injection - Exploitation (MySQL)
Blind SQL Injection - Extract Database User
Blind SQL Injection - Extract Database Name
Blind SQL Injection - Extract Column Name
Blind SQL Injection - Extract Data from ROWS
Module Flow: SQL Injection Methodology
SQL Injection Methodology
Module Flow: Advanced SQL Injection
Information Gathering
Extracting Information through Error Messages
Understanding SQL Query
Bypass Website Logins Using SQL Injection
Database, Table, and Column Enumeration
Demo - SQL Injection Techniques
Advanced Enumeration
Features of Different DBMSs
Creating Database Accounts
Password Grabbing
Grabbing SQL Server Hashes
Extracting SQL Hashes (In a Single Statement)
Transfer Database to Attacker's Machine
Interacting with the Operating System
Interacting with the File System
Network Reconnaissance Using SQL Injection
Network Reconnaissance Full Query
Module Flow: SQL Injection Tools
SQL Injection Tools: BSQLHacker
SQL Injection Tools: Marathon Tool
SQL Injection Tools: SQL Power Injector
SQL Injection Tools: Havij
SQL Injection Tools
Module Flow: Evasion Techniques
Evading IDS
Types of Signature Evasion Techniques
Evasion Technique: Sophisticated Matches
Evasion Technique: Hex Encoding
Evasion Technique: Manipulating White Spaces
Evasion Technique: In-line Comment
Evasion Technique: Char Encoding
Evasion Technique: String Concatenation
Evasion Technique: Obfuscated Codes
Module Flow: Countermeasures
How to Defend Against SQL Injection Attacks
How to Defend Against SQL Injection Attacks: Use Type-Safe SQL Parameters
How to Defend Against SQL Injection Attacks (Cont.)
SQL Injection Detection Tool: Microsoft Source Code Analyzer
SQL Injection Detection Tool: Microsoft UrlScan Filter
SQL Injection Detection Tool: dotDefender
SQL Injection Detection Tool: IBM Security AppScan
SQL Injection Detection Tool: WebCruiser
Snort Rule to Detect SQL Injection Attacks
SQL Injection Detection Tools
Module 15 - Hacking Wireless Networks
Module Flow: Wireless Concepts
Security News
Wireless Networks
2010 vs. 2011 Wi-Fi Data Usage Comparison
Wi-Fi Networks at Home and Public Places
Types of Wireless Networks
Wireless Standards
Service Set Identifier (SSID)
Wi-Fi Authentication Modes
Wi-Fi Authentication Process Using a Centralized Authentication Server
Wireless Terminologies
Wi-Fi Chalking
Wi-Fi Chalking Symbols
Types of Wireless Antennas
Parabolic Grid Antenna
Module Flow: Wireless Encryption
Types of Wireless Encryption
WEP Encryption
How WEP Works
What Is WPA?
How WPA Works
Temporal Keys
What Is WPA2?
How WPA2 Works
WEP vs. WPA vs. WPA2
WEP Issues
Weak Initialization Vectors (IV)
How to Break WEP Encryption
How to Defend Against WPA Cracking
Module Flow: Wireless Threats
Wireless Threats: Access Control Attacks
Wireless Threats: Integrity Attacks
Wireless Threats: Confidentiality Attacks
Wireless Threats: Availability Attacks
Wireless Threats: Authentication Attacks
Rogue Access Point Attack
Client Mis-association
Misconfigured Access Point Attack
Unauthorized Association
Ad Hoc Connection Attack
HoneySpot Access Point Attack
AP MAC Spoofing
Denial-of-Service Attack
Jamming Signal Attack
Wi-Fi Jamming Devices
Module Flow: Wireless Hacking Methodology
Wireless Hacking Methodology: Wi-Fi Discovery
Footprint the Wireless Network
Attackers Scanning for Wi-Fi Networks
Find Wi-Fi Networks to Attack
Wi-Fi Discovery Tool: inSSIDer
Wi-Fi Discovery Tool: NetSurveyor
Wi-Fi Discovery Tool: NetStumbler
Wi-Fi Discovery Tool: Vistumbler
Wi-Fi Discovery Tool: WirelessMon
Mobile-based Wi-Fi Discovery Tool
Wi-Fi Discovery Tools
Wireless Hacking Methodology: GPS Mapping
GPS Mapping
GPS Mapping Tool: WIGLE
GPS Mapping Tool: Skyhook
Wi-Fi Hotspot Finder: jiWire
Wi-Fi Hotspot Finder: WeFi
How to Discover Wi-Fi Network Using Wardriving
Wireless Hacking Methodology: Wireless Traffic Analysis
Wireless Traffic Analysis
Wireless Cards and Chipsets
Wi-Fi USB Dongle: AirPcap
Wi-Fi Packet Sniffer: Wireshark with AirPcap
Wi-Fi Packet Sniffer: Cascade Pilot
Wi-Fi Packet Sniffer: OmniPeek
Wi-Fi Packet Sniffer: CommView for Wi-Fi
What Is Spectrum Analysis?
Wi-Fi Packet Sniffers
Wireless Hacking Methodology: Launch Wireless Attacks
Aircrack-ng Suite
How to Reveal Hidden SSIDs
Demo - Cracking WEP with BackTrack 4
Fragmentation Attack
How to Launch MAC Spoofing Attack
Denial of Service: Deauthentication and Disassociation Attacks
Man-in-the-Middle Attack
MITM Attack Using Aircrack-ng
Wireless ARP Poisoning Attack
Rogue Access Point
Evil Twin
How to Set Up a Fake Hotspot (Evil Twin)
Wireless Hacking Methodology: Crack Wi-Fi Encryption
How to Crack WEP Using Aircrack
How to Crack WEP Using Aircrack Screenshot 1/2
How to Crack WEP Using Aircrack Screenshot 2/2
How to Crack WPA-PSK Using Aircrack
WPA Cracking Tool: KisMAC
WEP Cracking Using Cain & Abel
Demo - Cracking WEP with Cain
WPA Brute Forcing Using Cain & Abel
WPA Cracking Tool: Elcomsoft Wireless Security Auditor
WEP/WPA Cracking Tools
Module Flow: Wireless Hacking Tools
Wi-Fi Sniffer: Kismet
Wardriving Tools
RF Monitoring Tools
Wi-Fi Traffic Analyzer Tools
Wi-Fi Raw Packet Capturing and Spectrum Analyzing Tools
Module Flow: Bluetooth Hacking
Bluetooth Hacking
Bluetooth Stack
Bluetooth Threats
How to BlueJack a Victim
Bluetooth Hacking Tool: Super Bluetooth Hack
Bluetooth Hacking Tool: PhoneSnoop
Bluetooth Hacking Tool: BlueScanner
Bluetooth Hacking Tools
Module Flow: Countermeasures
How to Defend Against Bluetooth Hacking
How to Detect and Block Rogue AP
Wireless Security Layers
How to Defend Against Wireless Attacks
Module Flow: Wireless Security Tools
Wireless Intrusion Prevention Systems
Wireless IPS Deployment
Wi-Fi Security Auditing Tool: AirMagnet WiFi Analyzer
Wi-Fi Security Auditing Tool: AirDefense
Wi-Fi Security Auditing Tool: Adaptive Wireless IPS
Wi-Fi Security Auditing Tool: Aruba RFProtect WIPS
Wi-Fi Intrusion Prevention System
Wi-Fi Predictive Planning Tools
Wi-Fi Vulnerability Scanning Tools
Module Flow: Wi-Fi Penetration Testing
Wireless Penetration Testing
Wireless Penetration Testing Framework
Wi-Fi Pen Testing Framework
Pen Testing LEAP Encrypted WLAN
Pen Testing WPA/WPA2 Encrypted WLAN
Pen Testing WEP Encrypted WLAN
Pen Testing Unencrypted WLAN
Module 16 - Hacking Mobile Platforms
Module Flow: Mobile Platform Attack Vectors
Security News
Mobile Threat Report Q2 2012
Terminology
Mobile Attack Vectors
Mobile Platform Vulnerabilities and Risks
Security Issues Arising from App Stores
Threats of Mobile Malware
App Sandboxing Issues
Module Flow: Hacking Android OS
Android OS
Android OS Architecture
Android Device Administration API
Android Rooting
Rooting Android Phones using SuperOneClick
Rooting Android Phones Using Superboot
Android Rooting Tools
Session Hijacking Using DroidSheep
Android-based Sniffer: FaceNiff
Android Trojan: ZitMo (ZeuS-in-the-Mobile)
Android Trojan: GingerBreak
Android Trojan: AcnetSteal and Cawitt
Android Trojan: Frogonal and Gamex
Android Trojan: KabStamper and Mania
Android Trojan: PremiumSMS and SmsSpy
Android Trojan: DroidLive SMS and UpdtKiller
Android Trojan: FakeToken
Securing Android Devices
Google Apps Device Policy
Remote Wipe Service: Remote Wipe
Android Security Tool: DroidSheep Guard
Android Vulnerability Scanner: X-Ray
Android Penetration Testing Tool: Android Network Toolkit - Anti
Android Device Tracking Tools
Module Flow: Hacking iOS
Security News
Apple iOS
Jailbreaking iOS
Types of Jailbreaking
Jailbreaking Techniques
App Platform for Jailbroken Devices: Cydia
Jailbreaking Tools: Redsn0w and Absinthe
Tethered Jailbreaking of iOS 6 Using RedSn0w
Jailbreaking Tools: Sn0wbreeze and PwnageTool
Jailbreaking Tools: LimeRaln and Jailbreakme
Jailbreaking Tools: Blackraln and Spirit
Guidelines for Securing iOS Devices
iOS Device Tracking Tools
Module Flow: Hacking Windows Phone OS
Windows Phone 8
Windows Phone 8 Architecture
Secure Boot Process
Guidelines for Securing Windows OS Devices
Module Flow: Hacking BlackBerry
BlackBerry Operating System
BlackBerry Enterprise Solution Architecture
Blackberry Attack Vectors
Malicious Code Signing
JAD File Exploits and Memory/Processes Manipulations
Short Message Service (SMS) Exploits
Email Expolits
PIM Data Attacks and TCP/IP Connections Vulnerabilities
BlackBerry Spyware: FinSpy Mobile
Guidelines for Securing BlackBerry Devices
Module Flow: Mobile Device Management
Mobile Device Management (MDM)
MDM Logical Architecture
MDM Solution: MaaS360 Mobile Device Management (MDM)
MDM Solutions
Module Flow: Mobile Security Guidelines and Tools
General Guidelines for Mobile Platform Security
Mobile Device Security Guidelines for Administrator
Mobile Protection Tool: BullGuard Mobile Security
Mobile Protection Tool: Lookout
Mobile Protection Tool: WISeID
Mobile Protection Tools
Module Flow: Mobile Pen Testing
Android Phone Pen Testing
iPhone Pen Testing
Windows Phone Pen Testing
BlackBerry Pen Testing
Module 17 - Evading IDS, Firewalls, and Honeypots
Module Flow: IDS, Firewall and Honeypot Concepts
Security News
Intrusion Detection Systems (IDS) and their Placement
How IDS Works
Ways to Detect an Intrusion
Types of Intrusion Detection Systems
System Integrity Verifiers (SIV)
General Indications of Intrusions
General Indications of System Intrusions
Firewall
Firewall Architecture
DeMilitarized Zone (DMZ)
Types of Firewall
Packet Filtering Firewall
Circuit-Level Gateway Firewall
Application-Level Firewall
Stateful Multilayer Inspection Firewall
Firewall Identification: Port Scanning
Firewall Identification: Firewalking
Firewall Identification: Banner Grabbing
Honeypot
Types of Honeypots
Module Flow: IDS, Firewall and Honeypot System
Intrusion Detection Tool: Snort
How Snort Works
Snort Rules
Snort Rules: Rule Actions and IP Protocols
Snort Rules: The Direction Operator and IP Addresses
Snort Rules: Port Numbers
Demo - Introduction to Snort
Intrusion Detection System: Tipping Point
Intrusion Detection Tools
Firewall: ZoneAlarm PRO Firewall
Firewalls
Honeypot Tool: KFSensor
Honeypot Tool: SPECTER
Honeypot Tools
Module Flow: Evading IDS
Insertion Attack
Evasion
Denial-of-Service Attack (DoS)
Obfuscating
False Positive Generation
Session Splicing
Unicode Evasion Technique
Fragmentation Attack
Overlapping Fragments
Time-To-Live Attacks
Invalid RST Packets
Urgency Flag
Polymorphic Shellcode
ASCII Shellcode
Application-Layer Attacks
Desynchronization-Pre Connection SYN
Desynchronization-Post Connection SYN
Other Types of Evasion
Module Flow: Evading Firewalls
IP Address Spoofing
Source Routing
Tiny Fragments
Bypass Blocked Sites Using IP Address in Place of URL
Bypass Blocked Sites Using Anonymous Website Surfing Sites
Bypass a Firewall Using Proxy Server
Bypassing Firewall through ICMP Tunneling Method
Bypassing Firewall through ACK Tunneling Method
Bypassing Firewall through HTTP Tunneling Method
Bypassing Firewall through External Systems
Bypassing Firewall through MITM Attack
Module Flow: Detecting Honeypots
Detecting Honeypots
Honeypot Detecting Tool: Send-Safe Honeypot Hunter
Module Flow: Firewall Evading Tools
Firewall Evasion Tool: Traffic IQ Professional
Firewall Evasion Tool: tcp-over-dns
Firewall Evasion Tools
Packet Fragment Generators
Module Flow: Countermeasures
Countermeasures
Module Flow: Penetration Testing
Firewall/IDS Penetration Testing
Firewall Penetration Testing
IDS Penetration Testing
Module 18 - Buffer Overflow
Module Flow: Buffer Overflow Concepts
Security News
Buffer Overflows
Why Are Programs And Applications Vulnerable to Buffer Overflows?
Understanding Stacks
Stack-Based Buffer Overflow
Understanding Heap
Heap-Based Buffer Overflow
Stack Operations
Shellcode
No Operations (NOPs)
Module Flow: Buffer Overflow Methodology
Knowledge Required to Program Buffer Overflow Exploits
Buffer Overflow Steps
Attacking a Real Program
Format String Problem
Overflow Using Format String
Smashing the Stack
Once the Stack is Smashed…
Module Flow: Buffer Overflow Examples
Simple Uncontrolled Overflow
Simple Buffer Overflow in C
Demo - Simple Buffer Overflow in C
Simple Buffer Overflow in C: Code Analysis
Exploiting Semantic Comments in C (Annotations)
How to Mutate a Buffer Overflow Exploit
Module Flow: Buffer Overflow Detection
Identifying Buffer Overflows
How to Detect Buffer Overflows in a Program
Testing for Heap Overflow Conditions: heap.exe
Steps for Testing for Stack Overflow in OllyDbg Debugger
Testing for Stack Overflow in OllyDbg Debugger
Testing for Format String Conditions Using IDA Pro
BoF Detection Tool: Immunity CANVAS
BoF Detection Tools
Module Flow: Buffer Overflow Countermeasures
Defense Against Buffer Overflows
Preventing BoF Attacks
Programming Countermeasures
Data Execution Prevention (DEP)
Enhanced Mitigation Experience Toolkit (EMET)
EMET System Configuration Settings
EMET Application Configuration Settings
Module Flow: Buffer Overflow Security Tools
/GS
BoF Security Tool: BufferShield
BoF Security Tools
Module Flow: Buffer Overflow Pen Testing
Buffer Overflow Penetration Testing
Module 19 - Cryptography
Module Flow: Cryptography Concepts
Security News
Cryptography
Types of Cryptography
Government Access to Keys (GAK)
Module Flow: Encryption Algorithms
Ciphers
Data Encryption Standard (DES)
Advanced Encryption Standard (AES)
RC4, RC5, RC6 Algorithms
The DSA and Related Signature Schemes
RSA (Rivest Shamir Adleman)
Example of RSA Algorithm
The RSA Signature Scheme
Message Digest (One-way Hash) Functions
Message Digest Function: MD5
Secure Hashing Algorithm (SHA)
What Is SSH (Secure Shell)?
Module Flow: Cryptography Tools
MD5 Hash Calculators: HashCalc, MD5 Calculator and HashMyFiles
Cryptography Tool: Advanced Encryption Package
Cryptography Tool: BCTextEncoder
Cryptography Tools
Module Flow: Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI)
Certification Authorities
Module Flow: Email Encryption
Digital Signature
SSL (Secure Sockets Layer)
Transport Layer Security (TLS)
Module Flow: Disk Encryption
Disk Encryption
Disk Encryption Tool: TrueCrypt
Disk Encryption Tool: GiliSoft Full Disk Encryption
Disk Encryption Tools
Module Flow: Cryptography Attacks
Cryptography Attacks
Code Breaking Methodologies
Brute-Force Attack
Meet-in-the-Middle Attack on Digital Signature Schemes
Module Flow: Cryptanalysis Tools
Cryptanalysis Tool: CrypTool
Demo - Cryptanalysis Tool: CrypTool
Cryptanalysis Tools
Online MD5 Decryption Tools
Module 20 - Penetration Testing
Module Flow: Pen Testing Concepts
Security News
Security Assessments
Security Audit
Vulnerability Assessment
Limitations of Vulnerability Assessment
Introduction to Penetration Testing
Penetration Testing
Why Penetration Testing
Comparing Security Audit, Vulnerability Assessment, and Penetration Testing
What Should be Tested?
What Makes a Good Penetration Test?
ROI on Penetration Testing
Testing Points
Testing Locations
Module Flow: Types of Pen Testing
Types of Penetration Testing
External Penetration Testing
Internal Security Assessment
Black-box Penetration Testing
Grey-box Penetration Testing
White-box Penetration Testing
Announced/Unannounced Testing
Automated Testing
-------------------------------------------------
Download DVD 1 4 GB
------------------------------------------------
Download DVD 2 4 GB
------------------------------------------------
Download DVD 3 4 GB
------------------------------------------------
Download DVD 4 4 GB
------------------------------------------------
Download DVD 5 4 GB
------------------------------------------------
Download DVD 1 4 GB
------------------------------------------------
Download DVD 2 4 GB
------------------------------------------------
Download DVD 3 4 GB
------------------------------------------------
Download DVD 4 4 GB
------------------------------------------------
Download DVD 5 4 GB
------------------------------------------------
Download DVD 6 4 GB
------------------------------------------------
Download All From TheHacking Tutorials | ALbDLL.Com
------------------------------------------------
Download All From TheHacking Tutorials | ALbDLL.Com
No comments:
Post a Comment